-
Replacing ARDL? Introducing the NSB-ARDL Model for Structural and Asymmetric Forecasting
Authors:
Tuhin G M Al Mamun
Abstract:
This paper introduces the NSB-ARDL (Nonlinear Structural Break Autoregressive Distributed Lag) model, a novel econometric framework designed to capture asymmetric and nonlinear dynamics in macroeconomic time series. Traditional ARDL models, while widely used for estimating short- and long-run relationships, rely on assumptions of linearity and symmetry that may overlook critical structural feature…
▽ More
This paper introduces the NSB-ARDL (Nonlinear Structural Break Autoregressive Distributed Lag) model, a novel econometric framework designed to capture asymmetric and nonlinear dynamics in macroeconomic time series. Traditional ARDL models, while widely used for estimating short- and long-run relationships, rely on assumptions of linearity and symmetry that may overlook critical structural features in real-world data. The NSB-ARDL model overcomes these limitations by decomposing explanatory variables into cumulative positive and negative partial sums, enabling the identification of both short- and long-term asymmetries.
Monte Carlo simulations show that NSB-ARDL consistently outperforms conventional ARDL models in terms of forecasting accuracy when asymmetric responses are present in the data-generating process. An empirical application to South Korea's CO2 emissions demonstrates the model's practical advantages, yielding a better in-sample fit and more interpretable long-run coefficients. These findings highlight the NSB-ARDL model as a structurally robust and forecasting-efficient alternative for analyzing nonlinear macroeconomic phenomena.
△ Less
Submitted 13 April, 2025;
originally announced April 2025.
-
Hardware Design and Security Needs Attention: From Survey to Path Forward
Authors:
Sujan Ghimire,
Muhtasim Alam Chowdhury,
Banafsheh Saber Latibari,
Muntasir Mamun,
Jaeden Wolf Carpenter,
Benjamin Tan,
Hammond Pearce,
Pratik Satam,
Soheil Salehi
Abstract:
Recent advances in attention-based artificial intelligence (AI) models have unlocked vast potential to automate digital hardware design while enhancing and strengthening security measures against various threats. This rapidly emerging field leverages Large Language Models (LLMs) to generate HDL code, identify vulnerabilities, and sometimes mitigate them. The state of the art in this design automat…
▽ More
Recent advances in attention-based artificial intelligence (AI) models have unlocked vast potential to automate digital hardware design while enhancing and strengthening security measures against various threats. This rapidly emerging field leverages Large Language Models (LLMs) to generate HDL code, identify vulnerabilities, and sometimes mitigate them. The state of the art in this design automation space utilizes optimized LLMs with HDL datasets, creating automated systems for register-transfer level (RTL) generation, verification, and debugging, and establishing LLM-driven design environments for streamlined logic designs. Additionally, attention-based models like graph attention have shown promise in chip design applications, including floorplanning. This survey investigates the integration of these models into hardware-related domains, emphasizing logic design and hardware security, with or without the use of IP libraries. This study explores the commercial and academic landscape, highlighting technical hurdles and future prospects for automating hardware design and security. Moreover, it provides new insights into the study of LLM-driven design systems, advances in hardware security mechanisms, and the impact of influential works on industry practices. Through the examination of 30 representative approaches and illustrative case studies, this paper underscores the transformative potential of attention-based models in revolutionizing hardware design while addressing the challenges that lie ahead in this interdisciplinary domain.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Assessing Fiscal Policy Effectiveness on Household Savings in Hungary, Slovenia, and the Czech Republic during the COVID-19 Crisis: A Markov Switching VAR Approach
Authors:
Tuhin G M Al Mamun
Abstract:
The COVID-19 pandemic significantly disrupted household consumption, savings, and income across Europe, particularly affecting countries like Hungary, Slovenia, and the Czech Republic. This study investigates the effectiveness of fiscal policies in mitigating these impacts, focusing on government interventions such as spending, subsidies, revenue, and debt. Utilizing a Markov Switching Vector Auto…
▽ More
The COVID-19 pandemic significantly disrupted household consumption, savings, and income across Europe, particularly affecting countries like Hungary, Slovenia, and the Czech Republic. This study investigates the effectiveness of fiscal policies in mitigating these impacts, focusing on government interventions such as spending, subsidies, revenue, and debt. Utilizing a Markov Switching Vector Auto regression (MS-VAR) model, the study examines data from 2000 to 2023, considering three economic regimes: the initial shock, the peak crisis, and the recovery phase. The results indicate that the COVID-19 shock led to a sharp decline in household consumption and income in all three countries, with Slovenia facing the most severe immediate impact. Hungary, however, showed the strongest recovery, driven by effective fiscal measures such as subsidies and increased government spending, which significantly boosted both household consumption and income. The Czech Republic demonstrated a more gradual recovery, with improvements observed in future-oriented consumption (IMPC). In conclusion, the study underscores the critical role of targeted fiscal interventions in mitigating the adverse effects of crises. The findings suggest that governments should prioritize timely and targeted fiscal policies to support household financial stability during economic downturns and ensure long-term recovery.
△ Less
Submitted 19 March, 2025;
originally announced March 2025.
-
Has the Paris Agreement Shaped Emission Trends? A Panel VECM Analysis of Energy, Growth, and CO$_2$ in 106 Middle-Income Countries
Authors:
Tuhin G. M. Al Mamun,
Ehsanullah,
Md. Sharif Hassan,
Mohammad Bin Amin,
Judit Oláh
Abstract:
Rising CO$_2$ emissions remain a critical global challenge, particularly in middle-income countries where economic growth drives environmental degradation. This study examines the long-run and short-run relationships between CO$_2$ emissions, energy use, GDP per capita, and population across 106 middle-income countries from 1980 to 2023. Using a Panel Vector Error Correction Model (VECM), we asses…
▽ More
Rising CO$_2$ emissions remain a critical global challenge, particularly in middle-income countries where economic growth drives environmental degradation. This study examines the long-run and short-run relationships between CO$_2$ emissions, energy use, GDP per capita, and population across 106 middle-income countries from 1980 to 2023. Using a Panel Vector Error Correction Model (VECM), we assess the impact of the Paris Agreement (2015) on emissions while conducting cointegration tests to confirm long-run equilibrium relationships. The findings reveal a strong long-run relationship among the variables, with energy use as the dominant driver of emissions, while GDP per capita has a moderate impact. However, the Paris Agreement has not significantly altered emissions trends in middle-income economies. Granger causality tests indicate that energy use strongly causes emissions, but GDP per capita and population do not exhibit significant short-run causal effects. Variance decomposition confirms that energy shocks have the most persistent effects, and impulse response functions (IRFs) show emissions trajectories are primarily shaped by economic activity rather than climate agreements. Robustness checks, including autocorrelation tests, polynomial root stability, and Yamagata-Pesaran slope homogeneity tests, validate model consistency. These results suggest that while global agreements set emissions reduction goals, their effectiveness remains limited without stronger national climate policies, sectoral energy reforms, and financial incentives for clean energy adoption to ensure sustainable economic growth.
△ Less
Submitted 24 March, 2025; v1 submitted 19 March, 2025;
originally announced March 2025.
-
Public Sector Efficiency in Delivering Social Services and Its Impact on Human Development: A Comparative Study of Healthcare and Education Spending in India, Pakistan, and Bangladesh
Authors:
Tuhin G. M. Al Mamun,
Rahim Md. Abdur,
Md. Sharif Hassan,
Mohammad Bin Amin,
Judit Oláh
Abstract:
The research investigates the effects of public spending on health and education in shaping the human development in south Asian three countries: India, Pakistan and Bangladesh. The study uses the VAR (Vector Auto regression) model to estimate the effects on government spending on these sectors to evaluate the human development. The findings state that there are different degrees of impact in thes…
▽ More
The research investigates the effects of public spending on health and education in shaping the human development in south Asian three countries: India, Pakistan and Bangladesh. The study uses the VAR (Vector Auto regression) model to estimate the effects on government spending on these sectors to evaluate the human development. The findings state that there are different degrees of impact in these three countries. In Bangladesh and India, health spending increases the human development in short term. On the other hand education spending shows the significance on the HDI.Moreover, the study also highlights that there are different levels of effectiveness of government spending across these three countries. In order to maximize the human development an optimum country specific strategies should be adopted.
△ Less
Submitted 24 March, 2025; v1 submitted 15 March, 2025;
originally announced March 2025.
-
Hallucination Detection in Large Language Models with Metamorphic Relations
Authors:
Borui Yang,
Md Afif Al Mamun,
Jie M. Zhang,
Gias Uddin
Abstract:
Large Language Models (LLMs) are prone to hallucinations, e.g., factually incorrect information, in their responses. These hallucinations present challenges for LLM-based applications that demand high factual accuracy. Existing hallucination detection methods primarily depend on external resources, which can suffer from issues such as low availability, incomplete coverage, privacy concerns, high l…
▽ More
Large Language Models (LLMs) are prone to hallucinations, e.g., factually incorrect information, in their responses. These hallucinations present challenges for LLM-based applications that demand high factual accuracy. Existing hallucination detection methods primarily depend on external resources, which can suffer from issues such as low availability, incomplete coverage, privacy concerns, high latency, low reliability, and poor scalability. There are also methods depending on output probabilities, which are often inaccessible for closed-source LLMs like GPT models. This paper presents MetaQA, a self-contained hallucination detection approach that leverages metamorphic relation and prompt mutation. Unlike existing methods, MetaQA operates without any external resources and is compatible with both open-source and closed-source LLMs. MetaQA is based on the hypothesis that if an LLM's response is a hallucination, the designed metamorphic relations will be violated. We compare MetaQA with the state-of-the-art zero-resource hallucination detection method, SelfCheckGPT, across multiple datasets, and on two open-source and two closed-source LLMs. Our results reveal that MetaQA outperforms SelfCheckGPT in terms of precision, recall, and f1 score. For the four LLMs we study, MetaQA outperforms SelfCheckGPT with a superiority margin ranging from 0.041 - 0.113 (for precision), 0.143 - 0.430 (for recall), and 0.154 - 0.368 (for F1-score). For instance, with Mistral-7B, MetaQA achieves an average F1-score of 0.435, compared to SelfCheckGPT's F1-score of 0.205, representing an improvement rate of 112.2%. MetaQA also demonstrates superiority across all different categories of questions.
△ Less
Submitted 11 March, 2025; v1 submitted 20 February, 2025;
originally announced February 2025.
-
Attention Eclipse: Manipulating Attention to Bypass LLM Safety-Alignment
Authors:
Pedram Zaree,
Md Abdullah Al Mamun,
Quazi Mishkatul Alam,
Yue Dong,
Ihsen Alouani,
Nael Abu-Ghazaleh
Abstract:
Recent research has shown that carefully crafted jailbreak inputs can induce large language models to produce harmful outputs, despite safety measures such as alignment. It is important to anticipate the range of potential Jailbreak attacks to guide effective defenses and accurate assessment of model safety. In this paper, we present a new approach for generating highly effective Jailbreak attacks…
▽ More
Recent research has shown that carefully crafted jailbreak inputs can induce large language models to produce harmful outputs, despite safety measures such as alignment. It is important to anticipate the range of potential Jailbreak attacks to guide effective defenses and accurate assessment of model safety. In this paper, we present a new approach for generating highly effective Jailbreak attacks that manipulate the attention of the model to selectively strengthen or weaken attention among different parts of the prompt. By harnessing attention loss, we develop more effective jailbreak attacks, that are also transferrable. The attacks amplify the success rate of existing Jailbreak algorithms including GCG, AutoDAN, and ReNeLLM, while lowering their generation cost (for example, the amplified GCG attack achieves 91.2% ASR, vs. 67.9% for the original attack on Llama2-7B/AdvBench, using less than a third of the generation time).
△ Less
Submitted 21 February, 2025;
originally announced February 2025.
-
Fiscal Policy and Household Savings in Central Europe (Poland, Croatia, and Slovak Republic) -- A Markov Switching VAR with Covid Shock
Authors:
Tuhin G M Al Mamun,
Ehsanullah,
Md Sharif Hassan,
Mohd Faizal Yusof,
Md Aminul Islam,
Naharin Binte Rab
Abstract:
This study investigates the effectiveness of fiscal policies on household consumption, disposable income, and the propensity to consume during the COVID-19 pandemic across Croatia, Slovakia, and Poland. The purpose is to assess how variations in government debt, expenditures, revenue, and subsidies influenced household financial behaviors in response to economic shocks. Using a Markov Switching VA…
▽ More
This study investigates the effectiveness of fiscal policies on household consumption, disposable income, and the propensity to consume during the COVID-19 pandemic across Croatia, Slovakia, and Poland. The purpose is to assess how variations in government debt, expenditures, revenue, and subsidies influenced household financial behaviors in response to economic shocks. Using a Markov Switching VAR model across three regimes: initial impact, peak crisis, and recovery.This analysis captures changes in household consumption, disposable income, and consumption propensities under different fiscal policy measures.
The findings reveal that the Slovak Republic exhibited the highest fiscal effectiveness, demonstrating effective government policies that stimulated consumer spending and supported household income during the pandemic. Croatia also showed positive outcomes, particularly in terms of income, although rising government debt posed challenges to overall effectiveness. Conversely, Poland faced significant obstacles, with its fiscal measures leading to lower consumption and income outcomes, indicating limited policy efficacy.
Conclusions emphasize the importance of tailored fiscal measures, as their effectiveness varied across countries and economic contexts. Recommendations include reinforcing consumption-supportive policies, particularly during crisis periods, to stabilize income and consumption expectations. This study underscores the significance of targeted fiscal actions in promoting household resilience and economic stability, as exemplified by the successful approach taken by the Slovak Republic.
△ Less
Submitted 24 March, 2025; v1 submitted 19 February, 2025;
originally announced February 2025.
-
Collision Dynamics and Deformation Behaviors of Multi-Core Compound Droplet Pairs in Microchannel Flow
Authors:
S M Abdullah Al Mamun,
Samaneh Farokhirad
Abstract:
We numerically investigate the collision dynamics and deformation behaviors of double-core compound droplet pairs within confined shear flows using free-energy-based lattice Boltzmann method. While significant research has advanced our understanding of simple droplet pair interactions, the collision behaviors of core-shell compound droplets, where each shell contains one or more core droplets, rem…
▽ More
We numerically investigate the collision dynamics and deformation behaviors of double-core compound droplet pairs within confined shear flows using free-energy-based lattice Boltzmann method. While significant research has advanced our understanding of simple droplet pair interactions, the collision behaviors of core-shell compound droplets, where each shell contains one or more core droplets, remain largely unexplored. Even the pairwise interaction of single-core compound droplets has not been extensively studied. We address how the interplay between physical parameters (i.e., density and viscosity ratios of immiscible fluids and Capillary number) and geometric parameters (i.e., initial offset distance between the shell droplets) affects the interaction time and collision outcomes of compound droplets. Our findings reveal that the presence of inner droplets significantly influences the deformation and stability of shell droplets, as well as the collision outcomes of both shell and core droplets. We identify several distinct collision outcomes, including (i) coalescence of shell droplets, with core droplets remaining separate and rotating in a planetary-like motion, (ii) pass-over of shell droplets, where core droplets maintain separation and exhibit both rotational and translational motion, (iii) coalescence of core droplets, with shell droplets passing each other, and (iv) pass-over of shell droplets, with the coalescence of core droplets. We demonstrate that the transition between these collision outcomes is governed by varying the Capillary number and initial offset. Additionally, we observed that increasing the density and viscosity ratios from unity to larger values always results in the pass-over of shell droplets, with the core droplets remain separated and experience rotational motion.
△ Less
Submitted 9 December, 2024;
originally announced December 2024.
-
Photogrammetry for Digital Twinning Industry 4.0 (I4) Systems
Authors:
Ahmed Alhamadah,
Muntasir Mamun,
Henry Harms,
Mathew Redondo,
Yu-Zheng Lin,
Jesus Pacheco,
Soheil Salehi,
Pratik Satam
Abstract:
The onset of Industry 4.0 is rapidly transforming the manufacturing world through the integration of cloud computing, machine learning (ML), artificial intelligence (AI), and universal network connectivity, resulting in performance optimization and increase productivity. Digital Twins (DT) are one such transformational technology that leverages software systems to replicate physical process behavi…
▽ More
The onset of Industry 4.0 is rapidly transforming the manufacturing world through the integration of cloud computing, machine learning (ML), artificial intelligence (AI), and universal network connectivity, resulting in performance optimization and increase productivity. Digital Twins (DT) are one such transformational technology that leverages software systems to replicate physical process behavior, representing the physical process in a digital environment. This paper aims to explore the use of photogrammetry (which is the process of reconstructing physical objects into virtual 3D models using photographs) and 3D Scanning techniques to create accurate visual representation of the 'Physical Process', to interact with the ML/AI based behavior models. To achieve this, we have used a readily available consumer device, the iPhone 15 Pro, which features stereo vision capabilities, to capture the depth of an Industry 4.0 system. By processing these images using 3D scanning tools, we created a raw 3D model for 3D modeling and rendering software for the creation of a DT model. The paper highlights the reliability of this method by measuring the error rate in between the ground truth (measurements done manually using a tape measure) and the final 3D model created using this method. The overall mean error is 4.97\% and the overall standard deviation error is 5.54\% between the ground truth measurements and their photogrammetry counterparts. The results from this work indicate that photogrammetry using consumer-grade devices can be an efficient and cost-efficient approach to creating DTs for smart manufacturing, while the approaches flexibility allows for iterative improvements of the models over time.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
High Voltage (~2 kV) field-plated Al0.64Ga0.36N-channel HEMTs
Authors:
Md Tahmidul Alam,
Jiahao Chen,
Kenneth Stephenson,
Md Abdullah-Al Mamun,
Abdullah Al Mamun Mazumder,
Shubhra S. Pasayat,
Asif Khan,
Chirag Gupta
Abstract:
High voltage (~2 kV) AlGaN-channel HEMTs were fabricated with 64% Aluminum composition in the channel. The average on-resistance was ~75 ohm. mm (~21 miliohm. cm^2) for LGD = 20 microns. Breakdown voltage reached >3 kV (tool limit) before passivation however it reduced to ~2 kV after SiN surface passivation and field plates. The apparent high breakdown voltage prior to passivation can possibly be…
▽ More
High voltage (~2 kV) AlGaN-channel HEMTs were fabricated with 64% Aluminum composition in the channel. The average on-resistance was ~75 ohm. mm (~21 miliohm. cm^2) for LGD = 20 microns. Breakdown voltage reached >3 kV (tool limit) before passivation however it reduced to ~2 kV after SiN surface passivation and field plates. The apparent high breakdown voltage prior to passivation can possibly be attributed to the field plate effect of the charged trap states of the surface. The breakdown voltage and RON demonstrated a strong linear correlation in a scattered plot with ~50 measured transistors. In pulsed IV measurements with 100 microsecond pulse width and 40 V of off-state bias (tool limit), the dynamic RON increased by ~5% compared to DC RON and current collapse was <10%.
△ Less
Submitted 14 July, 2024;
originally announced July 2024.
-
Classification of Short Segment Pediatric Heart Sounds Based on a Transformer-Based Convolutional Neural Network
Authors:
Md Hassanuzzaman,
Nurul Akhtar Hasan,
Mohammad Abdullah Al Mamun,
Khawza I Ahmed,
Ahsan H Khandoker,
Raqibul Mostafa
Abstract:
Congenital anomalies arising as a result of a defect in the structure of the heart and great vessels are known as congenital heart diseases or CHDs. A PCG can provide essential details about the mechanical conduction system of the heart and point out specific patterns linked to different kinds of CHD. This study aims to investigate the minimum signal duration required for the automatic classificat…
▽ More
Congenital anomalies arising as a result of a defect in the structure of the heart and great vessels are known as congenital heart diseases or CHDs. A PCG can provide essential details about the mechanical conduction system of the heart and point out specific patterns linked to different kinds of CHD. This study aims to investigate the minimum signal duration required for the automatic classification of heart sounds. This study also investigated the optimum signal quality assessment indicator (Root Mean Square of Successive Differences) RMSSD and (Zero Crossings Rate) ZCR value. Mel-frequency cepstral coefficients (MFCCs) based feature is used as an input to build a Transformer-Based residual one-dimensional convolutional neural network, which is then used for classifying the heart sound. The study showed that 0.4 is the ideal threshold for getting suitable signals for the RMSSD and ZCR indicators. Moreover, a minimum signal length of 5s is required for effective heart sound classification. It also shows that a shorter signal (3 s heart sound) does not have enough information to categorize heart sounds accurately, and the longer signal (15 s heart sound) may contain more noise. The best accuracy, 93.69%, is obtained for the 5s signal to distinguish the heart sound.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion
Authors:
Yu-Zheng Lin,
Muntasir Mamun,
Muhtasim Alam Chowdhury,
Shuyu Cai,
Mingyu Zhu,
Banafsheh Saber Latibari,
Kevin Immanuel Gubbi,
Najmeh Nazari Bavarsad,
Arjun Caputo,
Avesta Sasan,
Houman Homayoun,
Setareh Rafatirad,
Pratik Satam,
Soheil Salehi
Abstract:
The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is stil…
▽ More
The escalating complexity of modern computing frameworks has resulted in a surge in the cybersecurity vulnerabilities reported to the National Vulnerability Database (NVD) by practitioners. Despite the fact that the stature of NVD is one of the most significant databases for the latest insights into vulnerabilities, extracting meaningful trends from such a large amount of unstructured data is still challenging without the application of suitable technological methodologies. Previous efforts have mostly concentrated on software vulnerabilities; however, a holistic strategy incorporates approaches for mitigating vulnerabilities, score prediction, and a knowledge-generating system that may extract relevant insights from the Common Weakness Enumeration (CWE) and Common Vulnerability Exchange (CVE) databases is notably absent. As the number of hardware attacks on Internet of Things (IoT) devices continues to rapidly increase, we present the Hardware Vulnerability to Weakness Mapping (HW-V2W-Map) Framework, which is a Machine Learning (ML) framework focusing on hardware vulnerabilities and IoT security. The architecture that we have proposed incorporates an Ontology-driven Storytelling framework, which automates the process of updating the ontology in order to recognize patterns and evolution of vulnerabilities over time and provides approaches for mitigating the vulnerabilities. The repercussions of vulnerabilities can be mitigated as a result of this, and conversely, future exposures can be predicted and prevented. Furthermore, our proposed framework utilized Generative Pre-trained Transformer (GPT) Large Language Models (LLMs) to provide mitigation suggestions.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
Authors:
Mohammad Mamun,
Scott Buffett
Abstract:
Audit logs containing system level events are frequently used for behavior modeling as they can provide detailed insight into cyber-threat occurrences. However, mapping low-level system events in audit logs to highlevel behaviors has been a major challenge in identifying host contextual behavior for the purpose of detecting potential cyber threats. Relying on domain expert knowledge may limit its…
▽ More
Audit logs containing system level events are frequently used for behavior modeling as they can provide detailed insight into cyber-threat occurrences. However, mapping low-level system events in audit logs to highlevel behaviors has been a major challenge in identifying host contextual behavior for the purpose of detecting potential cyber threats. Relying on domain expert knowledge may limit its practical implementation. This paper presents TapTree, an automated process-tree based technique to extract host behavior by compiling system events' semantic information. After extracting behaviors as system generated process trees, TapTree integrates event semantics as a representation of behaviors. To further reduce pattern matching workloads for the analyst, TapTree aggregates semantically equivalent patterns and optimizes representative behaviors. In our evaluation against a recent benchmark audit log dataset (DARPA OpTC), TapTree employs tree pattern queries and sequential pattern mining techniques to deduce the semantics of connected system events, achieving high accuracy for behavior abstraction and then Advanced Persistent Threat (APT) attack detection. Moreover, we illustrate how to update the baseline model gradually online, allowing it to adapt to new log patterns over time.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
SynthEnsemble: A Fusion of CNN, Vision Transformer, and Hybrid Models for Multi-Label Chest X-Ray Classification
Authors:
S. M. Nabil Ashraf,
Md. Adyelullahil Mamun,
Hasnat Md. Abdullah,
Md. Golam Rabiul Alam
Abstract:
Chest X-rays are widely used to diagnose thoracic diseases, but the lack of detailed information about these abnormalities makes it challenging to develop accurate automated diagnosis systems, which is crucial for early detection and effective treatment. To address this challenge, we employed deep learning techniques to identify patterns in chest X-rays that correspond to different diseases. We co…
▽ More
Chest X-rays are widely used to diagnose thoracic diseases, but the lack of detailed information about these abnormalities makes it challenging to develop accurate automated diagnosis systems, which is crucial for early detection and effective treatment. To address this challenge, we employed deep learning techniques to identify patterns in chest X-rays that correspond to different diseases. We conducted experiments on the "ChestX-ray14" dataset using various pre-trained CNNs, transformers, hybrid(CNN+Transformer) models and classical models. The best individual model was the CoAtNet, which achieved an area under the receiver operating characteristic curve (AUROC) of 84.2%. By combining the predictions of all trained models using a weighted average ensemble where the weight of each model was determined using differential evolution, we further improved the AUROC to 85.4%, outperforming other state-of-the-art methods in this field. Our findings demonstrate the potential of deep learning techniques, particularly ensemble deep learning, for improving the accuracy of automatic diagnosis of thoracic diseases from chest X-rays. Code available at:https://github.com/syednabilashraf/SynthEnsemble
△ Less
Submitted 22 May, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks
Authors:
Erfan Shayegani,
Md Abdullah Al Mamun,
Yu Fu,
Pedram Zaree,
Yue Dong,
Nael Abu-Ghazaleh
Abstract:
Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as they integrate more deeply into complex systems, the urgency to scrutinize their security properties grows. This paper surveys research in the emerging interdisciplinary field of adversarial attacks on LLMs, a subfield of trustworthy ML, combining the perspectives of Natural Language Processing and Security.…
▽ More
Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as they integrate more deeply into complex systems, the urgency to scrutinize their security properties grows. This paper surveys research in the emerging interdisciplinary field of adversarial attacks on LLMs, a subfield of trustworthy ML, combining the perspectives of Natural Language Processing and Security. Prior work has shown that even safety-aligned LLMs (via instruction tuning and reinforcement learning through human feedback) can be susceptible to adversarial attacks, which exploit weaknesses and mislead AI systems, as evidenced by the prevalence of `jailbreak' attacks on models like ChatGPT and Bard. In this survey, we first provide an overview of large language models, describe their safety alignment, and categorize existing research based on various learning structures: textual-only attacks, multi-modal attacks, and additional attack methods specifically targeting complex systems, such as federated learning or multi-agent systems. We also offer comprehensive remarks on works that focus on the fundamental sources of vulnerabilities and potential defenses. To make this field more accessible to newcomers, we present a systematic review of existing works, a structured typology of adversarial attack concepts, and additional resources, including slides for presentations on related topics at the 62nd Annual Meeting of the Association for Computational Linguistics (ACL'24).
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
On Statistical Learning of Branch and Bound for Vehicle Routing Optimization
Authors:
Andrew Naguib,
Waleed A. Yousef,
Issa Traoré,
Mohammad Mamun
Abstract:
Recently, machine learning of the branch and bound algorithm has shown promise in approximating competent solutions to NP-hard problems. In this paper, we utilize and comprehensively compare the outcomes of three neural networks--graph convolutional neural network (GCNN), GraphSAGE, and graph attention network (GAT)--to solve the capacitated vehicle routing problem. We train these neural networks…
▽ More
Recently, machine learning of the branch and bound algorithm has shown promise in approximating competent solutions to NP-hard problems. In this paper, we utilize and comprehensively compare the outcomes of three neural networks--graph convolutional neural network (GCNN), GraphSAGE, and graph attention network (GAT)--to solve the capacitated vehicle routing problem. We train these neural networks to emulate the decision-making process of the computationally expensive Strong Branching strategy. The neural networks are trained on six instances with distinct topologies from the CVRPLIB and evaluated on eight additional instances. Moreover, we reduced the minimum number of vehicles required to solve a CVRP instance to a bin-packing problem, which was addressed in a similar manner. Through rigorous experimentation, we found that this approach can match or improve upon the performance of the branch and bound algorithm with the Strong Branching strategy while requiring significantly less computational time. The source code that corresponds to our research findings and methodology is readily accessible and available for reference at the following web address: https://isotlaboratory.github.io/ml4vrp
△ Less
Submitted 17 October, 2023; v1 submitted 15 October, 2023;
originally announced October 2023.
-
Co(ve)rtex: ML Models as storage channels and their (mis-)applications
Authors:
Md Abdullah Al Mamun,
Quazi Mishkatul Alam,
Erfan Shayegani,
Pedram Zaree,
Ihsen Alouani,
Nael Abu-Ghazaleh
Abstract:
Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities.…
▽ More
Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities. In this paper, we propose a new information theoretic perspective of the problem; we consider the ML model as a storage channel with a capacity that increases with overparameterization. Specifically, we consider a sender that embeds arbitrary information in the model at training time, which can be extracted by a receiver with a black-box access to the deployed model. We derive an upper bound on the capacity of the channel based on the number of available unused parameters. We then explore black-box write and read primitives that allow the attacker to:(i) store data in an optimized way within the model by augmenting the training data at the transmitter side, and (ii) to read it by querying the model after it is deployed. We also consider a new version of the problem which takes information storage covertness into account. Specifically, to obtain storage covertness, we introduce a new constraint such that the data augmentation used for the write primitives minimizes the distribution shift with the initial (baseline task) distribution. This constraint introduces a level of "interference" with the initial task, thereby limiting the channel's effective capacity. Therefore, we develop optimizations to improve the capacity in this case, including a novel ML-specific substitution based error correction protocol. We believe that the proposed modeling of the problem offers new tools to better understand and mitigate potential vulnerabilities of ML, especially in the context of increasingly large models.
△ Less
Submitted 11 May, 2024; v1 submitted 17 July, 2023;
originally announced July 2023.
-
OOD-Speech: A Large Bengali Speech Recognition Dataset for Out-of-Distribution Benchmarking
Authors:
Fazle Rabbi Rakib,
Souhardya Saha Dip,
Samiul Alam,
Nazia Tasnim,
Md. Istiak Hossain Shihab,
Md. Nazmuddoha Ansary,
Syed Mobassir Hossen,
Marsia Haque Meghla,
Mamunur Mamun,
Farig Sadeque,
Sayma Sultana Chowdhury,
Tahsin Reasat,
Asif Sushmit,
Ahmed Imtiaz Humayun
Abstract:
We present OOD-Speech, the first out-of-distribution (OOD) benchmarking dataset for Bengali automatic speech recognition (ASR). Being one of the most spoken languages globally, Bengali portrays large diversity in dialects and prosodic features, which demands ASR frameworks to be robust towards distribution shifts. For example, islamic religious sermons in Bengali are delivered with a tonality that…
▽ More
We present OOD-Speech, the first out-of-distribution (OOD) benchmarking dataset for Bengali automatic speech recognition (ASR). Being one of the most spoken languages globally, Bengali portrays large diversity in dialects and prosodic features, which demands ASR frameworks to be robust towards distribution shifts. For example, islamic religious sermons in Bengali are delivered with a tonality that is significantly different from regular speech. Our training dataset is collected via massively online crowdsourcing campaigns which resulted in 1177.94 hours collected and curated from $22,645$ native Bengali speakers from South Asia. Our test dataset comprises 23.03 hours of speech collected and manually annotated from 17 different sources, e.g., Bengali TV drama, Audiobook, Talk show, Online class, and Islamic sermons to name a few. OOD-Speech is jointly the largest publicly available speech dataset, as well as the first out-of-distribution ASR benchmarking dataset for Bengali.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Affective social anthropomorphic intelligent system
Authors:
Md. Adyelullahil Mamun,
Hasnat Md. Abdullah,
Md. Golam Rabiul Alam,
Muhammad Mehedi Hassan,
Md. Zia Uddin
Abstract:
Human conversational styles are measured by the sense of humor, personality, and tone of voice. These characteristics have become essential for conversational intelligent virtual assistants. However, most of the state-of-the-art intelligent virtual assistants (IVAs) are failed to interpret the affective semantics of human voices. This research proposes an anthropomorphic intelligent system that ca…
▽ More
Human conversational styles are measured by the sense of humor, personality, and tone of voice. These characteristics have become essential for conversational intelligent virtual assistants. However, most of the state-of-the-art intelligent virtual assistants (IVAs) are failed to interpret the affective semantics of human voices. This research proposes an anthropomorphic intelligent system that can hold a proper human-like conversation with emotion and personality. A voice style transfer method is also proposed to map the attributes of a specific emotion. Initially, the frequency domain data (Mel-Spectrogram) is created by converting the temporal audio wave data, which comprises discrete patterns for audio features such as notes, pitch, rhythm, and melody. A collateral CNN-Transformer-Encoder is used to predict seven different affective states from voice. The voice is also fed parallelly to the deep-speech, an RNN model that generates the text transcription from the spectrogram. Then the transcripted text is transferred to the multi-domain conversation agent using blended skill talk, transformer-based retrieve-and-generate generation strategy, and beam-search decoding, and an appropriate textual response is generated. The system learns an invertible mapping of data to a latent space that can be manipulated and generates a Mel-spectrogram frame based on previous Mel-spectrogram frames to voice synthesize and style transfer. Finally, the waveform is generated using WaveGlow from the spectrogram. The outcomes of the studies we conducted on individual models were auspicious. Furthermore, users who interacted with the system provided positive feedback, demonstrating the system's effectiveness.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
A Deep Analysis of Transfer Learning Based Breast Cancer Detection Using Histopathology Images
Authors:
Md Ishtyaq Mahmud,
Muntasir Mamun,
Ahmed Abdelgawad
Abstract:
Breast cancer is one of the most common and dangerous cancers in women, while it can also afflict men. Breast cancer treatment and detection are greatly aided by the use of histopathological images since they contain sufficient phenotypic data. A Deep Neural Network (DNN) is commonly employed to improve accuracy and breast cancer detection. In our research, we have analyzed pre-trained deep transf…
▽ More
Breast cancer is one of the most common and dangerous cancers in women, while it can also afflict men. Breast cancer treatment and detection are greatly aided by the use of histopathological images since they contain sufficient phenotypic data. A Deep Neural Network (DNN) is commonly employed to improve accuracy and breast cancer detection. In our research, we have analyzed pre-trained deep transfer learning models such as ResNet50, ResNet101, VGG16, and VGG19 for detecting breast cancer using the 2453 histopathology images dataset. Images in the dataset were separated into two categories: those with invasive ductal carcinoma (IDC) and those without IDC. After analyzing the transfer learning model, we found that ResNet50 outperformed other models, achieving accuracy rates of 90.2%, Area under Curve (AUC) rates of 90.0%, recall rates of 94.7%, and a marginal loss of 3.5%.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
MHfit: Mobile Health Data for Predicting Athletics Fitness Using Machine Learning
Authors:
Jonayet Miah,
Muntasir Mamun,
Md Minhazur Rahman,
Md Ishtyaq Mahmud,
Sabbir Ahmed,
Md Hasan Bin Nasir
Abstract:
Mobile phones and other electronic gadgets or devices have aided in collecting data without the need for data entry. This paper will specifically focus on Mobile health data. Mobile health data use mobile devices to gather clinical health data and track patient vitals in real-time. Our study is aimed to give decisions for small or big sports teams on whether one athlete good fit or not for a parti…
▽ More
Mobile phones and other electronic gadgets or devices have aided in collecting data without the need for data entry. This paper will specifically focus on Mobile health data. Mobile health data use mobile devices to gather clinical health data and track patient vitals in real-time. Our study is aimed to give decisions for small or big sports teams on whether one athlete good fit or not for a particular game with the compare several machine learning algorithms to predict human behavior and health using the data collected from mobile devices and sensors placed on patients. In this study, we have obtained the dataset from a similar study done on mhealth. The dataset contains vital signs recordings of ten volunteers from different backgrounds. They had to perform several physical activities with a sensor placed on their bodies. Our study used 5 machine learning algorithms (XGBoost, Naive Bayes, Decision Tree, Random Forest, and Logistic Regression) to analyze and predict human health behavior. XGBoost performed better compared to the other machine learning algorithms and achieved 95.2% accuracy, 99.5% in sensitivity, 99.5% in specificity, and 99.66% in F1 score. Our research indicated a promising future in mhealth being used to predict human behavior and further research and exploration need to be done for it to be available for commercial use specifically in the sports industry.
△ Less
Submitted 26 April, 2023; v1 submitted 10 April, 2023;
originally announced April 2023.
-
LCDctCNN: Lung Cancer Diagnosis of CT scan Images Using CNN Based Model
Authors:
Muntasir Mamun,
Md Ishtyaq Mahmud,
Mahabuba Meherin,
Ahmed Abdelgawad
Abstract:
The most deadly and life-threatening disease in the world is lung cancer. Though early diagnosis and accurate treatment are necessary for lowering the lung cancer mortality rate. A computerized tomography (CT) scan-based image is one of the most effective imaging techniques for lung cancer detection using deep learning models. In this article, we proposed a deep learning model-based Convolutional…
▽ More
The most deadly and life-threatening disease in the world is lung cancer. Though early diagnosis and accurate treatment are necessary for lowering the lung cancer mortality rate. A computerized tomography (CT) scan-based image is one of the most effective imaging techniques for lung cancer detection using deep learning models. In this article, we proposed a deep learning model-based Convolutional Neural Network (CNN) framework for the early detection of lung cancer using CT scan images. We also have analyzed other models for instance Inception V3, Xception, and ResNet-50 models to compare with our proposed model. We compared our models with each other considering the metrics of accuracy, Area Under Curve (AUC), recall, and loss. After evaluating the model's performance, we observed that CNN outperformed other models and has been shown to be promising compared to traditional methods. It achieved an accuracy of 92%, AUC of 98.21%, recall of 91.72%, and loss of 0.328.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering
Authors:
Shiv Sondhi,
Sherif Saad,
Kevin Shi,
Mohammad Mamun,
Issa Traore
Abstract:
Blockchain and distributed ledger technologies rely on distributed consensus algorithms. In recent years many consensus algorithms and protocols have been proposed; most of them are for permissioned blockchain networks. However, the performance of these algorithms is not well understood. This paper introduces an approach to evaluating consensus algorithms and blockchain platforms in a hostile netw…
▽ More
Blockchain and distributed ledger technologies rely on distributed consensus algorithms. In recent years many consensus algorithms and protocols have been proposed; most of them are for permissioned blockchain networks. However, the performance of these algorithms is not well understood. This paper introduces an approach to evaluating consensus algorithms and blockchain platforms in a hostile network environment with the presence of byzantine and other network failures. The approach starts by using stochastic modeling to model the behaviors of consensus algorithms under different typical and faulty operational scenarios. Next, we implemented a blockchain application using different consensus protocols and tested their performance using chaos engineering techniques. To demonstrate our generic evaluation approach, we analyze the performance of four permissioned blockchain platforms and their consensus protocols. Our results showed that stochastic modeling is an inexpensive and efficient technique for analyzing consensus protocols. But they do not represent the actual performance of the consensus protocols in a production environment. Moreover, an experiment with chaos engineering indicates that if two different blockchain platforms use the same blockchain algorithm or protocol, we should not assume they will have similar performance. Therefore, It is also essential to consider the role of platform architecture and how the protocols are engineered in a given platform.
△ Less
Submitted 14 January, 2023;
originally announced January 2023.
-
Tunable Multistate Terahertz Switch Based on Multilayered Graphene Metamaterial
Authors:
Dip Sarker,
Partha Pratim Nakti,
Md Ishfak Tahmid,
Md Asaduz Zaman Mamun,
Ahmed Zubair
Abstract:
We proposed plasmonic effect based narrow band tunable terahertz switches consisting of multilayered graphene metamaterial. Though several terahertz optical switches based on metamaterials were previously reported, these switches had complicated fabrication processes, limited tunability, and low modulation depths. We designed and simulated ingenious four and eight state terahertz optical switch de…
▽ More
We proposed plasmonic effect based narrow band tunable terahertz switches consisting of multilayered graphene metamaterial. Though several terahertz optical switches based on metamaterials were previously reported, these switches had complicated fabrication processes, limited tunability, and low modulation depths. We designed and simulated ingenious four and eight state terahertz optical switch designs that can be functional for multimode communication or imaging using the finite-difference time-domain simulation technique. The plasmonic bright modes and transparency regions of these structures were adjusted by varying the chemical potential of patterned graphene layers via applying voltage in different layers. The structures exhibited high modulation depth and modulation degree of frequency, low insertion loss, high spectral contrast ratio, narrow bandwidth, and high polarization sensitivity. Moreover, our proposed simple fabrication process will make these structures more feasible compared to previously reported terahertz switches. The calculated modulation depths were 98.81% and 98.71%, and maximum modulation degree of frequencies were ~61% and ~29.1% for four and eight state terahertz switches, respectively. The maximum transmittance in transparency regions between bright modes and the spectral contrast ratio were enumerated to be 95.9% and ~96%, respectively. The maximum insertion losses were quite low with values of 0.22 dB and 0.33 dB for four and eight state terahertz switches, respectively. Our findings will be beneficial in the development of ultra-thin graphene-based multistate photonic devices for digital switching, sensing in terahertz regime.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
A Simple Evolutionary Algorithm for Multi-modal Multi-objective Optimization
Authors:
Tapabrata Ray,
Mohammad Mohiuddin Mamun,
Hemant Kumar Singh
Abstract:
In solving multi-modal, multi-objective optimization problems (MMOPs), the objective is not only to find a good representation of the Pareto-optimal front (PF) in the objective space but also to find all equivalent Pareto-optimal subsets (PSS) in the variable space. Such problems are practically relevant when a decision maker (DM) is interested in identifying alternative designs with similar perfo…
▽ More
In solving multi-modal, multi-objective optimization problems (MMOPs), the objective is not only to find a good representation of the Pareto-optimal front (PF) in the objective space but also to find all equivalent Pareto-optimal subsets (PSS) in the variable space. Such problems are practically relevant when a decision maker (DM) is interested in identifying alternative designs with similar performance. There has been significant research interest in recent years to develop efficient algorithms to deal with MMOPs. However, the existing algorithms still require prohibitive number of function evaluations (often in several thousands) to deal with problems involving as low as two objectives and two variables. The algorithms are typically embedded with sophisticated, customized mechanisms that require additional parameters to manage the diversity and convergence in the variable and the objective spaces. In this letter, we introduce a steady-state evolutionary algorithm for solving MMOPs, with a simple design and no additional userdefined parameters that need tuning compared to a standard EA. We report its performance on 21 MMOPs from various test suites that are widely used for benchmarking using a low computational budget of 1000 function evaluations. The performance of the proposed algorithm is compared with six state-of-the-art algorithms (MO Ring PSO SCD, DN-NSGAII, TriMOEA-TA&R, CPDEA, MMOEA/DC and MMEA-WI). The proposed algorithm exhibits significantly better performance than the above algorithms based on the established metrics including IGDX, PSP and IGD. We hope this study would encourage design of simple, efficient and generalized algorithms to improve its uptake for practical applications.
△ Less
Submitted 20 October, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
Real-Time Power System Dynamic Simulation using Windowing based Waveform Relaxation Method
Authors:
M Al Mamun,
Sumit Paudyal,
Sukumar Kamalasadan
Abstract:
Power system dynamic modeling involves nonlinear differential and algebraic equations (DAEs). Solving DAEs for large power grid networks by direct implicit numerical methods could be inefficient in terms of solution time; thus, such methods are not preferred when real-time or faster than real-time performance is sought. Hence, this paper revisits Waveform Relaxation (WR) algorithm, as a distribute…
▽ More
Power system dynamic modeling involves nonlinear differential and algebraic equations (DAEs). Solving DAEs for large power grid networks by direct implicit numerical methods could be inefficient in terms of solution time; thus, such methods are not preferred when real-time or faster than real-time performance is sought. Hence, this paper revisits Waveform Relaxation (WR) algorithm, as a distributed computational technique to solve power system dynamic simulations. Case studies performed on the IEEE NE 10-generator 39-bus system demonstrate that, for a certain simulation time window, the solve time for WR method is larger than the length of the simulation window; thus, WR lacks the performance needed for real-time simulators, even for a small power network. To achieve real-time performance, then a Windowing technique is applied on top of the WR, for which the solve time was obtained less than the length of a simulation window, that shows the effectiveness of the proposed method for real-time dynamic simulation of power systems.
△ Less
Submitted 27 December, 2021;
originally announced December 2021.
-
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning
Authors:
Mohammad Mamun,
Kevin Shi
Abstract:
APT, known as Advanced Persistent Threat, is a difficult challenge for cyber defence. These threats make many traditional defences ineffective as the vulnerabilities exploited by these threats are insiders who have access to and are within the network. This paper proposes DeepTaskAPT, a heterogeneous task-tree based deep learning method to construct a baseline model based on sequences of tasks usi…
▽ More
APT, known as Advanced Persistent Threat, is a difficult challenge for cyber defence. These threats make many traditional defences ineffective as the vulnerabilities exploited by these threats are insiders who have access to and are within the network. This paper proposes DeepTaskAPT, a heterogeneous task-tree based deep learning method to construct a baseline model based on sequences of tasks using a Long Short-Term Memory (LSTM) neural network that can be applied across different users to identify anomalous behaviour. Rather than applying the model to sequential log entries directly, as most current approaches do, DeepTaskAPT applies a process tree based task generation method to generate sequential log entries for the deep learning model. To assess the performance of DeepTaskAPT, we use a recently released synthetic dataset, DARPA Operationally Transparent Computing (OpTC) dataset and a real-world dataset, Los Alamos National Laboratory (LANL) dataset. Both of them are composed of host-based data collected from sensors. Our results show that DeepTaskAPT outperforms similar approaches e.g. DeepLog and the DeepTaskAPT baseline model demonstrate its capability to detect malicious traces in various attack scenarios while having high accuracy and low false-positive rates. To the best of knowledge this is the very first attempt of using recently introduced OpTC dataset for cyber threat detection.
△ Less
Submitted 31 August, 2021;
originally announced August 2021.
-
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains
Authors:
Shiv Sondhi,
Sherif Saad,
Kevin Shi,
Mohammad Mamun,
Issa Traore
Abstract:
A critical component of any blockchain or distributed ledger technology (DLT) platform is the consensus algorithm. Blockchain consensus algorithms are the primary vehicle for the nodes within a blockchain network to reach an agreement. In recent years, many blockchain consensus algorithms have been proposed mainly for private and permissioned blockchain networks. However, the performance of these…
▽ More
A critical component of any blockchain or distributed ledger technology (DLT) platform is the consensus algorithm. Blockchain consensus algorithms are the primary vehicle for the nodes within a blockchain network to reach an agreement. In recent years, many blockchain consensus algorithms have been proposed mainly for private and permissioned blockchain networks. However, the performance of these algorithms and their reliability in hostile environments or the presence of byzantine and other network failures are not well understood. In addition, the testing and validation of blockchain applications come with many technical challenges. In this paper, we apply chaos engineering and testing to understand the performance of consensus algorithms in the presence of different loads, byzantine failure and other communication failure scenarios. We apply chaos engineering to evaluate the performance of three different consensus algorithms (PBFT, Clique, Raft) and their respective blockchain platforms. We measure the blockchain network's throughput, latency, and success rate while executing chaos and load tests. We develop lightweight blockchain applications to execute our test in a semi-production environment. Our results show that using chaos engineering helps understand how different consensus algorithms perform in a hostile or unreliable environment and the limitations of blockchain platforms. Our work demonstrates the benefits of using chaos engineering in testing complex distributed systems such as blockchain networks.
△ Less
Submitted 18 August, 2021;
originally announced August 2021.
-
Machine Learning in Precision Medicine to Preserve Privacy via Encryption
Authors:
William Briguglio,
Parisa Moghaddam,
Waleed A. Yousef,
Issa Traore,
Mohammad Mamun
Abstract:
Precision medicine is an emerging approach for disease treatment and prevention that delivers personalized care to individual patients by considering their genetic makeups, medical histories, environments, and lifestyles. Despite the rapid advancement of precision medicine and its considerable promise, several underlying technological challenges remain unsolved. One such challenge of great importa…
▽ More
Precision medicine is an emerging approach for disease treatment and prevention that delivers personalized care to individual patients by considering their genetic makeups, medical histories, environments, and lifestyles. Despite the rapid advancement of precision medicine and its considerable promise, several underlying technological challenges remain unsolved. One such challenge of great importance is the security and privacy of precision health-related data, such as genomic data and electronic health records, which stifle collaboration and hamper the full potential of machine-learning (ML) algorithms. To preserve data privacy while providing ML solutions, this article makes three contributions. First, we propose a generic machine learning with encryption (MLE) framework, which we used to build an ML model that predicts cancer from one of the most recent comprehensive genomics datasets in the field. Second, our framework's prediction accuracy is slightly higher than that of the most recent studies conducted on the same dataset, yet it maintains the privacy of the patients' genomic data. Third, to facilitate the validation, reproduction, and extension of this work, we provide an open-source repository that contains the design and implementation of the framework, all the ML experiments and code, and the final predictive model deployed to a free cloud service.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Determination of the $^{60}$Zn level density from neutron evaporation spectra
Authors:
D. Soltesz,
M. A. A. Mamun,
A. V. Voinov,
Z. Meisel,
B. A. Brown,
C. R. Brune,
S. M. Grimes,
H. Hadizadeh,
M. Hornish,
T. N. Massey,
J. E. O'Donnell,
W. E. Ormand
Abstract:
Nuclear reactions of interest for astrophysics and applications often rely on statistical model calculations for nuclear reaction rates, particularly for nuclei far from $β$-stability. However, statistical model parameters are often poorly constrained, where experimental constraints are particularly sparse for exotic nuclides. For example, our understanding of the breakout from the NiCu cycle in t…
▽ More
Nuclear reactions of interest for astrophysics and applications often rely on statistical model calculations for nuclear reaction rates, particularly for nuclei far from $β$-stability. However, statistical model parameters are often poorly constrained, where experimental constraints are particularly sparse for exotic nuclides. For example, our understanding of the breakout from the NiCu cycle in the astrophysical rp-process is currently limited by uncertainties in the statistical properties of the proton-rich nucleus $^{60}$Zn. We have determined the nuclear level density of $^{60}$Zn using neutron evaporation spectra from $^{58}$Ni($^3$He, n) measured at the Edwards Accelerator Laboratory. We compare our results to a number of theoretical predictions, including phenomenological, microscopic, and shell model based approaches. Notably, we find the $^{60}$Zn level density is somewhat lower than expected for excitation energies populated in the $^{59}$Cu(p,$γ$)$^{60}$Zn reaction under rp-process conditions. This includes a level density plateau from roughly 5-6 MeV excitation energy, which is counter to the usual expectation of exponential growth and all theoretical predictions that we explore. A determination of the spin-distribution at the relevant excitation energies in $^{60}$Zn is needed to confirm that the Hauser-Feshbach formalism is appropriate for the $^{59}$Cu(p,$γ$)$^{60}$Zn reaction rate at X-ray burst temperatures.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Towards a Robust and Trustworthy Machine Learning System Development: An Engineering Perspective
Authors:
Pulei Xiong,
Scott Buffett,
Shahrear Iqbal,
Philippe Lamontagne,
Mohammad Mamun,
Heather Molyneaux
Abstract:
While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness an…
▽ More
While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust that users have in these systems. In this article, we present our recent systematic and comprehensive survey on the state-of-the-art ML robustness and trustworthiness from a security engineering perspective, focusing on the problems in system threat analysis, design and evaluation faced in developing practical machine learning applications, in terms of robustness and user trust. Accordingly, we organize the presentation of this survey intended to facilitate the convey of the body of knowledge from this angle. We then describe a metamodel we created that represents the body of knowledge in a standard and visualized way. We further illustrate how to leverage the metamodel to guide a systematic threat analysis and security design process which extends and scales up the classic process. Finally, we propose the future research directions motivated by our findings. Our work differs itself from the existing surveys by (i) exploring the fundamental principles and best practices to support robust and trustworthy ML system development, and (ii) studying the interplay of robustness and user trust in the context of ML systems. We expect this survey provides a big picture for machine learning security practitioners.
△ Less
Submitted 14 February, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Boundary Layer Flow over a Moving Flat Plate in Jeffrey Fluid with Newtonian Heating
Authors:
Didarul Ahasan Redwan,
K. M. Faisal Karim,
M. A. H. Mamun,
Muhammad Khairul Anuar Mohamed,
Syazwani Mohd Zokri
Abstract:
In this paper, a numerical analysis of boundary layer flow and heat transfer in Jeffrey fluid over a moving flat plate with Newtonian Heating have been presented. The governing partial differential equations were reduced to a transformed ordinary differential equation with the help of similarity transformation. Numerical solutions were obtained for these transformed ordinary differential equation…
▽ More
In this paper, a numerical analysis of boundary layer flow and heat transfer in Jeffrey fluid over a moving flat plate with Newtonian Heating have been presented. The governing partial differential equations were reduced to a transformed ordinary differential equation with the help of similarity transformation. Numerical solutions were obtained for these transformed ordinary differential equation by using the Runge-Kutta-Fehlberg method. The effect on the boundary layer flow and heat transfer behaviours of various parameters such as Deborah number λ2, relaxation time and retardation time ratio λ, Newtonian heating parameter γ, Prandtl number Pr and moving plate velocity parameter ε has been investigated. It is important to mention that the results obtained and reported here are impactful to the researchers working in this field and can be used in the future as a guideline and analysis context.
Keywords: Jeffrey Fluid, Newtonian Heating, Boundary Layer Flow, Moving plate
△ Less
Submitted 28 December, 2020;
originally announced December 2020.
-
Treating quarks within neutron stars
Authors:
Sophia Han,
M. A. A. Mamun,
S. Lalit,
C. Constantinou,
M. Prakash
Abstract:
Neutron star interiors provide the opportunity to probe properties of cold dense matter in the QCD phase diagram. Utilizing models of dense matter in accord with nuclear systematics at nuclear densities, we investigate the compatibility of deconfined quark cores with current observational constraints on the maximum mass and tidal deformability of neutron stars. We explore various methods of implem…
▽ More
Neutron star interiors provide the opportunity to probe properties of cold dense matter in the QCD phase diagram. Utilizing models of dense matter in accord with nuclear systematics at nuclear densities, we investigate the compatibility of deconfined quark cores with current observational constraints on the maximum mass and tidal deformability of neutron stars. We explore various methods of implementing the hadron-to-quark phase transition, specifically, first-order transitions with sharp (Maxwell construction) and soft (Gibbs construction) interfaces, and smooth crossover transitions. We find that within the models we apply, hadronic matter has to be stiff for a first-order phase transition and soft for a crossover transition. In both scenarios and for the equations of state we employed, quarks appear at the center of pre-merger neutron stars in the mass range $\approx 1.0-1.6\,{\rm M}_{\odot}$, with a squared speed of sound $c^2_{\rm QM}\gtrsim 0.4$ characteristic of strong repulsive interactions required to support the recently discovered neutron star masses $\geq 2\,{\rm M}_{\odot}$. We also identify equations of state and phase transition scenarios that are consistent with the bounds placed on tidal deformations of neutron stars in the recent binary merger event GW170817. We emphasize that distinguishing hybrid stars with quark cores from normal hadronic stars is very difficult from the knowledge of masses and radii alone, unless drastic sharp transitions induce distinctive disconnected hybrid branches in the mass-radius relation.
△ Less
Submitted 31 October, 2019; v1 submitted 10 June, 2019;
originally announced June 2019.
-
Role of fluctuations on the pairing properties of nuclei in the random spacing model
Authors:
M. A. A. Mamun,
C. Constantinou,
M. Prakash
Abstract:
The influence of thermal fluctuations on fermion pairing is investigated using a semiclassical treatment of fluctuations. When the average pairing gaps along with those differing by one standard deviation are used, the characteristic discontinuity of the specific heat at the critical temperature $T_c$ in the BCS formalism with its most probable gap becomes smooth. This indicates the suppression of…
▽ More
The influence of thermal fluctuations on fermion pairing is investigated using a semiclassical treatment of fluctuations. When the average pairing gaps along with those differing by one standard deviation are used, the characteristic discontinuity of the specific heat at the critical temperature $T_c$ in the BCS formalism with its most probable gap becomes smooth. This indicates the suppression of a second order phase transition as experimentally observed in nano-particles and several nuclei. Illustrative calculations using the constant spacing model and the recently introduced random spacing model are presented.
△ Less
Submitted 24 December, 2018;
originally announced December 2018.
-
Dense matter equation of state for neutron star mergers
Authors:
S. Lalit,
M. A. A. Mamun,
C. Constantinou,
M. Prakash
Abstract:
In simulations of binary neutron star mergers, the dense matter equation of state (EOS) is required over wide ranges of density and temperature as well as under conditions in which neutrinos are trapped, and the effects of magnetic fields and rotation prevail. Here we assess the status of dense matter theory and point out the successes and limitations of approaches currently in use. A comparative…
▽ More
In simulations of binary neutron star mergers, the dense matter equation of state (EOS) is required over wide ranges of density and temperature as well as under conditions in which neutrinos are trapped, and the effects of magnetic fields and rotation prevail. Here we assess the status of dense matter theory and point out the successes and limitations of approaches currently in use. A comparative study of the excluded volume (EV) and virial approaches for the $npα$ system using the equation of state of Akmal, Pandharipande and Ravenhall for interacting nucleons is presented in the sub-nuclear density regime. Owing to the excluded volume of the $α$-particles, their mass fraction vanishes in the EV approach below the baryon density 0.1 fm$^{-3}$, whereas it continues to rise due to the predominantly attractive interactions in the virial approach. The EV approach of Lattimer et al. is extended here to include clusters of light nuclei such as d, $^3$H and $^3$He in addition to $α$-particles. Results of the relevant state variables from this development are presented and enable comparisons with related but slightly different approaches in the literature. We also comment on some of the sweet and sour aspects of the supra-nuclear EOS. The extent to which the neutron star gravitational and baryon masses vary due to thermal effects, neutrino trapping, magnetic fields and rotation are summarized from earlier studies in which the effects from each of these sources were considered separately. Increases of about $20\% (\gtrsim 50\%)$ occur for rigid (differential) rotation with comparable increases occurring in the presence of magnetic fields only for fields in excess of $10^{18}$ Gauss. Comparatively smaller changes occur due to thermal effects and neutrino trapping. Some future studies to gain further insight into the outcome of dynamical simulations are suggested.
△ Less
Submitted 29 November, 2018; v1 submitted 20 September, 2018;
originally announced September 2018.
-
Non-evaporable getter coating chambers for extreme high vacuum
Authors:
Marcy L. Stutzman,
Philip A. Adderley,
Md Abdullah A. Mamun,
Matt Poelker
Abstract:
Techniques for NEG coating a large diameter chamber are presented along with vacuum measurements in the chamber using several pumping configurations, with base pressure as low as 1.56x10^-12 Torr (N2 equivalent) with only a NEG coating and small ion pump. We then describe modifications to the NEG coating process to coat complex geometry chambers for ultra-cold atom trap experiments. Surface analys…
▽ More
Techniques for NEG coating a large diameter chamber are presented along with vacuum measurements in the chamber using several pumping configurations, with base pressure as low as 1.56x10^-12 Torr (N2 equivalent) with only a NEG coating and small ion pump. We then describe modifications to the NEG coating process to coat complex geometry chambers for ultra-cold atom trap experiments. Surface analysis of NEG coated samples are used to measure composition and morphology of the thin films. Finally, pressure measurements are compared for two NEG coated polarized electron source chambers: the 130 kV polarized electron source at Jefferson Lab and the upgraded 350 kV polarized 2 electron source, both of which are approaching or within the extreme high vacuum (XHV) range, defined as P<7.5x10^-13 Torr.
△ Less
Submitted 22 March, 2018; v1 submitted 19 March, 2018;
originally announced March 2018.
-
Pairing properties from random distributions of single-particle energy levels
Authors:
A. A. Mamun,
C. Constantinou,
M. Prakash
Abstract:
Exploiting the similarity between the bunched single-particle energy levels of nuclei and of random distributions around the Fermi surface, pairing properties of the latter are calculated to establish statistically-based bounds on the basic characteristics of the pairing phenomenon. When the most probable values for the pairing gaps germane to the BCS formalism are used to calculate thermodynamic…
▽ More
Exploiting the similarity between the bunched single-particle energy levels of nuclei and of random distributions around the Fermi surface, pairing properties of the latter are calculated to establish statistically-based bounds on the basic characteristics of the pairing phenomenon. When the most probable values for the pairing gaps germane to the BCS formalism are used to calculate thermodynamic quantities, we find that while the ratio of the critical temperature Tc to the zero-temperature pairing gap is close to its BCS Fermi gas value, the ratio of the superfluid to the normal phase specific heats at Tc differs significantly from its Fermi gas counterpart. The largest deviations occur when a few levels lie closely on either side of the Fermi energy but other levels are far away from it. The influence of thermal fluctuations, expected to be large for systems of finite number of particles, were also investigated using a semiclassical treatment of fluctuations. When the average pairing gaps along with those differing by one standard deviations are used, the characteristic discontinuity of the specific heat at Tc in the BCS formalism was transformed to a shoulder-like structure indicating the suppression of a second order phase transition as experimentally observed in nano-particles and several nuclei. Contrasting semiclassical and quantum treatments of fluctuations for the random spacing model is currently underway.
△ Less
Submitted 7 December, 2017; v1 submitted 25 May, 2017;
originally announced May 2017.
-
Efficient Design of Reversible Sequential Circuit
Authors:
Md. Selim Al Mamun,
Indrani Mandal,
Md. Hasanuzzaman
Abstract:
Reversible logic has come to the forefront of theoretical and applied research today. Although many researchers are investigating techniques to synthesize reversible combinational logic, there is little work in the area of sequential reversible logic. Latches and flip-flops are the most significant memory elements for the forthcoming sequential memory elements. In this paper, we proposed two new r…
▽ More
Reversible logic has come to the forefront of theoretical and applied research today. Although many researchers are investigating techniques to synthesize reversible combinational logic, there is little work in the area of sequential reversible logic. Latches and flip-flops are the most significant memory elements for the forthcoming sequential memory elements. In this paper, we proposed two new reversible logic gates MG-1 and MG-2. We then proposed new design techniques for latches and flip-flops with the help of the new proposed gates. The proposed designs are better than the existing ones in terms of number of gates, garbage outputs and delay.
△ Less
Submitted 26 July, 2014;
originally announced July 2014.
-
Quantum Cost Optimization for Reversible Sequential Circuit
Authors:
Md. Selim Al Mamun,
David Menville
Abstract:
Reversible sequential circuits are going to be the significant memory blocks for the forthcoming computing devices for their ultra low power consumption. Therefore design of various types of latches has been considered a major objective for the researchers quite a long time. In this paper we proposed efficient design of reversible sequential circuits that are optimized in terms of quantum cost, de…
▽ More
Reversible sequential circuits are going to be the significant memory blocks for the forthcoming computing devices for their ultra low power consumption. Therefore design of various types of latches has been considered a major objective for the researchers quite a long time. In this paper we proposed efficient design of reversible sequential circuits that are optimized in terms of quantum cost, delay and garbage outputs. For this we proposed a new 3*3 reversible gate called SAM gate and we then design efficient sequential circuits using SAM gate along with some of the basic reversible logic gates.
△ Less
Submitted 26 July, 2014;
originally announced July 2014.
-
Design of Reversible Counter
Authors:
Md. Selim Al Mamun,
B. K. Karmaker
Abstract:
This article presents a research work on the design and synthesis of sequential circuits and flip-flops that are available in digital arena; and describes a new synthesis design of reversible counter that is optimized in terms of quantum cost, delay and garbage outputs compared to the existing designs. We proposed a new model of reversible T flip-flop in designing reversible counter
This article presents a research work on the design and synthesis of sequential circuits and flip-flops that are available in digital arena; and describes a new synthesis design of reversible counter that is optimized in terms of quantum cost, delay and garbage outputs compared to the existing designs. We proposed a new model of reversible T flip-flop in designing reversible counter
△ Less
Submitted 29 March, 2014;
originally announced April 2014.
-
Engineering the Hardware/Software Interface for Robotic Platforms - A Comparison of Applied Model Checking with Prolog and Alloy
Authors:
Md Abdullah Al Mamun,
Christian Berger,
Jörgen Hansson
Abstract:
Robotic platforms serve different use cases ranging from experiments for prototyping assistive applications up to embedded systems for realizing cyber-physical systems in various domains. We are using 1:10 scale miniature vehicles as a robotic platform to conduct research in the domain of self-driving cars and collaborative vehicle fleets. Thus, experiments with different sensors like e.g.~ultra-s…
▽ More
Robotic platforms serve different use cases ranging from experiments for prototyping assistive applications up to embedded systems for realizing cyber-physical systems in various domains. We are using 1:10 scale miniature vehicles as a robotic platform to conduct research in the domain of self-driving cars and collaborative vehicle fleets. Thus, experiments with different sensors like e.g.~ultra-sonic, infrared, and rotary encoders need to be prepared and realized using our vehicle platform. For each setup, we need to configure the hardware/software interface board to handle all sensors and actors. Therefore, we need to find a specific configuration setting for each pin of the interface board that can handle our current hardware setup but which is also flexible enough to support further sensors or actors for future use cases. In this paper, we show how to model the domain of the configuration space for a hardware/software interface board to enable model checking for solving the tasks of finding any, all, and the best possible pin configuration. We present results from a formal experiment applying the declarative languages Alloy and Prolog to guide the process of engineering the hardware/software interface for robotic platforms on the example of a configuration complexity up to ten pins resulting in a configuration space greater than 14.5 million possibilities. Our results show that our domain model in Alloy performs better compared to Prolog to find feasible solutions for larger configurations with an average time of 0.58s. To find the best solution, our model for Prolog performs better taking only 1.38s for the largest desired configuration; however, this important use case is currently not covered by the existing tools for the hardware used as an example in this article.
△ Less
Submitted 16 January, 2014;
originally announced January 2014.
-
A Novel Approach for Designing Online Testable Reversible Circuits
Authors:
Md. Selim Al Mamun,
Pronab Kumar Mondal,
Uzzal Kumar Prodhan
Abstract:
Reversible logic is gaining interest of many researchers due to its low power dissipating characteristic. In this paper we proposed a new approach for designing online testable reversible circuits. The resultant testable reversible circuit can detect any single bit error whiles it is operating. Appropriate theorems and lemmas are presented to clarify the proposed design. The experimental results s…
▽ More
Reversible logic is gaining interest of many researchers due to its low power dissipating characteristic. In this paper we proposed a new approach for designing online testable reversible circuits. The resultant testable reversible circuit can detect any single bit error whiles it is operating. Appropriate theorems and lemmas are presented to clarify the proposed design. The experimental results show that our design approach is superior in terms of number of number of gates, garbage outputs and quantum cost.
△ Less
Submitted 22 December, 2013;
originally announced December 2013.
-
Design of Reversible Random Access Memory
Authors:
Md. Selim Al Mamun,
Syed Monowar Hossain
Abstract:
Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper we proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory we proposed a reversible decoder and a write enable reversible master slave D flip-flop. All the…
▽ More
Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper we proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory we proposed a reversible decoder and a write enable reversible master slave D flip-flop. All the reversible designs are superior in terms of quantum cost, delay and garbage outputs compared to the designs existing in literature.
△ Less
Submitted 22 December, 2013;
originally announced December 2013.
-
The effect of heat treatments and coatings on the outgassing rate of stainless steel chambers
Authors:
M. A. Mamun,
A. A. Elmustafa,
M. L. Stutzman,
P. A. Adderley,
M. Poelker
Abstract:
The outgassing rates of three nominally identical 304L stainless steel vacuum chambers were measured to determine the effect of chamber coatings and heat treatments. One chamber was coated with titanium nitride (TiN) and one with amorphous silicon (a-Si) immediately following fabrication. The last chamber was first tested without any coating, and then coated with a-Si following a series of heat tr…
▽ More
The outgassing rates of three nominally identical 304L stainless steel vacuum chambers were measured to determine the effect of chamber coatings and heat treatments. One chamber was coated with titanium nitride (TiN) and one with amorphous silicon (a-Si) immediately following fabrication. The last chamber was first tested without any coating, and then coated with a-Si following a series of heat treatments. The outgassing rate of each chamber was measured at room temperatures between 15 and 30 °C following bakes at temperatures between 90 and 400 °C. Measurements for bare steel showed a significant reduction in the outgassing rate by nearly a factor of 20 after a 400 °C heat treatment (3.5x10-12 Torr L s-1 cm-2 prior to heat treatment, reduced to 1.7x10-13 Torr L s-1 cm-2 following heat treatment). The chambers that were coated with a-Si showed minimal change in outgassing rates with heat treatment, though an outgassing rate reduced by heat treatments prior to a-Si coating was successfully preserved throughout a series of bakes. The TiN coated chamber exhibited remarkably low outgassing rates, up to four orders of magnitude lower than the uncoated stainless steel, but the uncertainty in these rates is large due to the sensitivity limitations of the spinning rotor gauge accumulation measurement and the possibility of a small pump speed due to inhomogeneity in the TiN coating. The outgassing results are discussed in terms of diffusion-limited versus recombination-limited processes.
△ Less
Submitted 27 January, 2014; v1 submitted 16 July, 2013;
originally announced July 2013.
-
A New Compression Based Index Structure for Efficient Information Retrieval
Authors:
Md. Abdullah al Mamun,
Md. Hanif,
Md. Rakib Uddin,
Tanvir Ahmed,
Md. Mofizul Islam
Abstract:
Finding desired information from large data set is a difficult problem. Information retrieval is concerned with the structure, analysis, organization, storage, searching, and retrieval of information. Index is the main constituent of an IR system. Now a day exponential growth of information makes the index structure large enough affecting the IR system's quality. So compressing the Index structure…
▽ More
Finding desired information from large data set is a difficult problem. Information retrieval is concerned with the structure, analysis, organization, storage, searching, and retrieval of information. Index is the main constituent of an IR system. Now a day exponential growth of information makes the index structure large enough affecting the IR system's quality. So compressing the Index structure is our main contribution in this paper. We compressed the document number in inverted file entries using a new coding technique based on run-length encoding. Our coding mechanism uses a specified code which acts over run-length coding. We experimented and found that our coding mechanism on an average compresses 67.34% percent more than the other techniques.
△ Less
Submitted 24 September, 2012;
originally announced September 2012.
-
Policy based intrusion detection and response system in hierarchical WSN architecture
Authors:
Mohammad Saiful Islam Mamun,
A. F. M Sultanul Kabir,
Md. Sakhawat Hossen,
Md. Razib Hayat Khan
Abstract:
In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose…
▽ More
In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose a policy based IDS for hierarchical architecture that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed IDS architecture we followed clustering mechanism to build four level hierarchical network which enhance network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection that concentrates on power saving of sensor nodes by distributing the responsibility of intrusion detection among different layers. We also introduce a policy based intrusion response system for hierarchical architecture.
△ Less
Submitted 7 September, 2012;
originally announced September 2012.
-
An Optimized Signature Verification System for Vehicle Ad hoc NETwork
Authors:
Mohammad Saiful Islam Mamun,
Atsuko Miyaji
Abstract:
This paper1 presents an efficient approach to an existing batch verification system on Identity based group signature (IBGS) which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computa…
▽ More
This paper1 presents an efficient approach to an existing batch verification system on Identity based group signature (IBGS) which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computations in batch verification proposed by B. Qin et al. for large scale VANET. We introduce a batch scheduling algorithm for batch verification targeting further minimization the batch computation time.
△ Less
Submitted 24 August, 2012;
originally announced August 2012.
-
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information
Authors:
A. F. M. Sultanul Kabir,
Mohammad Saiful Islam Mamun
Abstract:
A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex…
▽ More
A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex interactions with the system. As the users have no prior knowledge of the sensor data or services our aim is to develop a visual query interface where users can feed more user friendly queries and machine can understand those. In this paper work, we have developed an Interactive visual query interface for the users. To accomplish this we have considered several use cases and we have derived graphical representation of query from their text based format for those use case scenario. We have facilitated the user by extracting class, subclass and properties from Ontology. To do so we have parsed OWL file in the user interface and based upon the parsed information users build visual query. Later on we have translated the visual query languages into SPARQL query, a machine understandable format which helps the machine to communicate with the underlying technology.
△ Less
Submitted 18 August, 2012;
originally announced August 2012.
-
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
Authors:
Mohammad Saiful Islam Mamun,
A. F. M. Sultanul Kabir
Abstract:
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven…
▽ More
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
△ Less
Submitted 18 August, 2012;
originally announced August 2012.