54 results on '"Aaqif Afzaal Abbasi"'
Search Results
2. Mobile Apps for COVID-19 Detection and Diagnosis for Future Pandemic Control: Multidimensional Systematic Review
- Author
-
Mehdi Gheisari, Mustafa Ghaderzadeh, Huxiong Li, Tania Taami, Christian Fernández-Campusano, Hamidreza Sadeghsalehi, and Aaqif Afzaal Abbasi
- Subjects
Information technology ,T58.5-58.64 ,Public aspects of medicine ,RA1-1270 - Abstract
BackgroundIn the modern world, mobile apps are essential for human advancement, and pandemic control is no exception. The use of mobile apps and technology for the detection and diagnosis of COVID-19 has been the subject of numerous investigations, although no thorough analysis of COVID-19 pandemic prevention has been conducted using mobile apps, creating a gap. ObjectiveWith the intention of helping software companies and clinical researchers, this study provides comprehensive information regarding the different fields in which mobile apps were used to diagnose COVID-19 during the pandemic. MethodsIn this systematic review, 535 studies were found after searching 5 major research databases (ScienceDirect, Scopus, PubMed, Web of Science, and IEEE). Of these, only 42 (7.9%) studies concerned with diagnosing and detecting COVID-19 were chosen after applying inclusion and exclusion criteria using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) protocol. ResultsMobile apps were categorized into 6 areas based on the content of these 42 studies: contact tracing, data gathering, data visualization, artificial intelligence (AI)–based diagnosis, rule- and guideline-based diagnosis, and data transformation. Patients with COVID-19 were identified via mobile apps using a variety of clinical, geographic, demographic, radiological, serological, and laboratory data. Most studies concentrated on using AI methods to identify people who might have COVID-19. Additionally, symptoms, cough sounds, and radiological images were used more frequently compared to other data types. Deep learning techniques, such as convolutional neural networks, performed comparatively better in the processing of health care data than other types of AI techniques, which improved the diagnosis of COVID-19. ConclusionsMobile apps could soon play a significant role as a powerful tool for data collection, epidemic health data analysis, and the early identification of suspected cases. These technologies can work with the internet of things, cloud storage, 5th-generation technology, and cloud computing. Processing pipelines can be moved to mobile device processing cores using new deep learning methods, such as lightweight neural networks. In the event of future pandemics, mobile apps will play a critical role in rapid diagnosis using various image data and clinical symptoms. Consequently, the rapid diagnosis of these diseases can improve the management of their effects and obtain excellent results in treating patients.
- Published
- 2024
- Full Text
- View/download PDF
3. Construction and Optimization of Dynamic S-Boxes Based on Gaussian Distribution
- Author
-
Adel R. Alharbi, Sajjad Shaukat Jamal, Muhammad Fahad Khan, Mohammad Asif Gondal, and Aaqif Afzaal Abbasi
- Subjects
Symmetric cipher ,block cipher ,S-Box optimization ,PRNG ,S-Box construction ,Gaussian distribution ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Block ciphers are widely used for securing data and are known for their resistance to various types of attacks. The strength of a block cipher against these attacks often depends on the S-boxes used in the cipher. There are many chaotic map-based techniques in the literature for constructing the dynamic S-Boxes. While chaos-based approaches have certain attractive properties for this purpose, they also have some inherent weaknesses, including finite precision effect, dynamical degradation of chaotic systems, non-uniform distribution, discontinuity in chaotic sequences. These weaknesses can limit the effectiveness of chaotic map-based substitution boxes. In this paper, we propose an innovative approach for constructing dynamic S-boxes using Gaussian distribution-based pseudo-random sequences. The proposed technique overcomes the weaknesses of existing chaos-based S-box techniques by leveraging the strength of pseudo-randomness sequences. However, one of the main drawbacks of using Gaussian distribution-based pseudo-random sequences is the low nonlinearity of the resulting S-boxes. To address this limitation, we introduce the use of genetic algorithms (GA) to optimize the nonlinearity of Gaussian distribution-based S-boxes while preserving a high level of randomness. The proposed technique is evaluated using standard S-box performance criteria, including nonlinearity, bit independence criterion (BIC), linear approximation probability (LP), strict avalanche criterion (SAC), and differential approximation probability (DP). Results demonstrate that the proposed technique achieves a maximum nonlinearity of 112, which is comparable to the ASE algorithm.
- Published
- 2023
- Full Text
- View/download PDF
4. An Improvement to the 2-Opt Heuristic Algorithm for Approximation of Optimal TSP Tour
- Author
-
Fakhar Uddin, Naveed Riaz, Abdul Manan, Imran Mahmood, Oh-Young Song, Arif Jamal Malik, and Aaqif Afzaal Abbasi
- Subjects
travelling salesman problem ,combinatorial optimisation ,VRP ,route optimisation ,heuristic algorithms ,TSPLIB ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
The travelling salesman problem (TSP) is perhaps the most researched problem in the field of Computer Science and Operations. It is a known NP-hard problem and has significant practical applications in a variety of areas, such as logistics, planning, and scheduling. Route optimisation not only improves the overall profitability of a logistic centre but also reduces greenhouse gas emissions by minimising the distance travelled. In this article, we propose a simple and improved heuristic algorithm named 2-Opt++, which solves symmetric TSP problems using an enhanced 2-Opt local search technique, to generate better results. As with 2-Opt, our proposed method can also be applied to the Vehicle Routing Problem (VRP), with minor modifications. We have compared our technique with six existing algorithms, namely ruin and recreate, nearest neighbour, genetic algorithm, simulated annealing, Tabu search, and ant colony optimisation. Furthermore, to allow for the complexity of larger TSP instances, we have used a graph compression/candidate list technique that helps in reducing the computational complexity and time. The comprehensive empirical evaluation carried out for this research work shows the efficacy of the 2-Opt++ algorithm as it outperforms the other well-known algorithms in terms of the error margin, execution time, and time of convergence.
- Published
- 2023
- Full Text
- View/download PDF
5. Software-Defined Cloud Computing: A Systematic Review on Latest Trends and Developments
- Author
-
Aaqif Afzaal Abbasi, Almas Abbasi, Shahaboddin Shamshirband, Anthony Theodore Chronopoulos, Valerio Persico, and Antonio Pescape
- Subjects
Cloud computing ,data centers ,infrastructure management ,networking ,network functions virtualization ,scalability ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Cloud computing concepts offer effective and efficient tools for addressing resource-hungry computational problems. While conventional methods, architectures, and processing techniques may limit cloud data center performance, software-defined cloud computing (SDCC) is an approach where virtualization services to all network resources in a dc are software-defined and where software-defined networking (SDN) and cloud computing go hand in hand. SDCC-related concepts change the previous state of affairs by promoting the centralized control of networking functions in a data center. A key objective of developing software-driven cloud infrastructure is that the networking hardware, software, storage, security, and network traffic management is open and interoperable. This facilitates easy installation and management of networking functions in the cloud infrastructure. Employing SDCC concepts to cloud data centers can improve resource administration challenges to a greater extent. This paper presents a survey on SDCC. We begin by introducing SDCC environments and explain its main architectural components. We identify the essential contributions of various developments to this field and discuss the implementation challenges and limitations faced in their adoption. We also explore the potential of SDCC in two domains, namely, resource orchestration and application development, as case studies of specific interest. In an attempt to anticipate the future evolution, we discuss the important research opportunities and challenges in this promising field.
- Published
- 2019
- Full Text
- View/download PDF
6. A Multilevel Image Thresholding Based on Hybrid Salp Swarm Algorithm and Fuzzy Entropy
- Author
-
Husein S. Naji Alwerfali, Mohamed Abd Elaziz, Mohammed A. A. Al-Qaness, Aaqif Afzaal Abbasi, Songfeng Lu, Fang Liu, and Li Li
- Subjects
Image segmentation ,multi-level thresholding ,salp swarm algorithm (SSA) ,moth-flame optimization (MFO) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The image segmentation techniques based on multi-level threshold value received lot of attention in recent years. It is because they can be used as a pre-processing step in complex image processing applications. The main problem in identifying the suitable threshold values occurs when classical image segmentation methods are employed. The swarm intelligence (SI) technique is used to improve multi-level threshold image (MTI) segmentation performance. SI technique simulates the social behaviors of swarm ecosystem, such as the behavior exhibited by different birds, animals etc. Based on SI techniques, we developed an alternative MTI segmentation method by using a modified version of the salp swarm algorithm (SSA). The modified algorithm improves the performance of various operators of the moth-flame optimization (MFO) algorithm to address the limitations of traditional SSA algorithm. This results in improved performance of SSA algorithm. In addition, the fuzzy entropy is used as objective function to determine the quality of the solutions. To evaluate the performance of the proposed methodology, we evaluated our techniques on CEC2005 benchmark and Berkeley dataset. Our evaluation results demonstrate that SSAMFO outperforms traditional SSA and MFO algorithms, in terms of PSNR, SSIM and fitness value.
- Published
- 2019
- Full Text
- View/download PDF
7. A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language
- Author
-
Yousif A. Alhaj, Abdelghani Dahou, Mohammed A. A. Al-qaness, Laith Abualigah, Aaqif Afzaal Abbasi, Nasser Ahmed Obad Almaweri, Mohamed Abd Elaziz, and Robertas Damaševičius
- Subjects
text classification ,feature selection ,feature extraction ,particle swarm optimization ,Information technology ,T58.5-58.64 - Abstract
We propose a novel text classification model, which aims to improve the performance of Arabic text classification using machine learning techniques. One of the effective solutions in Arabic text classification is to find the suitable feature selection method with an optimal number of features alongside the classifier. Although several text classification methods have been proposed for the Arabic language using different techniques, such as feature selection methods, an ensemble of classifiers, and discriminative features, choosing the optimal method becomes an NP-hard problem considering the huge search space. Therefore, we propose a method, called Optimal Configuration Determination for Arabic text Classification (OCATC), which utilized the Particle Swarm Optimization (PSO) algorithm to find the optimal solution (configuration) from this space. The proposed OCATC method extracts and converts the features from the textual documents into a numerical vector using the Term Frequency-Inverse Document Frequency (TF–IDF) approach. Finally, the PSO selects the best architecture from a set of classifiers to feature selection methods with an optimal number of features. Extensive experiments were carried out to evaluate the performance of the OCATC method using six datasets, including five publicly available datasets and our proposed dataset. The results obtained demonstrate the superiority of OCATC over individual classifiers and other state-of-the-art methods.
- Published
- 2022
- Full Text
- View/download PDF
8. Predictive analytics framework for accurate estimation of child mortality rates for Internet of Things enabled smart healthcare systems
- Author
-
Muhammad Islam, Muhammad Usman, Azhar Mahmood, Aaqif Afzaal Abbasi, and Oh-Young Song
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Globally, under-five child mortality is a substantial health problem. In developing countries, reducing child mortality and improving child health are the key priorities in health sectors. Despite the significant reduction in deaths of under-five children globally, developing countries are still struggling to maintain an acceptable mortality rate. Globally, the death rate of under-five children is 41 per 1000 live births. However, the death rate of children in developing nations like Pakistan and Ethiopia per 1000 live births is 74 and 54, respectively. Such nations find it very challenging to decrease the mortality rate. Data analytics on healthcare data plays a pivotal role in identifying the trends and highlighting the key factors behind the children deaths. Similarly, predictive analytics with the help of Internet of Things based frameworks significantly advances the smart healthcare systems to forecast death trends for timely intervention. Moreover, it helps in capturing hidden associations between health-related variables and key death factors among children. In this study, a predictive analytics framework has been developed to predict the death rates with high accuracy and to find the significant determinants that cause high child mortality. Our framework uses an automated method of information gain to rank the information-rich mortality variables for accurate predictions. Ethiopian Demographic Health Survey and Pakistan Demographic Health Survey data sets have been used for the validation of our proposed framework. These real-world data sets have been tested using machine learning classifiers, such as Naïve Bayes, decision tree, rule induction, random forest, and multi-layer perceptron, for the prediction task. It has been revealed through our experimentation that Naïve Bayes classifier predicts the child mortality rate with the highest average accuracy of 96.4% and decision tree helps in identifying key classification rules covering the factors behind children deaths.
- Published
- 2020
- Full Text
- View/download PDF
9. Channel State Information from Pure Communication to Sense and Track Human Motion: A Survey
- Author
-
Mohammed A. A. Al-qaness, Mohamed Abd Elaziz, Sunghwan Kim, Ahmed A. Ewees, Aaqif Afzaal Abbasi, Yousif A. Alhaj, and Ammar Hawbani
- Subjects
RSSI ,CSI ,Wi-Fi ,human activity recognition (HAR) ,device-free ,Chemical technology ,TP1-1185 - Abstract
Human motion detection and activity recognition are becoming vital for the applications in smart homes. Traditional Human Activity Recognition (HAR) mechanisms use special devices to track human motions, such as cameras (vision-based) and various types of sensors (sensor-based). These mechanisms are applied in different applications, such as home security, Human−Computer Interaction (HCI), gaming, and healthcare. However, traditional HAR methods require heavy installation, and can only work under strict conditions. Recently, wireless signals have been utilized to track human motion and HAR in indoor environments. The motion of an object in the test environment causes fluctuations and changes in the Wi-Fi signal reflections at the receiver, which result in variations in received signals. These fluctuations can be used to track object (i.e., a human) motion in indoor environments. This phenomenon can be improved and leveraged in the future to improve the internet of things (IoT) and smart home devices. The main Wi-Fi sensing methods can be broadly categorized as Received Signal Strength Indicator (RSSI), Wi-Fi radar (by using Software Defined Radio (SDR)) and Channel State Information (CSI). CSI and RSSI can be considered as device-free mechanisms because they do not require cumbersome installation, whereas the Wi-Fi radar mechanism requires special devices (i.e., Universal Software Radio Peripheral (USRP)). Recent studies demonstrate that CSI outperforms RSSI in sensing accuracy due to its stability and rich information. This paper presents a comprehensive survey of recent advances in the CSI-based sensing mechanism and illustrates the drawbacks, discusses challenges, and presents some suggestions for the future of device-free sensing technology.
- Published
- 2019
- Full Text
- View/download PDF
10. v-Mapper: An Application-Aware Resource Consolidation Scheme for Cloud Data Centers
- Author
-
Aaqif Afzaal Abbasi and Hai Jin
- Subjects
network ,systems ,cloud computing ,data center ,performance ,software-defined ,virtual machine ,scheduling ,admission control ,application-aware ,Information technology ,T58.5-58.64 - Abstract
Cloud computing systems are popular in computing industry for their ease of use and wide range of applications. These systems offer services that can be used over the Internet. Due to their wide popularity and usage, cloud computing systems and their services often face issues resource management related challenges. In this paper, we present v-Mapper, a resource consolidation scheme which implements network resource management concepts through software-defined networking (SDN) control features. The paper makes three major contributions: (1) We propose a virtual machine (VM) placement scheme that can effectively mitigate the VM placement issues for data-intensive applications; (2) We propose a validation scheme that will ensure that a cloud service is entertained only if there are sufficient resources available for its execution and (3) We present a scheduling policy that aims to eliminate network load constraints. We tested our scheme with other techniques in terms of average task processing time, service delay and bandwidth usage. Our results demonstrate that v-Mapper outperforms other techniques and delivers significant improvement in system’s performance.
- Published
- 2018
- Full Text
- View/download PDF
11. Multi-scale Vehicle Localization in Underground Parking Lots by Integration of Dead Reckoning, Wi-Fi and Vision.
- Author
-
Yunes A. M. Almansoub, Ming Zhong 0004, Zhaozheng Hu, Gang Huang, Mohammed Abdulaziz Aide Al-qaness, and Aaqif Afzaal Abbasi
- Published
- 2020
- Full Text
- View/download PDF
12. A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and Trends.
- Author
-
Mehdi Gheisari, Aaqif Afzaal Abbasi, Zahra Sayari, Qasim Rizvi, Alia Asheralieva, Sabitha Banu A., Feras M. Awaysheh, Syed Bilal Hussain Shah, and Khuhawar Arif Raza
- Published
- 2020
- Full Text
- View/download PDF
13. Linguistic Features and Bi-LSTM for Identification of Fake News
- Author
-
Malik, Attar Ahmed Ali, Shahzad Latif, Sajjad A. Ghauri, Oh-Young Song, Aaqif Afzaal Abbasi, and Arif Jamal
- Subjects
deep learning ,Bidirectional Long Short-Term Memory (Bi-LSTM) ,linguistic features ,PCA - Abstract
With the spread of Internet technologies, the use of social media has increased exponentially. Although social media has many benefits, it has become the primary source of disinformation or fake news. The spread of fake news is creating many societal and economic issues. It has become very critical to develop an effective method to detect fake news so that it can be stopped, removed or flagged before spreading. To address the challenge of accurately detecting fake news, this paper proposes a solution called Statistical Word Embedding over Linguistic Features via Deep Learning (SWELDL Fake), which utilizes deep learning techniques to improve accuracy. The proposed model implements a statistical method called “principal component analysis” (PCA) on fake news textual representations to identify significant features that can help identify fake news. In addition, word embedding is employed to comprehend linguistic features and Bidirectional Long Short-Term Memory (Bi-LSTM) is utilized to classify news as true or fake. We used a benchmark dataset called SWELDL Fake to validate our proposed model, which has about 72,000 news articles collected from different benchmark datasets. Our model achieved a classification accuracy of 98.52% on fake news, surpassing the performance of state-of-the-art deep learning and machine learning models.
- Published
- 2023
- Full Text
- View/download PDF
14. A Software-Defined Cloud Resource Management Framework.
- Author
-
Aaqif Afzaal Abbasi, Hai Jin 0001, and Song Wu 0001
- Published
- 2015
- Full Text
- View/download PDF
15. PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things
- Author
-
Mehdi Gheisari, Amir Javadpour, Jiechao Gao, Aaqif Afzaal Abbasi, Quoc-Viet Pham, and Yang Liu
- Subjects
General Computer Science - Published
- 2022
16. Intrusion detection based on machine learning in the internet of things, attacks and counter measures
- Author
-
Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, Tehmina Karmat Khan, Aaqif Afzaal Abbasi, Seifedine Kadry, Muhammad Attique Khan, and Seungmin Rho
- Subjects
Hardware and Architecture ,Software ,Information Systems ,Theoretical Computer Science - Published
- 2022
17. Hybrid Evolutionary Algorithm Based Relevance Feedback Approach for Image Retrieval
- Author
-
Aun Irtaza, Awais Mahmood, Aaqif Afzaal Abbasi, Qammar Abbas, Esam Othman, Arif Jamal Malik, Muhammad Imran, and Habib Dhahri
- Subjects
business.industry ,Computer science ,Evolutionary algorithm ,Relevance feedback ,Machine learning ,computer.software_genre ,Computer Science Applications ,Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Image retrieval - Published
- 2022
18. Modified Heuristic Computational Techniques for the Resource Optimization in Cognitive Radio Networks (CRNs)
- Author
-
Ahmad Bilal, Shahzad Latif, Sajjad A. Ghauri, Oh-Young Song, Aaqif Afzaal Abbasi, and Tehmina Karamat
- Subjects
modified non-domination sorted genetic algorithm ,spectrum scarcity ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,D2D communication ,Signal Processing ,modified whale colony optimization ,Electrical and Electronic Engineering - Abstract
With the advancement of internet technologies and multimedia applications, the spectrum scarcity problem is becoming more acute. Thus, spectral-efficient schemes with minimal interference for IoT networks are required. Device-to-device communication (D2D) technology has the potential to solve the issue of spectrum scarcity in future wireless networks. Additionally, throughput is considered a non-convex and NP-hard problem, and heuristic approaches are effective in these scenarios. This paper presents two novel heuristic approaches for throughput optimization for D2D users with quality of service (QoS)-aware wireless communication for mobile users (MU): the modified whale colony optimization algorithm (MWOA) and modified non-domination sorted genetic algorithm (MNSGA). The performance of the proposed algorithms is analyzed to show that the proposed mode selection technique efficiently fulfills the QoS requirements. Simulation results show the performance of the proposed heuristic algorithms compared to other understudied approaches.
- Published
- 2023
- Full Text
- View/download PDF
19. Services Management in the Digital Era—The Cloud Computing Perspective
- Author
-
Aaqif Afzaal Abbasi and Mohammad A. A. Al-qaness
- Published
- 2023
20. Expression-based Security Framework for ATM Networks
- Author
-
Sajid Ali Khan and Aaqif Afzaal Abbasi
- Published
- 2022
21. A Data Mining Technique to Improve Configuration Prioritization Framework for Component-Based Systems: An Empirical Study
- Author
-
Aaqif Afzaal Abbasi, Shunkun Yang, Shariq Hussain, Atif Ali, Sadia Ali, Arif Jamal Malik, and Yaser Hafeez
- Subjects
Computer science ,Process (engineering) ,Analytic hierarchy process ,Reuse ,computer.software_genre ,Computer Science Applications ,Empirical research ,Control and Systems Engineering ,Requirement prioritization ,Component (UML) ,Data mining ,Electrical and Electronic Engineering ,Software product line ,computer ,Reusability - Abstract
Department of Software Engineering, In the current application development strategies, families of productsare developed with personalized configurations to increase stakeholders’ satisfaction. Product lines have theability to address several requirements due to their reusability and configuration properties. The structuringand prioritizing of configuration requirements facilitate the development processes, whereas it increases theconflicts and inadequacies. This increases human effort, reducing user satisfaction, and failing to accommodatea continuous evolution in configuration requirements. To address these challenges, we propose a framework formanaging the prioritization process considering heterogeneous stakeholders priority semantically. Featuresare analyzed, and mined configuration priority using the data mining method based on frequently accessed andchanged configurations. Firstly, priority is identified based on heterogeneous stakeholder’s perspectives usingthree factors functional, experiential, and expressive values. Secondly, the mined configuration is based on frequentlyaccessed or changed configuration frequency to identify the new priority for reducing failures or errorsamong configuration interaction. We evaluated the performance of the proposed framework with the help ofan experimental study and by comparing it with analytical hierarchical prioritization (AHP) and Clustering.The results indicate a significant increase (more than 90 percent) in the precision and the recall value of theproposed framework, for all selected cases.
- Published
- 2021
22. A comprehensive review of mobile applications in COVID-19 detection and diagnosis: An efficient tool to control the future pandemic (Preprint)
- Author
-
Christian Fernández Campusano, Tania Taami, Hamidreza Sadeghsalehi, Mustafa Ghaderzadeh, Aaqif Afzaal Abbasi, and Mehdi Gheisari
- Abstract
BACKGROUND In the modern world, mobile applications are essential to human advancement and pandemic control is no exception. The use of mobile applications and technology for the detection and diagnosis of COVID-19 disease has been the subject of numerous investigations. Objective: Since no thorough analysis of the COVID-19 epidemic prevention has been done using mobile applications. Due to this gap, the current study thoroughly covers the many uses of mobile applications for COVID-19 detection and diagnosis. OBJECTIVE Since no thorough analysis of the COVID-19 epidemic prevention has been done using mobile applications. Due to this gap, the current study thoroughly covers the many uses of mobile applications for COVID-19 detection and diagnosis. METHODS A search of five major research databases (ScienceDirect, Scopus, PubMed, Web of Science, IEEE) found 535 studies, among which 42 related to the diagnosis and detection of patients suspected of having COVID-19. RESULTS Mobile applications can be categorized into five areas based on the content of these studies: contact tracing, data gathering, data visualization, artificial intelligence-based methods, rule- and guideline-based methods, and data transformation. Patients with COVID-19 have been identified using mobile applications employing a variety of clinical, geographic, demographic, radiological, serological, and laboratory data. The majority of studies concentrated on using artificial intelligence (AI) methods to identify people who might have COVID-19. Additionally, compared to other data types, symptoms, cough sounds, and radiological images were used more frequently. CONCLUSIONS Mobile applications could soon play a significant role as a powerful tool for data collection, epidemic health data analysis, and early identification of suspected cases. These technologies can work in conjunction with the Internet of Things (IoT), cloud storage, 5G, and cloud computing.
- Published
- 2022
23. Detection of COVID-19 from Deep Breathing Sounds Using Sound Spectrum with Image Augmentation and Deep Learning Techniques
- Author
-
Olusola O. Abayomi-Alli, Robertas Damaševičius, Aaqif Afzaal Abbasi, Rytis Maskeliūnas, and MDPI AG (Basel, Switzerland)
- Subjects
small data ,COVID-19 recognition ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,sound classification ,audio processing ,data augmentation ,transfer learning ,deep learning ,Electrical and Electronic Engineering - Abstract
The COVID-19 pandemic is one of the most disruptive outbreaks of the 21st century considering its impacts on our freedoms and social lifestyle. Several methods have been used to monitor and diagnose this virus, which includes the use of RT-PCR test and chest CT/CXR scans. Recent studies have employed various crowdsourced sound data types such as coughing, breathing, sneezing, etc., for the detection of COVID-19. However, the application of artificial intelligence methods and machine learning algorithms on these sound datasets still suffer some limitations such as the poor performance of the test results due to increase of misclassified data, limited datasets resulting in the overfitting of deep learning methods, the high computational cost of some augmentation models, and varying quality feature-extracted images resulting in poor reliability. We propose a simple yet effective deep learning model, called DeepShufNet, for COVID-19 detection. A data augmentation method based on the color transformation and noise addition was used for generating synthetic image datasets from sound data. The efficiencies of the synthetic dataset were evaluated using two feature extraction approaches, namely Mel spectrogram and GFCC. The performance of the proposed DeepShufNet model was evaluated using a deep breathing COSWARA dataset, which shows improved performance with a lower misclassification rate of the minority class. The proposed model achieved an accuracy, precision, recall, specificity, and f-score of 90.1%, 77.1%, 62.7%, 95.98%, and 69.1%, respectively, for positive COVID-19 detection using the Mel COCOA-2 augmented training datasets. The proposed model showed an improved performance compared to some of the state-of-the-art-methods.
- Published
- 2022
- Full Text
- View/download PDF
24. Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model
- Author
-
Senthilkumar Mohan, Aaqif Afzaal Abbasi, Narjes Nabipour, Jafar A. Alzubi, Ali Akbar Movassagh, Mohamadtaghi Rahimi, and Mehdi Gheisari
- Subjects
Quantitative Biology::Neurons and Cognition ,General Computer Science ,Artificial neural network ,Computer science ,Computer Science::Neural and Evolutionary Computation ,05 social sciences ,050301 education ,Computational intelligence ,02 engineering and technology ,Ant colony ,Perceptron ,Reduction (complexity) ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Differential (infinitesimal) ,0503 education ,Algorithm ,Predictive modelling - Abstract
Artificial intelligence techniques are excessively used in computing for training, forecasting and evaluation purposes. Among these techniques, artificial neural network (ANN) is widely used for developing prediction models. ANNs use various Meta-heuristic algorithms including approximation methods for training the neural networks. ANN plays a significant role in this area and can be helpful in determining the neural network input coefficient. The main goal of presented study is to train the neural network using meta-heuristic approaches and to enhance the perceptron neural network precision. In this article, we used an integrated algorithm to determine the neural network input coefficients. Later, the proposed algorithm was compared with other algorithms such as ant colony and invasive weed optimization for performance evaluation. The results reveal that the proposed algorithm results in more convergence with neural network coefficient as compared to existing algorithms. However the proposed method resulted in reduction of prediction error in the neural network.
- Published
- 2021
25. An improved YOLO-based road traffic monitoring system
- Author
-
Rehab Ali Ibrahim, Aaqif Afzaal Abbasi, Ammar Hawbani, Saeed H. Alsamhi, Mohammed A. A. Al-qaness, and Hong Fan
- Subjects
Numerical Analysis ,education.field_of_study ,Vehicle tracking system ,Artificial neural network ,business.industry ,Computer science ,Population ,Real-time computing ,Detector ,020206 networking & telecommunications ,02 engineering and technology ,Tracking (particle physics) ,Track (rail transport) ,Computer Science Applications ,Theoretical Computer Science ,Computational Mathematics ,Network management ,Computational Theory and Mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Ultrasonic sensor ,education ,business ,Software - Abstract
The growing population in large cities is creating traffic management issues. The metropolis road network management also requires constant monitoring, timely expansion, and modernization. In order to handle road traffic issues, an intelligent traffic management solution is required. Intelligent monitoring of traffic involves the detection and tracking of vehicles on roads and highways. There are various sensors for collecting motion information, such as transport video detectors, microwave radars, infrared sensors, ultrasonic sensors, passive acoustic sensors, and others. In this paper, we present an intelligent video surveillance-based vehicle tracking system. The proposed system uses a combination of the neural network, image-based tracking, and You Only Look Once (YOLOv3) to track vehicles. We train the proposed system with different datasets. Moreover, we use real video sequences of road traffic to test the performance of the proposed system. The evaluation outcomes showed that the proposed system can detect, track, and count the vehicles with acceptable results in changing scenarios.
- Published
- 2021
26. Recommender System for Configuration Management Process of Entrepreneurial Software Designing Firms
- Author
-
Yaser Hafeez, Aaqif Afzaal Abbasi, Sadia Ali, Haris Anwaar, Muhammad Wajeeh Uz Zaman, Oh-Young Song, Shunkun Yang, and Shariq Hussain
- Subjects
Biomaterials ,Software ,Mechanics of Materials ,Computer science ,business.industry ,Modeling and Simulation ,Electrical and Electronic Engineering ,Recommender system ,Software engineering ,business ,Computer Science Applications - Published
- 2021
27. Improved Channel Allocation Scheme for Cognitive Radio Networks
- Author
-
Muhammad Habib, Shahzad Latif, Arif Jamal Malik, Sangsoon Lim, Suhail Akraam, and Aaqif Afzaal Abbasi
- Subjects
Scheme (programming language) ,Cognitive radio ,Computational Theory and Mathematics ,Channel allocation schemes ,Artificial Intelligence ,business.industry ,Computer science ,business ,computer ,Software ,Theoretical Computer Science ,Computer network ,computer.programming_language - Published
- 2021
28. An intelligent memory caching architecture for data-intensive multimedia applications
- Author
-
Sameen Javed, Shahaboddin Shamshirband, and Aaqif Afzaal Abbasi
- Subjects
Scheme (programming language) ,Service (systems architecture) ,Multimedia ,Computer Networks and Communications ,Computer science ,business.industry ,Message Passing Interface ,020207 software engineering ,Cloud computing ,Throughput ,02 engineering and technology ,computer.software_genre ,Bottleneck ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Network File System ,Distributed memory ,business ,computer ,Software ,computer.programming_language - Abstract
With the rapid developments in cloud computing and mobile networks, multimedia content can be accessed conveniently. Recently, some novel intelligent caching-based approaches have been proposed to improve the memory architectures for multimedia applications. These applications often face bottleneck related challenges which result in performance degradation and service delay issues. Intelligent multimedia network applications access the shared data by using a specific network file system. This results in answering the processing related constraints on hard-drive storage and might result in bringing bottleneck issues. Therefore, to improve the performance of these multimedia network applications, we present an intelligent distributed memory caching system. We integrate the multimedia application message passing interface in a multi-threaded environment and propose an algorithm which can handle concurrent response behavior for different multimedia applications. Results demonstrate that our proposed scheme outperforms traditional approaches in terms of throughput and file read access features.
- Published
- 2020
29. Smart Healthcare Using Data-Driven Prediction of Immunization Defaulters in Expanded Program on Immunization (EPI)
- Author
-
Aaqif Afzaal Abbasi, Muhammad Attique, Azhar Mahmood, Yunyoung Nam, Muhammad Usman, and Sadaf Qazi
- Subjects
Biomaterials ,Immunization ,Mechanics of Materials ,business.industry ,Modeling and Simulation ,Health care ,medicine ,Medical emergency ,Electrical and Electronic Engineering ,medicine.disease ,business ,Computer Science Applications - Published
- 2020
30. Software-Defined Cloud Computing: A Systematic Review on Latest Trends and Developments
- Author
-
Shahaboddin Shamshirband, Aaqif Afzaal Abbasi, Antonio Pescape, Almas Abbasi, Anthony T. Chronopoulos, Valerio Persico, Abbasi, A. A., Abbasi, A., Shamshirband, S., Chronopoulos, A. T., Persico, V., and Pescape, A.
- Subjects
General Computer Science ,Computer science ,infrastructure management ,Interoperability ,networking ,Cloud computing ,02 engineering and technology ,data center ,computer.software_genre ,Software ,software defined networking ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Orchestration (computing) ,scalability ,network functions virtualization ,business.industry ,General Engineering ,020206 networking & telecommunications ,Virtualization ,Data science ,Networking hardware ,data centers ,Key (cryptography) ,020201 artificial intelligence & image processing ,Data center ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,computer - Abstract
Cloud computing concepts offer effective and efficient tools for addressing resource-hungry computational problems. While conventional methods, architectures, and processing techniques may limit cloud data center performance, software-defined cloud computing (SDCC) is an approach where virtualization services to all network resources in a dc are software-defined and where software-defined networking (SDN) and cloud computing go hand in hand. SDCC-related concepts change the previous state of affairs by promoting the centralized control of networking functions in a data center. A key objective of developing software-driven cloud infrastructure is that the networking hardware, software, storage, security, and network traffic management is open and interoperable. This facilitates easy installation and management of networking functions in the cloud infrastructure. Employing SDCC concepts to cloud data centers can improve resource administration challenges to a greater extent. This paper presents a survey on SDCC. We begin by introducing SDCC environments and explain its main architectural components. We identify the essential contributions of various developments to this field and discuss the implementation challenges and limitations faced in their adoption. We also explore the potential of SDCC in two domains, namely, resource orchestration and application development, as case studies of specific interest. In an attempt to anticipate the future evolution, we discuss the important research opportunities and challenges in this promising field.
- Published
- 2019
31. A Multilevel Image Thresholding Based on Hybrid Salp Swarm Algorithm and Fuzzy Entropy
- Author
-
Fang Liu, Songfeng Lu, Li Li, Husein S. Naji Alwerfali, Mohammed A. A. Al-qaness, Mohamed Abd Elaziz, and Aaqif Afzaal Abbasi
- Subjects
General Computer Science ,Computer science ,Image processing ,02 engineering and technology ,Swarm intelligence ,moth-flame optimization (MFO) ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Segmentation ,multi-level thresholding ,salp swarm algorithm (SSA) ,Image segmentation ,business.industry ,General Engineering ,Swarm behaviour ,020206 networking & telecommunications ,Pattern recognition ,Thresholding ,Benchmark (computing) ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
The image segmentation techniques based on multi-level threshold value received lot of attention in recent years. It is because they can be used as a pre-processing step in complex image processing applications. The main problem in identifying the suitable threshold values occurs when classical image segmentation methods are employed. The swarm intelligence (SI) technique is used to improve multi-level threshold image (MTI) segmentation performance. SI technique simulates the social behaviors of swarm ecosystem, such as the behavior exhibited by different birds, animals etc. Based on SI techniques, we developed an alternative MTI segmentation method by using a modified version of the salp swarm algorithm (SSA). The modified algorithm improves the performance of various operators of the moth-flame optimization (MFO) algorithm to address the limitations of traditional SSA algorithm. This results in improved performance of SSA algorithm. In addition, the fuzzy entropy is used as objective function to determine the quality of the solutions. To evaluate the performance of the proposed methodology, we evaluated our techniques on CEC2005 benchmark and Berkeley dataset. Our evaluation results demonstrate that SSAMFO outperforms traditional SSA and MFO algorithms, in terms of PSNR, SSIM and fitness value.
- Published
- 2019
32. An efficient cluster head selection for wireless sensor network-based smart agriculture systems
- Author
-
Mehdi Gheisari, Mahdi Safaei Yaraziz, Jafar A Alzubi, Christian Fernández-Campusano, Mohammad Reza Feylizadeh, Saied Pirasteh, Aaqif Afzaal Abbasi, Yang Liu, and Cheng-Chi Lee
- Subjects
Forestry ,Horticulture ,Agronomy and Crop Science ,Computer Science Applications - Published
- 2022
33. Parkinson’s Disease Diagnosis in Cepstral Domain Using MFCC and Dimensionality Reduction with SVM Classifier
- Author
-
Shafqat Ullah Khan, Sanam Shahla Rizvi, Aaqif Afzaal Abbasi, Tae-Sun Chung, Aurangzeb Khan, and Atiqur Rahman
- Subjects
Parkinson's disease ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Dimensionality reduction ,0206 medical engineering ,Pattern recognition ,02 engineering and technology ,TK5101-6720 ,medicine.disease ,Linear discriminant analysis ,020601 biomedical engineering ,Computer Science Applications ,Support vector machine ,Binary classification ,Cepstrum ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Telecommunication ,020201 artificial intelligence & image processing ,Mel-frequency cepstrum ,Sensitivity (control systems) ,Artificial intelligence ,business - Abstract
Parkinson’s disease (PD) is one of the most common and serious neurological diseases. Impairments in voice have been reported to be the early biomarkers of the disease. Hence, development of PD diagnostic tool will help early diagnosis of the disease. Additionally, intelligent system developed for binary classification of PD and healthy controls can also be exploited in future as an instrument for prodromal diagnosis. Notably, patients with rapid eye movement (REM) sleep behaviour disorder (RBD) represent a good model as they develop PD with a high probability. It has been shown that slight speech and voice impairment may be a sensitive marker of preclinical PD. In this study, we propose PD detection by extracting cepstral features from the voice signals collected from people with PD and healthy subjects. To classify the extracted features, we propose to use dimensionality reduction through linear discriminant analysis and classification through support vector machine. In order to validate the effectiveness of the proposed method, we also developed ten different machine learning models. It was observed that the proposed method yield area under the curve (AUC) of 88%, sensitivity of 73.33%, and specificity of 84%. Moreover, the proposed intelligent system was simulated using publicly available multiple types of voice database. Additionally, the data were collected from patients under on-state. The obtained results on the public database are promising compared to the previously published work.
- Published
- 2021
34. OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city
- Author
-
Guojun Wang, Jiechao Gao, Jafar A. Alzubi, Aniello Castiglione, Hamid Esmaeili Najafabadi, Aaqif Afzaal Abbasi, and Mehdi Gheisari
- Subjects
Heterogeneity ,Internet of Things (IoT) ,Ontology ,Penetration rate ,Privacy-preserving ,Smart city ,Computer Networks and Communications ,Computer science ,media_common.quotation_subject ,02 engineering and technology ,Ontology (information science) ,Computer security ,computer.software_genre ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Quality (business) ,media_common ,business.industry ,020206 networking & telecommunications ,Privacy preserving ,Hardware and Architecture ,Computer data storage ,020201 artificial intelligence & image processing ,Internet of Things ,business ,computer ,Software - Abstract
IoT devices generate data over time, which is going to be shared with other parties to provide high-level services. Smart City is one of its applications which aims to manage cities automatically. Because of the large number of devices, three critical challenges come up: heterogeneity, privacy-preserving of generated data, and providing high-level services. The existing solutions cannot even solve two of the mentioned challenges simultaneously. In this paper, we propose a three-module framework, named “Ontology-Based Privacy-Preserving” (OBPP) to address these issues. The first module includes an ontology, a data storage model, to address the heterogeneity issue while keeping the privacy information of IoT devices. The second one contains semantic reasoning rules to find abnormal patterns while addressing the quality of provided services. The third module provides a privacy rules manager to address the privacy-preserving challenges of IoT devices achieved by dynamically changing privacy behaviors of the devices. Extensive simulations on a synthetic smart city dataset demonstrate the superior performance of our approach compared to the existing solutions while providing affordability and robustness against information leakages. Thus, it can be widely applied to smart cities.
- Published
- 2021
35. A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and Trends
- Author
-
Syed Bilal Hussain Shah, Khuhawar Arif Raza, Mehdi Gheisari, Qasim Rizvi, Alia Asheralieva, Aaqif Afzaal Abbasi, Sabitha Banu, Feras M. Awaysheh, and Zahra Sayari
- Subjects
business.industry ,Computer science ,Node (networking) ,05 social sciences ,Stability (learning theory) ,02 engineering and technology ,020204 information systems ,0502 economics and business ,Scalability ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Incident management (ITSM) ,Wireless ,050211 marketing ,business ,Cluster analysis ,Wireless sensor network ,Computer network - Abstract
The Micro-Electro-Mechanical Systems (MEMS) and Wireless Sensor Networks (WSNs) developments have had a crucial effect on our daily lives. The usage of wireless sensor networks is increasing daily. They can be used in various fields such as incident management, war detection and exploration, border protection and, security monitoring. Also, they are used in unattended environments as a remote. The sensors in WSNs are fully automatic. One of the efficient ways to manage WSN effectively is clustering because it can support the scalability of nodes. One of the main challenges in Wireless Sensor Network is not only its implementation but also finding the best clustering algorithm. Besides, wireless sensor networks' features should be considered in their design as the primary keys. In this paper, we present some of the most well-known available clustering algorithms and compare them based on the features and complexity of the network. These features include the rate of node convergence, the stability, the overlapping of each cluster, supporting node movement.
- Published
- 2020
36. A novel enhanced algorithm for efficient human tracking
- Author
-
Mehdi Gheisari, Zohreh Safari, Mohammad Almasi, Amir Hossein Pourishaban Najafabadi, Abel Sridharan, Ragesh G. K., Yang Liu, and Aaqif Afzaal Abbasi
- Subjects
Bubble routing ,Human tracking ,Movable objects ,Background subtraction ,Image filter ,Deep learning ,Object tracking - Abstract
Tracking moving objects has been an issue in recent years of computer vision and image processing and human tracking makes it a more significant challenge. This category has various aspects and wide applications, such as autonomous deriving, human-robot interactions, and human movement analysis. One of the issues that have always made tracking algorithms difficult is their interaction with goal recognition methods, the mutable appearance of variable aims, and simultaneous tracking of multiple goals. In this paper, a method with high efficiency and higher accuracy was compared to the previous methods for tracking just objects using imaging with the fixed camera is introduced. The proposed algorithm operates in four steps in such a way as to identify a fixed background and remove noise from that. This background is used to subtract from movable objects. After that, while the image is being filtered, the shadows and noises of the filmed image are removed, and finally, using the bubble routing method, the mobile object will be separated and tracked. Experimental results indicated that the proposed model for detecting and tracking mobile objects works well and can improve the motion and trajectory estimation of objects in terms of speed and accuracy to a desirable level up to in terms of accuracy compared with previous methods.
- Published
- 2022
37. Fact-Checking: Application-Awareness in Data Centre Resource Management
- Author
-
Ammar Hawbani, Aaqif Afzaal Abbasi, Yousif A. Alhaj, Ahmed A. Ewees, Almas Abbasi, and Mohammed A. A. Al-qaness
- Subjects
Process management ,business.industry ,Computer science ,Fact checking ,Data center ,Resource management ,business - Published
- 2020
38. Multi-scale Vehicle Localization in Underground Parking Lots by Integration of Dead Reckoning, Wi-Fi and Vision
- Author
-
Yunes A.M Almansoub, Gang Huang, Ming Zhong, Aaqif Afzaal Abbasi, Mohammed A. A. Al-qaness, and Zhaozheng Hu
- Subjects
business.industry ,Computer science ,010401 analytical chemistry ,Fingerprint (computing) ,Feature extraction ,02 engineering and technology ,Fingerprint recognition ,RANSAC ,Accelerometer ,01 natural sciences ,0104 chemical sciences ,Dead reckoning ,0202 electrical engineering, electronic engineering, information engineering ,Parking lot ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Orb (optics) - Abstract
In this paper, we present an improved vehicle localization scheme for underground parking lots. We are integrating Dead Reckoning techniques, Wi-Fi signals, and vision-based localization methods. the proposed method includes multiple offline and online localization stages. In the offline stage, the Wi-Fi data and pavement images are collected, whereas, in the online stage, multi-scale localization estimation is performed with three stages. First, we derive a coarse localization result by integrated the Dead Reckoning (DR) technique, and Wi-Fi fingerprint localization is used to detect direction change in the underground parking lot. Second Image level localization, the involves the application of pavement image matching by Oriented FAST and Rotated Binary Robust Independent Elementary Features BRIEF methods (ORB). Finally, the Random sample consensus algorithm (RANSAC) is used for removing false points of coincidence and improved efficiency. The proposed solution achieves a 96% success rate with localization errors averaging under one meter.
- Published
- 2020
39. A Review on Multi-organ Cancer Detection Using Advanced Machine Learning Techniques
- Author
-
Muhammad Qasim Khan, Aaqif Afzaal Abbasi, Ayyaz Hussain, Amjad Rehman, and Tariq Sadad
- Subjects
medicine.medical_specialty ,medicine.diagnostic_test ,Colorectal cancer ,business.industry ,Cancer ,Colonoscopy ,Magnetic resonance imaging ,medicine.disease ,Machine Learning ,Neoplasms ,medicine ,Mammography ,Humans ,Radiology, Nuclear Medicine and imaging ,Radiology ,Diagnosis, Computer-Assisted ,Medical diagnosis ,Abnormality ,Stage (cooking) ,Radiopharmaceuticals ,business - Abstract
Abnormal behaviors of tumors pose a risk to human survival. Thus, the detection of cancers at their initial stage is beneficial for patients and lowers the mortality rate. However, this can be difficult due to various factors related to imaging modalities, such as complex background, low contrast, brightness issues, poorly defined borders and the shape of the affected area. Recently, computer-aided diagnosis (CAD) models have been used to accurately diagnose tumors in different parts of the human body, especially breast, brain, lung, liver, skin and colon cancers. These cancers are diagnosed using various modalities, including computed tomography (CT), magnetic resonance imaging (MRI), colonoscopy, mammography, dermoscopy and histopathology. The aim of this review was to investigate existing approaches for the diagnosis of breast, brain, lung, liver, skin and colon tumors. The review focuses on decision-making systems, including handcrafted features and deep learning architectures for tumor detection.
- Published
- 2020
40. Offline signature verification system: a novel technique of fusion of GLCM and geometric features using SVM
- Author
-
Muhammad Attique, Faiza Eba Batool, Zeshan Iqbal, Kashif Javed, Muhammad Sharif, Naveed Riaz, Muhammad Nazir, and Aaqif Afzaal Abbasi
- Subjects
Fusion ,Authentication ,Biometrics ,Computer Networks and Communications ,Computer science ,business.industry ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Signature (logic) ,Support vector machine ,Hardware and Architecture ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Key (cryptography) ,Artificial intelligence ,business ,Software ,Selection (genetic algorithm) - Abstract
In the area of digital biometric systems, the handwritten signature plays a key role in the authentication of a person based on their original samples. In offline signature verification (OSV), several problems exist that are challenging for verification of authentic or forgery signature by the digital system. Correct signature verification improves the security of people, systems, and services. It is applied to uniquely identify an individual based on the motion of pen as up and down, signature speed, and shape of a loop. In this work, the multi-level features fusion and optimal features selection based automatic technique is proposed for OSV. For this purpose, twenty-two Gray Level Co-occurrences Matrix (GLCM) and eight geometric features are calculated from pre-processing signature samples. These features are fused by a new parallel approach which is based on a high-priority index feature (HPFI). A skewness-kurtosis based features selection approach is also proposed name skewness-kurtosis controlled PCA (SKcPCA) and selects the optimal features for final classification into forged and genuine signatures. MCYT, GPDS synthetic, and CEDAR datasets are utilized for validation of the proposed system and show enhancement in terms of Far and FRR as compared to existing methods.
- Published
- 2020
41. Human action recognition using fusion of multiview and deep features: an application to video surveillance
- Author
-
Junaid Ali Khan, Aaqif Afzaal Abbasi, Kashif Javed, Sajid Ali Khan, Tanzila Saba, Usman Habib, and Muhammad Attique Khan
- Subjects
Scheme (programming language) ,Artificial neural network ,Correlation coefficient ,Computer Networks and Communications ,Computer science ,business.industry ,Process (computing) ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Mutual information ,Range (mathematics) ,Naive Bayes classifier ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Artificial intelligence ,business ,computer ,Software ,computer.programming_language - Abstract
Human Action Recognition (HAR) has become one of the most active research area in the domain of artificial intelligence, due to various applications such as video surveillance. The wide range of variations among human actions in daily life makes the recognition process more difficult. In this article, a new fully automated scheme is proposed for Human action recognition by fusion of deep neural network (DNN) and multiview features. The DNN features are initially extracted by employing a pre-trained CNN model name VGG19. Subsequently, multiview features are computed from horizontal and vertical gradients, along with vertical directional features. Afterwards, all features are combined in order to select the best features. The best features are selected by employing three parameters i.e. relative entropy, mutual information, and strong correlation coefficient (SCC). Furthermore, these parameters are used for selection of best subset of features through a higher probability based threshold function. The final selected features are provided to Naive Bayes classifier for final recognition. The proposed scheme is tested on five datasets name HMDB51, UCF Sports, YouTube, IXMAS, and KTH and the achieved accuracy were 93.7%, 98%, 99.4%, 95.2%, and 97%, respectively. Lastly, the proposed method in this article is compared with existing techniques. The resuls shows that the proposed scheme outperforms the state of the art methods.
- Published
- 2020
42. A Mobile Cloud-Based eHealth Scheme
- Author
-
Shahab Shamshirband, Atefeh Aghaei, Mohammed A. A. Al-qaness, Amir Mosavi, Almas Abbasi, Aaqif Afzaal Abbasi, and Yihe Liu
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,Computer science ,Interface (computing) ,Real-time computing ,Mobile computing ,Cloud computing ,02 engineering and technology ,Field (computer science) ,Machine Learning (cs.LG) ,Computer Science - Networking and Internet Architecture ,Biomaterials ,Upload ,0202 electrical engineering, electronic engineering, information engineering ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical Engineering and Systems Science - Signal Processing ,Electrical and Electronic Engineering ,Password ,Networking and Internet Architecture (cs.NI) ,Social and Information Networks (cs.SI) ,Authentication ,business.industry ,Computer Science - Social and Information Networks ,021001 nanoscience & nanotechnology ,Computer Science Applications ,Mobile cloud computing ,68T05 ,Mechanics of Materials ,Modeling and Simulation ,020201 artificial intelligence & image processing ,0210 nano-technology ,business - Abstract
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, it is uploaded into the server and further analysis is performed on the signal in the cloud. Once this is done, the second interface, intended for the use of the physician, can download and view the trace from the cloud. The data is securely held using a password-based authentication method. The system presented here is one of the first attempts at delivering the total solution, and after further upgrades, it will be possible to deploy the system in a commercial setting., Comment: 9 pages, 3 figures
- Published
- 2020
- Full Text
- View/download PDF
43. Real-Time Traffic Congestion Analysis Based on Collected Tweets
- Author
-
Mohammed A. A. Al-qaness, Liang Zhao, Ammar Hawbani, Mohamed Abd Elaziz, Aaqif Afzaal Abbasi, and Sunghwan Kim
- Subjects
050210 logistics & transportation ,education.field_of_study ,Learning classifier system ,business.industry ,Computer science ,Deep learning ,05 social sciences ,Population ,02 engineering and technology ,Data science ,Traffic congestion ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Artificial intelligence ,business ,education ,Word (computer architecture) - Abstract
Due to the rapid increase in the use of and advancement of social media platforms, the amount of data available on the internet is increasing. The available information on the internet can be used to gain insights about searching trends and public interests. The advancements in machine learning and deep learning techniques drastically improved data analytics and processing solutions for social media and infotainment industry. It is no doubt that the majority of regular commuter encounters traffic congestion daily. There is a growing number of population in Metropolitans. This leads to higher population density rates and traditional methods for collecting traffic information using physical sensors are expensive, however, by using social media tools information regarding traffic jam, road and traffic congestion can be improved. In this paper, we analyze traffic congestion using Twitter data (tweets) in real-time. The proposed model extracts traffic-related tweets from Twitter and classifies the extracted information for traffic commute estimation road. In this study, tweets from Los Angeles, USA are taken into consideration as an analysis example. A machine learning classifier and a deep learning classier are used to classify traffic information. The model was trained to collect tweets containing the word 'traffic' in a real-time environment.
- Published
- 2019
44. Bouncer: A Resource-Aware Admission Control Scheme for Cloud Services
- Author
-
Hassan A. Khalil, Mohamed Abd Elaziz, Sunghwan Kim, Mohammed A. A. Al-qaness, and Aaqif Afzaal Abbasi
- Subjects
cloud architecture ,Computer Networks and Communications ,Computer science ,lcsh:TK7800-8360 ,Services computing ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,SDN ,services computing ,Resource (project management) ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Service (business) ,distributed systems ,admission control ,business.industry ,lcsh:Electronics ,cloud computing ,020206 networking & telecommunications ,Provisioning ,Workload ,Admission control ,Virtualization ,virtualization ,cloud services ,resource-awareness ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Cloud computing is a paradigm that ensures the flexible, convenient and on-demand provisioning of a shared pool of configurable network and computing resources. Its services can be offered by either private or public infrastructures, depending on who owns the operational infrastructure. Much research has been conducted to improve a cloud&rsquo, s resource provisioning techniques. Unfortunately, sometimes an abrupt increase in the demand for cloud services results in resource shortages affecting both providers and consumers. This uncertainty of resource demands by users can lead to catastrophic failures of cloud systems, thus reducing the number of accepted service requests. In this paper, we present Bouncer&mdash, a workload admission control scheme for cloud services. Bouncer works by ensuring that cloud services do not exceed the cloud infrastructure&rsquo, s threshold capacity. By adopting an application-aware approach, we implemented Bouncer on software-defined network (SDN) infrastructure. Furthermore, we conduct an extensive study to evaluate our framework&rsquo, s performance. Our evaluation shows that Bouncer significantly outperforms the conventional service admission control schemes, which are still state of the art.
- Published
- 2019
- Full Text
- View/download PDF
45. Resource-Aware Network Topology Management Framework
- Author
-
Shahab Shamshirband, Mohammed A. A. Al-qaness, Aaqif Afzaal Abbasi, Nashat T. AL-Jallad, Almas Abbasi, and Amir Mosavi
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Machine Learning ,business.industry ,Computer science ,Reliability (computer networking) ,Path computation element ,General Engineering ,Topology (electrical circuits) ,Cloud computing ,Service provider ,Network topology ,Machine Learning (cs.LG) ,68T05 ,Computer Science - Networking and Internet Architecture ,Network management ,Resource (project management) ,Service level ,Resource management ,information_technology_data_management ,business ,Computer network - Abstract
Cloud infrastructure provides computing services where computing resources can be adjusted on-demand. However, the adoption of cloud infrastructures brings concerns like reliance on the service provider network, reliability, compliance for service level agreements. Software-defined networking (SDN) is a networking concept that suggests the segregation of a network data plane from the control plane. This concept improves networking behavior. In this paper, we present an SDN-enabled resource-aware topology framework. The proposed framework employs SLA compliance, Path Computation Element (PCE) and shares fair loading to achieve better topology features. We also present an evaluation, showcasing the potential of our framework., Comment: 13 pages, 7 figures
- Published
- 2019
- Full Text
- View/download PDF
46. Pathfinder: Application-Aware Distributed Path Computation in Clouds
- Author
-
Song Wu, Hai Jin, and Aaqif Afzaal Abbasi
- Subjects
Computer science ,Computation ,Distributed computing ,020206 networking & telecommunications ,02 engineering and technology ,Virtualization ,computer.software_genre ,Theoretical Computer Science ,Pathfinder ,Link-state routing protocol ,020204 information systems ,Theory of computation ,Scalability ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Systems architecture ,computer ,Software ,Information Systems - Abstract
Path computation in a network is dependent on the network's processes and resource usage pattern. While distributed traffic control methods improve the scalability of a system, their topology and link state conditions may influence the sub-optimal path computation. Herein, we present Pathfinder, an application-aware distributed path computation model. The proposed model framework can improve path computation functions through software-defined network controls. In the paper, we first analyse the key issues in distributed path computation functions and then present Pathfinder's system architecture, followed by its design principles and orchestration environment. Furthermore, we evaluate our system's performance by comparing it with FreeFlow and Prune-Dijk techniques. Our results demonstrate that Pathfinder outperforms these two techniques and delivers significant improvement in the system's resource utilisation behaviour.
- Published
- 2016
47. v-Mapper: An Application-Aware Resource Consolidation Scheme for Cloud Data Centres
- Author
-
Hai Jin and Aaqif Afzaal Abbasi
- Subjects
Scheme (programming language) ,Consolidation (soil) ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,Admission control ,computer.software_genre ,Scheduling (computing) ,Resource (project management) ,Virtual machine ,Data center ,information_technology_data_management ,business ,computer ,computer.programming_language - Abstract
Cloud computing refers to applications delivered as services over the Internet. Cloud systems employ policies that are inherently dynamic in nature and that depend on temporal conditions defined in terms of external events, such as the measurement of bandwidth, use of hosts, intrusion detection or specific time events. In this paper, we investigate an optimized resource management scheme named v-Mapper. The basic premise of v-Mapper is to exploit application-awareness concepts using software-defined networking (SDN) features. This paper makes three key contributions to the field: (1) We propose a virtual machine (VM) placement scheme that can effectively mitigate the VM placement issues for data-intensive applications; (2) We propose a validation scheme that will ensure that a service is entertained only if there are sufficient resources available for its execution and (3) We present a scheduling policy that aims to eliminate network load constraints. An evaluation was carried out with various benchmarks and demonstrated that v-Mapper shows improved performance over other state-of-the-art approaches in terms of average task completion time, service delay time and bandwidth utilization. Given the growing importance of supporting large-scale data processing and analysis in datacentres, the v-Mapper system has the potential to make a positive impact in improving datacentre performance in the future.
- Published
- 2017
48. Phantom: Towards Vendor-Agnostic Resource Consolidation in Cloud Environments
- Author
-
Ammar Hawbani, Mohamed Abd Elaziz, Ahmed A. Ewees, Mohammed A. A. Al-qaness, Sunghwan Kim, Sameen Javed, and Aaqif Afzaal Abbasi
- Subjects
Exploit ,Computer Networks and Communications ,Vendor ,Computer science ,vm ,lcsh:TK7800-8360 ,Cloud computing ,02 engineering and technology ,resource ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Resource management ,Electrical and Electronic Engineering ,Multimedia ,business.industry ,cloud computing ,lcsh:Electronics ,middle box ,Information technology ,020206 networking & telecommunications ,placement ,Mobile cloud computing ,sdn ,Hardware and Architecture ,Control and Systems Engineering ,Virtual machine ,Signal Processing ,virtual machine ,Resource allocation ,020201 artificial intelligence & image processing ,The Internet ,vendor-agnostic ,business ,computer ,Mobile device ,management - Abstract
Mobile-oriented internet technologies such as mobile cloud computing are gaining wider popularity in the IT industry. These technologies are aimed at improving the user internet usage experience by employing state-of-the-art technologies or their combination. One of the most important parts of modern mobile-oriented future internet is cloud computing. Modern mobile devices use cloud computing technology to host, share and store data on the network. This helps mobile users to avail different internet services in a simple, cost-effective and easy way. In this paper, we shall discuss the issues in mobile cloud resource management followed by a vendor-agnostic resource consolidation approach named Phantom, to improve the resource allocation challenges in mobile cloud environments. The proposed scheme exploits software-defined networks (SDNs) to introduce vendor-agnostic concept and utilizes a graph-theoretic approach to achieve its objectives. Simulation results demonstrate the efficiency of our proposed approach in improving application service response time.
- Published
- 2019
49. Channel State Information from Pure Communication to Sense and Track Human Motion: A Survey
- Author
-
Ahmed A. Ewees, Ammar Hawbani, Mohammed A. A. Al-qaness, Aaqif Afzaal Abbasi, Yousif A. Alhaj, Sunghwan Kim, and Mohamed Abd Elaziz
- Subjects
Computer science ,Real-time computing ,Review ,02 engineering and technology ,lcsh:Chemical technology ,Biochemistry ,Analytical Chemistry ,law.invention ,Activity recognition ,CSI ,law ,Home automation ,0202 electrical engineering, electronic engineering, information engineering ,RSSI ,Wireless ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Radar ,Wi-Fi ,Instrumentation ,device-free ,business.industry ,Universal Software Radio Peripheral ,020206 networking & telecommunications ,Software-defined radio ,Atomic and Molecular Physics, and Optics ,Channel state information ,human activity recognition (HAR) ,020201 artificial intelligence & image processing ,business - Abstract
Human motion detection and activity recognition are becoming vital for the applications in smart homes. Traditional Human Activity Recognition (HAR) mechanisms use special devices to track human motions, such as cameras (vision-based) and various types of sensors (sensor-based). These mechanisms are applied in different applications, such as home security, Human–Computer Interaction (HCI), gaming, and healthcare. However, traditional HAR methods require heavy installation, and can only work under strict conditions. Recently, wireless signals have been utilized to track human motion and HAR in indoor environments. The motion of an object in the test environment causes fluctuations and changes in the Wi-Fi signal reflections at the receiver, which result in variations in received signals. These fluctuations can be used to track object (i.e., a human) motion in indoor environments. This phenomenon can be improved and leveraged in the future to improve the internet of things (IoT) and smart home devices. The main Wi-Fi sensing methods can be broadly categorized as Received Signal Strength Indicator (RSSI), Wi-Fi radar (by using Software Defined Radio (SDR)) and Channel State Information (CSI). CSI and RSSI can be considered as device-free mechanisms because they do not require cumbersome installation, whereas the Wi-Fi radar mechanism requires special devices (i.e., Universal Software Radio Peripheral (USRP)). Recent studies demonstrate that CSI outperforms RSSI in sensing accuracy due to its stability and rich information. This paper presents a comprehensive survey of recent advances in the CSI-based sensing mechanism and illustrates the drawbacks, discusses challenges, and presents some suggestions for the future of device-free sensing technology.
- Published
- 2019
50. A Software-Defined Cloud Resource Management Framework
- Author
-
Song Wu, Hai Jin, and Aaqif Afzaal Abbasi
- Subjects
Network management ,Application programming interface ,business.industry ,Computer science ,Distributed computing ,Cloud computing ,Intrusion detection system ,Network monitoring ,business ,Software-defined networking ,Network management station ,Computer network ,Network management application - Abstract
Network systems employ policies that are inherently dynamic in nature and that depend on temporal conditions defined in terms of external events such as the measurement of bandwidth, use of hosts, intrusion detection or specific time events. Software-defined networking SDN offers the opportunity to make networks easier to configure by providing richer configuration methods. To reduce network monitoring costs and traffic overheads, herein, we propose a software-defined cloud resource management framework that uses a Fuzzy Analytical Hierarchy Process Fuzzy-AHP to customize the network resource allocation. The framework can be incorporated into SDN-enabled cloud infrastructures by using an Application Program Interface API. Using real-time data, we demonstrate that our framework can improve network resource management and is capable of handling increasing traffic requests. We also validate our framework efficiency through simulations.
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.