Paniz Abedin’s research while affiliated with Florida Polytechnic University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (17)


Example of coverage per user.
Radius vs. percent utilization (left) and number of participants (right).
Cost vs. number of active participants under normal (left), exponential (center), and uniform (right) distributions.
Number of samples vs. percentage area coverage (left), number of active participants (center), and cost (right).
Simulation components.

+6

Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing
  • Article
  • Full-text available

November 2024

·

8 Reads

·

Craig White

·

Paniz Abedin

In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. In this paper, we use a dynamic incentive mechanism based on a recurrent reverse auction model, incorporating vehicular mobility patterns and realistic urban scenarios using the Simulation of Urban Mobility (SUMO) traffic simulator and OpenStreetMap (OSM). By selecting a representative subset of vehicles based on their locations within a fixed budget, our mechanism aims to improve coverage and reduce data redundancy. We evaluate the applicability of successful participatory sensing approaches designed for pedestrian data and demonstrate their limitations when applied to VCS. This research provides insights into adapting greedy algorithms for the particular dynamics of vehicular crowdsensing.

Download

Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing

September 2024

·

6 Reads

In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. In this paper, we use a dynamic incentive mechanism based on a recurrent reverse auction model, incorporating vehicular mobility patterns and realistic urban scenarios using the Simulation of Urban Mobility (SUMO) traffic simulator and OpenStreetMap (OSM). By selecting a representative subset of vehicles based on their locations within a fixed budget, our mechanism aims to improve coverage and reduce data redundancy. We evaluate the applicability of successful participatory sensing approaches designed for pedestrian data and demonstrate their limitations when applied to VCS. This research provides insights into adapting greedy algorithms for the particular dynamics of vehicular crowdsensing.


SenseNow: A Time-Dependent Incentive Approach for Vehicular Crowdsensing

January 2024

·

6 Reads

·

5 Citations

IEEE Open Journal of Intelligent Transportation Systems

This paper presents an incentive mechanism for vehicular crowdsensing (VCS). Here, a platform selects a set of spots or Places of sensing Interest (PsI) and outsources the collection of data from these places. In particular, the platform is interested in collecting data from most of the PsIs (spatial coverage) at regular and well-spread time intervals (temporal coverage). Although spatial coverage is a natural by-product of this approach, our main focus is to reach temporal coverage. To this goal, we model the interaction between participants (vehicles) as a non-cooperative game in which vehicles are the players, and the time to sample at a given PsI is the players’ strategy. Here, vehicles are rewarded for deviating from their pre-planned paths and visiting a set of PsIs. The rewarding formula is designed such that selfish vehicles trying to maximize their reward will collect high temporal coverage data. In particular, this paper analyses the effects of increasing the number of vehicle deviations on the utilities of both vehicles and the platform.




Analyzing the Data Completeness of Patients’ Records Using a Random Variable Approach to Predict the Incompleteness of Electronic Health Records

October 2022

·

30 Reads

·

6 Citations

The purpose of this article is to illustrate an investigation of methods that can be effectively used to predict the data incompleteness of a dataset. Here, the investigators have conceptualized data incompleteness as a random variable, with the overall goal behind experimentation providing a 360-degree view of this concept conceptualizing incompleteness of a dataset both as a continuous, discrete random variable depending on the aspect of the required analysis. During the course of the experiments, the investigators have identified Kolomogorov–Smirnov goodness of fit, Mielke distribution, and beta distributions as key methods to analyze the incompleteness of a dataset for the datasets used for experimentation. A comparison of these methods with a mixture density network was also performed. Overall, the investigators have provided key insights into the use of methods and algorithms that can be used to predict data incompleteness and have provided a pathway for further explorations and prediction of data incompleteness.


Nodes u1∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u_1^*$$\end{document} and u2∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u_2^*$$\end{document} are ancestors of u1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u_1$$\end{document} and u2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u_2$$\end{document} respectively. They are induced since their subtrees have leaf label 3 in common. Note that u1∗\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$u_1^*$$\end{document} and t are also induced but we don’t report them as the answer to the HIA problem since they have a lower combined weight (11+10 = 21) compared to W(u1∗)+W(u2∗)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$W(u_1^*) + W(u_2^*)$$\end{document} which is 24
We refer to Sect. 3.2 for the description of this figure
The Heaviest Induced Ancestors Problem: Better Data Structures and Applications

July 2022

·

27 Reads

·

6 Citations

Algorithmica

Let T1 and T2 be two rooted trees with an equal number of leaves. The leaves are labeled, and the labeling of the leaves in T2 is a permutation of those in T1. Nodes are associated with weight, such that the weight of a node u, denoted by W(u), is more than the weight of its parent. A node x∈T1 and a node y∈T2 are induced, iff their subtrees have at least one common leaf label. A heaviest induced ancestor query HIA(u1,u2) with input nodes u1∈T1 and u2∈T2 asks to output the pair (u1∗,u2∗) of induced nodes with the highest combined weight W(u1∗)+W(u2∗), such that u1∗ is an ancestor of u1 and u2∗ is an ancestor of u2. This is a useful primitive in several text processing applications. Gagie et al. (Proceedings of the 25th Canadian Conference on Computational Geometry, CCCG 2013, Waterloo, Ontario, Canada, 2013) introduced this problem and proposed three data structures with the following space-time trade-offs: (i) O(nlog2n) space and O(lognloglogn) query time, (ii) O(nlogn) space and O(log2n) query time, and (iii) O(n) space and O(log3+ϵn) query time. Here n is the number of nodes in both trees combined and ϵ>0 is an arbitrarily small constant. We present two new data structures with better space-time trade-offs: (i) O(nlogn) space and O(lognloglogn) query time, and (ii) O(n) space and O(log2n/loglogn) query time. Additionally, we present new applications of these results.


I/O-Efficient Data Structures for Non-Overlapping Indexing

December 2020

·

23 Reads

·

2 Citations

Theoretical Computer Science

The non-overlapping indexing problem is defined as follows: pre-process a given text T[1,n] of length n into a data structure such that whenever a pattern P[1,m] comes as an input, we can efficiently report the largest set of non-overlapping occurrences of P in T. The best-known solution is by Cohen and Porat [ISAAC 2009]. The size of their structure is O(n) words and the query time is optimal O(m+nocc), where nocc is the output size. Later, Ganguly et al. [CPM 2015 and Algorithmica 2020] proposed a compressed space solution. We study this problem in the cache-oblivious model and present a new data structure of size O(nlog⁡n) words. It can answer queries in optimal O(mB+logB⁡n+noccB) I/O operations, where B is the block size. The space can be improved to O(nlogM/B⁡n) in the cache-aware model, where M is the size of main memory. Additionally, we study a generalization of this problem with an additional range [s,e] constraint. Here the task is to report the largest set of non-overlapping occurrences of P in T, that are within the range [s,e]. We present an O(nlog2⁡n) space data structure in the cache-aware model that can answer queries in optimal O(mB+logB⁡n+nocc[s,e]B) I/O operations, where nocc[s,e] is the output size.


Illustration of the problem reduction: (k,h) is the output of the rSUS problem with query range [α,β], where h=λ(α,β,k)∈Ck. Rk,h is the lowest weighted rectangle in R containing the point (α,β).
Let h∈Ck′ and i=Prev(k,h). By contradiction, assume that there exists j∈(i,k) such that j=Prev(k,lcp(i,k)). Since h≤lcp(i,k), T[j,j+h−1]=T[k,k+h−1]. This is a contradiction with i=Prev(k,h). Thus, i=Prev(k,lcp(i,k)).
Efficient Data Structures for Range Shortest Unique Substring Queries

October 2020

·

97 Reads

·

9 Citations

Let T[1,n] be a string of length n and T[i,j] be the substring of T starting at position i and ending at position j. A substring T[i,j] of T is a repeat if it occurs more than once in T; otherwise, it is a unique substring of T. Repeats and unique substrings are of great interest in computational biology and information retrieval. Given string T as input, the Shortest Unique Substring problem is to find a shortest substring of T that does not occur elsewhere in T. In this paper, we introduce the range variant of this problem, which we call the Range Shortest Unique Substring problem. The task is to construct a data structure over T answering the following type of online queries efficiently. Given a range [α,β], return a shortest substring T[i,j] of T with exactly one occurrence in [α,β]. We present an O(nlogn)-word data structure with O(logwn) query time, where w=Ω(logn) is the word size. Our construction is based on a non-trivial reduction allowing for us to apply a recently introduced optimal geometric data structure [Chan et al., ICALP 2018]. Additionally, we present an O(n)-word data structure with O(nlogϵn) query time, where ϵ>0 is an arbitrarily small constant. The latter data structure relies heavily on another geometric data structure [Nekrich and Navarro, SWAT 2012].


A Survey on Shortest Unique Substring Queries

September 2020

·

22 Reads

·

6 Citations

The shortest unique substring (SUS) problem is an active line of research in the field of string algorithms and has several applications in bioinformatics and information retrieval. The initial version of the problem was proposed by Pei et al. [ICDE’13]. Over the years, many variants and extensions have been pursued, which include positional-SUS, interval-SUS, approximate-SUS, palindromic-SUS, range-SUS, etc. In this article, we highlight some of the key results and summarize the recent developments in this area.


Citations (12)


... Perception applications and tasks in autonomous driving have evolved through extensive research and development and progression in sensor technology, algorithmic processing, and machine learning models [5], [27]. Early perception systems relied on rule-based algorithms and limited sensor input, but the advancements in deep learning and improvements in LiDAR, radar, and camera technologies have provided next-generation solutions [28]- [30]. However, developing a supervised learning-based fair perception system with object classification and detection that can reliably interpret diverse and unpredictable road scenarios remains an important challenge [31], [32]. ...

Reference:

Analyzing and Mitigating Bias for Vulnerable Road Users by Addressing Class Imbalance in Datasets
SenseNow: A Time-Dependent Incentive Approach for Vehicular Crowdsensing

IEEE Open Journal of Intelligent Transportation Systems

... Real-time performance monitoring with alert thresholds anticipated potential problem and its resolution. Combining multiple techniques lead to accuracy improvements of 5-15% and machine learning operations (MLOps) platform further helped to standardize workflows and streamlining ML operations across the organization [28]. ...

Meta-Analysis of the Machine Learning Operations Open Source Ecosystem
  • Citing Conference Paper
  • December 2023

... EHRs are regarded as a fundamental building block of the digital health ecosystem [43], and are shared across various organizations, so they must comply with recognized interoperability standards [43]. The existing literature [44][45][46] provides a clear explanation of incomplete EHRs and their potential causes, along with a focus on methods to identify the factors contributing to their incompleteness [47]. The absence of effective communication and standardized protocols often leads to disorganization. ...

Analyzing the Data Completeness of Patients’ Records Using a Random Variable Approach to Predict the Incompleteness of Electronic Health Records

... They tackled the problem of computing the longest common substring for two strings in the afteredit model, and proposed an algorithm running in poly-logarithmic time. Afterward, Abedin et al. [1] improved the complexities. Also, the problems of computing the longest Lyndon substring [35], the longest palindrome [18], and the set of MUPSs [17] were considered in the after-edit model. ...

The Heaviest Induced Ancestors Problem: Better Data Structures and Applications

Algorithmica

... One of the results from [5] is to design a data structure of size O(n log ϵ n) that answers the position-restricted substring searching query in optimal O(m + occ) time, which is an improvement of Mäkinen and Navarro's result [25]. Range queries have been considered not only for finding patterns in strings but also for computing regularities in strings or compressing substrings (see [12,23,14,1,3,4,27,32,24] and references therein). ...

Efficient Data Structures for Range Shortest Unique Substring Queries

... In this section we show how to index a set of unitigs for k-mer localization queries using Shortest Unique Finimizers (SUFs). The problem is related to the active line of research on shortest unique substring queries [1]. Here, we present a solution specialized to sets of k-mers by using the Spectral Burrows-Wheeler transform [4]. ...

A Survey on Shortest Unique Substring Queries

... [43]) that the characters of T are (or can be identified with) integers [0 . . \sigma ), 1 where \sigma = n \scrO (1) ; that is, T is over a polynomially bounded integer alphabet. Our results are designed for the standard word RAM model with machine words of \omega \geq log n bits. 2 In this model, the text T can be represented using \scrO (n/ log \sigma n) machine words, that is, \scrO (n log \sigma ) bits, in a so-called packed representation; see [18]. ...

A linear-space data structure for range-LCP queries in poly-logarithmic time
  • Citing Article
  • April 2020

Theoretical Computer Science

Paniz Abedin

·

·

·

[...]

·

... Time complexity Manzini [29] O(mn log n/ log log n) Alzamel et al. [3] O(nm) Alzamel et al. [3] O(n log n log log n) Alzamel et al. [3] O(n) on average for m = Ω(log n) Amir et al. [4], Hooshmand et al. [20] O(n log n) Amir et al. [4] O(n) for m = Ω( √ n) Table 1: Known algorithms for computing (1, m)-mappability for strings over constant-sized alphabets. All algorithms use O(n) space. ...

Faster Computation of Genome Mappability with one Mismatch
  • Citing Conference Paper
  • October 2018