(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–50 of 62 results for author: Ahmed, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.08508  [pdf

    cs.CV eess.SP physics.med-ph

    Identifying Human Indoor Daily Life Behavior employing Thermal Sensor Arrays (TSAs)

    Authors: Dina E. Abdelaleem, Hassan M. Ahmed, M. Sami Soliman, Tarek M. Said

    Abstract: Daily activity monitoring systems used in households provide vital information for health status, particularly with aging residents. Multiple approaches have been introduced to achieve such goals, typically obtrusive and non-obtrusive. Amongst the obtrusive approaches are the wearable devices, and among the non-obtrusive approaches are the movement detection systems, including motion sensors and t… ▽ More

    Submitted 12 September, 2024; originally announced September 2024.

  2. arXiv:2408.12323  [pdf, other

    eess.IV cs.CV

    EUIS-Net: A Convolutional Neural Network for Efficient Ultrasound Image Segmentation

    Authors: Shahzaib Iqbal, Hasnat Ahmed, Muhammad Sharif, Madiha Hena, Tariq M. Khan, Imran Razzak

    Abstract: Segmenting ultrasound images is critical for various medical applications, but it offers significant challenges due to ultrasound images' inherent noise and unpredictability. To address these challenges, we proposed EUIS-Net, a CNN network designed to segment ultrasound images efficiently and precisely. The proposed EUIS-Net utilises four encoder-decoder blocks, resulting in a notable decrease in… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

  3. arXiv:2407.21231  [pdf, other

    cs.LG cs.PF

    Towards an Integrated Performance Framework for Fire Science and Management Workflows

    Authors: H. Ahmed, R. Shende, I. Perez, D. Crawl, S. Purawat, I. Altintas

    Abstract: Reliable performance metrics are necessary prerequisites to building large-scale end-to-end integrated workflows for collaborative scientific research, particularly within context of use-inspired decision making platforms with many concurrent users and when computing real-time and urgent results using large data. This work is a building block for the National Data Platform, which leverages multipl… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

  4. arXiv:2405.08252  [pdf, other

    cs.LG cs.AI

    Smart Sampling: Self-Attention and Bootstrapping for Improved Ensembled Q-Learning

    Authors: Muhammad Junaid Khan, Syed Hammad Ahmed, Gita Sukthankar

    Abstract: We present a novel method aimed at enhancing the sample efficiency of ensemble Q learning. Our proposed approach integrates multi-head self-attention into the ensembled Q networks while bootstrapping the state-action pairs ingested by the ensemble. This not only results in performance improvements over the original REDQ (Chen et al. 2021) and its variant DroQ (Hi-raoka et al. 2022), thereby enhanc… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: FLAIRS-37 (2024)

  5. arXiv:2405.06128  [pdf, other

    cs.CV

    Enhanced Multimodal Content Moderation of Children's Videos using Audiovisual Fusion

    Authors: Syed Hammad Ahmed, Muhammad Junaid Khan, Gita Sukthankar

    Abstract: Due to the rise in video content creation targeted towards children, there is a need for robust content moderation schemes for video hosting platforms. A video that is visually benign may include audio content that is inappropriate for young children while being impossible to detect with a unimodal content moderation system. Popular video hosting platforms for children such as YouTube Kids still p… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: 8 pages, 3 figures, Accepted at The 37th International FLAIRS Conference

  6. arXiv:2403.10412  [pdf, other

    cs.IT eess.SP

    RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey

    Authors: Majid H. Khoshafa, Omar Maraqa, Jules M. Moualeu, Sylvester Aboagye, Telex M. N. Ngatched, Mohamed H. Ahmed, Yasser Gadallah, Marco Di Renzo

    Abstract: Physical layer security (PLS) has received a growing interest from the research community for its ability to safeguard data confidentiality without relying on key distribution or encryption/decryption. However, the evolution towards the 5G technology and beyond poses new security challenges that must be addressed in order to fulfill the unprecedented performance requirements of future wireless net… ▽ More

    Submitted 26 July, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  7. arXiv:2403.10173  [pdf, other

    cs.CV cs.AI

    A Hybrid SNN-ANN Network for Event-based Object Detection with Spatial and Temporal Attention

    Authors: Soikat Hasan Ahmed, Jan Finkbeiner, Emre Neftci

    Abstract: Event cameras offer high temporal resolution and dynamic range with minimal motion blur, making them promising for object detection tasks. While Spiking Neural Networks (SNNs) are a natural match for event-based sensory data and enable ultra-energy efficient and low latency inference on neuromorphic hardware, Artificial Neural Networks (ANNs) tend to display more stable training dynamics and faste… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  8. Adaptive Prognostic Malfunction Based Processor for Autonomous Landing Guidance Assistance System Using FPGA

    Authors: Hossam O. Ahmed, David Wyatt

    Abstract: The demand for more developed and agile urban taxi drones is increasing rapidly nowadays to sustain crowded cities and their traffic issues. The critical factor for spreading such technology could be related to the safety criteria that must be considered. One of the most critical safety aspects for such vertical and/or Short Take-Off and Landing (V/STOL) drones is related to safety during the land… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Published in: IEEE Access ( Volume: 12) - Page(s): 2113 - 2122

  9. arXiv:2401.01227  [pdf

    cs.CV cs.AI

    IdentiFace : A VGG Based Multimodal Facial Biometric System

    Authors: Mahmoud Rabea, Hanya Ahmed, Sohaila Mahmoud, Nourhan Sayed

    Abstract: The development of facial biometric systems has contributed greatly to the development of the computer vision field. Nowadays, there's always a need to develop a multimodal system that combines multiple biometric traits in an efficient, meaningful way. In this paper, we introduce "IdentiFace" which is a multimodal facial biometric system that combines the core of facial recognition with some of th… ▽ More

    Submitted 10 January, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

    Comments: 12 pages, 22 figures and 9 images

  10. arXiv:2312.03936  [pdf, other

    cs.CV cs.CY cs.LG cs.SI

    The Potential of Vision-Language Models for Content Moderation of Children's Videos

    Authors: Syed Hammad Ahmed, Shengnan Hu, Gita Sukthankar

    Abstract: Natural language supervision has been shown to be effective for zero-shot learning in many computer vision tasks, such as object detection and activity recognition. However, generating informative prompts can be challenging for more subtle tasks, such as video content moderation. This can be difficult, as there are many reasons why a video might be inappropriate, beyond violence and obscenity. For… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

    Comments: 5 pages, 1 figure. Accepted at IEEE ICMLA 2023

  11. arXiv:2311.06278  [pdf

    q-fin.ST cs.AI cs.LG

    Boosting Stock Price Prediction with Anticipated Macro Policy Changes

    Authors: Md Sabbirul Haque, Md Shahedul Amin, Jonayet Miah, Duc Minh Cao, Ashiqul Haque Ahmed

    Abstract: Prediction of stock prices plays a significant role in aiding the decision-making of investors. Considering its importance, a growing literature has emerged trying to forecast stock prices with improved accuracy. In this study, we introduce an innovative approach for forecasting stock prices with greater accuracy. We incorporate external economic environment-related information along with stock pr… ▽ More

    Submitted 27 October, 2023; originally announced November 2023.

    Journal ref: Journal of Mathematics and Statistics Studies, 4(3), 29-34 (2023)

  12. Segregated FLS Processing Cores for V/STOL Autonomous Landing Guidance Assistant System using FPGA

    Authors: Hossam O. Ahmed

    Abstract: It is highly predicted that the roads and parking areas will be extremely congested with vehicles to the point that searching for a novel solution will not be an optional choice for conserving the sustainability rate of the overall humanity's development growth. Such issue could be overcome by developing modified generations of the Urban Air Mobility (UAM) vehicles that essentially depend on the V… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: 2021 Integrated Communications Navigation and Surveillance Conference (ICNS), Dulles, VA, USA

  13. arXiv:2305.19480  [pdf, other

    cs.CV

    Learning by Aligning 2D Skeleton Sequences and Multi-Modality Fusion

    Authors: Quoc-Huy Tran, Muhammad Ahmed, Murad Popattia, M. Hassan Ahmed, Andrey Konin, M. Zeeshan Zia

    Abstract: This paper presents a self-supervised temporal video alignment framework which is useful for several fine-grained human activity understanding applications. In contrast with the state-of-the-art method of CASA, where sequences of 3D skeleton coordinates are taken directly as input, our key idea is to use sequences of 2D skeleton heatmaps as input. Unlike CASA which performs self-attention in the t… ▽ More

    Submitted 9 July, 2024; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted to ECCV 2024

  14. Malicious or Benign? Towards Effective Content Moderation for Children's Videos

    Authors: Syed Hammad Ahmed, Muhammad Junaid Khan, H. M. Umer Qaisar, Gita Sukthankar

    Abstract: Online video platforms receive hundreds of hours of uploads every minute, making manual content moderation impossible. Unfortunately, the most vulnerable consumers of malicious video content are children from ages 1-5 whose attention is easily captured by bursts of color and sound. Scammers attempting to monetize their content may craft malicious children's videos that are superficially similar to… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 10 pages, 7 figures, The 36th International FLAIRS Conference

    Journal ref: The International FLAIRS Conference Proceedings. 36, 1 (May 2023)

  15. arXiv:2305.01771  [pdf

    eess.SY cs.DC

    Fault Tolerant Processing Unit Using Gamma Distribution Sliding Window For Autonomous Landing Guidance System

    Authors: Hossam O. Ahmed

    Abstract: To keep up with today's dense metropolitan areas and their accompanying traffic problems, a growing number of towns are looking for more advanced and swift urban taxi drones. The safety parameters that must be taken into consideration may be the most important element in the widespread use of such technology. Most recent aviation mishaps have happened during the landing phase, making this a partic… ▽ More

    Submitted 3 June, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

    Comments: 21st IEEE Interregional NEWCAS Conference, Edinburgh, Scotland

  16. arXiv:2304.04640  [pdf, other

    cs.AI

    NeuroBench: A Framework for Benchmarking Neuromorphic Computing Algorithms and Systems

    Authors: Jason Yik, Korneel Van den Berghe, Douwe den Blanken, Younes Bouhadjar, Maxime Fabre, Paul Hueber, Denis Kleyko, Noah Pacik-Nelson, Pao-Sheng Vincent Sun, Guangzhi Tang, Shenqi Wang, Biyan Zhou, Soikat Hasan Ahmed, George Vathakkattil Joseph, Benedetto Leto, Aurora Micheli, Anurag Kumar Mishra, Gregor Lenz, Tao Sun, Zergham Ahmed, Mahmoud Akl, Brian Anderson, Andreas G. Andreou, Chiara Bartolozzi, Arindam Basu , et al. (73 additional authors not shown)

    Abstract: Neuromorphic computing shows promise for advancing computing efficiency and capabilities of AI applications using brain-inspired principles. However, the neuromorphic research field currently lacks standardized benchmarks, making it difficult to accurately measure technological advancements, compare performance with conventional methods, and identify promising future research directions. Prior neu… ▽ More

    Submitted 17 January, 2024; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: Updated from whitepaper to full perspective article preprint

  17. arXiv:2304.02099  [pdf

    eess.SY cs.AR cs.DC eess.SP

    Coarse Grained FLS-based Processor with Prognostic Malfunction Feature for UAM Drones using FPGA

    Authors: Hossam O. Ahmed

    Abstract: Many overall safety factors need to be considered in the next generation of Urban Air Mobility (UAM) systems and addressing these can become the anchor point for such technology to reach consent for worldwide application. On the other hand, fulfilling the safety requirements from an exponential increase of prolific UAM systems, is extremely complicated, and requires careful consideration of a vari… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: The paper is accepted

    Journal ref: The 23rd Integrated Communications, Navigation, and Surveillance Conference, 2023, USA

  18. arXiv:2303.00823  [pdf, other

    physics.plasm-ph cs.LG physics.acc-ph physics.comp-ph

    Automated control and optimisation of laser driven ion acceleration

    Authors: B. Loughran, M. J. V. Streeter, H. Ahmed, S. Astbury, M. Balcazar, M. Borghesi, N. Bourgeois, C. B. Curry, S. J. D. Dann, S. DiIorio, N. P. Dover, T. Dzelzanis, O. C. Ettlinger, M. Gauthier, L. Giuffrida, G. D. Glenn, S. H. Glenzer, J. S. Green, R. J. Gray, G. S. Hicks, C. Hyland, V. Istokskaia, M. King, D. Margarone, O. McCusker , et al. (10 additional authors not shown)

    Abstract: The interaction of relativistically intense lasers with opaque targets represents a highly non-linear, multi-dimensional parameter space. This limits the utility of sequential 1D scanning of experimental parameters for the optimisation of secondary radiation, although to-date this has been the accepted methodology due to low data acquisition rates. High repetition-rate (HRR) lasers augmented by ma… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Comments: 11 pages

  19. arXiv:2303.00223  [pdf

    cs.HC

    Meal-time Detection by Means of Long Periods Blood Glucose Level Monitoring via IoT Technology

    Authors: Hassan M. Ahmed, Souhail Maraoui, Muhammed Abd Elnaby Sadek, Bessam Abdulrazak, Camille Vandenberghe, Stephen C. Cunnane, F. Guillaume Blanchet

    Abstract: Blood glucose level monitoring is of great importance, especially for subjects experiencing type 1 diabetes. Accurate monitoring of their blood glucose level prevents dangerous and life-threatening situations that might be experienced by those subjects. In addition, precise monitoring of blood glucose levels over long periods of time helps establishing knowledge about the daily mealtime routine wh… ▽ More

    Submitted 27 January, 2024; v1 submitted 28 February, 2023; originally announced March 2023.

  20. arXiv:2210.17092  [pdf, other

    cs.LG cs.AI

    Confidence-Nets: A Step Towards better Prediction Intervals for regression Neural Networks on small datasets

    Authors: Mohamedelmujtaba Altayeb, Abdelrahman M. Elamin, Hozaifa Ahmed, Eithar Elfatih Elfadil Ibrahim, Omer Haydar, Saba Abdulaziz, Najlaa H. M. Mohamed

    Abstract: The recent decade has seen an enormous rise in the popularity of deep learning and neural networks. These algorithms have broken many previous records and achieved remarkable results. Their outstanding performance has significantly sped up the progress of AI, and so far various milestones have been achieved earlier than expected. However, in the case of relatively small datasets, the performance o… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

  21. arXiv:2208.07298  [pdf, other

    cs.MA cs.LG

    Transformer-based Value Function Decomposition for Cooperative Multi-agent Reinforcement Learning in StarCraft

    Authors: Muhammad Junaid Khan, Syed Hammad Ahmed, Gita Sukthankar

    Abstract: The StarCraft II Multi-Agent Challenge (SMAC) was created to be a challenging benchmark problem for cooperative multi-agent reinforcement learning (MARL). SMAC focuses exclusively on the problem of StarCraft micromanagement and assumes that each unit is controlled individually by a learning agent that acts independently and only possesses local information; centralized training is assumed to occur… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: AIIDE 2022

  22. arXiv:2208.01769  [pdf, other

    cs.MA cs.AI cs.LG

    Deep Reinforcement Learning for Multi-Agent Interaction

    Authors: Ibrahim H. Ahmed, Cillian Brewitt, Ignacio Carlucho, Filippos Christianos, Mhairi Dunion, Elliot Fosong, Samuel Garcin, Shangmin Guo, Balint Gyevnar, Trevor McInroe, Georgios Papoudakis, Arrasy Rahman, Lukas Schäfer, Massimiliano Tamborski, Giuseppe Vecchio, Cheng Wang, Stefano V. Albrecht

    Abstract: The development of autonomous agents which can interact with other agents to accomplish a given task is a core area of research in artificial intelligence and machine learning. Towards this goal, the Autonomous Agents Research Group develops novel machine learning algorithms for autonomous systems control, with a specific focus on deep reinforcement learning and multi-agent reinforcement learning.… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Comments: Published in AI Communications Special Issue on Multi-Agent Systems Research in the UK

  23. arXiv:2207.05112  [pdf, other

    cs.LG

    An Interpretable Joint Nonnegative Matrix Factorization-Based Point Cloud Distance Measure

    Authors: Hannah Friedman, Amani R. Maina-Kilaas, Julianna Schalkwyk, Hina Ahmed, Jamie Haddock

    Abstract: In this paper, we propose a new method for determining shared features of and measuring the distance between data sets or point clouds. Our approach uses the joint factorization of two data matrices $X_1,X_2$ into non-negative matrices $X_1 = AS_1, X_2 = AS_2$ to derive a similarity measure that determines how well the shared basis $A$ approximates $X_1, X_2$. We also propose a point cloud distanc… ▽ More

    Submitted 27 November, 2022; v1 submitted 11 July, 2022; originally announced July 2022.

  24. arXiv:2111.10889  [pdf, other

    eess.IV cs.CV

    Joint alignment and reconstruction of multislice dynamic MRI using variational manifold learning

    Authors: Qing Zou, Abdul Haseeb Ahmed, Prashant Nagpal, Sarv Priya, Rolf F Schulte, Mathews Jacob

    Abstract: Free-breathing cardiac MRI schemes are emerging as competitive alternatives to breath-held cine MRI protocols, enabling applicability to pediatric and other population groups that cannot hold their breath. Because the data from the slices are acquired sequentially, the cardiac/respiratory motion patterns may be different for each slice; current free-breathing approaches perform independent recover… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

  25. arXiv:2109.08672  [pdf

    cs.CV

    Monitoring Indoor Activity of Daily Living Using Thermal Imaging: A Case Study

    Authors: Hassan M. Ahmed, Bessam Abdulrazak

    Abstract: Monitoring indoor activities of daily living (ADLs) of a person is neither an easy nor an accurate process. It is subjected to dependency on sensor type, power supply stability, and connectivity stability without mentioning artifacts introduced by the person himself. Multiple challenges have to be overcome in this field, such as; monitoring the precise spatial location of the person, and estimatin… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  26. arXiv:2105.13659  [pdf

    cs.CV

    Deception Detection in Videos using the Facial Action Coding System

    Authors: Hammad Ud Din Ahmed, Usama Ijaz Bajwa, Fan Zhang, Muhammad Waqas Anwar

    Abstract: Facts are important in decision making in every situation, which is why it is important to catch deceptive information before they are accepted as facts. Deception detection in videos has gained traction in recent times for its various real-life application. In our approach, we extract facial action units using the facial action coding system which we use as parameters for training a deep learning… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  27. Ovarian Cancer Detection based on Dimensionality Reduction Techniques and Genetic Algorithm

    Authors: Ahmed Farag Seddik, Hassan Mostafa Ahmed

    Abstract: In this research, we have two serum SELDI (surface-enhanced laser desorption and ionization) mass spectra (MS) datasets to be used to select features amongst them to identify proteomic cancerous serums from normal serums. Features selection techniques have been applied and classification techniques have been applied as well. Amongst the features selection techniques we have chosen to evaluate the… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: 7 Pages

    Journal ref: EMBS ISC 2013

  28. arXiv:2102.10593  [pdf, ps, other

    eess.IV cs.CV math.AT

    Classification of COVID-19 via Homology of CT-SCAN

    Authors: Sohail Iqbal, H. Fareed Ahmed, Talha Qaiser, Muhammad Imran Qureshi, Nasir Rajpoot

    Abstract: In this worldwide spread of SARS-CoV-2 (COVID-19) infection, it is of utmost importance to detect the disease at an early stage especially in the hot spots of this epidemic. There are more than 110 Million infected cases on the globe, sofar. Due to its promptness and effective results computed tomography (CT)-scan image is preferred to the reverse-transcription polymerase chain reaction (RT-PCR).… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

  29. arXiv:2102.04145  [pdf, other

    cs.LG cs.AI stat.ML

    Model Rectification via Unknown Unknowns Extraction from Deployment Samples

    Authors: Bruno Abrahao, Zheng Wang, Haider Ahmed, Yuchen Zhu

    Abstract: Model deficiency that results from incomplete training data is a form of structural blindness that leads to costly errors, oftentimes with high confidence. During the training of classification tasks, underrepresented class-conditional distributions that a given hypothesis space can recognize results in a mismatch between the model and the target space. To mitigate the consequences of this discrep… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: 18 pages (7 pages for supplementary materials)

    MSC Class: I.5.2

  30. Federated Learning in the Sky: Aerial-Ground Air Quality Sensing Framework with UAV Swarms

    Authors: Yi Liu, Jiangtian Nie, Xuandi Li, Syed Hassan Ahmed, Wei Yang Bryan Lim, Chunyan Miao

    Abstract: Due to air quality significantly affects human health, it is becoming increasingly important to accurately and timely predict the Air Quality Index (AQI). To this end, this paper proposes a new federated learning-based aerial-ground air quality sensing framework for fine-grained 3D air quality monitoring and forecasting. Specifically, in the air, this framework leverages a light-weight Dense-Mobil… ▽ More

    Submitted 23 July, 2020; originally announced July 2020.

    Comments: IEEE Internet of Things

  31. arXiv:2007.09327  [pdf, ps, other

    cs.CR cs.LG cs.MA

    Towards Quantum-Secure Authentication and Key Agreement via Abstract Multi-Agent Interaction

    Authors: Ibrahim H. Ahmed, Josiah P. Hanna, Elliot Fosong, Stefano V. Albrecht

    Abstract: Current methods for authentication and key agreement based on public-key cryptography are vulnerable to quantum computing. We propose a novel approach based on artificial intelligence research in which communicating parties are viewed as autonomous agents which interact repeatedly using their private decision models. Authentication and key agreement are decided based on the agents' observed behavi… ▽ More

    Submitted 9 July, 2021; v1 submitted 18 July, 2020; originally announced July 2020.

    Comments: Published at the 19th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2021)

  32. arXiv:2004.06046  [pdf, other

    eess.SP cs.LG stat.ML

    Object classification from randomized EEG trials

    Authors: Hamad Ahmed, Ronnie B Wilbur, Hari M Bharadwaj, Jeffrey Mark Siskind

    Abstract: New results suggest strong limits to the feasibility of classifying human brain activity evoked from image stimuli, as measured through EEG. Considerable prior work suffers from a confound between the stimulus class and the time since the start of the experiment. A prior attempt to avoid this confound using randomized trials was unable to achieve results above chance in a statistically significant… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  33. arXiv:1908.04263  [pdf, ps, other

    math.NT cs.CR cs.DS math.RA

    Computation of Jacobi sums of order l^2 and 2l^2 with prime l

    Authors: Md. Helal Ahmed, Jagmohan Tanti, Sumant Pushp

    Abstract: In this paper, we present the fast computational algorithms for the Jacobi sums of orders $l^2$ and $2l^{2}$ with odd prime $l$ by formulating them in terms of the minimum number of cyclotomic numbers of the corresponding orders. We also implement two additional algorithms to validate these formulae, which are also useful for the demonstration of the minimality of cyclotomic numbers required.

    Submitted 25 November, 2019; v1 submitted 8 August, 2019; originally announced August 2019.

  34. arXiv:1907.08898  [pdf, ps, other

    cs.NI cs.CR

    LiSA: A Lightweight and Secure Authentication Mechanism for Smart Metering Infrastructure

    Authors: Sahil Garg, Kuljeet Kaur, Georges Kaddoum, François Gagnon, Syed Hassan Ahmed, Dushantha Nalin K. Jayakody

    Abstract: Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to their dependency on public communication networks.… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: To appear in IEEE Globecom 2019

  35. arXiv:1906.06921  [pdf, ps, other

    cs.CR math.NT

    A Public-Key Cryptosystem Using Cyclotomic Matrices

    Authors: Md. Helal Ahmed, Jagmohan Tanti, Sumant Pushp

    Abstract: Confidentiality and Integrity are two paramount objectives in the evaluation of information and communication technology. In this paper, we propose an arithmetic approach for designing asymmetric key cryptography. Our method is based on the formulation of cyclotomic matrices correspond to the diophantine system. The proposed cyclotomic asymmetric cryptosystem (CAC) utilizes the cyclotomic matrices… ▽ More

    Submitted 15 May, 2020; v1 submitted 17 June, 2019; originally announced June 2019.

    MSC Class: 11T22; 11T24; 11T71

  36. arXiv:1904.01168  [pdf, other

    cs.NI cs.CR

    Blockchain-based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure

    Authors: Kuljeet Kaur, Sahil Garg, Georges Kaddoum, François Gagnon, Syed Hassan Ahmed

    Abstract: With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud based models often fall short in applications whe… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: Accepted for publication in IEEE ICC 2019 Workshop on Wireless Physical Layer Security

  37. arXiv:1903.09924  [pdf, other

    cs.NI

    An Energy-driven Network Function Virtualization for Multi-domain Software Defined Networks

    Authors: Kuljeet Kaur, Sahil Garg, Georges Kaddoum, François Gagnon, Neeraj Kumar, Syed Hassan Ahmed

    Abstract: Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-enabled NFV setups, the underlying network services… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: Accepted for publication in IEEE INFOCOM 2019 Workshop on Intelligent Cloud Computing and Networking (ICCN 2019)

  38. Dominant Dataset Selection Algorithms for Electricity Consumption Time-Series Data Analysis Based on Affine Transformation

    Authors: Yi Wu, Yi Liu, Syed Hassan Ahmed, Jialiang Peng, Ahmed A. Abd El-Latif

    Abstract: The explosive growth of time-series data, the scale of time-series data (TSD) suggests that the scale and capability of many Internet of Things (IoT)-based applications has already been exceeded. Moreover, redundancy persists in TSD due to the correlation between information acquired via different sources. In this paper, we propose a cohort of dominant dataset selection algorithms for electricity… ▽ More

    Submitted 10 November, 2019; v1 submitted 1 March, 2019; originally announced March 2019.

    Comments: This paper has been accepted by IEEE Internet of Things Journal

    Journal ref: IEEE Internet of Things Journal, pp. 1-1, 2019

  39. arXiv:1812.07697  [pdf, other

    cs.CV cs.LG q-bio.NC

    Training on the test set? An analysis of Spampinato et al. [31]

    Authors: Ren Li, Jared S. Johansen, Hamad Ahmed, Thomas V. Ilyevsky, Ronnie B Wilbur, Hari M Bharadwaj, Jeffrey Mark Siskind

    Abstract: A recent paper [31] claims to classify brain processing evoked in subjects watching ImageNet stimuli as measured with EEG and to use a representation derived from this processing to create a novel object classifier. That paper, together with a series of subsequent papers [8, 15, 17, 20, 21, 30, 35], claims to revolutionize the field by achieving extremely successful results on several computer-vis… ▽ More

    Submitted 18 December, 2018; originally announced December 2018.

    Comments: 18 Pages, 4 Figures, 10 Tables

  40. arXiv:1810.05443  [pdf, other

    cs.IT

    Low-Complexity Detection of M-ary PSK Faster-than-Nyquist Signaling

    Authors: Ebrahim Bedeer, Halim Yanikomeroglu, Mohamed Hossam Ahmed

    Abstract: Faster-than-Nyquist (FTN) signaling is a promising non-orthogonal physical layer transmission technique to improve the spectral efficiency of future communication systems but at the expense of intersymbol-interference (ISI). In this paper, we investigate the detection problem of FTN signaling and formulate the sequence estimation problem of any $M$-ary phase shift keying (PSK) FTN signaling as an… ▽ More

    Submitted 13 April, 2019; v1 submitted 12 October, 2018; originally announced October 2018.

    Comments: WCNC'19 - Workshop on Ultra-high speed, low latency and massive connectivity communication for 5G/B5G

  41. arXiv:1803.00474  [pdf, other

    cs.NI

    Joint Inter-flow Network Coding and Opportunistic Routing in Multi-hop Wireless Mesh Networks: A Comprehensive Survey

    Authors: Somayeh Kafaie, Yuanzhu Chen, Octavia A. Dobre, Mohamed Hossam Ahmed

    Abstract: Network coding and opportunistic routing are two recognized innovative ideas to improve the performance of wireless networks by utilizing the broadcast nature of the wireless medium. In the last decade, there has been considerable research on how to synergize inter-flow network coding and opportunistic routing in a single joint protocol outperforming each in any scenario. This paper explains the m… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: 51 pages, 17 figures

    Journal ref: IEEE Communication Surveys and Tutorials, 2018

  42. arXiv:1801.07562  [pdf, ps, other

    eess.SP cs.IT

    Rate-Interference Tradeoff in OFDM-based Cognitive Radio Networks

    Authors: Ebrahim Bedeer, Octavia A. Dobre, Mohamed H. Ahmed, Kareem E. Baddour

    Abstract: In cognitive radio (CR) networks, secondary users (SUs) are allowed to opportunistically access the primary users (PUs) spectrum to improve the spectrum utilization; however, this increases the interference levels at the PUs. In this paper, we consider an orthogonal frequency division multiplexing OFDM-based CR network and investigate the tradeoff between increasing the SU transmission rate (hence… ▽ More

    Submitted 8 February, 2019; v1 submitted 10 January, 2018; originally announced January 2018.

    Comments: GC

  43. arXiv:1801.05353  [pdf, ps, other

    eess.SP cs.IT

    Energy-Efficient Power Loading for OFDM-based Cognitive Radio Systems with Channel Uncertainties

    Authors: Ebrahim Bedeer, Osama Amin, Octavia A. Dobre, Mohamed H. Ahmed, Kareem E. Baddour

    Abstract: In this paper, we propose a novel algorithm to optimize the energy-efficiency (EE) of orthogonal frequency division multiplexing-based cognitive radio systems under channel uncertainties. We formulate an optimization problem that guarantees a minimum required rate and a specified power budget for the secondary user (SU), while restricting the interference to primary users (PUs) in a statistical ma… ▽ More

    Submitted 8 February, 2019; v1 submitted 12 January, 2018; originally announced January 2018.

    Comments: TVT

  44. arXiv:1801.02221  [pdf, other

    cs.NI

    Performance Analysis of Network Coding with IEEE 802.11 DCF in Multi-Hop Wireless Networks

    Authors: Somayeh Kafaie, Mohamed Hossam Ahmed, Yuanzhu Chen, Octavia A. Dobre

    Abstract: Network coding is an effective idea to boost the capacity of wireless networks, and a variety of studies have explored its advantages in different scenarios. However, there is not much analytical study on throughput and end-to-end delay of network coding in multi-hop wireless networks considering the specifications of IEEE 802.11 Distributed Coordination Function. In this paper, we utilize queuing… ▽ More

    Submitted 7 January, 2018; originally announced January 2018.

    Comments: 14 pages, 11 figures, IEEE Transactions on Mobile Computing, 2017

  45. arXiv:1801.02134  [pdf, other

    cs.NI

    FlexONC: Joint Cooperative Forwarding and Network Coding with Precise Encoding Conditions

    Authors: Somayeh Kafaie, Yuanzhu Chen, Mohamed Hossam Ahmed, Octavia A. Dobre

    Abstract: In recent years, network coding has emerged as an innovative method that helps a wireless network approach its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should trave… ▽ More

    Submitted 7 January, 2018; originally announced January 2018.

    Comments: 15 pages, 27 figures

    Journal ref: IEEE Transactions on Vehicular Technology, Vol. 66, No. 8, pp. 7262-7277, Aug. 2017

  46. arXiv:1801.02120  [pdf

    cs.NI cs.IT

    Network Coding Implementation Details: A Guidance Document

    Authors: Somayeh Kafaie, Yuanzhu Peter Chen, Octavia A. Dobre, Mohamed Hossam Ahmed

    Abstract: In recent years, network coding has become one of the most interesting fields and has attracted considerable attention from both industry and academia. The idea of network coding is based on the concept of allowing intermediate nodes to encode and combine incoming packets instead of only copy and forward them. This approach, by augmenting the multicast and broadcast efficiency of multi-hop wireles… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 5 pages, 5 figures, 22nd Annual Newfoundland Electrical and Computer Engineering Conference (NECEC), 2013

  47. arXiv:1801.02119  [pdf, other

    cs.NI

    Throughput Analysis of Network Coding in Multi-Hop Wireless Mesh Networks Using Queueing Theory

    Authors: Somayeh Kafaie, Mohamed H. Ahmed, Yuanzhu Chen, Octavia A. Dobre

    Abstract: In recent years, a significant amount of research has been conducted to explore the benefits of network coding in different scenarios, from both theoretical and simulation perspectives. In this paper, we utilize queueing theory to propose an analytical framework for bidirectional unicast flows in multi-hop wireless mesh networks, and study throughput of inter-flow network coding. We analytically d… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 6 Pages, 4 figues, IEEE Global Communications Conference (GLOBECOM), 2016

  48. arXiv:1801.02117  [pdf, other

    cs.NI

    Network Coding with Link Layer Cooperation in Wireless Mesh Networks

    Authors: Somayeh Kafaie, Yuanzhu Chen, Mohamed Hossam Ahmed, Octavia A. Dobre

    Abstract: In recent years, network coding has emerged as an innovative method that helps wireless network approaches its maximum capacity, by combining multiple unicasts in one broadcast. However, the majority of research conducted in this area is yet to fully utilize the broadcasting nature of wireless networks, and still assumes fixed route between the source and destination that every packet should trave… ▽ More

    Submitted 6 January, 2018; originally announced January 2018.

    Comments: 6 pages, 6 figures, IEEE International Conference on Communications (ICC), 2015

  49. Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT):The Case of Smart Campus

    Authors: Sobia Arshad, Muhammad Awais Azam, Syed Hassan Ahmed, Prof. Jonathan Loo

    Abstract: Information-Centric Networking (ICN) specifically Name Data Networking (NDN) is the name-base (content-base) networking and takes named-contents as "first class citizen", being considered as the ideal candidate to form the Future Internet basis. NDN striking features like named-data self-secured contents, name-base-forwarding, in-network caching and mobility support suits the Internet of Things (I… ▽ More

    Submitted 28 November, 2017; originally announced November 2017.

    Comments: 6 Pages,3 Figs

  50. arXiv:1709.05304  [pdf, other

    cs.IT

    A Two-Phase Power Allocation Scheme for CRNs Employing NOMA

    Authors: Ming Zeng, Georgios I. Tsiropoulos, Animesh Yadav, Octavia A. Dobre, Mohamed H. Ahmed

    Abstract: In this paper, we consider the power allocation (PA) problem in cognitive radio networks (CRNs) employing nonorthogonal multiple access (NOMA) technique. Specifically, we aim to maximize the number of admitted secondary users (SUs) and their throughput, without violating the interference tolerance threshold of the primary users (PUs). This problem is divided into a two-phase PA process: a) maximiz… ▽ More

    Submitted 15 September, 2017; originally announced September 2017.