Skip to main content

Showing 1–7 of 7 results for author: Majd, A

.
  1. arXiv:2305.06236  [pdf, other

    cs.CV cs.AI

    Radious: Unveiling the Enigma of Dental Radiology with BEIT Adaptor and Mask2Former in Semantic Segmentation

    Authors: Mohammad Mashayekhi, Sara Ahmadi Majd, Arian Amiramjadi, Babak Mashayekhi

    Abstract: X-ray images are the first steps for diagnosing and further treating dental problems. So, early diagnosis prevents the development and increase of oral and dental diseases. In this paper, we developed a semantic segmentation algorithm based on BEIT adaptor and Mask2Former to detect and identify teeth, roots, and multiple dental diseases and abnormalities such as pulp chamber, restoration, endodont… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  2. arXiv:2001.00916  [pdf

    cs.CR cs.LG eess.SP stat.ML

    Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure

    Authors: Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd

    Abstract: Smart grid is an alternative solution of the conventional power grid which harnesses the power of the information technology to save the energy and meet today's environment requirements. Due to the inherent vulnerabilities in the information technology, the smart grid is exposed to a wide variety of threats that could be translated into cyber-attacks. In this paper, we develop a deep learning-base… ▽ More

    Submitted 31 December, 2019; originally announced January 2020.

    Comments: 7 pages, 6 figures. 2019 NISS19: Proceedings of the 2nd International Conference on Networking, Information Systems & Security

  3. arXiv:1912.09288  [pdf, other

    cs.RO eess.SP

    Online Path Generation and Navigation for Swarms of UAVs

    Authors: Adnan Ashraf, Amin Majd, Elena Troubitsyna

    Abstract: With the growing popularity of Unmanned Aerial Vehicles (UAVs) for consumer applications, the number of accidents involving UAVs is also increasing rapidly. Therefore, motion safety of UAVs has become a prime concern for UAV operators. For a swarm of UAVs, a safe operation can not be guaranteed without preventing the UAVs from colliding with one another and with static and dynamically appearing, m… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: Accepted manuscript in Scientific Programming

  4. arXiv:1903.03684  [pdf

    cs.CR cs.LG cs.NI cs.PF

    Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

    Authors: Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch

    Abstract: Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

    Comments: 14 pages, 9 figures

    Journal ref: J. Sens. Actuator Netw. 2018, 7(3), 26

  5. arXiv:1509.03227  [pdf

    math.NA math.OC

    Parameterization adaption for 3D shape optimization in aerodynamics

    Authors: Badr Abou El Majd

    Abstract: When solving a PDE problem numerically, a certain mesh-refinement process is always implicit, and very classically, mesh adaptivity is a very effective means to accelerate grid convergence. Similarly, when optimizing a shape by means of an explicit geometrical representation, it is natural to seek for an analogous concept of parameterization adaptivity. We propose here an adaptive parameterization… ▽ More

    Submitted 25 August, 2015; originally announced September 2015.

    Journal ref: International Journal of Science and Engineering, 2014, 6 (1), pp.61-69

  6. arXiv:1010.3197  [pdf, ps, other

    cs.GT

    QoS-Aware Joint Policies in Cognitive Radio Networks

    Authors: Saber Salehkaleybar, Seyyed Arash Majd, Mohammad Reza Pakravan

    Abstract: One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only guarantees QoS requirements but also maximizes network… ▽ More

    Submitted 14 October, 2010; originally announced October 2010.

  7. arXiv:1003.2813   

    cs.GT

    A New Framework for Cognitive Medium Access Control: POSG Approach

    Authors: Saber Salehkaleybar, Arash Majd, Mohammad Reza Pakravan

    Abstract: In this paper, we propose a new analytical framework to solve medium access problem for secondary users (SUs) in cognitive radio networks. Partially Observable Stochastic Games (POSG) and Decentralized Markov Decision Process (Dec-POMDP) are two multi-agent Markovian decision processes which are used to present a solution. A primary network with two SUs is considered as an example to demonstrate o… ▽ More

    Submitted 14 October, 2010; v1 submitted 14 March, 2010; originally announced March 2010.

    Comments: This paper has been withdrawn by the author due to minor contributions