In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level... more In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.
The recent evolution of the Internet of Things in the healthcare sector has attained substantial ... more The recent evolution of the Internet of Things in the healthcare sector has attained substantial recognition from the government and industry. Healthcare data accumulated from diverse sources are stored by health service providers which is useful for patient diagnosis as well as for research for pivotal analysis. However, healthcare data contains sensitive information of an individual that needs to be protected. The sensitive health information of an individual contains multiple attributes and the correlation of this information may lead to a privacy breach. In more complex scenarios, such type of data is expected to be released periodically and dynamically, the privacy breach of individuals becomes imminent due to the presence of personal data. In this article, a fuzzy logic-based intelligent privacy-aware algorithm is proposed to protect the individual’s privacy with multiple sensitive attributes in a dynamic data release scenario. Our formal modeling and analysis show that the proposed approach offers a robust privacy guarantee while releasing health-related data. Furthermore, the empirical evaluation exhibits that the proposed model outperforms the state-of-the-art approaches in terms of information loss and query accuracy.
A wireless multimedia sensor networks (WMSNs) an emerging field of sensor networks has wide varie... more A wireless multimedia sensor networks (WMSNs) an emerging field of sensor networks has wide variety of multimedia applications. Due to its ever increasing range of visual applications data redundancy and correlated information distribution is major issue in WMSNs. In this paper we have introduced a technique to remove redundant information. Extracting mutual sensed region is the core of proposed approach. To extract mutual sensed region first scale invariant feature transform (SIFT) is applied for selecting control points in correspondence with two views. After extracting control points affine image registration is applied to find mutual sensed region, and affine matrix is used to assist node for first frame onward communication. The proposed approach is implemented and tested in MATLAB and it shows decrease in size of frames as compared to H.264 encoding standard.
Modeling and Simulation of Complex Communication Networks, 2019
In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level... more In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.
With the advent of smart health, smart cities, and smart grids, the amount of data has grown swif... more With the advent of smart health, smart cities, and smart grids, the amount of data has grown swiftly. When the collected data is published for valuable information mining, privacy turns out to be a key matter due to the presence of sensitive information. Such sensitive information comprises either a single sensitive attribute (an individual has only one sensitive attribute) or multiple sensitive attributes (an individual can have multiple sensitive attributes). Anonymization of data sets with multiple sensitive attributes presents some unique problems due to the correlation among these attributes. Artificial intelligence techniques can help the data publishers in anonymizing such data. To the best of our knowledge, no fuzzy logic-based privacy model has been proposed until now for privacy preservation of multiple sensitive attributes. In this paper, we propose a novel privacy preserving model F-Classify that uses fuzzy logic for the classification of quasi-identifier and multiple se...
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended... more Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The proposed work presents a design of a novel routing algorithm for optimal route discovery, congestion reduction, dynamic route selection and scalability in hybrid mesh networks. The authors have focused on Hybrid Routing Protocols to originate a novel routing scheme based on AODV (Ad hoc On-Demand Distance Vector routing protocol) in Ad-Hoc level with clustering scheme and DSDV (Destination...
Sensor devices are limited energy, limited processing power and low memory devices. Providing qua... more Sensor devices are limited energy, limited processing power and low memory devices. Providing quality of service (QoS) with highly constrained devices is always a challenging issue. To conserve energy and to provide application specific QoS requirement is a major concern of wireless multimedia sensor networks (WMSNs). The best solution for such network is using multi-criteria decision making. An artificial intelligence (AI) suits best for decision based on multiple criteria. In this paper fuzzy logic is used to select an optimal path for routing from multiple paths. Expected transmission count (ETX), residual energy (RE) and hop count (HP) is used in decision making by fuzzy logic. The proposed approach improves the throughput and avoids lossy links using the ETX which is the requirement of multimedia tra c and RE and HC also help in selecting high energy and minimum hop count path. Duty cycle (DC) is adjusted dynamically which minimizes the energy consumption of a node as compared ...
International Journal of Adaptive, Resilient and Autonomic Systems, 2014
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended... more Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The proposed work presents a design of a novel routing algorithm for optimal route discovery, congestion reduction, dynamic route selection and scalability in hybrid mesh networks. The authors have focused on Hybrid Routing Protocols to originate a novel routing scheme based on AODV (Ad hoc On-Demand Distance Vector routing protocol) in Ad-Hoc level with clustering scheme and DSDV (Destination...
In order to sustain connection and service in heterogeneous wireless environment, vertical handov... more In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available
In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level... more In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.
The recent evolution of the Internet of Things in the healthcare sector has attained substantial ... more The recent evolution of the Internet of Things in the healthcare sector has attained substantial recognition from the government and industry. Healthcare data accumulated from diverse sources are stored by health service providers which is useful for patient diagnosis as well as for research for pivotal analysis. However, healthcare data contains sensitive information of an individual that needs to be protected. The sensitive health information of an individual contains multiple attributes and the correlation of this information may lead to a privacy breach. In more complex scenarios, such type of data is expected to be released periodically and dynamically, the privacy breach of individuals becomes imminent due to the presence of personal data. In this article, a fuzzy logic-based intelligent privacy-aware algorithm is proposed to protect the individual’s privacy with multiple sensitive attributes in a dynamic data release scenario. Our formal modeling and analysis show that the proposed approach offers a robust privacy guarantee while releasing health-related data. Furthermore, the empirical evaluation exhibits that the proposed model outperforms the state-of-the-art approaches in terms of information loss and query accuracy.
A wireless multimedia sensor networks (WMSNs) an emerging field of sensor networks has wide varie... more A wireless multimedia sensor networks (WMSNs) an emerging field of sensor networks has wide variety of multimedia applications. Due to its ever increasing range of visual applications data redundancy and correlated information distribution is major issue in WMSNs. In this paper we have introduced a technique to remove redundant information. Extracting mutual sensed region is the core of proposed approach. To extract mutual sensed region first scale invariant feature transform (SIFT) is applied for selecting control points in correspondence with two views. After extracting control points affine image registration is applied to find mutual sensed region, and affine matrix is used to assist node for first frame onward communication. The proposed approach is implemented and tested in MATLAB and it shows decrease in size of frames as compared to H.264 encoding standard.
Modeling and Simulation of Complex Communication Networks, 2019
In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level... more In this chapter, we have modeled Chord in DescRiptivE Agent-based Models (DREAM) for higher level of abstraction. For textual description of Chord, Overview, design concepts and details (ODD) is used. To best of our knowledge, Chord is not yet modeled in DREAM and ODD in the literature. The main contributions of our works are as follows: We have replicated the results of PeerSim-Chord in NetLogo. We have modeled Chord in ODD for its textual description. For pseudo-code-based specification and centralities measure, we have modeled Chord in DREAM. We have compared and discussed the results of PeerSim and NetLogo. Rest of the chapter is organized as follows. Second section covers background and literature review, and in the third section we have modeled Chord in ODD and DREAM. Fourth section discusses the results, and the last section concludes the chapter.
With the advent of smart health, smart cities, and smart grids, the amount of data has grown swif... more With the advent of smart health, smart cities, and smart grids, the amount of data has grown swiftly. When the collected data is published for valuable information mining, privacy turns out to be a key matter due to the presence of sensitive information. Such sensitive information comprises either a single sensitive attribute (an individual has only one sensitive attribute) or multiple sensitive attributes (an individual can have multiple sensitive attributes). Anonymization of data sets with multiple sensitive attributes presents some unique problems due to the correlation among these attributes. Artificial intelligence techniques can help the data publishers in anonymizing such data. To the best of our knowledge, no fuzzy logic-based privacy model has been proposed until now for privacy preservation of multiple sensitive attributes. In this paper, we propose a novel privacy preserving model F-Classify that uses fuzzy logic for the classification of quasi-identifier and multiple se...
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended... more Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The proposed work presents a design of a novel routing algorithm for optimal route discovery, congestion reduction, dynamic route selection and scalability in hybrid mesh networks. The authors have focused on Hybrid Routing Protocols to originate a novel routing scheme based on AODV (Ad hoc On-Demand Distance Vector routing protocol) in Ad-Hoc level with clustering scheme and DSDV (Destination...
Sensor devices are limited energy, limited processing power and low memory devices. Providing qua... more Sensor devices are limited energy, limited processing power and low memory devices. Providing quality of service (QoS) with highly constrained devices is always a challenging issue. To conserve energy and to provide application specific QoS requirement is a major concern of wireless multimedia sensor networks (WMSNs). The best solution for such network is using multi-criteria decision making. An artificial intelligence (AI) suits best for decision based on multiple criteria. In this paper fuzzy logic is used to select an optimal path for routing from multiple paths. Expected transmission count (ETX), residual energy (RE) and hop count (HP) is used in decision making by fuzzy logic. The proposed approach improves the throughput and avoids lossy links using the ETX which is the requirement of multimedia tra c and RE and HC also help in selecting high energy and minimum hop count path. Duty cycle (DC) is adjusted dynamically which minimizes the energy consumption of a node as compared ...
International Journal of Adaptive, Resilient and Autonomic Systems, 2014
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended... more Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The proposed work presents a design of a novel routing algorithm for optimal route discovery, congestion reduction, dynamic route selection and scalability in hybrid mesh networks. The authors have focused on Hybrid Routing Protocols to originate a novel routing scheme based on AODV (Ad hoc On-Demand Distance Vector routing protocol) in Ad-Hoc level with clustering scheme and DSDV (Destination...
In order to sustain connection and service in heterogeneous wireless environment, vertical handov... more In order to sustain connection and service in heterogeneous wireless environment, vertical handover is necessary. Now-a-days research focus is to optimize vertical handover so that optimized and application specific (QoS based) handover can be made possible. In this paper, an intelligent approach to vertical handover is proposed. The fuzzy logic based decision making is used to select among the available
Uploads
Papers by Hasina Attaullah