Skip to main content

Showing 1–42 of 42 results for author: Jamali, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.09029  [pdf

    cs.MM cs.IT cs.LG eess.IV

    A Parametric Rate-Distortion Model for Video Transcoding

    Authors: Maedeh Jamali, Nader Karimi, Shadrokh Samavi, Shahram Shirani

    Abstract: Over the past two decades, the surge in video streaming applications has been fueled by the increasing accessibility of the internet and the growing demand for network video. As users with varying internet speeds and devices seek high-quality video, transcoding becomes essential for service providers. In this paper, we introduce a parametric rate-distortion (R-D) transcoding model. Our model excel… ▽ More

    Submitted 13 April, 2024; originally announced April 2024.

  2. arXiv:2309.01660  [pdf

    cs.CL cs.AI

    Unveiling Theory of Mind in Large Language Models: A Parallel to Single Neurons in the Human Brain

    Authors: Mohsen Jamali, Ziv M. Williams, **g Cai

    Abstract: With their recent development, large language models (LLMs) have been found to exhibit a certain level of Theory of Mind (ToM), a complex cognitive capacity that is related to our conscious mind and that allows us to infer another's beliefs and perspective. While human ToM capabilities are believed to derive from the neural activity of a broadly interconnected brain network, including that of dors… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  3. arXiv:2303.16424  [pdf, other

    cs.IT cs.AI cs.LG

    ProductAE: Toward Deep Learning Driven Error-Correction Codes of Large Dimensions

    Authors: Mohammad Vahid Jamali, Hamid Saber, Homayoon Hatami, Jung Hyun Bae

    Abstract: While decades of theoretical research have led to the invention of several classes of error-correction codes, the design of such codes is an extremely challenging task, mostly driven by human ingenuity. Recent studies demonstrate that such designs can be effectively automated and accelerated via tools from machine learning (ML), thus enabling ML-driven classes of error-correction codes with promis… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2110.04466

  4. arXiv:2301.06251  [pdf, other

    cs.IT cs.AI cs.LG

    Machine Learning-Aided Efficient Decoding of Reed-Muller Subcodes

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes achieve the capacity of general binary-input memoryless symmetric channels and are conjectured to have a comparable performance to that of random codes in terms of scaling laws. However, such results are established assuming maximum-likelihood decoders for general code parameters. Also, RM codes only admit limited sets of rates. Efficient decoders such as successive cancella… ▽ More

    Submitted 31 July, 2023; v1 submitted 15 January, 2023; originally announced January 2023.

    Comments: Accepted for publication in the Journal on Selected Areas in Information Theory. arXiv admin note: substantial text overlap with arXiv:2102.01671

  5. arXiv:2202.03654  [pdf, ps, other

    cs.IT

    Low-Complexity Decoding of a Class of Reed-Muller Subcodes for Low-Capacity Channels

    Authors: Mohammad Vahid Jamali, Mohammad Fereydounian, Hessam Mahdavifar, Hamed Hassani

    Abstract: We present a low-complexity and low-latency decoding algorithm for a class of Reed-Muller (RM) subcodes that are defined based on the product of smaller RM codes. More specifically, the input sequence is shaped as a multi-dimensional array, and the encoding over each dimension is done separately via a smaller RM encoder. Similarly, the decoding is performed over each dimension via a low-complexity… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Comments: Accepted for presentation in the 2022 IEEE International Conference on Communications (ICC)

  6. arXiv:2110.04466  [pdf, other

    cs.IT cs.LG eess.SY

    ProductAE: Towards Training Larger Channel Codes based on Neural Product Codes

    Authors: Mohammad Vahid Jamali, Hamid Saber, Homayoon Hatami, Jung Hyun Bae

    Abstract: There have been significant research activities in recent years to automate the design of channel encoders and decoders via deep learning. Due the dimensionality challenge in channel coding, it is prohibitively complex to design and train relatively large neural channel codes via deep learning techniques. Consequently, most of the results in the literature are limited to relatively short codes hav… ▽ More

    Submitted 10 September, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

  7. arXiv:2108.12920  [pdf, other

    cs.IT cs.AI

    KO codes: Inventing Nonlinear Encoding and Decoding for Reliable Wireless Communication via Deep-learning

    Authors: Ashok Vardhan Makkuva, Xiyang Liu, Mohammad Vahid Jamali, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Landmark codes underpin reliable physical layer communication, e.g., Reed-Muller, BCH, Convolution, Turbo, LDPC and Polar codes: each is a linear code and represents a mathematical breakthrough. The impact on humanity is huge: each of these codes has been used in global wireless communication standards (satellite, WiFi, cellular). Reliability of communication over the classical additive white Gaus… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  8. arXiv:2105.11095  [pdf

    cs.MM cs.LG

    Robust Watermarking using Diffusion of Logo into Autoencoder Feature Maps

    Authors: Maedeh Jamali, Nader Karim, Pejman Khadivi, Shahram Shirani, Shadrokh Samavi

    Abstract: Digital contents have grown dramatically in recent years, leading to increased attention to copyright. Image watermarking has been considered one of the most popular methods for copyright protection. With the recent advancements in applying deep neural networks in image processing, these networks have also been used in image watermarking. Robustness and imperceptibility are two challenging feature… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

    Comments: 16 pages, 6 figures

  9. arXiv:2103.01503  [pdf, other

    cs.IT cs.DC

    Coded Computing via Binary Linear Codes: Designs and Performance Limits

    Authors: Mahdi Soleymani, Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio… ▽ More

    Submitted 4 October, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Information Theory. arXiv admin note: substantial text overlap with arXiv:1906.10105

  10. arXiv:2102.01671  [pdf, ps, other

    cs.IT

    Reed-Muller Subcodes: Machine Learning-Aided Design of Efficient Soft Recursive Decoding

    Authors: Mohammad Vahid Jamali, Xiyang Liu, Ashok Vardhan Makkuva, Hessam Mahdavifar, Sewoong Oh, Pramod Viswanath

    Abstract: Reed-Muller (RM) codes are conjectured to achieve the capacity of any binary-input memoryless symmetric (BMS) channel, and are observed to have a comparable performance to that of random codes in terms of scaling laws. On the negative side, RM codes lack efficient decoders with performance close to that of a maximum likelihood decoder for general parameters. Also, they only admit certain discrete… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  11. arXiv:2101.08502  [pdf

    eess.IV cs.CV cs.MM

    Weighted Fuzzy-Based PSNR for Watermarking

    Authors: Maedeh Jamali, Nader Karimi, Shadrokh Samavi

    Abstract: One of the problems of conventional visual quality evaluation criteria such as PSNR and MSE is the lack of appropriate standards based on the human visual system (HVS). They are calculated based on the difference of the corresponding pixels in the original and manipulated image. Hence, they practically do not provide a correct understanding of the image quality. Watermarking is an image processing… ▽ More

    Submitted 21 January, 2021; originally announced January 2021.

    Comments: Five pages, 8 figures

  12. arXiv:2007.13571  [pdf, ps, other

    cs.IT

    Covert Millimeter-Wave Communication: Design Strategies and Performance Analysis

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a mmWave transmitter, referred to as Alice, attempts to reliably communicate to a receiver, referred to as Bob, while hiding the existence of communication from a warden, referred to as Willie. In this regard, operating over the mmWave bands not only increases the covertness thanks to dir… ▽ More

    Submitted 24 October, 2021; v1 submitted 24 July, 2020; originally announced July 2020.

    Comments: Accepted for publication in the IEEE Transactions on Wireless Communications. arXiv admin note: substantial text overlap with arXiv:1908.07591

  13. arXiv:2006.06917  [pdf, ps, other

    cs.IT eess.SP

    Massive Coded-NOMA for Low-Capacity Channels: A Low-Complexity Recursive Approach

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we present a low-complexity recursive approach for massive and scalable code-domain nonorthogonal multiple access (NOMA) with applications to emerging low-capacity scenarios. The problem definition in this paper is inspired by three major requirements of the next generations of wireless networks. Firstly, the proposed scheme is particularly beneficial in low-capacity regimes which i… ▽ More

    Submitted 10 March, 2021; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: Accepted for publication in the IEEE Transactions on Communications

  14. arXiv:2003.01691  [pdf, ps, other

    cs.DM

    Graphs and codes produced by a new method for dividing a natural number by two

    Authors: M. Zeynali Azim, M. A. Jabraeil Jamali, B. Anari, S. Alikhani, S. Akbarpour

    Abstract: In this paper, we introduce a new method which we call it MZ-method, for dividing a natural number $x$ by two and then we use graph as a model to show MZ-algorithm. Applying (recursively) $k$-times of the MZ-method for the number $x$, produces a graph with unique structure that is denoted by $G_k(x)$. We investigate the structure of $G_k(x)$. Also from the natural number $x$ and graph $G_k(x)$ we… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Comments: 14 pages, 13 pages

  15. arXiv:1912.10059  [pdf

    cs.CV eess.IV

    Saliency Based Fire Detection Using Texture and Color Features

    Authors: Maedeh Jamali, Nader Karimi, Shadrokh Samavi

    Abstract: Due to industry deployment and extension of urban areas, early warning systems have an essential role in giving emergency. Fire is an event that can rapidly spread and cause injury, death, and damage. Early detection of fire could significantly reduce these injuries. Video-based fire detection is a low cost and fast method in comparison with conventional fire detectors. Most available fire detecti… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.

    Comments: 5 pages, 8 figures, 2 tables

  16. arXiv:1911.00772  [pdf

    cs.MM cs.CR cs.CV

    Robustness and Imperceptibility Enhancement in Watermarked Images by Color Transformation

    Authors: Maedeh Jamali, Mahnoosh Bagheri, Nader Karimi, Shadrokh Samavi

    Abstract: One of the effective methods for the preservation of copyright ownership of digital media is watermarking. Different watermarking techniques try to set a tradeoff between robustness and transparency of the process. In this research work, we have used color space conversion and frequency transform to achieve high robustness and transparency. Due to the distribution of image information in the RGB d… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 5 pages 3 figures

  17. arXiv:1908.07591  [pdf, ps, other

    cs.IT

    Covert Millimeter-Wave Communication via a Dual-Beam Transmitter

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we investigate covert communication over millimeter-wave (mmWave) frequencies. In particular, a dual-beam mmWave transmitter, comprised of two independent antenna arrays, attempts to reliably communicate to a receiver Bob when hiding the existence of transmission from a warden Willie. In this regard, operating over mmWave bands not only increases the covertness thanks to directional… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

  18. arXiv:1906.10105  [pdf, ps, other

    cs.IT cs.DC

    Coded Distributed Computing: Performance Limits and Code Designs

    Authors: Mohammad Vahid Jamali, Mahdi Soleymani, Hessam Mahdavifar

    Abstract: We consider the problem of coded distributed computing where a large linear computational job, such as a matrix multiplication, is divided into $k$ smaller tasks, encoded using an $(n,k)$ linear code, and performed over $n$ distributed nodes. The goal is to reduce the average execution time of the computational job. We provide a connection between the problem of characterizing the average executio… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  19. arXiv:1903.00326  [pdf, ps, other

    cs.IT

    Uplink Non-Orthogonal Multiple Access over Mixed RF-FSO Systems

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system. In this system, two radio frequency (RF) users are grouped for simultaneous transmissions, over each resource block, to an intermediate relay. The relay then forwards the amplified version of the users' aggregated signals, in the presence of multiuser interference, to a relatively far destination. In o… ▽ More

    Submitted 16 February, 2020; v1 submitted 1 March, 2019; originally announced March 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.02893

  20. arXiv:1811.04322  [pdf, ps, other

    cs.IT

    Channel Coding at Low Capacity

    Authors: Mohammad Fereydounian, Hamed Hassani, Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: Low-capacity scenarios have become increasingly important in the technology of the Internet of Things (IoT) and the next generation of wireless networks. Such scenarios require efficient and reliable transmission over channels with an extremely small capacity. Within these constraints, the state-of-the-art coding techniques may not be directly applicable. Moreover, the prior work on the finite-len… ▽ More

    Submitted 4 February, 2023; v1 submitted 10 November, 2018; originally announced November 2018.

    Comments: 52 pages

  21. arXiv:1809.02893  [pdf, ps, other

    cs.IT

    Outage Probability Analysis of Uplink NOMA over Ultra-High-Speed FSO-Backhauled Systems

    Authors: Mohammad Vahid Jamali, Seyed Mohammad Azimi-Abarghouyi, Hessam Mahdavifar

    Abstract: In this paper, we consider a relay-assisted uplink non-orthogonal multiple access (NOMA) system where two radio frequency (RF) users are grouped for simultaneous transmission, over each resource block, to an intermediate relay which forwards the amplified version of the users' aggregated signals in the presence of multiuser interference to a relatively far destination. In order to cope with the us… ▽ More

    Submitted 8 September, 2018; originally announced September 2018.

  22. arXiv:1804.05242  [pdf, other

    cs.IT

    A Low-Complexity Recursive Approach Toward Code-Domain NOMA for Massive Communications

    Authors: Mohammad Vahid Jamali, Hessam Mahdavifar

    Abstract: Nonorthogonal multiple access (NOMA) is a promising technology to meet the demands of the next generation wireless networks on massive connectivity, high throughput and reliability, improved fairness, and low latency. In this context, code-domain NOMA which attempts to serve $K$ users in $M\leq K$ orthogonal resource blocks, using a pattern matrix, is of utmost interest. However, extending the pat… ▽ More

    Submitted 14 April, 2018; originally announced April 2018.

  23. arXiv:1801.07402  [pdf, other

    cs.IT

    Statistical Studies of Fading in Underwater Wireless Optical Channels in the Presence of Air Bubble, Temperature, and Salinity Random Variations (Long Version)

    Authors: Mohammad Vahid Jamali, Ali Mirani, Alireza Parsay, Bahman Abolhassani, Pooya Nabavi, Ata Chizari, Pirazh Khorramshahi, Sajjad Abdollahramezani, Jawad A. Salehi

    Abstract: Optical signal propagation through underwater channels is affected by three main degrading phenomena, namely absorption, scattering, and fading. In this paper, we experimentally study the statistical distribution of intensity fluctuations in underwater wireless optical channels with random temperature and salinity variations as well as the presence of air bubbles. In particular, we define differen… ▽ More

    Submitted 4 February, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

  24. Adaptive Blind Image Watermarking Using Fuzzy Inference System Based on Human Visual Perception

    Authors: Maedeh Jamali, Shima Rafiei, S. M. Reza Soroushmehr, Nader Karimi, Shahram Shirani, Kayvan Najarian, Shadrokh Samavi

    Abstract: Development of digital content has increased the necessity of copyright protection by means of watermarking. Imperceptibility and robustness are two important features of watermarking algorithms. The goal of watermarking methods is to satisfy the tradeoff between these two contradicting characteristics. Recently watermarking methods in transform domains have displayed favorable results. In this pa… ▽ More

    Submitted 17 October, 2018; v1 submitted 5 September, 2017; originally announced September 2017.

    Comments: 11 pages, 11 figures

  25. arXiv:1706.01632  [pdf

    physics.ed-ph cs.DL

    Publication Trends in Physics Education: A Bibliometric study

    Authors: Seyedh Mahboobeh Jamali, Ahmad Nurulazam Md Zain, Mohd Ali Samsudin, Nader Ale Ebrahim

    Abstract: A publication trend in Physics Education by employing bibliometric analysis leads the researchers to describe current scientific movement. This paper tries to answer "What do Physics education scientists concentrate in their publications?" by analyzing the productivity and development of publications on the subject category of Physics Education in the period 1980--2013. The Web of Science database… ▽ More

    Submitted 6 June, 2017; originally announced June 2017.

    Journal ref: Journal of Educational Research (Jurnal Penyelidikan Pendidikan), University of Malaya, 2015, 35, pp.19 - 36

  26. arXiv:1704.00909  [pdf, other

    cs.IT

    MIMO Underwater Visible Light Communications: Comprehensive Channel Study, Performance Analysis, and Multiple-Symbol Detection

    Authors: Mohammad Vahid Jamali, Pooya Nabavi, Jawad A. Salehi

    Abstract: In this paper, we analytically study the bit error rate (BER) performance of underwater visible light communication (UVLC) systems with binary pulse position modulation (BPPM). We simulate the channel fading-free impulse response (FFIR) based on Monte Carlo numerical method to take into account the absorption and scattering effects. Additionally, to characterize turbulence effects, we multiply the… ▽ More

    Submitted 6 November, 2017; v1 submitted 4 April, 2017; originally announced April 2017.

  27. arXiv:1603.08106  [pdf, other

    cs.IT

    Mining DNA Sequences Based on Spatially Coded Technique Using Spatial Light Modulator

    Authors: Masoome Fazelian, Sajjad AbdollahRamezani, Sima Bahrani, Ata Chizari, Mohammad Vahid Jamali, Pirazh Khorramshahi, Arvin Tashakori, Shadi Shahsavari, Jawad A. Salehi

    Abstract: In this paper, we present an optical computing method for string data alignment applicable to genome information analysis. By applying moire technique to spatial encoding patterns of deoxyribonucleic acid (DNA) sequences, association information of the genome and the expressed phenotypes could more effectively be extracted. Such moire fringes reveal occurrence of matching, deletion and insertion b… ▽ More

    Submitted 26 March, 2016; originally announced March 2016.

  28. arXiv:1603.04020  [pdf, other

    cs.IT

    Statistical Distribution of Intensity Fluctuations for Underwater Wireless Optical Channels in the Presence of Air Bubbles

    Authors: Mohammad Vahid Jamali, Pirazh Khorramshahi, Arvin Tashakori, Ata Chizari, Shadi Shahsavari, Sajjad AbdollahRamezani, Masoome Fazelian, Sima Bahrani, Jawad A. Salehi

    Abstract: In this paper, we experimentally investigate the statistical distribution of intensity fluctuations for underwater wireless optical channels under different channel conditions, namely fresh and salty underwater channels with and without air bubbles. To do so, we first measure the received optical signal with a large number of samples. Based on the normalized acquired data the channel coherence tim… ▽ More

    Submitted 13 March, 2016; originally announced March 2016.

  29. arXiv:1603.02895  [pdf, other

    cs.IT

    Performance Analysis of Multi-Hop Underwater Wireless Optical Communication Systems (Extended Version)

    Authors: Mohammad Vahid Jamali, Ata Chizari, Jawad A. Salehi

    Abstract: In this paper, we evaluate the end-to-end bit error rate (BER) of point-to-point underwater wireless optical communication (UWOC) systems with multi-hop transmission. To do so, we analytically derive the BER expression of a single-hop UWOC link as the building block for end-to-end BER evaluation. We also apply photon-counting method to evaluate the system BER in the presence of shot noise. Moreove… ▽ More

    Submitted 13 March, 2016; v1 submitted 9 March, 2016; originally announced March 2016.

  30. arXiv:1602.08765  [pdf, other

    cs.IT

    Designing A Dimmable OPPM-Based VLC System Under Channel Constraints

    Authors: Ata Chizari, Mohammad Vahid Jamali, Jawad A. Salehi, Akbar Dargahi

    Abstract: In this paper, we design a dimming compatible visible light communication (VLC) system in a standard office room according to illumination standards under channel constraints. We use overlap** pulse position modulation (OPPM) to support dimming control by changing the code weights. The system parameters such as a valid interval for dimming together with an upper bound for bit rate according to t… ▽ More

    Submitted 28 February, 2016; originally announced February 2016.

  31. arXiv:1602.00377  [pdf, ps, other

    cs.NI

    Cellular Underwater Wireless Optical CDMA Network: Potentials and Challenges

    Authors: Farhad Akhoundi, Mohammad Vahid Jamali, Navid Banihassan, Hamzeh Beyranvand, Amir Minoofar, Jawad A. Salehi

    Abstract: Underwater wireless optical communications is an emerging solution to the expanding demand for broadband links in oceans and seas. In this paper, a cellular underwater wireless optical code division multiple-access (UW-OCDMA) network is proposed to provide broadband links for commercial and military applications. The optical orthogonal codes (OOC) are employed as signature codes of underwater mobi… ▽ More

    Submitted 24 February, 2016; v1 submitted 31 January, 2016; originally announced February 2016.

    Comments: 11 pages, 10 figures

  32. arXiv:1508.07446  [pdf, ps, other

    cs.IT

    On the BER of Multiple-Input Multiple-Output Underwater Wireless Optical Communication Systems

    Authors: Mohammad Vahid Jamali, Jawad A. Salehi

    Abstract: In this paper we analyze and investigate the bit error rate (BER) performance of multiple-input multiple-output underwater wireless optical communication (MIMO-UWOC) systems. In addition to exact BER expressions, we also obtain an upper bound on the system BER. To effectively estimate the BER expressions, we use Gauss-Hermite quadrature formula as well as approximation to the sum of log-normal ran… ▽ More

    Submitted 29 October, 2015; v1 submitted 29 August, 2015; originally announced August 2015.

  33. arXiv:1508.04030  [pdf, other

    cs.IT

    Performance Characterization of Relay-Assisted Wireless Optical CDMA Networks in Turbulent Underwater Channel

    Authors: Mohammad Vahid Jamali, Farhad Akhoundi, Jawad A. Salehi

    Abstract: In this paper, we characterize the performance of relay-assisted underwater wireless optical code division multiple access (OCDMA) networks over turbulent channels. In addition to scattering and absorption effects of underwater channels, we also consider optical turbulence as a log-normal fading coefficient in our analysis. To simultaneously and asynchronously share medium among many users, we ass… ▽ More

    Submitted 22 February, 2016; v1 submitted 17 August, 2015; originally announced August 2015.

  34. arXiv:1508.03952  [pdf, other

    cs.IT

    Performance Studies of Underwater Wireless Optical Communication Systems with Spatial Diversity: MIMO Scheme

    Authors: Mohammad Vahid Jamali, Jawad A. Salehi, Farhad Akhoundi

    Abstract: In this paper, we analytically study the performance of multiple-input multiple-output underwater wireless optical communication (MIMO UWOC) systems with on-off keying (OOK) modulation. To mitigate turbulence-induced fading, which is amongst the major degrading effects of underwater channels on the propagating optical signal, we use spatial diversity over UWOC links. Furthermore, the effects of ab… ▽ More

    Submitted 19 December, 2016; v1 submitted 17 August, 2015; originally announced August 2015.

  35. arXiv:1304.3792  [pdf

    cs.NE

    Solving Linear Equations Using a Jacobi Based Time-Variant Adaptive Hybrid Evolutionary Algorithm

    Authors: A. R. M. Jalal Uddin Jamali, M. M. A. Hashem, Md. Bazlar Rahman

    Abstract: Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gauss-Seidel method) with evolutionary computation techniques have successfully bee… ▽ More

    Submitted 13 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1304.3200, arXiv:1304.2097

    Journal ref: Procs. of the 7th International Conference on Computer & Information Technology (ICCIT 2004), pp. 688-693, Dhaka, Bangladesh, December 26-28, (2004)

  36. arXiv:1304.3200  [pdf

    cs.NE math.NA

    An Approach to Solve Linear Equations Using a Time-Variant Adaptation Based Hybrid Evolutionary Algorithm

    Authors: A. R. M. Jalal Uddin Jamali, M. M. A. Hashem, Md. Bazlar Rahman

    Abstract: For small number of equations, systems of linear (and sometimes nonlinear) equations can be solved by simple classical techniques. However, for large number of systems of linear (or nonlinear) equations, solutions using classical method become arduous. On the other hand evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of evo… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: text overlap with arXiv:1304.2097

    Journal ref: Jahangirnagar University Journal of Science, Bangladesh, Vol. 27, pp. 277-289, (2004)

  37. arXiv:1304.2545  [pdf

    cs.NE math.NA

    For Solving Linear Equations Recombination is a Needless Operation in Time-Variant Adaptive Hybrid Algorithms

    Authors: A. R. M. Jalal Uddin Jamali, Mohammad Arif Hossain, G. M. Moniruzzaman, M. M. A. Hashem

    Abstract: Recently hybrid evolutionary computation (EC) techniques are successfully implemented for solving large sets of linear equations. All the recently developed hybrid evolutionary algorithms, for solving linear equations, contain both the recombination and the mutation operations. In this paper, two modified hybrid evolutionary algorithms contained time-variant adaptive evolutionary technique are pro… ▽ More

    Submitted 9 April, 2013; originally announced April 2013.

    Journal ref: Procs. of the 8th International Conference on Computer & Information Technology (ICCIT 2005), pp. 23-28, Dhaka, Bangladesh, December 28-30, (2005)

  38. arXiv:1304.2097  [pdf

    cs.NE math.NA

    Solving Linear Equations by Classical Jacobi-SR Based Hybrid Evolutionary Algorithm with Uniform Adaptation Technique

    Authors: R. M. Jalal Uddin Jamali, M. M. A. Hashem, M. Mahfuz Hasan, Md. Bazlar Rahman

    Abstract: Solving a set of simultaneous linear equations is probably the most important topic in numerical methods. For solving linear equations, iterative methods are preferred over the direct methods especially when the coefficient matrix is sparse. The rate of convergence of iteration method is increased by using Successive Relaxation (SR) technique. But SR technique is very much sensitive to relaxation… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    Comments: 14 Pages, 5 Figures and 7 Tables

    Journal ref: Journal of Engineering Science, Vol. 1, No. 2, pp. 11-24, [ISSN: 2075-4914](2010)

  39. arXiv:1212.1570  [pdf

    cs.AI cs.RO

    A simple method for decision making in robocup soccer simulation 3d environment

    Authors: Khashayar Niki Maleki, Mohammad Hadi Valipour, Sadegh Mokari, Roohollah Yeylaghi Ashrafi, Mohammad Reza Jamali, Caro Lucas

    Abstract: In this paper new hierarchical hybrid fuzzy-crisp methods for decision making and action selection of an agent in soccer simulation 3D environment are presented. First, the skills of an agent are introduced, implemented and classified in two layers, the basicskills and the highlevel skills. In the second layer, a twophase mechanism for decision making is introduced. In phase one, some useful metho… ▽ More

    Submitted 7 December, 2012; originally announced December 2012.

    Comments: 8 pages, 10 figures; Revista Avances en Sistemas e Informatica, Vol. 5, No. 3, December 2008

    MSC Class: 68T15; 68T40; 68T37 ACM Class: I.2.9; I.2.3; I.2.11

  40. arXiv:1112.2257  [pdf

    cs.CR

    Efficient Detection of Sybil Attack Based on Cryptography in Vanet

    Authors: Mina Rahbari, Mohammad Ali Jabreil Jamali

    Abstract: Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on… ▽ More

    Submitted 10 December, 2011; originally announced December 2011.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011

  41. arXiv:1011.2245  [pdf, other

    cs.SI

    A Distributed Method for Trust-Aware Recommendation in Social Networks

    Authors: Mohsen Jamali

    Abstract: This paper contains the details of a distributed trust-aware recommendation system. Trust-base recommenders have received a lot of attention recently. The main aim of trust-based recommendation is to deal the problems in traditional Collaborative Filtering recommenders. These problems include cold start users, vulnerability to attacks, etc.. Our proposed method is a distributed approach and can be… ▽ More

    Submitted 9 November, 2010; originally announced November 2010.

  42. arXiv:0910.1852  [pdf

    cs.DC

    DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router

    Authors: Mohammad Ali Jabraeil Jamali, Ahmad Khademzadeh

    Abstract: In this paper we present high performance dynamically allocated multi-queue (DAMQ) buffer schemes for fault tolerance systems on chip applications that require an interconnection network. Two or four virtual channels shared the same buffer space. On the message switching layer, we make improvement to boost system performance when there are faults involved in the components communication. The pro… ▽ More

    Submitted 9 October, 2009; originally announced October 2009.

    Comments: " International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp36-41, September 2009"

    Journal ref: M. A. J. Jamali and A. Khademzadeh, " DAMQ-Based Schemes for Efficiently Using the Buffer Spaces of a NoC Router", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp36-41, September 2009