Predicting shear stress distribution has proved to be a critical problem to solve. Hence, the bas... more Predicting shear stress distribution has proved to be a critical problem to solve. Hence, the basic objective of this paper is to develop a prediction of shear stress distribution by machine learning algorithms including artificial neural networks, classification and regression tree, generalized linear models. The data set, which is large and feature-rich, is utilized to improve machine learning-based predictive models and extract the most important predictive factors. The 10-fold cross-validation approach was used to determine the performances of prediction methods. The predictive performances of the proposed models were found to be very close to each other. However, the results indicated that the artificial neural network, which has the R value of 0.92 ± 0.03, achieved the best classification performance overall accuracy on the 10-fold holdout sample. The predictions of all machine learning models were well correlated with measurement data.
Abstract—Automated configuration and management of highly dynamic networks is a challenging probl... more Abstract—Automated configuration and management of highly dynamic networks is a challenging problem for network practi-tioners. Such online optimization of systems can be performed in two ways: (i) using a separate model of the system for experimenting new configurations, (ii) using the system itself for experimentation without a separate system model. The former approach fails for dynamic networks with high failure rates or variable demand profile. In this paper, we take the latter approach and perform in-situ trials in a network to find better configurations of IGP link weights giving result to higher network throughput. Our approach follows a two-phase model where the online optimization process periodically goes into a “search” phase followed by network operation with the parameters found in the latest search phase. We use a black-box optimization algorithm, called Probabilistic Trans-Algorithmic Search (PTAS), to search for better IGP link weights and evaluate our approach in t...
— Self-organization is the process where a structure or pattern appears in a system without a cen... more — Self-organization is the process where a structure or pattern appears in a system without a central authority or external element imposing it through planning. In various areas, simulation is a safe and low-cost alternative to complex problems. We developed a free online simulation tool which computes and displays spatial self-organizing behavior of individuals in a stepping stone environment.
Web pages in the web represent certain concepts in the domain they fall in, and the connections b... more Web pages in the web represent certain concepts in the domain they fall in, and the connections between them represent the relations between the concepts they represent. In the current web, people are using links blindly without knowing what these links point to, or what kind of relationship this link represents. With the advent of the semantic web, concepts and relationships among them are represented in an ontology. This can be utilized to make links more meaningful. Web pages can be searched, browsed or even reorganized based on their concept and relationship labels. Links in a webpage can render useful information about the page it is pointing to. We can annotate webpage & its links with appropriate concepts from ontology. This paper presents new idea of propagating concept from a webpage to the links pointing to that page or from the links to the webpage. Propagation of concepts is based on certain criteria which will be discussed later in this paper. We also propose a new idea...
— To improve the quality of search results in huge digital music databases, we developed a simple... more — To improve the quality of search results in huge digital music databases, we developed a simple algorithm based on artist influences and complex network theory that produces interesting and novel results. Traditionally, music recommendation engines use audio feature similarity to suggest new music based on a given artist. We propose a search that takes influences into account provides a richer result set than one based on audio features alone. We constructed an artist influence network using the Rovi dataset and studied it using complex network theory. Analysis revealed many complex network phenomena which we used to tune the search algorithm. Finally, we consider the difficulty of qualitatively rating our results and the need for a tool to exercise the algorithm. Keywords—complex networks; recommender system; artist network I.
Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechn... more Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users....
In this article, we construct two new cryptosystems which use two different mod values. Our main ... more In this article, we construct two new cryptosystems which use two different mod values. Our main purpose is to create fast and secure schemes by using two different mod values. We do encryption according to mod $N$ and decryption according to mod $N_{1}$ where $N$ is a multiple of $N_{1}$. We examine homomorphic properties and security of these encryption schemes. At the final part, we implement the schemes and measure their time complexities.
This paper looks at the opportunities and challenges of implementing blockchain technology across... more This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a ...
2020 International Conference on Computing, Networking and Communications (ICNC), 2020
This paper presents a prime aspect of Augmented and Virtual Reality development in the field of h... more This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. The resources (infrastructure) to complete this study are provided by the University of Cincinnatis Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
2020 3rd International Conference on Information and Computer Technologies (ICICT), 2020
Today's software industry is fast moving and has daily changing demands. Many organizations a... more Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and...
With the growth of the Internet, Internet Service Providers (ISPs) try to meet the increasing tra... more With the growth of the Internet, Internet Service Providers (ISPs) try to meet the increasing traffic demand with new technology and improved utilization of existing resources. Routing of data packets can affect network utilization. Packets are sent along network paths from source to destination following a protocol. Open Shortest Path First (OSPF) is the most commonly used intra-domain Internet routing protocol (IRP). Traffic flow is routed along shortest paths, splitting flow at nodes with several outgoing links on a shortest path to the destination IP address. Link weights are assigned by the network operator. A path length is the sum of the weights of the links in the path. In this paper, I study the problem of optimizing OSPF weights, given a set of projected demands, with the objective of minimizing network congestion. The weight assignment problem is NPhard. I developed a genetic algorithm (GA) to solve this problem.
Social networks in any form, specifically online social networks (OSNs), are becoming a part of o... more Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent any criminal activities in different forms. It will also help researchers to develop new models/techniques in the future. This paper provides literature review of the social network forensics methods, models, and techniques in order to provide an overview to the researchers for their future works as well as the law enf...
The availability of sophisticated technologies and methods of perpetrating criminogenic activitie... more The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets traditionally are used for criminogenic activities and famously acclaimed to promote cybercrime, procurements of illegal drugs, arms deals, and cryptocurrency markets. In countries with oppressive regimes, censorship of digital communications, and strict policies prompted journalists and freedom fighters to seek freedom using darknet technologies anonymously while others simply exploit it for illegal activities. Recently, MIT's Lincoln Laboratory of Artificial Intelligence augmented a tool that can be used to expose illegal activities behind the darknet. We studied relevant literature re...
This paper looks at the opportunities and challenges of implementing blockchain technology across... more This paper looks at the opportunities and challenges of implementing blockchain technology across medical, finance and banking sectors, and provides a clear view which can enable Blockchain for more extents. After going through few articles and papers related to applications of Blockchain, we gained a vivid knowledge on pros and cons on Blockchain applications from each article. Few drawbacks that we encountered are using Power of Work (POW) in medical sector which is destroying the computing ability at a stage when system is getting bigger and eventually which is wasting lots of resources. One study over conceptual proposal on blockchain is the idea of using trade credit as the value of transactions, and this trade credit is in the scope of trade secret which improves trade confidentiality and makes it more secure. Moreover, centralization systems have few risks owing to their dependence on a high scale which could tamper the data or can even block access, change the rules and migh...
Predicting shear stress distribution has proved to be a critical problem to solve. Hence, the bas... more Predicting shear stress distribution has proved to be a critical problem to solve. Hence, the basic objective of this paper is to develop a prediction of shear stress distribution by machine learning algorithms including artificial neural networks, classification and regression tree, generalized linear models. The data set, which is large and feature-rich, is utilized to improve machine learning-based predictive models and extract the most important predictive factors. The 10-fold cross-validation approach was used to determine the performances of prediction methods. The predictive performances of the proposed models were found to be very close to each other. However, the results indicated that the artificial neural network, which has the R value of 0.92 ± 0.03, achieved the best classification performance overall accuracy on the 10-fold holdout sample. The predictions of all machine learning models were well correlated with measurement data.
Abstract—Automated configuration and management of highly dynamic networks is a challenging probl... more Abstract—Automated configuration and management of highly dynamic networks is a challenging problem for network practi-tioners. Such online optimization of systems can be performed in two ways: (i) using a separate model of the system for experimenting new configurations, (ii) using the system itself for experimentation without a separate system model. The former approach fails for dynamic networks with high failure rates or variable demand profile. In this paper, we take the latter approach and perform in-situ trials in a network to find better configurations of IGP link weights giving result to higher network throughput. Our approach follows a two-phase model where the online optimization process periodically goes into a “search” phase followed by network operation with the parameters found in the latest search phase. We use a black-box optimization algorithm, called Probabilistic Trans-Algorithmic Search (PTAS), to search for better IGP link weights and evaluate our approach in t...
— Self-organization is the process where a structure or pattern appears in a system without a cen... more — Self-organization is the process where a structure or pattern appears in a system without a central authority or external element imposing it through planning. In various areas, simulation is a safe and low-cost alternative to complex problems. We developed a free online simulation tool which computes and displays spatial self-organizing behavior of individuals in a stepping stone environment.
Web pages in the web represent certain concepts in the domain they fall in, and the connections b... more Web pages in the web represent certain concepts in the domain they fall in, and the connections between them represent the relations between the concepts they represent. In the current web, people are using links blindly without knowing what these links point to, or what kind of relationship this link represents. With the advent of the semantic web, concepts and relationships among them are represented in an ontology. This can be utilized to make links more meaningful. Web pages can be searched, browsed or even reorganized based on their concept and relationship labels. Links in a webpage can render useful information about the page it is pointing to. We can annotate webpage & its links with appropriate concepts from ontology. This paper presents new idea of propagating concept from a webpage to the links pointing to that page or from the links to the webpage. Propagation of concepts is based on certain criteria which will be discussed later in this paper. We also propose a new idea...
— To improve the quality of search results in huge digital music databases, we developed a simple... more — To improve the quality of search results in huge digital music databases, we developed a simple algorithm based on artist influences and complex network theory that produces interesting and novel results. Traditionally, music recommendation engines use audio feature similarity to suggest new music based on a given artist. We propose a search that takes influences into account provides a richer result set than one based on audio features alone. We constructed an artist influence network using the Rovi dataset and studied it using complex network theory. Analysis revealed many complex network phenomena which we used to tune the search algorithm. Finally, we consider the difficulty of qualitatively rating our results and the need for a tool to exercise the algorithm. Keywords—complex networks; recommender system; artist network I.
Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechn... more Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users....
In this article, we construct two new cryptosystems which use two different mod values. Our main ... more In this article, we construct two new cryptosystems which use two different mod values. Our main purpose is to create fast and secure schemes by using two different mod values. We do encryption according to mod $N$ and decryption according to mod $N_{1}$ where $N$ is a multiple of $N_{1}$. We examine homomorphic properties and security of these encryption schemes. At the final part, we implement the schemes and measure their time complexities.
This paper looks at the opportunities and challenges of implementing blockchain technology across... more This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a ...
2020 International Conference on Computing, Networking and Communications (ICNC), 2020
This paper presents a prime aspect of Augmented and Virtual Reality development in the field of h... more This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. The resources (infrastructure) to complete this study are provided by the University of Cincinnatis Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions.
2020 3rd International Conference on Information and Computer Technologies (ICICT), 2020
Today's software industry is fast moving and has daily changing demands. Many organizations a... more Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and...
With the growth of the Internet, Internet Service Providers (ISPs) try to meet the increasing tra... more With the growth of the Internet, Internet Service Providers (ISPs) try to meet the increasing traffic demand with new technology and improved utilization of existing resources. Routing of data packets can affect network utilization. Packets are sent along network paths from source to destination following a protocol. Open Shortest Path First (OSPF) is the most commonly used intra-domain Internet routing protocol (IRP). Traffic flow is routed along shortest paths, splitting flow at nodes with several outgoing links on a shortest path to the destination IP address. Link weights are assigned by the network operator. A path length is the sum of the weights of the links in the path. In this paper, I study the problem of optimizing OSPF weights, given a set of projected demands, with the objective of minimizing network congestion. The weight assignment problem is NPhard. I developed a genetic algorithm (GA) to solve this problem.
Social networks in any form, specifically online social networks (OSNs), are becoming a part of o... more Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent any criminal activities in different forms. It will also help researchers to develop new models/techniques in the future. This paper provides literature review of the social network forensics methods, models, and techniques in order to provide an overview to the researchers for their future works as well as the law enf...
The availability of sophisticated technologies and methods of perpetrating criminogenic activitie... more The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can only be accessed using special network configuration and software tools to access its contents which are not indexed by search engines. Over the years darknets traditionally are used for criminogenic activities and famously acclaimed to promote cybercrime, procurements of illegal drugs, arms deals, and cryptocurrency markets. In countries with oppressive regimes, censorship of digital communications, and strict policies prompted journalists and freedom fighters to seek freedom using darknet technologies anonymously while others simply exploit it for illegal activities. Recently, MIT's Lincoln Laboratory of Artificial Intelligence augmented a tool that can be used to expose illegal activities behind the darknet. We studied relevant literature re...
This paper looks at the opportunities and challenges of implementing blockchain technology across... more This paper looks at the opportunities and challenges of implementing blockchain technology across medical, finance and banking sectors, and provides a clear view which can enable Blockchain for more extents. After going through few articles and papers related to applications of Blockchain, we gained a vivid knowledge on pros and cons on Blockchain applications from each article. Few drawbacks that we encountered are using Power of Work (POW) in medical sector which is destroying the computing ability at a stage when system is getting bigger and eventually which is wasting lots of resources. One study over conceptual proposal on blockchain is the idea of using trade credit as the value of transactions, and this trade credit is in the scope of trade secret which improves trade confidentiality and makes it more secure. Moreover, centralization systems have few risks owing to their dependence on a high scale which could tamper the data or can even block access, change the rules and migh...
Uploads
Papers by Bilal Gonen