
Ahmad Yazdan Javaid- PhD
- Professor (Associate) at University of Toledo
Ahmad Yazdan Javaid
- PhD
- Professor (Associate) at University of Toledo
About
117
Publications
92,346
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,010
Citations
Introduction
Research expertise include cyber security of drone networks, smartphones, wireless sensor networks, and other systems. Extensive research on human-machine teams and applications of AI and machine learning to attack detection and mitigation.
Current institution
Additional affiliations
August 2015 - present
August 2011 - August 2015
September 2009 - July 2011
Education
July 2004 - May 2008
Publications
Publications (117)
Increased use of unmanned systems in various tasks enables users to complete important missions without risking human lives. Nonetheless, these systems pose a huge threat if the operational cyber security is not handled properly, especially for the unmanned aerial vehicle systems (UAVS), which can cause catastrophic damages. Therefore, it is import...
Advances in technology for miniature electronic military equipment and systems have led to the emergence of unmanned aerial vehicles (UAVs) as the new weapons of war and tools used in various other areas. UAVs can easily be controlled from a remote location. They are being used for critical operations, including offensive, reconnaissance, surveilla...
This paper investigates the challenges and solutions associated with integrating a hydrogen-generating nuclear-renewable integrated energy system (NR-IES) under a transactive energy framework. The proposed system directs excess nuclear power to hydrogen production during periods of low grid demand while utilizing renewables to maintain grid stabili...
The authentication of wireless devices through physical layer attributes has attracted a fair amount of attention recently. Recent work in this area has examined various features extracted from the wireless signal to either identify a uniqueness in the channel between the transmitter–receiver pair or more robustly identify certain transmitter behav...
Under partial shading conditions (PSC), a photovoltaic (PV) system may produce multiple local maximum power points (LMPPs). Traditional maximum power point tracking (MPPT) techniques are not able to distinguish between LMPPs and the global maximum power point (GMPP), leading to sub-optimal PV array power outputs. This paper proposes a two-level alg...
New ways to integrate energy systems to maximize efficiency are being sought to meet carbon emissions goals. Nuclear-renewable integrated energy system (NR-IES) concepts are a leading solution that couples a nuclear power plant with renewable energy, hydrogen generation plants, and energy storage systems, such that thermal and electrical power are...
Machine Learning (ML) techniques have been applied over the past two decades to improve the abilities of Intrusion Detection Systems (IDSs). Over time, several enhancements have been implemented to help the ML-based IDS models tackle the ever-evolving attack behaviors. However, recent works reveal that ML models are vulnerable to adversarial pertur...
Multimodal human–computer interaction (HCI) systems pledge a more human–human-like interaction between machines and humans. Their prowess in emanating an unambiguous information exchange between the two makes these systems more reliable, efficient, less error prone, and capable of solving complex tasks. Emotion recognition is a realm of HCI that fo...
This paper demonstrates the use of transactive energy (TE) to maximize the profitability and flexibility of a nuclear power plant. Reductions in the price of natural gas, and the concurrent influx of variable and distributed energy resources in the electricity market of the U.S. have impacted the economic viability of traditional nuclear power gene...
Game theory is being used in cybersecurity to observe different attacks as it can provide a mathematical representation of the interactions between system admins, hackers, and users. The game-theoretic solution determines the favorable parameters (strategies), predicts the player’s behavior, and suggests the best settings for minimizing the attack’...
Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier hum...
Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures...
Cyberattacks and malware infestation are issues that surround most operating systems (OS) these days. In smartphones, Android OS is more susceptible to malware infection. Although Android has introduced several mechanisms to avoid cyberattacks, including Google Play Protect, dynamic permissions, and sign-in control notifications, cyberattacks on An...
We present a case of one teacher’s engagement in project-based learning for algebra I students. This teacher was a member of a cohort of mathematics teachers and career technical educators who participated in a two-week intensive summer institute investigating autonomous vehicles. During the academic year, the follow up support for these educators...
This paper presents a two-level maximum power point tracking (MPPT) algorithm in dynamic solar irradiation conditions. In the first control level, a discretization process is used to hone in on the region of the global maximum power point (GMPP) under partial shading conditions. In the second control level, ripple correlation control (RCC) is used...
The rapid growth of Android apps and its worldwide popularity in the smartphone market has made it an easy and accessible target for malware. In the past few years, the Android operating system (AOS) has been updated several times to fix various vulnerabilities. Unfortunately, malware apps have also upgraded and adapted to this evolution. The ever-...
With data comes uncertainty, which is a widespread and frequent phenomenon in data science and analysis. The amount of information available to us is growing exponentially, owing to never-ending technological advancements. Data visualization is one of the ways to convey that information effectively. Since the error is intrinsic to data, users canno...
As the demand for high-performance power conversion in spacecraft continues to grow and spacecraft mass and volume budgets become increasingly tight, it is essential to design DC-DC converters with higher efficiency and power density. Although photovoltaic (PV) efficiency has increased over time, solar irradiance and temperatures can fluctuate dram...
Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automati...
Featured Application
This work can be used to develop reliable intelligent systems that have the capabilities to integrate in human–machine teams in dealing with time sensitive situations.
Abstract
This work presents a multi-year study conducted at the University of Toledo, aimed at improving human–machine teaming (HMT) methods and technologies. W...
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organ...
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organ...
This paper presents a multi-year research study conducted at the University of Toledo, aimed at improving human-machine teaming (HMT) methods and technologies. With the incorporation of artificial intelligence (AI) into 21st-century machines, collaboration between humans and machines has become highly complicated for real-time applications. The pen...
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall perfo...
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performa...
As part of a perennial project, our team is actively engaged in developing new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each...
The exigency of emotion recognition is pushing the envelope for meticulous strategies of discerning actual emotions through the use of superior multimodal techniques. This work presents a multimodal automatic emotion recognition (AER) framework capable of differentiating between expressed emotions with high accuracy. The contribution involves imple...
In this work, we propose a physical layer security (PLS) scheme for orthogonal frequency-division multiplexing (OFDM) based transceivers, termed link-signature-based discriminatory channel estimation (LS-DCE). The proposed scheme exploits the space-time uniqueness of the channel responses (i.e. link-signatures) at different transceiver pairs to fac...
Technology has taken over aspects of our lives today, which were unimaginable a few years ago. Innovations such as high-end transport systems that include connected autonomous vehicles (CAV), and digital currencies, such as Bitcoin and Ethereum, have made our lives more comfortable and convenient. It may not seem at first, but most of these technol...
Recent research has shown that cognitive function can be improved with proper practices. To improve cognitive skills, we developed a series of training programs using the Unity 3D™ Game Engine, which connects to an EPOC+ headset from EMOTIV™ to provide EEG data. In order to engage participants and maintain interest, we employed game concepts and de...
In the early 1990s, unmanned aerial vehicles (UAV) were used exclusively in military applications by various developed countries. Now with its ease of availability and affordability in the electronic device market, this aerial vehicular technology has augmented its familiarity in public and has expanded its usage to countries all over the world. Ho...
Swarm algorithms are computational algorithms developed by taking inspiration from the collective foraging behaviors of swarms within the insects, birds, and animals in nature. These are decentralized, self-organizing systems, where cooperation among the swarm participants and their collective behavior for foraging helps the swarm achieve its goal....
Due to their high performance as well as their low design complexity, polar codes are being considered as a candidate for next generation of mobile and wireless communications. Originally, polar codes were exactly designed over binary erasure channels (BECs) only. Later, polar codes over additive white Gaussian noise (AWGN) channel and fading chann...
Over the past two decades, automatic facial emotion recognition has received enormous attention. This is due to the increase in the need for behavioral biometric systems and human–machine interaction where the facial emotion recognition and the intensity of emotion play vital roles. The existing works usually do not encode the intensity of the obse...
In this paper, we present a novel pipelined near real-time speaker recognition architecture that enhances the performance of speaker recognition by exploiting the advantages of hybrid feature extraction techniques that contain the features of Gabor Filter (GF), Convolution Neural Networks (CNN), and statistical parameters as a single matrix set. Th...
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failur...
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failur...
In this paper, an explainable intelligence model that gives the logic behind the decisions Unmanned Air Vehicle makes when it is on a predefined mission and chooses to deviate from its designated path. The explainable model is on a visual platform in the format of if then rules derived from the Sugeno type fuzzy inference model. The model is tested...
The term cyber-physical system (CPS) could be described as a system that integrates the computational and physical capabilities and can work as the connection between the cyber and physical worlds. The capabilities of the system to interact with the physical world through more efficient implementations of these “connections” is a crucial enabler fo...
This work contributes towards building a novel architecture for the real-time detection of background sounds such as ambulance, helicopter, gunshot, and explosions that usually occurs in the medical first responder environment. Further, we also ensured that the proposed architecture is compatible with the existing natural language processing (NLP)...
The human brain has inspired the development of deep learning (DL) models as a new, popular paradigm of machine learning. DL comprises a set of algorithms used to model the functionality of the brain using artificial neural networks (ANN). Due to this reason, DL techniques are also known as deep neural networks (DNN). One of the exquisite ability o...
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall perfo...
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall perfo...
Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have b...
Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low po...
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performa...
The rapid increase in integration of intelligent systems in every corner of technology created an emerging field called Human-Machine Teaming (HMT). In HMT, human and machine collaborate with one another to accomplish a common goal or task. To achieve the best performance of a team, it is necessary to build trust and cohesion among all teammates (m...
Autonomous ground vehicles (AGVs) play a significant role in performing the versatile task of replacing human-operated vehicles and improving vehicular traffic. This facilitates the advancement of an independent and interdependent decision-making process that increases the accessibility of transportation by reducing accidents and congestion. Presen...
Similar to wireless software updates for the smartphones, over the air (OTA) update is used to update the software and firmware for various electronic control units (ECUs) in the connected vehicles. It is an efficient and convenient approach to update the software in the car and it will save the customers the visiting time to repair small bugs in t...
The ability of an autonomous unmanned aerial vehicle to navigate and fly precisely determines its utility and performance. The current navigation systems are highly dependent on the global positioning system and are prone to error because of global positioning system signal outages. However, advancements in onboard processing have enabled inertial...
As part of a perennial project, our team is actively engaged in developing new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each...
Extensive possibilities of applications have made emotion recognition ineluctable and challenging in the field of computer science. The use of non-verbal cues such as gestures, body movement, and facial expressions convey the feeling and the feedback to the user. This discipline of Human–Computer Interaction places reliance on the algorithmic robus...
Emerging drone technology proved helpful in serving both federal and commercial purpose. Ease of availability and affordability makes this technology a target for cyber attacks. Various recent attacks served as a motivation. The poster conveys our novel approach to manage, examine and visualize the flight logs in our in-house developed tool. Our gr...
Battery life and power consumption have been a challenging real-world problem for the internet of things (IoT). IoT applications in biomedical, agriculture, ecosystem monitoring, wildlife management, etc., need an accurate estimation of average battery life based on the environment and application. In this paper, we opt for an experimental approach...
In this paper, we propose designing and implementing Isolation enabled Role-Based Access Control (RBAC) at the record level in a database. The concept involves integrating isolation concepts of a relational database management system (RDBMS) into the NIST RBAC model in a secure and efficient way. A user is denied access in a typical RBAC system if...
Simulation test beds serve as a cost-effective and safe way to evaluate the system performance of various real world systems. With the rising concerns in the security of sensitive and critical systems, such as unmanned aerial vehicles (UAVs), a software simulation test bed is clearly the best choice given that the environment and various system com...
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminate...
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminate...
It is being increasingly recognized that the near-Earth space environment for civil, defense, and commercial sectors is rapidly becoming more congested and contested. Increasing bandwidth requirements coupled with increasing the number of satellites in LEO, MEO, and GEO orbits will lead to spectrum interference. Space communication networks will re...