Skip to main content

Showing 1–29 of 29 results for author: Ahmadi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.05540  [pdf, other

    cs.CL cs.AI cs.LG

    OPSD: an Offensive Persian Social media Dataset and its baseline evaluations

    Authors: Mehran Safayani, Amir Sartipi, Amir Hossein Ahmadi, Parniyan Jalali, Amir Hossein Mansouri, Mohammad Bisheh-Niasar, Zahra Pourbahman

    Abstract: The proliferation of hate speech and offensive comments on social media has become increasingly prevalent due to user activities. Such comments can have detrimental effects on individuals' psychological well-being and social behavior. While numerous datasets in the English language exist in this domain, few equivalent resources are available for Persian language. To address this gap, this paper in… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: 16 pages, 5 figures, 8 tables

  2. arXiv:2403.11869  [pdf

    cs.NI

    Rapidly Deployable Intelligent 5G Aerial Neutral Host Networks: an O-RAN-Based Approach

    Authors: Yi Chu, David Grace, Josh Shackleton, Andy White, David Hunter, Hamed Ahmadi

    Abstract: Arxiv is acting weird and throwing error: "Bad character(s) in field Abstract." for no reason. Please refer to the manuscript.

    Submitted 18 March, 2024; originally announced March 2024.

  3. arXiv:2310.02927  [pdf, other

    cs.NI

    Joint Network Lifetime Maximization and Relay Selection Design in Underwater Acoustic Sensor Networks

    Authors: Z. Mohammadi, M. Soleimanpour-Moghadam, S. Talebi, H. Ahmadi

    Abstract: The paper proposes a new approach to minimize the number of relays while maximizing the lifetime of underwater acoustic sensor networks (UASNs). This involves formulating the relay node placement (RNP) problem as a multi-objective optimization problem and employing the multi-objective lexico-graphic method (MOLM) to solve it. To achieve the optimal solution, the MOLM consists of two steps. First,… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: Accepted for publication at IEEE Systems journal

  4. arXiv:2303.13523  [pdf, other

    cs.NI

    Dynamic Prioritization and Adaptive Scheduling using Deep Deterministic Policy Gradient for Deploying Microservice-based VNFs

    Authors: Swarna B. Chetty, Hamed Ahmadi, Avishek Nag

    Abstract: The Network Function Virtualization (NFV)-Resource Allocation (RA) problem is NP-Hard. Traditional deployment methods revealed the existence of a starvation problem, which the researchers failed to recognize. Basically, starvation here, means the longer waiting times and eventual rejection of low-priority services due to a 'time out'. The contribution of this work is threefold: a) explain the exis… ▽ More

    Submitted 17 February, 2023; originally announced March 2023.

  5. arXiv:2303.07957  [pdf, other

    cs.AI

    Automatic summarisation of Instagram social network posts Combining semantic and statistical approaches

    Authors: Kazem Taghandiki, Mohammad Hassan Ahmadi, Elnaz Rezaei Ehsan

    Abstract: The proliferation of data and text documents such as articles, web pages, books, social network posts, etc. on the Internet has created a fundamental challenge in various fields of text processing under the title of "automatic text summarisation". Manual processing and summarisation of large volumes of textual data is a very difficult, expensive, time-consuming and impossible process for human use… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

  6. YA-DA: YAng-Based DAta Model for Fine-Grained IIoT Air Quality Monitoring

    Authors: Yagmur Yigit, Khayal Huseynov, Hamed Ahmadi, Berk Canberk

    Abstract: With the development of industrialization, air pollution is also steadily on the rise since both industrial and daily activities generate a massive amount of air pollution. Since decreasing air pollution is critical for citizens' health and well-being, air pollution monitoring is becoming an essential topic. Industrial Internet of Things (IIoT) research focuses on this crucial area. Several attemp… ▽ More

    Submitted 25 October, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: This paper has been accepted at the 4th Workshop on Future of Wireless Access and Sensing for Industrial IoT (FUTUREIIOT) in IEEE Global Communications Conference (IEEE GLOBECOM) 2022

    Journal ref: 2022 IEEE Globecom Workshops (GC Wkshps), Rio de Janeiro, Brazil, 2022, pp. 438-443

  7. arXiv:2211.03696  [pdf, other

    cs.RO eess.SP

    A Transfer Learning Approach for UAV Path Design with Connectivity Outage Constraint

    Authors: Gianluca Fontanesi, Anding Zhu, Mahnaz Arvaneh, Hamed Ahmadi

    Abstract: The connectivity-aware path design is crucial in the effective deployment of autonomous Unmanned Aerial Vehicles (UAVs). Recently, Reinforcement Learning (RL) algorithms have become the popular approach to solving this type of complex problem, but RL algorithms suffer slow convergence. In this paper, we propose a Transfer Learning (TL) approach, where we use a teacher policy previously trained in… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: 14 pages,8 figures, journal paper

  8. arXiv:2108.05781  [pdf, other

    cs.NI

    Networked Twins and Twins of Networks: an Overview on the Relationship Between Digital Twins and 6G

    Authors: Hamed Ahmadi, Avishek Nag, Zaheer Khan, Kamran Sayrafian, Susanto Rahadrja

    Abstract: Digital Twin (DT) is a promising technology for the new immersive digital life with a variety of applications in areas such as Industry 4.0, aviation, and healthcare. Proliferation of this technology requires higher data rates, reliability, resilience, and lower latency beyond what is currently offered by 5G. Thus, DT can become a major driver for 6G research and development. Alternatively, 6G net… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at IEEE Communications Standards Magazine

  9. Cooperative NOMA-Based User Pairing for URLLC: A Max-Min Fairness Approach

    Authors: Fateme Salehi, Naaser Neda, Mohammad-Hassan Majidi, Hamed Ahmadi

    Abstract: In this paper, cooperative non-orthogonal multiple access (C-NOMA) is considered in short packet communications with finite blocklength (FBL) codes. The performance of a decode-and-forward (DF) relaying along with selection combining (SC) and maximum ratio combining (MRC) strategies at the receiver side is examined. We explore joint user pairing and resource allocation to maximize fair throughput… ▽ More

    Submitted 5 October, 2021; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: 11 pages, 6 figures, This paper has been accepted to publish for IEEE systems journal

    MSC Class: 93-08

  10. arXiv:2010.04993  [pdf, other

    cs.NI

    Fair Pricing In Heterogeneous Internet of Things Wireless Access Networks Using Crowdsourcing

    Authors: Vahid Haghighatdoost, Siavash Khorsandi, Hamed Ahmadi

    Abstract: Price and the quality of service are two key factors taken into account by wireless network users when they choose their network provider. The recent advances in wireless technology and massive infrastructure deployments has led to better coverage, and currently at each given wirelessly covered area there are a few network providers and each have different pricing strategies. These providers can p… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

    Comments: Accepted for publication at IEEE Internet of Things Journal

  11. arXiv:2005.00140  [pdf, other

    cs.NI

    Towards scalable user-deployed ultra-dense networks: Blockchain-enabled small cells as a service

    Authors: Emanuele Di Pascale, Hamed Ahmadi, Linda Doyle, Irene Macaluso

    Abstract: Neutral Host Small Cell Providers (SCP) represent a key element of the 5G vision of ultra-dense mobile networks. However, current business models mostly focus on multi-year agreements for large venues, such as stadiums and hotel chains. These business agreements are regulated through binding Service Level Agreements (SLAs), which tend to be too cumbersome and costly for smaller scale SCPs. As a re… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

  12. arXiv:2002.05542  [pdf

    cs.LG eess.SP

    Evaluation of electrical efficiency of photovoltaic thermal solar collector

    Authors: Mohammad Hossein Ahmadi, Alireza Baghban, Milad Sadeghzadeh, Mohammad Zamen, Amir Mosavi, Shahaboddin Shamshirband, Ravinder Kumar, Mohammad Mohammadi-Khanaposhtani

    Abstract: Solar energy is a renewable resource of energy that is broadly utilized and has the least emissions among renewable energies. In this study, machine learning methods of artificial neural networks (ANNs), least squares support vector machines (LSSVM), and neuro-fuzzy are used for advancing prediction models for the thermal performance of a photovoltaic-thermal solar collector (PV/T). In the propose… ▽ More

    Submitted 11 February, 2020; originally announced February 2020.

    Comments: 49 pages, 19 figures

    MSC Class: 68Q05

  13. arXiv:1909.09904  [pdf

    cs.CR

    Graph Model Implementation of Attribute-Based Access Control Policies

    Authors: Hadi Ahmadi, Derek Small

    Abstract: Attribute-based access control (ABAC) promises a powerful way of formalizing access policies in support of a wide range of access management scenarios. Efficient implementation of ABAC in its general form is still a challenge, especially when addressing the complexity of privacy regulations and access management required to support the explosive growth of social and IoT networks. In this paper, we… ▽ More

    Submitted 21 September, 2019; originally announced September 2019.

    Comments: 20 pages, 4 figures

  14. arXiv:1809.01030  [pdf, other

    eess.SP cs.NI

    Saving Lives at Sea with UAV-assisted Wireless Networks

    Authors: Gianluca Fontanesi, Anding Zhu, Hamed Ahmadi

    Abstract: In this paper, we investigate traits and trade-offs of a system combining UAVs with BS or C-RAN for extending the terrestrial wireless coverage over the sea in emergency situations. Results for an over the sea deployment link budget show the trade-off between power consumption and throughput to meet the Search and Rescue targets.

    Submitted 4 September, 2018; originally announced September 2018.

    Comments: 3 pages, 2 figures, 1 tab

  15. arXiv:1707.04669  [pdf, other

    cs.NI

    A Novel Airborne Self-organising Architecture for 5G+ Networks

    Authors: Hamed Ahmadi, Konstantinos Katzis, Muhammad Zeeshan Shakir

    Abstract: Network Flying Platforms (NFPs) such as unmanned aerial vehicles, unmanned balloons or drones flying at low/medium/high altitude can be employed to enhance network coverage and capacity by deploying a swarm of flying platforms that implement novel radio resource management techniques. In this paper, we propose a novel layered architecture where NFPs, of various types and flying at low/medium/high… ▽ More

    Submitted 14 July, 2017; originally announced July 2017.

    Comments: 5 pages, 2 figures, conference paper in IEEE VTC-Fall 2017, in Proceedings IEEE Vehicular Technology Conference (VTC-Fall 2017), Toronto, Canada, Sep. 2017

  16. Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

    Authors: Jonathan van de Belt, Hamed Ahmadi, Linda E. Doyle

    Abstract: Virtualization is a topic of great interest in the area of mobile and wireless communication systems. However the term virtualization is used in an inexact manner which makes it difficult to compare and contrast work that has been carried out to date. The purpose of this paper is twofold. In the first place, the paper develops a formal theory for defining virtualization. In the second instance, th… ▽ More

    Submitted 4 July, 2018; v1 submitted 10 May, 2017; originally announced May 2017.

  17. arXiv:1702.07884  [pdf, other

    cs.CV cs.LG stat.ML

    An EM Based Probabilistic Two-Dimensional CCA with Application to Face Recognition

    Authors: Mehran Safayani, Seyed Hashem Ahmadi, Homayun Afrabandpey, Abdolreza Mirzaei

    Abstract: Recently, two-dimensional canonical correlation analysis (2DCCA) has been successfully applied for image feature extraction. The method instead of concatenating the columns of the images to the one-dimensional vectors, directly works with two-dimensional image matrices. Although 2DCCA works well in different recognition tasks, it lacks a probabilistic interpretation. In this paper, we present a pr… ▽ More

    Submitted 25 February, 2017; originally announced February 2017.

  18. arXiv:1606.02142  [pdf, other

    cs.CY

    LSA-Advanced and C-RAN: A (5G) Romance of Many Dimensions

    Authors: Elma Avdic, Irene Macaluso, Hamed Ahmadi, Ismael Gomez-Miguelez, Laura Ingolotti, Nicola Marchetti, Linda Doyle

    Abstract: We examine the dimensional limitations of Licensed Shared Access (LSA) regulatory framework for spectrum sharing and propose a solution for its more dynamic implementation. We consider an additional dimension for sharing, beyond those of time, space and frequency, i.e. the sharing of the infrastructure. We explain why we believe that the emerging regulations and use-case scenarios are limiting the… ▽ More

    Submitted 7 June, 2016; originally announced June 2016.

    Comments: 10 pages, 4 figures, IEEE Communications Magazine submission

  19. arXiv:1603.05020  [pdf, other

    cs.NI

    Substitutability of Spectrum and Cloud-based Antennas in Virtualised Wireless Networks

    Authors: Hamed Ahmadi, Irene Macaluso, Ismael Gomez, Linda Doyle, Luiz DaSilva

    Abstract: Some of the new trends emerging in future wireless networks enable a vastly increased fluidity in accessing a wide range of resources, thus supporting flexible network composition and dynamic allocation of resources to virtual network operators (VNOs). In this work we study a new resource allocation opportunity that is enabled by the cloud radio access network architecture. In particular, we inves… ▽ More

    Submitted 16 March, 2016; originally announced March 2016.

    Comments: Accepted for publication in IEEE Wireless Communications, March 2016

  20. arXiv:1602.02443  [pdf, ps, other

    cs.NI

    Energy and Spectral Efficiency Gains From Multi-User MIMO-based Small Cell Reassignments

    Authors: Danny Finn, Hamed Ahmadi, Rouzbeh Razavi, Holger Claussen, Luiz DaSilva

    Abstract: In this work we investigate the reassignment of User Equipments (UEs) between adjacent small cells to concurrently enable spatial multiplexing gains through Multi-User MIMO (MU-MIMO) and reductions in energy consumption though switching emptied small cells to a sleep state. We consider a case where UEs can be reassigned between adjacent small cells provided that the targeted neighbouring cell cont… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: The paper is presented in IEEE Globecom 2015

  21. 5G Waveforms for Overlay D2D Communications: Effects of Time-Frequency Misalignment

    Authors: Quentin Bodinier, Arman Farhang, Faouzi Bader, Hamed Ahmadi, Jacques Palicot, Luiz A. DaSilva

    Abstract: This paper analyses a scenario where a Device-To-Device (D2D) pair coexists with an Orthogonal Frequency Division Multiplexing (OFDM) based incumbent network. D2D transmitter communicates in parts of spectrum left free by cellular users, while respecting a given spectral mask. The D2D pair is misaligned in time and frequency with the cellular users. Furthermore, the D2D pair utilizes alternative w… ▽ More

    Submitted 2 February, 2016; originally announced February 2016.

    Comments: 7 pages, 7 figures, Accepted at IEEE ICC 2016

  22. arXiv:1510.02743  [pdf, other

    cs.NI

    Simulating Dense Small Cell Networks

    Authors: Pedro Alvarez, Carlo Galiotto, Jonathan van de Belt, Danny Finn, Hamed Ahmadi, Luiz DaSilva

    Abstract: Through massive deployment of additional small cell infrastructure, Dense Small cell Networks (DSNs) are expected to help meet the foreseen increase in traffic demand on cellular networks. Performance assessment of architectural and protocol solutions tailored to DSNs will require system and network level simulators that can appropriately model the complex interference environment found in those n… ▽ More

    Submitted 9 October, 2015; originally announced October 2015.

    Comments: 6 pages

  23. arXiv:1507.04580  [pdf, ps, other

    cs.NI

    Optimization of Demand Hotspot Capacities using Switched Multi-Element Antenna Equipped Small Cells

    Authors: Hamed Ahmadi, Danny Finn, Rouzbeh Razavi, Holger Claussen, Luiz A. DaSilva

    Abstract: This paper presents switched Multi- Element Antennas (MEAs) as a simple, yet effective, method of enhancing the performance of small cell heterogeneous networks and compensating for the small cell base station sub-optimal placement. The switched MEA system is a low-cost system which enables the small cell to dynamically direct its transmission power toward locations of high user density, in other… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

    Comments: Accepted for publication at VTC2015-fall

  24. A Prioritised Traffic Embedding Mechanism enabling a Public Safety Virtual Operator

    Authors: Jonathan van de Belt, Hamed Ahmadi, Linda E. Doyle, Oriol Sallent

    Abstract: Public Protection and Distaster Relief (PPDR) services can benefit greatly from the availability of mobile broadband communications in disaster and emergency scenarios. While undoubtedly offering full control and reliability, dedicated networks for PPDR have resulted in high operating costs and a lack of innovation in comparison to the commercial domain. Driven by the many benefits of broadband co… ▽ More

    Submitted 15 May, 2015; originally announced May 2015.

    Comments: Accepted in VTC Fall 2015, 5 pages

  25. arXiv:1406.6950  [pdf, other

    cs.NI

    A Dynamic Embedding Algorithm for Wireless Network Virtualization

    Authors: Jonathan van de Belt, Hamed Ahmadi, Linda E. Doyle

    Abstract: Wireless network virtualization enables multiple virtual wireless networks to coexist on shared physical infrastructure. However, one of the main challenges is the problem of assigning the physical resources to virtual networks in an efficient manner. Although some work has been done on solving the embedding problem for wireless networks, few solutions are applicable to dynamic networks with chang… ▽ More

    Submitted 15 May, 2015; v1 submitted 26 June, 2014; originally announced June 2014.

    Comments: 6 pages, Accepted in VTC Fall 2014

  26. arXiv:1401.3659  [pdf, other

    cs.CR cs.IT

    Multipath Private Communication: An Information Theoretic Approach

    Authors: Hadi Ahmadi, Reihaneh Safavi-Naini

    Abstract: Sending private messages over communication environments under surveillance is an important challenge in communication security and has attracted attentions of cryptographers through time. We believe that resources other than cryptographic keys can be used for communication privacy. We consider private message transmission (PMT) in an abstract multipath communication model between two communicants… ▽ More

    Submitted 15 January, 2014; originally announced January 2014.

  27. arXiv:1303.0346  [pdf, other

    cs.CR cs.IT

    Secure Distance Bounding Verification using Physical-Channel Properties

    Authors: Hadi Ahmadi, Reihaneh Safavi-Naini

    Abstract: We consider the problem of distance bounding verification (DBV), where a proving party claims a distance and a verifying party ensures that the prover is within the claimed distance. Current approaches to "secure" distance estimation use signal's time of flight, which requires the verifier to have an accurate clock. We study secure DBV using physical channel properties as an alternative to time me… ▽ More

    Submitted 1 March, 2013; originally announced March 2013.

  28. arXiv:1004.4334  [pdf, ps, other

    cs.IT cs.CR

    New Results on Secret Key Establishment over a Pair of Broadcast Channels

    Authors: Hadi Ahmadi, Reihaneh Safavi-Naini

    Abstract: The problem of Secret Key Establishment (SKE) over a pair of independent Discrete Memoryless Broadcast Channels (DMBCs) has already been studied in \cite{Ah10}, where we provided lower and upper bounds on the secret-key capacity. In this paper, we study the above setup under each of the following two cases: (1) the DMBCs have secrecy potential, and (2) the DMBCs are stochastically degraded with in… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: 18 pages, 4 figures, submitted to the 2010 International Symposium on Information Theory and its Applications (ISITA2010).

  29. arXiv:1001.3908  [pdf, ps, other

    cs.IT cs.CR

    Secret Key Establishment over a Pair of Independent Broadcast Channels

    Authors: Hadi Ahmadi, Reihaneh Safavi-Naini

    Abstract: This paper considers the problem of information-theoretic Secret Key Establishment (SKE) in the presence of a passive adversary, Eve, when Alice and Bob are connected by a pair of independent discrete memoryless broadcast channels in opposite directions. We refer to this setup as 2DMBC. We define the secret-key capacity in the 2DMBC setup and prove lower and upper bounds on this capacity. The lowe… ▽ More

    Submitted 21 April, 2010; v1 submitted 22 January, 2010; originally announced January 2010.

    Comments: 23 Pages, 4 figures, submitted to the 2010 International Symposium on Information Theory and its Applications (ISITA2010)

    ACM Class: H.1.1; E.3