(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–8 of 8 results for author: Attar, M

.
  1. arXiv:2312.00658  [pdf, ps, other

    eess.SY

    A Data-Driven Safety Preserving Control Architecture for Constrained Cyber-Physical Systems

    Authors: Mehran Attar, Walter Lucia

    Abstract: In this paper, we propose a data-driven networked control architecture for unknown and constrained cyber-physical systems capable of detecting networked false-data-injection attacks and ensuring plant's safety. In particular, on the controller's side, we design a novel robust anomaly detector that can discover the presence of network attacks using a data-driven outer approximation of the expected… ▽ More

    Submitted 21 February, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

    Comments: Preprint submitted to the International Journal of Robust and Nonlinear Control

  2. arXiv:2303.04749  [pdf, ps, other

    eess.SY

    Data-Driven Robust Backward Reachable Sets for Set-Theoretic Model Predictive Control

    Authors: Mehran Attar, Walter Lucia

    Abstract: In this paper, we propose a novel approach for computing robust backward reachable sets from noisy data for unknown constrained linear systems subject to bounded disturbances. In particular, we develop an algorithm for obtaining zonotopic inner approximations that can be used for control purposes. It is shown that such sets, if built on an extended space including states and inputs, can be used to… ▽ More

    Submitted 20 December, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: Preprint jointly submitted to IEEE Control Systems Letters (L-CSS) and IEEE Conference on Decision and Control (CDC)

  3. arXiv:2207.05461  [pdf, other

    eess.SP stat.ML

    Parallel APSM for Fast and Adaptive Digital SIC in Full-Duplex Transceivers with Nonlinearity

    Authors: M. Hossein Attar, Omid Taghizadeh, Kaxin Chang, Ramez Askar, Matthias Mehlhose, Slawomir Stanczak

    Abstract: This paper presents a kernel-based adaptive filter that is applied for the digital domain self-interference cancellation (SIC) in a transceiver operating in full-duplex (FD) mode. In FD, the benefit of simultaneous transmission and receiving of signals comes at the price of strong self-interference (SI). In this work, we are primarily interested in suppressing the SI using an adaptive filter namel… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  4. arXiv:2203.10419  [pdf, ps, other

    math.AT

    NonExistence of Manifold structure on topological constructions

    Authors: Mohammad Al Attar

    Abstract: We show the non existence of manifold structure on certain topological constructions. The main results of this paper are: (1) The wedge of manifold with itself is not a manifold. (2) The cone of a manifold is not a manifold. The main tools for the main result is homological algebra and algebraic topology.

    Submitted 19 March, 2022; originally announced March 2022.

  5. arXiv:1905.07727  [pdf

    cs.LG cs.AI

    Reinforcement Learning for Learning of Dynamical Systems in Uncertain Environment: a Tutorial

    Authors: Mehran Attar, Mohammadreza Dabirian

    Abstract: In this paper, a review of model-free reinforcement learning for learning of dynamical systems in uncertain environments has discussed. For this purpose, the Markov Decision Process (MDP) will be reviewed. Furthermore, some learning algorithms such as Temporal Difference (TD) learning, Q-Learning, and Approximate Q-learning as model-free algorithms which constitute the main part of this article ha… ▽ More

    Submitted 19 May, 2019; originally announced May 2019.

  6. arXiv:1501.00923  [pdf

    cs.IT cs.NI

    Sharing Channel In IEEE 802.16 Using The Cooperative Model Of Slotted ALOHA

    Authors: Abdellah Zaaloul, Mohamed Ben El Aattar, Mohamed Hanini, Abdelkrim Haqiq, Mohammed Boulmalaf

    Abstract: One of the main problems in WIMAX is to share the medium by multiple users who compete for access. Various random access mechanisms, such as ALOHA and its corresponding variations have been widely studied as efficient methods to coordinate the medium access among competing users. In this paper the slotted ALOHA protocol is implemented as a two-state system. Using Markov Models, we evaluate the cha… ▽ More

    Submitted 5 January, 2015; originally announced January 2015.

    Comments: 5 pages, 4 figures in International Journal of Computer & Organization Trends 2013

    MSC Class: 60J20 ACM Class: I.6.0

  7. arXiv:1005.0595  [pdf

    cs.SE

    Software Design Document, Testing, and Deployment and Configuration Management of the UUIS - a Team 1 COMP5541-W10 Project Approach

    Authors: Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan

    Abstract: The document presents a detailed description of the designs for the implementation of the Unified University Inventory System for the Imaginary University of Arctica. The document, through numerous diagrams and UI samples, gives the structure of the system and the functions of its modules. It also gives test cases and reports that support the system's architecture and design.

    Submitted 4 May, 2010; originally announced May 2010.

    Comments: The document has 67 figures and 24 tables in about 136 pages, including the test documents and configuration details as supplements

    ACM Class: D.2; K.6; H.5.2

  8. arXiv:1005.0330  [pdf, other

    cs.SE

    Software Requirements Specification of the IUfA's UUIS -- a Team 1 COMP5541-W10 Project Approach

    Authors: Abirami Sankaran, Andriy Samsonyuk, Maab Attar, Mohammad Parham, Olena Zayikina, Omar Jandali Rifai, Pavel Lepin, Rana Hassan

    Abstract: Unified University Inventory System (UUIS), is an inventory system created for the Imaginary University of Arctica (IUfA) to facilitate its inventory management, of all the faculties in one system. Team 1 elucidates the functions of the system and the characteristics of the users who have access to these functions. It shows the access restrictions to different functionalities of the system provide… ▽ More

    Submitted 3 May, 2010; originally announced May 2010.

    Comments: The 75 page-document has 16 figures, some of which show the link between users and their functions, and more than 30 use cases described.

    ACM Class: D.2; K.6; H.5.2