Skip to main content

Showing 1–34 of 34 results for author: Ahmad, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20058  [pdf, other

    cs.CV

    Enhancing Plant Disease Detection: A Novel CNN-Based Approach with Tensor Subspace Learning and HOWSVD-MD

    Authors: Abdelmalik Ouamane, Ammar Chouchane, Yassine Himeur, Abderrazak Debilou, Abbes Amira, Shadi Atalla, Wathiq Mansoor, Hussain Al Ahmad

    Abstract: Machine learning has revolutionized the field of agricultural science, particularly in the early detection and management of plant diseases, which are crucial for maintaining crop health and productivity. Leveraging advanced algorithms and imaging technologies, researchers are now able to identify and classify plant diseases with unprecedented accuracy and speed. Effective management of tomato dis… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 17 pages, 9 figures and 8 tables

  2. arXiv:2404.03188  [pdf

    eess.IV cs.CV cs.LG

    Classification of Nasopharyngeal Cases using DenseNet Deep Learning Architecture

    Authors: W. S. H. M. W. Ahmad, M. F. A. Fauzi, M. K. Abdullahi, Jenny T. H. Lee, N. S. A. Basry, A Yahaya, A. M. Ismail, A. Adam, Elaine W. L. Chan, F. S. Abas

    Abstract: Nasopharyngeal carcinoma (NPC) is one of the understudied yet deadliest cancers in South East Asia. In Malaysia, the prevalence is identified mainly in Sarawak, among the ethnic of Bidayuh. NPC is often late-diagnosed because it is asymptomatic at the early stage. There are several tissue representations from the nasopharynx biopsy, such as nasopharyngeal inflammation (NPI), lymphoid hyperplasia (… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: This article has been accepted in the Journal of Engineering Science and Technology (JESTEC) and awaiting publication

  3. arXiv:2403.17338  [pdf, other

    eess.SY cs.AI

    Reinforcement Learning-based Receding Horizon Control using Adaptive Control Barrier Functions for Safety-Critical Systems

    Authors: Ehsan Sabouni, H. M. Sabbir Ahmad, Vittorio Giammarino, Christos G. Cassandras, Ioannis Ch. Paschalidis, Wenchao Li

    Abstract: Optimal control methods provide solutions to safety-critical problems but easily become intractable. Control Barrier Functions (CBFs) have emerged as a popular technique that facilitates their solution by provably guaranteeing safety, through their forward invariance property, at the expense of some performance loss. This approach involves defining a performance objective alongside CBF-based safet… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  4. arXiv:2403.15169  [pdf, other

    cs.SE

    Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures

    Authors: Majid Abdulsatar, Hussain Ahmad, Diksha Goel, Faheem Ullah

    Abstract: The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security r… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  5. arXiv:2403.07909  [pdf, other

    cs.DC eess.SY

    Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures

    Authors: Hussain Ahmad, Christoph Treude, Markus Wagner, Claudia Szabo

    Abstract: Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, container orchestration platforms such as Kubernetes feature Horizontal Pod Auto-scalers (HPAs) designed to adjust the resources of microservices to accommodate fluctuating workloads. However, existin… ▽ More

    Submitted 26 February, 2024; originally announced March 2024.

  6. arXiv:2402.00243  [pdf, other

    cs.CV

    Capacity Constraint Analysis Using Object Detection for Smart Manufacturing

    Authors: Hafiz Mughees Ahmad, Afshin Rahimi, Khizer Hayat

    Abstract: The increasing popularity of Deep Learning (DL) based Object Detection (OD) methods and their real-world applications have opened new venues in smart manufacturing. Traditional industries struck by capacity constraints after Coronavirus Disease (COVID-19) require non-invasive methods for in-depth operations' analysis to optimize and increase their revenue. In this study, we have initially develope… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

    ACM Class: I.2.10; I.4.8; I.4.9; I.5.1; I.5.4

  7. arXiv:2311.01624  [pdf, other

    eess.IV cs.CV

    Attention based Dual-Branch Complex Feature Fusion Network for Hyperspectral Image Classification

    Authors: Mohammed Q. Alkhatib, Mina Al-Saad, Nour Aburaed, M. Sami Zitouni, Hussain Al Ahmad

    Abstract: This research work presents a novel dual-branch model for hyperspectral image classification that combines two streams: one for processing standard hyperspectral patches using Real-Valued Neural Network (RVNN) and the other for processing their corresponding Fourier transforms using Complex-Valued Neural Network (CVNN). The proposed model is evaluated on the Pavia University and Salinas datasets.… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  8. arXiv:2306.01871  [pdf, other

    cs.RO

    Optimal Control of Connected Automated Vehicles with Event-Triggered Control Barrier Functions: a Test Bed for Safe Optimal Merging

    Authors: Ehsan Sabouni, H. M. Sabbir Ahmad, Wei Xiao, Christos G. Cassandras, Wenchao Li

    Abstract: We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints. It has been shown that such problems can be solved through a combination of tractable optimal control problems and Control Barrier Functions (CBFs) that guarantee the satisfaction of all constraints. These solutions can be reduced to a sequence of… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2203.12089, arXiv:2209.13053

  9. arXiv:2305.16818  [pdf, other

    cs.MA cs.AI eess.SY

    Trust-Aware Resilient Control and Coordination of Connected and Automated Vehicles

    Authors: H M Sabbir Ahmad, Ehsan Sabouni, Wei Xiao, Christos G. Cassandras, Wenchao Li

    Abstract: We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can cause safety violations resulting in collisions and traffic jams. In addition, uncooperative (but not necessarily adversarial) CAVs can also induce similar adversarial effects on the traffic network. We propose a decentralize… ▽ More

    Submitted 2 June, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: Keywords: Resilient control and coordination, Cybersecurity, Safety guaranteed coordination, Connected And Autonomous Vehicles

  10. arXiv:2212.05856  [pdf, other

    cs.CL

    "I think this is the most disruptive technology": Exploring Sentiments of ChatGPT Early Adopters using Twitter Data

    Authors: Mubin Ul Haque, Isuru Dharmadasa, Zarrin Tasnim Sworna, Roshan Namal Rajapakse, Hussain Ahmad

    Abstract: Large language models have recently attracted significant attention due to their impressive performance on a variety of tasks. ChatGPT developed by OpenAI is one such implementation of a large, pre-trained language model that has gained immense popularity among early adopters, where certain users go to the extent of characterizing it as a disruptive technology in many domains. Understanding such e… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

    Comments: This is an early version of this paper

  11. arXiv:2211.09392  [pdf, other

    cs.CV cs.AI cs.LG

    Data Dimension Reduction makes ML Algorithms efficient

    Authors: Wisal Khan, Muhammad Turab, Waqas Ahmad, Syed Hasnat Ahmad, Kelash Kumar, Bin Luo

    Abstract: Data dimension reduction (DDR) is all about map** data from high dimensions to low dimensions, various techniques of DDR are being used for image dimension reduction like Random Projections, Principal Component Analysis (PCA), the Variance approach, LSA-Transform, the Combined and Direct approaches, and the New Random Approach. Auto-encoders (AE) are used to learn end-to-end map**. In this pap… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Our paper is accepted at International Conference On Emerging Technologies In Electronics, Computing And Communication (ICETECC) 2022

  12. arXiv:2109.09730  [pdf, other

    cs.DL cs.IR

    Trends in Publishing Blockchain Surveys: A Bibliometric Perspective

    Authors: Hira Ahmad, Muhammad Ahtazaz Ahsan, Adnan Noor Mian

    Abstract: A large number of survey papers are being published in blockchain since the first survey appeared in 2017. A person entering into the field of blockchain is faced with the issue of which blockchain surveys to read and why? Who is publishing these surveys and what is the nature of these surveys? Which of the publishers are publishing more such surveys and what are the lengths of the published surve… ▽ More

    Submitted 11 January, 2022; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: - 11 pages, 12 figures, 4 tables - We have not only added many new results but also included data analysis till September 2021 in this version

  13. arXiv:2109.05688  [pdf

    q-bio.NC cs.DL

    Thematic analysis of multiple sclerosis research by enhanced strategic diagram

    Authors: Nazlahshaniza Shafina, Che Aishah Nazariah Ismaila, Mohd Zulkifli Mustafa, Nurhafizah Ghani, Asma Hayati Ahmad, Zahiruddin Othman, Adi Wijaya, Rahimah Zakaria

    Abstract: This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Comments: 20 pages,6 figures

  14. arXiv:2108.03601  [pdf

    cs.LG

    Using Biological Variables and Social Determinants to Predict Malaria and Anemia among Children in Senegal

    Authors: Boubacar Sow, Hiroki Suguri, Hamid Mukhtar, Hafiz Farooq Ahmad

    Abstract: Integrating machine learning techniques in healthcare becomes very common nowadays, and it contributes positively to improving clinical care and health decisions planning. Anemia and malaria are two life-threatening diseases in Africa that affect the red blood cells and reduce hemoglobin production. This paper focuses on analyzing child health data in Senegal using four machine learning algorithms… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  15. arXiv:2104.11906  [pdf, other

    cs.CR eess.SY

    A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures

    Authors: Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar

    Abstract: Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or… ▽ More

    Submitted 31 January, 2022; v1 submitted 24 April, 2021; originally announced April 2021.

  16. arXiv:2103.08856  [pdf, other

    cs.NI

    Intelligent Stretch Reduction in Information-CentricNetworking towards 5G-Tactile Internet realization

    Authors: Hussain Ahmad, Muhammad Zubair Islam, Amir Haider, Rashid Ali, Hyung Seok Kim

    Abstract: In recent years, 5G is widely used in parallel with IoT networks to enable massive data connectivity and exchange with ultra-reliable and low latency communication (URLLC) services. The internet requirements from user's perspective have shifted from simple human to human interactions to different communication paradigms and information-centric networking (ICN). ICN distributes the content among t… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: 6 pages, 4 Figures, 1 Table, International Conference on Green and Human Information Technology (ICGHIT) 2021

  17. arXiv:2103.08117  [pdf, ps, other

    cs.LO cs.PL

    A Program Logic to Verify Signal Temporal Logic Specifications of Hybrid Systems: Extended Technical Report

    Authors: Hammad Ahmad, Jean-Baptiste Jeannin

    Abstract: Signal temporal logic (STL) was introduced for monitoring temporal properties of continuous-time signals for continuous and hybrid systems. Differential dynamic logic (dL) was introduced to reason about the end states of a hybrid program. Over the past decade, STL and its variants have significantly gained in popularity in the industry for monitoring purposes, while dL has gained in popularity for… ▽ More

    Submitted 15 March, 2021; v1 submitted 14 March, 2021; originally announced March 2021.

  18. Smart Grid: A Survey of Architectural Elements, Machine Learning and Deep Learning Applications and Future Directions

    Authors: Navod Neranjan Thilakarathne, Mohan Krishna Kagita, Dr. Surekha Lanka, Hussain Ahmad

    Abstract: The Smart grid (SG), generally known as the next-generation power grid emerged as a replacement for ill-suited power systems in the 21st century. It is in-tegrated with advanced communication and computing capabilities, thus it is ex-pected to enhance the reliability and the efficiency of energy distribution with minimum effects. With the massive infrastructure it holds and the underlying communic… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  19. arXiv:1909.09807  [pdf, ps, other

    cs.DB

    Automatic Weighted Matching Rectifying Rule Discovery for Data Repairing

    Authors: Hiba Abu Ahmad, Hongzhi Wang

    Abstract: Data repairing is a key problem in data cleaning which aims to uncover and rectify data errors. Traditional methods depend on data dependencies to check the existence of errors in data, but they fail to rectify the errors. To overcome this limitation, recent methods define repairing rules on which they depend to detect and fix errors. However, all existing data repairing rules are provided by expe… ▽ More

    Submitted 21 September, 2019; originally announced September 2019.

  20. arXiv:1906.09336  [pdf, other

    cs.CV

    Building a Benchmark Dataset and Classifiers for Sentence-Level Findings in AP Chest X-rays

    Authors: Tanveer Syeda-Mahmood, Hassan M. Ahmad, Nadeem Ansari, Yaniv Gur, Satyananda Kashyap, Alexandros Karargyris, Mehdi Moradi, Anup Pillai, Karthik Sheshadri, Weiting Wang, Ken C. L. Wong, Joy T. Wu

    Abstract: Chest X-rays are the most common diagnostic exams in emergency rooms and hospitals. There has been a surge of work on automatic interpretation of chest X-rays using deep learning approaches after the availability of large open source chest X-ray dataset from NIH. However, the labels are not sufficiently rich and descriptive for training classification tools. Further, it does not adequately address… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: This paper was accepted by the IEEE International Symposium on Biomedical Imaging (ISBI) 2019

  21. Lecturer Performance System Using Neural Network with Particle Swarm Optimization

    Authors: Tarik A. Rashid, Hawraz A. Ahmad

    Abstract: The field of analyzing performance is very important and sensitive in particular when it is related to the performance of lecturers in academic institutions. Locating the weak points of lecturers through a system that provides an early warning to notify or reward the lecturers with warned or punished notices will help them to improve their weaknesses, leads to a better quality in the institutions.… ▽ More

    Submitted 8 April, 2019; originally announced April 2019.

    Comments: 20 pages

    Journal ref: Computer Applications in Engineering Education. Wiley publication, 2016

  22. arXiv:1901.06585  [pdf

    cs.CV

    Face Detection and Face Recognition In the Wild Using Off-the-Shelf Freely Available Components

    Authors: Hira Ahmad

    Abstract: This paper presents an easy and efficient face detection and face recognition approach using free software components from the internet. Face detection and face recognition problems have wide applications in home and office security. Therefore this work will helpful for those searching for a free face off-the-shelf face detection system. Using this system, faces can be detected in uncontrolled env… ▽ More

    Submitted 19 January, 2019; originally announced January 2019.

    Comments: 6 pages, 3 figures

  23. arXiv:1901.04986  [pdf

    cs.DC cs.LG eess.IV

    Systimator: A Design Space Exploration Methodology for Systolic Array based CNNs Acceleration on the FPGA-based Edge Nodes

    Authors: Hazoor Ahmad, Muhammad Tanvir, Muhammad Abdullah Hanif, Muhammad Usama Javed, Rehan Hafiz, Muhammad Shafique

    Abstract: The evolution of IoT based smart applications demand porting of artificial intelligence algorithms to the edge computing devices. CNNs form a large part of these AI algorithms. Systolic array based CNN acceleration is being widely advocated due its ability to allow scalable architectures. However, CNNs are inherently memory and compute intensive algorithms, and hence pose significant challenges to… ▽ More

    Submitted 8 February, 2019; v1 submitted 15 December, 2018; originally announced January 2019.

    Comments: 5 Pages, 3 Figures, work in progress

  24. arXiv:1803.03114  [pdf, other

    cs.AI

    Concise Fuzzy Planar Embedding of Graphs: a Dimensionality Reduction Approach

    Authors: Faisal N. Abu-Khzam, Rana H. Mouawi, Amer Hajj Ahmad, Sergio Thoumi

    Abstract: The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of nodes. However, rigorous edge storage might not always be essential to be able to draw the needed conclusions. A similar problem takes records with many variables and attempts to… ▽ More

    Submitted 15 December, 2023; v1 submitted 8 March, 2018; originally announced March 2018.

  25. arXiv:1606.01449  [pdf

    cs.CY

    Conceptual Knowledge Relationship Model of Enterprise Architecture and Top Management Roles

    Authors: Hawa Ahmad, Aishah Ahmad, Nik Hazlina Nik Abdullah Hafaz

    Abstract: Enterprise Architecture (EA) continues to gain global recognition as a management tool that would improve the organizations performance. However, based on literature, it was found that the lack of EA knowledge of top management (TM) hinders the assimiliation of EA. This study aims to gauge EA knowledge required for TM for providing a comprehensive support towards EA assimiliation. A semi-structure… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/144

  26. arXiv:1605.07168   

    cs.CR

    A Miniature CCA2 Public key Encryption scheme based on non-Abelian factorization problems in Lie Groups

    Authors: Haibo Hong, Licheng Wang, Jun Shao, Haseeb Ahmad, Yixian Yang

    Abstract: Since 1870s, scientists have been taking deep insight into Lie groups and Lie algebras. With the development of Lie theory, Lie groups have got profound significance in many branches of mathematics and physics. In Lie theory, exponential map** between Lie groups and Lie algebras plays a crucial role. Exponential map** is the mechanism for passing information from Lie algebras to Lie groups. Si… ▽ More

    Submitted 10 June, 2016; v1 submitted 21 May, 2016; originally announced May 2016.

    Comments: This paper has been withdrawn by the author due to substantial text overlap with arXiv:1605.06608

  27. arXiv:1605.06608  [pdf, ps, other

    cs.CR

    Public Key Encryption in Non-Abelian Groups

    Authors: Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang

    Abstract: In this paper, we propose a brand new public key encryption scheme in the Lie group that is a non-abelian group. In particular, we firstly investigate the intractability assumptions in the Lie group, including the non-abelian factoring assumption and non-abelian inserting assumption. After that, by using the FO technique, a CCA secure public key encryption scheme in the Lie group is proposed. At l… ▽ More

    Submitted 21 May, 2016; originally announced May 2016.

  28. Development of a Large-scale Neuroimages and Clinical Variables Data Atlas in the neuGRID4You (N4U) project

    Authors: Kamran Munir, Khawar Hasham Ahmad, Richard McClatchey

    Abstract: Exceptional growth in the availability of large-scale clinical imaging datasets has led to the development of computational infrastructures offering scientists access to image repositories and associated clinical variables data. The EU FP7 neuGRID and its follow on neuGRID4You (N4U) project is a leading e-Infrastructure where neuroscientists can find core services and resources for brain image ana… ▽ More

    Submitted 29 November, 2015; originally announced November 2015.

    Comments: 35 pages, 15 figures, Journal of Biomedical Informatics, 2015

  29. arXiv:1507.01163  [pdf, ps, other

    cs.CR

    Minimal Logarithmic Signatures for one type of Classical Groups

    Authors: Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang

    Abstract: As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length, called a minimal logarithmic signature (MLS), is even desirable for cryptographic applications. The MLS conjecture states that every finite… ▽ More

    Submitted 4 July, 2015; originally announced July 2015.

  30. arXiv:1507.01162  [pdf, ps, other

    cs.CR

    Minimal Logarithmic Signatures for Sporadic Groups

    Authors: Haibo Hong, Licheng Wang, Haseeb Ahmad, **g Li, Yixian Yang

    Abstract: As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length is called a minimal logarithmic signature (MLS) and is even desirable for cryptographic constructions. The MLS conjecture states that every f… ▽ More

    Submitted 4 July, 2015; originally announced July 2015.

  31. arXiv:1309.3692  [pdf, ps, other

    cs.IT

    Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework

    Authors: Yang Liu, Mingyan Liu, Sahand Haji Ali Ahmad

    Abstract: This paper considers a widely studied stochastic control problem arising from opportunistic spectrum access (OSA) in a multi-channel system, with the goal of providing a unifying analytical framework whereby a number of prior results may be viewed as special cases. Specifically, we consider a single wireless transceiver/user with access to $N$ channels, each modeled as an iid discrete-time two-sta… ▽ More

    Submitted 14 September, 2013; originally announced September 2013.

  32. arXiv:0910.4214  [pdf, ps, other

    cs.GT cs.MA

    Congestion games with resource reuse and applications in spectrum sharing

    Authors: Sahand Haji Ali Ahmad, Mingyan Liu, Yunnan Wu

    Abstract: In this paper we consider an extension to the classical definition of congestion games (CG) in which multiple users share the same set of resources and their payoff for using any resource is a function of the total number of users sharing it. The classical congestion games enjoy some very appealing properties, including the existence of a Nash equilibrium and that every improvement path is finit… ▽ More

    Submitted 21 October, 2009; originally announced October 2009.

    Comments: 9 pages, 3 figures, International Conference on Game Theory for Networks (GameNets), May 2009, Istanbul, Turkey

  33. arXiv:0910.1954  [pdf, ps, other

    cs.IT cs.DM math.OC

    Multi-channel Opportunistic Access: A Case of Restless Bandits with Multiple Plays

    Authors: Sahand Haji Ali Ahmad, Mingyan Liu

    Abstract: This paper considers the following stochastic control problem that arises in opportunistic spectrum access: a system consists of n channels (Gilbert-Elliot channels)where the state (good or bad) of each channel evolves as independent and identically distributed Markov processes. A user can select exactly k channels to sense and access (based on the sensing result) in each time slot. A reward is… ▽ More

    Submitted 10 October, 2009; originally announced October 2009.

    Comments: 8 pages, 0 figures, Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, 2009

    Journal ref: Proceedings of Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, 2009

  34. arXiv:0811.0637  [pdf, ps, other

    cs.NI cs.IT

    Optimality of Myopic Sensing in Multi-Channel Opportunistic Access

    Authors: Sahand H. A. Ahmad, Mingyan Liu, Tara Javidi, Qing Zhao, Bhaskar Krishnamachari

    Abstract: We consider opportunistic communications over multiple channels where the state ("good" or "bad") of each channel evolves as independent and identically distributed Markov processes. A user, with limited sensing and access capability, chooses one channel to sense and subsequently access (based on the sensed channel state) in each time slot. A reward is obtained when the user senses and accesses… ▽ More

    Submitted 10 March, 2009; v1 submitted 4 November, 2008; originally announced November 2008.

    Comments: Revised version