Skip to main content

Showing 1–22 of 22 results for author: ElSayed, S

.
  1. arXiv:2405.20587  [pdf, ps, other

    cs.NI eess.SP

    Quality-Aware Task Offloading for Cooperative Perception in Vehicular Edge Computing

    Authors: Amr M. Zaki, Sara A. Elsayed, Khalid Elgazzar, Hossam S. Hassanein

    Abstract: Task offloading in Vehicular Edge Computing (VEC) can advance cooperative perception (CP) to improve traffic awareness in Autonomous Vehicles. In this paper, we propose the Quality-aware Cooperative Perception Task Offloading (QCPTO) scheme. Q-CPTO is the first task offloading scheme that enhances traffic awareness by prioritizing the quality rather than the quantity of cooperative perception. Q-C… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. HMAR: Hierarchical Masked Attention for Multi-Behaviour Recommendation

    Authors: Shereen Elsayed, Ahmed Rashed, Lars Schmidt-Thieme

    Abstract: In the context of recommendation systems, addressing multi-behavioral user interactions has become vital for understanding the evolving user behavior. Recent models utilize techniques like graph neural networks and attention mechanisms for modeling diverse behaviors, but capturing sequential patterns in historical interactions remains challenging. To tackle this, we introduce Hierarchical Masked A… ▽ More

    Submitted 29 April, 2024; originally announced May 2024.

  3. arXiv:2405.04402  [pdf, ps, other

    cs.NI

    Utility-driven Optimization of TTL Cache Hierarchies under Network Delays

    Authors: Karim S. Elsayed, Fabien Geyer, Amr Rizk

    Abstract: We optimize hierarchies of Time-to-Live (TTL) caches under random network delays. A TTL cache assigns individual eviction timers to cached objects that are usually refreshed upon a hit where upon a miss the object requires a random time to be fetched from a parent cache. Due to their object decoupling property, TTL caches are of particular interest since the optimization of a per-object utility en… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  4. arXiv:2312.09684  [pdf, other

    cs.IR

    Context-Aware Sequential Model for Multi-Behaviour Recommendation

    Authors: Shereen Elsayed, Ahmed Rashed, Lars Schmidt-Thieme

    Abstract: Sequential recommendation models are crucial for next-item recommendations in online platforms, capturing complex patterns in user interactions. However, many focus on a single behavior, overlooking valuable implicit interactions like clicks and favorites. Existing multi-behavioral models often fail to simultaneously capture sequential patterns. We propose CASM, a Context-Aware Sequential Model, l… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  5. arXiv:2304.08176  [pdf, ps, other

    cs.CY cs.CL

    Towards Mitigating ChatGPT's Negative Impact on Education: Optimizing Question Design through Bloom's Taxonomy

    Authors: Saber Elsayed

    Abstract: The popularity of generative text AI tools in answering questions has led to concerns regarding their potential negative impact on students' academic performance and the challenges that educators face in evaluating student learning. To address these concerns, this paper introduces an evolutionary approach that aims to identify the best set of Bloom's taxonomy keywords to generate questions that th… ▽ More

    Submitted 30 March, 2023; originally announced April 2023.

  6. arXiv:2301.12782  [pdf, other

    cond-mat.dis-nn

    Machine Learning Aided Multiscale Magnetostatics

    Authors: Fadi Aldakheel, Celal Soyarslan, Hari Subramani Palanisamy, Elsayed Saber Elsayed

    Abstract: Computational material modeling using advanced numerical techniques speeds up the design process and reduces the costs of develo** new engineering products. In the field of multiscale modeling, huge computation efforts are expected for modeling heterogeneous materials while trying to reach high accuracy levels. In this work, a machine learning approach, namely the convolutional neural network (C… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

  7. arXiv:2301.10363  [pdf, other

    cs.RO cs.NE

    Planning-Assisted Context-Sensitive Autonomous Shepherding of Dispersed Robotic Swarms in Obstacle-Cluttered Environments

    Authors: **g Liu, Hemant Singh, Saber Elsayed, Robert Hunjet, Hussein Abbass

    Abstract: Robotic shepherding is a bio-inspired approach to autonomously guiding a swarm of agents towards a desired location. The research area has earned increasing research interest recently due to the efficacy of controlling a large number of agents in a swarm (sheep) using a smaller number of actuators (sheepdogs). However, shepherding a highly dispersed swarm in an obstacle-cluttered environment remai… ▽ More

    Submitted 27 February, 2023; v1 submitted 24 January, 2023; originally announced January 2023.

    Comments: 17 pages, 6 figures

  8. arXiv:2210.10664  [pdf, other

    cs.IR cs.AI cs.LG

    Deep Multi-Representation Model for Click-Through Rate Prediction

    Authors: Shereen Elsayed, Lars Schmidt-Thieme

    Abstract: Click-Through Rate prediction (CTR) is a crucial task in recommender systems, and it gained considerable attention in the past few years. The primary purpose of recent research emphasizes obtaining meaningful and powerful representations through mining low and high feature interactions using various components such as Deep Neural Networks (DNN), CrossNets, or transformer blocks. In this work, we p… ▽ More

    Submitted 25 October, 2022; v1 submitted 18 October, 2022; originally announced October 2022.

  9. arXiv:2205.02923  [pdf, other

    cs.AI

    End-to-End Image-Based Fashion Recommendation

    Authors: Shereen Elsayed, Lukas Brinkmeyer, Lars Schmidt-Thieme

    Abstract: In fashion-based recommendation settings, incorporating the item image features is considered a crucial factor, and it has shown significant improvements to many traditional models, including but not limited to matrix factorization, auto-encoders, and nearest neighbor models. While there are numerous image-based recommender approaches that utilize dedicated deep neural networks, comparisons to att… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: Accepted in FashionXRecsys 2021 workshop

  10. CARCA: Context and Attribute-Aware Next-Item Recommendation via Cross-Attention

    Authors: Ahmed Rashed, Shereen Elsayed, Lars Schmidt-Thieme

    Abstract: In sparse recommender settings, users' context and item attributes play a crucial role in deciding which items to recommend next. Despite that, recent works in sequential and time-aware recommendations usually either ignore both aspects or only consider one of them, limiting their predictive performance. In this paper, we address these limitations by proposing a context and attribute-aware recomme… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

    Journal ref: RecSys (2022) 71-80

  11. arXiv:2202.04411  [pdf, other

    cs.AI

    A.I. and Data-Driven Mobility at Volkswagen Financial Services AG

    Authors: Shayan Jawed, Mofassir ul Islam Arif, Ahmed Rashed, Kiran Madhusudhanan, Shereen Elsayed, Mohsan Jameel, Alexei Volk, Andre Hintsches, Marlies Kornfeld, Katrin Lange, Lars Schmidt-Thieme

    Abstract: Machine learning is being widely adapted in industrial applications owing to the capabilities of commercially available hardware and rapidly advancing research. Volkswagen Financial Services (VWFS), as a market leader in vehicle leasing services, aims to leverage existing proprietary data and the latest research to enhance existing and derive new business processes. The collaboration between Infor… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  12. arXiv:2202.01448  [pdf, other

    cs.CR cs.CY cs.LG

    Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

    Authors: Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, Zaghloul Saad Elsayed

    Abstract: In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hacker's forums which contain indicators of compromise that can be explo… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: 9 pages, 5 figures. Preprint

  13. arXiv:2109.14331  [pdf, other

    physics.ins-det hep-ex

    Upgrade of the CMS Resistive Plate Chambers for the High Luminosity LHC

    Authors: A. Samalan, M. Tytgat, G. A. Alves, F. Marujo, F. Torres Da Silva De Araujo, E. M. DaCosta, D. De Jesus Damiao, H. Nogima, A. Santoro, S. Fonseca De Souza, A. Aleksandrov, R. Hadjiiska, P. Iaydjiev, M. Rodozov, M. Shopova, G. Soultanov, M. Bonchev, A. Dimitrov, L. Litov, B. Pavlov, P. Petkov, A. Petrov, S. J. Qian, C. Bernal, A. Cabrera , et al. (86 additional authors not shown)

    Abstract: During the upcoming High Luminosity phase of the Large Hadron Collider (HL-LHC), the integrated luminosity of the accelerator will increase to 3000 fb$^{-1}$. The expected experimental conditions in that period in terms of background rates, event pileup, and the probable aging of the current detectors present a challenge for all the existing experiments at the LHC, including the Compact Muon Solen… ▽ More

    Submitted 2 November, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

  14. arXiv:2101.07779  [pdf, other

    cs.SE astro-ph.IM

    Collaborative Experience between Scientific Software Projects using Agile Scrum Development

    Authors: A. L. Baxter, S. Y. BenZvi, W. Bonivento, A. Brazier, M. Clark, A. Coleiro, D. Collom, M. Colomer-Molla, B. Cousins, A. Delgado Orellana, D. Dornic, V. Ekimtcov, S. ElSayed, A. Gallo Rosso, P. Godwin, S. Griswold, A. Habig, S. Horiuchi, D. A. Howell, M. W. G. Johnson, M. Juric, J. P. Kneller, A. Kopec, C. Kopper, V. Kulikovskiy , et al. (27 additional authors not shown)

    Abstract: Develo** sustainable software for the scientific community requires expertise in software engineering and domain science. This can be challenging due to the unique needs of scientific software, the insufficient resources for software engineering practices in the scientific community, and the complexity of develo** for evolving scientific contexts. While open-source software can partially addre… ▽ More

    Submitted 2 August, 2022; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: Revisions: in response to peer-review recommendations, most sections have been substantially expanded and reworked, five new figures have been added, and the title has been changed. Results unchanged

  15. arXiv:2101.02118  [pdf, other

    cs.LG stat.ML

    Do We Really Need Deep Learning Models for Time Series Forecasting?

    Authors: Shereen Elsayed, Daniela Thyssens, Ahmed Rashed, Hadi Samer Jomaa, Lars Schmidt-Thieme

    Abstract: Time series forecasting is a crucial task in machine learning, as it has a wide range of applications including but not limited to forecasting electricity consumption, traffic, and air quality. Traditional forecasting models rely on rolling averages, vector auto-regression and auto-regressive integrated moving averages. On the other hand, deep learning and matrix factorization models have been rec… ▽ More

    Submitted 20 October, 2021; v1 submitted 6 January, 2021; originally announced January 2021.

    Comments: 14 pages with appendix, 1 figure

  16. arXiv:2008.12639  [pdf, other

    cs.RO cs.AI

    Path Planning for Shepherding a Swarm in a Cluttered Environment using Differential Evolution

    Authors: Saber Elsayed, Hemant Singh, Essam Debie, Anthony Perry, Benjamin Campbell, Robert Hunjet, Hussein Abbass

    Abstract: Shepherding involves herding a swarm of agents (\emph{sheep}) by another a control agent (\emph{sheepdog}) towards a goal. Multiple approaches have been documented in the literature to model this behaviour. In this paper, we present a modification to a well-known shepherding approach, and show, via simulation, that this modification improves shepherding efficacy. We then argue that given complexit… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

  17. arXiv:2008.05791  [pdf, other

    cs.CR cs.NI

    Detecting Abnormal Traffic in Large-Scale Networks

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and services, at a low cost. However, the dynamic growth in the network services and applications creates security vulnerabilities and new risks that can be exploited by various attacks. For example, User to Root (U2R) and Remote to Local (R2L)… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: Published in Proc. IEEE International Symposium on Networks, Computers and Communications (ISNCC)2020

  18. arXiv:2006.13981  [pdf, other

    cs.CR

    DDoSNet: A Deep-Learning Model for Detecting Network Attacks

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the new architecture can be susceptible to several att… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: Published in Proc. IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020

  19. arXiv:2005.12769  [pdf, other

    physics.ins-det hep-ex

    CMS RPC Background -- Studies and Measurements

    Authors: R. Hadjiiska, A. Samalan, M. Tytgat, N. Zaganidis, G. A. Alves, F. Marujo, F. Torres Da Silva De Araujo, E. M. Da Costa, D. De Jesus Damiao, H. Nogima, A. Santoro, S. Fonseca De Souza, A. Aleksandrov, P. Iaydjiev, M. Rodozov, M. Shopova, G. Sultanov, M. Bonchev, A. Dimitrov, L. Litov, B. Pavlov, P. Petkov, A. Petrov, S. J. Qian, C. Bernal , et al. (84 additional authors not shown)

    Abstract: The expected radiation background in the CMS RPC system has been studied using the MC prediction with the CMS FLUKA simulation of the detector and the cavern. The MC geometry used in the analysis describes very accurately the present RPC system but still does not include the complete description of the RPC upgrade region with pseudorapidity $1.9 < \lvert η\rvert < 2.4$. Present results will be upd… ▽ More

    Submitted 13 December, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 6 pages, Conference proceeding for the 2020 Resistive Plate Chambers and Related Detectors. Minor revision of the report, the results remain unchanged. Three new plots are added and some details were explained better

  20. Flexible One-Dimensional Metal-Insulator-Graphene Diode

    Authors: Zhenxing Wang, Burkay Uzlu, Mehrdad Shaygan, Martin Otto, Mário Ribeiro, Enrique González Marín, Giuseppe Iannaccone, Gianluca Fiori, Mohamed Saeed Elsayed, Renato Negra, Daniel Neumaier

    Abstract: In this work, a novel one-dimensional geometry for metal-insulator-graphene (1D-MIG) diode with low capacitance is demonstrated. The junction of the 1D-MIG diode is formed at the 1D edge of Al2O3-encapsulated graphene with TiO2 that acts as barrier material. The diodes demonstrate ultra-high current density since the transport in the graphene and through the barrier is in plane. The geometry deliv… ▽ More

    Submitted 18 March, 2020; originally announced March 2020.

    Journal ref: ACS Applied Electronic Materials, 2019, 1, 945-950

  21. arXiv:1910.00817  [pdf, other

    cs.CR

    Machine-Learning Techniques for Detecting Attacks in SDN

    Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut

    Abstract: With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the detection of malicious traffic. In this paper, we p… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Published in 2019 IEEE 7th International Conference on Computer Science and Network Technology

  22. arXiv:1804.09964  [pdf

    physics.app-ph

    High Performance Metal-Insulator-Graphene Diodes for Radio Frequency Power Detection Application

    Authors: Mehrdad Shaygan, Zhenxing Wang, Mohamed Saeed Elsayed, Martin Otto, Giuseppe Iannaccone, Ahmed Hamed Ghareeb, Gianluca Fiori, Renato Negra, Daniel Neumaier

    Abstract: Vertical metal-insulator-graphene (MIG) diodes for radio frequency (RF) power detection are realized using a scalable approach based on graphene grown by chemical vapor deposition and TiO2 as barrier material. The temperature dependent current flow through the diode can be described by thermionic emission theory taking into account a bias induced barrier lowering at the graphene TiO2 interface. Th… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Journal ref: Nanoscale, 9, 11944-11950, (2017)