-
Integrated Control of Robotic Arm through EMG and Speech: Decision-Driven Multimodal Data Fusion
Authors:
Tauheed Khan Mohd,
Ahmad Y Javaid
Abstract:
Interactions with electronic devices are changing in our daily lives. The day-to-day development brings curiosity to recent technology and challenges its use. The gadgets are becoming cumbersome, and their usage frustrates a segment of society. In specific scenarios, the user cannot use the modalities because of the challenges that bring in, e.g., the usage of touch screen devices by elderly peopl…
▽ More
Interactions with electronic devices are changing in our daily lives. The day-to-day development brings curiosity to recent technology and challenges its use. The gadgets are becoming cumbersome, and their usage frustrates a segment of society. In specific scenarios, the user cannot use the modalities because of the challenges that bring in, e.g., the usage of touch screen devices by elderly people. The idea of multimodality provides easy access to devices of daily use through various modalities. In this paper, we suggest a solution that allows the operation of a microcontroller-based device using voice and speech. The model implemented will learn from the user's behavior and decide based on prior knowledge.
△ Less
Submitted 11 March, 2024;
originally announced April 2024.
-
Multi-Modal Data Fusion in Enhancing Human-Machine Interaction for Robotic Applications: A Survey
Authors:
Tauheed Khan Mohd,
Nicole Nguyen,
Ahmad Y Javaid
Abstract:
Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier human-machine interaction. On the other hand, develop…
▽ More
Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier human-machine interaction. On the other hand, developers and researchers need to be aware of state-of-the-art methodologies being used to achieve this goal. We present this survey to provide researchers with state-of-the-art data fusion technologies implemented using multiple inputs to accomplish a task in the robotic application domain. Moreover, the input data modalities are broadly classified into uni-modal and multi-modal systems and their application in myriad industries, including the health care industry, which contributes to the medical industry's future development. It will help the professionals to examine patients using different modalities. The multi-modal systems are differentiated by a combination of inputs used as a single input, e.g., gestures, voice, sensor, and haptic feedback. All these inputs may or may not be fused, which provides another classification of multi-modal systems. The survey concludes with a summary of technologies in use for multi-modal systems.
△ Less
Submitted 26 December, 2022; v1 submitted 15 February, 2022;
originally announced February 2022.
-
Multi-modal data fusion of Voice and EMG data for Robotic Control
Authors:
Tauheed Khan Mohd,
Jackson Carvalho,
Ahmad Y Javaid
Abstract:
Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures Electromyography data (EMG) using myoelectric sig…
▽ More
Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures Electromyography data (EMG) using myoelectric signals and translates them to be used as input signals through some predefined gestures. Use of this device in a multi-modal environment will not only increase the possible types of work that can be accomplished with the help of such device, but it will also help in improving the accuracy of the tasks performed. This paper addresses the fusion of input modalities such as speech and myoelectric signals captured through a microphone and MYO band, respectively, to control a robotic arm. Experimental results obtained as well as their accuracies for performance analysis are also presented.
△ Less
Submitted 6 January, 2022;
originally announced January 2022.
-
TLU-Net: A Deep Learning Approach for Automatic Steel Surface Defect Detection
Authors:
Praveen Damacharla,
Achuth Rao M. V.,
Jordan Ringenberg,
Ahmad Y Javaid
Abstract:
Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automatic steel defect detection methods could be useful i…
▽ More
Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automatic steel defect detection methods could be useful in less expensive and faster quality control and feedback. But preparing the annotated training data for segmentation and classification could be a costly process. In this work, we propose to use the Transfer Learning-based U-Net (TLU-Net) framework for steel surface defect detection. We use a U-Net architecture as the base and explore two kinds of encoders: ResNet and DenseNet. We compare these nets' performance using random initialization and the pre-trained networks trained using the ImageNet data set. The experiments are performed using Severstal data. The results demonstrate that the transfer learning performs 5% (absolute) better than that of the random initialization in defect classification. We found that the transfer learning performs 26% (relative) better than that of the random initialization in defect segmentation. We also found the gain of transfer learning increases as the training data decreases, and the convergence rate with transfer learning is better than that of the random initialization.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
IVACS: Intelligent Voice Assistant for Coronavirus Disease (COVID-19) Self-Assessment
Authors:
Parashar Dhakal,
Praveen Damacharla,
Ahmad Y. Javaid,
Hari K. Vege,
Vijay K. Devabhaktuni
Abstract:
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organizations have already pioneered mobile and web-bas…
▽ More
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organizations have already pioneered mobile and web-based applications for self-assessment of COVID-19 to reduce this global pandemic's spread. We propose an intelligent voice-based assistant for COVID-19 self-assessment (IVACS). This interactive assistant has been built to diagnose the symptoms related to COVID-19 using the guidelines provided by the Centers for Disease Control and Prevention (CDC) and the World Health Organization (WHO). The empirical testing of the application has been performed with 22 human subjects, all volunteers, using the NASA Task Load Index (TLX), and subjects performance accuracy has been measured. The results indicate that the IVACS is beneficial to users. However, it still needs additional research and development to promote its widespread application.
△ Less
Submitted 6 September, 2020;
originally announced September 2020.
-
Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training
Authors:
Praveen Damacharla,
Parashar Dhakal,
Sebastian Stumbo,
Ahmad Y. Javaid,
Subhashini Ganapathy,
David A. Malek,
Douglas C. Hodge,
Vijay Devabhaktuni
Abstract:
As part of a perennial project, our team is actively engaged in develo** new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each trainee. Therefore, we introduced a voice-based SA…
▽ More
As part of a perennial project, our team is actively engaged in develo** new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each trainee. Therefore, we introduced a voice-based SA to augment the training process of medical first responders and enhance their performance in the field. The potential benefits of SAs include a reduction in training costs and enhanced monitoring mechanisms. Despite the increased usage of voice-based personal assistants (PAs) in day-to-day life, the associated effects are commonly neglected for a study of human factors. Therefore, this paper focuses on performance analysis of the developed voice-based SA in emergency care provider training for a selected emergency treatment scenario. The research discussed in this paper follows design science in develo** proposed technology; at length, we discussed architecture and development and presented working results of voice-based SA. The empirical testing was conducted on two groups as user studies using statistical analysis tools, one trained with conventional methods and the other with the help of SA. The statistical results demonstrated the amplification in training efficacy and performance of medical responders powered by SA. Furthermore, the paper also discusses the accuracy and time of task execution (t) and concludes with the guidelines for resolving the identified problems.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review
Authors:
Praveen Damacharla,
Ahmad Y. Javaid,
Jennie J. Gallimore,
Vijay K. Devabhaktuni
Abstract:
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performance, along with the verification and validation, o…
▽ More
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performance, along with the verification and validation, of a system. Currently, there is no agreed-upon set of benchmark metrics for develo** HMT systems. Therefore, identification and classification of common metrics are imperative to create a benchmark in the HMT field. The key focus of this review is to conduct a detailed survey aimed at identification of metrics employed in different segments of HMT and to determine the common metrics that can be used in the future to benchmark HMTs. We have organized this review as follows: identification of metrics used in HMTs until now, and classification based on functionality and measuring techniques. Additionally, we have also attempted to analyze all the identified metrics in detail while classifying them as theoretical, applied, real-time, non-real-time, measurable, and observable metrics. We conclude this review with a detailed analysis of the identified common metrics along with their usage to benchmark HMTs.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles
Authors:
Praveen Damacharla,
Dhwani Mehta,
Ahmad Y Javaid,
Vijay K. Devabhaktuni
Abstract:
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall performance and capabilities of the onboard system. Thi…
▽ More
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall performance and capabilities of the onboard system. This research study entails a qualitative analysis to gather insights on the applicability of the leading cloud service providers in AGV operations. These services include Google Cloud, Microsoft Azure, Amazon AWS, and IBM Cloud. The study begins with a brief review of AGV technical requirements that are necessary to determine the rationale for identifying the most suitable cloud service. The qualitative analysis studies and addresses the applicability of the cloud service over the proposed generalized AGV's architecture integration, performance, and manageability. Our findings conclude that a generalized AGV architecture can be supported by state-of-the-art cloud service, but there should be a clear line of separation between the primary and secondary computing needs. Moreover, our results show significant lags while using cloud services and preventing their use in real-time AGV operation.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Application Specific Drone Simulators: Recent Advances and Challenges
Authors:
Aakif Mairaj,
Asif I. Baba,
Ahmad Y. Javaid
Abstract:
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have…
▽ More
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have raised concerns in the recent past. Security and viability concerns in drone-based applications are growing at an alarming rate. Besides, UAV networks (UAVNets) are distinctive from other ad-hoc networks. Therefore, it is necessary to address these issues to ensure proper functioning of these UAVs while kee** their uniqueness in mind. Furthermore, adequate security and functionality require the consideration of many parameters that may include an accurate cognizance of the working mechanism of vehicles, geographical and weather conditions, and UAVNet communication. This is achievable by creating a simulator that includes these aspects. A performance evaluation through relevant drone simulator becomes indispensable procedure to test features, configurations, and designs to demonstrate superiority to comparative schemes and suitability. Thus, it becomes of paramount importance to establish the credibility of simulation results by investigating the merits and limitations of each simulator prior to selection. Based on this motivation, we present a comprehensive survey of current drone simulators. In addition, open research issues and research challenges are discussed and presented.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices
Authors:
Ashutosh Bandekar,
Ahmad Y. Javaid
Abstract:
Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the…
▽ More
Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the user and security experts. Users nowadays want to control all these "smart" wireless home devices through their smartphones using an internet connection. Attacks such as distributed attacks on these devices will render the whole system vulnerable as these attacks can record and extract confidential information as well as increase resource (energy) consumption of the entire network. In this paper, we propose a cyber-attack detection algorithm and present an impact analysis of easy-to-launch cyber-attacks on a low-power mote (Z1 Zolertia) as a model IoT device. We also present detailed results of power consumption analysis with and without attack along with when the mitigation algorithm for intrusion detection is implemented.
△ Less
Submitted 31 July, 2018;
originally announced July 2018.
-
Open Source Android Vulnerability Detection Tools: A Survey
Authors:
Keyur Kulkarni,
Ahmad Y Javaid
Abstract:
Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have become a popular source of information to the publi…
▽ More
Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have become a popular source of information to the public through several Apps provided by the DHS Citizen Application Directory. Such wide audience to this platform is also making it a huge target for cyber- attacks. While Android, the most popular open source mobile platform, has its base set of permissions to protect the device and resources, it does not provide a security framework to defend against any attack. This paper surveys threat, vulnerability and security analysis tools, which are open source in nature, for the Android platform and systemizes the knowledge of Android security mechanisms. Additionally, a comparison of three popular tools is presented.
△ Less
Submitted 31 July, 2018;
originally announced July 2018.
-
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)
Authors:
Quamar Niyaz,
Weiqing Sun,
Ahmad Y Javaid
Abstract:
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardwar…
▽ More
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardware. We implement our system as a network application on top of an SDN controller. We use deep learning for feature reduction of a large set of features derived from network traffic headers. We evaluate our system based on different performance metrics by applying it on traffic traces collected from different scenarios. We observe high accuracy with a low false-positive for attack detection in our proposed system.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions
Authors:
Yasir Ali,
Asma Javaid
Abstract:
This paper deals with two-sided matching market with two disjoint sets, i.e. the set of buyers and the set of sellers. Each seller can trade with at most with one buyer and vice versa. Money is transferred from sellers to buyers for an indivisible goods that buyers own. Valuation functions, for participants of both sides, are represented by strictly increasing functions with money considered as di…
▽ More
This paper deals with two-sided matching market with two disjoint sets, i.e. the set of buyers and the set of sellers. Each seller can trade with at most with one buyer and vice versa. Money is transferred from sellers to buyers for an indivisible goods that buyers own. Valuation functions, for participants of both sides, are represented by strictly increasing functions with money considered as discrete variable. An algorithm is devised to prove the existence of stability for this model.
△ Less
Submitted 4 April, 2017; v1 submitted 14 March, 2016;
originally announced March 2016.
-
Investigating Quality Routing Link Metrics in Wireless Multi-hop Networks
Authors:
N. Javaid,
A. BiBi,
A. Javaid,
Z. A. Khan,
K. Latif,
M. Ishfaq
Abstract:
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution…
▽ More
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution of this paper is enhancement in conventional OLSR to achieve high efficiency in terms of optimized routing load and routing latency. For this purpose, first we present a mathematical framework, and then to validate this frame work, we select three performance parameters to simulate default and enhanced versions of OLSR. Three chosen performance parameters are; throughput, Normalized Routing Load and End-to-End Delay. From simulation results, we conclude that adjusting the frequencies of topological information exchange results in high efficiency.
△ Less
Submitted 15 November, 2013;
originally announced November 2013.
-
Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks
Authors:
N. Javaid,
M. Yaqoob,
M. Y. Khan,
M. A. Khan,
A. Javaid,
Z. A. Khan
Abstract:
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely send…
▽ More
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely sending of data is essential. For data to reach health care center, there must be a proper way of sending data through reliable connection and with minimum delay. In this paper transmission delay of different paths, through which data is sent from sensor to health care center over heterogeneous multi-hop wireless channel is analyzed. Data of medical related diseases is sent through three different paths. In all three paths, data from sensors first reaches ZigBee, which is the common link in all three paths. Wireless Local Area Network (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunication System (UMTS) are connected with ZigBee. Each network (WLAN, WiMAX, UMTS) is setup according to environmental conditions, suitability of device and availability of structure for that device. Data from these networks is sent to IP-Cloud, which is further connected to health care center. Delay of data reaching each device is calculated and represented graphically. Main aim of this paper is to calculate delay of each link in each path over multi-hop wireless channel.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Analyzing Medium Access Techniques in Wireless Body Area Networks
Authors:
N. Javaid,
I. Israr,
M. A. Khan,
A. Javaid,
S. H. Bouk,
Z. A. Khan
Abstract:
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are…
▽ More
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are Throughput (T), Delay (D) and Offered Load (G). The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
On Sink Mobility Trajectory in Clustering Routing Protocols in WSNs
Authors:
N. Javaid,
Q. Ain,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clusterin…
▽ More
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clustering schemes, we compare five clustering routing protocols; Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient Sensor Network (TEEN), Distributed Energy Efficient Clustering (DEEC) and two variants of TEEN which are Clustering and Multi-Hop Protocol in Threshold Sensitive Energy Efficient Sensor Network (CAMPTEEN) and Hierarchical Threshold Sensitive Energy Efficient Sensor Network (H-TEEN). The contribution of this paper is to introduce sink mobility to increase the network life time of hierarchal routing protocols. Two scenarios are discussed to compare the performances of routing protocols; in first scenario static sink is implanted and in later one mobile sink is used. We perform analytical simulations in MATLAB by using different performance metrics such as, number of alive nodes, number of dead nodes and throughput.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs
Authors:
S. Ahmed,
N. Javaid,
S. H. Bouk,
A. Javaid,
M. A. Khan,
Z. A. Khan
Abstract:
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that alloca…
▽ More
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that allocates secure keys only for short distances. While not completely secure, it offers huge advantages over traditional methods by the use of entanglement swap** and quantum teleportation. Reversible logic gates like CNOT, Toffoli, Fredkin etc. are of basic importance in Quantum Computing. In our research, we adopted a EPR-pair allocation scheme in terms of these quantum gates to overcome the susceptibility caused by malicious nodes. As the qubits stored in a sensor node can be used only once and cannot be duplicated, hence risk of information leakage reduced even if the node are compromised.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs
Authors:
N. Javaid,
M. Waseem,
Z. A. Khan,
U. Qasim,
K. Latif,
A. Javaid
Abstract:
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effec…
▽ More
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effectively increases the efficiency of conventional clustering based protocols in terms of stability period and number of packets sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that LEACHACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better than LEACH, SEP, TEEN and DEEC respectively in terms of stability period and number of packets sent to BS. The stability period of the existing protocols prolongs by implementing ACH on them.
△ Less
Submitted 2 April, 2013;
originally announced April 2013.
-
Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
Z. A. Khan,
U. Qasim,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
U. Qasim,
Z. A. Khan,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analy…
▽ More
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of LP_models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of WMhNs, we conduct simulations using NS- 2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
Improving Network Efficiency by Removing Energy Holes in WSNs
Authors:
M. B. Rasheedl,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to…
▽ More
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to the base station. We proposedEnergy-efficient HOleRemoving Mechanism (E-HORM) technique to remove energy holes. In this technique, we use sleep and awake mechanism for sensor nodes to save energy. This approach finds the maximum distance node to calculate the maximum energy for data transmission. We considered it as a threshold energy Eth. Every node first checks its energy level for data transmission. If the energy level is less than Eth, it cannot transmit data. We also explain mathematically the energy consumption and average energy saving of sensor nodes in each round. Extensive simulations showed that when use this approach for WSNs significantly helps to extend the network lifetime and stability period.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks
Authors:
S. Faisal,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station whil…
▽ More
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station while some use clustering technique to send data to base station as in SEP. We implemented Z-SEP and compared it with traditional Low Energy adaptive clustering hierarchy (LEACH) and SEP. Simulation results showed that Z-SEP enhanced the stability period and throughput than existing protocols like LEACH and SEP.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
EAPESS: An Adaptive Transmission Scheme in Wireless Sensor Networks
Authors:
Z. Abbas,
N. Javaid,
A. Javaid,
Z. A. Khan,
M. A. Khan,
U. Qasim
Abstract:
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critica…
▽ More
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critical distance values are used against different coding gains for sake of energy saving. If distance lies below critical distance values then particular encoders are selected with respect to their particular coding gains. Coding gains are used for critical distances estimation of all encoders. This adaptive encoder and transmit power selection scheme with respect to their coding gain results in a significant energy saving in WSNs environment. Simulations provide better results of energy saving achieved by using this adaptive scheme.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Hybrid DEEC: Towards Efficient Energy Utilization in Wireless Sensor Networks
Authors:
M. Y. Khan,
N. Javaid,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy…
▽ More
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy utilization in WSNs. In H-DEEC,elected Cluster Heads (CHs) communicate the Base Station (BS) through beta elected nodes, by using multi-hop**. We logically divide the network into two parts, on the basis of the residual energy of nodes. The normal nodes with high initial and residual energy will behighlyprobable to be CHs than the nodes with lesser energy. To overcome the deficiencies of H-DEEC, we propose Multi-Edged Hybrid-DEEC (MH-DEEC). In MH-DEEC the criteria of chain construction is modified. Finally, the comparison in simulation results with other heterogeneous protocols show that, MH-DEEC and H-DEEC achieves longer stability time and network life time due to efficient energy utilization.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Maximizing the Lifetime of Multi-chain PEGASIS using Sink Mobility
Authors:
Mohsin Raza Jafri,
Nadeem Javaid,
Akmal Javaid,
Zahoor Ali Khan
Abstract:
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol…
▽ More
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol (MIEEPB); a multi-chain model having a sink mobility, to achieve proficient energy utilization of wireless sensors. As the motorized movement of mobile sink is steered by petrol or current, there is a need to confine this movement within boundaries and the trajectory of mobile sink should be fixed. In our technique, the mobile sink moves along its trajectory and stays for a sojourn time at sojourn location to guarantee complete data collection. We develop an algorithm for trajectory of mobile sink. We ultimately perform wide-ranging experiments to assess the performance of the proposed method. The results reveal that the proposed way out is nearly optimal and also better than IEEPB in terms of network lifetime.
△ Less
Submitted 18 March, 2013;
originally announced March 2013.
-
Modeling Enhancements in DSR, FSR, OLSR under Mobility and Scalability Constraints in VANETs
Authors:
N. Javaid,
A. Bibi,
S. H. Bouk,
A. Javaid,
I. Sasase
Abstract:
Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic Source Routing (DSR), Fish-eye State Routing (FSR) a…
▽ More
Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic Source Routing (DSR), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). Framework of these protocols with respect to their packet cost is also presented in this work. A novel contribution of this work is enhancement of chosen protocols to obtain efficient behavior. Extensive simulation work is done to prove and compare the efficiency in terms of high throughput of enhanced versions with default versions of protocols in NS-2. For this comparison, we choose three performance metrics; throughput, End-to-End Delay (E2ED) and Normalized Routing Load (NRL) in different mobilities and scalabilities. Finally, we deduce that enhanced DSR (DSR-mod) outperforms other protocols by achieving 16% more packet delivery for all scalabilities and 28% more throughput in selected mobilities than original version of DSR (DSR-orig).
△ Less
Submitted 29 July, 2012;
originally announced July 2012.
-
Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols
Authors:
Nadeem Javaid,
Ayesha Bibi,
Akmal Javaid,
Shahzad A. Malik
Abstract:
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor…
▽ More
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor estimation errors affect broadcast of route requests, how reduction of broadcast overhead achieves bandwidth, how to cope with the problem of mobility and density, etc, are attempted to respond. In all of the above mentioned situations, routing overhead and delay generated by the chosen protocols can exactly be calculated from our modeled equations. Finally, we analyze the performance of selected routing protocols using our proposed framework in NS-2 by considering different performance parameters; Route REQuest (RREQ) packet generation, End-to-End Delay (E2ED) and Normalized Routing Load (NRL) with respect to varying rates of mobility and density of nodes in the underlying wireless network.
△ Less
Submitted 9 September, 2011;
originally announced September 2011.
-
Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols
Authors:
Nadeem Javaid,
Ayesha Bibi,
Akmal Javaid,
Shahzad A. Malik
Abstract:
In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of…
▽ More
In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.
△ Less
Submitted 18 August, 2011;
originally announced August 2011.
-
Performance Study of ETX based Wireless Routing Metrics
Authors:
Nadeem Javaid,
Akmal Javaid,
Imran Ali Khan,
Karim Djouani
Abstract:
Being most popular and IETF standard metric, minimum hop count is appropriately used by Ad hoc Networks, as new paths must rapidly be found in the situations where quality paths could not be found in due time due to high node mobility. There always has been a tradeoff between throughput and energy consumption, but stationary topology of WMNs and high node density of WSN's benefit the algorithms to…
▽ More
Being most popular and IETF standard metric, minimum hop count is appropriately used by Ad hoc Networks, as new paths must rapidly be found in the situations where quality paths could not be found in due time due to high node mobility. There always has been a tradeoff between throughput and energy consumption, but stationary topology of WMNs and high node density of WSN's benefit the algorithms to consider quality-aware routing to choose the best routes. In this paper, we analytically review ongoing research on wireless routing metrics which are based on ETX (Expected Transmission Count) as it performs better than minimum hop count under link availability. Performances over ETX, target platforms and design requirements of these ETX based metrics are high-lighted. Consequences of the criteria being adopted (in addition to expected link layer transmissions & retransmissions) in the form of incremental: (1) performance overheads and computational complexity causing inefficient use of network resources and instability of the routing algorithm, (2) throughput gains achieved with better utilization of wireless medium resources have been elaborated.
△ Less
Submitted 21 December, 2010;
originally announced December 2010.