jabar mahmood - Academia.edu (original) (raw)

Papers by jabar mahmood

Research paper thumbnail of A Systematic Literature Review on Block-chain Attacks

Research paper thumbnail of A Systematic Literature Review on Block-chain Attacks

2022 International Conference on Frontiers of Information Technology (FIT)

Research paper thumbnail of Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages

arXiv (Cornell University), Jul 20, 2023

In a conventional Speech emotion recognition (SER) task, a classifier for a given language is tra... more In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-available Amharic Speech Emotion Dataset (ASED). For English, German and Urdu

Research paper thumbnail of Off-road Quad-Bike Detection Using CNN Models

Journal of Physics: Conference Series

Off-road vehicles are rapidly being employed for transportation, military activities, and sports ... more Off-road vehicles are rapidly being employed for transportation, military activities, and sports racing. However, in monitoring and maintaining the race’s safety and reliability, quad-bike detection receives less attention than on-road vehicle recognition utilizing DL approaches. In this paper, we used transfer-learning approaches on pre-trained models of cutting-edge architectures, notably Yolov4, Yolov4-tiny, and Yolov5s, to detect quad-bikes from images and videos. A quad-bike dataset acquired from YouTube (https://youtu.be/ZyE3t3lG-vU. Accessed on April 10, 2022) was used to train and assess these designs. In this paper, we show that the Yolov4-tiny architecture outperforms the Yolov4, and Yolov5s in terms of mAP@50 and computing time per image.

Research paper thumbnail of FAECCD-CNet: Fast Automotive Engine Components Crack Detection and Classification Using ConvNet on Images

Applied Sciences

Crack inspections of automotive engine components are usually conducted manually; this is often t... more Crack inspections of automotive engine components are usually conducted manually; this is often tedious, with a high degree of subjectivity and cost. Therefore, establishing a robust and efficient method will improve the accuracy and minimize the subjectivity of the inspection. This paper presents a robust approach towards crack classification, using transfer learning and fine-tuning to train a pre-trained ConvNet model. Two deep convolutional neural network (DCNN) approaches to training a crack classifier—namely, via (1) a Light ConvNet architecture from scratch, and (2) fined-tuned and transfer learning top layers of the ConvNet architectures of AlexNet, InceptionV3, and MobileNet—are investigated. Data augmentation was utilized to minimize over-fitting caused by an imbalanced and inadequate training sample. Data augmentation improved the accuracy index by 4%, 5%, 7%, and 4%, respectively, for the proposed four approaches. The transfer learning and fine-tuning approach achieved be...

Research paper thumbnail of Secure Message Transmission for V2V Based on Mutual Authentication for VANETs

Wireless Communications and Mobile Computing

The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocol... more The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect...

Research paper thumbnail of TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs

Security and Communication Networks

A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the... more A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides unbreakable security. In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority T A , which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters. This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al. Our analysis proves that if an RSU is dishonest, it can easily bypass the T A and can create a session with OBU . Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist RSU from bypassing the T A and to offer user privacy. The proposed scheme fu...

Research paper thumbnail of Automotive Engine Cylinder Head Crack Detection: Canny Edge Detection With Morphological Dilation

2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2021

Current inspection and checking of an automotive engine cylinder head crack usually involve manua... more Current inspection and checking of an automotive engine cylinder head crack usually involve manual inspection and mechanics checking dry magnetic powder, magnifying glass, and others. This is often labor-intensive, tedious, and involves a high degree of variability among mechanics. Therefore, developing an automated crack detection system will improve the safety and efficiency of data collecting, reliability, consistency, and accuracy. This article is a crack detection algorithm based on canny edge detection with morphological dilation techniques for automotive cylinders. The crack detection processing involves an image of a cylinder head taken and enhanced to 256 by 256 image size. The image is then transformed into a black and white image, and a Gaussian filter smoothes the cracked black and white image. We calculate an intensity gradient and magnitude using a filter to sharpen the edges and utilize a double threshold. Finally, we utilize a morphological dilation technique to extr...

Research paper thumbnail of Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures

Security and Communication Networks, 2021

Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as ... more Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.

Research paper thumbnail of An Authentication Mechanism for Autonomous Vehicle ECU Utilizing a Novel Slice-Based PUF Design

Journal of New Media, 2020

Research paper thumbnail of A Systematic Literature Review on Block-chain Attacks

Research paper thumbnail of A Systematic Literature Review on Block-chain Attacks

2022 International Conference on Frontiers of Information Technology (FIT)

Research paper thumbnail of Cross-Corpus Multilingual Speech Emotion Recognition: Amharic vs. Other Languages

arXiv (Cornell University), Jul 20, 2023

In a conventional Speech emotion recognition (SER) task, a classifier for a given language is tra... more In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-available Amharic Speech Emotion Dataset (ASED). For English, German and Urdu

Research paper thumbnail of Off-road Quad-Bike Detection Using CNN Models

Journal of Physics: Conference Series

Off-road vehicles are rapidly being employed for transportation, military activities, and sports ... more Off-road vehicles are rapidly being employed for transportation, military activities, and sports racing. However, in monitoring and maintaining the race’s safety and reliability, quad-bike detection receives less attention than on-road vehicle recognition utilizing DL approaches. In this paper, we used transfer-learning approaches on pre-trained models of cutting-edge architectures, notably Yolov4, Yolov4-tiny, and Yolov5s, to detect quad-bikes from images and videos. A quad-bike dataset acquired from YouTube (https://youtu.be/ZyE3t3lG-vU. Accessed on April 10, 2022) was used to train and assess these designs. In this paper, we show that the Yolov4-tiny architecture outperforms the Yolov4, and Yolov5s in terms of mAP@50 and computing time per image.

Research paper thumbnail of FAECCD-CNet: Fast Automotive Engine Components Crack Detection and Classification Using ConvNet on Images

Applied Sciences

Crack inspections of automotive engine components are usually conducted manually; this is often t... more Crack inspections of automotive engine components are usually conducted manually; this is often tedious, with a high degree of subjectivity and cost. Therefore, establishing a robust and efficient method will improve the accuracy and minimize the subjectivity of the inspection. This paper presents a robust approach towards crack classification, using transfer learning and fine-tuning to train a pre-trained ConvNet model. Two deep convolutional neural network (DCNN) approaches to training a crack classifier—namely, via (1) a Light ConvNet architecture from scratch, and (2) fined-tuned and transfer learning top layers of the ConvNet architectures of AlexNet, InceptionV3, and MobileNet—are investigated. Data augmentation was utilized to minimize over-fitting caused by an imbalanced and inadequate training sample. Data augmentation improved the accuracy index by 4%, 5%, 7%, and 4%, respectively, for the proposed four approaches. The transfer learning and fine-tuning approach achieved be...

Research paper thumbnail of Secure Message Transmission for V2V Based on Mutual Authentication for VANETs

Wireless Communications and Mobile Computing

The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocol... more The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect...

Research paper thumbnail of TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs

Security and Communication Networks

A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the... more A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides unbreakable security. In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority T A , which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters. This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al. Our analysis proves that if an RSU is dishonest, it can easily bypass the T A and can create a session with OBU . Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist RSU from bypassing the T A and to offer user privacy. The proposed scheme fu...

Research paper thumbnail of Automotive Engine Cylinder Head Crack Detection: Canny Edge Detection With Morphological Dilation

2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2021

Current inspection and checking of an automotive engine cylinder head crack usually involve manua... more Current inspection and checking of an automotive engine cylinder head crack usually involve manual inspection and mechanics checking dry magnetic powder, magnifying glass, and others. This is often labor-intensive, tedious, and involves a high degree of variability among mechanics. Therefore, developing an automated crack detection system will improve the safety and efficiency of data collecting, reliability, consistency, and accuracy. This article is a crack detection algorithm based on canny edge detection with morphological dilation techniques for automotive cylinders. The crack detection processing involves an image of a cylinder head taken and enhanced to 256 by 256 image size. The image is then transformed into a black and white image, and a Gaussian filter smoothes the cracked black and white image. We calculate an intensity gradient and magnitude using a filter to sharpen the edges and utilize a double threshold. Finally, we utilize a morphological dilation technique to extr...

Research paper thumbnail of Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures

Security and Communication Networks, 2021

Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as ... more Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.

Research paper thumbnail of An Authentication Mechanism for Autonomous Vehicle ECU Utilizing a Novel Slice-Based PUF Design

Journal of New Media, 2020