- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Advanced Neural Network Applications
- IoT and Edge/Fog Computing
- Mobile Crowdsensing and Crowdsourcing
- Energy Efficient Wireless Sensor Networks
- Human Mobility and Location-Based Analysis
- Video Surveillance and Tracking Methods
- Indoor and Outdoor Localization Technologies
- Privacy-Preserving Technologies in Data
- Advanced Image and Video Retrieval Techniques
- Peer-to-Peer Network Technologies
- Water Quality Monitoring Technologies
- CCD and CMOS Imaging Sensors
- Air Quality Monitoring and Forecasting
- Age of Information Optimization
- Visual Attention and Saliency Detection
- Advanced Data Storage Technologies
- Green IT and Sustainability
- Urban Transport and Accessibility
- Video Analysis and Summarization
- IoT Networks and Protocols
- Transportation Planning and Optimization
- Context-Aware Activity Recognition Systems
University of Missouri–Kansas City
2019-2025
University of California, Irvine
2016-2019
Irvine University
2019
Bangladesh University of Engineering and Technology
2006-2018
University High School
2018
University of California System
2017
Machfu (United States)
2016
UC Irvine Health
2016
BGC Trust University Bangladesh
2015
Daffodil International University
2014
Delay Tolerant Networking (DTN) considers how to provide communication in contexts where it is unreasonable assume end-to-end connectivity. Network devices exchange buffered messages when they come into range; may be and carried physically several times before ultimately being received. Service characteristics of a DTN depend intimately on the underlying movement through physical space; correspondingly, an assessment technology (e.g. routing protocols, message policies, etc.) depends that...
Delay Tolerant Networking (DTN) considers how to provide communication in contexts where it is unreasonable assume end-to-end connectivity. Network devices exchange buffered messages when they come into range; may be and carried physically several times before ultimately being received. Service characteristics of a DTN depend intimately on the underlying movement through physical space; correspondingly, an assessment technology (e.g. routing protocols, message policies, etc.) depends that...
We propose PhotoNet, a picture delivery service for camera sensor networks. PhotoNet is motivated by the needs of disaster-response applications, where group survivors and first responders may survey damage send images to rescue center in absence functional communication infrastructure. The protocol runs on mobile devices, handling opportunistic forwarding (when they come contact) in-network storage. It assigns priorities replacement depending degree similarity (or dissimilarity) among them,...
This paper presents a novel multicopy routing protocol for disruption-tolerant networks whose objective is to minimize energy expended on communication. The designed disaster-response applications, where power and infrastructure resources are disrupted. Unlike other delay-tolerant networks, vital resource in post disaster scenarios ensure availability of (disruption-tolerant) communication until restored. Our approach exploits naturally recurrent mobility contact patterns the network, formed...
This paper presents a novel multi-copy routing protocol for disruption-tolerant networks whose objective is to minimize energy expended on communication. The designed disaster-response applications, where power and infrastructure resources are disrupted. Unlike other delay-tolerant networks, vital resource in post-disaster scenarios ensure availability of (disruption-tolerant) communication until restored. Our approach exploits naturally recurrent mobility contact patterns the network,...
This paper develops algorithms for improved source selection in social sensing applications that exploit networks (such as Twitter, Flickr, or other mass dissemination networks) reporting. The collection point these would simply be authorized to view relevant information from participating clients (either by explicit client-side action default such on Twitter). Social networks, therefore, create unprecedented opportunities the development of applications, where humans act sensors sensor...
Modern IoT analytics are computational and data intensive. Existing mostly hosted in cloud centers, may suffer from high latency, network congestion, privacy issues. In this paper, we design, implement, evaluate a fog computing platform that runs distributed way on multiple devices, including edge servers, data-center servers. We focus the core optimization problem: making deployment decisions to maximize number of satisfied analytics. carefully formulate problem design an efficient...
In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. DTNs, nodes belong self-interested individuals. A node may be selfish expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise rewarding scheme that provides incentives physically realizable way the rewards are reflected into network operation. call it in-network realization of introduce explicit ranking depending their transit behavior, and translate...
In urban environments, mobile crowdsensing can be used to augment in-situ sensing deployments (e.g. for environmental and community monitoring) in a flexible cost-efficient manner. The additional participation provided by enables improved data collection coverage enhances timeliness of delivery. However, as the number participating devices/users increases, efficient management is required handle increased operational cost infrastructure associated cloud services - exploiting spatiotemporal...
Safe Community Awareness and Alerting Network (SCALE) is a community government/academic/industry partnership effort that aims to deploy, actuate evaluate techniques support multiple heterogeneous IoT technologies in real world communities. SCALE2, an extension of SCALE, engages multi-tier multi-network approach drive data flow from devices the cloud platforms. While are used gather data, most analytics executed cloud. Managing utilizing these networks, big challenge calls for integrated...
In this paper, we propose a novel approach towards parametrically controlled artificial terrain generation. Our proposed method focuses on generation of terrains having mountains prespecified height and spread base region peak nearly at location. Means performing advanced tuning the to produce unusual artifacts is also demonstrated how our algorithm performs better in comparison with well known algorithms when used solve same problem observed.
Human mobility is considered as one of the prominent non-pharmaceutical interventions to control spread pandemic (positive effect from infection). Conversely, triggered massive changes people's daily schedules by limiting their movement (negative infection mobility). The purpose this study investigate bi-directional relationship between human and COVID-19 across U.S. counties during early phase when rates were stabilizing activity-travel behavior reflected a fairly steady return normal...
Named data networking has emerged as a new architectural paradigm that replaces host-based addressing in today's networks with content-centric addressing. Rather than assigning IP addresses to hosts, it assigns names objects and supports hierarchical name spaces. This paper explores the benefits of naming for design information-maximizing caching policies ad hoc networks. It is shown approach allows development simultaneously offer (i) better quality information (in terms coverage), (ii)...
We demonstrate a managed edge computing platform for Internet-of-Things (IoT) devices, which supports dynamic deployment of virtualized containers running distributed analytics. build model city, and install multiple Raspberry Pis as minions, mini PC the master. Through web dashboard on master, we show how users can remotely monitor, manage, upgrade IoT analytics devices. Multiple concrete analytics, namely: (i) air quality (ii) sound classifier, (iii) image recognizer are demonstrated....
While networked systems hold and generate vast amounts of configuration operational data, this data is not accessible through a simple, uniform mechanism. Rather, it must be gathered using range different protocols interfaces. Our vision to make all available in simple format realtime search process which runs within the network aggregates into form needed by applications - concept we call search. We believe that such an approach, though challenging, technically feasible will enable rapid...
Nearly all of today's Big Data systems are passive in nature. We demonstrate our Active ("BAD") system, a scalable system that continuously and reliably captures facilitates the timely automatic delivery new information to large population interested users as well supporting analyses historical information. built BAD project by extending an existing scalable, open-source BDMS (AsterixDB [1]) this active direction. In demonstration, we allow audience participate emergency notification...
Underwater acoustic networks hold the promise to support a wide variety of applications; however, many desirable network services still remain unavailable application designers. One such service is on-line node localization, which useful both routing algorithms as well number sensing applications. The main contribution this work range-based low-overhead localization technique, LOTUS, for underwater sensor networks. Unlike earlier 3D techniques that required distance estimates from at least...