-
Deep Learning Innovations for Underwater Waste Detection: An In-Depth Analysis
Authors:
Jaskaran Singh Walia,
Pavithra L K
Abstract:
Addressing the issue of submerged underwater trash is crucial for safeguarding aquatic ecosystems and preserving marine life. While identifying debris present on the surface of water bodies is straightforward, assessing the underwater submerged waste is a challenge due to the image distortions caused by factors such as light refraction, absorption, suspended particles, color shifts, and occlusion.…
▽ More
Addressing the issue of submerged underwater trash is crucial for safeguarding aquatic ecosystems and preserving marine life. While identifying debris present on the surface of water bodies is straightforward, assessing the underwater submerged waste is a challenge due to the image distortions caused by factors such as light refraction, absorption, suspended particles, color shifts, and occlusion. This paper conducts a comprehensive review of state-of-the-art architectures and on the existing datasets to establish a baseline for submerged waste and trash detection. The primary goal remains to establish the benchmark of the object localization techniques to be leveraged by advanced underwater sensors and autonomous underwater vehicles. The ultimate objective is to explore the underwater environment, to identify, and remove underwater debris. The absence of benchmarks (dataset or algorithm) in many researches emphasizes the need for a more robust algorithmic solution. Through this research, we aim to give performance comparative analysis of various underwater trash detection algorithms.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Using Gray Literature to Influence Software Engineering Curricula
Authors:
James D Kiper,
Simon Sultana,
Brent Auernheimer,
Gursimran Singh Walia
Abstract:
Software engineering (SE) evolves rapidly, with changing technology and industry expectations. The curriculum review bodies (e.g., ACM and IEEE-CS working groups) respond well but can have refresh cycles measured in years. For Computer Science and SE educators to be agile, predictive, and adapt to changing technology trends, judicious use of gray literature (GL) can be helpful. Other fields have f…
▽ More
Software engineering (SE) evolves rapidly, with changing technology and industry expectations. The curriculum review bodies (e.g., ACM and IEEE-CS working groups) respond well but can have refresh cycles measured in years. For Computer Science and SE educators to be agile, predictive, and adapt to changing technology trends, judicious use of gray literature (GL) can be helpful. Other fields have found GL useful in bridging academic research and industry needs. GL can be extended to SE to aid faculty preparing students for industry.
We address two questions: first, given the velocity of technical change, do current curricular guidelines accurately reflect industry practice and need for our graduates? Second, how can we track current and emerging trends to capture relevant competencies? We argue a study of the scholarly literature will have a limited impact on our understanding of current and emerging trends and curriculum designers would do well to utilize GL. We close with recommendations for SE educators.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Optimized Custom Dataset for Efficient Detection of Underwater Trash
Authors:
Jaskaran Singh Walia,
Karthik Seemakurthy
Abstract:
Accurately quantifying and removing submerged underwater waste plays a crucial role in safeguarding marine life and preserving the environment. While detecting floating and surface debris is relatively straightforward, quantifying submerged waste presents significant challenges due to factors like light refraction, absorption, suspended particles, and color distortion. This paper addresses these c…
▽ More
Accurately quantifying and removing submerged underwater waste plays a crucial role in safeguarding marine life and preserving the environment. While detecting floating and surface debris is relatively straightforward, quantifying submerged waste presents significant challenges due to factors like light refraction, absorption, suspended particles, and color distortion. This paper addresses these challenges by proposing the development of a custom dataset and an efficient detection approach for submerged marine debris. The dataset encompasses diverse underwater environments and incorporates annotations for precise labeling of debris instances. Ultimately, the primary objective of this custom dataset is to enhance the diversity of litter instances and improve their detection accuracy in deep submerged environments by leveraging state-of-the-art deep learning architectures.
△ Less
Submitted 27 September, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Safe and Secure Smart Home using Cisco Packet Tracer
Authors:
Shivansh Walia,
Tejas Iyer,
Shubham Tripathi,
Akshith Vanaparthy
Abstract:
This project presents an implementation and designing of safe, secure and smart home with enhanced levels of security features which uses IoT-based technology. We got our motivation for this project after learning about movement of west towards smart homes and designs. This galvanized us to engage in this work as we wanted for homeowners to have a greater control over their in-house environment wh…
▽ More
This project presents an implementation and designing of safe, secure and smart home with enhanced levels of security features which uses IoT-based technology. We got our motivation for this project after learning about movement of west towards smart homes and designs. This galvanized us to engage in this work as we wanted for homeowners to have a greater control over their in-house environment while also promising more safety and security features for the denizen. This contrivance of smart-home archetype has been intended to assimilate many kinds of sensors, boards along with advanced IoT devices and programming languages all of which in conjunction validate control and monitoring prowess over discrete electronic items present in home.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Spiking Neural Networks for Detecting Satellite-Based Internet-of-Things Signals
Authors:
Kosta Dakic,
Bassel Al Homssi,
Sumeet Walia,
Akram Al-Hourani
Abstract:
With the rapid growth of IoT networks, ubiquitous coverage is becoming increasingly necessary. Low Earth Orbit (LEO) satellite constellations for IoT have been proposed to provide coverage to regions where terrestrial systems cannot. However, LEO constellations for uplink communications are severely limited by the high density of user devices, which causes a high level of co-channel interference.…
▽ More
With the rapid growth of IoT networks, ubiquitous coverage is becoming increasingly necessary. Low Earth Orbit (LEO) satellite constellations for IoT have been proposed to provide coverage to regions where terrestrial systems cannot. However, LEO constellations for uplink communications are severely limited by the high density of user devices, which causes a high level of co-channel interference. This research presents a novel framework that utilizes spiking neural networks (SNNs) to detect IoT signals in the presence of uplink interference. The key advantage of SNNs is the extremely low power consumption relative to traditional deep learning (DL) networks. The performance of the spiking-based neural network detectors is compared against state-of-the-art DL networks and the conventional matched filter detector. Results indicate that both DL and SNN-based receivers surpass the matched filter detector in interference-heavy scenarios, owing to their capacity to effectively distinguish target signals amidst co-channel interference. Moreover, our work highlights the ultra-low power consumption of SNNs compared to other DL methods for signal detection. The strong detection performance and low power consumption of SNNs make them particularly suitable for onboard signal detection in IoT LEO satellites, especially in high interference conditions.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
ECG Classification System for Arrhythmia Detection Using Convolutional Neural Networks
Authors:
Aryan Odugoudar,
Jaskaran Singh Walia
Abstract:
Arrhythmia is just one of the many cardiovascular illnesses that have been extensively studied throughout the years. Using multi-lead ECG data, this research describes a deep learning (DL) pipeline technique based on convolutional neural network (CNN) algorithms to detect cardiovascular lar arrhythmia in patients. The suggested model architecture has hidden layers with a residual block in addition…
▽ More
Arrhythmia is just one of the many cardiovascular illnesses that have been extensively studied throughout the years. Using multi-lead ECG data, this research describes a deep learning (DL) pipeline technique based on convolutional neural network (CNN) algorithms to detect cardiovascular lar arrhythmia in patients. The suggested model architecture has hidden layers with a residual block in addition to the input and output layers. In this study, the classification of the ECG signals into five main groups, namely: Left Bundle Branch Block (LBBB), Right Bundle Branch Block (RBBB), Atrial Premature Contraction (APC), Premature Ventricular Contraction (PVC), and Normal Beat (N), are performed. Using the MIT-BIH arrhythmia dataset, we assessed the suggested technique. The findings show that our suggested strategy classified 15,000 cases with a high accuracy of 98.2%
△ Less
Submitted 12 June, 2024; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Vulnerability analysis of captcha using Deep learning
Authors:
Jaskaran Singh Walia,
Aryan Odugoudar
Abstract:
Several websites improve their security and avoid dangerous Internet attacks by implementing CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart), a type of verification to identify whether the end-user is human or a robot. The most prevalent type of CAPTCHA is text-based, designed to be easily recognized by humans while being unsolvable towards machines or robots.…
▽ More
Several websites improve their security and avoid dangerous Internet attacks by implementing CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart), a type of verification to identify whether the end-user is human or a robot. The most prevalent type of CAPTCHA is text-based, designed to be easily recognized by humans while being unsolvable towards machines or robots. However, as deep learning technology progresses, development of convolutional neural network (CNN) models that predict text-based CAPTCHAs becomes easier. The purpose of this research is to investigate the flaws and vulnerabilities in the CAPTCHA generating systems in order to design more resilient CAPTCHAs. To achieve this, we created CapNet, a Convolutional Neural Network. The proposed platform can evaluate both numerical and alphanumerical CAPTCHAs
△ Less
Submitted 20 March, 2024; v1 submitted 18 February, 2023;
originally announced February 2023.
-
Fixed-Posit: A Floating-Point Representation for Error-Resilient Applications
Authors:
Varun Gohil,
Sumit Walia,
Joycee Mekie,
Manu Awasthi
Abstract:
Today, almost all computer systems use IEEE-754 floating point to represent real numbers. Recently, posit was proposed as an alternative to IEEE-754 floating point as it has better accuracy and a larger dynamic range. The configurable nature of posit, with varying number of regime and exponent bits, has acted as a deterrent to its adoption. To overcome this shortcoming, we propose fixed-posit repr…
▽ More
Today, almost all computer systems use IEEE-754 floating point to represent real numbers. Recently, posit was proposed as an alternative to IEEE-754 floating point as it has better accuracy and a larger dynamic range. The configurable nature of posit, with varying number of regime and exponent bits, has acted as a deterrent to its adoption. To overcome this shortcoming, we propose fixed-posit representation where the number of regime and exponent bits are fixed, and present the design of a fixed-posit multiplier. We evaluate the fixed-posit multiplier on error-resilient applications of AxBench and OpenBLAS benchmarks as well as neural networks. The proposed fixed-posit multiplier has 47%, 38.5%, 22% savings for power, area and delay respectively when compared to posit multipliers and up to 70%, 66%, 26% savings in power, area and delay respectively when compared to 32-bit IEEE-754 multiplier. These savings are accompanied with minimal output quality loss (1.2% average relative error) across OpenBLAS and AxBench workloads. Further, for neural networks like ResNet-18 on ImageNet we observe a negligible accuracy loss (0.12%) on using the fixed-posit multiplier.
△ Less
Submitted 10 April, 2021;
originally announced April 2021.
-
Network Slicing Management Technique for Local 5G Micro-Operator Deployments
Authors:
Idris Badmus,
Marja Matinmikko-Blue,
Jaspreet Singh Walia
Abstract:
Local 5G networks are expected to emerge to serve different vertical sectors specific requirements. These networks can be deployed by traditional mobile network operators or entrant local operators. With a large number of verticals with different service requirements, while considering the network deployment cost in a single local area, it will not be economically feasible to deploy separate netwo…
▽ More
Local 5G networks are expected to emerge to serve different vertical sectors specific requirements. These networks can be deployed by traditional mobile network operators or entrant local operators. With a large number of verticals with different service requirements, while considering the network deployment cost in a single local area, it will not be economically feasible to deploy separate networks for each vertical. Thus, locally deployed 5G networks (aka micro operator networks) that can serve multiple verticals with multiple tenants in a location have gained increasing attention. Network slicing will enable a 5G micro-operator network to efficiently serve the multiple verticals and their tenants with different network requirements. This paper addresses how network slicing management functions can be used to implement, orchestrate and manage network slicing in different deployments of a local 5G micro-operator including the serving of closed, open and mixed customer groups. The paper proposes a descriptive technique by which different network slicing management functionalities defined by 3GPP can be used in coordination to create, orchestrate and manage network slicing for different deployment scenarios of a micro-operator. This is based on the network slice instance configuration type that can exist for each scenario. A network slice formation sequence is developed for the closed micro operator network to illustrate the tasks of the management functions. The results indicate that network slicing management plays a key role in designing local 5G networks that can serve different customer groups in the verticals.
△ Less
Submitted 9 July, 2019; v1 submitted 26 June, 2019;
originally announced June 2019.
-
Network Slice Instantiation for 5G Micro-Operator Deployment Scenario
Authors:
Idris Badmus,
Marja Matinmikko-Blue,
Jaspreet Singh Walia,
Tarik Taleb
Abstract:
The concept of network slicing is considered as a key part in the development of 5G. Network slicing is the means to logically isolate network capabilities in order to make each slice responsible for specific network requirement. In the same light, the micro-operator concept has emerged for local deployment of 5G for vertical specific service delivery. Even though microoperator networks are expect…
▽ More
The concept of network slicing is considered as a key part in the development of 5G. Network slicing is the means to logically isolate network capabilities in order to make each slice responsible for specific network requirement. In the same light, the micro-operator concept has emerged for local deployment of 5G for vertical specific service delivery. Even though microoperator networks are expected to be deployed using 5G, most research on network slicing has been directed towards the description on the traditional (MNO) networks with little emphasis on slicing in local 5G networks deployed by different stakeholders. In order to achieve slicing in a micro-operator network, it is of vital importance to understand the different deployment scenarios that can exist and how slicing can be realized for each of these deployments. In this paper, the microoperator networks described include closed, open and mixed network, and for each of these network, different deployment scenarios are established. The paper further proposes approaches for the configuration of Network Slice Instances (NSIs) using the Network Slice Subnet Instances (NSSIs) and other Network Functions (NFs) in a micro-operator network while considering the different deployments. The results highlight the possible deployment scenarios that can be established in a micro-operator network and how network slicing can be efficiently realized for the various local deployments.
△ Less
Submitted 30 May, 2019; v1 submitted 6 May, 2019;
originally announced May 2019.
-
Unified Graph based Multi-Cue Feature Fusion for Robust Visual Tracking
Authors:
Kapil Sharma,
Himanshu Ahuja,
Ashish Kumar,
Nipun Bansal,
Gurjit Singh Walia
Abstract:
Visual Tracking is a complex problem due to unconstrained appearance variations and dynamic environment. Extraction of complementary information from the object environment via multiple features and adaption to the target's appearance variations are the key problems of this work. To this end, we propose a robust object tracking framework based on Unified Graph Fusion (UGF) of multi-cue to adapt to…
▽ More
Visual Tracking is a complex problem due to unconstrained appearance variations and dynamic environment. Extraction of complementary information from the object environment via multiple features and adaption to the target's appearance variations are the key problems of this work. To this end, we propose a robust object tracking framework based on Unified Graph Fusion (UGF) of multi-cue to adapt to the object's appearance. The proposed cross-diffusion of sparse and dense features not only suppresses the individual feature deficiencies but also extracts the complementary information from multi-cue. This iterative process builds robust unified features which are invariant to object deformations, fast motion, and occlusion. Robustness of the unified feature also enables the random forest classifier to precisely distinguish the foreground from the background, adding resilience to background clutter. In addition, we present a novel kernel-based adaptation strategy using outlier detection and a transductive reliability metric.
△ Less
Submitted 23 May, 2019; v1 submitted 16 December, 2018;
originally announced December 2018.
-
Micro-Operator driven Local 5G Network Architecture for Industrial Internet
Authors:
Yushan Siriwardhana,
Pawani Porambage,
Madhusanka Liyanage,
Jaspreet Singh Walia,
Marja Matinmikko-Blue,
Mika Ylianttila
Abstract:
In addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complemen…
▽ More
In addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complement mobile network operators' (MNOs) offerings. In this paper, we propose a descriptive architecture for emerging 5G uOs which provides user specific and location specific services in a spatially confined environment. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports industry 4.0 standards. Moreover, in order to realize the conceptual design, we provide simulation results for the latency measurements of the proposed uO architecture with respect to an augmented reality use case in industrial internet. Thereby we discuss the benefits of having uO driven local 5G networks for specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
△ Less
Submitted 10 November, 2018;
originally announced November 2018.
-
Robust Object Tracking with Crow Search Optimized Multi-cue Particle Filter
Authors:
Kapil Sharma,
Gurjit Singh Walia,
Ashish Kumar,
Astitwa Saxena,
Kuldeep Singh
Abstract:
Particle Filter(PF) is used extensively for estimation of target Non-linear and Non-gaussian state. However, its performance suffers due to inherent problem of sample degeneracy and impoverishment. In order to address this, we propose a novel resampling method based upon Crow Search Optimization to overcome low performing particles detected as outlier. Proposed outlier detection mechanism with tra…
▽ More
Particle Filter(PF) is used extensively for estimation of target Non-linear and Non-gaussian state. However, its performance suffers due to inherent problem of sample degeneracy and impoverishment. In order to address this, we propose a novel resampling method based upon Crow Search Optimization to overcome low performing particles detected as outlier. Proposed outlier detection mechanism with transductive reliability achieve faster convergence of proposed PF tracking framework. In addition, we present an adaptive fuzzy fusion model to integrate multi-cue extracted for each evaluated particle. Automatic boosting and suppression of particles using proposed fusion model not only enhances performance of resampling method but also achieve optimal state estimation. Performance of the proposed tracker is evaluated over 12 benchmark video sequences and compared with state-of-the-art solutions. Qualitative and quantitative results reveals that the proposed tracker not only outperforms existing solutions but also efficiently handle various tracking challenges. On average of outcome, we achieve CLE of 7.98 and F-measure of 0.734.
△ Less
Submitted 10 June, 2018;
originally announced June 2018.