Skip to main content

Showing 1–30 of 30 results for author: Javaid, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.15283  [pdf, other

    cs.HC

    Integrated Control of Robotic Arm through EMG and Speech: Decision-Driven Multimodal Data Fusion

    Authors: Tauheed Khan Mohd, Ahmad Y Javaid

    Abstract: Interactions with electronic devices are changing in our daily lives. The day-to-day development brings curiosity to recent technology and challenges its use. The gadgets are becoming cumbersome, and their usage frustrates a segment of society. In specific scenarios, the user cannot use the modalities because of the challenges that bring in, e.g., the usage of touch screen devices by elderly peopl… ▽ More

    Submitted 11 March, 2024; originally announced April 2024.

  2. arXiv:2202.07732  [pdf, other

    cs.HC

    Multi-Modal Data Fusion in Enhancing Human-Machine Interaction for Robotic Applications: A Survey

    Authors: Tauheed Khan Mohd, Nicole Nguyen, Ahmad Y Javaid

    Abstract: Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier human-machine interaction. On the other hand, develop… ▽ More

    Submitted 26 December, 2022; v1 submitted 15 February, 2022; originally announced February 2022.

    Comments: Planning to add more changes

  3. Multi-modal data fusion of Voice and EMG data for Robotic Control

    Authors: Tauheed Khan Mohd, Jackson Carvalho, Ahmad Y Javaid

    Abstract: Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures Electromyography data (EMG) using myoelectric sig… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  4. arXiv:2101.06915  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    TLU-Net: A Deep Learning Approach for Automatic Steel Surface Defect Detection

    Authors: Praveen Damacharla, Achuth Rao M. V., Jordan Ringenberg, Ahmad Y Javaid

    Abstract: Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automatic steel defect detection methods could be useful i… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Journal ref: International Conference on Applied Artificial Intelligence (ICAPAI 2021), Halden, Norway, May 19-21, 2021

  5. IVACS: Intelligent Voice Assistant for Coronavirus Disease (COVID-19) Self-Assessment

    Authors: Parashar Dhakal, Praveen Damacharla, Ahmad Y. Javaid, Hari K. Vege, Vijay K. Devabhaktuni

    Abstract: At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organizations have already pioneered mobile and web-bas… ▽ More

    Submitted 6 September, 2020; originally announced September 2020.

    Report number: 9308013

    Journal ref: 1st International Conference on Artificial Intelligence & Modern Assistive Technology (ICAIMAT), Riyadh Saudi Arabia, November, 24-26, 2020

  6. arXiv:2008.05064  [pdf

    cs.CY cs.AI cs.HC eess.SY

    Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training

    Authors: Praveen Damacharla, Parashar Dhakal, Sebastian Stumbo, Ahmad Y. Javaid, Subhashini Ganapathy, David A. Malek, Douglas C. Hodge, Vijay Devabhaktuni

    Abstract: As part of a perennial project, our team is actively engaged in develo** new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each trainee. Therefore, we introduced a voice-based SA… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    ACM Class: H.1.2; I.2.1; I.2.7

    Journal ref: Int J Artif Intell Educ, 29, 122-143, 2018

  7. arXiv:2008.04855  [pdf

    cs.CY cs.HC cs.LG cs.RO eess.SY

    Common Metrics to Benchmark Human-Machine Teams (HMT): A Review

    Authors: Praveen Damacharla, Ahmad Y. Javaid, Jennie J. Gallimore, Vijay K. Devabhaktuni

    Abstract: A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performance, along with the verification and validation, o… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: in IEEE Access, vol. 6, pp. 38637-38655, 2018

  8. Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles

    Authors: Praveen Damacharla, Dhwani Mehta, Ahmad Y Javaid, Vijay K. Devabhaktuni

    Abstract: Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall performance and capabilities of the onboard system. Thi… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Journal ref: 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 2018, pp. 1-5

  9. Application Specific Drone Simulators: Recent Advances and Challenges

    Authors: Aakif Mairaj, Asif I. Baba, Ahmad Y. Javaid

    Abstract: Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

  10. arXiv:1807.11850  [pdf

    cs.CR

    Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices

    Authors: Ashutosh Bandekar, Ahmad Y. Javaid

    Abstract: Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the… ▽ More

    Submitted 31 July, 2018; originally announced July 2018.

  11. arXiv:1807.11840  [pdf

    cs.CR

    Open Source Android Vulnerability Detection Tools: A Survey

    Authors: Keyur Kulkarni, Ahmad Y Javaid

    Abstract: Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have become a popular source of information to the publi… ▽ More

    Submitted 31 July, 2018; originally announced July 2018.

  12. A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)

    Authors: Quamar Niyaz, Weiqing Sun, Ahmad Y Javaid

    Abstract: Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardwar… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

  13. Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions

    Authors: Yasir Ali, Asma Javaid

    Abstract: This paper deals with two-sided matching market with two disjoint sets, i.e. the set of buyers and the set of sellers. Each seller can trade with at most with one buyer and vice versa. Money is transferred from sellers to buyers for an indivisible goods that buyers own. Valuation functions, for participants of both sides, are represented by strictly increasing functions with money considered as di… ▽ More

    Submitted 4 April, 2017; v1 submitted 14 March, 2016; originally announced March 2016.

    Comments: 10 pages, no figures

    Journal ref: Discrete Mathematics & Theoretical Computer Science, Vol. 19 no. 1, Discrete Algorithms (April 12, 2017) dmtcs:1415

  14. arXiv:1311.3746  [pdf, ps, other

    cs.NI

    Investigating Quality Routing Link Metrics in Wireless Multi-hop Networks

    Authors: N. Javaid, A. BiBi, A. Javaid, Z. A. Khan, K. Latif, M. Ishfaq

    Abstract: In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution… ▽ More

    Submitted 15 November, 2013; originally announced November 2013.

    Comments: Journal of Annales of Telecommunications, 2013. arXiv admin note: substantial text overlap with arXiv:1108.3706

  15. arXiv:1304.1059  [pdf, ps, other

    cs.NI

    Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks

    Authors: N. Javaid, M. Yaqoob, M. Y. Khan, M. A. Khan, A. Javaid, Z. A. Khan

    Abstract: With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely send… ▽ More

    Submitted 3 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1208.2409

    Journal ref: Research Journal of Applied Sciences, Engineering and Technology, 2013

  16. arXiv:1304.1047  [pdf, ps, other

    cs.NI

    Analyzing Medium Access Techniques in Wireless Body Area Networks

    Authors: N. Javaid, I. Israr, M. A. Khan, A. Javaid, S. H. Bouk, Z. A. Khan

    Abstract: This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are… ▽ More

    Submitted 3 April, 2013; originally announced April 2013.

    Comments: Research Journal of Applied Sciences, Engineering and Technology, 2013. arXiv admin note: substantial text overlap with arXiv:1208.2406

  17. arXiv:1304.0984  [pdf

    cs.NI

    On Sink Mobility Trajectory in Clustering Routing Protocols in WSNs

    Authors: N. Javaid, Q. Ain, M. A. Khan, A. Javaid, Z. A. Khan, U. Qasim

    Abstract: Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clusterin… ▽ More

    Submitted 3 April, 2013; originally announced April 2013.

    Journal ref: Journal of Basic and Applied Scientific Research (JBASR), 2013

  18. arXiv:1304.0980  [pdf

    cs.CR cs.NI quant-ph

    Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs

    Authors: S. Ahmed, N. Javaid, S. H. Bouk, A. Javaid, M. A. Khan, Z. A. Khan

    Abstract: As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that alloca… ▽ More

    Submitted 3 April, 2013; originally announced April 2013.

    Comments: Journal of Basic and Applied Scientific Research (JBASR), 2013

  19. ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs

    Authors: N. Javaid, M. Waseem, Z. A. Khan, U. Qasim, K. Latif, A. Javaid

    Abstract: This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effec… ▽ More

    Submitted 2 April, 2013; originally announced April 2013.

    Comments: 2nd IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabia

  20. Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks

    Authors: N. Javaid, Z. A. Khan, U. Qasim, M. A. Khan, K. Latif, A. Javaid

    Abstract: Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa… ▽ More

    Submitted 31 March, 2013; originally announced April 2013.

    Journal ref: 2nd IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabia

  21. On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks

    Authors: N. Javaid, U. Qasim, Z. A. Khan, M. A. Khan, K. Latif, A. Javaid

    Abstract: In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analy… ▽ More

    Submitted 31 March, 2013; originally announced April 2013.

    Journal ref: 2nd IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabia

  22. arXiv:1303.5365  [pdf

    cs.NI

    Improving Network Efficiency by Removing Energy Holes in WSNs

    Authors: M. B. Rasheedl, N. Javaid, A. Javaid, M. A. Khan, S. H. Bouk, Z. A. Khan

    Abstract: Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to… ▽ More

    Submitted 24 March, 2013; v1 submitted 21 March, 2013; originally announced March 2013.

    Journal ref: Journal of Basic and Applied Scientific Research (JBASR), 2013

  23. arXiv:1303.5364  [pdf

    cs.NI

    Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

    Authors: S. Faisal, N. Javaid, A. Javaid, M. A. Khan, S. H. Bouk, Z. A. Khan

    Abstract: Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station whil… ▽ More

    Submitted 24 March, 2013; v1 submitted 21 March, 2013; originally announced March 2013.

    Journal ref: Journal of Basic and Applied Scientific Research (JBASR), 2013

  24. arXiv:1303.4693  [pdf

    cs.NI

    EAPESS: An Adaptive Transmission Scheme in Wireless Sensor Networks

    Authors: Z. Abbas, N. Javaid, A. Javaid, Z. A. Khan, M. A. Khan, U. Qasim

    Abstract: Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critica… ▽ More

    Submitted 19 March, 2013; originally announced March 2013.

    Comments: World Applied Sciences Journal (WASJ), 2013

  25. arXiv:1303.4679  [pdf

    cs.NI

    Hybrid DEEC: Towards Efficient Energy Utilization in Wireless Sensor Networks

    Authors: M. Y. Khan, N. Javaid, M. A. Khan, A. Javaid, Z. A. Khan, U. Qasim

    Abstract: The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy… ▽ More

    Submitted 19 March, 2013; originally announced March 2013.

    Comments: World Applied Sciences Journal (WASJ), 2013

  26. arXiv:1303.4347  [pdf

    cs.NI

    Maximizing the Lifetime of Multi-chain PEGASIS using Sink Mobility

    Authors: Mohsin Raza Jafri, Nadeem Javaid, Akmal Javaid, Zahoor Ali Khan

    Abstract: In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol… ▽ More

    Submitted 18 March, 2013; originally announced March 2013.

    Journal ref: World Applied Sciences Journal 21 (9): 1283-1289, 2013

  27. Modeling Enhancements in DSR, FSR, OLSR under Mobility and Scalability Constraints in VANETs

    Authors: N. Javaid, A. Bibi, S. H. Bouk, A. Javaid, I. Sasase

    Abstract: Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic Source Routing (DSR), Fish-eye State Routing (FSR) a… ▽ More

    Submitted 29 July, 2012; originally announced July 2012.

    Journal ref: 3rd International Workshop on Towards Samart Communications and Networks Technologies (SaCoNet2012) in conjunction with 48th IEEE International Conference on Communications (ICC2012), Ottawa, Canada, 2012

  28. Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols

    Authors: Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Shahzad A. Malik

    Abstract: In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor… ▽ More

    Submitted 9 September, 2011; originally announced September 2011.

    Journal ref: 54th IEEE Globecom2011 (SaCoNAS Workshop)

  29. arXiv:1108.3703  [pdf, ps, other

    cs.NI

    Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols

    Authors: Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Shahzad A. Malik

    Abstract: In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of… ▽ More

    Submitted 18 August, 2011; originally announced August 2011.

    Journal ref: 17th Asia-Pacific Conference on Communications (APCC2011)

  30. Performance Study of ETX based Wireless Routing Metrics

    Authors: Nadeem Javaid, Akmal Javaid, Imran Ali Khan, Karim Djouani

    Abstract: Being most popular and IETF standard metric, minimum hop count is appropriately used by Ad hoc Networks, as new paths must rapidly be found in the situations where quality paths could not be found in due time due to high node mobility. There always has been a tradeoff between throughput and energy consumption, but stationary topology of WMNs and high node density of WSN's benefit the algorithms to… ▽ More

    Submitted 21 December, 2010; originally announced December 2010.

    Comments: The 2nd IEEE International Conference on Computer, Control and Communication, 2009 (IEEE-IC4 2009)