-
Segmentation and Characterization of Macerated Fibers and Vessels Using Deep Learning
Authors:
Saqib Qamar,
Abu Imran Baba,
Stéphane Verger,
Magnus Andersson
Abstract:
Wood comprises different cell types, such as fibers, tracheids and vessels, defining its properties. Studying cells' shape, size, and arrangement in microscopy images is crucial for understanding wood characteristics. Typically, this involves macerating (soaking) samples in a solution to separate cells, then spreading them on slides for imaging with a microscope that covers a wide area, capturing…
▽ More
Wood comprises different cell types, such as fibers, tracheids and vessels, defining its properties. Studying cells' shape, size, and arrangement in microscopy images is crucial for understanding wood characteristics. Typically, this involves macerating (soaking) samples in a solution to separate cells, then spreading them on slides for imaging with a microscope that covers a wide area, capturing thousands of cells. However, these cells often cluster and overlap in images, making the segmentation difficult and time-consuming using standard image-processing methods. In this work, we developed an automatic deep learning segmentation approach that utilizes the one-stage YOLOv8 model for fast and accurate segmentation and characterization of macerated fiber and vessel form aspen trees in microscopy images. The model can analyze 32,640 x 25,920 pixels images and demonstrate effective cell detection and segmentation, achieving a mAP_{0.5-0.95} of 78 %. To assess the model's robustness, we examined fibers from a genetically modified tree line known for longer fibers. The outcomes were comparable to previous manual measurements. Additionally, we created a user-friendly web application for image analysis and provided the code for use on Google Colab. By leveraging YOLOv8's advances, this work provides a deep learning solution to enable efficient quantification and analysis of wood cells suitable for practical applications.
△ Less
Submitted 18 June, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
Model-Based Framework for exploiting sensors of IoT devices using a Botnet: A case study with Android
Authors:
Zubair Khaliq,
Dawood Ashraf Khan,
Asif Iqbal Baba,
Shahbaz Ali,
Sheikh Umar Farooq
Abstract:
Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent ou…
▽ More
Botnets have become a serious security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic that's swee** the planet, and the ever-larger number of cyber-criminals who now have access to or have developed increasingly more sophisticated tools are incentivizing the growth of botnets in this domain. The recent outbreak of botnets like Dark Nexus (derived from Qbot and Mirai), Mukashi, LeetHozer, Hoaxcalls, etc. shows the alarming rate at which this threat is converging. The botnets have attributes that make them an excellent platform for malicious activities in IoT devices. These IoT devices are used by organizations that need to both innovate and safeguard the personal and confidential data of their customers, employees, and business partners. The IoT devices have built-in sensors or actuators which can be exploited to monitor or control the physical environment of the entities connected to them thereby violating the fundamental concept of privacy-by-design of these devices. In this paper, we design and describe a modular botnet framework for IoT. Our framework is communication channel independent because it utilizes various available communication channels for command and control of an IoT device. The framework uses an enhanced centralized architecture associated with a novel Domain Fluxing Technique. The proposed framework will provide insights into how privacy in IoT devices can be incorporated at design time to check the sensors and actuators in these devices against malicious exploitation consequently preserving privacy. This paper includes design considerations, command and control structures, characteristics, capabilities, intrusion, and other related work. Furthermore, proof of concept Botnet is implemented and explained using the developed framework.
△ Less
Submitted 14 January, 2022;
originally announced January 2022.
-
Application Specific Drone Simulators: Recent Advances and Challenges
Authors:
Aakif Mairaj,
Asif I. Baba,
Ahmad Y. Javaid
Abstract:
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have…
▽ More
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have raised concerns in the recent past. Security and viability concerns in drone-based applications are growing at an alarming rate. Besides, UAV networks (UAVNets) are distinctive from other ad-hoc networks. Therefore, it is necessary to address these issues to ensure proper functioning of these UAVs while kee** their uniqueness in mind. Furthermore, adequate security and functionality require the consideration of many parameters that may include an accurate cognizance of the working mechanism of vehicles, geographical and weather conditions, and UAVNet communication. This is achievable by creating a simulator that includes these aspects. A performance evaluation through relevant drone simulator becomes indispensable procedure to test features, configurations, and designs to demonstrate superiority to comparative schemes and suitability. Thus, it becomes of paramount importance to establish the credibility of simulation results by investigating the merits and limitations of each simulator prior to selection. Based on this motivation, we present a comprehensive survey of current drone simulators. In addition, open research issues and research challenges are discussed and presented.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.