jabar mahmood - Academia.edu (original) (raw)
Papers by jabar mahmood
2022 International Conference on Frontiers of Information Technology (FIT)
arXiv (Cornell University), Jul 20, 2023
In a conventional Speech emotion recognition (SER) task, a classifier for a given language is tra... more In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-available Amharic Speech Emotion Dataset (ASED). For English, German and Urdu
Journal of Physics: Conference Series
Off-road vehicles are rapidly being employed for transportation, military activities, and sports ... more Off-road vehicles are rapidly being employed for transportation, military activities, and sports racing. However, in monitoring and maintaining the race’s safety and reliability, quad-bike detection receives less attention than on-road vehicle recognition utilizing DL approaches. In this paper, we used transfer-learning approaches on pre-trained models of cutting-edge architectures, notably Yolov4, Yolov4-tiny, and Yolov5s, to detect quad-bikes from images and videos. A quad-bike dataset acquired from YouTube (https://youtu.be/ZyE3t3lG-vU. Accessed on April 10, 2022) was used to train and assess these designs. In this paper, we show that the Yolov4-tiny architecture outperforms the Yolov4, and Yolov5s in terms of mAP@50 and computing time per image.
Applied Sciences
Crack inspections of automotive engine components are usually conducted manually; this is often t... more Crack inspections of automotive engine components are usually conducted manually; this is often tedious, with a high degree of subjectivity and cost. Therefore, establishing a robust and efficient method will improve the accuracy and minimize the subjectivity of the inspection. This paper presents a robust approach towards crack classification, using transfer learning and fine-tuning to train a pre-trained ConvNet model. Two deep convolutional neural network (DCNN) approaches to training a crack classifier—namely, via (1) a Light ConvNet architecture from scratch, and (2) fined-tuned and transfer learning top layers of the ConvNet architectures of AlexNet, InceptionV3, and MobileNet—are investigated. Data augmentation was utilized to minimize over-fitting caused by an imbalanced and inadequate training sample. Data augmentation improved the accuracy index by 4%, 5%, 7%, and 4%, respectively, for the proposed four approaches. The transfer learning and fine-tuning approach achieved be...
Wireless Communications and Mobile Computing
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocol... more The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect...
Security and Communication Networks
A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the... more A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides unbreakable security. In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority T A , which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters. This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al. Our analysis proves that if an RSU is dishonest, it can easily bypass the T A and can create a session with OBU . Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist RSU from bypassing the T A and to offer user privacy. The proposed scheme fu...
2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2021
Current inspection and checking of an automotive engine cylinder head crack usually involve manua... more Current inspection and checking of an automotive engine cylinder head crack usually involve manual inspection and mechanics checking dry magnetic powder, magnifying glass, and others. This is often labor-intensive, tedious, and involves a high degree of variability among mechanics. Therefore, developing an automated crack detection system will improve the safety and efficiency of data collecting, reliability, consistency, and accuracy. This article is a crack detection algorithm based on canny edge detection with morphological dilation techniques for automotive cylinders. The crack detection processing involves an image of a cylinder head taken and enhanced to 256 by 256 image size. The image is then transformed into a black and white image, and a Gaussian filter smoothes the cracked black and white image. We calculate an intensity gradient and magnitude using a filter to sharpen the edges and utilize a double threshold. Finally, we utilize a morphological dilation technique to extr...
Security and Communication Networks, 2021
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as ... more Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.
Journal of New Media, 2020
2022 International Conference on Frontiers of Information Technology (FIT)
arXiv (Cornell University), Jul 20, 2023
In a conventional Speech emotion recognition (SER) task, a classifier for a given language is tra... more In a conventional Speech emotion recognition (SER) task, a classifier for a given language is trained on a pre-existing dataset for that same language. However, where training data for a language does not exist, data from other languages can be used instead. We experiment with cross-lingual and multilingual SER, working with Amharic, English, German and URDU. For Amharic, we use our own publicly-available Amharic Speech Emotion Dataset (ASED). For English, German and Urdu
Journal of Physics: Conference Series
Off-road vehicles are rapidly being employed for transportation, military activities, and sports ... more Off-road vehicles are rapidly being employed for transportation, military activities, and sports racing. However, in monitoring and maintaining the race’s safety and reliability, quad-bike detection receives less attention than on-road vehicle recognition utilizing DL approaches. In this paper, we used transfer-learning approaches on pre-trained models of cutting-edge architectures, notably Yolov4, Yolov4-tiny, and Yolov5s, to detect quad-bikes from images and videos. A quad-bike dataset acquired from YouTube (https://youtu.be/ZyE3t3lG-vU. Accessed on April 10, 2022) was used to train and assess these designs. In this paper, we show that the Yolov4-tiny architecture outperforms the Yolov4, and Yolov5s in terms of mAP@50 and computing time per image.
Applied Sciences
Crack inspections of automotive engine components are usually conducted manually; this is often t... more Crack inspections of automotive engine components are usually conducted manually; this is often tedious, with a high degree of subjectivity and cost. Therefore, establishing a robust and efficient method will improve the accuracy and minimize the subjectivity of the inspection. This paper presents a robust approach towards crack classification, using transfer learning and fine-tuning to train a pre-trained ConvNet model. Two deep convolutional neural network (DCNN) approaches to training a crack classifier—namely, via (1) a Light ConvNet architecture from scratch, and (2) fined-tuned and transfer learning top layers of the ConvNet architectures of AlexNet, InceptionV3, and MobileNet—are investigated. Data augmentation was utilized to minimize over-fitting caused by an imbalanced and inadequate training sample. Data augmentation improved the accuracy index by 4%, 5%, 7%, and 4%, respectively, for the proposed four approaches. The transfer learning and fine-tuning approach achieved be...
Wireless Communications and Mobile Computing
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocol... more The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security protocols that ultimately provide unbreakable security to vehicles and other components of VANETs. VANETs face various types of security pitfalls due to the openness characteristics of the VANET communication infrastructure. Researchers have recently proposed different mutual authentication schemes that address security and privacy issues in vehicle-to-vehicle (V2V) communication. However, some V2V security schemes suffer from inadequate design and are hard to implement practically. In addition, some schemes face vehicle traceability and lack anonymity. Hence, this paper’s primary goal is to enhance privacy preservation through mutual authentication and to achieve better security and performance. Therefore, this article first describes the vulnerabilities of a very recent authentication scheme presented by Vasudev et al. Our analysis proves that the design of Vasudev et al.’s scheme is incorrect...
Security and Communication Networks
A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the... more A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent security protocol that provides unbreakable security. In recent times, various three-factor authentication solutions for VANET were introduced that adopt the centralized Trusted Authority T A , which is responsible for assigning authentication parameters during vehicle registration, and the authentication process depends on these parameters. This article first explains the vulnerabilities of the recent three-factor (3F) authentication scheme presented by Xu et al. Our analysis proves that if an RSU is dishonest, it can easily bypass the T A and can create a session with OBU . Furthermore, this paper puts forward a new scheme that provides the 3F authentication for VANETs (TFPPASV) to resist RSU from bypassing the T A and to offer user privacy. The proposed scheme fu...
2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2021
Current inspection and checking of an automotive engine cylinder head crack usually involve manua... more Current inspection and checking of an automotive engine cylinder head crack usually involve manual inspection and mechanics checking dry magnetic powder, magnifying glass, and others. This is often labor-intensive, tedious, and involves a high degree of variability among mechanics. Therefore, developing an automated crack detection system will improve the safety and efficiency of data collecting, reliability, consistency, and accuracy. This article is a crack detection algorithm based on canny edge detection with morphological dilation techniques for automotive cylinders. The crack detection processing involves an image of a cylinder head taken and enhanced to 256 by 256 image size. The image is then transformed into a black and white image, and a Gaussian filter smoothes the cracked black and white image. We calculate an intensity gradient and magnitude using a filter to sharpen the edges and utilize a double threshold. Finally, we utilize a morphological dilation technique to extr...
Security and Communication Networks, 2021
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as ... more Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport system (ITS) to support passengers, vehicles, and facilities like road protection, including misadventure warnings and driver succor, along with other infotainment services. The advantages and comforts of VANETs are obvious; however, with the continuous progression in autonomous automobile technologies, VANETs are facing numerous security challenges including DoS, Sybil, impersonation, replay, and related attacks. This paper discusses the characteristics and security issues including attacks and threats at different protocol layers of the VANETs architecture. Moreover, the paper also surveys different countermeasures.
Journal of New Media, 2020