Skip to main content

Showing 1–6 of 6 results for author: Ahmadi, M J

.
  1. arXiv:2405.04442  [pdf, other

    cs.CV cs.AI

    AugmenTory: A Fast and Flexible Polygon Augmentation Library

    Authors: Tanaz Ghahremani, Mohammad Hoseyni, Mohammad Javad Ahmadi, Pouria Mehrabi, Amirhossein Nikoofard

    Abstract: Data augmentation is a key technique for addressing the challenge of limited datasets, which have become a major component in the training procedures of image processing. Techniques such as geometric transformations and color space adjustments have been thoroughly tested for their ability to artificially expand training datasets and generate semi-realistic data for training purposes. Data augmenta… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  2. arXiv:2404.19431  [pdf, ps, other

    cs.IT

    Integrated Sensing and Communications for Unsourced Random Access: Fundamental Limits

    Authors: Mohammad Javad Ahmadi, Rafael F. Schaefer, H. Vincent Poor

    Abstract: This work considers the problem of integrated sensing and communication (ISAC) with a massive number of unsourced and uncoordinated users. In the proposed model, known as the unsourced ISAC system (UNISAC), all active communication and sensing users share a short frame to transmit their signals, without requiring scheduling with the base station (BS). Hence, the signal received from each user is a… ▽ More

    Submitted 1 May, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

  3. arXiv:2312.10208  [pdf, other

    cs.CV

    Video-based Surgical Skill Assessment using Tree-based Gaussian Process Classifier

    Authors: Arefeh Rezaei, Mohammad Javad Ahmadi, Amir Molaei, Hamid. D. Taghirad

    Abstract: This paper aims to present a novel pipeline for automated surgical skill assessment using video data and to showcase the effectiveness of the proposed approach in evaluating surgeon proficiency, its potential for targeted training interventions, and quality assurance in surgical departments. The pipeline incorporates a representation flow convolutional neural network and a novel tree-based Gaussia… ▽ More

    Submitted 21 December, 2023; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 11 pages, 2 figures, journal

  4. arXiv:2307.07310  [pdf, ps, other

    cs.IT

    Unsourced Random Access Using Multiple Stages of Orthogonal Pilots: MIMO and Single-Antenna Structures

    Authors: Mohammad Javad Ahmadi, Mohammad Kazemi, Tolga M. Duman

    Abstract: We study the problem of unsourced random access (URA) over Rayleigh block-fading channels with a receiver equipped with multiple antennas. We propose a slotted structure with multiple stages of orthogonal pilots, each of which is randomly picked from a codebook. In the proposed signaling structure, each user encodes its message using a polar code and appends it to the selected pilot sequences to c… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  5. arXiv:2202.01477  [pdf, ps, other

    cs.IT

    Unsourced Random Access with a Massive MIMO Receiver Using Multiple Stages of Orthogonal Pilots

    Authors: Mohammad Javad Ahmadi, Tolga M. Duman

    Abstract: We study the problem of unsourced random access (URA) over Rayleigh block-fading channels with a receiver equipped with multiple antennas. We employ multiple stages of orthogonal pilots, each of which is randomly picked from a codebook. In the proposed scheme, each user encodes its message using a polar code and appends it to the selected pilot sequences to construct its transmitted signal. Accord… ▽ More

    Submitted 19 May, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

  6. arXiv:2104.12186  [pdf, ps, other

    cs.IT

    Random Spreading for Unsourced MAC with Power Diversity

    Authors: Mohammad Javad Ahmadi, Tolga M. Duman

    Abstract: We propose an improvement of the random spreading approach with polar codes for unsourced multiple access. Each user encodes its message by a polar code, and the coded bits are then spread using a random spreading sequence. The proposed approach divides the active users into different groups, and employs different power levels for each group in such a way that the average power constraint is satis… ▽ More

    Submitted 27 August, 2021; v1 submitted 25 April, 2021; originally announced April 2021.