Skip to main content

Showing 1–17 of 17 results for author: Keshavarz, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.12135   

    eess.IV cs.CV cs.LG

    Object Detection for Automated Coronary Artery Using Deep Learning

    Authors: Hadis Keshavarz, Hossein Sadr

    Abstract: In the era of digital medicine, medical imaging serves as a widespread technique for early disease detection, with a substantial volume of images being generated and stored daily in electronic patient records. X-ray angiography imaging is a standard and one of the most common methods for rapidly diagnosing coronary artery diseases. The notable achievements of recent deep learning algorithms align… ▽ More

    Submitted 30 April, 2024; v1 submitted 19 December, 2023; originally announced December 2023.

    Comments: The results in the article need fundamental corrections

  2. arXiv:2210.12091  [pdf, ps, other

    cs.IT

    Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks

    Authors: Elmira Shahraki, Mahtab Mirmohseni, Hengameh Keshavarz

    Abstract: The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming indepen… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

  3. arXiv:2203.00101  [pdf, ps, other

    cs.SE cs.AI cs.LG cs.PL

    ApacheJIT: A Large Dataset for Just-In-Time Defect Prediction

    Authors: Hossein Keshavarz, Meiyappan Nagappan

    Abstract: In this paper, we present ApacheJIT, a large dataset for Just-In-Time defect prediction. ApacheJIT consists of clean and bug-inducing software changes in popular Apache projects. ApacheJIT has a total of 106,674 commits (28,239 bug-inducing and 78,435 clean commits). Having a large number of commits makes ApacheJIT a suitable dataset for machine learning models, especially deep learning models tha… ▽ More

    Submitted 29 April, 2022; v1 submitted 28 February, 2022; originally announced March 2022.

  4. arXiv:2108.13515  [pdf, other

    cs.RO

    SURENA IV: Towards A Cost-effective Full-size Humanoid Robot for Real-world Scenarios

    Authors: Aghil Yousefi-Koma, Behnam Maleki, Hessam Maleki, Amin Amani, Mohammad Ali Bazrafshani, Hossein Keshavarz, Ala Iranmanesh, Alireza Yazdanpanah, Hamidreza Alai, Sahel Salehi, Mahyar Ashkvari, Milad Mousavi, Milad Shafiee Ashtiani

    Abstract: This paper describes the hardware, software framework, and experimental testing of SURENA IV humanoid robotics platform. SURENA IV has 43 degrees of freedom (DoFs), including seven DoFs for each arm, six DoFs for each hand, and six DoFs for each leg, with a height of 170 cm and a mass of 68 kg and morphological and mass properties similar to an average adult human. SURENA IV aims to realize a cost… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Journal ref: 2020 IEEE-RAS International Conference on Humanoid Robots (HUMANOIDS)

  5. arXiv:2006.04620  [pdf, other

    cs.LG stat.ML

    SEFR: A Fast Linear-Time Classifier for Ultra-Low Power Devices

    Authors: Hamidreza Keshavarz, Mohammad Saniee Abadeh, Reza Rawassizadeh

    Abstract: A fundamental challenge for running machine learning algorithms on battery-powered devices is the time and energy limitations, as these devices have constraints on resources. There are resource-efficient classifier algorithms that can run on these devices, but their accuracy is often sacrificed for resource efficiency. Here, we propose an ultra-low power classifier, SEFR, with linear time complexi… ▽ More

    Submitted 19 November, 2020; v1 submitted 8 June, 2020; originally announced June 2020.

  6. arXiv:2003.06961  [pdf, other

    math.ST cs.LG stat.ME stat.ML

    Online detection of local abrupt changes in high-dimensional Gaussian graphical models

    Authors: Hossein Keshavarz, George Michailidis

    Abstract: The problem of identifying change points in high-dimensional Gaussian graphical models (GGMs) in an online fashion is of interest, due to new applications in biology, economics and social sciences. The offline version of the problem, where all the data are a priori available, has led to a number of methods and associated algorithms involving regularized loss functions. However, for the online vers… ▽ More

    Submitted 15 March, 2020; originally announced March 2020.

    Comments: 40 pages, 6 figures

  7. arXiv:1909.09690  [pdf

    cs.CL cs.AI cs.LG stat.ML

    A Deep Learning-Based Approach for Measuring the Domain Similarity of Persian Texts

    Authors: Hossein Keshavarz, Shohreh Tabatabayi Seifi, Mohammad Izadi

    Abstract: In this paper, we propose a novel approach for measuring the degree of similarity between categories of two pieces of Persian text, which were published as descriptions of two separate advertisements. We built an appropriate dataset for this work using a dataset which consists of advertisements posted on an e-commerce website. We generated a significant number of paired texts from this dataset and… ▽ More

    Submitted 24 September, 2019; v1 submitted 12 September, 2019; originally announced September 2019.

  8. arXiv:1905.01615  [pdf

    cs.CY cs.RO cs.SI

    Public vs Media Opinion on Robots

    Authors: Alireza Javaheri, Navid Moghadamnejad, Hamidreza Keshavarz, Ehsan Javaheri, Chelsea Dobbins, Elaheh Momeni, Reza Rawassizadeh

    Abstract: Fast proliferation of robots in people's everyday lives during recent years calls for a profound examination of public consensus, which is the ultimate determinant of the future of this industry. This paper investigates text corpora, consisting of posts in Twitter, Google News, Bing News, and Kickstarter, over an 8 year period to quantify the public and media opinion about this emerging technology… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

    Comments: 15 pages, 6 figures, 4 tables

  9. arXiv:1806.07870  [pdf, ps, other

    stat.ML cs.LG math.ST

    Sequential change-point detection in high-dimensional Gaussian graphical models

    Authors: Hossein Keshavarz, George Michailidis, Yves Atchade

    Abstract: High dimensional piecewise stationary graphical models represent a versatile class for modelling time varying networks arising in diverse application areas, including biology, economics, and social sciences. There has been recent work in offline detection and estimation of regime changes in the topology of sparse graphical models. However, the online setting remains largely unexplored, despite its… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

    Comments: 47 pages, 9 figures

  10. arXiv:1601.03822  [pdf, ps, other

    math.ST cs.LG stat.ML

    On the consistency of inversion-free parameter estimation for Gaussian random fields

    Authors: Hossein Keshavarz, Clayton Scott, XuanLong Nguyen

    Abstract: Gaussian random fields are a powerful tool for modeling environmental processes. For high dimensional samples, classical approaches for estimating the covariance parameters require highly challenging and massive computations, such as the evaluation of the Cholesky factorization or solving linear systems. Recently, Anitescu, Chen and Stein \cite{M.Anitescu} proposed a fast and scalable algorithm wh… ▽ More

    Submitted 21 June, 2016; v1 submitted 15 January, 2016; originally announced January 2016.

    Comments: 41 pages, 2 Figures

    Journal ref: Journal of Multivariate Analysis (2016), pp. 245-266

  11. arXiv:1506.01338  [pdf, ps, other

    math.ST cs.IT cs.LG stat.ML

    Optimal change point detection in Gaussian processes

    Authors: Hossein Keshavarz, Clayton Scott, XuanLong Nguyen

    Abstract: We study the problem of detecting a change in the mean of one-dimensional Gaussian process data. This problem is investigated in the setting of increasing domain (customarily employed in time series analysis) and in the setting of fixed domain (typically arising in spatial data analysis). We propose a detection method based on the generalized likelihood ratio test (GLRT), and show that our method… ▽ More

    Submitted 7 April, 2017; v1 submitted 3 June, 2015; originally announced June 2015.

    Comments: 42 pages, 2 figures

  12. arXiv:1412.3098  [pdf, other

    cs.IT

    On the number of active links in random wireless networks

    Authors: Hengameh Keshavarz, Ravi R. Mazumdar, Rahul Roy, Farshid Zoghalchi

    Abstract: This paper presents results on the typical number of simultaneous point-to-point transmissions above a minimum rate that can be sustained in a network with $n$ transmitter-receiver node pairs when all transmitting nodes can potentially interfere with all receivers. In particular we obtain a scaling law when the fading gains are independent Rayleigh distributed random variables and the transmitters… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    MSC Class: Primary 94A40; Secondary 60G60; 94A17

  13. arXiv:1207.3943  [pdf

    cs.NI

    A Taxonomy for Congestion Control Algorithms in Vehicular Ad Hoc Networks

    Authors: Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor, Hassan Keshavarz

    Abstract: One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

  14. arXiv:1206.6222   

    cs.HC

    An Evolutionary Study of Rich Mobile Applications

    Authors: Saeid Abolfazli, Zohre Sanaei, Muhammad Shiraz, Hassan Keshavarz, Abdullah Gani

    Abstract: Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of RMA has started and results are appearing… ▽ More

    Submitted 22 August, 2012; v1 submitted 27 June, 2012; originally announced June 2012.

    Comments: This paper has been withdrawn by the author due to some copyright issues

  15. arXiv:1206.5468  [pdf

    cs.NI cs.CR

    A Survey on Cloud Computing Security

    Authors: Hero Modares, Rosli Salleh, Amirhosein Moravejosharieh, Hassan Keshavarz, Majid Talebi Shahgoli

    Abstract: Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products. The Cloud is a metaphor for the Internet and is a concept for the covered complicated infrastructure; it also depends on… ▽ More

    Submitted 24 June, 2012; originally announced June 2012.

  16. arXiv:1206.5210  [pdf

    cs.NI

    Eliminating Scanning Delay using Advanced Neighbor Discovery with Caching (ANDWC)

    Authors: Hassan Keshavarz, Ghaith A. Abdulwahed, Rosli Salleh, Laeth A. Abdul Wahid

    Abstract: The advance in wireless technologies and portable devices such as smart phones has made the Wireless Local Area Networks (WLANs) popular in the recent years. Nowadays, WLANs have become widely accepted in both private and public sectors due to ease of installation, reasonable prices and high data rates that can support real time applications. However, fast handoff required for such real-time appli… ▽ More

    Submitted 25 June, 2012; v1 submitted 22 June, 2012; originally announced June 2012.

    Comments: 13 pages, 6 figures

  17. arXiv:1205.0480  [pdf

    cs.NI

    Session Initiation Protocol Attacks and Challenges

    Authors: Hassan Keshavarz, Mohammad Reza Jabbarpour Sattari, Rafidah Md Noor

    Abstract: In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are disc… ▽ More

    Submitted 2 May, 2012; originally announced May 2012.