46 results on '"Aslam Khan"'
Search Results
2. Digital Twin Aided IC Packaging Structure Analysis for High-quality Sample Preparation
- Author
-
Nathan Jessurun, John True, Aslam Khan, Navid Asadizanjani, Chengjie Xi, and Nidish Vashistha
- Subjects
Structure analysis ,Computer science ,business.industry ,media_common.quotation_subject ,Sample preparation ,Quality (business) ,Integrated circuit packaging ,Process engineering ,business ,media_common - Published
- 2021
3. Formal Analysis of Language-Based Android Security Using Theorem Proving Approach
- Author
-
Wilayat Khan, Muhammad Kamran, Abdelouahid Derhab, Farrukh Aslam Khan, and Aakash Ahmad
- Subjects
Correctness ,General Computer Science ,Computer science ,02 engineering and technology ,computer.software_genre ,theorem proving ,Data integrity ,locally nameless representation ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,machine-readable proofs ,Android (operating system) ,formal verification ,Formal verification ,Programming language ,Proof assistant ,General Engineering ,020206 networking & telecommunications ,language-based security ,Automated theorem proving ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,computer ,Mobile device ,Android security ,lcsh:TK1-9971 - Abstract
Mobile devices are an indispensable part of modern-day lives to support portable computations and context-aware communication. Android applications within a mobile device share data to support application operations and better user experience, which also increases security risks to device’s data integrity and confidentiality. To analyze the security provided by the Android permissions, modern security techniques, based on the programming languages, have been used to enforce best practices for developing the secure Android applications. Android security assessment, based on the language-based techniques in an informal setting without formal tool support, is tedious and error-prone. Furthermore, the lack of proof of the soundness of the language-based techniques raises questions about the validity of the analysis. To enable computer-aided formal verification in Android security domain, we have developed a mathematical model of language-based Android security using computer-based proof assistant Coq. One of the main challenges for mechanizing the language-based security in theorem prover relates to the complexity of variable bindings in language-based security techniques. As the main contributions of the paper: 1) the language-based security, including variable binding, is formalized in theorem prover Coq; 2) a formal type checker is built to type check (capture safe data flows within) Android applications using computer; and 3) the soundness of the language-based security technique (type system) is mechanically verified. The formal model of the Android type system and their proof of soundness are machine-readable, and their correctness can be checked in the computer using Coq proof and type checkers.
- Published
- 2019
4. A New Users Rating-Trend Based Collaborative Denoising Auto-Encoder for Top-N Recommender Systems
- Author
-
Naveed Ishtiaq Chaudhary, Syed M. Zubair, Zeshan Aslam Khan, Kashif Imran, Rehan Ahmad, and Sharjeel Abid Butt
- Subjects
top-N recommendations ,General Computer Science ,Computer science ,General Engineering ,Recommender system ,computer.software_genre ,collaborative filtering ,denoising ,e-commerce ,General Materials Science ,Data mining ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Denoising auto encoder ,recommender systems ,computer ,lcsh:TK1-9971 ,Auto-encoders - Abstract
To promote online businesses and sales, e-commerce industry focuses to fulfill users' demands by giving them top set of recommendations which are ranked through different ranking measures.Deep learning based auto-encoder models have further improved the performance of recommender systems. A state-of-the-art collaborative denoising auto-encoder (CDAE) models user-item interactions as a corrupted version of users rating inputs. However, this architecture still lacks users' ratings-trend information which is an important parameter to recommend top-N items to users. In this paper, building upon CDAE characteristics, we propose a novel users rating-trend based collaborative denoising auto-encoder (UT-CDAE) which determines user-item correlations by evaluating rating-trend(High or Low) of a user towards a set of items. This inclusion of a user's rating-trend provides additional regularization flexibility which helps to predict improved top-N recommendations. The correctness of the suggested method is verified through different ranking evaluation metrics i.e., (mean reciprocal rank, mean average precision and normalized discounted gain), for various input corruption values, learning rates and regularization parameters.Experiments on standard ML-100K and ML-1M datasets show that suggested model has improved performance overstate-of-the-art denoising auto-encodermodels.
- Published
- 2019
5. An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks
- Author
-
Muhammad Ismail, Abdelouahid Derhab, Ibrar Ahmad, Zahid Wadud, Farrukh Aslam Khan, Arbab Masood Ahmad, and Abdul Baseer Qazi
- Subjects
Routing protocol ,General Computer Science ,end-to-end delay (E2ED) ,business.industry ,Network packet ,Computer science ,void hole ,Node (networking) ,Reliability (computer networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,General Engineering ,potential forwarding nodes (PFNs) ,Transmission (telecommunications) ,Underwater wireless sensor networks (UWSNs) ,Bandwidth (computing) ,packet delivery ratio (PDR) ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Routing (electronic design automation) ,business ,lcsh:TK1-9971 ,Computer network ,Efficient energy use - Abstract
Underwater Wireless Sensor Networks (UWSNs) face numerous challenges due to small bandwidth, long propagation delay, limited energy resources and high deployment cost. Development of efficient routing strategies is, therefore, mandatory and has remained the focus of researchers over the past few years. To address these challenges and to further improve the performance of the existing protocols, many routing protocols have been designed. In Weighting Depth and Forwarding Area Division-Depth Based Routing (WDFAD-DBR), the forwarding decision is based on the weighting depth difference, which is not an efficient way for void hole avoidance. In this paper, we propose a depth-based routing mechanism called Energy Balanced Efficient and Reliable Routing (EBER2) protocol for UWSNs. First, energy balancing among neighbors and reliability are achieved by considering residual energy and the number of Potential Forwarding Nodes (PFNs) of the forwarder node, respectively. Secondly, energy efficiency is enhanced by dividing the transmission range into power levels, and the forwarders are allowed to adaptively adjust their transmission power according to the farthest node in their neighbor list. Thirdly, duplicate packets are reduced by comparing depths, residual energy and PFNs among the neighbors. Moreover, network latency is decreased by deploying two sinks at those areas of the network that have high traffic density. The results of our simulations show that EBER2 has higher Packet Delivery Ratio (PDR), lower energy tax, and lesser duplicate packets than the WDFAD-DBR routing protocol.
- Published
- 2019
6. Design of Momentum Fractional Stochastic Gradient Descent for Recommender Systems
- Author
-
Syed M. Zubair, Muhammad Azeem, Zeshan Aslam Khan, Allah Ditta, and Hani Alquhayz
- Subjects
Momentum (technical analysis) ,Mathematical optimization ,General Computer Science ,Computer science ,General Engineering ,020206 networking & telecommunications ,momentum ,02 engineering and technology ,Recommender system ,fractional calculus ,Fractional calculus ,Stochastic gradient descent ,Rate of convergence ,stochastic gradient descent ,Scalability ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Recommender systems ,e-commerce ,020201 artificial intelligence & image processing ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Gradient descent ,lcsh:TK1-9971 - Abstract
The demand for recommender systems in E-commerce industry has increased tremendously. Efficient recommender systems are being proposed by different E-business companies with the intention to give users accurate and most relevant recommendation of products from huge amount of information. To improve the performance of recommender systems, various stochastic variants of gradient descent based algorithms have been reported. The scalability requirement of recommender systems needs algorithms with fast convergence to generate recommendations of specific items. Using the concepts of fractional calculus, an efficient variant of the stochastic gradient descent (SGD) was developed for fast convergence. Such fractional SGD (F-SGD) is further accelerated by adding a momentum term, thus termed as momentum fractional stochastic gradient descent (mF-SGD). The proposed mF-SGD method is shown to offer improved estimation accuracy and convergence rate, as compared to F-SGD and standard momentum SGD for different proportions of previous gradients, fractional orders, learning rates and number of features.
- Published
- 2019
7. A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments
- Author
-
Aftab Ali, Albert Y. Zomaya, Mohsin Iftikhar, Nur Al Hasan Haldar, Tanveer A. Zia, and Farrukh Aslam Khan
- Subjects
020205 medical informatics ,General Computer Science ,Computer science ,intrusion detection ,Real-time computing ,02 engineering and technology ,Intrusion detection system ,Markov model ,Computer security ,computer.software_genre ,Field (computer science) ,wireless body area networks ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,General Materials Science ,change detection ,Receiver operating characteristic ,business.industry ,Healthcare ,General Engineering ,020206 networking & telecommunications ,Data set ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Wireless sensor network ,computer ,lcsh:TK1-9971 ,Change detection - Abstract
The developments and applications of wireless body area networks (WBANs) for healthcare and remote monitoring have brought a revolution in the medical research field. Numerous physiological sensors are integrated in a WBAN architecture in order to monitor any significant changes in normal health conditions. This monitored data are then wirelessly transferred to a centralized personal server (PS). However, this transferred information can be captured and altered by an adversary during communication between the physiological sensors and the PS. Another scenario where changes can occur in the physiological data is an emergency situation, when there is a sudden change in the physiological values, e.g., changes occur in electrocardiogram (ECG) values just before the occurrence of a heart attack. This paper presents a centralized approach for the detection of abnormalities, as well as intrusions, such as forgery, insertions, and modifications in the ECG data. A simplified Markov model-based detection mechanism is used to detect changes in the ECG data. The features are extracted from the ECG data to form a feature set, which is then divided into sequences. The probability of each sequence is calculated, and based on this probability, the system decides whether the change has occurred or not. Our experiments and analyses show that the proposed scheme has a high detection rate for 5% as well as 10% abnormalities in the data set. The proposed scheme also has a higher true negative rate with a significantly reduced running time for both 5% and 10% abnormalities. Similarly, the receiver operating characteristic (ROC) and ROC convex hull have very promising results.
- Published
- 2017
8. Security Safety and Trust Management (SSTM' 19)
- Author
-
Kashif Kifayat, Fawad Khan, Farrukh Aslam Khan, Haider Abbas, Imran Rashid, and Asif Masood
- Subjects
Resilience (organizational) ,Risk analysis (engineering) ,Order (exchange) ,Computer science ,media_common.quotation_subject ,Trust management (information system) ,Context (language use) ,Security management ,Security policy ,Function (engineering) ,Information assurance ,media_common - Abstract
In today's Internet of Everything (IOE), security and safety hazards have been promptly increasing. The rapidly evolving and complex technological innovations continuously impede preemptive security and safety mechanisms. In such a scenario, well-functioning mechanisms and versatile systems are essential, which can contribute towards advanced safety and security approaches. To avoid the hazardous situation, these efficient systems and mechanisms work on two important principles including security policy to counter threats and the resilience to handle safety hazards. The role of trust to manage safety and security is significant. It is actually the belief that the system is competent enough to function securely, reliably, and dependably in a specific context. Therefore, the unified approach to manage trustworthiness, safety, and security on such systems can be of great importance. By developing trust among different entities involved in such systems/mechanisms, the security of the sensitive resources can be ensured more effectively. In the same way, several trust levels on the systems within a network could enhance cooperation and security by minimizing safety hazards and malicious activities. Moreover, there is a robust requirement of developing generic safety and security management mechanism, which should be reliable enough to handle multiple numbers and types of resources since systems/mechanisms integrate applications of different nature. Each of these applications/systems requires different safety rules, information assurance, and security policies that existing systems are incapable to manage. Therefore, in order to several types of resources, the co-engineering approach should be adopted during development, which addresses both safety hazards and security threats.
- Published
- 2019
9. A Multi-Classifier Framework for Open Source Malware Forensics
- Author
-
Hammad Afzal, Farrukh Aslam Khan, Muhammad Faisal Amjad, and Naeem Amjad
- Subjects
Computer science ,business.industry ,02 engineering and technology ,Machine learning ,computer.software_genre ,Cross-validation ,Naive Bayes classifier ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Cyber-attack ,Malware ,020201 artificial intelligence & image processing ,Artificial intelligence ,Malware analysis ,Heuristics ,business ,computer ,Classifier (UML) ,Pace - Abstract
Traditional anti-virus technologies have failed to keep pace with proliferation of malware due to slow process of their signatures and heuristics updates. Similarly, there are limitations of time and resources in order to perform manual analysis on each malware. There is a need to learn from this vast quantity of data, containing cyber attack pattern, in an automated manner to proactively adapt to ever-evolving threats. Machine learning offers unique advantages to learn from past cyber attacks to handle future cyber threats. The purpose of this research is to propose a framework for multi-classification of malware into well-known categories by applying different machine learning models over corpus of malware analysis reports. These reports are generated through an open source malware sandbox in an automated manner. We applied extensive pre-modeling techniques for data cleaning, features exploration and features engineering to prepare training and test datasets. Best possible hyper-parameters are selected to build machine learning models. These prepared datasets are then used to train the machine learning classifiers and to compare their prediction accuracy. Finally, these results are validated through a comprehensive 10-fold cross-validation methodology. The best results are achieved through Gaussian Naive Bayes classifier with random accuracy of 96% and 10-Fold Cross Validation accuracy of 91.2%. The said framework can be deployed in an operational environment to learn from malware attacks for proactively adapting matching counter measures.
- Published
- 2018
10. Security Safety and Trust Management (SSTM' 19)
- Author
-
Abbas, Haider, primary, Aslam Khan, Farrukh, additional, Kifayat, Kashif, additional, Masood, Asif, additional, Rashid, Imran, additional, and Khan, Fawad, additional
- Published
- 2019
- Full Text
- View/download PDF
11. Security, Safety and Trust Management (SSTM ‘17)
- Author
-
Eugenio Orlandi, Farrukh Aslam Khan, Asif Masood, Haider Abbas, and Oliver Popov
- Subjects
Knowledge management ,Computer science ,business.industry ,Middleware (distributed applications) ,Programming paradigm ,Trust management (information system) ,computer.software_genre ,business ,computer - Abstract
The goal of SSTM'17 was to attract young researchers, Ph.D. students, practitioners, and industry experts to bring contributions in the area of Security, Safety and Trust Management, especially in the developments of computing, management and programming models, technologies, framework and middleware
- Published
- 2017
12. Performance analysis of block matching motion estimation algorithms for HD videos with different search parameters
- Author
-
Muhammad Muzammil, Zeshan Aslam Khan, Imdad Ali, and M. Obaid Ullah
- Subjects
Computational complexity theory ,Computer science ,business.industry ,Pattern recognition ,02 engineering and technology ,Peak signal-to-noise ratio ,Pattern search ,03 medical and health sciences ,High-definition video ,0302 clinical medicine ,Motion estimation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm design ,030212 general & internal medicine ,Pattern matching ,Artificial intelligence ,business ,Coding (social sciences) - Abstract
High Definition (HD) videos are the most widely used in HD television and mobile phones now a days for transmission and storage. Due to large data size, HD videos require efficient and robust video coding mechanism to enable real-time encoding. Numerous Motion Estimation (ME) algorithms are proposed to reduce the computational complexity of the coding process. In this paper, we present the performance analysis of some famous Block Matching ME Algorithms (BMAs) for HD videos. Different performance measuring parameters are used to evaluate the performance of BMAs, like Peak Signal to Noise Ratio (PSNR), ME time, Mean Square Error (MSE). The simulation results show that the Adaptive Rood Pattern Search (ARPS) ME algorithm outperforms in term of MSE, PSNR and number of search points, for HD (720p) videos, over various search parameters. ARPS, Diamond Search (DS) and Flatted Hexagon Search (FHS) ME algorithms improve the PSNR from 32dB to 48dB for some video sequences, by increasing search range, whereas the number of search points also increased with the same parameter that causes to increased ME time and computational complexity.
- Published
- 2016
13. Network Intrusion Detection Using Diversity-Based Centroid Mechanism
- Author
-
Arif Jamal Malik, Farrukh Aslam Khan, and Muhammad Shafique Gondal
- Subjects
Basis (linear algebra) ,Computer science ,business.industry ,Anomaly-based intrusion detection system ,Centroid ,Pattern recognition ,Intrusion detection system ,computer.software_genre ,Statistical classification ,Point (geometry) ,Artificial intelligence ,Data mining ,False positive rate ,business ,computer ,Diversity (business) - Abstract
Threats to computer networks are numerous and potentially devastating. Intrusion detection techniques provide protection to our data and track unauthorized access. Many algorithms and techniques have been proposed to improve the accuracy and minimize the false positive rate of the intrusion detection system (IDS). Statistical techniques, evolutionary techniques, and data mining techniques have also been used for this purpose. In this paper, we use a centroid-based technique for network intrusion detection in which the centroid is constructed on the basis of diversity. Diversity of a point is the sum of the distances from a point to all other points in a cluster. The point having minimum diversity is chosen as a centroid. The performance of diversity-based centroid shows significant improvement in the classification of intrusions. Experimental results on the KDDCup99 dataset demonstrate that the proposed method shows excellent performance in terms of accuracy, detection rate, and false positive rate.
- Published
- 2015
14. ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment
- Author
-
Nur Al Hasan Haldar, Farrukh Aslam Khan, Aftab Ali, and Sana Ullah
- Subjects
Mahalanobis distance ,medicine.diagnostic_test ,Left bundle branch block ,Computer science ,Speech recognition ,Feature extraction ,Right bundle branch block ,medicine.disease ,Ventricular contraction ,Body area network ,cardiovascular system ,medicine ,Sinus rhythm ,Electrocardiography - Abstract
Arrhythmia is caused by improper and irregular sinus rhythm or heartbeats. In order to diagnose cardiac arrhyth- mia, electrocardiogram (ECG) beat classification and analysis is very necessary. The efficiency and accuracy of any classification model highly depends on selecting the most relevant features. The aim of this study is to classify different arrhythmic beats with a reduced set of relevant-only ECG features. To optimize the ECG feature selection process and increase the classification accuracy, a Mahalanobis-Taguchi System (MTS) based classifica- tion and analysis scheme is proposed. MTS is a multi-dimensional pattern recognition system which dynamically selects important features for further analysis. Arrhythmia can occur at any time and thus requires proper and continuous monitoring of the patient to reduce sudden heart attacks. The proposed MTS- based classification scheme is integrated with a Wireless Body Area Network (WBAN) for pervasive monitoring. The proposed scheme is analyzed and compared with a state-of-the-art scheme in terms of sensitivity, specificity, and accuracy. The results show that the proposed scheme performs significantly better than the other scheme by achieving high sensitivity, specificity, and classification accuracy for different arrhythmic heartbeats i.e., Left Bundle Branch Block (LBBB), Premature Ventricular Contraction (PVC), Right Bundle Branch Block (RBBB), and Atrial Premature Contraction (APC).
- Published
- 2014
15. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research.
- Author
-
Siddique, Kamran, Akhtar, Zahid, Aslam Khan, Farrukh, and Kim, Yangwoo
- Subjects
SUPPORT vector machines ,MULTIPLE correspondence analysis (Statistics) - Abstract
Many consider the KDD Cup 99 data sets to be outdated and inadequate. Therefore, the extensive use of these data sets in recent studies to evaluate network intrusion detection systems is a matter of concern. We contribute to the literature by addressing these concerns. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
16. Particle Swarm Optimization with non-linear velocity
- Author
-
Farrukh Aslam Khan and Arif Jamal Malik
- Subjects
Mathematical optimization ,Nonlinear system ,Meta-optimization ,Computer science ,Particle swarm optimization ,Multi-swarm optimization ,Metaheuristic - Published
- 2014
17. Design and simulation of optical waveguide for electro-optic modulator
- Author
-
Aslam Khan and Rekha Mehra
- Subjects
business.industry ,Computer science ,Impedance matching ,Physics::Optics ,Electro-optic modulator ,Solver ,Physics::Classical Physics ,Capacitance ,Waveguide (optics) ,Electrode ,Optoelectronics ,business ,Electrical impedance ,Voltage - Abstract
Optical waveguide is the backbone of an electrooptic modulator (EOM). In this paper an optical waveguide design is proposed for EOM. The proposed optical waveguide provide better impedance and velocity matching to the electrode as compare to the previous work done on electro-optic modulator. In addition to this, the push pull technique and polymer integration used in the design of EOM reduces required drive voltage and increase the speed of operation. Travelling wave structure is used in the proposed design, which is proved to be advantages for EOM as there is no limitation on modulator speed due to resistance and capacitance as in lumped element design. The electrode parameters are analysed with the help of an electro-optic solver tool.
- Published
- 2014
18. Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
- Author
-
Jalal Al Muhtadi, Farrukh Aslam Khan, Haider Abbas, and Natasha Arjumand Shoaib Mirza
- Subjects
Advanced persistent threat ,Exploit ,Security service ,Computer science ,Denial-of-service attack ,Asset (computer security) ,Computer security ,computer.software_genre ,Communications security ,computer ,Security information and event management ,Threat - Abstract
Information and communication security has gained significant importance due to its wide spread use, increased sophistication and complexity in its deployment. On the other hand, more sophisticated and stealthy techniques are being practiced by the intruder's group to penetrate and exploit the technology and attack detection. One such treacherous threat to all critical assets of an organization is Advanced Persistent Threat (APT). Since APT attack vector is not previously known, consequently this can harm the organization's assets before the patch for this security flaw is released/available. This paper presents a preliminary research effort to counter the APT or zero day attacks at an early stage by detecting malwares. Open Source version of Security Information and Event Management (SIEM) is used to detect denial of service attack launched through remote desktop service. The framework presented in this paper also shows the efficiency of the technique and it can be enhanced with more sophisticated mechanisms for APT attack detection.
- Published
- 2014
19. A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network
- Author
-
Arif Jamal Malik and Farrukh Aslam Khan
- Subjects
Network security ,business.industry ,Computer science ,Particle swarm optimization ,Feature selection ,Intrusion detection system ,Machine learning ,computer.software_genre ,Evolutionary computation ,Random forest ,Artificial intelligence ,Data mining ,Multi-swarm optimization ,business ,computer - Abstract
A system connected to a network is an open choice for network intrusions unless a powerful intrusion detection or prevention system is implemented. Network security has become a serious issue due to increased unauthorized access and manipulation of network resources. Evolutionary approaches play an important role in identifying attacks with high detection rates and low false discovery rates. In this paper, a binary version of multi-objective particle swarm optimization (PSO) approach is used to detect PROBE attacks in a network. A vector evaluated PSO approach is used in the proposed technique with two objectives i.e., intrusion detection rate and false discovery rate, to guide the process of feature selection. The experiments are performed using the well-known KDD99Cup dataset. Multi-objective PSO approach is used for feature selection from a set of 41 features and Random Forests (RF), a highly accurate and fast algorithm, is used for classification. Empirical results show that the proposed technique outperforms well-known classification and regression techniques in most of the cases.
- Published
- 2013
20. Optimized Energy-Efficient Iterative Distributed Localization for Wireless Sensor Networks
- Author
-
Mohsin Iftikhar, Farrukh Aslam Khan, and Mansoor-ul-Haque
- Subjects
Key distribution in wireless sensor networks ,Computer science ,Iterative method ,Real-time computing ,Particle swarm optimization ,Wireless sensor network ,Energy (signal processing) ,Field (computer science) ,Efficient energy use - Abstract
Location information of sensor nodes deployed in the mission field plays an important role on the performance of Wireless Sensor Networks (WSNs). It is highly desirable to develop localization systems by keeping in mind WSN constraints and its location estimation capability. Optimization algorithms have proven to be good candidates for quality of position estimation. Flip ambiguity is one of the major challenges in such techniques. In this paper two types of constraints are proposed to overcome this problem. Particle Swarm Optimization (PSO) in conjunction with the proposed constraints is used iteratively in distributed manners to localize blind nodes in the WSN. Simulation results show that the proposed technique overcomes the problem of flip ambiguity and is resource efficient as well. The proposed technique mitigates 95 percent (worst-case) to 100 percent (best-case) flips and saves 80 percent (worst-case) to 87 percent (best-case) energy as compared to the previous technique available in the literature.
- Published
- 2013
21. A Multi-agent Model for Fire Detection in Coal Mines Using Wireless Sensor Networks
- Author
-
Haider Abbas, Tony Larsson, Edison Pignaton de Freitas, and Zeshan Aslam Khan
- Subjects
Base station ,Key distribution in wireless sensor networks ,Fire detection ,Computer science ,business.industry ,Multi-agent system ,Distributed computing ,Network delay ,Overhead (computing) ,business ,Reactive planning ,Wireless sensor network ,Computer network - Abstract
This paper presents an application for monitoring and detection of fire in coal mines using wireless sensor networks (WSNs). The application uses BDI (Belief, Desire and Intention) based multi-agent model and its implementation on sensor networks. The language used for implementation is interpreted by Jason; an extension of AgentSpeak which is based on the BDI Architecture. The BDI agents are reactive planning systems; systems that are not meant to compute the value of a function and terminate but rather designed to be permanently running and reacting to some form of event. The distributed model of the environment is adopted to overcome the communication overhead, power consumption, network delay and reliability on a centralized base station.
- Published
- 2013
22. Welfare State Optimization
- Author
-
Farrukh Aslam Khan and Hamid Ali
- Subjects
Mathematical optimization ,Optimization problem ,Meta-optimization ,Computer science ,Derivative-free optimization ,Constrained optimization ,Test functions for optimization ,Particle swarm optimization ,Imperialist competitive algorithm ,Multi-swarm optimization ,Multi-objective optimization ,Metaheuristic ,Evolutionary computation - Abstract
In this paper, we propose a new evolutionary optimization algorithm called Welfare State Optimization (WSO) for solving optimization problems. In this algorithm, we emulate the behavior of welfare states to improve the lives of their citizens. The work is motivated by the fact that the welfare state optimally uses its resources (optimization) and restricts a group to lead the whole nation to a specific direction (local trap). So, the behavior of a welfare state is quite suitable for optimization algorithms. The proposed WSO algorithm is validated using ten standard benchmark functions and its performance is compared with five different variants of Particle Swarm Optimization (PSO) available in the literature. The results of our experiments are very promising and confirm the validity of the proposed approach. Hence, WSO algorithm can be considered as a strong alternative to solve optimization problems.
- Published
- 2013
23. Group Counseling Optimization for multi-objective functions
- Author
-
Farrukh Aslam Khan and Hamid Ali
- Subjects
Mathematical optimization ,Operator (computer programming) ,Optimization problem ,Heuristic (computer science) ,Group (mathematics) ,Group counseling ,Pareto principle ,Benchmark (computing) ,Multi-objective optimization ,Mathematics - Abstract
Group Counseling Optimizer (GCO) is a new heuristic inspired by human behavior in problem solving during counseling within a group. GCO has been found to be successful in case of single-objective optimization problems, but so far it has not been extended to deal with multi-objective optimization problems. In this paper, a Pareto dominance based GCO technique is presented in order to allow this approach to handle multi-objective optimization problems. In order to compute change in decision for each individual, we also incorporate a selfbelief counseling probability operator in the original GCO algorithm that enriches the exploratory capabilities of our algorithm. The proposed Multi-objective Group Counseling Optimizer (MOGCO) is tested using several standard benchmark functions and metrics taken from the literature for multiobjective optimization. The results of our experiments indicate that the approach is highly competitive and can be considered as a viable alternative to solve multi-objective optimization problems.
- Published
- 2013
24. Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs
- Author
-
Humaira Ehsan and Farrukh Aslam Khan
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Ad hoc wireless distribution service ,Computer security ,computer.software_genre ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Packet drop attack ,Ad hoc On-Demand Distance Vector Routing ,business ,computer ,Computer network - Abstract
From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key reasons for this is the ambiguous nature of insider attacks in these networks. In recent years, many attempts have been made to study the intrinsic attributes of these insider attacks but the focus has generally been on the analysis of one or very few particular attacks, or only the survey of various attacks without any performance analysis. Therefore, a major feature that research has lately lacked is a detailed and comprehensive study of the effects of various insider attacks on the overall performance of MANETs. In this paper we investigate, in detail, some of the most severe attacks against MANETs namely the blackhole attack, sinkhole attack, selfish node behavior, RREQ flood, hello flood, and selective forwarding attack. A detailed NS-2 implementation of launching these attacks successfully using Ad hoc On-Demand Distance Vector (AODV) routing protocol has been presented and a comprehensive and comparative analysis of these attacks is performed. We use packet efficiency, routing overhead, and throughput as our performance metrics. Our simulationbased study shows that flooding attacks like RREQ flood and hello flood drastically increase the routing overhead of the protocol. Route modification attacks such as sinkhole and blackhole are deadly and severely affect the packet efficiency and bring down the throughput to unacceptable ranges.
- Published
- 2012
25. Binary PSO and random forests algorithm for PROBE attacks detection in a network
- Author
-
Arif Jamal Malik, Waseem Shahzad, and Farrukh Aslam Khan
- Subjects
Computer science ,Network security ,business.industry ,Feature extraction ,Binary number ,Particle swarm optimization ,Pattern recognition ,Intrusion detection system ,computer.software_genre ,Random forest ,Statistical classification ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial intelligence ,Data mining ,business ,computer ,Classifier (UML) ,Algorithm - Abstract
During the past few years, huge amount of network attacks have increased the requirement of efficient network intrusion detection techniques. Different classification techniques for identifying various attacks have been proposed in the literature. In this paper we propose and implement a hybrid classifier based on binary particle swarm optimization (BPSO) and random forests (RF) algorithm for the classification of PROBE attacks in a network. PSO is an optimization method which has a strong global search capability and is used for fine-tuning of the features whereas RF, a highly accurate classifier, is used here for classification. We demonstrate the performance of our technique using KDD99Cup dataset. We also compare the performance of our proposed classifier with eight other well-known classifiers and the results show that the performance achieved by the proposed classifier is much better than the other approaches.
- Published
- 2011
26. Notice of Retraction: Consumer behavior during high inflation and new branding in Pakistan
- Author
-
Imran Haider Naqvi, Kashif Ur Rehman, Muhammad Aslam Khan, and Abrar Ahmad
- Subjects
Inflation ,education.field_of_study ,Middle class ,Descriptive statistics ,business.industry ,media_common.quotation_subject ,Population ,Monetary economics ,Market research ,Working class ,Economics ,Upper class ,Marketing ,business ,education ,Consumer behaviour ,media_common - Abstract
Domestic and international investors are interested in introducing their brands in Pakistan, the question is whether period of high inflation is suitable for introducing new brand in Pakistan. This study learned the consumer behavior during extremely high inflation period in Pakistan. The study conducted in Karachi, financial hub of the country. As population of Pakistan consisted of mainly three income classes, that are upper, middle and lower, the study selected randomly 100 consumers from each class of consumers. The descriptive statistics discovered that inflation caused a compromising change in behavior of consumers from the lower class, the study found a considerable change in terms of the buying capacity as well as selection of the brand among consumers from lower income class. The study further found little change in both these dimensions among the consumers from the middle class. However, the study did not find any large change in the behavior of the consumers from the upper class. It concludes that income level is the real determinant of consumer behavior while inflation is merely a catalyst. Based on such findings, the study contributed that period of high inflation in Pakistan is suitable for promoting new local brands providing economy in the markets where majority of the consumers come from middle and lower classes of income.
- Published
- 2010
27. SRCP: Sensor Reliability and Congestion Control Protocol
- Author
-
Raees Khan and Farrukh Aslam Khan
- Subjects
Network congestion ,Channel capacity ,Computer science ,business.industry ,Network packet ,Packet loss ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,business ,Wireless sensor network ,Computer network ,Scheduling (computing) - Abstract
In this paper, a new transport protocol called Sensor Reliability and Congestion Control Protocol (SRCP) is proposed for Wireless Sensor Networks (WSNs) which has both the functionalities of providing end-to-end reliability as well as delaybased congestion detection and control. It uses packet sequence numbering and Selective Negative Acknowledgements (SNACKs) for providing reliability in the form of retransmissions. The sink continuously records trip times and receives the rate of incoming packets and observes the delay trend. Congestion is avoided and actively controlled by sending control packets containing packet receiving rate value to the sending sensors if there is an increase trend in the trip times. Exact rate adjustment is performed by the sender according to the receiving rate and then slow additive increase is done after small fixed intervals of time resulting in fairness among sensors. The simulation results show that SRCP saves a lot of energy by scheduling packets according to the channel capacity, resulting in small number of packet losses while maintaining the data fidelity.
- Published
- 2010
28. Cryptanalysis of Four-Rounded DES Using Ant Colony Optimization
- Author
-
Farrukh Aslam Khan, Salabat Khan, and Waseem Shahzad
- Subjects
Theoretical computer science ,Differential cryptanalysis ,business.industry ,Computer science ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,law.invention ,Cipher ,Symmetric-key algorithm ,law ,Known-plaintext attack ,Linear cryptanalysis ,business ,Cryptanalysis ,Algorithm ,Block cipher - Abstract
It is hard for the cryptanalysts to apply traditional techniques and brute-force attacks against feistel ciphers due to their inherent structure based on high nonlinearity and low autocorrelation. In this paper, we propose a technique for the cryptanalysis of four-rounded Data Encryption Standard (DES) based on Binary Ant Colony Optimization (BACO). A known plaintext attack is used to recover the secret key of the DES cipher. The environment for the ants is a directed graph, which we call search space, is constructed for efficiently searching the secret key. We also develop a heuristic function which measures the quality of a constructed solution. Several optimum keys are computed over different runs on the basis of routes completed by the ants. These optimum keys are then used to find each individual bit of the 56 bit secret key used by DES. The results of our experiments show that ACO is an effective technique for the cryptanalysis of four-rounded DES. To the best of our knowledge, this is the first time that BACO has been used for this specific problem.
- Published
- 2010
29. A Location-Aware Zone-Based Routing Protocol for Mobile Ad hoc Networks
- Author
-
Wang-Cheol Song and Farrukh Aslam Khan
- Subjects
Zone Routing Protocol ,Dynamic Source Routing ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Ad hoc wireless distribution service ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Ad hoc On-Demand Distance Vector Routing ,Hardware_INTEGRATEDCIRCUITS ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
This paper presents a location-aware routing protocol for mobile ad hoc networks which uses zones for efficient routing. Unlike other protocols, on-demand routing is performed on part of the route requesting node within a zone where each zone has a leader node which is responsible for making routing decisions.
- Published
- 2006
30. Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework
- Author
-
Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Muhammad Rizwan, and Aftab Ali
- Subjects
Anti-malware system ,generative adversarial networks ,malware sandboxes ,malware ,unpacker ,performance ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The cyber realm is overwhelmed with dynamic malware that promptly penetrates all defense mechanisms, operates unapprehended to the user, and covertly causes damage to sensitive data. The current generation of cyber users is being victimized by the interpolation of malware each day due to the pervasive progression of Internet connectivity. Malware is dispersed to infiltrate the security, privacy, and integrity of the system. Conventional malware detection systems do not have the potential to detect novel malware without the accessibility of their signatures, which gives rise to a high False Negative Rate (FNR). Previously, there were numerous attempts to address the issue of malware detection, but none of them effectively combined the capabilities of signature-based and machine learning-based detection engines. To address this issue, we have developed an integrated Anti-Malware System (AMS) architecture that incorporates both conventional signature-based detection and AI-based detection modules. Our approach employs a Generative Adversarial Network (GAN) based Malware Classifier Optimizer (MCOGAN) framework, which can optimize a malware classifier. This framework utilizes GANs to generate fabricated benign files that can be used to train external discriminators for optimization purposes. We describe our proposed framework and anti-malware system in detail to provide a better understanding of how a malware detection system works. We evaluate our approach using the Figshare dataset and state-of-the-art models as discriminators. Our results showcase enhanced malware detection performance, yielding a 10% performance boost, thus affirming the efficacy of our approach compared to existing models.
- Published
- 2024
- Full Text
- View/download PDF
31. Detection of Data Scarce Malware Using One-Shot Learning With Relation Network
- Author
-
Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, and Mohammed Alqarni
- Subjects
Data-scarce malware ,feature embedding ,meta-learning ,one-shot learning ,relation network ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Malware has evolved to pose a major threat to information security. Efficient anti-malware software is essential in safeguarding confidential information from these threats. However, identifying malware continues to be a challenging task. Signature-based detection methods are quick but fail to detect unknown malware. Additionally, the traditional machine learning archetype requires a large amount of data to be effective, which hinders the ability of an anti-malware system to quickly learn about new threats with limited training samples. In a real-world setting, the majority of malware is found in the form of Portable Executable (PE) files. While there are various formats of PE files, samples of all formats such as ocx, acm, com, scr, etc., are not readily available in large numbers. Therefore, building a conventional Machine Learning (ML) model with greater generalization for data-scarce PE formats becomes a hefty task. Consequently, in such a scenario, Few-Shot learning (FSL) is helpful in detecting the presence of malware, even with a very small number of training samples. FSL techniques help to make predictions based on an insufficient number of samples. In this paper, we propose a novel architecture based on the Relation Network for FSL implementation. We propose a Discriminative Feature Embedder for feature extraction. These extracted features are passed to our proposed Relation Module (RM) for similarity measure. RM produces the relation scores that lead to improved classification. We use PE file formats, i.e., ocx, acm, com, and scr, after transforming them into images. We employ five-shot learning and then one-shot learning, which produces 94% accuracy with only one training instance. We observe that the proposed architecture outpaces the baseline method and provides enhanced accuracy by up to 94% with only one sample.
- Published
- 2023
- Full Text
- View/download PDF
32. GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures
- Author
-
Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, and Mamoona Humayun
- Subjects
Smart grid ,GINI index ,advanced metering infrastructure ,LLN ,RPL ,Sybil attack ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The smart grid relies on Advanced Metering Infrastructure (AMI) to function. Because of the significant packet loss and slow transmission rate of the wireless connection between smart meters in AMI, these infrastructures are considered Low-power and Lossy Networks (LLNs). The routing protocol in an AMI network is crucial for ensuring the availability and timeliness of data transfer. IPv6 Routing Protocol for Low-power and lossy networks (RPL) is an excellent routing option for the AMI communication configuration. However, it is highly at risk against many external and internal attacks, and its effectiveness may be severely diminished by Sybil assault. Different trust-based techniques have been suggested to mitigate internal attacks. However, existing trust systems have high energy consumption issues, which cause a reduction in the performance of LLNs due to complex calculations at the node level. Therefore, this paper presents a novel fog-enabled GINI index-based trust mechanism (GITM) to mitigate Sybil attacks using the forwarding behavior of legitimate member nodes. Regarding identifying and isolating Sybil assaults, our approach outperforms the state-of-the-art methods. GITM detects and isolates a more significant number of malicious network nodes compared to other techniques within a similar time frame. By using the proposed GITM framework, the Sybil attack detection rate increases by 4.48%, energy consumption reduces by 21%, and isolation latency reduces by 26.30% (concerning time). Furthermore, the end-to-end delay is merely 0.30% more in our case, and the number of control messages decreases by 28%.
- Published
- 2023
- Full Text
- View/download PDF
33. Lean Implementation Framework: A Case of Performance Improvement of Casting Process
- Author
-
Muhammad Aslam Khan, Muhammad Khurram Ali, and Muhammad Sajid
- Subjects
Lean implementation framework ,metal casting industry ,six sigma-DMAIC ,computer-assisted simulation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Globalization breeds increasing competition. In today’s dynamic climate, lean thinking has been found a promising business continuous improvement strategy for improving quality while reducing product cost and delivery time. However, its implementation has dynamic nature of challenges that varies from industry to industry and country to country, necessitating a specific framework by taking all stakeholders onboard. This study aims to propose a lean implementation framework to reduce defects and waste to improve the performance of the metal casting industry. The structure of the framework has been divided into three phases namely the lean conception phase, lean implementation phase, and lean sustainability phase. The proposed framework integrates the six sigma DMAIC methodology with lean tools and techniques to reduce defects and achieve performance improvement. A solid cast software has been used as a computer-assisted casting simulation tool to perform the analysis of defects within the casting. Further, the proposed framework is demonstrated and validated by employing a real-time case study that was manufactured using the sand casting process. The obtained results show remarkable improvements in poured metal weight (33.3%), mold weight including gating system (40%), casting yield (24.56%, rejection rate (90%), and financial saving (24.63%). As a result of analysis of percentage improvements data, the proposed framework can provide the practitioners with a standard roadmap and motivate the casting industries to implement lean for performance improvement through organizational change. Through the effective application of the lean implementation framework, quality enhancement has been demonstrated.
- Published
- 2022
- Full Text
- View/download PDF
34. Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network
- Author
-
Tengfei Wu, Lu Leng, Muhammad Khurram Khan, and Farrukh Aslam Khan
- Subjects
Biometric recognition ,palmprint verification ,palmvein verification ,fusion recognition ,deep hashing network ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Palmprint has attracted increasing attention due to its several advantages in the biometrics field. Deep learning has achieved remarkable performance in the computer vision area, so a large number of deep-learning-based methods have been proposed by the research community for palmprint recognition. The outputs of a deep hashing network (DHN) can be represented as a binary bit string, so DHN can reduce the storage and accelerate the matching/retrieval speed. In this paper, DHN is employed to extract the binary template for palmprint and palmvein verification. Spatial transformer network is used to overcome the rotation and dislocation. Palmprint and palmvein can be acquired from visible-light spectrums, including red (R), green (G), blue (B), and near infrared (NIR) spectrum, respectively. Since the features in different spectrums are different, their complementary advantages can be exploited to the full by fusion. Image-level fusion and score-level fusion are developed for palmprint-palmvein fusion recognition. The experiments demonstrate that score-level fusion can improve the accuracy efficiently.
- Published
- 2021
- Full Text
- View/download PDF
35. Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review
- Author
-
Farrukh Aslam Khan, Khan Zeb, Mabrook Al-Rakhami, Abdelouahid Derhab, and Syed Ahmad Chan Bukhari
- Subjects
Diabetes ,data mining ,big data ,prediction ,detection ,e-Health ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Diabetes is one of the most rapidly growing chronic diseases, which has affected millions of people around the globe. Its diagnosis, prediction, proper cure, and management are crucial. Data mining based forecasting techniques for data analysis of diabetes can help in the early detection and prediction of the disease and the related critical events such as hypo/hyperglycemia. Numerous techniques have been developed in this domain for diabetes detection, prediction, and classification. In this paper, we present a comprehensive review of the state-of-the-art in the area of diabetes diagnosis and prediction using data mining. The aim of this paper is twofold; firstly, we explore and investigate the data mining based diagnosis and prediction solutions in the field of glycemic control for diabetes. Secondly, in the light of this investigation, we provide a comprehensive classification and comparison of the techniques that have been frequently used for diagnosis and prediction of diabetes based on important key metrics. Moreover, we highlight the challenges and future research directions in this area that can be considered in order to develop optimized solutions for diabetes detection and prediction.
- Published
- 2021
- Full Text
- View/download PDF
36. Tweet-Based Bot Detection Using Big Data Analytics
- Author
-
Abdelouahid Derhab, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan, and Jalal Al-Muhtadi
- Subjects
Social media ,Twitter ,big data analytics ,shallow learning ,deep learning ,tweet-based bot detection ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Twitter is one of the most popular micro-blogging social media platforms that has millions of users. Due to its popularity, Twitter has been targeted by different attacks such as spreading rumors, phishing links, and malware. Tweet-based botnets represent a serious threat to users as they can launch large-scale attacks and manipulation campaigns. To deal with these threats, big data analytics techniques, particularly shallow and deep learning techniques have been leveraged in order to accurately distinguish between human accounts and tweet-based bot accounts. In this paper, we discuss existing techniques, and provide a taxonomy that classifies the state-of-the-art of tweet-based bot detection techniques. We also describe the shallow and deep learning techniques for tweet-based bot detection, along with their performance results. Finally, we present and discuss the challenges and open issues in the area of tweet-based bot detection.
- Published
- 2021
- Full Text
- View/download PDF
37. Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks
- Author
-
Muhammad Ismail, Mazhar Islam, Ibrar Ahmad, Farrukh Aslam Khan, Abdul Baseer Qazi, Zawar Hussain Khan, Zahid Wadud, and Mabrook Al-Rakhami
- Subjects
Underwater wireless sensor networks (UWSNs) ,reliability ,potential forwarding nodes (PFNs) ,end-to-end delay (E2ED) ,packet delivery ratio (PDR) ,priority function (PF) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The increased need to gather scientific data and the renewed drive to explore underwater natural resources has led more and more researchers to study the underwater environment. This has resulted in enormous attention being given to Underwater Wireless Sensor Networks (UWSNs) all over the world. However, UWSNs are faced with some major challenges including harsh environment, higher propagation delay, and limited battery power of the sensor nodes. To address these challenges, several routing schemes have been proposed. In this paper, we propose a routing strategy, called Reliable Path Selection and Opportunistic Routing (RPSOR) for UWSNs, which is a significantly improved version of Weighting Depth and Forwarding Area Division Depth Based Routing (WDFAD-DBR). RPSOR is based on three main factors: Advancement factor (ADVf), which depends on the depth of current as well as next hop forwarding node; Reliability index (RELi), which depends on the energy of the current forwarder as well as average energy in the next expected forwarding region; and Shortest Path Index (SPi), which is calculated on the basis of number of hops to the sink and average depth of neighbors in the next expected hop. To deal with the void hole problem and improve the Packet Delivery Ratio (PDR), we follow the more reliable path towards the sink by calculating RELi for a node. At the end, we perform extensive simulations and compare our proposed scheme with WDFAD-DBR, the results of which prove that RPSOR shows better performance in terms of PDR and energy tax in comparison to WDFAD-DBR. However, the proposed work compromises end-to-end delay in sparse networks.
- Published
- 2020
- Full Text
- View/download PDF
38. A Hybrid Approach for Energy Consumption Forecasting With a New Feature Engineering and Optimization Framework in Smart Grid
- Author
-
Ghulam Hafeez, Khurram Saleem Alimgeer, Abdul Baseer Qazi, Imran Khan, Muhammad Usman, Farrukh Aslam Khan, and Zahid Wadud
- Subjects
Electrical energy consumption forecasting ,energy management ,smart grid ,grey correlation analysis ,differential evolution ,radial basis kernel-based principal component analysis ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Electric energy consumption forecasting enables distribution system operators to perform efficient energy management by flexibly engaging energy consumers under the intelligent demand-response program in the smart grid (SG). With this motivation, in this paper, a fast and accurate hybrid electrical energy forecasting (FA-HELF) framework is developed. The proposed framework integrates two modules with support vector machine (SVM) based forecaster. These modules are data pre-processing and feature engineering, and modified enhanced differential evolution (mEDE) based optimizer. First, feature selection algorithms like random forests and relief-F are combined to devise a hybrid feature selection algorithm to alleviate redundancy. Secondly, for feature extraction, a radial basis Kernel-based principal component analysis algorithm is employed to eliminate the dimensionality reduction problem. Finally, to conduct accurate and fast electrical energy consumption forecasting, the mEDE based optimizer is integrated with the SVM based forecaster. The resulting FA-HELF framework is tested on publicly available independent system operator New England (ISO-NE) control area hourly load data. The results demonstrate that the FA-HELF framework is robust and shows significant improvements when compared to other benchmark frameworks in terms of accuracy and convergence speed.
- Published
- 2020
- Full Text
- View/download PDF
39. Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
- Author
-
Abdelouahid Derhab, Mohamed Belaoued, Mohamed Guerroumi, and Farrukh Aslam Khan
- Subjects
Decision-making ,energy ,offloading ,security ,two-factor authentication ,virtual smart card ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Security analysts have shown that it is possible to compromise the mobile two-factor authentication applications that employ SMS-based authentication. In this paper, we consider that offloading mobile applications to the cloud, which is resource-rich and provides a more secure environment, represents a good solution when energy limitation and security constraints are raised. To this end, we propose an offloading architecture for the two-factor mutual authentication applications, and a novel two-factor mutual authentication scheme based on a novel mechanism, named virtual smart card. We also propose a decision-making process to offload the authentication application and its virtual smart card, based on three conditions: security, mobile device's residual energy, and energy cost. We analytically derive the lower-bound on the mobile application running time from the energy cost formula to perform offloading. We analyze and verify the security properties of the proposed architecture, and provide evaluation results of the two-factor mutual authentication protocol and the offloading decision-making process.
- Published
- 2020
- Full Text
- View/download PDF
40. An Innovative Optimization Strategy for Efficient Energy Management With Day-Ahead Demand Response Signal and Energy Consumption Forecasting in Smart Grid Using Artificial Neural Network
- Author
-
Ghulam Hafeez, Khurram Saleem Alimgeer, Zahid Wadud, Imran Khan, Muhammad Usman, Abdul Baseer Qazi, and Farrukh Aslam Khan
- Subjects
Advanced metering infrastructure ,artificial neural networks ,demand response ,energy management ,grey wolf modified enhanced differential evolution algorithm ,smart grid ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this study, a novel framework is proposed for efficient energy management of residential buildings to reduce the electricity bill, alleviate peak-to-average ratio (PAR), and acquire the desired trade-off between the electricity bill and user-discomfort in the smart grid. The proposed framework is an integrated framework of artificial neural network (ANN) based forecast engine and our proposed day-ahead grey wolf modified enhanced differential evolution algorithm (DA-GmEDE) based home energy management controller (HEMC). The forecast engine forecasts price-based demand response (DR) signal and energy consumption patterns and HEMC schedules smart home appliances under the forecasted pricing signal and energy consumption pattern for efficient energy management. The proposed DA-GmEDE based strategy is compared with two benchmark strategies: day-ahead genetic algorithm (DA-GA) based strategy, and day-ahead game-theory (DA-game-theoretic) based strategy for performance validation. Moreover, extensive simulations are conducted to test the effectiveness and productiveness of the proposed DA-GmEDE based strategy for efficient energy management. The results and discussion illustrate that the proposed DA-GmEDE strategy outperforms the benchmark strategies by 33.3% in terms of efficient energy management.
- Published
- 2020
- Full Text
- View/download PDF
41. MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance
- Author
-
Mohamed Belaoued, Abdelouahid Derhab, Smaine Mazouzi, and Farrukh Aslam Khan
- Subjects
Malware ,anti-malware assistance ,multi-agent systems ,modelling ,analysis ,simulation ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Anti-malware tools remain the primary line of defense against malicious software. There is a wide variety of commercial anti-malware tools in the IT security market. However, no single tool is able to provide a full protection against the overwhelming number of daily released malware. Hence, collaboration among malware detection tools is of paramount importance. In this paper, we propose MACoMal, a multi-agent based decision mechanism, which assists heterogeneous anti-malware tools to collaborate with each other in order to reach a consensual decision about the maliciousness of a suspicious file. MACoMal consists of two main elements: (1) an executable file identification model, and (2) a collaborative decision-making scheme. MACoMal is analyzed with respect to network connectivity and global decision correctness. By leveraging a multi-agent simulation tool and a set of real malware samples, we present a simulation methodology to assess its effectiveness and efficiency. Experimental results show that MACoMal is able to immunize a network against a malware threat within a time that ranges from a few seconds to a few minutes after the threat detection.
- Published
- 2020
- Full Text
- View/download PDF
42. A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
- Author
-
Farrukh Aslam Khan, Abdu Gumaei, Abdelouahid Derhab, and Amir Hussain
- Subjects
Computational intelligence ,two-stage deep learning model ,feature representation ,network intrusion detection ,stacked auto-encoder ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The network intrusion detection system is an important tool for protecting computer networks against threats and malicious attacks. Many techniques have recently been proposed; however, these techniques face significant challenges due to the continuous emergence of new threats that are not recognized by the existing detection systems. In this paper, we propose a novel two-stage deep learning model based on a stacked auto-encoder with a soft-max classifier for efficient network intrusion detection. The model comprises two decision stages: an initial stage responsible for classifying network traffic as normal or abnormal using a probability score value. This is then used in the final decision stage as an additional feature for detecting the normal state and other classes of attacks. The proposed model is able to learn useful feature representations from large amounts of unlabeled data and classifies them automatically and efficiently. To evaluate and test the effectiveness of the proposed model, several experiments are conducted on two public datasets: an older benchmark dataset, the KDD99, and a newer one, the UNSW-NB15. The comparative experimental results demonstrate that our proposed model significantly outperforms the existing models and methods and achieves high recognition rates, up to 99.996% and 89.134%, for the KDD99 and UNSW-NB15 datasets, respectively. We conclude that our model has the potential to serve as a future benchmark for deep learning and network security research communities.
- Published
- 2019
- Full Text
- View/download PDF
43. A New Users Rating-Trend Based Collaborative Denoising Auto-Encoder for Top-N Recommender Systems
- Author
-
Zeshan Aslam Khan, Syed Zubair, Kashif Imran, Rehan Ahmad, Sharjeel Abid Butt, and Naveed Ishtiaq Chaudhary
- Subjects
Auto-encoders ,collaborative filtering ,denoising ,e-commerce ,recommender systems ,top-N recommendations ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
To promote online businesses and sales, e-commerce industry focuses to fulfill users' demands by giving them top set of recommendations which are ranked through different ranking measures.Deep learning based auto-encoder models have further improved the performance of recommender systems. A state-of-the-art collaborative denoising auto-encoder (CDAE) models user-item interactions as a corrupted version of users rating inputs. However, this architecture still lacks users' ratings-trend information which is an important parameter to recommend top-N items to users. In this paper, building upon CDAE characteristics, we propose a novel users rating-trend based collaborative denoising auto-encoder (UT-CDAE) which determines user-item correlations by evaluating rating-trend(High or Low) of a user towards a set of items. This inclusion of a user's rating-trend provides additional regularization flexibility which helps to predict improved top-N recommendations. The correctness of the suggested method is verified through different ranking evaluation metrics i.e., (mean reciprocal rank, mean average precision and normalized discounted gain), for various input corruption values, learning rates and regularization parameters.Experiments on standard ML-100K and ML-1M datasets show that suggested model has improved performance overstate-of-the-art denoising auto-encodermodels.
- Published
- 2019
- Full Text
- View/download PDF
44. An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks
- Author
-
Zahid Wadud, Muhammad Ismail, Abdul Baseer Qazi, Farrukh Aslam Khan, Abdelouahid Derhab, Ibrar Ahmad, and Arbab Masood Ahmad
- Subjects
Underwater wireless sensor networks (UWSNs) ,potential forwarding nodes (PFNs) ,packet delivery ratio (PDR) ,end-to-end delay (E2ED) ,void hole ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Underwater Wireless Sensor Networks (UWSNs) face numerous challenges due to small bandwidth, long propagation delay, limited energy resources and high deployment cost. Development of efficient routing strategies is, therefore, mandatory and has remained the focus of researchers over the past few years. To address these challenges and to further improve the performance of the existing protocols, many routing protocols have been designed. In Weighting Depth and Forwarding Area Division-Depth Based Routing (WDFAD-DBR), the forwarding decision is based on the weighting depth difference, which is not an efficient way for void hole avoidance. In this paper, we propose a depth-based routing mechanism called Energy Balanced Efficient and Reliable Routing (EBER2) protocol for UWSNs. First, energy balancing among neighbors and reliability are achieved by considering residual energy and the number of Potential Forwarding Nodes (PFNs) of the forwarder node, respectively. Secondly, energy efficiency is enhanced by dividing the transmission range into power levels, and the forwarders are allowed to adaptively adjust their transmission power according to the farthest node in their neighbor list. Thirdly, duplicate packets are reduced by comparing depths, residual energy and PFNs among the neighbors. Moreover, network latency is decreased by deploying two sinks at those areas of the network that have high traffic density. The results of our simulations show that EBER2 has higher Packet Delivery Ratio (PDR), lower energy tax, and lesser duplicate packets than the WDFAD-DBR routing protocol.
- Published
- 2019
- Full Text
- View/download PDF
45. Design of Momentum Fractional Stochastic Gradient Descent for Recommender Systems
- Author
-
Zeshan Aslam Khan, Syed Zubair, Hani Alquhayz, Muhammad Azeem, and Allah Ditta
- Subjects
Recommender systems ,e-commerce ,momentum ,fractional calculus ,stochastic gradient descent ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The demand for recommender systems in E-commerce industry has increased tremendously. Efficient recommender systems are being proposed by different E-business companies with the intention to give users accurate and most relevant recommendation of products from huge amount of information. To improve the performance of recommender systems, various stochastic variants of gradient descent based algorithms have been reported. The scalability requirement of recommender systems needs algorithms with fast convergence to generate recommendations of specific items. Using the concepts of fractional calculus, an efficient variant of the stochastic gradient descent (SGD) was developed for fast convergence. Such fractional SGD (F-SGD) is further accelerated by adding a momentum term, thus termed as momentum fractional stochastic gradient descent (mF-SGD). The proposed mF-SGD method is shown to offer improved estimation accuracy and convergence rate, as compared to F-SGD and standard momentum SGD for different proportions of previous gradients, fractional orders, learning rates and number of features.
- Published
- 2019
- Full Text
- View/download PDF
46. A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments
- Author
-
Farrukh Aslam Khan, Nur Al Hasan Haldar, Aftab Ali, Mohsin Iftikhar, Tanveer A. Zia, and Albert Y. Zomaya
- Subjects
Healthcare ,wireless body area networks ,change detection ,intrusion detection ,Markov model ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The developments and applications of wireless body area networks (WBANs) for healthcare and remote monitoring have brought a revolution in the medical research field. Numerous physiological sensors are integrated in a WBAN architecture in order to monitor any significant changes in normal health conditions. This monitored data are then wirelessly transferred to a centralized personal server (PS). However, this transferred information can be captured and altered by an adversary during communication between the physiological sensors and the PS. Another scenario where changes can occur in the physiological data is an emergency situation, when there is a sudden change in the physiological values, e.g., changes occur in electrocardiogram (ECG) values just before the occurrence of a heart attack. This paper presents a centralized approach for the detection of abnormalities, as well as intrusions, such as forgery, insertions, and modifications in the ECG data. A simplified Markov model-based detection mechanism is used to detect changes in the ECG data. The features are extracted from the ECG data to form a feature set, which is then divided into sequences. The probability of each sequence is calculated, and based on this probability, the system decides whether the change has occurred or not. Our experiments and analyses show that the proposed scheme has a high detection rate for 5% as well as 10% abnormalities in the data set. The proposed scheme also has a higher true negative rate with a significantly reduced running time for both 5% and 10% abnormalities. Similarly, the receiver operating characteristic (ROC) and ROC convex hull have very promising results.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.