-
Blind Image Deblurring with FFT-ReLU Sparsity Prior
Authors:
Abdul Mohaimen Al Radi,
Prothito Shovon Majumder,
Md. Mosaddek Khan
Abstract:
Blind image deblurring is the process of recovering a sharp image from a blurred one without prior knowledge about the blur kernel. It is a small data problem, since the key challenge lies in estimating the unknown degrees of blur from a single image or limited data, instead of learning from large datasets. The solution depends heavily on developing algorithms that effectively model the image degr…
▽ More
Blind image deblurring is the process of recovering a sharp image from a blurred one without prior knowledge about the blur kernel. It is a small data problem, since the key challenge lies in estimating the unknown degrees of blur from a single image or limited data, instead of learning from large datasets. The solution depends heavily on developing algorithms that effectively model the image degradation process. We introduce a method that leverages a prior which targets the blur kernel to achieve effective deblurring across a wide range of image types. In our extensive empirical analysis, our algorithm achieves results that are competitive with the state-of-the-art blind image deblurring algorithms, and it offers up to two times faster inference, making it a highly efficient solution.
△ Less
Submitted 11 September, 2024; v1 submitted 12 June, 2024;
originally announced June 2024.
-
Video Anomaly Detection in 10 Years: A Survey and Outlook
Authors:
Moshira Abdalla,
Sajid Javed,
Muaz Al Radi,
Anwaar Ulhaq,
Naoufel Werghi
Abstract:
Video anomaly detection (VAD) holds immense importance across diverse domains such as surveillance, healthcare, and environmental monitoring. While numerous surveys focus on conventional VAD methods, they often lack depth in exploring specific approaches and emerging trends. This survey explores deep learning-based VAD, expanding beyond traditional supervised training paradigms to encompass emergi…
▽ More
Video anomaly detection (VAD) holds immense importance across diverse domains such as surveillance, healthcare, and environmental monitoring. While numerous surveys focus on conventional VAD methods, they often lack depth in exploring specific approaches and emerging trends. This survey explores deep learning-based VAD, expanding beyond traditional supervised training paradigms to encompass emerging weakly supervised, self-supervised, and unsupervised approaches. A prominent feature of this review is the investigation of core challenges within the VAD paradigms including large-scale datasets, features extraction, learning methods, loss functions, regularization, and anomaly score prediction. Moreover, this review also investigates the vision language models (VLMs) as potent feature extractors for VAD. VLMs integrate visual data with textual descriptions or spoken language from videos, enabling a nuanced understanding of scenes crucial for anomaly detection. By addressing these challenges and proposing future research directions, this review aims to foster the development of robust and efficient VAD systems leveraging the capabilities of VLMs for enhanced anomaly detection in complex real-world scenarios. This comprehensive analysis seeks to bridge existing knowledge gaps, provide researchers with valuable insights, and contribute to shaping the future of VAD research.
△ Less
Submitted 30 June, 2024; v1 submitted 29 May, 2024;
originally announced May 2024.
-
An End-to-End Authentication Mechanism for Wireless Body Area Networks
Authors:
Mosarrat Jahan,
Fatema Tuz Zohra,
Md. Kamal Parvez,
Upama Kabir,
Abdul Mohaimen Al Radi,
Shaily Kabir
Abstract:
Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the i…
▽ More
Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the identities of entities involved in the communication process. Since WBAN carries crucial health data, every entity engaged in the data transfer process must be authenticated. In literature, an end-to-end user authentication mechanism covering each communicating party is absent. Besides, most of the existing user authentication mechanisms are designed assuming that the patient's mobile phone is trusted. In reality, a patient's mobile phone can be stolen or comprised by malware and thus behaves maliciously. Our work addresses these drawbacks and proposes an end-to-end user authentication and session key agreement scheme between sensor nodes and medical experts in a scenario where the patient's mobile phone is semi-trusted. We present a formal security analysis using BAN logic. Besides, we also provide an informal security analysis of the proposed scheme. Both studies indicate that our method is robust against well-known security attacks. In addition, our scheme achieves comparable computation and communication costs concerning the related existing works. The simulation shows that our method preserves satisfactory network performance.
△ Less
Submitted 11 November, 2021;
originally announced November 2021.
-
A Review of Software-Defined WLANs: Architectures and Central Control Mechanisms
Authors:
Behnam Dezfouli,
Vahid Esmaeelzadeh,
Jaykumar Sheth,
Marjan Radi
Abstract:
The significant growth in the number of WiFi-enabled devices as well as the increase in the traffic conveyed through wireless local area networks (WLANs) necessitate the adoption of new network control mechanisms. Specifically, dense deployment of access points, client mobility, and emerging QoS demands bring about challenges that cannot be effectively addressed by distributed mechanisms. Recent s…
▽ More
The significant growth in the number of WiFi-enabled devices as well as the increase in the traffic conveyed through wireless local area networks (WLANs) necessitate the adoption of new network control mechanisms. Specifically, dense deployment of access points, client mobility, and emerging QoS demands bring about challenges that cannot be effectively addressed by distributed mechanisms. Recent studies show that software-defined WLANs (SDWLANs) simplify network control, improve QoS provisioning, and lower the deployment cost of new network control mechanisms. In this paper, we present an overview of SDWLAN architectures and provide a qualitative comparison in terms of features such as programmability and virtualization. In addition, we classify and investigate the two important classes of centralized network control mechanisms: (i) association control (AsC) and (ii) channel assignment (ChA). We study the basic ideas employed by these mechanisms, and in particular, we focus on the metrics utilized and the problem formulation techniques proposed. We present a comparison of these mechanisms and identify open research problems.
△ Less
Submitted 1 September, 2018;
originally announced September 2018.
-
Efficient Service Broker Policy For Large-Scale Cloud Environments
Authors:
Mohammed Radi
Abstract:
Algorithms, policies, and methodologies are necessary to achieve high user satisfaction and practical utilization in cloud computing by ensuring the efficient and fair allocation of every computing resource. Whenever a new job arrives in cloud environments, the service broker is responsible for selecting the data center that will execute that job. Selecting data centers serves an important functio…
▽ More
Algorithms, policies, and methodologies are necessary to achieve high user satisfaction and practical utilization in cloud computing by ensuring the efficient and fair allocation of every computing resource. Whenever a new job arrives in cloud environments, the service broker is responsible for selecting the data center that will execute that job. Selecting data centers serves an important function in enhancing the performance of a cloud environment. This study proposes a new service broker policy for large-scale cloud applications based on the round-robin algorithm. The proposed policy is implemented and evaluated using a CloudAnalyst simulator. It is then compared with three existing policies in terms of overall average response time by using different virtual machine load balancing algorithms. Simulation results show that the proposed policy improves the overall average response time relative to that of the other policies.
△ Less
Submitted 11 March, 2015;
originally announced March 2015.
-
A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks
Authors:
Behnam Dezfouli,
Marjan Radi,
Shukor Abd Razak
Abstract:
In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower net…
▽ More
In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower network capacity. In this paper we propose IAMAC, a CSMA/CA sleep/wake MAC protocol that minimizes inter-node interference, while also reduces per-hop delay through cross-layer interactions with the network layer. Furthermore, we show that IAMAC can be integrated into the SP architecture to perform its inter-layer interactions. Through simulation, we have extensively evaluated the performance of IAMAC in terms of different performance metrics. Simulation results confirm that IAMAC reduces energy consumption per node and leads to higher network lifetime compared to S-MAC and Adaptive S-MAC, while it also provides lower latency than S-MAC. Throughout our evaluations we have considered IAMAC in conjunction with two error recovery methods, i.e., ARQ and Seda. It is shown that using Seda as the error recovery mechanism of IAMAC results in higher throughput and lifetime compared to ARQ.
△ Less
Submitted 17 August, 2010;
originally announced August 2010.