-
Best Memory Architecture Exploration under Parameters Variations accelerated with Machine Learning
Authors:
Antonios Tragoudaras,
Charalampos Antoniadis,
Yehia Massoud
Abstract:
The design of effective memory architecture is of utmost importance in modern computing systems. However, the design of memory subsystems is even more difficult today because process variation and modern design techniques like dynamic voltage scaling make performance metrics for memory assessment be treated as random variables instead of scalars at design time. Most of the previous works have stud…
▽ More
The design of effective memory architecture is of utmost importance in modern computing systems. However, the design of memory subsystems is even more difficult today because process variation and modern design techniques like dynamic voltage scaling make performance metrics for memory assessment be treated as random variables instead of scalars at design time. Most of the previous works have studied the design of memory design from the yield analysis perspective leaving the question of the best memory organization on average open. Because examining all possible combinations of design parameter values of a memory chip would require prohibitively much time, in this work, we propose Best Arm Identification (BAI) algorithms to accelerate the exploration for the best memory architecture on average under parameter variations. Our experimental results demonstrate that we can arrive at the best memory organization 99% of the time in x5 faster than an exhaustive search of all possible conditions.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
A Hybrid Artificial Neural Network for Task Offloading in Mobile Edge Computing
Authors:
Raby Hamadi,
Abdullah Khanfor,
Hakim Ghazzai,
Yehia Massoud
Abstract:
Edge Computing (EC) is about remodeling the way data is handled, processed, and delivered within a vast heterogeneous network. One of the fundamental concepts of EC is to push the data processing near the edge by exploiting front-end devices with powerful computation capabilities. Thus, limiting the use of centralized architecture, such as cloud computing, to only when it is necessary. This paper…
▽ More
Edge Computing (EC) is about remodeling the way data is handled, processed, and delivered within a vast heterogeneous network. One of the fundamental concepts of EC is to push the data processing near the edge by exploiting front-end devices with powerful computation capabilities. Thus, limiting the use of centralized architecture, such as cloud computing, to only when it is necessary. This paper proposes a novel edge computer offloading technique that assigns computational tasks generated by devices to potential edge computers with enough computational resources. The proposed approach clusters the edge computers based on their hardware specifications. Afterwards, the tasks generated by devices will be fed to a hybrid Artificial Neural Network (ANN) model that predicts, based on these tasks, the profiles, i.e., features, of the edge computers with enough computational resources to execute them. The predicted edge computers are then assigned to the cluster they belong to so that each task is assigned to a cluster of edge computers. Finally, we choose for each task the edge computer that is expected to provide the fastest response time. The experiment results show that our proposed approach outperforms other state-of-the-art machine learning approaches using real-world IoT dataset.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Service Discovery in Social Internet of Things using Graph Neural Networks
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Yehia Massoud
Abstract:
Internet-of-Things (IoT) networks intelligently connect thousands of physical entities to provide various services for the community. It is witnessing an exponential expansion, which is complicating the process of discovering IoT devices existing in the network and requesting corresponding services from them. As the highly dynamic nature of the IoT environment hinders the use of traditional soluti…
▽ More
Internet-of-Things (IoT) networks intelligently connect thousands of physical entities to provide various services for the community. It is witnessing an exponential expansion, which is complicating the process of discovering IoT devices existing in the network and requesting corresponding services from them. As the highly dynamic nature of the IoT environment hinders the use of traditional solutions of service discovery, we aim, in this paper, to address this issue by proposing a scalable resource allocation neural model adequate for heterogeneous large-scale IoT networks. We devise a Graph Neural Network (GNN) approach that utilizes the social relationships formed between the devices in the IoT network to reduce the search space of any entity lookup and acquire a service from another device in the network. This proposed resource allocation approach surpasses standardization issues and embeds the structure and characteristics of the social IoT graph, by the means of GNNs, for eventual clustering analysis process. Simulation results applied on a real-world dataset illustrate the performance of this solution and its significant efficiency to operate on large-scale IoT networks.
△ Less
Submitted 18 June, 2022; v1 submitted 25 May, 2022;
originally announced May 2022.
-
A Machine Learning Smartphone-based Sensing for Driver Behavior Classification
Authors:
Sarra Ben Brahim,
Hakim Ghazzai,
Hichem Besbes,
Yehia Massoud
Abstract:
Driver behavior profiling is one of the main issues in the insurance industries and fleet management, thus being able to classify the driver behavior with low-cost mobile applications remains in the spotlight of autonomous driving. However, using mobile sensors may face the challenge of security, privacy, and trust issues. To overcome those challenges, we propose to collect data sensors using Carl…
▽ More
Driver behavior profiling is one of the main issues in the insurance industries and fleet management, thus being able to classify the driver behavior with low-cost mobile applications remains in the spotlight of autonomous driving. However, using mobile sensors may face the challenge of security, privacy, and trust issues. To overcome those challenges, we propose to collect data sensors using Carla Simulator available in smartphones (Accelerometer, Gyroscope, GPS) in order to classify the driver behavior using speed, acceleration, direction, the 3-axis rotation angles (Yaw, Pitch, Roll) taking into account the speed limit of the current road and weather conditions to better identify the risky behavior. Secondly, after fusing inter-axial data from multiple sensors into a single file, we explore different machine learning algorithms for time series classification to evaluate which algorithm results in the highest performance.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Topic Modeling and Progression of American Digital News Media During the Onset of the COVID-19 Pandemic
Authors:
Xiangpeng Wan,
Michael C. Lucic,
Hakim Ghazzai,
Yehia Massoud
Abstract:
Currently, the world is in the midst of a severe global pandemic, which has affected all aspects of people's lives. As a result, there is a deluge of COVID-related digital media articles published in the United States, due to the disparate effects of the pandemic. This large volume of information is difficult to consume by the audience in a reasonable amount of time. In this paper, we develop a Na…
▽ More
Currently, the world is in the midst of a severe global pandemic, which has affected all aspects of people's lives. As a result, there is a deluge of COVID-related digital media articles published in the United States, due to the disparate effects of the pandemic. This large volume of information is difficult to consume by the audience in a reasonable amount of time. In this paper, we develop a Natural Language Processing (NLP) pipeline that is capable of automatically distilling various digital articles into manageable pieces of information, while also modelling the progression topics discussed over time in order to aid readers in rapidly gaining holistic perspectives on pressing issues (i.e., the COVID-19 pandemic) from a diverse array of sources. We achieve these goals by first collecting a large corpus of COVID-related articles during the onset of the pandemic. After, we apply unsupervised and semi-supervised learning procedures to summarize articles, then cluster them based on their similarities using the community detection methods. Next, we identify the topic of each cluster of articles using the BART algorithm. Finally, we provide a detailed digital media analysis based on the NLP-pipeline outputs and show how the conversation surrounding COVID-19 evolved over time.
△ Less
Submitted 25 May, 2021;
originally announced June 2021.
-
Low Complexity Recruitment for Collaborative Mobile Crowdsourcing Using Graph Neural Networks
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Turki Alelyani,
Yehia Massoud
Abstract:
Collaborative Mobile crowdsourcing (CMCS) allows entities, e.g., local authorities or individuals, to hire a team of workers from the crowd of connected people, to execute complex tasks. In this paper, we investigate two different CMCS recruitment strategies allowing task requesters to form teams of socially connected and skilled workers: i) a platform-based strategy where the platform exploits it…
▽ More
Collaborative Mobile crowdsourcing (CMCS) allows entities, e.g., local authorities or individuals, to hire a team of workers from the crowd of connected people, to execute complex tasks. In this paper, we investigate two different CMCS recruitment strategies allowing task requesters to form teams of socially connected and skilled workers: i) a platform-based strategy where the platform exploits its own knowledge about the workers to form a team and ii) a leader-based strategy where the platform designates a group leader that recruits its own suitable team given its own knowledge about its Social Network (SN) neighbors. We first formulate the recruitment as an Integer Linear Program (ILP) that optimally forms teams according to four fuzzy-logic-based criteria: level of expertise, social relationship strength, recruitment cost, and recruiter's confidence level. To cope with NP-hardness, we design a novel low-complexity CMCS recruitment approach relying on Graph Neural Networks (GNNs), specifically graph embedding and clustering techniques, to shrink the workers' search space and afterwards, exploiting a meta-heuristic genetic algorithm to select appropriate workers. Simulation results applied on a real-world dataset illustrate the performance of both proposed CMCS recruitment approaches. It is shown that our proposed low-complexity GNN-based recruitment algorithm achieves close performances to those of the baseline ILP with significant computational time saving and ability to operate on large-scale mobile crowdsourcing platforms. It is also shown that compared to the leader-based strategy, the platform-based strategy recruits a more skilled team but with lower SN relationships and higher cost.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Towards Collaborative Mobile Crowdsourcing
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Turki Alelyani,
Yehia Massoud
Abstract:
Mobile Crowdsourcing (MC) is an effective way of engaging large groups of smart devices to perform tasks remotely while exploiting their built-in features. It has drawn great attention in the areas of smart cities and urban computing communities to provide decentralized, fast, and flexible ubiquitous technological services. The vast majority of previous studies focused on non-cooperative MC scheme…
▽ More
Mobile Crowdsourcing (MC) is an effective way of engaging large groups of smart devices to perform tasks remotely while exploiting their built-in features. It has drawn great attention in the areas of smart cities and urban computing communities to provide decentralized, fast, and flexible ubiquitous technological services. The vast majority of previous studies focused on non-cooperative MC schemes in Internet of Things (IoT) systems. Advanced collaboration strategies are expected to leverage the capability of MC services and enable the execution of more complicated crowdsourcing tasks. In this context, Collaborative Mobile Crowdsourcing (CMC) enables task requesters to hire groups of IoT devices' users that must communicate with each other and coordinate their operational activities in order to accomplish complex tasks. In this paper, we present and discuss the novel CMC paradigm in IoT. Then, we provide a detailed taxonomy to classify the different components forming CMC systems. Afterwards, we investigate the challenges in designing CMC tasks and discuss different team formation strategies involving the crowdsourcing platform and selected team leaders. We also analyze and compare the performances of certain proposed CMC recruitment algorithms. Finally, we shed the light on open research directions to leverage CMC service design.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.
-
A Social IoT-driven Pedestrian Routing Approach during Epidemic Time
Authors:
Abdullah Khanfor,
Hamdi Friji,
Hakim Ghazzai,
Yehia Massoud
Abstract:
The unprecedented worldwide spread of coronavirus disease has significantly sped up the development of technology-based solutions to prevent, combat, monitor, or predict pandemics and/or its evolution. The omnipresence of smart Internet-of-things (IoT) devices can play a predominant role in designing advanced techniques hel** in minimizing the risk of contamination. In this paper, we propose a p…
▽ More
The unprecedented worldwide spread of coronavirus disease has significantly sped up the development of technology-based solutions to prevent, combat, monitor, or predict pandemics and/or its evolution. The omnipresence of smart Internet-of-things (IoT) devices can play a predominant role in designing advanced techniques hel** in minimizing the risk of contamination. In this paper, we propose a practical framework that uses the Social IoT (SIoT) concept to improve pedestrians safely navigate through a real-wold map of a smart city. The objective is to mitigate the risks of exposure to the virus in high-dense areas where social distancing might not be well-practiced. The proposed routing approach recommends pedestrians' route in a real-time manner while considering other devices' mobility. First, the IoT devices are clustered into communities according to two SIoT relations that consider the devices' locations and the friendship levels among their owners. Accordingly, the city map roads are assigned weights representing their safety levels. Afterward, a navigation algorithm, namely the Dijkstra algorithm, is applied to recommend the safest route to follow. Simulation results applied on a real-world IoT data set have shown the ability of the proposed approach in achieving trade-offs between both safest and shortest paths according to the pedestrian preference.
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
An Improved Dilated Convolutional Network for Herd Counting in Crowded Scenes
Authors:
Soufien Hamrouni,
Hakim Ghazzai,
Hamid Menouar,
Yahya Massoud
Abstract:
Crowd management technologies that leverage computer vision are widespread in contemporary times. There exists many security-related applications of these methods, including, but not limited to: following the flow of an array of people and monitoring large gatherings. In this paper, we propose an accurate monitoring system composed of two concatenated convolutional deep learning architectures. The…
▽ More
Crowd management technologies that leverage computer vision are widespread in contemporary times. There exists many security-related applications of these methods, including, but not limited to: following the flow of an array of people and monitoring large gatherings. In this paper, we propose an accurate monitoring system composed of two concatenated convolutional deep learning architectures. The first part called Front-end, is responsible for converting bi-dimensional signals and delivering high-level features. The second part, called the Back-end, is a dilated Convolutional Neural Network (CNN) used to replace pooling layers. It is responsible for enlarging the receptive field of the whole network and converting the descriptors provided by the first network to a saliency map that will be utilized to estimate the number of people in highly congested images. We also propose to utilize a genetic algorithm in order to find an optimized dilation rate configuration in the back-end. The proposed model is shown to converge 30\% faster than state-of-the-art approaches. It is also shown that it achieves 20\% lower Mean Absolute Error (MAE) when applied to the Shanghai data~set.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
A Generative Graph Method to Solve the Travelling Salesman Problem
Authors:
Amal Nammouchi,
Hakim Ghazzai,
Yehia Massoud
Abstract:
The Travelling Salesman Problem (TSP) is a challenging graph task in combinatorial optimization that requires reasoning about both local node neighborhoods and global graph structure. In this paper, we propose to use the novel Graph Learning Network (GLN), a generative approach, to approximately solve the TSP. GLN model learns directly the pattern of TSP instances as training dataset, encodes the…
▽ More
The Travelling Salesman Problem (TSP) is a challenging graph task in combinatorial optimization that requires reasoning about both local node neighborhoods and global graph structure. In this paper, we propose to use the novel Graph Learning Network (GLN), a generative approach, to approximately solve the TSP. GLN model learns directly the pattern of TSP instances as training dataset, encodes the graph properties, and merge the different node embeddings to output node-to-node an optimal tour directly or via graph search technique that validates the final tour. The preliminary results of the proposed novel approach proves its applicability to this challenging problem providing a low optimally gap with significant computation saving compared to the optimal solution.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Computational Resource Allocation for Edge Computing in Social Internet-of-Things
Authors:
Abdullah Khanfor,
Raby Hamadi,
Hakim Ghazzai,
Ye Yang,
Mohammad R. Haider,
Yehia Massoud
Abstract:
The heterogeneity of the Internet-of-things (IoT) network can be exploited as a dynamic computational resource environment for many devices lacking computational capabilities. A smart mechanism for allocating edge and mobile computers to match the need of devices requesting external computational resources is developed. In this paper, we employ the concept of Social IoT and machine learning to dow…
▽ More
The heterogeneity of the Internet-of-things (IoT) network can be exploited as a dynamic computational resource environment for many devices lacking computational capabilities. A smart mechanism for allocating edge and mobile computers to match the need of devices requesting external computational resources is developed. In this paper, we employ the concept of Social IoT and machine learning to downgrade the complexity of allocating appropriate edge computers. We propose a framework that detects different communities of devices in SIoT enclosing trustworthy peers having strong social relations. Afterwards, we train a machine learning algorithm, considering multiple computational and non-computational features of the requester as well as the edge computers, to predict the total time needed to process the required task by the potential candidates belonging to the same community of the requester. By applying it to a real-world data set, we observe that the proposed framework provides encouraging results for mobile computer allocation.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Graph Neural Networks-based Clustering for Social Internet of Things
Authors:
Abdullah Khanfor,
Amal Nammouchi,
Hakim Ghazzai,
Ye Yang,
Mohammad R. Haider,
Yehia Massoud
Abstract:
In this paper, we propose a machine learning process for clustering large-scale social Internet-of-things (SIoT) devices into several groups of related devices sharing strong relations. To this end, we generate undirected weighted graphs based on the historical dataset of IoT devices and their social relations. Using the adjacency matrices of these graphs and the IoT devices' features, we embed th…
▽ More
In this paper, we propose a machine learning process for clustering large-scale social Internet-of-things (SIoT) devices into several groups of related devices sharing strong relations. To this end, we generate undirected weighted graphs based on the historical dataset of IoT devices and their social relations. Using the adjacency matrices of these graphs and the IoT devices' features, we embed the graphs' nodes using a Graph Neural Network (GNN) to obtain numerical vector representations of the IoT devices. The vector representation does not only reflect the characteristics of the device but also its relations with its peers. The obtained node embeddings are then fed to a conventional unsupervised learning algorithm to determine the clusters accordingly. We showcase the obtained IoT groups using two well-known clustering algorithms, specifically the K-means and the density-based algorithm for discovering clusters (DBSCAN). Finally, we compare the performances of the proposed GNN-based clustering approach in terms of coverage and modularity to those of the deterministic Louvain community detection algorithm applied solely on the graphs created from the different relations. It is shown that the framework achieves promising preliminary results in clustering large-scale IoT systems.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Scalable and Secure Architecture for Distributed IoT Systems
Authors:
Najmeddine Dhieb,
Hakim Ghazzai,
Hichem Besbes,
Yehia Massoud
Abstract:
Internet-of-things (IoT) is perpetually revolutionizing our daily life and rapidly transforming physical objects into an ubiquitous connected ecosystem. Due to their massive deployment and moderate security levels, those devices face a lot of security, management, and control challenges. Their classical centralized architecture is still cloaking vulnerabilities and anomalies that can be exploited…
▽ More
Internet-of-things (IoT) is perpetually revolutionizing our daily life and rapidly transforming physical objects into an ubiquitous connected ecosystem. Due to their massive deployment and moderate security levels, those devices face a lot of security, management, and control challenges. Their classical centralized architecture is still cloaking vulnerabilities and anomalies that can be exploited by hackers for spying, eavesdrop**, and taking control of the network. In this paper, we propose to improve the IoT architecture with additional security features using Artificial Intelligence (AI) and blockchain technology. We propose a novel architecture based on permissioned blockchain technology in order to build a scalable and decentralized end-to-end secure IoT system. Furthermore, we enhance the IoT system security with an AI-component at the gateway level to detect and classify suspected activities, malware, and cyber-attacks using machine learning techniques. Simulations and practical implementation show that the proposed architecture delivers high performance against cyber-attacks.
△ Less
Submitted 20 April, 2020;
originally announced May 2020.
-
A Stochastic Team Formation Approach for Collaborative Mobile Crowdsourcing
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Turki Alelyani,
Yehia Massoud
Abstract:
Mobile Crowdsourcing (MCS) is the generalized act of outsourcing sensing tasks, traditionally performed by employees or contractors, to a large group of smart-phone users by means of an open call. With the increasing complexity of the crowdsourcing applications, requesters find it essential to harness the power of collaboration among the workers by forming teams of skilled workers satisfying their…
▽ More
Mobile Crowdsourcing (MCS) is the generalized act of outsourcing sensing tasks, traditionally performed by employees or contractors, to a large group of smart-phone users by means of an open call. With the increasing complexity of the crowdsourcing applications, requesters find it essential to harness the power of collaboration among the workers by forming teams of skilled workers satisfying their complex tasks' requirements. This type of MCS is called Collaborative MCS (CMCS). Previous CMCS approaches have mainly focused only on the aspect of team skills maximization. Other team formation studies on social networks (SNs) have only focused on social relationship maximization. In this paper, we present a hybrid approach where requesters are able to hire a team that, not only has the required expertise, but also is socially connected and can accomplish tasks collaboratively. Because team formation in CMCS is proven to be NP-hard, we develop a stochastic algorithm that exploit workers knowledge about their SN neighbors and asks a designated leader to recruit a suitable team. The proposed algorithm is inspired from the optimal stop** strategies and uses the odds-algorithm to compute its output. Experimental results show that, compared to the benchmark exponential optimal solution, the proposed approach reduces computation time and produces reasonable performance results.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Leveraging Personal Navigation Assistant Systems Using Automated Social Media Traffic Reporting
Authors:
Xiangpeng Wan,
Hakim Ghazzai,
Yehia Massoud
Abstract:
Modern urbanization is demanding smarter technologies to improve a variety of applications in intelligent transportation systems to relieve the increasing amount of vehicular traffic congestion and incidents. Existing incident detection techniques are limited to the use of sensors in the transportation network and hang on human-inputs. Despite of its data abundance, social media is not well-exploi…
▽ More
Modern urbanization is demanding smarter technologies to improve a variety of applications in intelligent transportation systems to relieve the increasing amount of vehicular traffic congestion and incidents. Existing incident detection techniques are limited to the use of sensors in the transportation network and hang on human-inputs. Despite of its data abundance, social media is not well-exploited in such context. In this paper, we develop an automated traffic alert system based on Natural Language Processing (NLP) that filters this flood of information and extract important traffic-related bullets. To this end, we employ the fine-tuning Bidirectional Encoder Representations from Transformers (BERT) language embedding model to filter the related traffic information from social media. Then, we apply a question-answering model to extract necessary information characterizing the report event such as its exact location, occurrence time, and nature of the events. We demonstrate the adopted NLP approaches outperform other existing approach and, after effectively training them, we focus on real-world situation and show how the developed approach can, in real-time, extract traffic-related information and automatically convert them into alerts for navigation assistance applications such as navigation apps.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
A Photo-Based Mobile Crowdsourcing Framework for Event Reporting
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Mounir Frikha,
Yehia Massoud
Abstract:
Mobile Crowdsourcing (MCS) photo-based is an arising field of interest and a trending topic in the domain of ubiquitous computing. It has recently drawn substantial attention of the smart cities and urban computing communities. In fact, the built-in cameras of mobile devices are becoming the most common way for visual logging techniques in our daily lives. MCS photo-based frameworks collect photos…
▽ More
Mobile Crowdsourcing (MCS) photo-based is an arising field of interest and a trending topic in the domain of ubiquitous computing. It has recently drawn substantial attention of the smart cities and urban computing communities. In fact, the built-in cameras of mobile devices are becoming the most common way for visual logging techniques in our daily lives. MCS photo-based frameworks collect photos in a distributed way in which a large number of contributors upload photos whenever and wherever it is suitable. This inevitably leads to evolving picture streams which possibly contain misleading and redundant information that affects the task result. In order to overcome these issues, we develop, in this paper, a solution for selecting highly relevant data from an evolving picture stream and ensuring correct submission. The proposed photo-based MCS framework for event reporting incorporates (i) a deep learning model to eliminate false submissions and ensure photos credibility and (ii) an A-Tree shape data structure model for clustering streaming pictures to reduce information redundancy and provide maximum event coverage. Simulation results indicate that the implemented framework can effectively reduce false submissions and select a subset with high utility coverage with low redundancy ratio from the streaming data.
△ Less
Submitted 3 May, 2020; v1 submitted 27 April, 2020;
originally announced April 2020.
-
Optimal Team Recruitment Strategies for Collaborative Mobile Crowdsourcing Systems
Authors:
Aymen Hamrouni,
Hakim Ghazzai,
Turki Alelyani,
Yehia Massoud
Abstract:
The wide spread of mobile devices has enabled a new paradigm of innovation called Mobile Crowdsourcing (MCS) where the concept is to allow entities, e.g., individuals or local authorities, to hire workers to help from the crowd of connected people, to execute a task or service. Some complex tasks require the collaboration of multiple workers to ensure its successful completion. In this context, th…
▽ More
The wide spread of mobile devices has enabled a new paradigm of innovation called Mobile Crowdsourcing (MCS) where the concept is to allow entities, e.g., individuals or local authorities, to hire workers to help from the crowd of connected people, to execute a task or service. Some complex tasks require the collaboration of multiple workers to ensure its successful completion. In this context, the task requester needs to hire a group of socially connected and collaborative workers that, at the same time, have sufficient skills to accomplish the task. In this paper, we develop two recruitment strategies for collaborative MCS frameworks in which, virtual teams are formed according to four different criteria: level of expertise, social relationship strength, recruitment cost, and recruiter's confidence level. The first proposed strategy is a platform-based approach which exploits the platform knowledge to form the team. The second one is a leader-based approach that uses team members' knowledge about their social network (SN) neighbors to designate a group leader that recruits its suitable team. Both approaches are modeled as integer linear programs resulting in optimal team formation. Experimental results show a performance trade-off between the two virtual team grou** strategies when varying the members SN edge degree. Compared to the leader-based strategy, the platform-based strategy recruits a more skilled team but with lower SN relationships and higher cost.
△ Less
Submitted 27 April, 2020; v1 submitted 23 April, 2020;
originally announced April 2020.
-
Word Embedding-based Text Processing for Comprehensive Summarization and Distinct Information Extraction
Authors:
Xiangpeng Wan,
Hakim Ghazzai,
Yehia Massoud
Abstract:
In this paper, we propose two automated text processing frameworks specifically designed to analyze online reviews. The objective of the first framework is to summarize the reviews dataset by extracting essential sentence. This is performed by converting sentences into numerical vectors and clustering them using a community detection algorithm based on their similarity levels. Afterwards, a correl…
▽ More
In this paper, we propose two automated text processing frameworks specifically designed to analyze online reviews. The objective of the first framework is to summarize the reviews dataset by extracting essential sentence. This is performed by converting sentences into numerical vectors and clustering them using a community detection algorithm based on their similarity levels. Afterwards, a correlation score is measured for each sentence to determine its importance level in each cluster and assign it as a tag for that community. The second framework is based on a question-answering neural network model trained to extract answers to multiple different questions. The collected answers are effectively clustered to find multiple distinct answers to a single question that might be asked by a customer. The proposed frameworks are shown to be more comprehensive than existing reviews processing solutions.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
A Trustworthy Recruitment Process for Spatial Mobile Crowdsourcing in Large-scale Social IoT
Authors:
Abdullah Khanfor,
Aymen Hamrouni,
Hakim Ghazzai,
Ye Yang,
Yehia Massoud
Abstract:
Spatial Mobile Crowdsourcing (SMCS) can be leveraged by exploiting the capabilities of the Social Internet-of-Things (SIoT) to execute spatial tasks. Typically, in SMCS, a task requester aims to recruit a subset of IoT devices and commission them to travel to the task location. However, because of the exponential increase of IoT networks and their diversified devices (e.g., multiple brands, differ…
▽ More
Spatial Mobile Crowdsourcing (SMCS) can be leveraged by exploiting the capabilities of the Social Internet-of-Things (SIoT) to execute spatial tasks. Typically, in SMCS, a task requester aims to recruit a subset of IoT devices and commission them to travel to the task location. However, because of the exponential increase of IoT networks and their diversified devices (e.g., multiple brands, different communication channels, etc.), recruiting the appropriate devices/workers is becoming a challenging task. To this end, in this paper, we develop a recruitment process for SMCS platforms using automated SIoT service discovery to select trustworthy workers satisfying the requester requirements. The method we purpose includes mainly two stages: 1) a worker filtering stage, aiming at reducing the workers' search space to a subset of potential trustworthy candidates using the Louvain community detection algorithm (CD) applied to SIoT relation graphs. Next, 2) a selection process stage that uses an Integer Linear Program (ILP) to determine the final set of selected devices/workers. The ILP maximizes a worker efficiency metric incorporating the skills/specs level, recruitment cost, and trustworthiness level of the recruited IoT devices. Selected experiments analyze the performance of the proposed CD-ILP algorithm using a real-world dataset and show its superiority in providing an effective recruitment strategy compared to an existing stochastic algorithm.
△ Less
Submitted 18 April, 2020;
originally announced April 2020.
-
Automated Service Discovery for Social Internet-of-Things Systems
Authors:
Abdullah Khanfor,
Hakim Ghazzai,
Ye Yang,
Mohammad Rafiqul Haider,
Yehia Massoud
Abstract:
In this paper, we propose to design an automated service discovery process to allow mobile crowdsourcing task requesters select a small set of devices out of a large-scale Internet-of-things (IoT) network to execute their tasks. To this end, we proceed by dividing the large-scale IoT network into several virtual communities whose members share strong social IoT relations. Two community detection a…
▽ More
In this paper, we propose to design an automated service discovery process to allow mobile crowdsourcing task requesters select a small set of devices out of a large-scale Internet-of-things (IoT) network to execute their tasks. To this end, we proceed by dividing the large-scale IoT network into several virtual communities whose members share strong social IoT relations. Two community detection algorithms, namely Louvain and order statistics local method (OSLOM) algorithms, are investigated and applied to a real-world IoT dataset to form non-overlap** and overlap** IoT devices groups. Afterwards, a natural language process (NLP)-based approach is executed to handle crowdsourcing textual requests and accordingly find the list of IoT devices capable of effectively accomplishing the tasks. This is performed by matching the NLP outputs, e.g., type of application, location, required trustworthiness level, with the different detected communities. The proposed approach effectively helps in automating and reducing the service discovery procedure and recruitment process for mobile crowdsourcing applications.
△ Less
Submitted 21 March, 2020;
originally announced March 2020.
-
Autonomous UAV Navigation: A DDPG-based Deep Reinforcement Learning Approach
Authors:
Omar Bouhamed,
Hakim Ghazzai,
Hichem Besbes,
Yehia Massoud
Abstract:
In this paper, we propose an autonomous UAV path planning framework using deep reinforcement learning approach. The objective is to employ a self-trained UAV as a flying mobile unit to reach spatially distributed moving or static targets in a given three dimensional urban area. In this approach, a Deep Deterministic Policy Gradient (DDPG) with continuous action space is designed to train the UAV t…
▽ More
In this paper, we propose an autonomous UAV path planning framework using deep reinforcement learning approach. The objective is to employ a self-trained UAV as a flying mobile unit to reach spatially distributed moving or static targets in a given three dimensional urban area. In this approach, a Deep Deterministic Policy Gradient (DDPG) with continuous action space is designed to train the UAV to navigate through or over the obstacles to reach its assigned target. A customized reward function is developed to minimize the distance separating the UAV and its destination while penalizing collisions. Numerical simulations investigate the behavior of the UAV in learning the environment and autonomously determining trajectories for different selected scenarios.
△ Less
Submitted 21 March, 2020;
originally announced March 2020.
-
A Performance Metric for Discrete-Time Chaos-Based Truly Random Number Generators
Authors:
Ahmad Beirami,
Hamid Nejati,
Yehia Massoud
Abstract:
In this paper, we develop an information entropy based metric that represents the statistical quality of the generated binary sequence in Truly Random Number Generators (TRNG). The metric can be used for the design and optimization of the TRNG circuits as well as the development of efficient post-processing units for recovering the degraded statistical characteristics of the signal due to process…
▽ More
In this paper, we develop an information entropy based metric that represents the statistical quality of the generated binary sequence in Truly Random Number Generators (TRNG). The metric can be used for the design and optimization of the TRNG circuits as well as the development of efficient post-processing units for recovering the degraded statistical characteristics of the signal due to process variations.
△ Less
Submitted 10 January, 2012;
originally announced January 2012.