-
Coded Caching for Heterogeneous Systems: An Optimization Perspective
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
In cache-aided networks, the server populates the cache memories at the users during low-traffic periods, in order to reduce the delivery load during peak-traffic hours. In turn, there exists a fundamental trade-off between the delivery load on the server and the cache sizes at the users. In this paper, we study this trade-off in a multicast network where the server is connected to users with uneq…
▽ More
In cache-aided networks, the server populates the cache memories at the users during low-traffic periods, in order to reduce the delivery load during peak-traffic hours. In turn, there exists a fundamental trade-off between the delivery load on the server and the cache sizes at the users. In this paper, we study this trade-off in a multicast network where the server is connected to users with unequal cache sizes and the number of users is less than or equal to the number of library files. We propose centralized uncoded placement and linear delivery schemes which are optimized by solving a linear program. Additionally, we derive a lower bound on the delivery memory trade-off with uncoded placement that accounts for the heterogeneity in cache sizes. We explicitly characterize this trade-off for the case of three end-users, as well as an arbitrary number of end-users when the total memory size at the users is small, and when it is large. Next, we consider a system where the server is connected to the users via rate limited links of different capacities and the server assigns the users' cache sizes subject to a total cache budget. We characterize the optimal cache sizes that minimize the delivery completion time with uncoded placement and linear delivery. In particular, the optimal memory allocation balances between assigning larger cache sizes to users with low capacity links and uniform memory allocation.
△ Less
Submitted 13 March, 2019; v1 submitted 18 October, 2018;
originally announced October 2018.
-
CMOS-Integrated Diamond Nitrogen-Vacancy Quantum Sensor
Authors:
Donggyu Kim,
Mohamed I. Ibrahim,
Christopher Foy,
Matthew E. Trusheim,
Ruonan Han,
Dirk R. Englund
Abstract:
The nitrogen vacancy (NV) center in diamond has emerged as a leading solid-state quantum sensor for applications including magnetometry, electrometry, thermometry, and chemical sensing. However, an outstanding challenge for practical applications is that existing NV-based sensing techniques require bulky and discrete instruments for spin control and detection. Here, we address this challenge by in…
▽ More
The nitrogen vacancy (NV) center in diamond has emerged as a leading solid-state quantum sensor for applications including magnetometry, electrometry, thermometry, and chemical sensing. However, an outstanding challenge for practical applications is that existing NV-based sensing techniques require bulky and discrete instruments for spin control and detection. Here, we address this challenge by integrating NV based quantum sensing with complementary metal-oxide-semiconductor (CMOS) technology. Through tailored CMOS-integrated microwave generation and photodetection, this work dramatically reduces the instrumentation footprint for quantum magnetometry and thermometry. This hybrid diamond-CMOS integration enables an ultra-compact and scalable platform for quantum sensing and quantum information processing.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
URBAN-i: From urban scenes to map** slums, transport modes, and pedestrians in cities using deep learning and computer vision
Authors:
Mohamed R. Ibrahim,
James Haworth,
Tao Cheng
Abstract:
Within the burgeoning expansion of deep learning and computer vision across the different fields of science, when it comes to urban development, deep learning and computer vision applications are still limited towards the notions of smart cities and autonomous vehicles. Indeed, a wide gap of knowledge appears when it comes to cities and urban regions in less developed countries where the chaos of…
▽ More
Within the burgeoning expansion of deep learning and computer vision across the different fields of science, when it comes to urban development, deep learning and computer vision applications are still limited towards the notions of smart cities and autonomous vehicles. Indeed, a wide gap of knowledge appears when it comes to cities and urban regions in less developed countries where the chaos of informality is the dominant scheme. How can deep learning and Artificial Intelligence (AI) untangle the complexities of informality to advance urban modelling and our understanding of cities? Various questions and debates can be raised concerning the future of cities of the North and the South in the paradigm of AI and computer vision. In this paper, we introduce a new method for multipurpose realistic-dynamic urban modelling relying on deep learning and computer vision, using deep Convolutional Neural Networks (CNN), to sense and detect informality and slums in urban scenes from aerial and street view images in addition to detection of pedestrian and transport modes. The model has been trained on images of urban scenes in cities across the globe. The model shows a good validation of understanding a wide spectrum of nuances among the planned and the unplanned regions, including informal and slum areas. We attempt to advance urban modelling for better understanding the dynamics of city developments. We also aim to exemplify the significant impacts of AI in cities beyond how smart cities are discussed and perceived in the mainstream. The algorithms of the URBAN-i model are fully-coded in Python programming with the pre-trained deep learning models to be used as a tool for map** and city modelling in the various corner of the globe, including informal settlements and slum regions.
△ Less
Submitted 10 September, 2018;
originally announced September 2018.
-
Interfacial Entropic Interactions Tunes Fragility and Dynamic Heterogeneity of Glassy Athermal Polymer Nanocomposite films
Authors:
Nafisa Begam,
Nimmi Das A,
Sivasurender Chandran,
Mohd Ibrahim,
Venkat Padmanabhan,
Michael Sprung,
J. K. Basu
Abstract:
Enthalpic interactions at the interface between nanoparticles and matrix polymers is known to influence various properties of the resultant polymer nanocomposites (PNC). For athermal PNCs, consisting of grafted nanoparticles embedded in chemically identical polymers, the role and extent of the interface layer (IL) interactions in determining the properties of the nanocomposites is not very clear.…
▽ More
Enthalpic interactions at the interface between nanoparticles and matrix polymers is known to influence various properties of the resultant polymer nanocomposites (PNC). For athermal PNCs, consisting of grafted nanoparticles embedded in chemically identical polymers, the role and extent of the interface layer (IL) interactions in determining the properties of the nanocomposites is not very clear. Here, we demonstrate the influence of the interfacial layer dynamics on the fragility and dynamical heterogeneity (DH) of athermal and glassy PNCs. The IL properties are altered by changing the grafted to matrix polymer size ratio, f, which in turn changes the extent of matrix chain penetration into the grafted layer. The fragility of PNCs is found to increase monotonically with increasing entropic compatibility, characterized by increasing penetration depth. Contrary to observations in most polymers and glass formers, we observe an anti-correlation between the dependence on IL dynamics of fragility and DH, quantified by the experimentally estimated Kohlrausch-Watts-Williams parameter and the non-Gaussian parameter obtained from simulations.
△ Less
Submitted 22 August, 2018;
originally announced August 2018.
-
predictSLUMS: A new model for identifying and predicting informal settlements and slums in cities from street intersections using machine learning
Authors:
Mohamed R. Ibrahim,
Helena Titheridge,
Tao Cheng,
James Haworth
Abstract:
Identifying current and future informal regions within cities remains a crucial issue for policymakers and governments in develo** countries. The delineation process of identifying such regions in cities requires a lot of resources. While there are various studies that identify informal settlements based on satellite image classification, relying on both supervised or unsupervised machine learni…
▽ More
Identifying current and future informal regions within cities remains a crucial issue for policymakers and governments in develo** countries. The delineation process of identifying such regions in cities requires a lot of resources. While there are various studies that identify informal settlements based on satellite image classification, relying on both supervised or unsupervised machine learning approaches, these models either require multiple input data to function or need further development with regards to precision. In this paper, we introduce a novel method for identifying and predicting informal settlements using only street intersections data, regardless of the variation of urban form, number of floors, materials used for construction or street width. With such minimal input data, we attempt to provide planners and policy-makers with a pragmatic tool that can aid in identifying informal zones in cities. The algorithm of the model is based on spatial statistics and a machine learning approach, using Multinomial Logistic Regression (MNL) and Artificial Neural Networks (ANN). The proposed model relies on defining informal settlements based on two ubiquitous characteristics that these regions tend to be filled in with smaller subdivided lots of housing relative to the formal areas within the local context, and the paucity of services and infrastructure within the boundary of these settlements that require relatively bigger lots. We applied the model in five major cities in Egypt and India that have spatial structures in which informality is present. These cities are Greater Cairo, Alexandria, Hurghada and Minya in Egypt, and Mumbai in India. The predictSLUMS model shows high validity and accuracy for identifying and predicting informality within the same city the model was trained on or in different ones of a similar context.
△ Less
Submitted 14 August, 2018;
originally announced August 2018.
-
Mirror-Prox SCA Algorithm for Multicast Beamforming and Antenna Selection
Authors:
Mohamed S. Ibrahim,
Aritra Konar,
Mingyi Hong,
Nicholas D. Sidiropoulos
Abstract:
This paper considers the (NP-)hard problem of joint multicast beamforming and antenna selection. Prior work has focused on using Semi-Definite relaxation (SDR) techniques in an attempt to obtain a high quality sub-optimal solution. However, SDR suffers from the drawback of having high computational complexity, as SDR lifts the problem to higher dimensional space, effectively squaring the number of…
▽ More
This paper considers the (NP-)hard problem of joint multicast beamforming and antenna selection. Prior work has focused on using Semi-Definite relaxation (SDR) techniques in an attempt to obtain a high quality sub-optimal solution. However, SDR suffers from the drawback of having high computational complexity, as SDR lifts the problem to higher dimensional space, effectively squaring the number of variables. This paper proposes a high performance, low complexity Successive Convex Approximation (SCA) algorithm for max-min SNR "fair" joint multicast beamforming and antenna selection under a sum power constraint. The proposed approach relies on iteratively approximating the non-convex objective with a series of non-smooth convex subproblems, and then, a first order-based method called Saddle Point Mirror-Prox (SP-MP) is used to compute optimal solutions for each SCA subproblem. Simulations reveal that the SP-MP SCA algorithm provides a higher quality and lower complexity solution compared to the one obtained using SDR.
△ Less
Submitted 1 March, 2018;
originally announced March 2018.
-
On Coded Caching with Heterogeneous Distortion Requirements
Authors:
Abdelrahman M. Ibrahim,
Ahmed A. Zewail,
Aylin Yener
Abstract:
This paper considers heterogeneous coded caching where the users have unequal distortion requirements. The server is connected to the users via an error-free multicast link and designs the users' cache sizes subject to a total memory budget. In particular, in the placement phase, the server jointly designs the users' cache sizes and the cache contents. To serve the users' requests, in the delivery…
▽ More
This paper considers heterogeneous coded caching where the users have unequal distortion requirements. The server is connected to the users via an error-free multicast link and designs the users' cache sizes subject to a total memory budget. In particular, in the placement phase, the server jointly designs the users' cache sizes and the cache contents. To serve the users' requests, in the delivery phase, the server transmits signals that satisfy the users' distortion requirements. An optimization problem with the objective of minimizing the worst-case delivery load subject to the total cache memory budget and users' distortion requirements is formulated. The optimal solution for uncoded placement and linear delivery is characterized explicitly and is shown to exhibit a threshold policy with respect to the total cache memory budget. As a byproduct of the study, a caching scheme for systems with fixed cache sizes that outperforms the state-of-art is presented.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
On the Capacity Region of the Deterministic Y-Channel with Common and Private Messages
Authors:
Mohamed S. Ibrahim,
Mohammed Nafie,
Yahya Mohasseb
Abstract:
In multi user Gaussian relay networks, it is desirable to transmit private information to each user as well as common information to all of them. However, the capacity region of such networks with both kinds of information is not easy to characterize. The prior art used simple linear deterministic models in order to approximate the capacities of these Gaussian networks. This paper discusses the ca…
▽ More
In multi user Gaussian relay networks, it is desirable to transmit private information to each user as well as common information to all of them. However, the capacity region of such networks with both kinds of information is not easy to characterize. The prior art used simple linear deterministic models in order to approximate the capacities of these Gaussian networks. This paper discusses the capacity region of the deterministic Y-channel with private and common messages. In this channel, each user aims at delivering two private messages to the other two users in addition to a common message directed towards both of them. As there is no direct link between the users, all messages must pass through an intermediate relay. We present outer-bounds on the rate region using genie aided and cut-set bounds. Then, we develop a greedy scheme to define an achievable region and show that at a certain number of levels at the relay, our achievable region coincides with the upper bound. Finally, we argue that these bounds for this setup are not sufficient to characterize the capacity region.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
Tuning electronic properties in graphene quantum dots by chemical functionalization: Density functional theory calculations
Authors:
Hazem Abdelsalam,
Hanan Elhaes,
Medhat A. Ibrahim
Abstract:
The electronic energy gap and total dipole moment of chemically functionalized hexagonal and triangular graphene quantum dots are investigated by the density functional theory. It has been found that the energy gap can be efficiently tuned in the selected clusters by edge passivation with different elements or groups. Edge passivation with oxygen provides a considerable decrease of the large energ…
▽ More
The electronic energy gap and total dipole moment of chemically functionalized hexagonal and triangular graphene quantum dots are investigated by the density functional theory. It has been found that the energy gap can be efficiently tuned in the selected clusters by edge passivation with different elements or groups. Edge passivation with oxygen provides a considerable decrease of the large energy gap observed in hexagonal nanodots. The edge states and energy gap in triangular graphene quantum dots can also be manipulated by passivation with fluorine. The total dipole moment strongly depends on: (a) the shape and edge termination of the graphene quantum dot, (b) the attached group, and (c) the position to which the groups are attached. With respect to the shape, edge termination, and the attached group the chemically modified hexagonal-armchair quantum dot has the highest total dipole moment. Depending on the position of the attached groups, the total dipole can be increased, decreased, or eliminated. The significant features, the tunable energy gap and total dipole moment, of the functionalized graphene quantum dots are confirmed by the stability calculations. The obtained positive binding energy and positive frequencies in the infrared spectra imply that all the selected clusters are stable under edge functionalization and passivation with various groups and elements.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
First principles study of edge carboxylated graphene quantum dots
Authors:
Hazem Abdelsalam,
Hanan Elhaes,
Medhat A. Ibrahim
Abstract:
The structure stability and electronic properties of edge carboxylated hexagonal and triangular graphene quantum dots are investigated by using density functional theory. The calculated binding energies show that the hexagonal clusters with armchair edges have the highest stability among all other flakes. The binding energy of carboxylated graphene quantum dots increases by increasing the number o…
▽ More
The structure stability and electronic properties of edge carboxylated hexagonal and triangular graphene quantum dots are investigated by using density functional theory. The calculated binding energies show that the hexagonal clusters with armchair edges have the highest stability among all other flakes. The binding energy of carboxylated graphene quantum dots increases by increasing the number of attached carboxyl groups. Our study shows that the total dipole moment significantly increases by adding COOH with the highest values observed in triangular clusters. The edge states in triangular graphene with zigzag edges produce completely different energy spectrum from other shapes as (a) the energy gap in triangular zigzag cluster is very small compared to other clusters and (b) the highest occupied molecular orbital is localized at the edges which is in contrast to other clusters where it is distributed over the cluster surface. The enhanced reactivity and the controllable energy gap by shape and edge termination make graphene quantum dots ideal nanodevices for various applications such as sensors. The infrared spectra for different flakes are presented for confirmation and detection of the obtained results.
△ Less
Submitted 9 December, 2017;
originally announced December 2017.
-
Bivariate Exponentiated Generalized Linear Exponential Distribution with Applications in Reliability Analysis
Authors:
Mohamed Ibrahim,
M. S. Eliwa,
M. El- Morshedy
Abstract:
The aim of this paper, is to define a bivariate exponentiated generalized linear exponential distribution based on Marshall-Olkin shock model. Statistical and reliability properties of this distribution are discussed. This includes quantiles, moments, stress-strength reliability, joint reliability function, joint reversed (hazard) rates functions and joint mean waiting time function. Moreover, the…
▽ More
The aim of this paper, is to define a bivariate exponentiated generalized linear exponential distribution based on Marshall-Olkin shock model. Statistical and reliability properties of this distribution are discussed. This includes quantiles, moments, stress-strength reliability, joint reliability function, joint reversed (hazard) rates functions and joint mean waiting time function. Moreover, the hazard rate, the availability and the mean residual lifetime functions for a parallel system, are established. One data set is analyzed, and it is observed that, the proposed distribution provides a better fit than Marshall-Olkin bivariate exponential, bivariate generalized exponential and bivariate generalized linear failure rate distributions. Simulation studies are presented to estimate both the relative absolute bias, and the relative mean square error for the distribution parameters based on complete data.
△ Less
Submitted 2 October, 2017;
originally announced October 2017.
-
Active Learning for Structured Prediction from Partially Labeled Data
Authors:
Mehran Khodabandeh,
Zhiwei Deng,
Mostafa S. Ibrahim,
Shinichi Satoh,
Greg Mori
Abstract:
We propose a general purpose active learning algorithm for structured prediction, gathering labeled data for training a model that outputs a set of related labels for an image or video. Active learning starts with a limited initial training set, then iterates querying a user for labels on unlabeled data and retraining the model. We propose a novel algorithm for selecting data for labeling, choosin…
▽ More
We propose a general purpose active learning algorithm for structured prediction, gathering labeled data for training a model that outputs a set of related labels for an image or video. Active learning starts with a limited initial training set, then iterates querying a user for labels on unlabeled data and retraining the model. We propose a novel algorithm for selecting data for labeling, choosing examples to maximize expected information gain based on belief propagation inference. This is a general purpose method and can be applied to a variety of tasks or models. As a specific example we demonstrate this framework for learning to recognize human actions and group activities in video sequences. Experiments show that our proposed algorithm outperforms previous active learning methods and can achieve accuracy comparable to fully supervised methods while utilizing significantly less labeled data.
△ Less
Submitted 9 June, 2017; v1 submitted 7 June, 2017;
originally announced June 2017.
-
Generic Tubelet Proposals for Action Localization
Authors:
Jiawei He,
Mostafa S. Ibrahim,
Zhiwei Deng,
Greg Mori
Abstract:
We develop a novel framework for action localization in videos. We propose the Tube Proposal Network (TPN), which can generate generic, class-independent, video-level tubelet proposals in videos. The generated tubelet proposals can be utilized in various video analysis tasks, including recognizing and localizing actions in videos. In particular, we integrate these generic tubelet proposals into a…
▽ More
We develop a novel framework for action localization in videos. We propose the Tube Proposal Network (TPN), which can generate generic, class-independent, video-level tubelet proposals in videos. The generated tubelet proposals can be utilized in various video analysis tasks, including recognizing and localizing actions in videos. In particular, we integrate these generic tubelet proposals into a unified temporal deep network for action classification. Compared with other methods, our generic tubelet proposal method is accurate, general, and is fully differentiable under a smoothL1 loss function. We demonstrate the performance of our algorithm on the standard UCF-Sports, J-HMDB21, and UCF-101 datasets. Our class-independent TPN outperforms other tubelet generation methods, and our unified temporal deep network achieves state-of-the-art localization results on all three datasets.
△ Less
Submitted 30 May, 2017;
originally announced May 2017.
-
Design and Analysis of Compressive Antenna Arrays for Direction of Arrival Estimation
Authors:
Mohamed Ibrahim,
Venkatesh Ramireddy,
Anastasia Lavrenko,
Jonas König,
Florian Römer,
Markus Landmann,
Marcus Grossmann,
Giovanni Del Galdo,
Reiner S. Thomä
Abstract:
In this paper we investigate the design of compressive antenna arrays for direction of arrival (DOA) estimation that aim to provide a larger aperture with a reduced hardware complexity by a linear combination of the antenna outputs to a lower number of receiver channels. We present a basic receiver architecture of such a compressive array and introduce a generic system model that includes differen…
▽ More
In this paper we investigate the design of compressive antenna arrays for direction of arrival (DOA) estimation that aim to provide a larger aperture with a reduced hardware complexity by a linear combination of the antenna outputs to a lower number of receiver channels. We present a basic receiver architecture of such a compressive array and introduce a generic system model that includes different options for the hardware implementation. We then discuss the design of the analog combining network that performs the receiver channel reduction, and propose two design approaches. The first approach is based on the spatial correlation function which is a low-complexity scheme that in certain cases admits a closed-form solution. The second approach is based on minimizing the Cramer-Rao Bound (CRB) with the constraint to limit the probability of false detection of paths to a pre-specified level. Our numerical simulations demonstrate the superiority of the proposed optimized compressive arrays compared to the sparse arrays of the same complexity and to compressive arrays with randomly chosen combining kernels.
△ Less
Submitted 11 November, 2016;
originally announced November 2016.
-
Hierarchical Deep Temporal Models for Group Activity Recognition
Authors:
Mostafa S. Ibrahim,
Srikanth Muralidharan,
Zhiwei Deng,
Arash Vahdat,
Greg Mori
Abstract:
In this paper we present an approach for classifying the activity performed by a group of people in a video sequence. This problem of group activity recognition can be addressed by examining individual person actions and their relations. Temporal dynamics exist both at the level of individual person actions as well as at the level of group activity. Given a video sequence as input, methods can be…
▽ More
In this paper we present an approach for classifying the activity performed by a group of people in a video sequence. This problem of group activity recognition can be addressed by examining individual person actions and their relations. Temporal dynamics exist both at the level of individual person actions as well as at the level of group activity. Given a video sequence as input, methods can be developed to capture these dynamics at both person-level and group-level detail. We build a deep model to capture these dynamics based on LSTM (long short-term memory) models. In order to model both person-level and group-level dynamics, we present a 2-stage deep temporal model for the group activity recognition problem. In our approach, one LSTM model is designed to represent action dynamics of individual people in a video sequence and another LSTM model is designed to aggregate person-level information for group activity recognition. We collected a new dataset consisting of volleyball videos labeled with individual and group activities in order to evaluate our method. Experimental results on this new Volleyball Dataset and the standard benchmark Collective Activity Dataset demonstrate the efficacy of the proposed models.
△ Less
Submitted 9 July, 2016;
originally announced July 2016.
-
Connecting every bit of knowledge: The structure of Wikipedia's First Link Network
Authors:
Mark Ibrahim,
Christopher M. Danforth,
Peter Sheridan Dodds
Abstract:
Apples, porcupines, and the most obscure Bob Dylan song---is every topic a few clicks from Philosophy? Within Wikipedia, the surprising answer is yes: nearly all paths lead to Philosophy. Wikipedia is the largest, most meticulously indexed collection of human knowledge ever amassed. More than information about a topic, Wikipedia is a web of naturally emerging relationships. By following the first…
▽ More
Apples, porcupines, and the most obscure Bob Dylan song---is every topic a few clicks from Philosophy? Within Wikipedia, the surprising answer is yes: nearly all paths lead to Philosophy. Wikipedia is the largest, most meticulously indexed collection of human knowledge ever amassed. More than information about a topic, Wikipedia is a web of naturally emerging relationships. By following the first link in each article, we algorithmically construct a directed network of all 4.7 million articles: Wikipedia's First Link Network. Here, we study the English edition of Wikipedia's First Link Network for insight into how the many articles on inventions, places, people, objects, and events are related and organized.
By traversing every path, we measure the accumulation of first links, path lengths, groups of path-connected articles, and cycles. We also develop a new method, traversal funnels, to measure the influence each article exerts in sha** the network. Traversal funnels provides a new measure of influence for directed networks without spill-over into cycles, in contrast to traditional network centrality measures. Within Wikipedia's First Link Network, we find scale-free distributions describe path length, accumulation, and influence. Far from dispersed, first links disproportionately accumulate at a few articles---flowing from specific to general and culminating around fundamental notions such as Community, State, and Science. Philosophy directs more paths than any other article by two orders of magnitude. We also observe a gravitation towards topical articles such as Health Care and Fossil Fuel. These findings enrich our view of the connections and structure of Wikipedia's ever growing store of knowledge.
△ Less
Submitted 6 December, 2016; v1 submitted 1 May, 2016;
originally announced May 2016.
-
A Hierarchical Deep Temporal Model for Group Activity Recognition
Authors:
Moustafa Ibrahim,
Srikanth Muralidharan,
Zhiwei Deng,
Arash Vahdat,
Greg Mori
Abstract:
In group activity recognition, the temporal dynamics of the whole activity can be inferred based on the dynamics of the individual people representing the activity. We build a deep model to capture these dynamics based on LSTM (long-short term memory) models. To make use of these ob- servations, we present a 2-stage deep temporal model for the group activity recognition problem. In our model, a LS…
▽ More
In group activity recognition, the temporal dynamics of the whole activity can be inferred based on the dynamics of the individual people representing the activity. We build a deep model to capture these dynamics based on LSTM (long-short term memory) models. To make use of these ob- servations, we present a 2-stage deep temporal model for the group activity recognition problem. In our model, a LSTM model is designed to represent action dynamics of in- dividual people in a sequence and another LSTM model is designed to aggregate human-level information for whole activity understanding. We evaluate our model over two datasets: the collective activity dataset and a new volley- ball dataset. Experimental results demonstrate that our proposed model improves group activity recognition perfor- mance with compared to baseline methods.
△ Less
Submitted 5 April, 2016; v1 submitted 18 November, 2015;
originally announced November 2015.
-
Security Analysis of Secure Force Algorithm for Wireless Sensor Networks
Authors:
Shujaat Khan,
Muhammad Sohail Ibrahim,
Kafeel Ahmed Khan,
Mansoor Ebrahim
Abstract:
In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead.…
▽ More
In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead. The objective of this research work is to perform a security analysis and performance evaluation of recently proposed Secure Force algorithm. This paper shows the comparison of Secure Force 64, 128, and 192 bit architecture on the basis of avalanche effect (key sensitivity), entropy change analysis, image histogram, and computational time. Moreover, based on the evaluation results, the paper also suggests the possible solutions for the weaknesses of the SF algorithm.
△ Less
Submitted 8 September, 2015; v1 submitted 3 September, 2015;
originally announced September 2015.
-
A novel variational model for image registration using Gaussian curvature
Authors:
Mazlinda Ibrahim,
Ke Chen,
Carlos Brito-Loeza
Abstract:
Image registration is one important task in many image processing applications. It aims to align two or more images so that useful information can be extracted through comparison, combination or superposition. This is achieved by constructing an optimal trans- formation which ensures that the template image becomes similar to a given reference image. Although many models exist, designing a model c…
▽ More
Image registration is one important task in many image processing applications. It aims to align two or more images so that useful information can be extracted through comparison, combination or superposition. This is achieved by constructing an optimal trans- formation which ensures that the template image becomes similar to a given reference image. Although many models exist, designing a model capable of modelling large and smooth deformation field continues to pose a challenge. This paper proposes a novel variational model for image registration using the Gaussian curvature as a regulariser. The model is motivated by the surface restoration work in geometric processing [Elsey and Esedoglu, Multiscale Model. Simul., (2009), pp. 1549-1573]. An effective numerical solver is provided for the model using an augmented Lagrangian method. Numerical experiments can show that the new model outperforms three competing models based on, respectively, a linear curvature [Fischer and Modersitzki, J. Math. Imaging Vis., (2003), pp. 81- 85], the mean curvature [Chumchob, Chen and Brito, Multiscale Model. Simul., (2011), pp. 89-128] and the diffeomorphic demon model [Vercauteren at al., NeuroImage, (2009), pp. 61-72] in terms of robustness and accuracy.
△ Less
Submitted 28 April, 2015;
originally announced April 2015.
-
Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting
Authors:
Abdelrahman M. Ibrahim,
Ozgur Ercetin,
Tamer ElBatt
Abstract:
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the…
▽ More
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the performance of a slotted Aloha random access wireless network consisting of two types of nodes, namely Type I which has unlimited energy supply and Type II which is solely powered by an RF energy harvesting circuit. The transmissions of a Type I node are recycled by a Type II node to replenish its battery. We characterize an inner bound on the stable throughput region under half-duplex and full-duplex energy harvesting paradigms as well as for the finite capacity battery case. We present numerical results that validate our analytical results, and demonstrate their utility for the analysis of the exact system.
△ Less
Submitted 27 July, 2015; v1 submitted 27 January, 2015;
originally announced January 2015.
-
Electronic structure and energy level schemes of RE3+:LaSi3N5 and RE2+:LaSi3N5-xOx phosphors (RE= Ce, Pr, Nd, Pm, Sm, Eu) from first principles
Authors:
Ismail A. M. Ibrahim,
Zoltan Lences,
Pavol Sajgalik,
Lubomir Benco,
Martijn Marsman
Abstract:
First principles calculations of rare earth (RE)-doped LaSi3N5 host lattice are performed to obtain the electronic structure, the band gap (BG), and the character of electronic transitions. Do** with both trivalent and bivalent RE cations is inspected. RE 4f states form two bands of occupied and unoccupied states separated by ~5 eV. In RE3+-doped compounds 4f states are shifted by ~6 eV to more…
▽ More
First principles calculations of rare earth (RE)-doped LaSi3N5 host lattice are performed to obtain the electronic structure, the band gap (BG), and the character of electronic transitions. Do** with both trivalent and bivalent RE cations is inspected. RE 4f states form two bands of occupied and unoccupied states separated by ~5 eV. In RE3+-doped compounds 4f states are shifted by ~6 eV to more negative energies compared with RE2+-compounds. This stabilization causes that RE3+ 4f bands are in a different position relative to the valence band and the conduction band than RE2+ 4f bands and therefore different electronic transitions apply. BG of RE3+-compounds decreases from ~4.6 eV (Ce) to ~0.5 eV (Eu). Except for Ce3+, exhibiting the 4f-5d transition, other RE3+-compounds show the charge transfer of the p - 4f character. BG of RE2+-compounds increases from ~0.80 eV (Ce, Pr) to ~0.95 eV (Nd, Pm), ~1.43 eV (Sm), and ~3.28 eV (Eu) and the electronic transition is of the 4f-5d character. The energy level scheme constructed from ab initio calculated electronic structures agrees well with the experimental energy level diagram. The agreement demonstrates the reliability of the hybrid functional HSE06 to describe correctly bands of nonbonding RE 4f electrons.
△ Less
Submitted 20 October, 2014;
originally announced October 2014.
-
Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes
Authors:
Abdelrahman M. Ibrahim,
Tamer ElBatt,
Amr El-Keyi
Abstract:
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using s…
▽ More
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
△ Less
Submitted 13 September, 2013;
originally announced September 2013.
-
Unconventional TV Detection using Mobile Devices
Authors:
Mohamed Ibrahim,
Ahmed Saeed,
Moustafa Youssef,
Khaled A. Harras
Abstract:
Recent studies show that the TV viewing experience is changing giving the rise of trends like "multi-screen viewing" and "connected viewers". These trends describe TV viewers that use mobile devices (e.g. tablets and smart phones) while watching TV. In this paper, we exploit the context information available from the ubiquitous mobile devices to detect the presence of TVs and track the media being…
▽ More
Recent studies show that the TV viewing experience is changing giving the rise of trends like "multi-screen viewing" and "connected viewers". These trends describe TV viewers that use mobile devices (e.g. tablets and smart phones) while watching TV. In this paper, we exploit the context information available from the ubiquitous mobile devices to detect the presence of TVs and track the media being viewed. Our approach leverages the array of sensors available in modern mobile devices, e.g. cameras and microphones, to detect the location of TV sets, their state (ON or OFF), and the channels they are currently tuned to. We present the feasibility of the proposed sensing technique using our implementation on Android phones with different realistic scenarios. Our results show that in a controlled environment a detection accuracy of 0.978 F-measure could be achieved.
△ Less
Submitted 16 May, 2013;
originally announced June 2013.
-
Constructing Even Order Magic Squares By Consecutive Numbering
Authors:
A. M. Ibrahim,
H. M. Jibril,
A. Umar
Abstract:
The aim of this note is to introduce fastest new general methods for the construction of double and single even order magic squares. As in [5], the method for double even order magic squares is fairly straight-forward but some adjustments are necessary for the single even order magic squares.
The aim of this note is to introduce fastest new general methods for the construction of double and single even order magic squares. As in [5], the method for double even order magic squares is fairly straight-forward but some adjustments are necessary for the single even order magic squares.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Towards Dynamic Real-Time Geo-location Databases for TV White Spaces
Authors:
Ahmed Saeed,
Mohamed Ibrahim,
Moustafa Youssef,
Khaled A. Harras
Abstract:
Recent FCC regulations on TV white spaces allow geo-location databases to be the sole source of spectrum information for White Space Devices (WSDs). Geo-location databases protect TV band incumbents by kee** track of TV transmitters and their protected service areas based on their location, transmission parameters and sophisticated propagation models. In this article, we argue that kee** track…
▽ More
Recent FCC regulations on TV white spaces allow geo-location databases to be the sole source of spectrum information for White Space Devices (WSDs). Geo-location databases protect TV band incumbents by kee** track of TV transmitters and their protected service areas based on their location, transmission parameters and sophisticated propagation models. In this article, we argue that kee** track of both TV transmitters and TV receivers (i.e. TV sets) can achieve significant improvement in the availability of white spaces. We first identify wasted spectrum opportunities, both temporal and spatial, due to the current approach of white spaces detection. We then propose DynaWhite, a cloud-based architecture that orchestrates the detection and dissemination of highly-dynamic, real-time, and fine-grained TV white space information. DynaWhite introduces the next generation of geo-location databases by combining traditional sensing techniques with a novel unconventional sensing approach based on the detection of the passive TV receivers using standard cell phones. We present a quantitative evaluation of the potential gains in white space availability for large scale deployments of DynaWhite. We finally identify challenges that need to be addressed in the research community in order to exploit this potential for leveraging dynamic real-time fine-grained TV white spaces.
△ Less
Submitted 16 March, 2013;
originally announced March 2013.
-
A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction
Authors:
Maged hamada Ibrahim
Abstract:
In an electronic auction protocol, the main participants are the seller, a set of trusted auctioneer(s) and the set of bidders. In this paper we consider the situation where there is a seller and a set of n bidders intending to come to an agreement on the selling price of a certain good. Full private or bidder-resolved auction means that this agreement is reached without the help of trusted partie…
▽ More
In an electronic auction protocol, the main participants are the seller, a set of trusted auctioneer(s) and the set of bidders. In this paper we consider the situation where there is a seller and a set of n bidders intending to come to an agreement on the selling price of a certain good. Full private or bidder-resolved auction means that this agreement is reached without the help of trusted parties or auctioneers. Therefore, only the seller and the set of bidders are involved, the role of the auctioneers becomes obsolete in this case. property.We propose a new technique for the design of a full private sealed-bid auction protocol.
△ Less
Submitted 12 November, 2012;
originally announced November 2012.
-
Operation of the Intensity Monitors in Beam Transport Lines at Fermilab During Run II
Authors:
J. Crisp,
B. Fellenz,
J. Fitzgerald,
D. Heikkinen,
M. A. Ibrahim
Abstract:
The intensity of charged particle beams at Fermilab must be kept within pre-determined safety and operational envelopes in part by assuring all beam within a few percent has been transported from any source to destination. Beam intensity monitors with toroidial pickups provide such beam intensity measurements in the transport lines between accelerators at FNAL. During Run II, much effort was made…
▽ More
The intensity of charged particle beams at Fermilab must be kept within pre-determined safety and operational envelopes in part by assuring all beam within a few percent has been transported from any source to destination. Beam intensity monitors with toroidial pickups provide such beam intensity measurements in the transport lines between accelerators at FNAL. During Run II, much effort was made to continually improve the resolution and accuracy of the system.
△ Less
Submitted 21 September, 2012;
originally announced September 2012.
-
High temperature structural and magnetic properties of cobalt nanowires
Authors:
Kahina Ait Atmane,
Fatih Zighem,
Yaghoub Soumare,
Mona Ibrahim,
Rym Boubekri,
Thomas Maurer,
Jérémie Margueritat,
Jean-Yves Piquemal,
Frédéric Ott,
Grégory Chaboussant,
Frédéric Schoenstein,
Noureddine Jouini,
Guillaume Viau
Abstract:
We present in this paper the structural and magnetic properties of high aspect ratio Co nanoparticles (~10) at high temperatures (up to 623 K) using in situ X ray diffraction (XRD) and SQUID characterizations. We show that the anisotropic shapes, the structural and texture properties are preserved up to 500 K. The coercivity can be modelled by u0Hc=2(Kmc+Kshape)/Ms with Kmc the magnetocrystalline…
▽ More
We present in this paper the structural and magnetic properties of high aspect ratio Co nanoparticles (~10) at high temperatures (up to 623 K) using in situ X ray diffraction (XRD) and SQUID characterizations. We show that the anisotropic shapes, the structural and texture properties are preserved up to 500 K. The coercivity can be modelled by u0Hc=2(Kmc+Kshape)/Ms with Kmc the magnetocrystalline anisotropy constant, Kshape the shape anisotropy constant and Ms the saturation magnetization. Hc decreases linearly when the temperature is increased due to the loss of the Co magnetocrystalline anisotropy contribution. At 500K, 50% of the room temperature coercivity is preserved corresponding to the shape anisotropy contribution only. We show that the coercivity drop is reversible in the range 300 - 500 K in good agreement with the absence of particle alteration. Above 525 K, the magnetic properties are irreversibly altered either by sintering or by oxidation.
△ Less
Submitted 28 August, 2012; v1 submitted 21 August, 2012;
originally announced August 2012.
-
Performance Evaluation of Aodv&DSR with Varying Pause Time & Node Density Over TCP&CBR Connections in Vanet
Authors:
Bijan Paul,
Md. Ibrahim,
Md. Abu Naser Bikas
Abstract:
Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make it different from other ad hoc network as well as difficult to define any exact mobility model and routing protocols because of their high mobility and changing mobility pattern. Hence performance of rout…
▽ More
Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make it different from other ad hoc network as well as difficult to define any exact mobility model and routing protocols because of their high mobility and changing mobility pattern. Hence performance of routing protocols can vary with the various parameters such as speed, pause time, node density and traffic scenarios. In this research paper, the performance of two on-demand routing protocols AODV & DSR has been analyzed by means of packet delivery ratio, loss packet ratio & average end-to-end delay with varying pause time and node density under TCP & CBR connection.
△ Less
Submitted 5 April, 2012;
originally announced April 2012.
-
Experimental Analysis of AODV & DSR over TCP & CBR Connections with Varying Speed and Node Density in VANET
Authors:
Bijan Paul,
Md. Ibrahim,
Md. Abu Naser Bikas
Abstract:
Vehicular adhoc network or VANET is special types of adhoc network consists of moving cars referred to as nodes; provide a way to exchange any information between cars without depending on fixed infrastructure. For efficient communication between nodes various routing protocols and mobility models have been proposed based on different scenarios. Due to rapid topology changing and frequent disconne…
▽ More
Vehicular adhoc network or VANET is special types of adhoc network consists of moving cars referred to as nodes; provide a way to exchange any information between cars without depending on fixed infrastructure. For efficient communication between nodes various routing protocols and mobility models have been proposed based on different scenarios. Due to rapid topology changing and frequent disconnection makes it difficult to select suitable mobility model and routing protocols. Hence performance evaluation and comparison between routing protocols is required to understand any routing protocol as well as to develop a new routing protocol. In this research paper, the performance of two on-demand routing protocols AODV & DSR has been analyzed by means of packet delivery ratio, loss packet ratio & average end-to-end delay with varying speed limit and node density under TCP & CBR connection.
△ Less
Submitted 5 April, 2012;
originally announced April 2012.
-
VANET Routing Protocols: Pros and Cons
Authors:
Bijan Paul,
Md. Ibrahim,
Md. Abu Naser Bikas
Abstract:
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET…
▽ More
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.
△ Less
Submitted 5 April, 2012;
originally announced April 2012.
-
Performance Evaluation of AODV & DSR with Varying Pause Time & Speed Time Over TCP & CBR Connections in VANET
Authors:
Bijan Paul,
Md. Ibrahim,
Md. Abu Naser Bikas
Abstract:
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make it different from other ad hoc network as well as difficult to define any exact mobility model…
▽ More
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Vehicular ad hoc network is formed by cars which are called nodes; allow them to communicate with one another without using any fixed road side unit. It has some unique characteristics which make it different from other ad hoc network as well as difficult to define any exact mobility model and routing protocols because of their high mobility and changing mobility pattern. Hence performance of routing protocols can vary with the various parameters such as speed, pause time, node density and traffic scenarios. In this research paper, the performance of two on-demand routing protocols AODV & DSR has been analyzed by means of packet delivery ratio, loss packet ratio & average end-to-end delay with varying pause time, speed time and node density under TCP & CBR connection.
△ Less
Submitted 14 March, 2012;
originally announced March 2012.
-
CellSense: An Accurate Energy-Efficient GSM Positioning System
Authors:
Mohamed Ibrahim,
Moustafa Youssef
Abstract:
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a prob- abilistic RSSI-based fingerprinting location determi- nation system for GSM phones. We discuss the chal- lenges of implementing a probabilistic fingerp…
▽ More
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a prob- abilistic RSSI-based fingerprinting location determi- nation system for GSM phones. We discuss the chal- lenges of implementing a probabilistic fingerprinting localization technique in GSM networks and present the details of the CellSense systemand how it addresses these challenges. We then extend the proposed system using a hybrid technique that combines probabilistic and deterministic estimation to achieve both high ac- curacy and low computational overhead.Moreover, the accuracy of the hybrid technique is robust to changes in its parameter values. To evaluate our proposed system, we implemented CellSense on Android-based phones. Results from two different testbeds, represent- ing urban and rural environments, for three differ- ent cellular providers show that CellSense provides at least 108.57% enhancement in accuracy in rural areas and at least 89.03% in urban areas compared to the current state of the art RSSI-based GSM localization systems. In additional, the proposed hybrid technique provides more than 6 times and 5.4 times reduction in computational requirements compared to the state of the art RSSI-based GSM localization systems for the rural and urban testbeds respectively.We also evaluate the effect of changing the different system parameters on the accuracy-complexity tradeoff and how the cell towers density and fingerprint density affect the system performance.
△ Less
Submitted 15 October, 2011;
originally announced October 2011.
-
A Hidden Markov Model for Localization Using Low-End GSM Cell Phones
Authors:
Mohamed Ibrahim,
Moustafa Youssef
Abstract:
Research in location determination for GSM phones has gained interest recently as it enables a wide set of location based services. RSSI-based techniques have been the preferred method for GSM localization on the handset as RSSI information is available in all cell phones. Although the GSM standard allows for a cell phone to receive signal strength information from up to seven cell towers, many of…
▽ More
Research in location determination for GSM phones has gained interest recently as it enables a wide set of location based services. RSSI-based techniques have been the preferred method for GSM localization on the handset as RSSI information is available in all cell phones. Although the GSM standard allows for a cell phone to receive signal strength information from up to seven cell towers, many of today's cell phones are low-end phones, with limited API support, that gives only information about the associated cell tower. In addition, in many places in the world, the density of cell towers is very small and therefore, the available cell tower information for localization is very limited. This raises the challenge of accurately determining the cell phone location with very limited information, mainly the RSSI of the associated cell tower. In this paper we propose a Hidden Markov Model based solution that leverages the signal strength history from only the associated cell tower to achieve accurate GSM localization. We discuss the challenges of implementing our system and present the details of our system and how it addresses the challenges. To evaluate our proposed system, we implemented it on Androidbased phones. Results for two different testbeds, representing urban and rural environments, show that our system provides at least 156% enhancement in median error in rural areas and at least 68% enhancement in median error in urban areas compared to current RSSI-based GSM localization systems
△ Less
Submitted 17 October, 2010;
originally announced October 2010.
-
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
Authors:
Saipunidzam Mahamad,
Mohammad Noor Ibrahim,
Shakirah Mohd Taib
Abstract:
M-Learning is a new learning paradigm of the new social structure with mobile and wireless technologies.Smart school is one of the four flagship applications for Multimedia Super Corridor (MSC) under Malaysian government initiative to improve education standard in the country. With the advances of mobile devices technologies, mobile learning could help the government in realizing the initiative. T…
▽ More
M-Learning is a new learning paradigm of the new social structure with mobile and wireless technologies.Smart school is one of the four flagship applications for Multimedia Super Corridor (MSC) under Malaysian government initiative to improve education standard in the country. With the advances of mobile devices technologies, mobile learning could help the government in realizing the initiative. This paper discusses the prospect of implementing mobile learning for primary school students. It indicates significant and challenges and analysis of user perceptions on potential mobile applications through a survey done in primary school context. The authors propose the m-Learning for mathematics by allowing the extension of technology in the traditional classroom in term of learning and teaching.
△ Less
Submitted 6 September, 2010;
originally announced September 2010.
-
Comparative Study of Statistical Skin Detection Algorithms for Sub-Continental Human Images
Authors:
Mirza Rehenuma Tabassum,
Alim Ul Gias,
Md. Mostafa Kamal,
Hossain Muhammad Muctadir,
Muhammad Ibrahim,
Asif Khan Shakir,
Asif Imran,
Saiful Islamm,
Md. Golam Rabbani,
Shah Mostafa Khaled,
Md. Saiful Islam,
Zerina Begum
Abstract:
Object detection has been a focus of research in human-computer interaction. Skin area detection has been a key to different recognitions like face recognition, human motion detection, pornographic and nude image prediction, etc. Most of the research done in the fields of skin detection has been trained and tested on human images of African, Mongolian and Anglo-Saxon ethnic origins. Although there…
▽ More
Object detection has been a focus of research in human-computer interaction. Skin area detection has been a key to different recognitions like face recognition, human motion detection, pornographic and nude image prediction, etc. Most of the research done in the fields of skin detection has been trained and tested on human images of African, Mongolian and Anglo-Saxon ethnic origins. Although there are several intensity invariant approaches to skin detection, the skin color of Indian sub-continentals have not been focused separately. The approach of this research is to make a comparative study between three image segmentation approaches using Indian sub-continental human images, to optimize the detection criteria, and to find some efficient parameters to detect the skin area from these images. The experiments observed that HSV color model based approach to Indian sub-continental skin detection is more suitable with considerable success rate of 91.1% true positives and 88.1% true negatives.
△ Less
Submitted 25 August, 2010;
originally announced August 2010.
-
CellSense: A Probabilistic RSSI-based GSM Positioning System
Authors:
Mohamed Ibrahim,
Moustafa Youssef
Abstract:
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a prob- abilistic RSSI-based fingerprinting location determina- tion system for GSM phones.We discuss the challenges of implementing a probabilistic fingerprin…
▽ More
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a prob- abilistic RSSI-based fingerprinting location determina- tion system for GSM phones.We discuss the challenges of implementing a probabilistic fingerprinting local- ization technique in GSM networks and present the details of the CellSense system and how it addresses the challenges. To evaluate our proposed system, we implemented CellSense on Android-based phones. Re- sults for two different testbeds, representing urban and rural environments, show that CellSense provides at least 23.8% enhancement in accuracy in rural areas and at least 86.4% in urban areas compared to other RSSI-based GSMlocalization systems. This comes with a minimal increase in computational requirements. We also evaluate the effect of changing the different system parameters on the accuracy-complexity tradeoff.
△ Less
Submitted 19 April, 2010;
originally announced April 2010.
-
Carrier-induced ferromagnetism in n-type ZnMnAlO and ZnCoAlO thin films at room temperature
Authors:
XH Xu,
AJ Behan,
M Ziese,
HJ Blythe,
JR Neal,
A Mokhtari,
MR Ibrahim,
AM Fox,
GA Gehring
Abstract:
The realization of semiconductors that are ferromagnetic above room temperature will potentially lead to a new generation of spintronic devices with revolutionary electrical and optical properties. Transition temperatures in doped ZnO are high but, particularly for Mn do**, the reported moments have been small. We show that by careful control of both oxygen deficiency and aluminium do** the…
▽ More
The realization of semiconductors that are ferromagnetic above room temperature will potentially lead to a new generation of spintronic devices with revolutionary electrical and optical properties. Transition temperatures in doped ZnO are high but, particularly for Mn do**, the reported moments have been small. We show that by careful control of both oxygen deficiency and aluminium do** the ferromagnetic moments measured at room temperature in n-type ZnMnO and ZnCoO are close to the ideal values of 5mB and 3mB respectively. Furthermore a clear correlation between the magnetisation per transition metal ion and the ratio of the number of carriers to the number of transition metal donors was established as is expected for carrier induced ferromagnetism for both the Mn and Co doped films. The dependence of the magnetisation on carrier density is similar to that predicted for the transition temperature for a dilute magnetic semiconductor in which the exchange between the transition metal ions is through the free carriers.
△ Less
Submitted 26 May, 2006;
originally announced May 2006.
-
Algebraic Models: Coordinates, Scales, and Dynamical Symmetries
Authors:
Michael W. N. Ibrahim
Abstract:
We discuss the variety of coordinates often used to characterize the coherent state classical limit of an algebraic model. We show selection of appropriate coordinates naturally motivates a procedure to generate a single particle Schrödinger hamiltonian which, for low energy states, gives equivalent results to a bosonic algebraic model to leading order in $N$. The process is used to study the as…
▽ More
We discuss the variety of coordinates often used to characterize the coherent state classical limit of an algebraic model. We show selection of appropriate coordinates naturally motivates a procedure to generate a single particle Schrödinger hamiltonian which, for low energy states, gives equivalent results to a bosonic algebraic model to leading order in $N$. The process is used to study the associated geometries of the dynamical symmetries of U(3). By demanding that the inner product be preserved in the Schrödinger picture we conclude that different dynamical symmetries correspond to different scales.
△ Less
Submitted 14 May, 2000;
originally announced May 2000.
-
A Hybrid Algebraic/Schrödinger Approach to the 2D Franck-Condon Problem
Authors:
Michael W. N. Ibrahim
Abstract:
We use recent results regarding the geometry of the U(3) bosonic algebraic model to motivate a hybrid algebraic-Schrödinger approach to the 2D Franck-Condon problem analogous to 1D approaches. This approach allows one to analyze bent to linear Franck-Condon transitions of triatomic molecules as well as clarifies the angular momentum dependance of the Franck-Condon intensities.
We use recent results regarding the geometry of the U(3) bosonic algebraic model to motivate a hybrid algebraic-Schrödinger approach to the 2D Franck-Condon problem analogous to 1D approaches. This approach allows one to analyze bent to linear Franck-Condon transitions of triatomic molecules as well as clarifies the angular momentum dependance of the Franck-Condon intensities.
△ Less
Submitted 14 May, 2000;
originally announced May 2000.