PhD Projects

Last updated on • Dec 19, 2016

  1. SocialTrove
    Funded by U.S. Army Research Laboratory and NSF, SocialTrove is a scalable and distributed summarization service for streams of high dimensional social content. SocialTrove provides API to hierarchically organize incoming data in a streaming fashion, based on application provided similarity measurement, and query it for matching objects at different granularities. Built on top of Apache Spark, HDFS, and Memcache, the system achieves high throughput and low latency.

    Collaborative research with Prof. Indranil Gupta (UIUC), Mudhakar Srivatsa, and Raghu Ganti (IBM Research), resulted in a peer-reviewed conference paper in ICAC 2015, and received a Best Paper Award.
  2. Apollo Social Sensing Toolkit
    Funded by U.S. Army Research Laboratory, in collaboration wtih 16 other universities and industry research organizations under Network Science Collaborative Technology Alliance (NS CTA), Apollo is a novel social sensing platform for tracking current events and distilling high value content from large amounts of noisy social media content. Apollo has a codebase of around 50K lines of code, and I lead a team of more than 10 graduate student researchers working on it. Apollo has been mentioned in the National Academies Press as an example of cross-genre research, and seleced as a Golden Nugget of ARL Network Science Collaborative Technology Alliance.
  3. Polarity Meter
    Funded by U.S. Army Research Laboratory, Polarity Meter uncovers possible bias and polarity groups from microblog entries related to conflict, dispute, or situations involving multiple parties with contrasting interest. This work introduces and validates a model for polarized information network, proposes algorithms to separate groups, and integrates in a fact-finder paradigm to improve quality of information.

    Collaborative research with Charu Aggarwal (IBM Research), Lance Kaplan (ARL), Boleslaw Szymanski (RPI), and resulted in peer-reviewed conference publications in INFOCOM 2017, DCoSS 2014, and SPIE 2014.
  4. Humans as Sensors
    Funded by U.S. Army Research Laboratory, considers the latent influence network among people, and introduces a maximum likelihood framework to find reliable information from unreliable human sources. We developed batch and streaming algorithms to derive information credibility from large amount of socially sensed microblog entries. Collaborative research with Dong Wang (Notre Dame), Lance Kaplan (ARL), Jiawei Han (UIUC), Sibel Adali (RPI), Aylin Yener (PSU), and resulted in a peer-reviewed journal publication in J-STSP 2014, and many peer-reviewed conference publications in IPSN 2014, IPSN 2015, IPSN 2016, FUSION 2014, INSS 2012.
  5. InfoMax
    Funded by NSF in collaboration with 10 other universities under Named Data Networking (NDN) project, InfoMax is a transport-layer data dissemination protocol, using the recently proposed NDN stack that makes networks aware of hierarchical data names, as opposed to IP addresses. Assuming that named objects with longer prefixes are semantically more similar, InfoMax has the property of minimizing semantic redundancy among delivered data items, hence offering the best coverage of the requested topic with the fewest bytes. Resulted in a peer-reviewed conference paper in ICCCN 2015.
  6. eNav: Energy Efficient Vehicular Navigation
    eNav is a smartphone-based energy-efficient vehicular navigation system. Using the phone's on-board sensors (accelerometer, gyroscope, etc) eNav provides low-power reliable real-time road navigation services, minimizes the need for GPS localization, and results in significant battery savings. Collaborative reseach with Suman Nath (Microsoft Research), resulted in a Best Poster in IPSN 2014, and a peer-reviewed conference paper in UbiComp 2015.
  7. Event Threads
    Funded by U.S. Army Research Laboratory, Event Threads is a event detection, localization, and tracking library that demonstrates the utility of exploiting signal processing techniques to reconstruct aspects of the state of the physical world from social network feeds. Resulted in a peer-reviewed conference paper in SPIE 2016, and a book-chapter in Elsevier.
  8. Anomaly Detector
    Funded by U.S. Army Research Laboratory, Anomaly Detector fuses social signals with physical sensors to detect and explain anomalous events in the physical world based on social network feeds. Resulted in a peer-reviewed conference paper in IQ2S 2014 and a peer-reviewed journal paper in Elsevier PMC 2016.
  9. PhotoNet+
    This project develops a new prioritization technique to addresses the problem of collection and delivery of a representative subset of pictures, in participatory camera networks, to maximize coverage when a significant portion of the pictures may be redundant or irrelevant. The contribution of this project lies in a new prioritization technique (and its in-network implementation) that minimizes redundancy among delivered pictures, while also reducing outliers. PhotoNet+ is a collaborative research with Yusuf Sarwar Uddin, and resulted in peer-reviewed demonstration abstract in IPSN 2012.
  10. Speeding Up the Web
    User engagement in consumer Internet today mostly deals with web applications. These applications typically result in a traffic pattern consisting of mostly short flows, flows that have less than 400 packets to send. As the latest Internet applications like Software as a Service, Computing as a Service, and others become more and more ubiquitous, total Internet traffic will be more skewed towards short flows. But, congestion control algorithms like TCP and XCP are particularly not suited to short flows, and RCP has still room for improvement in this domain. In this project, we have at first done an analysis of the flow completion time under ideal processor sharing model. Our findings suggest that the best way to improve the performance of the tiny flows that have very small number of packets to send is either improving the round trip delay or devising some protocol that does not wait for SYN-ACK and starts sending data immediately. However, we can improve the flows for which data transmission time is comparable to the RTT. Based on our findings, we have proposed a prioritized congestion control scheme that particularly improves user experience in the Internet by prioritizing these specific type of short flows. We have simulated our protocol using ns-2 using both core-router and edge-router traffic models. Simulation results show faster completion time for short flows and improved total completion times for all flows, confirming the effectiveness of this idea. Collaborative project with Prof. Brighten Godfrey.

Masters Projects

Last updated on • Dec 03, 2012

  1. Sybil-Resistant P2P Networks
    We exploit properties of human social networks to improve sybil resilience in the Distributed Hash Tables. Random walks are used to identify members of a social cluster in a distributed manner. Each cluster elects a leader, which bootstraps a DHT with logarithmic table size for that cluster. We incorporate an admission control mechanism, which classifies nodes based on the attachment of a node to a social cluster. As the number of attack edges between Sybil nodes and an “honest community” is low, sybil nodes are effectively prevented from joining the DHT and subverting the routing procedure. As there is a different DHT for each social cluster, the routing is locality-preserving, resulting in an “organic routing” through socially trusted nodes. On the other hand, leaders of each cluster will communicate to one another, and they will form a multicast group to co-ordinate in inter-cluster routing and key-space distribution. Other solutions either increase the finger table size significantly or increase number of routing hops to provide Sybil-resilience; our proposed scheme successfully keeps both of these crucial performance parameters in control. Simulation results follow the theoretical findings and show improvement over the existing protocols.
  2. DoS Attack by Channel Jamming in Wireless Networks
    Due to the inherent broadcasting nature, wireless networks are vulnerable to several kinds of security attacks like overhearing, malicious association, denial of service and so on. In this project, we have discussed an important security problem, which we call jamming. Here, intruders try to compromise network operations by strategically placing nodes physically interfering with the wireless channel. The problem has some similarity with coverage problems in wireless sensor networks, though it is actually the inverse. Theoretically the problem is NP-Hard. Using some results of Euclidean geometry and graph theory, we have achieved some bounds on how easy it may be for an intruder to launch a DoS attack or a sniffer to overhear all the communication going on with minimum power budget. Using our results, we have developed a heuristic algorithm to jam a wireless network with minimum number of nodes. We also have given directions on how to better place the wireless nodes to make it harder to jam completely.

Undergraduate Projects

Last updated on • Sep 23, 2010

Here is a short description of the software and hardware projects I have done during my B.Sc.

  1. Broadcasting in Wireless Ad Hoc Networks
    The primary performance objective of most of the broadcast schemes in an ad-hoc wireless network is to minimize the total number of packet forwarding while maintain maximum reachability. To achieve this objective, most broadcasting schemes start with flooding and attempt to reduce its extent with the assistance of some greedy heuristics. In this paper we show that, using these greedy heuristics results in a biased load distribution throughout the network. Some nodes become heavily loaded and consequently packets through those nodes, whether unicast or broadcast, experience significantly larger delay. As total necessary packet forwards are not distributed evenly, contention and collision also increase at some regions, while remain relatively less at other regions. As a result the highly loaded nodes also experience low battery life. Thus the resources are not utilized properly. While unicast communication has been studied in this context, little has been done to improve the load balancing of broadcast communication. We address this issue, and propose various methods to evenly distribute the load caused by broadcast packets. Our algorithms take various reactive measures to dynamically include less loaded nodes in the forward list, while maintaining the total number of packet forwards low. Detailed simulation shows fair scheduling of resources and significant improvement in distribution of load, latency and overall performance. Resulted in a peer-reviewed conference paper in IEEE ICC 2009 and a bachelor's thesis.
  2. WSNSurv: Wireless Sensor Network based Surveillance System
    WSNSurv is an intelligent surveillance system based on sensor networks. Several wireless sensors are scattered throughout an area each of which are registered to one or more base stations. Here, we used infrared LED to detect intrusions. When a security breach occurs at any sensor, the base station is notified through wireless channel, and the mounted camera on the base station, rotates and focuses to the suspected point, records the situation and streams the video to a control station. Visit The exact position of each sensor and the camera controller unit can be calibrated by user using either a web interface or desktop software. Strength of the system is that: the motes, the sensor units and the camera driver, everything is engineered from the scratch, using inexpensive and easily available components. Hence it yields in a low cost surveillance solution. http://sites.google.com/site/wsnsurv for details.
  3. Reducing Noise from Natural Images using Algebraic Methods
    Obtaining a clear and lucid image by reducing the noise to a minimal level is one of the most fundamental research topics in image processing. Necessity for reducing noise is not only for aesthetic purposes, but also due to its vital role in the success of image processing and image understanding algorithms. As there is no way for total elimination, several methods have been developed, depending on the type of noise. In this paper, we devise a method for reducing impulsive noise and study its noise detection and image restoration performance. A sweeping window of certain dimension calculates how well a plane can be fitted over the pixels currently inside the window and then examines each pixel according to some rules whether it is part of noise or part of signal. Final decision about each pixel is taken by counting the majority verdicts about it. Fitting a general paraboloid equation only through the uncorrupted pixels in each window and taking the mean of all suggested values find values of the corrupted pixels. The method can be applied to a vast area of real world applications like digital photography, medical imaging, computer vision and so on. Simulation reveals that on average, our method has success rate of nearly 97% in case of low noise density and nearly 93% in case of medium noise density. Resulted in a peer-reviewed conference paper in ICCIT 2006.
  4. Internet TV
    Transmitting TV programs over the Internet have always been a great issue in multimedia service. With the advent of broadband internet connectivity, real time video and audio delivery on the Internet is getting popular day by day. Although the industry is making great and highly publicized plans for future (inter) national video on demand, there is lack of robust, scalable and interoperable architecture for Internet television system. In this paper we present such architecture. TV Program Servers, which are capable of capturing and transmitting media, registers with the Broker Server. The Internet TV Clients query the Broker Server, which maintains a list of available program servers and a complex data structure about the clients already connected. The architecture can be implemented over the existing network and no special expensive hardware setup is required. The application of the service-oriented paradigm makes the registration, composition and discovery of services efficient, and hence the system is perfectly suitable for medium to large scale Internet Television. The system was published in ICCIT 2005.
  5. Survey on Multi-core Processors and Programming Environments
    Sustaining development and advancement in electronics and fabrication techniques has caused the devices to shrink in size and become smaller, paving the quest for increasing density and clock speed. That quest has suddenly come to a halt due to fundamental bounds applied by physical laws. The microprocessor industry has now started exploring the technology along a different dimension: increasing the number of independent processor cores packed in a single package. Such processors, commonly known as multi-core processors has gained much attention from the academia and the industry, and even embedded devices today contain them. In this survey, we explore state of the art technologies for multi-core processors, existing software tools to support parallelism and trend of present and future research in this field, we conclude that next few decades are going to be marked by this “Ubiquitous parallel processing”.
  6. LAN TV
    With LAN TV, one can easily capture television programs with TV/Capture card and transmit them over ordinary LAN, both in real time. Client Server authentication and other hassles related to new connection, user, server, media, device are managed by LAN TV. The system runs on J2SE platform. Java Media Framework (JMF) was used as API. Client source code (java, zip) | Server source code (java, zip)
  7. 4 bit Pipelined Computer
    Detailed design of a 4 bit computer and its full simulation is done in this project. The computer includes 28 instructions, has two pipelines and can execute recursive programs. Average CPI (Clock Per Instruction) is 1.4 where maximum CPI is 2. Simulation was done with Verilog and Circuit Maker. A separate ALU unit and a Multiplier unit (Modified Booth Multiplier) was designed and implemented with LSI chips as part of the project. Block Diagram | Full circuit diagram | Download project report | Assembler for the 4 bit computer (C++) | Simulation files (Circuit Maker)
  8. Pen Fight Championship - 3D Game
    3D implementation of famous Pen Fight game which is generally played by elementary and high school students on their desk with their pens. The game starts in a class room scenario, where two students play by turn on a desk. Day and night lighting, shading and material textures are enabled in the models. Motion of the pen and collision detection is also modeled. Open GL is used as API and the development tool is Visual C++.

    Download source here (Win32)

  9. Encryption using Inverse Huffman Tree
    Worked with Dr. M. Kaykobad (Professor, Dept. of CSE, BUET) on Information Theory. The research was based on an analysis of hardness of some special cases of Inverse Huffman Tree problem. We also worked on a new data encryption approach based on Huffman Tree.
  10. NMS - Newspaper Management System
    NMS is an enterprise solution for newspaper and publication systems. Being distributed in nature, NMS supports automated functionalities for different types of users like admin, reporter, advertisement booth, registered authors and end users related to the publication system. Oracle is used as back-end RDBMS. ASP.NET is used at the server end. Download Presentation on NMS | Full project source | Some Screen-shots here
  11. Tiny Digital Oscilloscope
    Off the shelf component made Digital Oscilloscope. It is interfaced to PC via printer port and displays continuous wave. Supports frequency upto 500Hz. Download project report. View Screenshot
  12. Implementation of OSI Layers
    This is an implementation of Physical Layer, Data link Layer and Network layer of OSI based protocol stack. Both a simulated physical layer and a real one developed using low cost FM radio transmitter receiver modules was used. Data link layer and Network layer was developed using Java.
  13. Multi-Peg Tower of Hanoi Simulation
    A Java based visual simulation for Multi-Peg Tower of Hanoi problem, using the presumed optimal strategy. Available for download from here. Source code available on request.
    Multi-Peg Tower of Hanoi is a extension of famous Tower of Hanoi problem. For a discussion and possible solution refer to the paper by kaykobad et. al.
  14. Bangali
    A phonetic parser for Bangla language, which renders English alphabet based transliterated Bangla language words to their original representation with Bangla alphabet. Download Bangali (Win32 Version)
  15. Freight Forwarding Company Automation System
    This is an information system automation project for a Freight forwarding company (Solidan Marines Ltd). The proposed system supports their Sales, Human Resource, Operations and Accounting Management. Microsoft SQL Server is used as RDBMS. Server end uses Linq (Language Integrated Query) with ASP.NET. System Analysis Presentations (ppt) zipped | Project Report (pdf) | Implementation Source Code

Student Projects

Last updated on • Dec 12, 2010

I advised my students on various projects. Here are some interesting examples.

  1. Quadrotor
  2. Scout Robot
  3. Intelligent Traffic System
  4. Research Networking
  5. Scout Robot
  6. Rating Site
  7. Fantasy Football