Forecasting the foreign exchange rate is an uphill task. Numerous methods have been used over the... more Forecasting the foreign exchange rate is an uphill task. Numerous methods have been used over the years to develop an efficient and reliable network for forecasting the foreign exchange rate. This study utilizes recurrent neural networks (RNNs) for forecasting the foreign currency exchange rates. Cartesian genetic programming (CGP) is used for evolving the artificial neural network (ANN) to produce the prediction model. RNNs that are evolved through CGP have shown great promise in time series forecasting. The proposed approach utilizes the trends present in the historical data for its training purpose. Thirteen different currencies along with the trade-weighted index (TWI) and special drawing rights (SDR) is used for the performance analysis of recurrent Cartesian genetic programming-based artificial neural networks (RCGPANN) in comparison with various other prediction models proposed to date. The experimental results show that RCGPANN is not only capable of obtaining an accurate bu...
—Indoor localization has recently witnessed an increase in interest, due to the potential wide ra... more —Indoor localization has recently witnessed an increase in interest, due to the potential wide range of services it can provide by leveraging Internet of Things (IoT), and ubiquitous connectivity. Different techniques, wireless technologies and mechanisms have been proposed in the literature to provide indoor localization services in order to improve the services provided to the users. However, there is a lack of an up-to-date survey paper that incorporates some of the recently proposed accurate and reliable localization systems. In this paper, we aim to provide a detailed survey of different indoor localization techniques such as Angle of Arrival (AoA), Time of Flight (ToF), Return Time of Flight (RTOF), Received Signal Strength (RSS); based on technologies such as WiFi, Radio Frequency Identification Device (RFID), Ultra Wideband (UWB), Bluetooth and systems that have been proposed in the literature. The paper primarily discusses localization and positioning of human users and their devices. We highlight the strengths of the existing systems proposed in the literature. In contrast with the existing surveys, we also evaluate different systems from the perspective of energy efficiency, availability, cost, reception range, latency, scalability and tracking accuracy. Rather than comparing the technologies or techniques, we compare the localization systems and summarize their working principle. We also discuss remaining challenges to accurate indoor localization.
An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different ... more An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different countries and over 6000 distinct source IP addresses. Due to decoupled control and data plane, Software Defined Networks (SDN) can handle these increasing number of attacks by blocking those network connections at the switch level. However, the challenge lies in defining the set of rules on the SDN controller to block malicious network connections. Historical network attack data can be used to automatically identify and block the malicious connections. There are a few existing open-source software tools to monitor and limit the number of login attempts per source IP address one-by-one. However, these solutions cannot efficiently act against a chain of attacks that comprises multiple IP addresses used by each attacker. In this paper, we propose using machine learning algorithms, trained on historical network attack data, to identify the potential malicious connections and potential attack destinations. We use four widely-known machine learning algorithms: C4.5, Bayesian Network (BayesNet), Decision Table (DT), and Naive-Bayes to predict the host that will be attacked based on the historical data. Experimental results show that average prediction accuracy of 91.68% is attained using Bayesian Networks.
—Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide receptio... more —Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide reception range, low cost and availability. However, most existing technologies cannot satisfy all these requirements. Apple's Bluetooth Low Energy (BLE), named iBeacon, has emerged as a leading candidate in this domain and has become an almost industry standard for PBS. However, it has several limitations. It suffers from poor proximity detection accuracy due to its reliance on Received Signal Strength Indicator (RSSI). To improve proximity detection accuracy of iBeacons, we present two algorithms that address the inherent flaws in iBeacon's current proximity detection approach. Our first algorithm, Server-side Running Average (SRA), uses the path-loss model-based estimated distance for proximity classification. Our second algorithm, Server-side Kalman Filter (SKF), uses a Kalman filter in conjunction with SRA. Our experimental results show that SRA and SKF perform better than the current moving average approach utilized by iBeacons. SRA results in about a 29% improvement while SKF results in about a 32% improvement over the current approach in proximity detection accuracy.
—An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different... more —An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different countries and over 6000 distinct source IP addresses. Due to decoupled control and data plane, Software Defined Networks (SDN) can handle these increasing number of attacks by blocking those network connections at the switch level. However, the challenge lies in defining the set of rules on the SDN controller to block malicious network connections. Historical network attack data can be used to automatically identify and block the malicious connections. There are a few existing open-source software tools to monitor and limit the number of login attempts per source IP address one-by-one. However, these solutions cannot efficiently act against a chain of attacks that comprises multiple IP addresses used by each attacker. In this paper, we propose using machine learning algorithms, trained on historical network attack data, to identify the potential malicious connections and potential attack destinations. We use four widely-known machine learning algorithms: C4.5, Bayesian Network (BayesNet), Decision Table (DT), and Naive-Bayes to predict the host that will be attacked based on the historical data. Experimental results show that average prediction accuracy of 91.68% is attained using Bayesian Networks.
A computationally efficient and accurate forecasting model for highly dynamic electric load patte... more A computationally efficient and accurate forecasting model for highly dynamic electric load patterns of UK electric power grid is proposed and implemented using recurrent neuro-evolutionary algorithms. Cartesian genetic programming is used to find the optimum recurrent structure and network parameters to accurately forecast highly fluctuating load patterns. Fifty different models are trained and tested in diverse set of scenarios to predict single as well as more future instances in advance. The testing results demonstrated that the models are highly accurate as they attained an accuracy of as high as 98.95 %. The models trained to predict single future instances are tested to predict more future instances in advance, obtaining an accuracy of 94 %, thus proving their robustness to predict any time series. Keywords Very short term electric load forecasting (VSTLF) Á Recurrent neural networks Á Cartesian genetic programming evolved recurrent neural network (CGPRNN) Á Neuro-evolution
The advent of Bluetooth Low Energy (BLE) enabled
Beacons is poised to revolutionize the indoor co... more The advent of Bluetooth Low Energy (BLE) enabled Beacons is poised to revolutionize the indoor contextual aware services to the users. Due to the lower energy consumption and higher throughput, BLE could therefore be an integral pillar of an Internet of Things (IoT) Location Based Service (LBS). Tracking a user with high accuracy is known as Micro-Location. This is a requirement of many IoT user-centric applications for indoor environments. Although several technologies have been used for tracking purposes, the accuracy has always been a serious issue. At the same time, each vendor would install different technologies. In this work, we propose to use the cutting edge and commercially available Apple’s iBeacon protocol and iBeacon BLE sensors for micro-location. We propose to leverage a control theoretic approach, namely particle filtering, in order to increase the tracking accuracy in an indoor environment. We performed extensive experiments and our results show that the proposed beacon based micro-location system can be used to locate a user in an indoor environment with an error as low as 0.27 meters.
Micro-location is the process of locating any entity with high accuracy (possibly in centimeters)... more Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing is the process of creating a virtual fence around a so-called Point of Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart buildings. We argue that micro-location based location-aware solutions can play a significant role in facilitating the tenants of an IoT equipped smart building. Also, such advanced technologies will enable the smart building control system through minimal actions performed by the tenants. We also highlight the existing and envisioned services to be provided by using micro-location enabling technologies. We describe the challenges and propose some potential solutions such that micro-location enabling technologies and services are thoroughly integrated with IoT equipped smart building.
Forecasting the foreign exchange rate is an uphill task. Numerous methods have been used over the... more Forecasting the foreign exchange rate is an uphill task. Numerous methods have been used over the years to develop an efficient and reliable network for forecasting the foreign exchange rate. This study utilizes recurrent neural networks (RNNs) for forecasting the foreign currency exchange rates. Cartesian genetic programming (CGP) is used for evolving the artificial neural network (ANN) to produce the prediction model. RNNs that are evolved through CGP have shown great promise in time series forecasting. The proposed approach utilizes the trends present in the historical data for its training purpose. Thirteen different currencies along with the trade-weighted index (TWI) and special drawing rights (SDR) is used for the performance analysis of recurrent Cartesian genetic programming-based artificial neural networks (RCGPANN) in comparison with various other prediction models proposed to date. The experimental results show that RCGPANN is not only capable of obtaining an accurate bu...
—Indoor localization has recently witnessed an increase in interest, due to the potential wide ra... more —Indoor localization has recently witnessed an increase in interest, due to the potential wide range of services it can provide by leveraging Internet of Things (IoT), and ubiquitous connectivity. Different techniques, wireless technologies and mechanisms have been proposed in the literature to provide indoor localization services in order to improve the services provided to the users. However, there is a lack of an up-to-date survey paper that incorporates some of the recently proposed accurate and reliable localization systems. In this paper, we aim to provide a detailed survey of different indoor localization techniques such as Angle of Arrival (AoA), Time of Flight (ToF), Return Time of Flight (RTOF), Received Signal Strength (RSS); based on technologies such as WiFi, Radio Frequency Identification Device (RFID), Ultra Wideband (UWB), Bluetooth and systems that have been proposed in the literature. The paper primarily discusses localization and positioning of human users and their devices. We highlight the strengths of the existing systems proposed in the literature. In contrast with the existing surveys, we also evaluate different systems from the perspective of energy efficiency, availability, cost, reception range, latency, scalability and tracking accuracy. Rather than comparing the technologies or techniques, we compare the localization systems and summarize their working principle. We also discuss remaining challenges to accurate indoor localization.
An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different ... more An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different countries and over 6000 distinct source IP addresses. Due to decoupled control and data plane, Software Defined Networks (SDN) can handle these increasing number of attacks by blocking those network connections at the switch level. However, the challenge lies in defining the set of rules on the SDN controller to block malicious network connections. Historical network attack data can be used to automatically identify and block the malicious connections. There are a few existing open-source software tools to monitor and limit the number of login attempts per source IP address one-by-one. However, these solutions cannot efficiently act against a chain of attacks that comprises multiple IP addresses used by each attacker. In this paper, we propose using machine learning algorithms, trained on historical network attack data, to identify the potential malicious connections and potential attack destinations. We use four widely-known machine learning algorithms: C4.5, Bayesian Network (BayesNet), Decision Table (DT), and Naive-Bayes to predict the host that will be attacked based on the historical data. Experimental results show that average prediction accuracy of 91.68% is attained using Bayesian Networks.
—Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide receptio... more —Proximity-based Services (PBS) require high detection accuracy, energy efficiency, wide reception range, low cost and availability. However, most existing technologies cannot satisfy all these requirements. Apple's Bluetooth Low Energy (BLE), named iBeacon, has emerged as a leading candidate in this domain and has become an almost industry standard for PBS. However, it has several limitations. It suffers from poor proximity detection accuracy due to its reliance on Received Signal Strength Indicator (RSSI). To improve proximity detection accuracy of iBeacons, we present two algorithms that address the inherent flaws in iBeacon's current proximity detection approach. Our first algorithm, Server-side Running Average (SRA), uses the path-loss model-based estimated distance for proximity classification. Our second algorithm, Server-side Kalman Filter (SKF), uses a Kalman filter in conjunction with SRA. Our experimental results show that SRA and SKF perform better than the current moving average approach utilized by iBeacons. SRA results in about a 29% improvement while SKF results in about a 32% improvement over the current approach in proximity detection accuracy.
—An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different... more —An experimental setup of 32 honeypots reported 17M login attempts originating from 112 different countries and over 6000 distinct source IP addresses. Due to decoupled control and data plane, Software Defined Networks (SDN) can handle these increasing number of attacks by blocking those network connections at the switch level. However, the challenge lies in defining the set of rules on the SDN controller to block malicious network connections. Historical network attack data can be used to automatically identify and block the malicious connections. There are a few existing open-source software tools to monitor and limit the number of login attempts per source IP address one-by-one. However, these solutions cannot efficiently act against a chain of attacks that comprises multiple IP addresses used by each attacker. In this paper, we propose using machine learning algorithms, trained on historical network attack data, to identify the potential malicious connections and potential attack destinations. We use four widely-known machine learning algorithms: C4.5, Bayesian Network (BayesNet), Decision Table (DT), and Naive-Bayes to predict the host that will be attacked based on the historical data. Experimental results show that average prediction accuracy of 91.68% is attained using Bayesian Networks.
A computationally efficient and accurate forecasting model for highly dynamic electric load patte... more A computationally efficient and accurate forecasting model for highly dynamic electric load patterns of UK electric power grid is proposed and implemented using recurrent neuro-evolutionary algorithms. Cartesian genetic programming is used to find the optimum recurrent structure and network parameters to accurately forecast highly fluctuating load patterns. Fifty different models are trained and tested in diverse set of scenarios to predict single as well as more future instances in advance. The testing results demonstrated that the models are highly accurate as they attained an accuracy of as high as 98.95 %. The models trained to predict single future instances are tested to predict more future instances in advance, obtaining an accuracy of 94 %, thus proving their robustness to predict any time series. Keywords Very short term electric load forecasting (VSTLF) Á Recurrent neural networks Á Cartesian genetic programming evolved recurrent neural network (CGPRNN) Á Neuro-evolution
The advent of Bluetooth Low Energy (BLE) enabled
Beacons is poised to revolutionize the indoor co... more The advent of Bluetooth Low Energy (BLE) enabled Beacons is poised to revolutionize the indoor contextual aware services to the users. Due to the lower energy consumption and higher throughput, BLE could therefore be an integral pillar of an Internet of Things (IoT) Location Based Service (LBS). Tracking a user with high accuracy is known as Micro-Location. This is a requirement of many IoT user-centric applications for indoor environments. Although several technologies have been used for tracking purposes, the accuracy has always been a serious issue. At the same time, each vendor would install different technologies. In this work, we propose to use the cutting edge and commercially available Apple’s iBeacon protocol and iBeacon BLE sensors for micro-location. We propose to leverage a control theoretic approach, namely particle filtering, in order to increase the tracking accuracy in an indoor environment. We performed extensive experiments and our results show that the proposed beacon based micro-location system can be used to locate a user in an indoor environment with an error as low as 0.27 meters.
Micro-location is the process of locating any entity with high accuracy (possibly in centimeters)... more Micro-location is the process of locating any entity with high accuracy (possibly in centimeters), while geofencing is the process of creating a virtual fence around a so-called Point of Interest (PoI). In this paper, we present an insight into various micro-location enabling technologies and services. We also discuss how these can accelerate the incorporation of Internet of Things (IoT) in smart buildings. We argue that micro-location based location-aware solutions can play a significant role in facilitating the tenants of an IoT equipped smart building. Also, such advanced technologies will enable the smart building control system through minimal actions performed by the tenants. We also highlight the existing and envisioned services to be provided by using micro-location enabling technologies. We describe the challenges and propose some potential solutions such that micro-location enabling technologies and services are thoroughly integrated with IoT equipped smart building.
Uploads
Papers by Fahim Zafari
Beacons is poised to revolutionize the indoor contextual aware
services to the users. Due to the lower energy consumption and
higher throughput, BLE could therefore be an integral pillar
of an Internet of Things (IoT) Location Based Service (LBS).
Tracking a user with high accuracy is known as Micro-Location.
This is a requirement of many IoT user-centric applications
for indoor environments. Although several technologies have
been used for tracking purposes, the accuracy has always been
a serious issue. At the same time, each vendor would install
different technologies. In this work, we propose to use the cutting edge and commercially available Apple’s iBeacon protocol and iBeacon BLE sensors for micro-location. We propose to leverage a control theoretic approach, namely particle filtering, in order to increase the tracking accuracy in an indoor environment. We performed extensive experiments and our results show that the proposed beacon based micro-location system can be used to locate a user in an indoor environment with an error as low as 0.27 meters.
Beacons is poised to revolutionize the indoor contextual aware
services to the users. Due to the lower energy consumption and
higher throughput, BLE could therefore be an integral pillar
of an Internet of Things (IoT) Location Based Service (LBS).
Tracking a user with high accuracy is known as Micro-Location.
This is a requirement of many IoT user-centric applications
for indoor environments. Although several technologies have
been used for tracking purposes, the accuracy has always been
a serious issue. At the same time, each vendor would install
different technologies. In this work, we propose to use the cutting edge and commercially available Apple’s iBeacon protocol and iBeacon BLE sensors for micro-location. We propose to leverage a control theoretic approach, namely particle filtering, in order to increase the tracking accuracy in an indoor environment. We performed extensive experiments and our results show that the proposed beacon based micro-location system can be used to locate a user in an indoor environment with an error as low as 0.27 meters.