
Ahmed ImteajSouthern Illinois University Carbondale | SIU · School of Computing
Ahmed Imteaj
Doctor of Philosophy in Computer Science
About
58
Publications
98,739
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
893
Citations
Introduction
Publications
Publications (58)
Smartphones, autonomous vehicles, and the Internet-of-things (IoT) devices are considered the primary data source for a distributed network. Due to a revolutionary breakthrough in internet availability and continuous improvement of the IoT devices capabilities, it is desirable to store data locally and perform computation at the edge, as opposed to...
Federated Learning (FL) is a recently invented distributed machine learning technique that allows available network clients to perform model training at the edge, rather than sharing it with a centralized server. Unlike conventional distributed machine learning approaches, the hallmark feature of FL is to allow performing local computation and mode...
Federated learning (FL) is a distributed machine learning strategy that generates a global model by learning from multiple decentralized edge clients. FL enables on-device training, keeping the client’s local data private, and further, updating the global model based on the local model updates. While FL methods offer several advantages, including s...
Critical infrastructures (e.g., energy and transportation systems) are essential lifelines for most modern sectors and have utmost significance in our daily lives. However, these important domains can fail to operate due to system failures or natural disasters. Though the major disturbances in such critical infrastructures are rare, the severity of...
Federated Learning (FL), a distributed machine learning technique has recently experienced tremendous growth in popularity due to its emphasis on user data privacy. However, the distributed computations of FL can result in constrained communication and drawn-out learning processes, necessitating the client-server communication cost optimization. Th...
Federated Learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence along with emerging security and privacy threats. FL enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While this...
The resilient operation of power distribution networks requires efficient optimization models to enable situational awareness. One of the pivotal tools to enhance resilience is a network reconfiguration to ensure secure and reliable energy delivery while minimizing the number of disconnected loads in outage conditions. Power outages are caused by n...
With the rapid emergence of technologies, coupling interdependent consumer electronics networks have become imperative to enable information exchange, holistic data analysis, and effective decision-making techniques. While interdependent networks can discover crucial information through intuitive understanding and efficient data-driven algorithms,...
Federated Learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence, along with emerging security and privacy threats. FL enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While thi...
Clustering is one of the widely used techniques to find out patterns from a dataset that can be applied in different applications or analyses. K-means, the most popular and simple clustering algorithm, might get trapped into local minima if not properly initialized and the initialization of this algorithm is done randomly. In this paper, we propose...
Nowadays, devices are equipped with advanced sensors with higher processing and computing capabilities. Besides, widespread Internet availability enables communication among sensing devices that results the generation of vast amounts of data on edge devices to drive Internet-of-Things (IoT), crowdsourcing, and other emerging technologies. The exten...
Human Activity Recognition (HAR) is a problem of interpreting sensor data to human movement using an efficient machine learning (ML) approach. The HAR systems rely on data from untrusted users, making them susceptible to data poisoning attacks. In a poisoning attack, attackers manipulate the sensor readings to contaminate the training set, misleadi...
Mental soundness is a condition of well-being wherein a person understands his/her potential, participates in his or her community and is able to deal effectively with the challenges and obstacles of everyday life. It circumscribes how an individual thinks, feels and responds to any circumstances. Mental strain is generally recognised as a social c...
In recent years, as economic stability is shaking, and the unemployment rate is growing high due to the COVID-19 effect, assigning credit scoring by predicting consumers’ financial conditions has become more crucial. The conventional machine learning (ML) and deep learning approaches need to share customer’s sensitive information with an external c...
The conventional machine learning (ML) and deep learning (DL) methods use large amount of data to construct desirable prediction models in a central fusion center for recognizing human activities. However, such model training encounters high communication costs and leads to privacy infringement. To address the issues of high communication overhead...
Clustering is one of the widely used techniques to find out patterns from a dataset that can be applied in different applications or analyses. K-means, the most popular and simple clustering algorithm, might get trapped into local minima if not properly initialized and the initialization of this algorithm is done randomly. In this paper, we propose...
This chapter introduces blockchain with its fundamental topics. We thoroughly explain the blockchain components including cryptographic hash functions, blockchain transactions, asymmetric-key cryptography, block (explaining Merkle tree root, nonce), and constructing a chain of blocks. We present a visual representation of how blockchain works and e...
SARS-CoV-2 (COVID-19) is a new strain of coronavirus that is regarded as a respiratory disease and is transmittable among humans. At present, the disease has caused a pandemic, and COVID-19 cases are ballooning out of control. The impact of such turbulent situations can be controlled by tracking the patterns of infected and death cases through accu...
Artificial Intelligence (AI) and blockchain are among the most promising and widely deployed technologies in recent times. On the one hand, blockchain can enable interactions among clients without the presence of any trusted third party and provide access to a blockchain ledger that holds transactions, logs, and data in a decentralized, trusted, an...
This chapter discusses some real-life blockchain-based applications and describes the applicability and necessity of integrating blockchain with the existing centralized systems. Particularly, we describe some widely popular domains where blockchain can be applied, i.e., healthcare, energy, finance, agriculture, smart city, smart manufacturing, e-v...
In this chapter, we discuss blockchain interoperability from the perspective of interdependent networks. At first, we define blockchain interoperability, describe the design philosophy of interoperability explaining its entire life-cycle (including data generation, cross-chain mechanism, verification, smart contract, and API), and present a high-le...
This chapter introduces the importance of designing Internet-of-Things (IoT) applications that deploy blockchain technology. We discuss when we should choose to apply blockchain technology for an IoT and highlight some existing blockchain-based IoT (BIoT) applications. As the IoT devices may have resource-limitations issues, and also prone to attac...
This chapter presents a detailed description of smart contracts and proof-based consensus mechanisms used in blockchain technology. Smart contracts are used in blockchain technology while making the transaction between two parties, and it enables only the validated transaction to be included in the blockchain. However, to validate a transaction Sat...
As the world’s population is exploding day by day, the number of patients and hospital capacity is also increasing due to high-demands. This situation leads to engaging more people to monitor the overall situation of a hospital. However, it is quite difficult to observe the cabin room, and the patient thoroughly 24 h. To tackle such a situation, we...
Smartphones, autonomous vehicles, and the Internet-of-things (IoT) devices are considered the primary data source for a distributed network. Due to a revolutionary breakthrough in internet availability and continuous improvement of the IoT devices capabilities, it is desirable to store data locally and perform computation at the edge, as opposed to...
Information security has immense importance in today’s world of digital communication. Sharing information between intended parties while keeping it secret from any outsider is a challenging task. Cryptography provides the security of information by keeping the information secret among only the communicating parties. In this paper, a new cryptograp...
Traditionally, networks have been studied in an independent fashion. With the emergence of novel smart city technologies, coupling among networks has been strengthened. To capture the ever-increasing coupling, we explain the notion of interdependent networks, i.e., multi-layered networks with shared decision-making entities, and shared sensing infr...
Nowadays, devices are equipped with advanced sensors with higher processing/computing capabilities. Further, widespread Internet availability enables communication among sensing devices. As a result, vast amounts of data are generated on edge devices to drive Internet-of-Things (IoT), crowdsourcing, and other emerging technologies. The collected ex...
This paper reintroduces the notion of resilience in the context of recent issues originated from climate change triggered events including severe hurricanes and wildfires. A recent example is PG&E's forced power outage to contain wildfire risk which led to widespread power disruption. This paper focuses on answering two questions: who is responsibl...
Recently, blockchain has received much attention from the mobility-centric Internet of Things (IoT). It is deemed the key to ensuring the built-in integrity of information and security of immutability by design in the peer-to-peer network (P2P) of mobile devices. In a permissioned blockchain, the authority of the system has control over the identit...
Numerous loss of lives is seen each year and the sum is consistently expanding because of destruction, fiasco, cataclysm and so forth these incorporate natural and man-made fiascoes. To counter this, we have structured a rescue robot that is autonomous, it pursues track way by dint of 3 ultrasonic sensors in the front. For the processing work Raspb...
Train is one of the mass transportations that's famous in the whole world. But now-a-days, accidents are still major concern in terms of safety of people. There are numerous railroads crossing which are unmanned because of bolt of labor expected to satisfy the requests. Consequently, numerous mishaps happen at such intersection since there is nobod...
It is not convenient to use custom controller for operating a robot car and most easy way to control a robot is definitely with voice. In this paper, we have propounded a voice recognition based system where controlling process will be very much expedient to use. In our speech recognition based Robot car, anyone can easily control the system with h...
Ensuring minimum rights and safety of the garment workers has become a burning issue nowadays. The workers of garment factories are facing some labyrinths and broken out of fire is surely one of them. The investors are losing their interest and the prominence of this sector is getting toneless. In this paper, we have propounded a system which is ca...
Proper watering is exigent for the plants and trees which are grown in
containers. Many people unsurmounted to take good care of expensive plants or
trees like Bonsai because of improper timing or lack of watering. An automated
system which is capable of perceiving the proper situation of watering plants can
be convenient in this regard. In this pa...
Nowadays, smartphones have reached every hand and every home. As a result, people are making use of the beneficial mobile applications to make their everyday life easier. This paper focuses on development of a mobile application(app) to help providing an effective health care system. Using this app people can get numerous benefits like finding hosp...
Tumor creates as a lopsided mass of tissues that can be condensed or liquid-filled. It can grow in any part of body. A tumor sometimes can cause to cancer as it will grow in deadly form or sometimes it doesn’t mean to be like cancer or like so serious condition. Tumors have lots of names and their name have been categorized by their various shapes...
Natural calamity is one of the major issues that works as a hindrance in the progression of an underdeveloped country like Bangladesh. The clutch of destructive natural disasters terribly attack millions of people and their property in almost every year. To mitigate such disruption, we developed an android based system through which people can get...
Vehicle accident is the paramount thread for the people's life which causes a serious wound or even dead. The automotive companies have made lots of progress in alleviating this thread, but still the probability of detrimental effect due to an accident is not reduced. Infringement of spFieed is one of the elementary reasons for a vehicle accident....
The heart of a city depends on its purification of air, cleanliness of the roads and highways and overall it's surrounding environment. But if the condition disrupted, then the people live in the city have to pay for this. Different kinds of diseases spread out in an epidemic form and it is becoming tougher to lead a healthy life. However, people c...
Travelling is a common phenomenon in our day to day life. For the requisite of different efficacy we have to travel all around. Choice of transportation depends on the time required to travel and our financial status. But it becomes a perplexing and tedious job if someone does not have knowledge about a route to travel. Since, different transport h...
Solar power is the transformation of daylight into power, either straightforwardly utilizing photovoltaic (PV), or in a roundabout way controlling concentrated sun powered force (CSP). Concentrated sun powered force frameworks use lenses or mirrors and following frameworks to center a huge region of daylight into a little pillar. A feasible approac...
This paper sheds light on the possibility, scope and benefits of using 'Smartphones' as 'sensor nodes' in a 'Wireless Sensor Network' (WSN). Now-a-days, every smart phone has been integrated with different types of sensors & are consolidating with more and more sensors as they advance. Currently, smart phones have sensors to detect humidity, atmosp...
In the recent epoch smartphone has become increasingly popular & its acceptance is inflating at an astonishing rate. At the present time people use their smartphone to accumulate important or private files & also to effectuate almost all the official & business works. So losing phone can be caused unbearable sufferings; such as private or official...