Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–35 of 35 results for author: Syed, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11717  [pdf, other

    cs.LG cs.AI cs.CL

    Refusal in Language Models Is Mediated by a Single Direction

    Authors: Andy Arditi, Oscar Obeso, Aaquib Syed, Daniel Paleka, Nina Rimsky, Wes Gurnee, Neel Nanda

    Abstract: Conversational large language models are fine-tuned for both instruction-following and safety, resulting in models that obey benign requests but refuse harmful ones. While this refusal behavior is widespread across chat models, its underlying mechanisms remain poorly understood. In this work, we show that refusal is mediated by a one-dimensional subspace, across 13 popular open-source chat models… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2402.01689  [pdf

    cs.CY

    Predictive Health Analysis in Industry 5.0: A Scientometric and Systematic Review of Motion Capture in Construction

    Authors: Md Hadisur Rahman, Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Asif Bin Syed, Mst Ummul Farah

    Abstract: In an era of rapid technological advancement, the rise of Industry 4.0 has prompted industries to pursue innovative improvements in their processes. As we advance towards Industry 5.0, which focuses more on collaboration between humans and intelligent systems, there is a growing requirement for better sensing technologies for healthcare and safety purposes. Consequently, Motion Capture (MoCap) sys… ▽ More

    Submitted 22 January, 2024; originally announced February 2024.

  3. arXiv:2401.11358  [pdf, other

    cs.CV

    ANNA: A Deep Learning Based Dataset in Heterogeneous Traffic for Autonomous Vehicles

    Authors: Mahedi Kamal, Tasnim Fariha, Afrina Kabir Zinia, Md. Abu Syed, Fahim Hasan Khan, Md. Mahbubur Rahman

    Abstract: Recent breakthroughs in artificial intelligence offer tremendous promise for the development of self-driving applications. Deep Neural Networks, in particular, are being utilized to support the operation of semi-autonomous cars through object identification and semantic segmentation. To assess the inadequacy of the current dataset in the context of autonomous and semi-autonomous cars, we created a… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  4. arXiv:2312.07711  [pdf, other

    cs.AI

    Leveraging Large Language Models to Build and Execute Computational Workflows

    Authors: Alejandro Duque, Abdullah Syed, Kastan V. Day, Matthew J. Berry, Daniel S. Katz, Volodymyr V. Kindratenko

    Abstract: The recent development of large language models (LLMs) with multi-billion parameters, coupled with the creation of user-friendly application programming interfaces (APIs), has paved the way for automatically generating and executing code in response to straightforward human queries. This paper explores how these emerging capabilities can be harnessed to facilitate complex scientific workflows, eli… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  5. arXiv:2311.16142  [pdf, other

    cs.RO eess.SY

    Investigating Lane-Free Traffic with a Dynamic Driving Simulator

    Authors: Maya Sekeran, Arslan Ali Syed, Johannes Lindner, Martin Margreiter, Klaus Bogenberger

    Abstract: Lane-free traffic (LFT) is a new traffic system that relies on connected and automated vehicles (CAV) to increase road capacity and utilization by removing traditional lane markings using coordinated maneuvering of CAVs in LFT strategies. LFT is based on two main principles: upstream nudging and vehicles moving without adhering to any lane markings. By leveraging CAV capabilities to communicate an… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: This paper was presented at IEEE ITSC 2023

  6. arXiv:2311.03636  [pdf

    cs.HC cs.AI cs.LG

    Analysis of the User Perception of Chatbots in Education Using A Partial Least Squares Structural Equation Modeling Approach

    Authors: Md Rabiul Hasan, Nahian Ismail Chowdhury, Md Hadisur Rahman, Md Asif Bin Syed, JuHyeong Ryu

    Abstract: The integration of Artificial Intelligence (AI) into education is a recent development, with chatbots emerging as a noteworthy addition to this transformative landscape. As online learning platforms rapidly advance, students need to adapt swiftly to excel in this dynamic environment. Consequently, understanding the acceptance of chatbots, particularly those employing Large Language Model (LLM) suc… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: Chatbot, ChatGPT, Google BARD, Interactive AI, PLS-SEM, Technology Acceptance Model, Technology Readiness Index

  7. arXiv:2310.10348  [pdf, other

    cs.LG cs.AI cs.CL

    Attribution Patching Outperforms Automated Circuit Discovery

    Authors: Aaquib Syed, Can Rager, Arthur Conmy

    Abstract: Automated interpretability research has recently attracted attention as a potential research direction that could scale explanations of neural network behavior to large models. Existing automated circuit discovery work applies activation patching to identify subnetworks responsible for solving specific tasks (circuits). In this work, we show that a simple method based on attribution patching outpe… ▽ More

    Submitted 20 November, 2023; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: 6 main paper pages, 6 additional pages. NeurIPS 2023 ATTRIB Workshop

  8. arXiv:2309.13402  [pdf, other

    cs.LG

    ML Algorithm Synthesizing Domain Knowledge for Fungal Spores Concentration Prediction

    Authors: Md Asif Bin Syed, Azmine Toushik Wasi, Imtiaz Ahmed

    Abstract: The pulp and paper manufacturing industry requires precise quality control to ensure pure, contaminant-free end products suitable for various applications. Fungal spore concentration is a crucial metric that affects paper usability, and current testing methods are labor-intensive with delayed results, hindering real-time control strategies. To address this, a machine learning algorithm utilizing t… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

  9. arXiv:2309.13147  [pdf, other

    cs.CL

    Cardiovascular Disease Risk Prediction via Social Media

    Authors: Al Zadid Sultan Bin Habib, Md Asif Bin Syed, Md Tanvirul Islam, Donald A. Adjeroh

    Abstract: Researchers use Twitter and sentiment analysis to predict Cardiovascular Disease (CVD) risk. We developed a new dictionary of CVD-related keywords by analyzing emotions expressed in tweets. Tweets from eighteen US states, including the Appalachian region, were collected. Using the VADER model for sentiment analysis, users were classified as potentially at CVD risk. Machine Learning (ML) models wer… ▽ More

    Submitted 28 September, 2023; v1 submitted 22 September, 2023; originally announced September 2023.

    Comments: 9 pages, 3 figures, 16th International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS 2023)

  10. Heterogeneous GNN-RL Based Task Offloading for UAV-aided Smart Agriculture

    Authors: Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Having unmanned aerial vehicles (UAVs) with edge computing capability hover over smart farmlands supports Internet of Things (IoT) devices with low processing capacity and power to accomplish their deadline-sensitive tasks efficiently and economically. In this work, we propose a graph neural network-based reinforcement learning solution to optimize the task offloading from these IoT devices to the… ▽ More

    Submitted 8 June, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

  11. arXiv:2304.01491  [pdf, other

    cs.LG

    Multi model LSTM architecture for Track Association based on Automatic Identification System Data

    Authors: Md Asif Bin Syed, Imtiaz Ahmed

    Abstract: For decades, track association has been a challenging problem in marine surveillance, which involves the identification and association of vessel observations over time. However, the Automatic Identification System (AIS) has provided a new opportunity for researchers to tackle this problem by offering a large database of dynamic and geo-spatial information of marine vessels. With the availability… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  12. arXiv:2303.14068  [pdf, other

    cs.LG

    A CNN-LSTM Architecture for Marine Vessel Track Association Using Automatic Identification System (AIS) Data

    Authors: Md Asif Bin Syed, Imtiaz Ahmed

    Abstract: In marine surveillance, distinguishing between normal and anomalous vessel movement patterns is critical for identifying potential threats in a timely manner. Once detected, it is important to monitor and track these vessels until a necessary intervention occurs. To achieve this, track association algorithms are used, which take sequential observations comprising geological and motion parameters o… ▽ More

    Submitted 6 June, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: No results has been changed, Changed Figures, increased the resolution of the figures, changed slightly in the description in section 3.3.3

  13. arXiv:2302.07399  [pdf, other

    cs.NI cs.AI cs.LG

    To Risk or Not to Risk: Learning with Risk Quantification for IoT Task Offloading in UAVs

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: A deep reinforcement learning technique is presented for task offloading decision-making algorithms for a multi-access edge computing (MEC) assisted unmanned aerial vehicle (UAV) network in a smart farm Internet of Things (IoT) environment. The task offloading technique uses financial concepts such as cost functions and conditional variable at risk (CVaR) in order to quantify the damage that may b… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: Accepted for ICC2023

  14. arXiv:2302.03018  [pdf, other

    eess.IV cs.CV

    DDM$^2$: Self-Supervised Diffusion MRI Denoising with Generative Diffusion Models

    Authors: Tiange Xiang, Mahmut Yurt, Ali B Syed, Kawin Setsompop, Akshay Chaudhari

    Abstract: Magnetic resonance imaging (MRI) is a common and life-saving medical imaging technique. However, acquiring high signal-to-noise ratio MRI scans requires long scan times, resulting in increased costs and patient discomfort, and decreased throughput. Thus, there is great interest in denoising MRI scans, especially for the subtype of diffusion MRI scans that are severely SNR-limited. While most prior… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: To appear in ICLR 2023

  15. arXiv:2301.10398  [pdf, other

    cs.OH

    A Survey of Process-Oriented Data Science and Analytics for supporting Business Process Management

    Authors: Asjad Khan, Aditya Ghose, Hoa Dam, Arsal Syed

    Abstract: Process analytics approaches allow organizations to support the practice of Business Process Management and continuous improvement by leveraging all process-related data to extract knowledge, improve process performance and support decision-making across the organization. Process execution data once collected will contain hidden insights and actionable knowledge that are of considerable business v… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

  16. arXiv:2211.04703  [pdf

    eess.IV cs.CV

    Automated MRI Field of View Prescription from Region of Interest Prediction by Intra-stack Attention Neural Network

    Authors: Ke Lei, Ali B. Syed, Xucheng Zhu, John M. Pauly, Shreyas S. Vasanawala

    Abstract: Manual prescription of the field of view (FOV) by MRI technologists is variable and prolongs the scanning process. Often, the FOV is too large or crops critical anatomy. We propose a deep-learning framework, trained by radiologists' supervision, for automating FOV prescription. An intra-stack shared feature extraction network and an attention network are used to process a stack of 2D image inputs… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

  17. arXiv:2209.14842  [pdf, other

    cs.SD eess.AS

    Classification of Vocal Bursts for ACII 2022 A-VB-Type Competition using Convolutional Neural Networks and Deep Acoustic Embeddings

    Authors: Muhammad Shehram Shah Syed, Zafi Sherhan Syed, Abbas Syed

    Abstract: This report provides a brief description of our proposed solution for the Vocal Burst Type classification task of the ACII 2022 Affective Vocal Bursts (A-VB) Competition. We experimented with two approaches as part of our solution for the task at hand. The first of which is based on convolutional neural networks trained on Mel Spectrograms, and the second is based on average pooling of deep acoust… ▽ More

    Submitted 13 October, 2022; v1 submitted 29 September, 2022; originally announced September 2022.

    Comments: Report for our submission to the ACII 2022 Affective Vocal Bursts (A-VB) Competition

  18. IoT-Aerial Base Station Task Offloading with Risk-Sensitive Reinforcement Learning for Smart Agriculture

    Authors: Turgay Pamuklu, Anne Catherine Nguyen, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Aerial base stations (ABSs) allow smart farms to offload processing responsibility of complex tasks from internet of things (IoT) devices to ABSs. IoT devices have limited energy and computing resources, thus it is required to provide an advanced solution for a system that requires the support of ABSs. This paper introduces a novel multi-actor-based risk-sensitive reinforcement learning approach f… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted Paper

  19. arXiv:2209.07367  [pdf, other

    cs.NI cs.AI

    Deep Reinforcement Learning for Task Offloading in UAV-Aided Smart Farm Networks

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: The fifth and sixth generations of wireless communication networks are enabling tools such as internet of things devices, unmanned aerial vehicles (UAVs), and artificial intelligence, to improve the agricultural landscape using a network of devices to automatically monitor farmlands. Surveying a large area requires performing a lot of image classification tasks within a specific period of time in… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted Paper

  20. arXiv:2207.14246  [pdf, other

    cs.MA eess.SY

    FleetPy: A Modular Open-Source Simulation Tool for Mobility On-Demand Services

    Authors: Roman Engelhardt, Florian Dandl, Arslan-Ali Syed, Yunfei Zhang, Fabian Fehn, Fynn Wolf, Klaus Bogenberger

    Abstract: The market share of mobility on-demand (MoD) services strongly increased in recent years and is expected to rise even higher once vehicle automation is fully available. These services might reduce space consumption in cities as fewer parking spaces are required if private vehicle trips are replaced. If rides are shared additionally, occupancy related traffic efficiency is increased. Simulations he… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  21. arXiv:2207.11504  [pdf

    cs.CV cs.AI

    Intelligent 3D Network Protocol for Multimedia Data Classification using Deep Learning

    Authors: Arslan Syed, Eman A. Aldhahri, Muhammad Munawar Iqbal, Abid Ali, Ammar Muthanna, Harun Jamil, Faisal Jamil

    Abstract: In videos, the human's actions are of three-dimensional (3D) signals. These videos investigate the spatiotemporal knowledge of human behavior. The promising ability is investigated using 3D convolution neural networks (CNNs). The 3D CNNs have not yet achieved high output for their well-established two-dimensional (2D) equivalents in still photographs. Board 3D Convolutional Memory and Spatiotempor… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.

    Comments: 21 pages, 10 figures

    ACM Class: I.2.11; H.4; C.2.2

  22. arXiv:2204.00644  [pdf, other

    cs.CV cs.LG

    SIMBAR: Single Image-Based Scene Relighting For Effective Data Augmentation For Automated Driving Vision Tasks

    Authors: Xianling Zhang, Nathan Tseng, Ameerah Syed, Rohan Bhasin, Nikita Jaipuria

    Abstract: Real-world autonomous driving datasets comprise of images aggregated from different drives on the road. The ability to relight captured scenes to unseen lighting conditions, in a controllable manner, presents an opportunity to augment datasets with a richer variety of lighting conditions, similar to what would be encountered in the real-world. This paper presents a novel image-based relighting pip… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: Accepted to CVPR 2022. Project page: https://simbarv1.github.io

  23. Reinforcement Learning-Based Deadline and Battery-Aware Offloading in Smart Farm IoT-UAV Networks

    Authors: Anne Catherine Nguyen, Turgay Pamuklu, Aisha Syed, W. Sean Kennedy, Melike Erol-Kantarci

    Abstract: Unmanned aerial vehicles (UAVs) with mounted base stations are a promising technology for monitoring smart farms. They can provide communication and computation services to extensive agricultural regions. With the assistance of a Multi-Access Edge Computing infrastructure, an aerial base station (ABS) network can provide an energy-efficient solution for smart farms that need to process deadline cr… ▽ More

    Submitted 12 February, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: Accepted Paper. Please check footnote in Page 1 for copyright

    Journal ref: ICC 2022 - IEEE International Conference on Communications

  24. arXiv:2110.04699  [pdf, other

    cs.NI

    Toward Ubiquitous and Flexible Coverage of UAV-IRS-Assisted NOMA Networks

    Authors: Chun-Hung Liu, Md Asif Syed, Lu Wei

    Abstract: This paper studies how to achieve a high and flexible coverage performance of a large-scale cellular network that enables unmanned aerial vehicles (UAVs) for non-orthogonal multiple access (NOMA) transmission to simultaneously serve multiple users. The considered cellular network consists of a tier of base stations and a tier of UAVs. Each UAV is mounted with an intelligent reflecting surface (IRS… ▽ More

    Submitted 19 January, 2022; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: 6 pages; 3 figures; conference

  25. arXiv:2107.14082  [pdf

    cs.CY cs.CR

    Social engineering: Concepts, Techniques and Security Countermeasures

    Authors: Adib Mohammed Syed

    Abstract: The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual academic research.

    Submitted 23 June, 2021; originally announced July 2021.

  26. arXiv:2007.13831  [pdf, other

    cs.CV

    Chest X-ray Report Generation through Fine-Grained Label Learning

    Authors: Tanveer Syeda-Mahmood, Ken C. L. Wong, Yaniv Gur, Joy T. Wu, Ashutosh Jadhav, Satyananda Kashyap, Alexandros Karargyris, Anup Pillai, Arjun Sharma, Ali Bin Syed, Orest Boyko, Mehdi Moradi

    Abstract: Obtaining automated preliminary read reports for common exams such as chest X-rays will expedite clinical workflows and improve operational efficiencies in hospitals. However, the quality of reports generated by current automated approaches is not yet clinically acceptable as they cannot ensure the correct detection of a broad spectrum of radiographic findings nor describe them accurately in terms… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 11 pages, 5 figures, to appear in MICCAI 2020 Conference

    ACM Class: I.2.1; I.4.9; J.3

  27. arXiv:2007.09866  [pdf, other

    cs.IT eess.SP

    A 3D Tractable Model for UAV-Enabled Cellular Networks With Multiple Antennas

    Authors: Chun-Hung Liu, Di-Chun Liang, Md Asif Syed, Rung-Hung Gau

    Abstract: This paper aims to propose a three-dimensional (3D) point process model that can be employed to generally deploy unmanned aerial vehicles (UAVs) in a large-scale cellular network and tractably analyze the fundamental network-wide performances of the network. The proposed 3D point process is devised based on a 2D homogeneous marked Poisson point process (PPP) in which each point and its random mark… ▽ More

    Submitted 29 December, 2020; v1 submitted 19 July, 2020; originally announced July 2020.

    Comments: 17 pages, 6 figures, 1 table

  28. arXiv:1912.02907  [pdf

    eess.IV cs.CV cs.LG

    Diagnostic Image Quality Assessment and Classification in Medical Imaging: Opportunities and Challenges

    Authors: Jeffrey Ma, Ukash Nakarmi, Cedric Yue Sik Kin, Christopher Sandino, Joseph Y. Cheng, Ali B. Syed, Peter Wei, John M. Pauly, Shreyas Vasanawala

    Abstract: Magnetic Resonance Imaging (MRI) suffers from several artifacts, the most common of which are motion artifacts. These artifacts often yield images that are of non-diagnostic quality. To detect such artifacts, images are prospectively evaluated by experts for their diagnostic quality, which necessitates patient-revisits and rescans whenever non-diagnostic quality scans are encountered. This motivat… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

    Comments: 4 pages, 8 Figures, Conference Submission

  29. arXiv:1906.06781  [pdf, ps, other

    cs.LG math.OC stat.ML

    Characterizing the Exact Behaviors of Temporal Difference Learning Algorithms Using Markov Jump Linear System Theory

    Authors: Bin Hu, Usman Ahmed Syed

    Abstract: In this paper, we provide a unified analysis of temporal difference learning algorithms with linear function approximators by exploiting their connections to Markov jump linear systems (MJLS). We tailor the MJLS theory developed in the control community to characterize the exact behaviors of the first and second order moments of a large family of temporal difference learning algorithms. For both t… ▽ More

    Submitted 4 November, 2019; v1 submitted 16 June, 2019; originally announced June 2019.

    Comments: To appear in NeurIPS 2019

  30. arXiv:1807.04020  [pdf, other

    math.NA cs.LG stat.ML

    Improved SVD-based Initialization for Nonnegative Matrix Factorization using Low-Rank Correction

    Authors: Atif Muhammad Syed, Sameer Qazi, Nicolas Gillis

    Abstract: Due to the iterative nature of most nonnegative matrix factorization (\textsc{NMF}) algorithms, initialization is a key aspect as it significantly influences both the convergence and the final solution obtained. Many initialization schemes have been proposed for NMF, among which one of the most popular class of methods are based on the singular value decomposition (SVD). However, these SVD-based i… ▽ More

    Submitted 11 July, 2018; originally announced July 2018.

    Comments: 12 pages, 1 figure, 5 tables, submitted to pattern recognition letters

    Journal ref: Pattern Recognition Letters 122, pp. 53-59, 2019

  31. arXiv:1703.05542  [pdf, ps, other

    cs.IT

    Concatenated LDPC-Polar Codes Decoding Through Belief Propagation

    Authors: Syed Mohsin Abbas, YouZhe Fan, Ji Chen, Chi-Ying Tsui

    Abstract: Owing to their capacity-achieving performance and low encoding and decoding complexity, polar codes have drawn much research interests recently. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two common approaches for decoding polar codes. SCD is sequential in nature while BPD can run in parallel. Thus BPD is more attractive for low latency applications. However B… ▽ More

    Submitted 16 March, 2017; originally announced March 2017.

    Comments: Accepted for publication in IEEE International Symposium on Circuits & Systems 2017 (ISCAS 2017)

  32. arXiv:1505.04979  [pdf, other

    cs.IT

    Low Complexity Belief Propagation Polar Code Decoders

    Authors: Syed Mohsin Abbas, YouZhe Fan, Ji Chen, Chi-Ying Tsui

    Abstract: Since its invention, polar code has received a lot of attention because of its capacity-achieving performance and low encoding and decoding complexity. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two of the most popular approaches for decoding polar codes. SCD is able to achieve good error-correcting performance and is less computationally expensive as compared… ▽ More

    Submitted 25 August, 2015; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: 6 pages

  33. arXiv:1504.06975  [pdf, other

    cs.OH

    Aashiyana: Design and Evaluation of a Smart Demand-Response System for Highly-stressed Grids

    Authors: Noman Bashir, Zohaib Sharani, Khushboo Qayyum, Affan A. Syed

    Abstract: This paper targets the unexplored problem of demand response within the context of power-grids that are allowed to regularly enforce blackouts as a mean to balance supply with demand:highly-stressed grids. Currently these utilities use as a cyclic and binary (power/no-power) schedule over consumer groups leading to significant wastage of capacity and long hours of no-power. We present here a novel… ▽ More

    Submitted 19 February, 2016; v1 submitted 27 April, 2015; originally announced April 2015.

  34. arXiv:1407.1466  [pdf

    cs.CY

    The Smart Shower

    Authors: Umair Atique Syed, Uma Kandan Muniandy

    Abstract: The smart shower is an intelligent device that saves the water during the shower. It uses the indicator lamps that inform the user of the amount of the water. Like the traffic signal it has three sets of lamps, green, yellow and red, each indicating the amount of time spent. This device brain is the Siemens Logo PLC.

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: 2 Pages, 3 Figures

  35. arXiv:1309.0276  [pdf, ps, other

    cs.NI

    Traffic analyzer for differentiating BitTorrent handshake failures from port-scans

    Authors: Kamran Khan, Affan Syed, Ali Khayam

    Abstract: This paper aims to improve the accuracy of port-scan detectors by analyzing traffic of BitTorrent hosts and differentiating their respective BitTorrent connection (attempts) from port-scans. It is shown that by looking at BitTorrent coordination traffic and modelling port-scanning behavior the number of BitTorrent-related false positives can be reduced by 80% without any loss of IDS accuracy.

    Submitted 3 September, 2013; v1 submitted 1 September, 2013; originally announced September 2013.