-
Depth Estimation using Weighted-loss and Transfer Learning
Authors:
Muhammad Adeel Hafeez,
Michael G. Madden,
Ganesh Sistu,
Ihsan Ullah
Abstract:
Depth estimation from 2D images is a common computer vision task that has applications in many fields including autonomous vehicles, scene understanding and robotics. The accuracy of a supervised depth estimation method mainly relies on the chosen loss function, the model architecture, quality of data and performance metrics. In this study, we propose a simplified and adaptable approach to improve…
▽ More
Depth estimation from 2D images is a common computer vision task that has applications in many fields including autonomous vehicles, scene understanding and robotics. The accuracy of a supervised depth estimation method mainly relies on the chosen loss function, the model architecture, quality of data and performance metrics. In this study, we propose a simplified and adaptable approach to improve depth estimation accuracy using transfer learning and an optimized loss function. The optimized loss function is a combination of weighted losses to which enhance robustness and generalization: Mean Absolute Error (MAE), Edge Loss and Structural Similarity Index (SSIM). We use a grid search and a random search method to find optimized weights for the losses, which leads to an improved model. We explore multiple encoder-decoder-based models including DenseNet121, DenseNet169, DenseNet201, and EfficientNet for the supervised depth estimation model on NYU Depth Dataset v2. We observe that the EfficientNet model, pre-trained on ImageNet for classification when used as an encoder, with a simple upsampling decoder, gives the best results in terms of RSME, REL and log10: 0.386, 0.113 and 0.049, respectively. We also perform a qualitative analysis which illustrates that our model produces depth maps that closely resemble ground truth, even in cases where the ground truth is flawed. The results indicate significant improvements in accuracy and robustness, with EfficientNet being the most successful architecture.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
ECU Identification using Neural Network Classification and Hyperparameter Tuning
Authors:
Kunaal Verma,
Mansi Girdhar,
Azeem Hafeez,
Selim S. Awad
Abstract:
Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems (IDS) provide a promising new approach to solve this problem. By characterizing network traffic from known ECUs, hazardous messages can be discriminated. In this article, a modified version of Fingerprint IDS is empl…
▽ More
Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems (IDS) provide a promising new approach to solve this problem. By characterizing network traffic from known ECUs, hazardous messages can be discriminated. In this article, a modified version of Fingerprint IDS is employed utilizing both step response and spectral characterization of network traffic via neural network training. With the addition of feature set reduction and hyperparameter tuning, this method accomplishes a 99.4% detection rate of trusted ECU traffic.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
COVID-ResNet: A Deep Learning Framework for Screening of COVID19 from Radiographs
Authors:
Muhammad Farooq,
Abdul Hafeez
Abstract:
In the last few months, the novel COVID19 pandemic has spread all over the world. Due to its easy transmission, develo** techniques to accurately and easily identify the presence of COVID19 and distinguish it from other forms of flu and pneumonia is crucial. Recent research has shown that the chest Xrays of patients suffering from COVID19 depicts certain abnormalities in the radiography. However…
▽ More
In the last few months, the novel COVID19 pandemic has spread all over the world. Due to its easy transmission, develo** techniques to accurately and easily identify the presence of COVID19 and distinguish it from other forms of flu and pneumonia is crucial. Recent research has shown that the chest Xrays of patients suffering from COVID19 depicts certain abnormalities in the radiography. However, those approaches are closed source and not made available to the research community for re-producibility and gaining deeper insight. The goal of this work is to build open source and open access datasets and present an accurate Convolutional Neural Network framework for differentiating COVID19 cases from other pneumonia cases. Our work utilizes state of the art training techniques including progressive resizing, cyclical learning rate finding and discriminative learning rates to training fast and accurate residual neural networks. Using these techniques, we showed the state of the art results on the open-access COVID-19 dataset. This work presents a 3-step technique to fine-tune a pre-trained ResNet-50 architecture to improve model performance and reduce training time. We call it COVIDResNet. This is achieved through progressively re-sizing of input images to 128x128x3, 224x224x3, and 229x229x3 pixels and fine-tuning the network at each stage. This approach along with the automatic learning rate selection enabled us to achieve the state of the art accuracy of 96.23% (on all the classes) on the COVIDx dataset with only 41 epochs. This work presented a computationally efficient and highly accurate model for multi-class classification of three different infection types from along with Normal individuals. This model can help in the early screening of COVID19 cases and help reduce the burden on healthcare systems.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features
Authors:
Sulaiman Khan,
Hazrat Ali,
Zahid Ullah,
Nasru Minallah,
Shahid Maqsood,
Abdul Hafeez
Abstract:
This paper presents a recognition system for handwritten Pashto letters. However, handwritten character recognition is a challenging task. These letters not only differ in shape and style but also vary among individuals. The recognition becomes further daunting due to the lack of standard datasets for inscribed Pashto letters. In this work, we have designed a database of moderate size, which encom…
▽ More
This paper presents a recognition system for handwritten Pashto letters. However, handwritten character recognition is a challenging task. These letters not only differ in shape and style but also vary among individuals. The recognition becomes further daunting due to the lack of standard datasets for inscribed Pashto letters. In this work, we have designed a database of moderate size, which encompasses a total of 4488 images, stemming from 102 distinguishing samples for each of the 44 letters in Pashto. The recognition framework uses zoning feature extractor followed by K-Nearest Neighbour (KNN) and Neural Network (NN) classifiers for classifying individual letter. Based on the evaluation of the proposed system, an overall classification accuracy of approximately 70.05% is achieved by using KNN while 72% is achieved by using NN.
△ Less
Submitted 8 June, 2019; v1 submitted 6 April, 2019;
originally announced April 2019.
-
Linking Received Packet to the Transmitter Through Physical-Fingerprinting of Controller Area Network
Authors:
Omid Avatefipour,
Azeem Hafeez,
Muhammad Tayyab,
Hafiz Malik
Abstract:
The Controller Area Network (CAN) bus serves as a legacy protocol for in-vehicle data communication. Simplicity, robustness, and suitability for real-time systems are the salient features of the CAN bus protocol. However, it lacks the basic security features such as massage authentication, which makes it vulnerable to the spoofing attacks. In a CAN network, linking CAN packet to the sender node is…
▽ More
The Controller Area Network (CAN) bus serves as a legacy protocol for in-vehicle data communication. Simplicity, robustness, and suitability for real-time systems are the salient features of the CAN bus protocol. However, it lacks the basic security features such as massage authentication, which makes it vulnerable to the spoofing attacks. In a CAN network, linking CAN packet to the sender node is a challenging task. This paper aims to address this issue by develo** a framework to link each CAN packet to its source. Physical signal attributes of the received packet consisting of channel and node (or device) which contains specific unique artifacts are considered to achieve this goal. Material and design imperfections in the physical channel and digital device, which are the main contributing factors behind the device-channel specific unique artifacts, are leveraged to link the received electrical signal to the transmitter. Generally, the inimitable patterns of signals from each ECUs exist over the course of time that can manifest the stability of the proposed method. Uniqueness of the channel-device specific attributes are also investigated for time- and frequency-domain. Feature vector is made up of both time and frequency domain physical attributes and then employed to train a neural network-based classifier. Performance of the proposed fingerprinting method is evaluated by using a dataset collected from 16 different channels and four identical ECUs transmitting same message. Experimental results indicate that the proposed method achieves correct detection rates of 95.2% and 98.3% for channel and ECU classification, respectively.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
Error-Rate Performance Analysis of Wireless Sensor Networks over Fading Channels
Authors:
Haider Mehdi,
Safeeullah Soomro,
W. R. Khan,
Abdul Ghafoor Memon,
Abdul Hafeez
Abstract:
In this paper, we analyze the bit-error-rate (BER) performance of wireless sensor networks. A wireless sensor node with a single transmitter antenna and multiple receiver antennas is considered here. We consider M (M greater or equal ro 1) receiver antennas to mitigate channel fading effects. BER performance is analyzed in the presence of a co-channel interference source. Wireless channel is assum…
▽ More
In this paper, we analyze the bit-error-rate (BER) performance of wireless sensor networks. A wireless sensor node with a single transmitter antenna and multiple receiver antennas is considered here. We consider M (M greater or equal ro 1) receiver antennas to mitigate channel fading effects. BER performance is analyzed in the presence of a co-channel interference source. Wireless channel is assumed to follow independently Nakagami fading for the wireless sensor network and Rayleigh fading for the interference signal. Based on the derived analytical expressions, the effects of different fading channel and co-channel interference parameters on the BER performance of wireless sensor networks are assessed.
△ Less
Submitted 7 September, 2013;
originally announced September 2013.
-
Energy Consumption Rate based Stable Election Protocol (ECRSEP) for WSNs
Authors:
O. Rehman,
N. Javaid,
B. Manzoor,
A. Hafeez,
A. Iqbal,
M. Ishfaq
Abstract:
In recent few yearsWireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of battery power is an important factor. Clustering is an effi…
▽ More
In recent few yearsWireless Sensor Networks (WSNs) have seen an increased interest in various applications like border field security, disaster management and medical applications. So large number of sensor nodes are deployed for such applications, which can work autonomously. Due to small power batteries in WSNs, efficient utilization of battery power is an important factor. Clustering is an efficient technique to extend life time of sensor networks by reducing the energy consumption. In this paper, we propose a new protocol; Energy Consumption Rate based Stable Election Protocol (ECRSEP). Our CH selection scheme is based on the weighted election probabilities of each node according to the Energy Consumption Rate (ECR) of each node. We compare results of our proposed protocol with Low Energy Adaptive Clustering Hierarchy (LEACH), Distributed Energy Efficient Clustering (DEEC), Stable Election Protocol (SEP), and Enhanced SEP(ESEP). Our simulation results show that our proposed protocol, ECRSEP outperforms all these protocols in terms of network stability and network lifetime.
△ Less
Submitted 21 March, 2013;
originally announced March 2013.
-
New Edge Detection Technique based on the Shannon Entropy in Gray Level Images
Authors:
Mohamed A. El-Sayed,
Tarek Abd-El Hafeez
Abstract:
Edge detection is an important field in image processing. Edges characterize object boundaries and are therefore useful for segmentation, registration, feature extraction, and identification of objects in a scene. In this paper, an approach utilizing an improvement of Baljit and Amar method which uses Shannon entropy other than the evaluation of derivatives of the image in detecting edges in gray…
▽ More
Edge detection is an important field in image processing. Edges characterize object boundaries and are therefore useful for segmentation, registration, feature extraction, and identification of objects in a scene. In this paper, an approach utilizing an improvement of Baljit and Amar method which uses Shannon entropy other than the evaluation of derivatives of the image in detecting edges in gray level images has been proposed. The proposed method can reduce the CPU time required for the edge detection process and the quality of the edge detector of the output images is robust. A standard test images, the real-world and synthetic images are used to compare the results of the proposed edge detector with the Baljit and Amar edge detector method. In order to validate the results, the run time of the proposed method and the pervious method are presented. It has been observed that the proposed edge detector works effectively for different gray scale digital images. The performance evaluation of the proposed technique in terms of the measured CPU time and the quality of edge detector method are presented. Experimental results demonstrate that the proposed method achieve better result than the relevant classic method.
△ Less
Submitted 11 November, 2012;
originally announced November 2012.