scispace - formally typeset
Search or ask a question
Author

Mansaf Alam

Bio: Mansaf Alam is an academic researcher from Jamia Millia Islamia. The author has contributed to research in topics: Cloud computing & Big data. The author has an hindex of 18, co-authored 109 publications receiving 1001 citations. Previous affiliations of Mansaf Alam include Amity University & University of South Alabama.


Papers
More filters
Journal ArticleDOI
TL;DR: This research paper investigates the current trends and identifies the existing challenges in development of a big scholarly data platform, with specific focus on directions for future research and maps them to the different phases of the big data lifecycle.
Abstract: Survey of big scholarly data with respect to the different phases of the big data lifecycle.Identifies the different big data tools and technologies that can be used for development of scholarly applications.Investigates research challenges and limitations specific to big scholarly data and its applications.Provides research directions and paves way towards the development of a generic and comprehensive big scholarly data platform. Recently, there has been a shifting focus of organizations and governments towards digitization of academic and technical documents, adding a new facet to the concept of digital libraries. The volume, variety and velocity of this generated data, satisfies the big data definition, as a result of which, this scholarly reserve is popularly referred to as big scholarly data. In order to facilitate data analytics for big scholarly data, architectures and services for the same need to be developed. The evolving nature of research problems has made them essentially interdisciplinary. As a result, there is a growing demand for scholarly applications like collaborator discovery, expert finding and research recommendation systems, in addition to several others. This research paper investigates the current trends and identifies the existing challenges in development of a big scholarly data platform, with specific focus on directions for future research and maps them to the different phases of the big data lifecycle.

104 citations

Journal ArticleDOI
TL;DR: In this article, a behavioral biometric signature-based authentication mechanism is proposed to ensure the security of e-medical data access in cloud-based healthcare management system, which achieves high accuracy rate for secure data access and retrieval.

63 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed a Lightweight Deep Learning Model for Human Activity Recognition (HAR) requiring less computational power, making it suitable to be deployed on edge devices.

58 citations

Posted Content
TL;DR: A Lightweight Deep Learning Model for HAR requiring less computational power, making it suitable to be deployed on edge devices is proposed and results show that the proposed model outperforms many of the existing machine learning and deep learning techniques.
Abstract: Human Activity Recognition (HAR) using wearable and mobile sensors has gained momentum in last few years, in various fields, such as, healthcare, surveillance, education, entertainment. Nowadays, Edge Computing has emerged to reduce communication latency and network traffic.Edge devices are resource constrained devices and cannot support high computation. In literature, various models have been developed for HAR. In recent years, deep learning algorithms have shown high performance in HAR, but these algorithms require lot of computation making them inefficient to be deployed on edge devices. This paper, proposes a Lightweight Deep Learning Model for HAR requiring less computational power, making it suitable to be deployed on edge devices. The performance of proposed model is tested on the participants six daily activities data. Results show that the proposed model outperforms many of the existing machine learning and deep learning techniques.

52 citations

Book ChapterDOI
TL;DR: The existing research, challenges, open issues, and future research direction for cloud-based analytics are explored, with a view to practical applications of this synergistic model can be popularly used.
Abstract: The advent of the digital age has led to a rise in different types of data with every passing day. In fact, it is expected that half of the total data will be on the cloud by 2016. This data is complex and needs to be stored, processed, and analyzed for information that can be used by organizations. Cloud computing provides an apt platform for big data analytics in view of the storage and computing requirements of the latter. This makes cloud-based analytics a viable research field. However, several issues need to be addressed and risks need to be mitigated before practical applications of this synergistic model can be popularly used. This paper explores the existing research, challenges, open issues, and future research direction for this field of study.

46 citations


Cited by
More filters
01 Feb 2009

911 citations

Book
01 Jan 2006
TL;DR: The author discusses the history and present situation of operating systems, as well as some of the techniques used to design and implement these systems.
Abstract: Table of Contents CHAPTER 1 INTRODUCTION 1.1 WHAT IS AN OPERATING SYSTEM? 1.2 HISTORY OF OPERATING SYSTEMS 1.3 OPERATING SYSTEM CONCEPTS 1.4 SYSTEM CALLS 1.5 OPERATING SYSTEM STRUCTURE 1.6 OUTLINE OF THE REST OF THIS BOOK 1.7 SUMMARY CHAPTER 2 PROCESSES 2.1 INTRODUCTION TO PROCESSES 2.2 INTERPROCESS COMMUNICATION 2.3 CLASSICAL IPC PROBLEMS 2.4 SCHEDULING 2.5 OVERVIEW OF PROCESSES IN MINIX 3 2.6 IMPLEMENTATION OF PROCESSES IN MINIX 3 2.7 THE SYSTEM TASK IN MINIX 3 2.8 THE CLOCK TASK IN MINIX 3 2.9 SUMMARY CHAPTER 3 INPUT/OUTPUT 3.1 PRINCIPLES OF I/O HARDWARE 3.2 PRINCIPLES OF I/O SOFTWARE 3.3 DEADLOCKS 3.4 OVERVIEW OF I/O IN MINIX 3 3.5 BLOCK DEVICES IN MINIX 3 3.6 RAM DISKS 3.7 DISKS 3.8 TERMINALS 3.9 SUMMARY CHAPTER 4 MEMORY MANAGEMENT 4.1 BASIC MEMORY MANAGEMENT 4.2 SWAPPING 4.3 VIRTUAL MEMORY 4.4 PAGE REPLACEMENT ALGORITHMS 4.5 DESIGN ISSUES FOR PAGING SYSTEMS 4.6 SEGMENTATION 4.7 OVERVIEW OF THE MINIX 3 PROCESS MANAGER 4.8 IMPLEMENTATION OF THE MINIX 3 PROCESS MANAGER 4.9 SUMMARY CHAPTER 5 FILE SYSTEMS 5.1 FILES 5.2 DIRECTORIES 5.3 FILE SYSTEM IMPLEMENTATION 5.4 SECURITY 5.5 PROTECTION MECHANISMS 5.6 OVERVIEW OF THE MINIX 3 FILE SYSTEM 5.7 IMPLEMENTATION OF THE MINIX 3 FILE SYSTEM 5.8 SUMMARY CHAPTER 6 READING LIST AND BIBLIOGRAPHY 6.1 SUGGESTIONS FOR FURTHER READING 6.2 ALPHABETICAL BIBLIOGRAPHY APPENDIX A - INSTALLING MINIX 3 APPENDIX B - MINIX 3 SOURCE CODE LISTING APPENDIX C - INDEX TO FILES INDEX

572 citations

Book
01 Jan 1985
TL;DR: This work focuses on the application of Fuzzy and Artificial Intelligence Methods in the Building of a Blast Furnace Smelting Process Model and the development of Performance Adaptive FuzzY Controllers with Application to Continuous Casting Plants.
Abstract: Preface. Automatic Train Operation System by Predictive Fuzzy Control (S. Yasunobu, S. Miyamoto). Application of Fuzzy Reasoning to the Water Purification Process (O. Yagashita, O. Itoh, M. Sugeno). The Application of a Fuzzy Controller to the Control of a Multi-Degree-of-Freedom Robot Arm (E.M. Scharf, N.J. Mandic). Optimizing Control of a Diesel Engine (Y. Murayama et al.). Development of Performance Adaptive Fuzzy Controllers with Application to Continuous Casting Plants (G. Bartolini et al.). A Fuzzy Logic Controller for Aircraft Flight Control (L.I. Larkin). Automobile Speed Control System Using a Fuzzy Logic Controller (S. Murakami, M. Maeda). An Experimental Study on Fuzzy Parking Control Using a Model Car (M. Sugeno, K. Murakami). A Fuzzy Controller in Turning Process Automation (Y. Sakai, K. Ohkusa). Design of Fuzzy Control Algorithms with the Aid of Fuzzy Models (W. Pedrycz). Human Operator's Fuzzy Model in Man-Machine System with a Nonlinear Controlled Object (K. Matsushima, H. Sugiyama). The Influence of Some Parameters on the Accuracy of a Fuzzy Model (J.B. Kiszka, M.E. Kochanska, D.S. Sliwinska). A Microprocessor Based Fuzzy Controller for Industrial Purposes (T. Yamazaki, M. Sugeno). The Application of Fuzzy and Artificial Intelligence Methods in the Building of a Blast Furnace Smelting Process Model (H. Zhao, M. Ma). An Annotated Bibliography of Fuzzy Control (R.M. Tong).

439 citations

Journal ArticleDOI
TL;DR: A comparative picture of 12 of the most commonly used ASEBDs is provided by counting query hit data as an indicator of the number of accessible records and indicates that Google Scholar’s size might have been underestimated so far by more than 50%.
Abstract: Information on the size of academic search engines and bibliographic databases (ASEBDs) is often outdated or entirely unavailable. Hence, it is difficult to assess the scope of specific databases, such as Google Scholar. While scientometric studies have estimated ASEBD sizes before, the methods employed were able to compare only a few databases. Consequently, there is no up-to-date comparative information on the sizes of popular ASEBDs. This study aims to fill this blind spot by providing a comparative picture of 12 of the most commonly used ASEBDs. In doing so, we build on and refine previous scientometric research by counting query hit data as an indicator of the number of accessible records. Iterative query optimization makes it possible to identify a maximum number of hits for most ASEBDs. The results were validated in terms of their capacity to assess database size by comparing them with official information on database sizes or previous scientometric studies. The queries used here are replicable, so size information can be updated quickly. The findings provide first-time size estimates of ProQuest and EbscoHost and indicate that Google Scholar’s size might have been underestimated so far by more than 50%. By our estimation Google Scholar, with 389 million records, is currently the most comprehensive academic search engine.

358 citations

Journal ArticleDOI
TL;DR: The results show that the proposed model has higher robustness and better activity detection capability than some of the reported results, and can not only adaptively extract activity features, but also has fewer parameters and higher accuracy.
Abstract: In the past years, traditional pattern recognition methods have made great progress. However, these methods rely heavily on manual feature extraction, which may hinder the generalization model performance. With the increasing popularity and success of deep learning methods, using these techniques to recognize human actions in mobile and wearable computing scenarios has attracted widespread attention. In this paper, a deep neural network that combines convolutional layers with long short-term memory (LSTM) was proposed. This model could extract activity features automatically and classify them with a few model parameters. LSTM is a variant of the recurrent neural network (RNN), which is more suitable for processing temporal sequences. In the proposed architecture, the raw data collected by mobile sensors was fed into a two-layer LSTM followed by convolutional layers. In addition, a global average pooling layer (GAP) was applied to replace the fully connected layer after convolution for reducing model parameters. Moreover, a batch normalization layer (BN) was added after the GAP layer to speed up the convergence, and obvious results were achieved. The model performance was evaluated on three public datasets (UCI, WISDM, and OPPORTUNITY). Finally, the overall accuracy of the model in the UCI-HAR dataset is 95.78%, in the WISDM dataset is 95.85%, and in the OPPORTUNITY dataset is 92.63%. The results show that the proposed model has higher robustness and better activity detection capability than some of the reported results. It can not only adaptively extract activity features, but also has fewer parameters and higher accuracy.

325 citations