Jagath Samarabandu's research while affiliated with The University of Western Ontario and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (114)
Multivariate time-series classification problems are found in many industrial settings; for example, fault detection in a manufacturing process by monitoring sensors signals. It is difficult to obtain large labeled datasets in these settings, for reasons such as limitations in the automatic recording, the need for expert root-cause analysis, and th...
Background
The application of machine learning algorithms for assessing the auditory brainstem response has gained interest over recent years with a considerable number of publications in the literature. In this systematic review, we explore how machine learning has been used to develop algorithms to assess auditory brainstem responses. A clear and...
Automated human chromosome segmentation and feature extraction aim to improve the overall quality of genetic disorder diagnosis by addressing the limitations of tedious manual processes such as expertise dependence, time-inefficiency, observer variability and fatigue errors. Nevertheless, significant differences caused by staining methods, chromoso...
Automated human chromosome segmentation and feature extraction aim to improve the overall quality of genetic disorder diagnosis by addressing the limitations of tedious manual processes such as expertise dependence, time-inefficiency, observer variability and fatigue errors. Nevertheless, significant differences caused by staining methods, chromoso...
This paper proposes a novel damage detection and localization method of civil structures using a windowed Long Short-Term Memory (LSTM) network. A sequence of windowed samples are extracted from acceleration responses in a novel data pre-processing pipeline, and an LSTM network is developed to classify the signals into multiple classes. Predicted c...
Introduction
: Auditory brainstem responses (ABRs) offer a unique opportunity to assess the neural integrity of the peripheral auditory nervous system in individuals presenting with listening difficulties. ABRs are typically recorded and analyzed by an audiologist who manually measures the timing and quality of the waveforms. The interpretation of...
The use of deep learning models for the network intrusion detection task has been an active area of research in cybersecurity. Although several excellent surveys cover the growing body of research on this topic, the literature lacks an objective comparison of the different deep learning models within a controlled environment, especially on recent i...
Rapid advances in smart devices tremendously facilitate our day-to-day lives. However, these can be exploited remotely via existing cyber vulnerabilities to cause disruption at the physical infrastructure level. In this paper, we discover a novel distributed and stealthy attack that uses malicious actuation of a large number of small-scale loads re...
Advanced intrusion detection systems are beginning to utilize the power and flexibility offered by Complex Event Processing (CEP) engines. Adapting to new attacks and optimizing CEP rules are two challenges in this domain. Optimizing CEP rules requires a complete framework which can be ported to stream processors because a CEP rule cannot run witho...
The availability of open source intrusion automation tools helps attackers to easily evade existing intrusion detection systems (IDS's). Even though anomaly-based IDS's are able to detect previously unseen attacks, signature-based IDS's are still popular due to their high accuracy. However, signature-based IDS's cannot detect newer attacks because...
Presentation for the public lecture presenting INSecS-DCS.
This is the presentation used for the public lecture, presenting INSecS-DCS.
One critical challenge in design and operation of network intrusion detection systems (IDS) is the limited datasets used for IDS training and its impact on the system performance. If the training dataset is not updated or lacks necessary attributes , it will affect the performance of the IDS. To overcome this challenge, we propose a highly customiz...
Used to present my research paper "Sequence to Sequence Pattern Learning Algorithm for Real-time Anomaly Detection in Network Traffic" at CCECE 2018 conference.
Network intrusions can be modeled as anomalies in network traffic in which the expected order of packets and their attributes deviate from regular traffic. Algorithms that predict the next sequence of events based on previous sequences are a promising avenue for detecting such anomalies. In this paper, we present a novel multi-attribute model for p...
In magnetic resonance (MR)-targeted, 3D transrectal ultrasound (TRUS)-guided biopsy, prostate motion during the procedure increases the needle targeting error and limits the ability to accurately sample MR-suspicious tumour volumes. The robustness of 2D-3D registration methods for prostate motion compensation is impacted by local optima in the sear...
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions is the next step to provide an active defense against incoming attacks. Current intrusion prediction methods focus mainly on prediction of either intrusion type or intrusion category and do not use or provide contextual information such as source and...
Abstract—The dramatic increase in the network traffic data has become a major concern in security systems. Intrusion detection systems (IDSs), as common widely used security systems for communication networks, are not an exception. An IDS monitors the network traffic to detect attacks through classifying the network traffic data into normal and abn...
Accurate detection of the human metaphase chromosome centromere is a critical element of cytogenetic diagnostic techniques, including chromosome enumeration, karyotyping and radiation biodosimetry. Existing centromere detection methods tends to perform poorly in the presence of irregular boundaries, shape variations and premature sister chromatid s...
Accurate detection of the human metaphase chromosome centromere is an critical element of cytogenetic diagnostic techniques, including chromosome enumeration, karyotyping and radiation biodosimetry. Existing image processing methods can perform poorly in the presence of irregular boundaries, shape variations and premature sister chromatid separatio...
Matlab code files used in analysing the chromosome images together with Automatic Dicentric Chromosome Identifier (ADCI) software (V6.1)
Matlab code files used in analysing the chromosome images
Widespread use of WiMAX systems has lowered the cost of radio units significantly. We previously proposed a low cost single-mode Synthetic Aperture Radar (SAR) system which took advantage of these low-cost WiMAX transceiver units. However, the imaging swath of this system was limited due to the short length of the cyclic prefix (CP) of WiMAX. In th...
In this paper we present a framework for rapid object classification that uses multiple views to classify visually similar automotive parts on a conveyor belt. We have constructed a dataset of 25 different manufactured parts consisting of window pillars and guides. These parts vary in size, orientation and luster and are captured from four view poi...
In this paper we take a look at extensions of the Bag of Words model developed within the last few years. Namely the aggregation of vector residuals known as VLAD encodings and Fisher kernels and assess their performance for the classification task using multiple views. We also take a look at the triangular embedding strategy for classification in...
The well-established low-cost broadband OFDM based wireless systems in license-exempt bands, including worldwide interoperability for microwave access (WiMAX) systems, have drawn considerable attention for radar related applications over the past decade. This paper explores an idea of utilizing Commercial Off-The-Shelf (COTS) WiMAX base stations (B...
Conventional human action recognition methods use a single light camera to extract all the necessary information needed to perform the recognition. However, the use of a single light camera poses limitations which can not be addressed without a hardware change. In this paper, we propose a novel hardware setup to help solve many of said limitations...
We present a prototype software system with sufficient capacity and speed to estimate radiation exposures in a mass casualty event by counting dicentric chromosomes (DCs) in metaphase cells from many individuals. Top-ranked metaphase cell images are segmented by classifying and defining chromosomes with an active contour gradient vector field (GVF)...
A method for determining radiation exposure from chromosome abnormalities present in a specimen by determining the location or locations of the centromere of each chromosome in a cell in an image of a metaphase cell by segmentation of an accurately drawn chromosome centerline followed by selection of a longitudinal cross-section with the minimum wi...
A method for determining radiation exposure from chromosome abnormalities present in a specimen by determining the location or locations of the centromere of each chromosome in a cell in an image of a metaphase cell by segmentation of an accurately drawn chromosome centerline followed by selection of a longitudinal cross-section with the minimum wi...
Despite extensive analyses on the centromere and its associated proteins, detailed studies of centromeric DNA structure have provided limited information about its topography in condensed chromatin. We have developed a method with correlative fluorescence light microscopy and atomic force microscopy that investigates the physical and structural org...
Purpose:
Three-dimensional (3D) transrectal ultrasound (TRUS)-guided systems have been developed to improve targeting accuracy during prostate biopsy. However, prostate motion during the procedure is a potential source of error that can cause target misalignments. The authors present an image-based registration technique to compensate for prostate...
Cyber security in interconnected smart grid is vital for reliability of power system operations. Power communication applications are different from cooperate information technology applications. Utilities that follow defense in depth strategy have to confront many network security technologies. This paper presents an application of IPSec tunnel in...
Geospatial tools and techniques are becoming more important for land surveyors to do their off-location inspections of the urban areas. Accurate geocoded street-level images are the base of these tools. For these applications, an error of 2.5 meters is tolerable. However, the geographic coordinates provided by GPS have error up to 10 meters. In thi...
Cytogenetic biodosimetry is the definitive test for assessing exposure to ionizing radiation. It involves manual assessment of the frequency of dicentric chromosomes (DCs) on a microscope slide, which potentially contains hundreds of metaphase cells. We developed an algorithm that can automatically and accurately locate centromeres in DAPI-stained...
This paper describes a novel system based on the machine vision and machine learning techniques for fully automated, real-time
identification of constituent elements in a sample specimen using laser-induced breakdown spectroscopy (LIBS) images. The
proposed system is developed as a compact spectrum analyzer for rapid element detection using a comme...
Privacy is one of the challenges in Cooperative Distributed Systems (CDSs) in open environments where entities can desirably work collaboratively. One way of dealing with this challenge is to evaluate the negative risk of operations on shared information in a collaborative setting. In this paper, we propose a Hierarchical Fuzzy Inference System (HF...
Detection and separation of overlapping and touching chromosomes is a critical issue in image analysis applications for cytogenetics where accurately segmented chromosomes are essential. We present a novel method of automatic pale path detection for all types of stained chromosome images. Optimum number of cut-points for each cluster of touching or...
Purpose: For 3D transrectal ultrasound(TRUS) guided prostate biopsy, we evaluate the utility of image?similarity metrics for comparing real?time 2D? TRUS video frames to pre?acquired 3D?TRUS images in order to detect misalignment due to prostate motion and deformation. Methods: The experiments were conducted on retrospective data of 3D TRUSimages f...
Purpose: 3D ultrasound (3DUS) vessel wall volume (VWV) is a 3D measurement of vessel wall thickness plus plaque within the carotid artery for monitoring carotid plaque progression and regression. In this paper, we describe a segmentation algorithm to delineate the media‐adventitia (MAB) and lumen‐intima (LIB) boundaries of the carotid arteries to q...
Adaptive modulation exploits the channel conditions to improve spectral efficiency of the wireless communication system. Moreover, channel characteristics also depend upon Doppler shift, due to the motion of the mobile station. In this paper, a new technique of adaptive modulation is proposed which takes into account the effect of varying speed rec...
Signals transmitted through a wireless channel undergo distortion due to multi-path and Doppler shift effects which can be recovered at the receiver through channel state information (CSI). The variation of wireless channels causes outdated CSI to be used for optimization techniques. Channel prediction allows the system to adapt modulation methods...
Three-dimensional ultrasound (3D US) of the carotid artery provides measurements of arterial wall and plaque [vessel wall volume (VWV)] that are complementary to the one-dimensional measurement of the carotid artery intima-media thickness. 3D US VWV requires an observer to delineate the media-adventitia boundary (MAB) and lumen-intima boundary (LIB...
Three-dimensional ultrasound (3D US) vessel wall volume (VWV) measurements provide high measurement sensitivity and reproducibility for the monitoring and assessment of carotid atherosclerosis. In this paper, we describe a semiautomated approach based on the level set method to delineate the media-adventitia and lumen boundaries of the common carot...
Prostate biopsy is the clinical standard for the definitive diagnosis of prostate cancer. To overcome the limitations of 2D TRUS-guided biopsy systems when targeting pre-planned locations, systems have been developed with 3D guidance to improve the accuracy of cancer detection. Prostate deformation due to needle insertion and biopsy gun firing is a...
This paper is about the development of a framework for the formal certification of software for masquerade detection based upon natural mimicry. A masquerade is when an intruder mimics a genuine user in order to compromise the security of a computer system. The framework consists of looking at mimicry in the natural world. Based on this, a model fo...
Presentation of Premaratne, U., Nait-Abdallah, A., Samarabandu, J. and Sidhu, T., 2010, December. A formal model for masquerade detection software based upon natural mimicry. In 2010 Fifth International Conference on Information and Automation for Sustainability (pp. 14-19). IEEE.
This paper proposes a scheme for auditing the security of an IEC61850-based network based upon a novel security metric for intelligent electronic devices (IEDs). A detailed security analysis on an IEC61850 automated substation is peformed initially with a focus on the possible goals of the attacker. This is followed by the development of a scheme t...
This paper proposes the use of an intrusion detection system (IDS) tailored to counter the threats to an IEC61850-automated substation based upon simulated attacks on intelligent electronic devices (IEDs). Intrusion detection (ID) is the process of detecting a malicious attacker. It is an effective and mature security mechanism. However, it is not...
The study of human metaphase chromosomes is an important aspect in clinical diagnosis of genetic disorders. Although many image processing techniques have been developed for chromosomal karyotyping to assist in laboratory diagnosis, they fail to provide reliable results in segmenting and extracting the centerline of chromosomes due to their shape v...
Mutual information (MI), as a similarity measure has been very successful in multi-modal image registration. However, the iterative nature of the method for finding optimal transformation makes it time consuming and mis-registration can happen due to local extrema. In this paper, a heuristic approach based on straight line detection and matching is...
Prostate biopsy is the clinical standard for the diagnosis of prostate cancer, and technologies for 3D guidance to targets and recording of biopsy locations are promising approaches to reducing the need for repeated biopsies. In this study, we use image-based non-rigid registration to quantify prostate deformation during needle insertion and biopsy...
With the increasing use of Fluorescence In Situ Hybridization (FISH) probes as markers for certain genetic sequences, the requirement of a proper image processing framework is becoming a necessity to accurately detect these probe signal locations in relation to the centerline of the chromosome. Although many image processing techniques have been de...
Geospatial imaging is a relatively new term which is increasingly becoming more important for both government and commercial sectors. Images taken at street level can be geo-coded using a camera equipped with a built-in GPS device. However, the location that GPS provides are prone to errors up to 10 meters. In this paper we propose an algorithm to...
In the last decade, graph-cut optimization has been popular for a variety of labeling problems. Typically, graph-cut methods are used to incorporate smoothness constraints on a labeling, encouraging most nearby pixels to have equal or similar labels. In addition to smoothness, ordering constraints on labels are also useful. For example, in object s...
This paper details the use of possibilistic decision trees for a lightweight Intrusion Detection System (IDS) to be used in Intelligent Electronic Devices (IEDs) of IEC61850 automated electric substations. Traffic data is captured by performing simulated attacks on IEDs. Data is obtained for two types of genuine user activity and two types of commo...
This paper proposes a new biologically inspired algorithm for optimization. The algorithm, called the Paddy Field Algorithm (PFA) operates by initially scattering seeds at random in the parameter space. The number of seeds of each plant depend on the function value such that a plant closer to the optimum solution produces the most seeds. Out of the...
Robust feature tracking is a requirement for many computer vision tasks such as indoor robot navigation. However, indoor scenes are characterized by poorly localizable features. As a result, indoor feature tracking without artificial markers is challenging and remains an attractive problem. We propose to solve this problem by constraining the locat...
Ultrasound imaging is a popular imaging modality due to a number of favorable properties of this modality. However, the poor quality of ultrasound images makes them a bad choice for segmentation algorithms. In this paper, we present a semi-automatic algorithm for organ segmentation in ultrasound images, by posing it as an energy minimization proble...
Industrial equipments that employ element identification tend to be expensive as they utilize built-in spectroscopes and computers for post processing. In this paper we present an in situ fully automatic method for detecting constituent elements in a sample specimen using computer vision and machine learning techniques on Laser Induced Breakdown Sp...
This paper details the use of decision fusion from the outputs of different types of classifiers used for analyzing network traffic to detect masquerading within an IEC61850 automated substation. Data on network traffic is collected under simulated scenarios of a genuine user casually browsing data and an attacker rapidly downloading restricted dat...
This paper presents a case study of the application of security metrics to a computer network. A detailed survey is conducted on existing security metric schemes. The Mean Time to Compromise (MTTC) metric and VEA-bility metric are selected for this study. The input data for both metrics are obtained from a network security tool. The results are use...
Atherosclerosis at the carotid bifurcation can result in cerebral emboli, which in turn can block the blood supply to the brain causing ischemic strokes. Noninvasive imaging tools that better characterize arterial wall, and atherosclerotic plaque structure and composition may help to determine the factors which lead to the development of unstable l...
Atherosclerosis at the carotid bifurcation resulting in cerebral emboli is a major cause of ischemic stroke. Most strokes associated with carotid atherosclerosis can be prevented by lifestyle/dietary changes and pharmacological treatments if identified early by monitoring carotid plaque changes. Registration of 3-D ultrasound (US) images of carotid...
In the last decade, graph-cut optimization has been popular for a variety of pixel labeling problems. Typically graph-cut methods are used to incorporate a smoothness prior on a labeling. Recently several methods incorporated ordering constraints on labels for the application of object segmentation. An example of an ordering constraint is prohibiti...
When developing multiple products within a common application domain, systematic use of a software product family process can yield increased productivity in cost, quality, effort and schedule. Such a process provides the means for the reuse of software assets which can considerably reduce the development time and the cost of software products. A c...
Computer vision based spectroscopy is feasible due to the advent of faster cameras and computers. Here, spectroscopy means detecting elements based on the intensity patterns of laser induced breakdown spectra seen by a camera. This is conventionally done by using specific instruments-spectroscopes-which too may use CCD devices as the sensors. Using...
In this paper we present a graph cuts based segmentation technique that incorporates the domain knowledge based fuzzy inference system to find the prostate boundary more accurately. By using this prior knowledge, we increase the robustness of the algorithm at weak boundaries which are common in ultrasound images. Also in traditional graph cuts algo...
Atherosclerosis at the carotid bifurcation resulting in cerebral emboli is a major cause of ischemic stroke. Most strokes associated with carotid atherosclerosis can be prevented by lifestyle/dietary changes and pharmacological treatments if identified early by monitoring carotid plaque changes. Plaque composition information from magnetic resonanc...
Image segmentation plays an important role in medical image analysis and visualization since it greatly enhances the clinical diagnosis. Although many algorithms have been proposed, it is still challenging to achieve an automatic clinical segmentation which requires speed and robustness. Automatically segmenting the vertebral column in Magnetic Res...
Artificial neural networks (ANN) have the ability to model input-output relationships from processing raw data. This characteristic makes them invaluable in industry domains where such knowledge is scarce at best. In the recent decades, in order to overcome the black-box characteristic of ANNs, researchers have attempted to extract the knowledge em...
In this work, we propose a framework that can provide performance metrics with regards to the usability of an assistive device designed to provide visual servoing of a reaching task performed by a visually impaired individual. The framework provides a model and methodology from which performance metrics can be synthesized based on robotic manipular...
To facilitate the clinical evaluation on cardiac functions on dynamic images, a fast and robust full-automated clinical computer aided analysis and navigation system is proposed. With recent proposed graph cut method, we are able to achieve an automatic segmentation of ventricles. And with the segmented
ventricles, we are able to align and navigate...
Image segmentation plays an important role in medical image analysis and visualization since it greatly enhances the clinical diagnosis. Although many algorithms have been proposed, it is challenging to achieve an automatic clinical organ segmentation which requires speed and robustness. Automatically segmenting cardiac Magnetic Resonance Imaging (...
An autonomous mobile robot is an intelligent agent which explores an unknown environment with minimal human intervention. Building a relative map which describes the spatial model of the environment is essential for exploration by such a robot. Recent advances for robot navigation motivate mapping algorithms to evolve into simultaneous localization...
Monocular vision based robot navigation requires feature tracking for localization. In this paper we present a tracking system using discriminative features as well as less discriminative features. Discriminative features such as SIFT are easily tracked and useful to obtain the initial estimates of the transforms such as affinities and homographies...
The capability of identifying physical structures in an unknown environment is important for autonomous mobile robot navigation and scene understanding. A methodology for detecting corridor and door structures in an indoor environment is proposed, and the performances of the corridor detection algorithm and door detection algorithm applied in diffe...