-
A Generalized Space-Efficient Algorithm for Quantum Bit String Comparators
Authors:
Khuram Shahzad,
Omar Usman Khan
Abstract:
Quantum Bit String Comparators (QBSC) operate on two sequences of n-qubits, enabling the determination of their relationships, such as equality, greater than, or less than. This is analogous to the way conditional statements are used in programming languages. Consequently, QBSCs play a crucial role in various algorithms that can be executed or adapted for quantum computers. The development of effi…
▽ More
Quantum Bit String Comparators (QBSC) operate on two sequences of n-qubits, enabling the determination of their relationships, such as equality, greater than, or less than. This is analogous to the way conditional statements are used in programming languages. Consequently, QBSCs play a crucial role in various algorithms that can be executed or adapted for quantum computers. The development of efficient and generalized comparators for any $n$-qubit length has long posed a challenge, as they have a high-cost footprint and lead to quantum delays. Comparators that are efficient are associated with inputs of fixed length. As a result, comparators without a generalized circuit cannot be employed at a higher level, though they are well-suited for problems with limited size requirements. In this paper, we introduce a generalized design for the comparison of two $n$-qubit logic states using just two ancillary bits. The design is examined on the basis of qubit requirements, ancillary bit usage, quantum cost, quantum delay, gate operations, and circuit complexity, and is tested comprehensively on various input lengths. The work allows for sufficient flexibility in the design of quantum algorithms, which can accelerate quantum algorithm development.
△ Less
Submitted 14 November, 2023; v1 submitted 11 November, 2023;
originally announced November 2023.
-
Hate Speech Detection in Roman Urdu
Authors:
Moin Khan,
Khurram Shahzad,
Kamran Malik
Abstract:
Hate speech is a specific type of controversial content that is widely legislated as a crime that must be identified and blocked. However, due to the sheer volume and velocity of the Twitter data stream, hate speech detection cannot be performed manually. To address this issue, several studies have been conducted for hate speech detection in European languages, whereas little attention has been pa…
▽ More
Hate speech is a specific type of controversial content that is widely legislated as a crime that must be identified and blocked. However, due to the sheer volume and velocity of the Twitter data stream, hate speech detection cannot be performed manually. To address this issue, several studies have been conducted for hate speech detection in European languages, whereas little attention has been paid to low-resource South Asian languages, making the social media vulnerable for millions of users. In particular, to the best of our knowledge, no study has been conducted for hate speech detection in Roman Urdu text, which is widely used in the sub-continent. In this study, we have scrapped more than 90,000 tweets and manually parsed them to identify 5,000 Roman Urdu tweets. Subsequently, we have employed an iterative approach to develop guidelines and used them for generating the Hate Speech Roman Urdu 2020 corpus. The tweets in the this corpus are classified at three levels: Neutral-Hostile, Simple-Complex, and Offensive-Hate speech. As another contribution, we have used five supervised learning techniques, including a deep learning technique, to evaluate and compare their effectiveness for hate speech detection. The results show that Logistic Regression outperformed all other techniques, including deep learning techniques for the two levels of classification, by achieved an F1 score of 0.906 for distinguishing between Neutral-Hostile tweets, and 0.756 for distinguishing between Offensive-Hate speech tweets.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
Covert Wireless Communications under Quasi-Static Fading with Channel Uncertainty
Authors:
Khurram Shahzad,
Xiangyun Zhou
Abstract:
Covert communications enable a transmitter to send information reliably in the presence of an adversary, who looks to detect whether the transmission took place or not. We consider covert communications over quasi-static block fading channels, where users suffer from channel uncertainty. We investigate the adversary Willie's optimal detection performance in two extreme cases, i.e., the case of per…
▽ More
Covert communications enable a transmitter to send information reliably in the presence of an adversary, who looks to detect whether the transmission took place or not. We consider covert communications over quasi-static block fading channels, where users suffer from channel uncertainty. We investigate the adversary Willie's optimal detection performance in two extreme cases, i.e., the case of perfect channel state information (CSI) and the case of channel distribution information (CDI) only. It is shown that in the large detection error regime, Willie's detection performances of these two cases are essentially indistinguishable, which implies that the quality of CSI does not help Willie in improving his detection performance. This result enables us to study the covert transmission design without the need to factor in the exact amount of channel uncertainty at Willie. We then obtain the optimal and suboptimal closed-form solution to the covert transmission design. Our result reveals fundamental difference in the design between the case of quasi-static fading channel and the previously studied case of non-fading AWGN channel.
△ Less
Submitted 27 September, 2020;
originally announced September 2020.
-
Covert Wireless Communication in Presence of a Multi-Antenna Adversary and Delay Constraints
Authors:
Khurram Shahzad,
Xiangyun Zhou,
Shihao Yan
Abstract:
Covert communication hides the transmission of a message from a watchful adversary while ensuring reliable information decoding at the receiver, providing enhanced security in wireless communications. In this letter, covert communication in the presence of a multi-antenna adversary and under delay constraints is considered. Under the assumption of quasi-static wireless fading channels, we analyze…
▽ More
Covert communication hides the transmission of a message from a watchful adversary while ensuring reliable information decoding at the receiver, providing enhanced security in wireless communications. In this letter, covert communication in the presence of a multi-antenna adversary and under delay constraints is considered. Under the assumption of quasi-static wireless fading channels, we analyze the effect of increasing the number of antennas employed at the adversary on the achievable throughput of covert communication. It is shown that in contrast to a single-antenna adversary, a slight increase in the number of adversary's antennas drastically reduces the covert throughput, even for relaxed covertness requirements.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs
Authors:
M. K. Shahzad,
Lewis Nkenyereye,
S. M. Riazul Islam
Abstract:
Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and…
▽ More
Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and verification nodes are also fixed. In this paper, we cater these limitations in our proposed scheme. Simulation experiments results show that proposed schemes outperforms existing en-route filtering schemes in networks lifetime. We employed a Fuzzy Logic System to select forwarding nodes from candidate nodes based on current network conditions. Proposed scheme gains in network lifetime, and energy-efficiency while having comparable false report filtering efficiency.
△ Less
Submitted 20 December, 2018;
originally announced December 2018.
-
Achieving Covert Wireless Communications Using a Full-Duplex Receiver
Authors:
Khurram Shahzad,
Xiangyun Zhou,
Shihao Yan,
**song Hu,
Feng Shu,
Jun Li
Abstract:
Covert communications hide the transmission of a message from a watchful adversary while ensuring a certain decoding performance at the receiver. In this work, a wireless communication system under fading channels is considered where covertness is achieved by using a full-duplex (FD) receiver. More precisely, the receiver of covert information generates artificial noise with a varying power causin…
▽ More
Covert communications hide the transmission of a message from a watchful adversary while ensuring a certain decoding performance at the receiver. In this work, a wireless communication system under fading channels is considered where covertness is achieved by using a full-duplex (FD) receiver. More precisely, the receiver of covert information generates artificial noise with a varying power causing uncertainty at the adversary, Willie, regarding the statistics of the received signals. Given that Willie's optimal detector is a threshold test on the received power, we derive a closed-form expression for the optimal detection performance of Willie averaged over the fading channel realizations. Furthermore, we provide guidelines for the optimal choice of artificial noise power range, and the optimal transmission probability of covert information to maximize the detection errors at Willie. Our analysis shows that the transmission of artificial noise, although causes self-interference, provides the opportunity of achieving covertness but its transmit power levels need to be managed carefully. We also demonstrate that the prior transmission probability of 0.5 is not always the best choice for achieving the maximum possible covertness, when the covert transmission probability and artificial noise power can be jointly optimized.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Covert Communications with A Full-Duplex Receiver over Wireless Fading Channels
Authors:
**song Hu,
Khurram Shahzad,
Shihao Yan,
Xiangyun Zhou,
Feng Shu,
Jun Li
Abstract:
In this work, we propose a covert communication scheme where the transmitter attempts to hide its transmission to a full-duplex receiver, from a warden that is to detect this covert transmission using a radiometer. Specifically, we first derive the detection error rate at the warden, based on which the optimal detection threshold for its radiometer is analytically determined and its expected detec…
▽ More
In this work, we propose a covert communication scheme where the transmitter attempts to hide its transmission to a full-duplex receiver, from a warden that is to detect this covert transmission using a radiometer. Specifically, we first derive the detection error rate at the warden, based on which the optimal detection threshold for its radiometer is analytically determined and its expected detection error rate over wireless fading channels is achieved in a closed-form expression. Our analysis indicates that the artificial noise deliberately produced by the receiver with a random transmit power, although causes self-interference, offers the capability of achieving a positive effective covert rate for any transmit power (can be infinity) subject to any given covertness requirement on the expected detection error rate. This work is the first study on the use of the full-duplex receiver with controlled artificial noise for achieving covert communications and invites further investigation in this regard.
△ Less
Submitted 9 November, 2017;
originally announced November 2017.
-
Survey on Essential and Accidental Real-Time Issues in Software Engineering
Authors:
Furrakh Shahzad,
Maruf Pasha,
Urooj Pasha,
Bushra Majeed,
Khurram Shahzad
Abstract:
Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast…
▽ More
Software product lines have recently been presented as one of the best promising improvements for the efficient software development. Different research works contribute supportive parameters and negotiations regarding the problems of producing a perfect software scheme. Traditional approaches or recycling software are not effective to solve the problems concerning software competence. Since fast developments with software engineering in the past few years, studies show that some approaches are getting extensive attention in both industries and universities. This method is categorized as the software product line improvement; that supports reusing of software in big organizations. Different industries are adopting product lines to enhance efficiency and reduce operational expenses by way of emerging product developments. This research paper is formed to offer in-depth study regarding the software engineering issues such as complexity, conformity, changeability, invisibility, time constraints, budget constraints, and security. We have conducted various research surveys by visiting different professional software development organizations and took feedback from the professional software engineers to analyze the real-time problems that they are facing during the development process of software systems. Survey results proved that complexity is a most occurring issue that most software developers face while develo** software applications. Moreover, invisibility is the problem that rarely happens according to the survey.
△ Less
Submitted 10 March, 2017;
originally announced March 2017.
-
Covert Communication in Fading Channels under Channel Uncertainty
Authors:
Khurram Shahzad,
Xiangyun Zhou,
Shihao Yan
Abstract:
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public communication link while the warden tries to detect this covert communication by using a radiometer. We derive the exact expression for the radiometers opt…
▽ More
A covert communication system under block fading channels is considered where users experience uncertainty about their channel knowledge. The transmitter seeks to hide the covert communication to a private user by exploiting a legitimate public communication link while the warden tries to detect this covert communication by using a radiometer. We derive the exact expression for the radiometers optimal threshold which determines the performance limit of the wardens detector. Furthermore for given transmission outage constraints the achievable rates for legitimate and covert users are analyzed while maintaining a specific level of covertness. Our numerical results illustrate how the achievable performance is affected by the channel uncertainty and required level of covertness.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.
-
Optimal Scheduling for Energy Harvesting Transmitters with Hybrid Energy Storage
Authors:
Omur Ozel,
Khurram Shahzad,
Sennur Ulukus
Abstract:
We consider data transmission with an energy harvesting transmitter which has a hybrid energy storage unit composed of a perfectly efficient super-capacitor (SC) and an inefficient battery. The SC has finite space for energy storage while the battery has unlimited space. The transmitter can choose to store the harvested energy in the SC or in the battery. The energy is drained from the SC and the…
▽ More
We consider data transmission with an energy harvesting transmitter which has a hybrid energy storage unit composed of a perfectly efficient super-capacitor (SC) and an inefficient battery. The SC has finite space for energy storage while the battery has unlimited space. The transmitter can choose to store the harvested energy in the SC or in the battery. The energy is drained from the SC and the battery simultaneously. In this setting, we consider the offline throughput maximization problem by a deadline over a point-to-point channel. In contrast to previous works, the hybrid energy storage model with finite and unlimited storage capacities imposes a generalized set of constraints on the transmission policy. As such, we show that the solution generalizes that for a single battery and is obtained by applying directional water-filling algorithm multiple times.
△ Less
Submitted 23 May, 2013;
originally announced May 2013.