Skip to main content

Showing 1–50 of 143 results for author: Jaafar, A

.
  1. arXiv:2407.01498  [pdf, ps, other

    cs.IT

    The Inverted 3-Sum Box: General Formulation and Quantum Information Theoretic Optimality

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $N$-sum box protocol specifies a class of $\mathbb{F}_d$ linear functions $f(W_1,\cdots,W_K)=V_1W_1+V_2W_2+\cdots+V_KW_K\in\mathbb{F}_d^{m\times 1}$ that can be computed at information theoretically optimal communication cost (minimum number of qudits $Δ_1,\cdots,Δ_K$ sent by the transmitters Alice$_1$, Alice$_2$,$\cdots$, Alice$_K$, respectively, to the receiver, Bob, per computation instance… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.01259  [pdf, other

    stat.AP eess.SY math.NA stat.CO stat.ME

    Aging modeling and lifetime prediction of a proton exchange membrane fuel cell using an extended Kalman filter

    Authors: Serigne Daouda Pene, Antoine Picot, Fabrice Gamboa, Nicolas Savy, Christophe Turpin, Amine Jaafar

    Abstract: This article presents a methodology that aims to model and to provide predictive capabilities for the lifetime of Proton Exchange Membrane Fuel Cell (PEMFC). The approach integrates parametric identification, dynamic modeling, and Extended Kalman Filtering (EKF). The foundation is laid with the creation of a representative aging database, emphasizing specific operating conditions. Electrochemical… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  3. arXiv:2405.17792  [pdf, other

    hep-ex hep-ph

    JUNO Sensitivity to Invisible Decay Modes of Neutrons

    Authors: JUNO Collaboration, Angel Abusleme, Thomas Adam, Kai Adamowicz, Shakeel Ahmad, Rizwan Ahmed, Sebastiano Aiello, Fengpeng An, Qi An, Giuseppe Andronico, Nikolay Anfimov, Vito Antonelli, Tatiana Antoshkina, João Pedro Athayde Marcondes de André, Didier Auguste, Weidong Bai, Nikita Balashov, Wander Baldini, Andrea Barresi, Davide Basilico, Eric Baussan, Marco Bellato, Marco Beretta, Antonio Bergnoli, Daniel Bick , et al. (635 additional authors not shown)

    Abstract: We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation mode… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: 28 pages, 7 figures, 4 tables

  4. arXiv:2404.09141  [pdf, ps, other

    cs.IT

    Blind Interference Alignment for MapReduce: Exploiting Side-information with Reconfigurable Antennas

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: In order to explore how blind interference alignment (BIA) schemes may take advantage of side-information in computation tasks, we study the degrees of freedom (DoF) of a $K$ user wireless network setting that arises in full-duplex wireless MapReduce applications. In this setting the receivers are assumed to have reconfigurable antennas and channel knowledge, while the transmitters have neither, i… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  5. MR.CAP: Multi-Robot Joint Control and Planning for Object Transport

    Authors: Hussein Ali Jaafar, Cheng-Hao Kao, Sajad Saeedi

    Abstract: With the recent influx in demand for multi-robot systems throughout industry and academia, there is an increasing need for faster, robust, and generalizable path planning algorithms. Similarly, given the inherent connection between control algorithms and multi-robot path planners, there is in turn an increased demand for fast, efficient, and robust controllers. We propose a scalable joint path pla… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: H. A. Jaafar, C. -H. Kao and S. Saeedi, "MR.CAP: Multi-Robot Joint Control and Planning for Object Transport," in IEEE Control Systems Letters, doi: 10.1109/LCSYS.2024.3349989

  6. arXiv:2401.06147  [pdf, ps, other

    math.GM

    A Kannappan-sine subtraction law on semigroups

    Authors: Ahmed Jafar, Omar Ajebbar, Elhoucien Elqorachi

    Abstract: Let $S$ be a semigroup, $z_0$ a fixed element in $S$ and $σ:S \longrightarrow S$ an involutive automorphism. We determine the complex-valued solutions of Kannappan-sine subtraction law $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x),\; x,y \in S$. As an application we solve the following variant of Kannappan-sine subtraction law viz. $f(xσ(y)z_0)=f(x)g(y)-f(y)g(x)+λg(xσ(y)z_0) ,\; x,y \in S,$ where… ▽ More

    Submitted 8 December, 2023; originally announced January 2024.

  7. arXiv:2312.13655  [pdf, other

    cs.RO cs.AI cs.CL cs.CV

    Compositional Zero-Shot Learning for Attribute-Based Object Reference in Human-Robot Interaction

    Authors: Peng Gao, Ahmed Jaafar, Brian Reily, Christopher Reardon, Hao Zhang

    Abstract: Language-enabled robots have been widely studied over the past years to enable natural human-robot interaction and teaming in various real-world applications. Language-enabled robots must be able to comprehend referring expressions to identify a particular object from visual perception using a set of referring attributes extracted from natural language. However, visual observations of an object ma… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Equal contribution from the first two authors

  8. arXiv:2311.09684  [pdf, other

    cs.CL cs.AI

    Do Physicians Know How to Prompt? The Need for Automatic Prompt Optimization Help in Clinical Note Generation

    Authors: Zonghai Yao, Ahmed Jaafar, Beining Wang, Zhichao Yang, Hong Yu

    Abstract: This study examines the effect of prompt engineering on the performance of Large Language Models (LLMs) in clinical note generation. We introduce an Automatic Prompt Optimization (APO) framework to refine initial prompts and compare the outputs of medical experts, non-medical experts, and APO-enhanced GPT3.5 and GPT4. Results highlight GPT4 APO's superior performance in standardizing prompt qualit… ▽ More

    Submitted 5 July, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: To appear in BioNLP 2024

  9. arXiv:2311.08386  [pdf, ps, other

    cs.IT

    Capacity of Summation over a Symmetric Quantum Erasure MAC with Partially Replicated Inputs

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are distributed across $S$ servers, who also share quantum entanglement in advance. Each server $s\in[S]$ manipulates its quantum subsystem $\mathcal{Q}_s$ according to its own available… ▽ More

    Submitted 15 May, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  10. arXiv:2311.07829  [pdf, ps, other

    cs.IT

    A Coding Scheme for Unresponsive and Byzantine Server Resilient Quantum $X$-Secure $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: Building on recent constructions of Quantum Cross Subspace Alignment (QCSA) codes, this work develops a coding scheme for QEBXSTPIR, i.e., classical private information retrieval with $X$-secure storage and $T$-private queries, over a quantum multiple access channel, that is resilient to any set of up to $E$ erased servers (equivalently known as unresponsive servers, or stragglers) together with a… ▽ More

    Submitted 25 February, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  11. arXiv:2310.04902  [pdf, ps, other

    quant-ph cond-mat.other

    Electronic transport through the phtalocyanine molecule in atomic contacts Co

    Authors: Ali Jaafar, Tarek Khalil

    Abstract: The effect of magnetic STM-tip on electronic, magnetic and electronic transport properties through the molecule junction STM-tip-Co/CoPc/Co(111), has been investigated by mean of ab initio electronic structure calculations. The spin transition has been studied by varying the distance (passing from the tunneling regime to the contact regime) between the tip and the CoPc molecule in both configurati… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

    Comments: 22 pages, 13 figures, electronic and spin transport

  12. arXiv:2309.07109  [pdf, ps, other

    hep-ex astro-ph.HE hep-ph

    Real-time Monitoring for the Next Core-Collapse Supernova in JUNO

    Authors: Angel Abusleme, Thomas Adam, Shakeel Ahmad, Rizwan Ahmed, Sebastiano Aiello, Muhammad Akram, Abid Aleem, Fengpeng An, Qi An, Giuseppe Andronico, Nikolay Anfimov, Vito Antonelli, Tatiana Antoshkina, Burin Asavapibhop, João Pedro Athayde Marcondes de André, Didier Auguste, Weidong Bai, Nikita Balashov, Wander Baldini, Andrea Barresi, Davide Basilico, Eric Baussan, Marco Bellato, Marco Beretta, Antonio Bergnoli , et al. (606 additional authors not shown)

    Abstract: The core-collapse supernova (CCSN) is considered one of the most energetic astrophysical events in the universe. The early and prompt detection of neutrinos before (pre-SN) and during the supernova (SN) burst presents a unique opportunity for multi-messenger observations of CCSN events. In this study, we describe the monitoring concept and present the sensitivity of the system to pre-SN and SN neu… ▽ More

    Submitted 4 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: 24 pages, 9 figures, accepted for the publication at JCAP

  13. Improving Deep Attractor Network by BGRU and GMM for Speech Separation

    Authors: Rawad Melhem, Assef Jafar, Riad Hamadeh

    Abstract: Deep Attractor Network (DANet) is the state-of-the-art technique in speech separation field, which uses Bidirectional Long Short-Term Memory (BLSTM), but the complexity of the DANet model is very high. In this paper, a simplified and powerful DANet model is proposed using Bidirectional Gated neural network (BGRU) instead of BLSTM. The Gaussian Mixture Model (GMM) other than the k-means was applied… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Journal ref: Journal of Harbin Institute of Technology (New Series), vol. 28, no. 3, pp. 90-96, 2021

  14. arXiv:2305.20073  [pdf, ps, other

    cs.IT

    On the Capacity of Secure $K$-user Product Computation over a Quantum MAC

    Authors: Yuxiang Lu, Yuhang Yao, Syed A. Jafar

    Abstract: Inspired by recent work by Christensen and Popovski on secure $2$-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to $K$ users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo-$d$ ($d\geq 2$) secure $K$-sum computatio… ▽ More

    Submitted 28 August, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in IEEE Communications Letters

  15. arXiv:2305.15758  [pdf

    cs.SD eess.AS

    Towards Solving Cocktail-Party: The First Method to Build a Realistic Dataset with Ground Truths for Speech Separation

    Authors: Rawad Melhem, Assef Jafar, Oumayma Al Dakkak

    Abstract: Speech separation is very important in real-world applications such as human-machine interaction, hearing aids devices, and automatic meeting transcription. In recent years, a significant improvement occurred towards the solution based on deep learning. In fact, much attention has been drawn to supervised learning methods using synthetic mixtures datasets despite their being not representative of… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  16. arXiv:2305.03122  [pdf, ps, other

    cs.IT

    The Capacity of Classical Summation over a Quantum MAC with Arbitrarily Distributed Inputs and Entanglements

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $Σ$-QMAC problem is introduced, involving $S$ servers, $K$ classical ($\mathbb{F}_d$) data streams, and $T$ independent quantum systems. Data stream ${\sf W}_k, k\in[K]$ is replicated at a subset of servers $\mathcal{W}(k)\subset[S]$, and quantum system $\mathcal{Q}_t, t\in[T]$ is distributed among a subset of servers $\mathcal{E}(t)\subset[S]$ such that Server $s\in\mathcal{E}(t)$ receives su… ▽ More

    Submitted 5 May, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  17. arXiv:2305.02924  [pdf, ps, other

    math.FA math.GM

    A Kannappan-cosine functional equation on semigroups

    Authors: Ahmed Jafar, Omar Ajebbar, Elhoucien Elqorachi

    Abstract: We determine the complex-valued solutions of the Kannappan cosine functional law $g(xyz_{0})=g(x)g(y)-f(x)f(y)$, $x,y\in S$, where $S$ is a semigroup and $z_{0}$ is a fixed element in $S.$

    Submitted 1 May, 2023; originally announced May 2023.

  18. arXiv:2304.14676  [pdf, ps, other

    cs.IT

    Quantum Cross Subspace Alignment Codes via the $N$-sum Box Abstraction

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Cross-subspace alignment (CSA) codes are used in various private information retrieval (PIR) schemes (e.g., with secure storage) and in secure distributed batch matrix multiplication (SDBMM). Using a recently developed $N$-sum box abstraction of a quantum multiple-access channel (QMAC), we translate CSA schemes over classical multiple-access channels into efficient quantum CSA schemes over a QMAC,… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2304.07561

  19. arXiv:2304.14146  [pdf, ps, other

    math.GM

    A Kannappan-sine addition law on semigroups

    Authors: Ahmed Jafar, Omar Ajebbar, Elhoucien Elqorachi

    Abstract: Let $S$ be a semigroup and $z_{0}$ a fixed element in $S.$ We determine the complex-valued solutions of the following Kannappan-sine addition law $f(xyz_{0})=f(x)g(y)+f(y)g(x),x,y\in S.$

    Submitted 4 April, 2023; originally announced April 2023.

  20. arXiv:2209.07602  [pdf, ps, other

    cs.IT

    On the Generic Capacity of $K$-User Symmetric Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: Linear computation broadcast (LCBC) refers to a setting with $d$ dimensional data stored at a central server, where $K$ users, each with some prior linear side-information, wish to retrieve various linear combinations of the data. The goal is to determine the minimum amount of information that must be broadcast to satisfy all the users. The reciprocal of the optimal broadcast cost is the capacity… ▽ More

    Submitted 14 December, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

  21. arXiv:2206.10049  [pdf, ps, other

    cs.IT

    The Capacity of 3 User Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $K$ User Linear Computation Broadcast (LCBC) problem is comprised of $d$ dimensional data (from $\mathbb{F}_q$), that is fully available to a central server, and $K$ users, who require various linear computations of the data, and have prior knowledge of various linear functions of the data as side-information. The optimal broadcast cost is the minimum number of $q$-ary symbols to be broadcast… ▽ More

    Submitted 5 May, 2024; v1 submitted 20 June, 2022; originally announced June 2022.

  22. arXiv:2205.02216  [pdf, other

    cs.IT

    The Extremal GDoF Gain of Optimal versus Binary Power Control in $K$ User Interference Networks Is $Θ(\sqrt{K})$

    Authors: Yao-Chia Chan, Pouya Pezeshkpour, Chunhua Geng, Syed A. Jafar

    Abstract: Using ideas from Generalized Degrees of Freedom (GDoF) analyses and extremal network theory, this work studies the extremal gain of optimal power control over binary (on/off) power control, especially in large interference networks, in search of new theoretical insights. Whereas numerical studies have already established that in most practical settings binary power control is close to optimal, the… ▽ More

    Submitted 5 May, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 18 pages, 5 figures; Typo corrections

  23. arXiv:2203.03092  [pdf, other

    cs.RO cs.AI

    Systematic Comparison of Path Planning Algorithms using PathBench

    Authors: Hao-Ya Hsueh, Alexandru-Iosif Toma, Hussein Ali Jaafar, Edward Stow, Riku Murai, Paul H. J. Kelly, Sajad Saeedi

    Abstract: Path planning is an essential component of mobile robotics. Classical path planning algorithms, such as wavefront and rapidly-exploring random tree (RRT) are used heavily in autonomous robots. With the recent advances in machine learning, development of learning-based path planning algorithms has been experiencing rapid growth. An unified path planning interface that facilitates the development an… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: Accepted to Advanced Robotics Journal; 23 pages, 9 figures, 4 tables. arXiv admin note: substantial text overlap with arXiv:2105.01777

  24. arXiv:2202.07693  [pdf, ps, other

    cs.IT

    On Single Server Private Information Retrieval with Private Coded Side Information

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Motivated by an open problem and a conjecture, this work studies the problem of single server private information retrieval with private coded side information (PIR-PCSI) that was recently introduced by Heidarzadeh et al. The goal of PIR-PCSI is to allow a user to efficiently retrieve a desired message $\bm{W}_{\bmθ}$, which is one of $K$ independent messages that are stored at a server, while uti… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  25. arXiv:2107.10448  [pdf, other

    cs.DC

    Flexible Distributed Matrix Multiplication

    Authors: Weiqi Li, Zhen Chen, Zhiying Wang, Syed A. Jafar, Hamid Jafarkhani

    Abstract: The distributed matrix multiplication problem with an unknown number of stragglers is considered, where the goal is to efficiently and flexibly obtain the product of two massive matrices by distributing the computation across N servers. There are up to N - R stragglers but the exact number is not known a priori. Motivated by reducing the computation load of each server, a flexible solution is prop… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

  26. arXiv:2106.10317  [pdf

    cond-mat.mtrl-sci

    Large perpendicular magnetic anisotropy in Ta/CoFeB/MgO on full coverage monolayer MoS2 and first principle study of its electronic structure

    Authors: Ziqi Zhou, Paul Marcon, Xavier Devaux, Philippe Pigeat, Alexandre Bouché, Sylvie Migot, Abdallah Jaafar, Remi Arras, Michel Vergnat, Lei Ren, Hans Tornatzky, Cedric Robert, Xavier Marie, Jean-Marie George, Henri-Yves Jaffrès, Mathieu Stoffel, Hervé Rinnert, Zhongming Wei, Pierre Renucci, Lionel Calmels, Yuan Lu

    Abstract: Perpendicularly magnetized spin injector with high Curie temperature is a prerequisite for develo** spin optoelectronic devices on 2D materials working at room temperature (RT) with zero applied magnetic field. Here, we report the growth of Ta/CoFeB/MgO structures with a large perpendicular magnetic anisotropy (PMA) on full coverage monolayer (ML) MoS2. A large perpendicular interface anisotropy… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  27. arXiv:2105.07567  [pdf, ps, other

    cs.IT

    Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis

    Authors: Junge Wang, Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed matrix multiplication (CDMM) schemes, such as MatDot codes, seek efficient ways to distribute matrix multiplication task(s) to a set of $N$ distributed servers so that the answers returned from any $R$ servers are sufficient to recover the desired product(s). For example, to compute the product of matrices ${\bf U, V}$, MatDot codes partition each matrix into $p>1$ sub-matrices t… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: 7 pages, 4 figures, submitted to ITW2021

  28. arXiv:2105.01777  [pdf, other

    cs.RO cs.LG

    PathBench: A Benchmarking Platform for Classical and Learned Path Planning Algorithms

    Authors: Alexandru-Iosif Toma, Hao-Ya Hsueh, Hussein Ali Jaafar, Riku Murai, Paul H. J. Kelly, Sajad Saeedi

    Abstract: Path planning is a key component in mobile robotics. A wide range of path planning algorithms exist, but few attempts have been made to benchmark the algorithms holistically or unify their interface. Moreover, with the recent advances in deep neural networks, there is an urgent need to facilitate the development and benchmarking of such learning-based planning algorithms. This paper presents PathB… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: The Conference on Robots and Vision (CRV2021), Supplementary Website: https://sites.google.com/view/pathbench/

  29. arXiv:2105.00312  [pdf, other

    cs.RO cs.LG

    Waypoint Planning Networks

    Authors: Alexandru-Iosif Toma, Hussein Ali Jaafar, Hao-Ya Hsueh, Stephen James, Daniel Lenton, Ronald Clark, Sajad Saeedi

    Abstract: With the recent advances in machine learning, path planning algorithms are also evolving; however, the learned path planning algorithms often have difficulty competing with success rates of classic algorithms. We propose waypoint planning networks (WPN), a hybrid algorithm based on LSTMs with a local kernel - a classic algorithm such as A*, and a global kernel using a learned algorithm. WPN produc… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: The Conference on Robots and Vision (CRV2021) Supplementary Website: https://sites.google.com/view/waypoint-planning-networks

  30. arXiv:2104.02340  [pdf

    cond-mat.mtrl-sci

    Phase Change Memory by GeSbTe Electrodeposition in Crossbar Arrays

    Authors: Yasir J Noori, Lingcong Meng, Ayoub H. Jaafar, Wenjian Zhang, Gabriela P. Kissling, Yisong Han, Nema Abdelazim, Kath Leblanc, Nikolay Zhelev, Ruomeng Huang, Richard Beanland, David C. Smith, Gill Reid, Kees de Groot, Philip N. Bartlett

    Abstract: Phase change memories (PCM) is an emerging type of non-volatile memory that has shown a strong presence in the data-storage market. This technology has recently attracted significant research interest in the development of non-Von Neumann computing architectures such as in-memory and neuromorphic computing. Research in these areas has been primarily motivated by the scalability potential of phase… ▽ More

    Submitted 2 August, 2021; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: 9 pages, 5 figures

  31. arXiv:2103.07830  [pdf, other

    cs.IT

    Sum-GDoF of Symmetric Multi-hop Interference Channel under Finite Precision CSIT using Aligned-Images Sumset Inequalities

    Authors: Junge Wang, Syed Ali Jafar

    Abstract: Aligned-Images Sumset Inequalities are used in this work to study the Generalized Degrees of Freedom (GDoF) of the symmetric layered multi-hop interference channel under the robust assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. First, the sum-GDoF value is characterized for the $2\times 2\times 2$ setting that is comprised of $2$ sources,… ▽ More

    Submitted 13 March, 2021; originally announced March 2021.

    Comments: 35 pages, 11 figures

  32. arXiv:2102.04355  [pdf, other

    cs.IT

    Multilevel Topological Interference Management: A TIM-TIN Perspective

    Authors: Chunhua Geng, Hua Sun, Syed A. Jafar

    Abstract: The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowle… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: This work will be submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  33. arXiv:2011.12947  [pdf, ps, other

    cs.IT

    Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes?

    Authors: Yao-Chia Chan, Syed A. Jafar

    Abstract: Under the assumption of perfect channel state information at the transmitters (CSIT), it is known that structured codes offer significant advantages for secure communication in an interference network, e.g., structured jamming signals based on lattice codes may allow a receiver to decode the sum of the jamming signal and the signal being jammed, even though they cannot be separately resolved due t… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: 34 pages, 10 figures

  34. arXiv:2010.01059  [pdf, ps, other

    cs.IT

    $X$-Secure $T$-Private Federated Submodel Learning with Elastic Dropout Resilience

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Motivated by recent interest in federated submodel learning, this work explores the fundamental problem of privately reading from and writing to a database comprised of $K$ files (submodels) that are stored across $N$ distributed servers according to an $X$-secure threshold secret sharing scheme. One after another, various users wish to retrieve their desired file, locally process the information… ▽ More

    Submitted 22 March, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

  35. Double Blind $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Zhuqing Jia, Syed A. Jafar

    Abstract: Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($θ_1, θ_2$, resp.), to efficiently retrieve a message $W(θ_1,θ_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to… ▽ More

    Submitted 8 March, 2021; v1 submitted 9 August, 2020; originally announced August 2020.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Information Theory (JSAIT)

  36. arXiv:2006.02310  [pdf, ps, other

    cs.IT

    Canonical Conditions for K/2 Degrees of Freedom

    Authors: Recep Gül, David Stotz, Syed Ali Jafar, Helmut Bölcskei, Shlomo Shamai

    Abstract: We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignm… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

  37. Regional exponential general observability in diffusion problem

    Authors: Zainab A. Jaafar, Raheam A. Al-Saphory

    Abstract: The aim of this paper is to extend the concept of regional exponential general observability to the case of Neumann boundary conditions problem in diffusion system. More precisely, for linear distributed parameter diffusion systems, we show that the sensors characterizations allow to reconstruct the regional exponential state in a sub-region of the considered systems domain. Moreover, various inte… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: 11 pages, 5 figures, regular paper

    Journal ref: Journal of Iraqi Al-Khwarizmi Society (JIKhS) Year 2018 pages: 229-239, Volume:2 Special issue of the first international scientific conference of Iraqi Al-Khawarizmi Society 28-29 March 2018

  38. arXiv:2002.07750  [pdf, other

    cs.IT cs.CR cs.DC

    GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication

    Authors: Zhen Chen, Zhuqing Jia, Zhiying Wang, Syed A. Jafar

    Abstract: A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the goal is to allow a master to efficiently compute the pairwise products of two batches of massive matrices, by distributing the computation across S servers. Any X colluding servers gain no information about the input, and the master gains no additional information about the input beyond the product. A solutio… ▽ More

    Submitted 6 September, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

  39. arXiv:2001.06879  [pdf

    cond-mat.mes-hall cond-mat.mtrl-sci

    Multilevel Resistance Switching and Enhanced Spin Transition Temperature in Single Molecule Spin Crossover Nanogap Devices

    Authors: Alex Gee, Ayoub H. Jaafar, Barbora Brachňaková, Jamie Massey, Christopher H. Marrows, Ivan Šalitroš, N. T. Kemp

    Abstract: Spin crossover (SCO) molecules are promising bi-stable magnetic switches with applications in molecular spintronics. However, little is known about the switching effects of a single SCO molecule when it is confined between two metal electrodes. Here we examine the switching properties of a [Fe(III)(EtOSalPet )(NCS)] SCO molecule that is specifically tailored for surface deposition and binding to o… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: 13 pages, 4 figures, supplementary information (5 pages, 5 figures)

  40. arXiv:1909.13873  [pdf, other

    cs.IT

    Cross Subspace Alignment Codes for Coded Distributed Batch Computation

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed batch computation distributes a computation task, such as matrix multiplication, $N$-linear computation, or multivariate polynomial evaluation, across $S$ servers through a coding scheme, such that the response from any $R$ servers ($R$ is called the recovery threshold) is sufficient for the user to recover the desired computed value. Current approaches are based on either exclus… ▽ More

    Submitted 14 November, 2019; v1 submitted 30 September, 2019; originally announced September 2019.

    Comments: Improved recovery threshold for GCSA codes and added discussion of server latency constraints

  41. arXiv:1908.10854  [pdf, other

    cs.IT

    $X$-secure $T$-private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in this paper, where the user wishes to privately retrieve one out of $K$ independent messages that are distributed over $N$ servers according to an MDS code. It is guaranteed that any group of up to $X$ colluding servers learn nothing about the messages and that any group of up to $T$ colluding servers l… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

  42. arXiv:1908.06957  [pdf, ps, other

    cs.IT

    On the Capacity of Secure Distributed Batch Matrix Multiplication

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of secure distributed batch matrix multiplication (SDBMM) studies the communication efficiency of retrieving a sequence of desired matrix products ${\bf AB}$ $=$ $({\bf A}_1{\bf B}_1,$ ${\bf A}_2{\bf B}_2,$ $\cdots,$ ${\bf A}_S{\bf B}_S)$ from $N$ distributed servers where the constituent matrices ${\bf A}=({\bf A}_1, {\bf A}_2, \cdots, {\bf A}_S)$ and… ▽ More

    Submitted 22 June, 2021; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: The updated version is the revision for IEEE IT Transactions

  43. arXiv:1908.00703  [pdf, other

    cs.IT

    GDoF of Interference Channel with Limited Cooperation under Finite Precision CSIT

    Authors: Junge Wang, Bofeng Yuan, Lexiang Huang, Syed A. Jafar

    Abstract: The Generalized Degrees of Freedom (GDoF) of the two user interference channel are characterized for all parameter regimes under the assumption of finite precision channel state information at the transmitters (CSIT), when a limited amount of (half-duplex or full-duplex) cooperation is allowed between the transmitters in the form of $π$ DoF of shared messages. In all cases, the number of over-the-… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 39 pages,10 figures,

  44. arXiv:1907.11137  [pdf

    physics.app-ph eess.SP

    Chua Mem-Components for Adaptive RF Metamaterials

    Authors: J. Georgiou, K. M. Kossifos, A. H. Jaafar, N. T. Kemp, M. A. Antoniades

    Abstract: Chua's mem-components are ideal for creating adaptive metasurfaces for manipulating EM waves given that they hold their state without external biases. In this paper, we propose a generic adaptive reactive element that is in fact a memcapacitor/meminductor. This element makes use of a polymer that demonstrates reversible trans-cis photochemical isomerization, thus making it possible to change the d… ▽ More

    Submitted 20 June, 2019; originally announced July 2019.

    Comments: 5 pages, 7 figures, Published in 2018 IEEE International Symposium on Circuits and Systems (ISCAS)

  45. arXiv:1907.11136  [pdf

    physics.app-ph eess.SP

    An Optically-Programmable Absorbing Metasurface

    Authors: K. M. Kossifos, A. H. Jaafar, N. T. Kemp, M. A. Antoniades, J. Georgiou

    Abstract: A tunable metasurface absorber is presented in this work using an optically-programmable capacitor as the tuning element. The tuning element does not employ conventional semiconductor technologies to operate but rather a bases its tuning by changing the optomechanical properties of its dielectric, poly disperse red 1 acrylate (PDR1A). Doing so there are no conventional semiconductor devices in the… ▽ More

    Submitted 20 June, 2019; originally announced July 2019.

    Comments: 5 pages, 8 figures, Published in 2018 IEEE International Symposium on Circuits and Systems (ISCAS)

  46. arXiv:1904.05906  [pdf, ps, other

    cs.IT

    On the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval with Graph Based Replicated Storage

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary $T$-privacy and $X$-security constraints, where the privacy of the user must… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  47. arXiv:1904.00690  [pdf

    cs.CY cs.DC cs.LG cs.SI stat.ML

    Customer churn prediction in telecom using machine learning and social network analysis in big data platform

    Authors: Abdelrahim Kasem Ahmad, Assef Jafar, Kadan Aljoumaa

    Abstract: Customer churn is a major problem and one of the most important concerns for large companies. Due to the direct effect on the revenues of the companies, especially in the telecom field, companies are seeking to develop means to predict potential customer to churn. Therefore, finding factors that increase customer churn is important to take necessary actions to reduce this churn. The main contribut… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: 24 pages, 14 figures. PDF https://rdcu.be/budKg

    Journal ref: Journal of Big Data 2019 6:28

  48. arXiv:1903.07597  [pdf, ps, other

    cs.IT

    On the Capacity of Computation Broadcast

    Authors: Hua Sun, Syed A. Jafar

    Abstract: The two-user computation broadcast problem is introduced as the setting where User $1$ wants message $W_1$ and has side-information $W_1'$, User $2$ wants message $W_2$ and has side-information $W_2'$, and $(W_1, W_1', W_2, W_2')$ may have arbitrary dependencies. The rate of a computation broadcast scheme is defined as the ratio $H(W_1,W_2)/H(S)$, where $S$ is the information broadcast to both use… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  49. arXiv:1903.06756  [pdf

    cs.LG cs.CY stat.ML

    Predicting customer's gender and age depending on mobile phone data

    Authors: Ibrahim Mousa AlZuabi, Assef Jafar, Kadan Aljoumaa

    Abstract: In the age of data driven solution, the customer demographic attributes, such as gender and age, play a core role that may enable companies to enhance the offers of their services and target the right customer in the right time and place. In the marketing campaign, the companies want to target the real user of the GSM (global system for mobile communications), not the line owner. Where sometimes t… ▽ More

    Submitted 20 February, 2019; originally announced March 2019.

  50. arXiv:1901.09885  [pdf, other

    cs.IT

    Towards an Extremal Network Theory -- Robust GDoF Gain of Transmitter Cooperation over TIN

    Authors: Yao-Chia Chan, Junge Wang, Syed A. Jafar

    Abstract: Significant progress has been made recently in Generalized Degrees of Freedom (GDoF) characterizations of wireless interference channels (IC) and broadcast channels (BC) under the assumption of finite precision channel state information at the transmitters (CSIT), especially for smaller or highly symmetric network settings. A critical barrier in extending these results to larger and asymmetric net… ▽ More

    Submitted 24 October, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: 35 pages, 7 figures. Submitted to IEEE Transactions on Information Theory