-
DECORAS: detection and characterization of radio-astronomical sources using deep learning
Authors:
S. Rezaei,
J. P. McKean,
M. Biehl,
A. Javadpour
Abstract:
We present DECORAS, a deep learning based approach to detect both point and extended sources from Very Long Baseline Interferometry (VLBI) observations. Our approach is based on an encoder-decoder neural network architecture that uses a low number of convolutional layers to provide a scalable solution for source detection. In addition, DECORAS performs source characterization in terms of the posit…
▽ More
We present DECORAS, a deep learning based approach to detect both point and extended sources from Very Long Baseline Interferometry (VLBI) observations. Our approach is based on an encoder-decoder neural network architecture that uses a low number of convolutional layers to provide a scalable solution for source detection. In addition, DECORAS performs source characterization in terms of the position, effective radius and peak brightness of the detected sources. We have trained and tested the network with images that are based on realistic Very Long Baseline Array (VLBA) observations at 20 cm. Also, these images have not gone through any prior de-convolution step and are directly related to the visibility data via a Fourier transform. We find that the source catalog generated by DECORAS has a better overall completeness and purity, when compared to a traditional source detection algorithm. DECORAS is complete at the 7.5$σ$ level, and has an almost factor of two improvement in reliability at 5.5$σ$. We find that DECORAS can recover the position of the detected sources to within 0.61 $\pm$ 0.69 mas, and the effective radius and peak surface brightness are recovered to within 20 per cent for 98 and 94 per cent of the sources, respectively. Overall, we find that DECORAS provides a reliable source detection and characterization solution for future wide-field VLBI surveys.
△ Less
Submitted 21 September, 2021; v1 submitted 19 September, 2021;
originally announced September 2021.
-
A Temperature Monitoring System Incorporating an Array of Precision Wireless Thermometers
Authors:
Amir Javadpour,
Hamidreza Memarzadeh Tehran,
Fatemeh Saghafi
Abstract:
This paper addresses the design and implementation of a real time temperature monitoring system with applications in telemedicine. The system consists of a number of precision wireless thermometers which are conceived and realized to measure the patients body temperature in hospitals and the intensive care units. Each wireless thermometer incorporates an accurate semiconductor temperature sensor,…
▽ More
This paper addresses the design and implementation of a real time temperature monitoring system with applications in telemedicine. The system consists of a number of precision wireless thermometers which are conceived and realized to measure the patients body temperature in hospitals and the intensive care units. Each wireless thermometer incorporates an accurate semiconductor temperature sensor, a transceiver operating at 2.4 GHz and a microcontroller that controls the thermometer functionalities. An array of two thermometers are implemented and successfully evaluated in different scenarios, including free space and in vivo tests. Also, an in house developed computer software is used in order to visualize the measurements in addition to detecting rapid increase and alerting high body temperature. The agreement between the experimental data and reference temperature values is significant.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network
Authors:
Amir Javadpour,
Guojun Wang,
Xiaofei Xing
Abstract:
Network virtualization is a way to simultaneously run multiple heterogeneous architectures on a shared substrate. The main issue in the virtualization of networks is the problem of mapping virtual networks to the substrate network. How to manage substrate resources when performing the mapping will have an effective role in improving the use of infrastructure resources and consequently better mappi…
▽ More
Network virtualization is a way to simultaneously run multiple heterogeneous architectures on a shared substrate. The main issue in the virtualization of networks is the problem of mapping virtual networks to the substrate network. How to manage substrate resources when performing the mapping will have an effective role in improving the use of infrastructure resources and consequently better mapping. By writing a module in the controller for dynamic resource management, an initial mapping has been attempted until the request arrives, if sufficient resources are available, but until the arrival of the n request that their initial mapping is successful, writing the rules in the switches is postponed. The simulation results with the NS2 simulator showed that compared to the two similar approaches, the proposed method could reduce the delay and the cost by maintaining the acceptance rate. Keywords: Heterogeneous, Network virtualization, Software-defined network, Virtual network mapping, Substrate Resources
△ Less
Submitted 20 April, 2020;
originally announced May 2020.
-
Providing a way to create balance between reliability and delays in SDN networks by using the appropriate placement of controllers
Authors:
Amir Javadpour
Abstract:
Computer networks covered the entire world and a serious and new development has not formed for many years. But companies and consumer organizations complain about the failure to add new features to their networks and according to their need, like much of the works to be done automatically and they also like to develop and expand their networks on the software side so they do not need new expensiv…
▽ More
Computer networks covered the entire world and a serious and new development has not formed for many years. But companies and consumer organizations complain about the failure to add new features to their networks and according to their need, like much of the works to be done automatically and they also like to develop and expand their networks on the software side so they do not need new expensive hardware for many of the activities and needs of their network. Analysis of the control layers and writing data in Software-Defined Network facilitate network management and accelerate innovation in network. In order to develop broad networks of SDN, often a large number controller is needed and located position of controllers in the SDN networks and can be raised as an important and basic issue in the field of SDN network and have impact on reliability of SDN networks. This paper focused on latency and reliability in SDN networks. The latency here means the delay in response to the request of data path that has a significant impact on network latency. In this paper it is shown that the number of controllers and their position can be effective on two measures; reliability and latency in SDN networks.
△ Less
Submitted 24 April, 2020;
originally announced May 2020.
-
An Optimize-Aware Target Tracking Method with Combine MAC layer and Active Nodes in Wireless Sensor Networks
Authors:
Amir Javadpour
Abstract:
Wireless Sensor Network WSN is consisted of nodes with different sizes and a specific goal. Tracking applications are very important in WSNs. This study proposes a method for reducing energy consumption in WSNs, considering target tracking. A prediction method is also presented with the help of MAC Medium Access Control layer in which a few number of nodes are in active mode to track the target wh…
▽ More
Wireless Sensor Network WSN is consisted of nodes with different sizes and a specific goal. Tracking applications are very important in WSNs. This study proposes a method for reducing energy consumption in WSNs, considering target tracking. A prediction method is also presented with the help of MAC Medium Access Control layer in which a few number of nodes are in active mode to track the target while the rest of the nodes are switched into sleeping mode. Energy consumption was reduced by decreasing the number of nodes involved in target tracking and activating merely a limited number of necessary nodes. The conducted experiments suggest that the proposed algorithm has a much better performance compared to similar algorithms in different conditions, including energy consumption in different communication ranges, effect of the number of nodes on energy consumption, the number of nodes involved in tracking in terms of communication range, and losing the target. This means the proposed method is superior and more efficient. When the target enters the simulation area, nodes of the network identify the target node through the proposed method (which is the optimum method) and track it as long as it is inside the simulation area. Performance criteria, including energy, other nodes, and throughput were used in simulation. The results showed that the proposed method has the optimum performance and reduces energy consumption of the network during tracking. The results of the simulation showed that the proposed method reduces energy consumption to an acceptable extent, compared to previous methods, in addition to increasing the accuracy of target tracking. Keywords: Active nodes, MAC layer, Energy efficiency, Target tracking, Wireless sensor networks, Target tracking.
△ Less
Submitted 20 April, 2020;
originally announced May 2020.
-
A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm
Authors:
Amir Javadpour,
Samira Rezaei,
Kuan-Ching Li,
Guojun Wang
Abstract:
Due to the fast-growing volume of text documents and reviews in recent years, current analyzing techniques are not competent enough to meet the users' needs. Using feature selection techniques not only support to understand data better but also lead to higher speed and also accuracy. In this article, the Whale Optimization algorithm is considered and applied to the search for the optimum subset of…
▽ More
Due to the fast-growing volume of text documents and reviews in recent years, current analyzing techniques are not competent enough to meet the users' needs. Using feature selection techniques not only support to understand data better but also lead to higher speed and also accuracy. In this article, the Whale Optimization algorithm is considered and applied to the search for the optimum subset of features. As known, F-measure is a metric based on precision and recall that is very popular in comparing classifiers. For the evaluation and comparison of the experimental results, PART, random tree, random forest, and RBF network classification algorithms have been applied to the different number of features. Experimental results show that the random forest has the best accuracy on 500 features. Keywords: Feature selection, Whale Optimization algorithm, Selecting optimal, Classification algorithm
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Improving Resources Management in Network Virtualization by Utilizing a Software-Based Network
Authors:
Amir Javadpour
Abstract:
Network virtualization is a way to simultaneously run multiple heterogeneous architectures on a shared substrate. The main issue in network virtualization is mapping virtual networks to substrate network. How to manage substrate resources in mapping phase will have an effective role in improving the use of infrastructure resources. Using software-based networks in network virtualization which sepa…
▽ More
Network virtualization is a way to simultaneously run multiple heterogeneous architectures on a shared substrate. The main issue in network virtualization is mapping virtual networks to substrate network. How to manage substrate resources in mapping phase will have an effective role in improving the use of infrastructure resources. Using software-based networks in network virtualization which separates control logic from data as a new technology, has led to efficient resource management in this context. In this article a software-based network approach has been presented to network virtualization and manage infrastructure resources efficiently. It optimizes mapping function by dynamic resource management of infrastructure resource. We have added a module in the controller to manage the resources dynamically. An initial mapping will be done for arriving new requests based on number of successful requests and arriving time slots. They will not be finalized by writing the rules in the switches before arriving n requests. If some remapping during the n time window is needed, remapping can be done by the controller and the final results are sent to the switches to write the flow rules. The simulation has been done using NS2 simulator showed based on different evaluation criteria such as acceptance rate, average link utilization, cost and delay. Keywords: network virtualization, software based network, Virtual network mapping, substrate network, Virtual network.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms
Authors:
Amir Javadpour,
Sanaz Kazemi Abharian,
Guojun Wang
Abstract:
Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert In addition; the advancement of computer networks, the number of attacks and infiltrations are also increasing. In fact, the knowledge coming from an expert will lose its value over time and must be updated and made available to the system and this makes the need for t…
▽ More
Characteristics and way of behavior of attacks and infiltrators on computer networks are usually very difficult and need an expert In addition; the advancement of computer networks, the number of attacks and infiltrations are also increasing. In fact, the knowledge coming from an expert will lose its value over time and must be updated and made available to the system and this makes the need for the expert person always felt. In machine learning techniques, knowledge is extracted from the data itself which has diminished the role of the expert. Various methods used to detect intrusions, such as statistical models, safe system approach, neural networks, etc., all weaken the fact that it uses all the features of an information packet rotating in the network for intrusion detection. Also, the huge volume of information and the unthinkable state space is also an important issue in the detection of intrusion. Therefore, the need for automatic identification of new and suspicious patterns in an attempt for intrusion with the use of more efficient methods Lower cost and higher performance is needed more than before. The purpose of this study is to provide a new method based on intrusion detection systems and its various architectures aimed at increasing the accuracy of intrusion detection in cloud computing. Keywords : intrusion detection, feature Selection, classification Algorithm, machine learning, neural network.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Detecting Straggler MapReduce Tasks in Big Data Processing Infrastructure by Neural Network
Authors:
Amir Javadpour,
Guojun Wang,
Samira Rezaei,
Kuan Ching Li
Abstract:
Straggler task detection is one of the main challenges in applying MapReduce for parallelizing and distributing large-scale data processing. It is defined as detecting running tasks on weak nodes. Considering two stages in the Map phase copy, combine and three stages of Reduce shuffle, sort and reduce, the total execution time is the total sum of the execution time of these five stages. Estimating…
▽ More
Straggler task detection is one of the main challenges in applying MapReduce for parallelizing and distributing large-scale data processing. It is defined as detecting running tasks on weak nodes. Considering two stages in the Map phase copy, combine and three stages of Reduce shuffle, sort and reduce, the total execution time is the total sum of the execution time of these five stages. Estimating the correct execution time in each stage that results in correct total execution time is the primary purpose of this paper. The proposed method is based on the application of a backpropagation Neural Network NN on the Hadoop for the detection of straggler tasks, to estimate the remaining execution time of tasks that is very important in straggler task detection. Results achieved have been compared with popular algorithms in this domain such as LATE, ESAMR and the real remaining time for WordCount and Sort benchmarks, and shown able to detect straggler tasks and estimate execution time accurately. Besides, it supports to accelerate task execution time.
△ Less
Submitted 13 April, 2020;
originally announced April 2020.
-
An Accurate Measurement System Comprising of Wireless Thermometers for Neonate Body Temperature Monitoring
Authors:
Abdollah Javadpour,
abolfazl rahimi,
Amir Javadpour,
Hossien vazini,
Zeynab Farhadi,
Gholam hossein baghdadpour,
Zahra Mardani Korani
Abstract:
This paper addresses the design and implementation of a real-time monitoring system consisting of wireless thermometers for continuous recording of neonate body temperature in an intensive care unit (ICU). Each wireless thermometer incorporates an accurate semiconductor temperature sensor, a transceiver operating on ISM frequency band (i.e., 915 MHz) as well as a microcontroller which is used to c…
▽ More
This paper addresses the design and implementation of a real-time monitoring system consisting of wireless thermometers for continuous recording of neonate body temperature in an intensive care unit (ICU). Each wireless thermometer incorporates an accurate semiconductor temperature sensor, a transceiver operating on ISM frequency band (i.e., 915 MHz) as well as a microcontroller which is used to control the thermometers functionalities including wireless medium access (e.g., free space or body channel), transmission and reception. A voltage regulator and a low-pass filter were also used for removing spurious signals and environmental noise from the thermometer feed line. In order to distinguish the reading of each thermometer from measurements performed by other thermometers, the I-wire protocol was used. This protocol can securely tag the temperature value by incorporating a unique ID (provided by the manufacturer) into the packet sent wirelessly. An array of two thermometers was implemented and successfully tested in different scenarios, namely free-space, water (immersed thermometers) and on a volunteers wrist. Moreover, an in-house developed computer software was used in order to visualize the readings in addition to alerting rapid increase and high body temperature. The software also compares the measurement results with actual values. The agreement between the experimental data and real temperature values is reasonably acceptable and that of the on-body testing is significant. Keywords : Temperature measurement, Wireless thermometer, Temperature sensors, Wireless sensor networks, Wireless communication, Monitoring, Protocols, Time measurement
△ Less
Submitted 15 August, 2019;
originally announced August 2019.
-
Improving Brain Magnetic Resonance Image MRI Segmentation via a Novel Algorithm based on Genetic and Regional Growth
Authors:
Amir Javadpour,
Alireza Mohammadi
Abstract:
Background: Regarding the importance of right diagnosis in medical applications, various methods have been exploited for processing medical images solar. The method of segmentation is used to analyze anal to miscall structures in medical imaging. Objective: This study describes a new method for brain Magnetic Resonance Image (MRI) segmentation via a novel algorithm based on genetic and regional gr…
▽ More
Background: Regarding the importance of right diagnosis in medical applications, various methods have been exploited for processing medical images solar. The method of segmentation is used to analyze anal to miscall structures in medical imaging. Objective: This study describes a new method for brain Magnetic Resonance Image (MRI) segmentation via a novel algorithm based on genetic and regional growth. Methods: Among medical imaging methods, brains MRI segmentation is important due to the high contrast of non-intrusive soft tissue and high spatial resolution. Size variations of brain tissues are often accompanied by various diseases such as Alzheimers disease. As our knowledge about the relationship between various brain diseases and deviation of brain anatomy increases, MRI segmentation is exploited as the first step in early diagnosis. In this paper, the regional growth method and auto-mate selection of initial points by genetic algorithm are used to introduce a new method for MRI segmentation. Primary pixels and similarity criterion are automatically by genetic algorithms to maximize the accuracy and validity in image segmentation. Results: By using genetic algorithms and defining the fixed function of image segmentation, the initial points for the algorithm were found. The proposed algorithms are applied to the images and results are manually selected by regional growth in which the initial points were compared. The results showed that the proposed algorithm could reduce segmentation error effectively. Conclusion: The study concluded that the proposed algorithm could reduce segmentation error effectively and help us to diagnose brain diseases.
△ Less
Submitted 22 July, 2019;
originally announced July 2019.
-
A Wearable Medical Sensor for Provisional Healthcare
Authors:
Amir Javadpour,
HamidrezaMemarzadeh-Tehran
Abstract:
Thispaper presents the design and realization of a context-aware wireless health monitoring system for recording the heartbeat (HR) and respiration (RR) rate based on an indirect measurement approach. The system consists of a contact-less medical sensor as well as a communication infrastructure for handling the transmission and reception of the measured results. The contact-less sensor includes a…
▽ More
Thispaper presents the design and realization of a context-aware wireless health monitoring system for recording the heartbeat (HR) and respiration (RR) rate based on an indirect measurement approach. The system consists of a contact-less medical sensor as well as a communication infrastructure for handling the transmission and reception of the measured results. The contact-less sensor includes a highly sensitive tri-axial accelerometer, an accurate temperature and air pressure sensor that enable one to inspect patients' health condition by continuously monitoring of two critical signs related to the cardiorespiratory system. The developed system can also be utilized in performing a number of long-term inspection on the heart and lungs while measuring the HR and RR values in addition to calculating the HR and RR ratio, which is denoted by HRR. The obtained results show the potential of the developed system for versatile monitoring applications applied to telemedicine
△ Less
Submitted 18 July, 2019;
originally announced July 2019.