Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
29 result(s) for "Latif, Zohaib"
Sort by:
Enhancing healthcare data privacy and interoperability with federated learning
This article explores the application of federated learning (FL) with the Fast Healthcare Interoperability Resources (FHIR) protocol to address the underutilization of the huge volumes of healthcare data generated by the digital health revolution, especially those from wearable sensors, due to privacy concerns and interoperability challenges. Despite advances in electronic medical records, mobile health applications, and wearable sensors, current digital health cannot fully exploit these data due to the lack of data analysis and exchange between heterogeneous systems. To address this gap, we present a novel converged platform combining FL and FHIR, which enables collaborative model training that preserves the privacy of wearable sensor data while promoting data standardization and interoperability. Unlike traditional centralized learning (CL) solutions that require data centralization, our platform uses local model learning, which naturally improves data privacy. Our empirical evaluation demonstrates that federated learning models perform as well as, or even numerically better than, centralized learning models in terms of classification accuracy, while also performing equally well in regression, as indicated by metrics such as accuracy, area under the curve (AUC), recall, and precision, among others, for classification, and mean absolute error (MAE), mean squared error (MSE), and root mean square error (RMSE) for regression. In addition, we developed an intuitive AutoML-powered web application that is FL and CL compatible to illustrate the feasibility of our platform for predictive modeling of physical activity and energy expenditure, while complying with FHIR data reporting standards. These results highlight the immense potential of our FHIR-integrated federated learning platform as a practical framework for future interoperable and privacy-preserving digital health ecosystems to optimize the use of connected health data.
A Machine Learning-Based Anomaly Prediction Service for Software-Defined Networks
Software-defined networking (SDN) has gained tremendous growth and can be exploited in different network scenarios, from data centers to wide-area 5G networks. It shifts control logic from the devices to a centralized entity (programmable controller) for efficient traffic monitoring and flow management. A software-based controller enforces rules and policies on the requests sent by forwarding elements; however, it cannot detect anomalous patterns in the network traffic. Due to this, the controller may install the flow rules against the anomalies, reducing the overall network performance. These anomalies may indicate threats to the network and decrease its performance and security. Machine learning (ML) approaches can identify such traffic flow patterns and predict the systems’ impending threats. We propose an ML-based service to predict traffic anomalies for software-defined networks in this work. We first create a large dataset for network traffic by modeling a programmable data center with a signature-based intrusion-detection system. The feature vectors are pre-processed and are constructed against each flow request by the forwarding element. Then, we input the feature vector of each request to a machine learning classifier for training to predict anomalies. Finally, we use the holdout cross-validation technique to evaluate the proposed approach. The evaluation results specify that the proposed approach is highly accurate. In contrast to baseline approaches (random prediction and zero rule), the performance improvement of the proposed approach in average accuracy, precision, recall, and f-measure is (54.14%, 65.30%, 81.63%, and 73.70%) and (4.61%, 11.13%, 9.45%, and 10.29%), respectively.
MIND: A Multi-Source Data Fusion Scheme for Intrusion Detection in Networks
In recent years, there is an exponential explosion of data generation, collection, and processing in computer networks. With this expansion of data, network attacks have also become a congenital problem in complex networks. The resource utilization, complexity, and false alarm rates are major challenges in current Network Intrusion Detection Systems (NIDS). The data fusion technique is an emerging technology that merges data from multiple sources to form more certain, precise, informative, and accurate data. Moreover, most of the earlier intrusion detection models suffer from overfitting problems and lack optimal detection of intrusions. In this paper, we propose a multi-source data fusion scheme for intrusion detection in networks (MIND) , where data fusion is performed by the horizontal emergence of two datasets. For this purpose, the Hadoop MapReduce tool such as, Hive is used. In addition, a machine learning ensemble classifier is used for the fused dataset with fewer parameters. Finally, the proposed model is evaluated with a 10-fold-cross validation technique. The experiments show that the average accuracy, detection rate, false positive rate, true positive rate, and F-measure are 99.80%, 99.80%, 0.29%, 99.85%, and 99.82% respectively. Moreover, the results indicate that the proposed model is significantly effective in intrusion detection compared to other state-of-the-art methods.
Research on sports activity behavior prediction based on electromyography signal collection and intelligent sensing channel
Sports behavior prediction requires precise and reliable analysis of muscle activity during exercise. This study proposes a multi-channel correlation feature extraction method for electromyographic (EMG) signals to overcome challenges in sports behavior prediction. A wavelet threshold denoising algorithm is enhanced with nonlinear function transitions and control coefficients to improve signal quality, achieving effective noise reduction and a higher signal-to-noise ratio. Furthermore, multi-channel linear and nonlinear correlation features are combined, leveraging mutual information estimation via copula entropy for feature construction. A stacking ensemble learning model, incorporating extreme gradient boosting (XGBoost), K-nearest network (KNN), Random Forest (RF), and naive Bayes (NB) as base learners, further enhances classification accuracy. Experimental results demonstrate that the proposed approach achieves over 95% prediction accuracy, significantly outperforming traditional methods. The robustness of multi-channel correlation features is validated across diverse datasets, proving their effectiveness in mitigating channel crosstalk and noise interference. This work provides a scientific basis for improving sports training strategies and reducing injury risks.
Blockchain controlled trustworthy federated learning platform for smart homes
Smart device manufacturers rely on insights from smart home (SH) data to update their devices, and similarly, service providers use it for predictive maintenance. In terms of data security and privacy, combining distributed federated learning (FL) with blockchain technology is being considered to prevent single point failure and model poising attacks. However, adding blockchain to a FL environment can worsen blockchain's scaling issues and create regular service interruptions at SH. This article presents a scalable Blockchain‐based Privacy‐preserving Federated Learning (BPFL) architecture for an SH ecosystem that integrates blockchain and FL. BPFL can automate SHs' services and distribute machine learning (ML) operations to update IoT manufacturer models and scale service provider services. The architecture uses a local peer as a gateway to connect SHs to the blockchain network and safeguard user data, transactions, and ML operations. Blockchain facilitates ecosystem access management and learning. The Stanford Cars and an IoT dataset have been used as test bed experiments, taking into account the nature of data (i.e. images and numeric). The experiments show that ledger optimisation can boost scalability by 40–60% in BCN by reducing transaction overhead by 60%. Simultaneously, it increases learning capacity by 10% compared to baseline FL techniques. The figure presents a novel blockchain‐based federated learning architecture where a gateway peer enhances the scalability.
Autonomous Landing of an UAV Using H∞ Based Model Predictive Control
Possibly the most critical phase of an Unmanned Air Vehicle (UAV) flight is landing. To reduce the risk due to pilot error, autonomous landing systems can be used. Environmental disturbances such as wind shear can jeopardize safe landing, therefore a well-adjusted and robust control system is required to maintain the performance requirements during landing. The paper proposes a loop-shaping-based Model Predictive Control (MPC) approach for autonomous UAV landings. Instead of conventional MPC plant model augmentation, the input and output weights are designed in the frequency domain to meet the transient and steady-state performance requirements. Then, the H∞ loop shaping design procedure is used to synthesize the state-feedback controller for the shaped plant. This linear state-feedback control law is then used to solve an inverse optimization problem to design the cost function matrices for MPC. The designed MPC inherits the small-signal characteristics of the H∞ controller when constraints are inactive (i.e., perturbation around equilibrium points that keep the system within saturation limits). The H∞ loop shaping synthesis results in an observer plus state feedback structure. This state estimator initializes the MPC problem at each time step. The control law is successfully evaluated in a non-linear simulation environment under moderate and severe wind downburst. It rejects unmeasured disturbances, has good transient performance, provides an excellent stability margin, and enforces input constraints.
Autonomous Landing of an UAV Using IH/Isub.∞ Based Model Predictive Control
Possibly the most critical phase of an Unmanned Air Vehicle (UAV) flight is landing. To reduce the risk due to pilot error, autonomous landing systems can be used. Environmental disturbances such as wind shear can jeopardize safe landing, therefore a well-adjusted and robust control system is required to maintain the performance requirements during landing. The paper proposes a loop-shaping-based Model Predictive Control (MPC) approach for autonomous UAV landings. Instead of conventional MPC plant model augmentation, the input and output weights are designed in the frequency domain to meet the transient and steady-state performance requirements. Then, the H[sub.∞] loop shaping design procedure is used to synthesize the state-feedback controller for the shaped plant. This linear state-feedback control law is then used to solve an inverse optimization problem to design the cost function matrices for MPC. The designed MPC inherits the small-signal characteristics of the H[sub.∞] controller when constraints are inactive (i.e., perturbation around equilibrium points that keep the system within saturation limits). The H[sub.∞] loop shaping synthesis results in an observer plus state feedback structure. This state estimator initializes the MPC problem at each time step. The control law is successfully evaluated in a non-linear simulation environment under moderate and severe wind downburst. It rejects unmeasured disturbances, has good transient performance, provides an excellent stability margin, and enforces input constraints.
Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of our daily lives. Contrary to popular belief, it raises security and privacy issues as it is used to collect data from consumers or automated systems. Numerous articles are published that discuss issues like centralised control systems and potential alternatives like integration with blockchain. Although a few recent surveys focused on the challenges and solutions facing the IoT ecosystem, most of them did not concentrate on the threats, difficulties, or blockchain-based solutions. Additionally, none of them focused on blockchain and IoT integration challenges and attacks. In the context of the IoT ecosystem, overall security measures are very important to understand the overall challenges. This article summarises difficulties that have been outlined in numerous recent articles and articulates various attacks and security challenges in a variety of approaches, including blockchain-based solutions and so on. More clearly, this contribution consolidates threats, access control issues, and remedies in brief. In addition, this research has listed some attacks on public blockchain protocols with some real-life examples that can guide researchers in taking preventive measures for IoT use cases. Finally, a future research direction concludes the research gaps by analysing contemporary research contributions.
A Comprehensive Survey of Interface Protocols for Software Defined Networks
Software Defined Networks has seen tremendous growth and deployment in different types of networks. Compared to traditional networks it decouples the control logic from network layer devices, and centralizes it for efficient traffic forwarding and flow management across the domain. This multi-layered architecture has data forwarding devices at the bottom in data plane, which are programmed by controllers in the control plane. The high level application or management plane interacts with control layer to program the whole network and enforce different policies. The interaction among these layers is done through interfaces which work as communication/programming protocols. In this survey, we present a comprehensive study of such interfaces available for southbound, northbound, and east/westbound communication. We have classified each type into different categories based on their properties and capabilities. Virtualization of networks devices is a common practice in Software Defined Networks. This paper also analyzes interface solution which work with different virtualization schemes. In addition, the paper highlights a number of short term and long term research challenges and open issues related to SDN interfaces.
IoT Virtualization: A Survey of Software Definition & Function Virtualization Techniques for Internet of Things
Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of information systems and network management for next generation Internet. The deployment and applications of IoT ranges from smart cities to urban computing, and from ubiquitous healthcare to tactile Internet. For this reason the physical infrastructure of heterogeneous network systems has become more complicated, and thus requires efficient and dynamic solutions for management, configuration, and flow scheduling. Network softwarization in the form of Software Defined Networks (SDN) and Network Function Virtualization (NFV) has been extensively researched for IoT in recent past. In this article we present a systematic and comprehensive review of virtualization techniques explicitly designed for IoT networks. We have classified the literature into software defined networks designed for IoT, function virtualization for IoT networks, and software defined IoT networks. These categories are further divided into works which present architectural, security, and management solutions. In addition, the paper highlights a number of short term and long term research challenges and open issues related to adoption of software defined Internet of things.