-
Radio Resource Management and Path Planning in Intelligent Transportation Systems via Reinforcement Learning for Environmental Sustainability
Authors:
S. Norouzi,
N. Azarasa,
M. R. Abedi,
N. Mokari,
S. E. Seyedabrishami,
H. Saeedi,
E. A. Jorswieck
Abstract:
Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction of travel time and directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the vehicle-to-infrastructure (…
▽ More
Efficient and dynamic path planning has become an important topic for urban areas with larger density of connected vehicles (CV) which results in reduction of travel time and directly contributes to environmental sustainability through reducing energy consumption. CVs exploit the cellular wireless vehicle-to-everything (C-V2X) communication technology to disseminate the vehicle-to-infrastructure (V2I) messages to the Base-station (BS) to improve situation awareness on urban roads. In this paper, we investigate radio resource management (RRM) in such a framework to minimize the age of information (AoI) so as to enhance path planning results. We use the fact that V2I messages with lower AoI value result in less error in estimating the road capacity and more accurate path planning. Through simulations, we compare road travel times and volume over capacity (V/C) against different levels of AoI and demonstrate the promising performance of the proposed framework.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
ML-ASPA: A Contemplation of Machine Learning-based Acoustic Signal Processing Analysis for Sounds, & Strains Emerging Technology
Authors:
Ratul Ali,
Aktarul Islam,
Md. Shohel Rana,
Saila Nasrin,
Sohel Afzal Shajol,
Professor Dr. A. H. M. Saifullah Sadi
Abstract:
Acoustic data serves as a fundamental cornerstone in advancing scientific and engineering understanding across diverse disciplines, spanning biology, communications, and ocean and Earth science. This inquiry meticulously explores recent advancements and transformative potential within the domain of acoustics, specifically focusing on machine learning (ML) and deep learning. ML, comprising an exten…
▽ More
Acoustic data serves as a fundamental cornerstone in advancing scientific and engineering understanding across diverse disciplines, spanning biology, communications, and ocean and Earth science. This inquiry meticulously explores recent advancements and transformative potential within the domain of acoustics, specifically focusing on machine learning (ML) and deep learning. ML, comprising an extensive array of statistical techniques, proves indispensable for autonomously discerning and leveraging patterns within data. In contrast to traditional acoustics and signal processing, ML adopts a data-driven approach, unveiling intricate relationships between features and desired labels or actions, as well as among features themselves, given ample training data. The application of ML to expansive sets of training data facilitates the discovery of models elucidating complex acoustic phenomena such as human speech and reverberation. The dynamic evolution of ML in acoustics yields compelling results and holds substantial promise for the future. The advent of electronic stethoscopes and analogous recording and data logging devices has expanded the application of acoustic signal processing concepts to the analysis of bowel sounds. This paper critically reviews existing literature on acoustic signal processing for bowel sound analysis, outlining fundamental approaches and applicable machine learning principles. It chronicles historical progress in signal processing techniques that have facilitated the extraction of valuable information from bowel sounds, emphasizing advancements in noise reduction, segmentation, signal enhancement, feature extraction, sound localization, and machine learning techniques...
△ Less
Submitted 17 December, 2023;
originally announced February 2024.
-
AI-enabled Priority and Auction-Based Spectrum Management for 6G
Authors:
Mina Khadem,
Farshad Zeinali,
Nader Mokari,
Hamid Saeedi
Abstract:
In this paper, we present a quality of service (QoS)-aware priority-based spectrum management scheme to guarantee the minimum required bit rate of vertical sector players (VSPs) in the 5G and beyond generation, including the 6th generation (6G). VSPs are considered as spectrum leasers to optimize the overall spectrum efficiency of the network from the perspective of the mobile network operator (MN…
▽ More
In this paper, we present a quality of service (QoS)-aware priority-based spectrum management scheme to guarantee the minimum required bit rate of vertical sector players (VSPs) in the 5G and beyond generation, including the 6th generation (6G). VSPs are considered as spectrum leasers to optimize the overall spectrum efficiency of the network from the perspective of the mobile network operator (MNO) as the spectrum licensee and auctioneer. We exploit a modified Vickrey-Clarke-Groves (VCG) auction mechanism to allocate the spectrum to them where the QoS and the truthfulness of bidders are considered as two important parameters for prioritization of VSPs. The simulation is done with the help of deep deterministic policy gradient (DDPG) as a deep reinforcement learning (DRL)-based algorithm. Simulation results demonstrate that deploying the DDPG algorithm results in significant advantages. In particular, the efficiency of the proposed spectrum management scheme is about %85 compared to the %35 efficiency in traditional auction methods.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Dynamic Fairness-Aware Spectrum Auction for Enhanced Licensed Shared Access in 6G Networks
Authors:
Mina Khadem,
Maryam Ansarifard,
Nader Mokari,
Mohammadreza Javan,
Hamid Saeedi,
Eduard A. Jorswieck
Abstract:
This article introduces a new approach to address the spectrum scarcity challenge in 6G networks by implementing the enhanced licensed shared access (ELSA) framework. Our proposed auction mechanism aims to ensure fairness in spectrum allocation to mobile network operators (MNOs) through a novel weighted auction called the fair Vickery-Clarke-Groves (FVCG) mechanism. Through comparison with traditi…
▽ More
This article introduces a new approach to address the spectrum scarcity challenge in 6G networks by implementing the enhanced licensed shared access (ELSA) framework. Our proposed auction mechanism aims to ensure fairness in spectrum allocation to mobile network operators (MNOs) through a novel weighted auction called the fair Vickery-Clarke-Groves (FVCG) mechanism. Through comparison with traditional methods, the study demonstrates that the proposed auction method improves fairness significantly. We suggest using spectrum sensing and integrating UAV-based networks to enhance efficiency of the LSA system. This research employs two methods to solve the problem. We first propose a novel greedy algorithm, named market share based weighted greedy algorithm (MSWGA) to achieve better fairness compared to the traditional auction methods and as the second approach, we exploit deep reinforcement learning (DRL) algorithms, to optimize the auction policy and demonstrate its superiority over other methods. Simulation results show that the deep deterministic policy gradient (DDPG) method performs superior to soft actor critic (SAC), MSWGA, and greedy methods. Moreover, a significant improvement is observed in fairness index compared to the traditional greedy auction methods. This improvement is as high as about 27% and 35% when deploying the MSWGA and DDPG methods, respectively.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
AI-based Radio and Computing Resource Allocation and Path Planning in NOMA NTNs: AoI Minimization under CSI Uncertainty
Authors:
Maryam Ansarifard,
Nader Mokari,
Mohammadreza Javan,
Hamid Saeedi,
Eduard A. Jorswieck
Abstract:
In this paper, we develop a hierarchical aerial computing framework composed of high altitude platform (HAP) and unmanned aerial vehicles (UAVs) to compute the fully offloaded tasks of terrestrial mobile users which are connected through an uplink non-orthogonal multiple access (UL-NOMA). To better assess the freshness of information in computation-intensive applications the criterion of age of in…
▽ More
In this paper, we develop a hierarchical aerial computing framework composed of high altitude platform (HAP) and unmanned aerial vehicles (UAVs) to compute the fully offloaded tasks of terrestrial mobile users which are connected through an uplink non-orthogonal multiple access (UL-NOMA). To better assess the freshness of information in computation-intensive applications the criterion of age of information (AoI) is considered. In particular, the problem is formulated to minimize the average AoI of users with elastic tasks, by adjusting UAVs trajectory and resource allocation on both UAVs and HAP, which is restricted by the channel state information (CSI) uncertainty and multiple resource constraints of UAVs and HAP. In order to solve this non-convex optimization problem, two methods of multi-agent deep deterministic policy gradient (MADDPG) and federated reinforcement learning (FRL) are proposed to design the UAVs trajectory, and obtain channel, power, and CPU allocations. It is shown that task scheduling significantly reduces the average AoI. This improvement is more pronounced for larger task sizes. On one hand, it is shown that power allocation has a marginal effect on the average AoI compared to using full transmission power for all users. Compared with traditional transmission schemes, the simulation results show our scheduling scheme results in a substantial improvement in average AoI.
△ Less
Submitted 29 May, 2023; v1 submitted 1 May, 2023;
originally announced May 2023.
-
UKP-SQuARE v2: Explainability and Adversarial Attacks for Trustworthy QA
Authors:
Rachneet Sachdeva,
Haritz Puerto,
Tim Baumgärtner,
Sewin Tariverdian,
Hao Zhang,
Kexin Wang,
Hossain Shaikh Saadi,
Leonardo F. R. Ribeiro,
Iryna Gurevych
Abstract:
Question Answering (QA) systems are increasingly deployed in applications where they support real-world decisions. However, state-of-the-art models rely on deep neural networks, which are difficult to interpret by humans. Inherently interpretable models or post hoc explainability methods can help users to comprehend how a model arrives at its prediction and, if successful, increase their trust in…
▽ More
Question Answering (QA) systems are increasingly deployed in applications where they support real-world decisions. However, state-of-the-art models rely on deep neural networks, which are difficult to interpret by humans. Inherently interpretable models or post hoc explainability methods can help users to comprehend how a model arrives at its prediction and, if successful, increase their trust in the system. Furthermore, researchers can leverage these insights to develop new methods that are more accurate and less biased. In this paper, we introduce SQuARE v2, the new version of SQuARE, to provide an explainability infrastructure for comparing models based on methods such as saliency maps and graph-based explanations. While saliency maps are useful to inspect the importance of each input token for the model's prediction, graph-based explanations from external Knowledge Graphs enable the users to verify the reasoning behind the model prediction. In addition, we provide multiple adversarial attacks to compare the robustness of QA models. With these explainability methods and adversarial attacks, we aim to ease the research on trustworthy QA models. SQuARE is available on https://square.ukp-lab.de.
△ Less
Submitted 20 October, 2022; v1 submitted 19 August, 2022;
originally announced August 2022.
-
Two-Hop Age of Information Scheduling for Multi-UAV Assisted Mobile Edge Computing: FRL vs MADDPG
Authors:
Marjan Tajik,
Mohammadreza Maleki,
Nader Mokari,
Mohammad Reza Javan,
Hamid Saeedi,
Bile Peng,
Eduard A. Jorswieck
Abstract:
In this work, we adopt the emerging technology of mobile edge computing (MEC) in the Unmanned aerial vehicles (UAVs) for communication-computing systems, to optimize the age of information (AoI) in the network. We assume that tasks are processed jointly on UAVs and BS to enhance edge performance with limited connectivity and computing. Using UAVs and BS jointly with MEC can reduce AoI on the netwo…
▽ More
In this work, we adopt the emerging technology of mobile edge computing (MEC) in the Unmanned aerial vehicles (UAVs) for communication-computing systems, to optimize the age of information (AoI) in the network. We assume that tasks are processed jointly on UAVs and BS to enhance edge performance with limited connectivity and computing. Using UAVs and BS jointly with MEC can reduce AoI on the network. To maintain the freshness of the tasks, we formulate the AoI minimization in two-hop communication framework, the first hop at the UAVs and the second hop at the BS. To approach the challenge, we optimize the problem using a deep reinforcement learning (DRL) framework, called federated reinforcement learning (FRL). In our network we have two types of agents with different states and actions but with the same policy. Our FRL enables us to handle the two-step AoI minimization and UAV trajectory problems. In addition, we compare our proposed algorithm, which has a centralized processing unit to update the weights, with fully decentralized multi-agent deep deterministic policy gradient (MADDPG), which enhances the agent's performance. As a result, the suggested algorithm outperforms the MADDPG by about 38\%
△ Less
Submitted 19 June, 2022;
originally announced June 2022.
-
Multi-Purpose Aerial Drones for Network Coverage and Package Delivery
Authors:
Mohammadjavad Khosravi,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
Unmanned aerial vehicles (UAVs) have become important in many applications including last-mile deliveries, surveillance and monitoring, and wireless networks. This paper aims to design UAV trajectories that simultaneously perform multiple tasks. We aim to design UAV trajectories that minimize package delivery time, and at the same time provide uniform coverage over a neighborhood area which is nee…
▽ More
Unmanned aerial vehicles (UAVs) have become important in many applications including last-mile deliveries, surveillance and monitoring, and wireless networks. This paper aims to design UAV trajectories that simultaneously perform multiple tasks. We aim to design UAV trajectories that minimize package delivery time, and at the same time provide uniform coverage over a neighborhood area which is needed for applications such as network coverage or surveillance. We first consider multi-task UAVs for a simplified scenario where the neighborhood area is a circular region with the post office located at its center and the houses are assumed to be uniformly distributed on the circle boundary. We propose a trajectory process such that if according to which the drones move, a uniform coverage can be achieved while the delivery efficiency is still preserved. We then consider a more practical scenario in which the delivery destinations are arbitrarily distributed in an arbitrarily-shaped region. We also do not assume any restrictions on the package arrivals. We show that simultaneous uniform coverage and efficient package delivery is possible for such realistic scenarios. This is shown using both rigorous analyses as well as simulations.
△ Less
Submitted 13 November, 2019;
originally announced November 2019.
-
Resource Management and Admission Control for Tactile Internet in Next Generation of RAN
Authors:
Narges Gholipoor,
Saeedeh Parsaeefard,
Mohammad Reza Javan,
Nader Mokari,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) technology. This model includes both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays and reliability for each end to e…
▽ More
In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) technology. This model includes both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays and reliability for each end to end (E2E) connection between each pair of tactile users. For this setup, with the aim to minimize the transmit power of users subject to guaranteeing tolerable delay of users, and fronthaul and access limitations, we formulate a resource allocation problem. Since the proposed optimization problem is highly non-convex, to solve it in an efficient manner, we utilize diverse transformation techniques such as successive convex approximation (SCA) and difference of two convex functions (DC). In addition, we propose an admission control (AC) algorithm to make problem feasible. In our proposed system model, we dynamically adjust the fronthaul and access links to minimize the transmit power. Simulation results reveal that by dynamic adjustment of the access and fronthaul delays, transmit power can be saved compared to the case of fixed approach per each transmission session. Moreover, the number of rejected users in the network is significantly reduced and more users are accepted.
△ Less
Submitted 8 November, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
E2E Delay Guarantee for the Tactile Internet via joint NFV and Radio Resource Allocation
Authors:
Narges Gholipoor,
Hamid Saeedi,
Nader Mokari,
Eduard Jorswieck
Abstract:
The Tactile Internet (TI) is one of the next generation wireless network services with end to end (E2E) delay as low as 1~ms. Since this ultra low E2E delay cannot be met in the current 4G network architecture, it is necessary to investigate this service in the next generation wireless network by considering new technologies such as network function virtualization (NFV). On the other hand, given t…
▽ More
The Tactile Internet (TI) is one of the next generation wireless network services with end to end (E2E) delay as low as 1~ms. Since this ultra low E2E delay cannot be met in the current 4G network architecture, it is necessary to investigate this service in the next generation wireless network by considering new technologies such as network function virtualization (NFV). On the other hand, given the importance of E2E delay in the TI service, it is crucial to consider the delay of all parts of the network, including the radio access part and the NFV core part. In this paper, for the first time, we investigate the joint radio resource allocation (R-RA) and NFV resource allocation (NFV-RA) in a heterogeneous network where queuing delays, transmission delays, and delays resulting from virtual network function (VNF) execution are jointly considered. For this setup, we formulate a new resource allocation (RA) problem to minimize the total cost function subject to guaranteeing E2E delay of each user. Since the proposed optimization problem is highly non-convex, we exploit alternative search method (ASM), successive convex approximation (SCA), and heuristic algorithms to solve it. Simulation results reveal that in the proposed scheme can significantly reduce the network costs compared to the case where the two problems are optimized separately.
△ Less
Submitted 8 November, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
Joint Dynamic Pricing and Radio Resource Allocation Framework for IoT Services
Authors:
Mohammad Moltafet,
Atefeh Rezaei,
Nader Mokari,
Mohammad Reza Javan,
Hamid Saeedi,
Hossein Pishro Nik
Abstract:
In this paper, we study the problem of resource allocation as well as pricing in the context of Internet of things (IoT) networks. We provide a novel pricing model for IoT services where all the parties involved in the communication scenario as well as their revenue and cost are determined. We formulate the resource allocation in the considered model as a multi-objective optimization problem where…
▽ More
In this paper, we study the problem of resource allocation as well as pricing in the context of Internet of things (IoT) networks. We provide a novel pricing model for IoT services where all the parties involved in the communication scenario as well as their revenue and cost are determined. We formulate the resource allocation in the considered model as a multi-objective optimization problem where in addition to the resource allocation variables, the price values are also optimization variables. To solve the proposed multi-objective optimization problem, we use the scalarization method which gives different Pareto optimal solutions. We solve the resulting problems using the alternating approach based on the successive convex approximation (SCA) method which converges to a local solution with few iterations. We also consider a conventional approach where each entity tries to maximize its own revenue independently. Simulation results indicate that by applying the proposed joint framework, we can increase the total revenue compared to the conventional case while providing an almost complete fairness among the players. This is while the conventional approach fails to provide such a fairness.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
Cloud-based Queuing Model for Tactile Internet in Next Generation of RAN
Authors:
Narges Gholipoor,
Saeedeh Parsaeefard,
Mohammad Reza Javan,
Nader Mokari,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
Ultra-low latency is the most important requirement of the Tactile Internet (TI), which is one of the proposed services for the next-generation wireless network (NGWN), e.g., fifth generation (5G) network. In this paper, a new queuing model for the TI is proposed for the cloud radio access network (CRAN) architecture of the NGWN by applying power domain non-orthogonal multiple access (PD-NOMA) tec…
▽ More
Ultra-low latency is the most important requirement of the Tactile Internet (TI), which is one of the proposed services for the next-generation wireless network (NGWN), e.g., fifth generation (5G) network. In this paper, a new queuing model for the TI is proposed for the cloud radio access network (CRAN) architecture of the NGWN by applying power domain non-orthogonal multiple access (PD-NOMA) technology. In this model, we consider both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays for each end-to-end (E2E) connection between a pair of tactile users. In our setup, to minimize the transmit power of users subject to guaranteeing an acceptable delay of users, and fronthaul and access constraints, we formulate a resource allocation (RA) problem. Furthermore, we dynamically set the fronthaul and access links to minimize the total transmit power. Given that the proposed RA problem is highly non-convex, in order to solve it, we utilize diverse transformation techniques such as successive convex approximation (SCA) and difference of two convex functions (DC). Numerical results show that by dynamic adjustment of the access and fronthaul delays, transmit power reduces in comparison with the fixed approach per each connection. Also, energy efficiency of orthogonal frequency division multiple access (OFDMA) and PD-NOMA are compared for our setup.
△ Less
Submitted 8 November, 2019; v1 submitted 27 January, 2019;
originally announced January 2019.
-
A Light Dilatonic Higgs and a Dilatonic Inflaton in the Georgi-Glashow SU(5) Model
Authors:
Hassan Saadi
Abstract:
In this paper, two dilatonic fields that capture two conformal symmetries in the Georgi-Glashow SU(5) model are introduced. Then, one of the fields is associated with the Higgs, and the other one with inflation. By using the Higgs portal, the mass of the dilatonic Higgs can be tuned by the coupling constant between the two dilatonic fields.
In this paper, two dilatonic fields that capture two conformal symmetries in the Georgi-Glashow SU(5) model are introduced. Then, one of the fields is associated with the Higgs, and the other one with inflation. By using the Higgs portal, the mass of the dilatonic Higgs can be tuned by the coupling constant between the two dilatonic fields.
△ Less
Submitted 13 October, 2017; v1 submitted 3 September, 2017;
originally announced September 2017.
-
A New Multiple Access Technique for 5G: Power Domain Sparse Code Multiple Access (PSMA)
Authors:
Nader Mokari,
Mohammad. R Javan,
Mohammad Moltafet,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
In this paper, a new approach for multiple access (MA) in fifth generation (5G) of cellular networks called power domain sparse code multiple access (PSMA) is proposed. In PSMA, we adopt both the power domain and the code domain to transmit multiple users' signals over a subcarrier simultaneously. In such a model, the same SCMA codebook can be used by multiple users where, for these users, power d…
▽ More
In this paper, a new approach for multiple access (MA) in fifth generation (5G) of cellular networks called power domain sparse code multiple access (PSMA) is proposed. In PSMA, we adopt both the power domain and the code domain to transmit multiple users' signals over a subcarrier simultaneously. In such a model, the same SCMA codebook can be used by multiple users where, for these users, power domain non-orthogonal multiple access (PD-NOMA) technique is used to send signals non-orthogonally. Although different SCMA codebooks are orthogonal and produce no interference over each other, the same codebook used by multiple users produces interference over these users. We investigate the signal model as well as the receiver and transmitter of the PSMA method. To evaluate the performance of PSMA, we consider a heterogeneous cellular network (HetNet). In this case our design objective is to maximize the system sum rate of the network subject to some system level and QoS constraints such as transmit power constraints. We formulate the proposed resource allocation problem as an optimization problem and solve it by successive convex approximation (SCA) techniques. Moreover, we compare PSMA with sparse code multiple access (SCMA) and PD-NOMA from the performance and computational complexity perspective. Finally, the effectiveness of the proposed approach is investigated using numerical results. We show that by a reasonable increase in complexity, PSMA can improve the spectral efficiency about 50\% compared to SCMA and PD-NOMA.
△ Less
Submitted 20 June, 2017;
originally announced June 2017.
-
Design of Capacity Approaching Ensembles of LDPC Codes for Correlated Sources using EXIT Charts
Authors:
Mohamad Khas Mohamadi,
Hamid Saeedi,
Reza Asvadi
Abstract:
This paper is concerned with the design of capacity approaching ensembles of Low-Densiy Parity-Check (LDPC) codes for correlated sources. We consider correlated binary sources where the data is encoded independently at each source through a systematic LDPC encoder and sent over two independent channels. At the receiver, a iterative joint decoder consisting of two component LDPC decoders is conside…
▽ More
This paper is concerned with the design of capacity approaching ensembles of Low-Densiy Parity-Check (LDPC) codes for correlated sources. We consider correlated binary sources where the data is encoded independently at each source through a systematic LDPC encoder and sent over two independent channels. At the receiver, a iterative joint decoder consisting of two component LDPC decoders is considered where the encoded bits at the output of each component decoder are used at the other decoder as the a priori information. We first provide asymptotic performance analysis using the concept of extrinsic information transfer (EXIT) charts. Compared to the conventional EXIT charts devised to analyze LDPC codes for point to point communication, the proposed EXIT charts have been completely modified to able to accommodate the systematic nature of the codes as well as the iterative behavior between the two component decoders. Then the developed modified EXIT charts are deployed to design ensembles for different levels of correlation. Our results show that as the average degree of the designed ensembles grow, the thresholds corresponding to the designed ensembles approach the capacity. In particular, for ensembles with average degree of around 9, the gap to capacity is reduced to about 0.2dB. Finite block length performance evaluation is also provided for the designed ensembles to verify the asymptotic results.
△ Less
Submitted 27 January, 2017;
originally announced January 2017.
-
A Cosmological Solution to Mimetic Dark Matter
Authors:
Hassan Saadi
Abstract:
In this paper, a cosmological solution to Mimetic Dark Matter (MDM) for an exponential potential is provided. Then, a solution for the $0-i$ perturbed Einstein's differential equation of MDM is obtained based on an exponential potential that satisfies inflation for some initial conditions. Another general potential is suggested that incorporates inflation too. Then, quantum perturbations are inclu…
▽ More
In this paper, a cosmological solution to Mimetic Dark Matter (MDM) for an exponential potential is provided. Then, a solution for the $0-i$ perturbed Einstein's differential equation of MDM is obtained based on an exponential potential that satisfies inflation for some initial conditions. Another general potential is suggested that incorporates inflation too. Then, quantum perturbations are included. The constants in the model can be tuned to be in agreement with the amplitude fluctuation of the cosmic microwave background (CMB) radiation. Finally, the spectral index is calculated for the suggested potentials. Moreover, MDM is shown to be a viable model to produce dark matter, inflation, and CMB's fluctuation.
△ Less
Submitted 25 October, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
On a Voter model on R^d: Cluster growth in the Spatial Lambda-Fleming-Viot Process
Authors:
Habib Saadi
Abstract:
The spatial Lambda-Fleming-Viot (SLFV) process (Barton, Etheridge and Véber, 2010) can be seen as a generalised Voter Model with configuration space $M^{R^d}$, where M is the set of probability measures on some space K. Such processes are usually studied thanks to a dual process that describes the genealogy of a sample of particles. In this paper, we study the growth of a cluster, and our surprisi…
▽ More
The spatial Lambda-Fleming-Viot (SLFV) process (Barton, Etheridge and Véber, 2010) can be seen as a generalised Voter Model with configuration space $M^{R^d}$, where M is the set of probability measures on some space K. Such processes are usually studied thanks to a dual process that describes the genealogy of a sample of particles. In this paper, we study the growth of a cluster, and our surprising result is that with probability one, every bounded cluster stops growing in finite time. Because the traditional (backward in time) duality methods fail, we develop an original forward in time approach that exploits a martingale property of the process. To make it feasible, we construct adequate objects that allow to handle the complex geometry of the problem. We are able to prove the result in any dimension $d$.
△ Less
Submitted 26 January, 2014;
originally announced January 2014.
-
Improvement of Automatic Hemorrhages Detection Methods Using Shapes Recognition
Authors:
Nidhal Khdhair El Abbadi,
Enas Hamood Al Saadi
Abstract:
Diabetic Retinopathy is a medical condition where the retina is damaged because fluid leaks from blood vessels into the retina. The presence of hemorrhages in the retina is the earliest symptom of diabetic retinopathy. The number and shape of hemorrhages is used to indicate the severity of the disease. Early automated hemorrhage detection can help reduce the incidence of blindness. This paper intr…
▽ More
Diabetic Retinopathy is a medical condition where the retina is damaged because fluid leaks from blood vessels into the retina. The presence of hemorrhages in the retina is the earliest symptom of diabetic retinopathy. The number and shape of hemorrhages is used to indicate the severity of the disease. Early automated hemorrhage detection can help reduce the incidence of blindness. This paper introduced new method depending on the hemorrhage shape to detect the dot hemorrhage (DH), its number, and size at early stage, this can be achieved by reducing the retinal image details. Detection and recognize the DH by following three sequential steps, removing the fovea, removing the vasculature and recognize DH by determining the circularity for all the objects in the image, finally determine the shape factor which is related to DH recognition, this stage strengthens the recognition process. The proposed method recognizes and separates all the DH.
△ Less
Submitted 22 October, 2013;
originally announced October 2013.
-
LLR Approximation for Wireless Channels Based on Taylor Series and Its Application to BICM with LDPC Codes
Authors:
Reza Asvadi,
Amir H. Banihashemi,
Mahmoud Ahmadian-Attari,
Hamid Saeedi
Abstract:
A new approach for the approximation of the channel log-likelihood ratio (LLR) for wireless channels based on Taylor series is proposed. The approximation is applied to the uncorrelated flat Rayleigh fading channel with unknown channel state information at the receiver. It is shown that the proposed approximation greatly simplifies the calculation of channel LLRs, and yet provides results almost i…
▽ More
A new approach for the approximation of the channel log-likelihood ratio (LLR) for wireless channels based on Taylor series is proposed. The approximation is applied to the uncorrelated flat Rayleigh fading channel with unknown channel state information at the receiver. It is shown that the proposed approximation greatly simplifies the calculation of channel LLRs, and yet provides results almost identical to those based on the exact calculation of channel LLRs. The results are obtained in the context of bit-interleaved coded modulation (BICM) schemes with low-density parity-check (LDPC) codes, and include threshold calculations and error rate performance of finite-length codes. Compared to the existing approximations, the proposed method is either significantly less complex, or considerably more accurate.
△ Less
Submitted 15 March, 2011; v1 submitted 14 March, 2011;
originally announced March 2011.
-
Capacity Achieving Linear Codes with Random Binary Sparse Generating Matrices
Authors:
A. Makhdoumi Kakhaki,
H. Karkeh Abadi,
P. Pad,
H. Saeedi,
F. Marvasti,
K. Alishahi
Abstract:
In this paper, we prove the existence of capacity achieving linear codes with random binary sparse generating matrices. The results on the existence of capacity achieving linear codes in the literature are limited to the random binary codes with equal probability generating matrix elements and sparse parity-check matrices. Moreover, the codes with sparse generating matrices reported in the literat…
▽ More
In this paper, we prove the existence of capacity achieving linear codes with random binary sparse generating matrices. The results on the existence of capacity achieving linear codes in the literature are limited to the random binary codes with equal probability generating matrix elements and sparse parity-check matrices. Moreover, the codes with sparse generating matrices reported in the literature are not proved to be capacity achieving.
As opposed to the existing results in the literature, which are based on optimal maximum a posteriori decoders, the proposed approach is based on a different decoder and consequently is suboptimal. We also demonstrate an interesting trade-off between the sparsity of the generating matrix and the error exponent (a constant which determines how exponentially fast the probability of error decays as block length tends to infinity). An interesting observation is that for small block sizes, less sparse generating matrices have better performances while for large blok sizes, the performance of the random generating matrices become independent of the sparsity. Moreover, we prove the existence of capacity achieving linear codes with a given (arbitrarily low) density of ones on rows of the generating matrix. In addition to proving the existence of capacity achieving sparse codes, an important conclusion of our paper is that for a sufficiently large code length, no search is necessary in practice to find a deterministic matrix by proving that any arbitrarily selected sequence of sparse generating matrices is capacity achieving with high probability. The focus in this paper is on the binary symmetric and binary erasure channels.her discrete memory-less symmetric channels.
△ Less
Submitted 29 August, 2011; v1 submitted 20 February, 2011;
originally announced February 2011.
-
Assessment of effective parameters on dilution using approximate reasoning methods in longwall mining method, Iran coal mines
Authors:
H. Owladeghaffari,
K. Shahriar,
G. H. R. Saeedi
Abstract:
Approximately more than 90% of all coal production in Iranian underground mines is derived directly longwall mining method. Out of seam dilution is one of the essential problems in these mines. Therefore the dilution can impose the additional cost of mining and milling. As a result, recognition of the effective parameters on the dilution has a remarkable role in industry. In this way, this paper…
▽ More
Approximately more than 90% of all coal production in Iranian underground mines is derived directly longwall mining method. Out of seam dilution is one of the essential problems in these mines. Therefore the dilution can impose the additional cost of mining and milling. As a result, recognition of the effective parameters on the dilution has a remarkable role in industry. In this way, this paper has analyzed the influence of 13 parameters (attributed variables) versus the decision attribute (dilution value), so that using two approximate reasoning methods, namely Rough Set Theory (RST) and Self Organizing Neuro- Fuzzy Inference System (SONFIS) the best rules on our collected data sets has been extracted. The other benefit of later methods is to predict new unknown cases. So, the reduced sets (reducts) by RST have been obtained. Therefore the emerged results by utilizing mentioned methods shows that the high sensitive variables are thickness of layer, length of stope, rate of advance, number of miners, type of advancing.
△ Less
Submitted 9 May, 2008;
originally announced May 2008.
-
Deterministic Design of Low-Density Parity-Check Codes for Binary Erasure Channels
Authors:
Hamid Saeedi,
Amir H. Banihashemi
Abstract:
We propose a deterministic method to design irregular Low-Density Parity-Check (LDPC) codes for binary erasure channels (BEC). Compared to the existing methods, which are based on the application of asymptomatic analysis tools such as density evolution or Extrinsic Information Transfer (EXIT) charts in an optimization process, the proposed method is much simpler and faster. Through a number of e…
▽ More
We propose a deterministic method to design irregular Low-Density Parity-Check (LDPC) codes for binary erasure channels (BEC). Compared to the existing methods, which are based on the application of asymptomatic analysis tools such as density evolution or Extrinsic Information Transfer (EXIT) charts in an optimization process, the proposed method is much simpler and faster. Through a number of examples, we demonstrate that the codes designed by the proposed method perform very closely to the best codes designed by optimization. An important property of the proposed designs is the flexibility to select the number of constituent variable node degrees P. The proposed designs include existing deterministic designs as a special case with P = N-1, where N is the maximum variable node degree. Compared to the existing deterministic designs, for a given rate and a given d > 0, the designed ensembles can have a threshold in d-neighborhood of the capacity upper bound with smaller values of P and N. They can also achieve the capacity of the BEC as N, and correspondingly P and the maximum check node degree tend to infinity.
△ Less
Submitted 23 January, 2008;
originally announced January 2008.