-
Object Detection for Automated Coronary Artery Using Deep Learning
Authors:
Hadis Keshavarz,
Hossein Sadr
Abstract:
In the era of digital medicine, medical imaging serves as a widespread technique for early disease detection, with a substantial volume of images being generated and stored daily in electronic patient records. X-ray angiography imaging is a standard and one of the most common methods for rapidly diagnosing coronary artery diseases. The notable achievements of recent deep learning algorithms align…
▽ More
In the era of digital medicine, medical imaging serves as a widespread technique for early disease detection, with a substantial volume of images being generated and stored daily in electronic patient records. X-ray angiography imaging is a standard and one of the most common methods for rapidly diagnosing coronary artery diseases. The notable achievements of recent deep learning algorithms align with the increased use of electronic health records and diagnostic imaging. Deep neural networks, leveraging abundant data, advanced algorithms, and powerful computational capabilities, prove highly effective in the analysis and interpretation of images. In this context, Object detection methods have become a promising approach, particularly through convolutional neural networks (CNN), streamlining medical image analysis by eliminating manual feature extraction. This allows for direct feature extraction from images, ensuring high accuracy in results. Therefore, in our paper, we utilized the object detection method on X-ray angiography images to precisely identify the location of coronary artery stenosis. As a result, this model enables automatic and real-time detection of stenosis locations, assisting in the crucial and sensitive decision-making process for healthcare professionals.
△ Less
Submitted 30 April, 2024; v1 submitted 19 December, 2023;
originally announced December 2023.
-
Physical Layer Security in Random NOMA-Enabled Heterogeneous Networks
Authors:
Elmira Shahraki,
Mahtab Mirmohseni,
Hengameh Keshavarz
Abstract:
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming indepen…
▽ More
The performance of physical layer secrecy approach in non-orthogonal multiple access (NOMA)-enabled heterogeneous networks (HetNets) is analyzed in this paper. A $K$-tier multi-cell HetNet is considered, comprising NOMA adopted in all tiers. The base stations, legitimate users (in a two-user NOMA setup), and passive eavesdroppers, all with single-antenna, are randomly distributed. Assuming independent Poisson point processes for node distribution, stochastic geometry approaches are exploited to characterize the ergodic secrecy rate. A lower bound on the ergodic secrecy rate along with closed-form expressions for the lower bound on the ergodic rates of the legitimate users in a special case are derived. Moreover, simpler expressions for the ergodic secrecy rate are obtained in the interference-limited regime with vanishing noise variance. The effect of multi-tier technology, NOMA, and physical layer secrecy are investigated using numerical results. The results reveal that applying HetNet to a secure multi-cell NOMA system improves the spectrum efficiency performance.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
ApacheJIT: A Large Dataset for Just-In-Time Defect Prediction
Authors:
Hossein Keshavarz,
Meiyappan Nagappan
Abstract:
In this paper, we present ApacheJIT, a large dataset for Just-In-Time defect prediction. ApacheJIT consists of clean and bug-inducing software changes in popular Apache projects. ApacheJIT has a total of 106,674 commits (28,239 bug-inducing and 78,435 clean commits). Having a large number of commits makes ApacheJIT a suitable dataset for machine learning models, especially deep learning models tha…
▽ More
In this paper, we present ApacheJIT, a large dataset for Just-In-Time defect prediction. ApacheJIT consists of clean and bug-inducing software changes in popular Apache projects. ApacheJIT has a total of 106,674 commits (28,239 bug-inducing and 78,435 clean commits). Having a large number of commits makes ApacheJIT a suitable dataset for machine learning models, especially deep learning models that require large training sets to effectively generalize the patterns present in the historical data to future data.
△ Less
Submitted 29 April, 2022; v1 submitted 28 February, 2022;
originally announced March 2022.
-
SURENA IV: Towards A Cost-effective Full-size Humanoid Robot for Real-world Scenarios
Authors:
Aghil Yousefi-Koma,
Behnam Maleki,
Hessam Maleki,
Amin Amani,
Mohammad Ali Bazrafshani,
Hossein Keshavarz,
Ala Iranmanesh,
Alireza Yazdanpanah,
Hamidreza Alai,
Sahel Salehi,
Mahyar Ashkvari,
Milad Mousavi,
Milad Shafiee Ashtiani
Abstract:
This paper describes the hardware, software framework, and experimental testing of SURENA IV humanoid robotics platform. SURENA IV has 43 degrees of freedom (DoFs), including seven DoFs for each arm, six DoFs for each hand, and six DoFs for each leg, with a height of 170 cm and a mass of 68 kg and morphological and mass properties similar to an average adult human. SURENA IV aims to realize a cost…
▽ More
This paper describes the hardware, software framework, and experimental testing of SURENA IV humanoid robotics platform. SURENA IV has 43 degrees of freedom (DoFs), including seven DoFs for each arm, six DoFs for each hand, and six DoFs for each leg, with a height of 170 cm and a mass of 68 kg and morphological and mass properties similar to an average adult human. SURENA IV aims to realize a cost-effective and anthropomorphic humanoid robot for real-world scenarios. In this way, we demonstrate a locomotion framework based on a novel and inexpensive predictive foot sensor that enables walking with 7cm foot position error because of accumulative error of links and connections' deflection(that has been manufactured by the tools which are available in the Universities). Thanks to this sensor, the robot can walk on unknown obstacles without any force feedback, by online adaptation of foot height and orientation. Moreover, the arm and hand of the robot have been designed to grasp the objects with different stiffness and geometries that enable the robot to do drilling, visual servoing of a moving object, and writing his name on the white-board.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
SEFR: A Fast Linear-Time Classifier for Ultra-Low Power Devices
Authors:
Hamidreza Keshavarz,
Mohammad Saniee Abadeh,
Reza Rawassizadeh
Abstract:
A fundamental challenge for running machine learning algorithms on battery-powered devices is the time and energy limitations, as these devices have constraints on resources. There are resource-efficient classifier algorithms that can run on these devices, but their accuracy is often sacrificed for resource efficiency. Here, we propose an ultra-low power classifier, SEFR, with linear time complexi…
▽ More
A fundamental challenge for running machine learning algorithms on battery-powered devices is the time and energy limitations, as these devices have constraints on resources. There are resource-efficient classifier algorithms that can run on these devices, but their accuracy is often sacrificed for resource efficiency. Here, we propose an ultra-low power classifier, SEFR, with linear time complexity, both in the training and the testing phases. SEFR is comparable to state-of-the-art classifiers in terms of classification accuracy, but it is 63 times faster and 70 times more energy efficient than the average of state-of-the-art and baseline classifiers on binary class datasets. The energy and memory consumption of SEFR is very insignificant, and it can even perform both train and test phases on microcontrollers. To our knowledge, this is the first multipurpose classification algorithm specifically designed to perform both training and testing on ultra-low power devices.
△ Less
Submitted 19 November, 2020; v1 submitted 8 June, 2020;
originally announced June 2020.
-
Online detection of local abrupt changes in high-dimensional Gaussian graphical models
Authors:
Hossein Keshavarz,
George Michailidis
Abstract:
The problem of identifying change points in high-dimensional Gaussian graphical models (GGMs) in an online fashion is of interest, due to new applications in biology, economics and social sciences. The offline version of the problem, where all the data are a priori available, has led to a number of methods and associated algorithms involving regularized loss functions. However, for the online vers…
▽ More
The problem of identifying change points in high-dimensional Gaussian graphical models (GGMs) in an online fashion is of interest, due to new applications in biology, economics and social sciences. The offline version of the problem, where all the data are a priori available, has led to a number of methods and associated algorithms involving regularized loss functions. However, for the online version, there is currently only a single work in the literature that develops a sequential testing procedure and also studies its asymptotic false alarm probability and power. The latter test is best suited for the detection of change points driven by global changes in the structure of the precision matrix of the GGM, in the sense that many edges are involved. Nevertheless, in many practical settings the change point is driven by local changes, in the sense that only a small number of edges exhibit changes. To that end, we develop a novel test to address this problem that is based on the $\ell_\infty$ norm of the normalized covariance matrix of an appropriately selected portion of incoming data. The study of the asymptotic distribution of the proposed test statistic under the null (no presence of a change point) and the alternative (presence of a change point) hypotheses requires new technical tools that examine maxima of graph-dependent Gaussian random variables, and that of independent interest. It is further shown that these tools lead to the imposition of mild regularity conditions for key model parameters, instead of more stringent ones required by leveraging previously used tools in related problems in the literature. Numerical work on synthetic data illustrates the good performance of the proposed detection procedure both in terms of computational and statistical efficiency across numerous experimental settings.
△ Less
Submitted 15 March, 2020;
originally announced March 2020.
-
A Deep Learning-Based Approach for Measuring the Domain Similarity of Persian Texts
Authors:
Hossein Keshavarz,
Shohreh Tabatabayi Seifi,
Mohammad Izadi
Abstract:
In this paper, we propose a novel approach for measuring the degree of similarity between categories of two pieces of Persian text, which were published as descriptions of two separate advertisements. We built an appropriate dataset for this work using a dataset which consists of advertisements posted on an e-commerce website. We generated a significant number of paired texts from this dataset and…
▽ More
In this paper, we propose a novel approach for measuring the degree of similarity between categories of two pieces of Persian text, which were published as descriptions of two separate advertisements. We built an appropriate dataset for this work using a dataset which consists of advertisements posted on an e-commerce website. We generated a significant number of paired texts from this dataset and assigned each pair a score from 0 to 3, which demonstrates the degree of similarity between the domains of the pair. In this work, we represent words with word embedding vectors derived from word2vec. Then deep neural network models are used to represent texts. Eventually, we employ concatenation of absolute difference and bit-wise multiplication and a fully-connected neural network to produce a probability distribution vector for the score of the pairs. Through a supervised learning approach, we trained our model on a GPU, and our best model achieved an F1 score of 0.9865.
△ Less
Submitted 24 September, 2019; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Public vs Media Opinion on Robots
Authors:
Alireza Javaheri,
Navid Moghadamnejad,
Hamidreza Keshavarz,
Ehsan Javaheri,
Chelsea Dobbins,
Elaheh Momeni,
Reza Rawassizadeh
Abstract:
Fast proliferation of robots in people's everyday lives during recent years calls for a profound examination of public consensus, which is the ultimate determinant of the future of this industry. This paper investigates text corpora, consisting of posts in Twitter, Google News, Bing News, and Kickstarter, over an 8 year period to quantify the public and media opinion about this emerging technology…
▽ More
Fast proliferation of robots in people's everyday lives during recent years calls for a profound examination of public consensus, which is the ultimate determinant of the future of this industry. This paper investigates text corpora, consisting of posts in Twitter, Google News, Bing News, and Kickstarter, over an 8 year period to quantify the public and media opinion about this emerging technology. Results demonstrate that the news platforms and the public take an overall positive position on robots. However, there is a deviation between news coverage and people's attitude. Among various robot types, sex robots raise the fiercest debate. Besides, our evaluation reveals that the public and news media conceptualization of robotics has altered over the recent years. More specifically, a shift from the solely industrial-purposed machines, towards more social, assistive, and multi-purpose gadgets is visible.
△ Less
Submitted 5 May, 2019;
originally announced May 2019.
-
Sequential change-point detection in high-dimensional Gaussian graphical models
Authors:
Hossein Keshavarz,
George Michailidis,
Yves Atchade
Abstract:
High dimensional piecewise stationary graphical models represent a versatile class for modelling time varying networks arising in diverse application areas, including biology, economics, and social sciences. There has been recent work in offline detection and estimation of regime changes in the topology of sparse graphical models. However, the online setting remains largely unexplored, despite its…
▽ More
High dimensional piecewise stationary graphical models represent a versatile class for modelling time varying networks arising in diverse application areas, including biology, economics, and social sciences. There has been recent work in offline detection and estimation of regime changes in the topology of sparse graphical models. However, the online setting remains largely unexplored, despite its high relevance to applications in sensor networks and other engineering monitoring systems, as well as financial markets. To that end, this work introduces a novel scalable online algorithm for detecting an unknown number of abrupt changes in the inverse covariance matrix of sparse Gaussian graphical models with small delay. The proposed algorithm is based upon monitoring the conditional log-likelihood of all nodes in the network and can be extended to a large class of continuous and discrete graphical models. We also investigate asymptotic properties of our procedure under certain mild regularity conditions on the graph size, sparsity level, number of samples, and pre- and post-changes in the topology of the network. Numerical works on both synthetic and real data illustrate the good performance of the proposed methodology both in terms of computational and statistical efficiency across numerous experimental settings.
△ Less
Submitted 20 June, 2018;
originally announced June 2018.
-
On the consistency of inversion-free parameter estimation for Gaussian random fields
Authors:
Hossein Keshavarz,
Clayton Scott,
XuanLong Nguyen
Abstract:
Gaussian random fields are a powerful tool for modeling environmental processes. For high dimensional samples, classical approaches for estimating the covariance parameters require highly challenging and massive computations, such as the evaluation of the Cholesky factorization or solving linear systems. Recently, Anitescu, Chen and Stein \cite{M.Anitescu} proposed a fast and scalable algorithm wh…
▽ More
Gaussian random fields are a powerful tool for modeling environmental processes. For high dimensional samples, classical approaches for estimating the covariance parameters require highly challenging and massive computations, such as the evaluation of the Cholesky factorization or solving linear systems. Recently, Anitescu, Chen and Stein \cite{M.Anitescu} proposed a fast and scalable algorithm which does not need such burdensome computations. The main focus of this article is to study the asymptotic behavior of the algorithm of Anitescu et al. (ACS) for regular and irregular grids in the increasing domain setting. Consistency, minimax optimality and asymptotic normality of this algorithm are proved under mild differentiability conditions on the covariance function. Despite the fact that ACS's method entails a non-concave maximization, our results hold for any stationary point of the objective function. A numerical study is presented to evaluate the efficiency of this algorithm for large data sets.
△ Less
Submitted 21 June, 2016; v1 submitted 15 January, 2016;
originally announced January 2016.
-
Optimal change point detection in Gaussian processes
Authors:
Hossein Keshavarz,
Clayton Scott,
XuanLong Nguyen
Abstract:
We study the problem of detecting a change in the mean of one-dimensional Gaussian process data. This problem is investigated in the setting of increasing domain (customarily employed in time series analysis) and in the setting of fixed domain (typically arising in spatial data analysis). We propose a detection method based on the generalized likelihood ratio test (GLRT), and show that our method…
▽ More
We study the problem of detecting a change in the mean of one-dimensional Gaussian process data. This problem is investigated in the setting of increasing domain (customarily employed in time series analysis) and in the setting of fixed domain (typically arising in spatial data analysis). We propose a detection method based on the generalized likelihood ratio test (GLRT), and show that our method achieves nearly asymptotically optimal rate in the minimax sense, in both settings. The salient feature of the proposed method is that it exploits in an efficient way the data dependence captured by the Gaussian process covariance structure. When the covariance is not known, we propose the plug-in GLRT method and derive conditions under which the method remains asymptotically near optimal. By contrast, the standard CUSUM method, which does not account for the covariance structure, is shown to be asymptotically optimal only in the increasing domain. Our algorithms and accompanying theory are applicable to a wide variety of covariance structures, including the Matern class, the powered exponential class, and others. The plug-in GLRT method is shown to perform well for maximum likelihood estimators with a dense covariance matrix.
△ Less
Submitted 7 April, 2017; v1 submitted 3 June, 2015;
originally announced June 2015.
-
On the number of active links in random wireless networks
Authors:
Hengameh Keshavarz,
Ravi R. Mazumdar,
Rahul Roy,
Farshid Zoghalchi
Abstract:
This paper presents results on the typical number of simultaneous point-to-point transmissions above a minimum rate that can be sustained in a network with $n$ transmitter-receiver node pairs when all transmitting nodes can potentially interfere with all receivers. In particular we obtain a scaling law when the fading gains are independent Rayleigh distributed random variables and the transmitters…
▽ More
This paper presents results on the typical number of simultaneous point-to-point transmissions above a minimum rate that can be sustained in a network with $n$ transmitter-receiver node pairs when all transmitting nodes can potentially interfere with all receivers. In particular we obtain a scaling law when the fading gains are independent Rayleigh distributed random variables and the transmitters over different realizations are located at the points of a stationary Poisson field in the plane. We show that asymptotically with probability approaching 1, the number of simultaneous transmissions (links that can transmit at greater than a minimum rate) is of the order of $O(n^{\frac{1}{4}})$. These asymptotic results are confirmed from simulations.
△ Less
Submitted 9 December, 2014;
originally announced December 2014.
-
A Taxonomy for Congestion Control Algorithms in Vehicular Ad Hoc Networks
Authors:
Mohammad Reza Jabbarpour Sattari,
Rafidah Md Noor,
Hassan Keshavarz
Abstract:
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab…
▽ More
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliability are essential requirements for event-driven messages. In crowded networks where beacon messages are broadcasted at a high number of frequencies by many vehicles, the Control Channel (CCH), which used for beacons sending, will be easily congested. On the other hand, to guarantee the reliability and timely delivery of event-driven messages, having a congestion free control channel is a necessity. Thus, consideration of this study is given to find a solution for the congestion problem in VANETs by taking a comprehensive look at the existent congestion control algorithms. In addition, the taxonomy for congestion control algorithms in VANETs is presented based on three classes, namely, proactive, reactive and hybrid. Finally, we have found the criteria in which fulfill prerequisite of a good congestion control algorithm.
△ Less
Submitted 17 July, 2012;
originally announced July 2012.
-
An Evolutionary Study of Rich Mobile Applications
Authors:
Saeid Abolfazli,
Zohre Sanaei,
Muhammad Shiraz,
Hassan Keshavarz,
Abdullah Gani
Abstract:
Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of RMA has started and results are appearing…
▽ More
Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of RMA has started and results are appearing in literature which advocates its future trend and encourages review of RMAs. This article aims to present overview of RMA and states clear distinction between Rich Internet Applications (RIAs) - that are desktop-like Web applications - and RMAs to facilitate and accelerate development of smartphone-centric application development tools and technologies. RMAs are defined, their comprehensive overview is presented, and current trends are described. Our study shows that despite of literal similarity of RMA and RIA, they have dissimilar inward architectures. Implicitly, understanding the distinctions between richness delivery in PCs and smartphones as well as knowledge of inward similarity and difference between RIAs and RMAs contribute toward development of enhanced smartphone's applications to deliver RUX to mobile clients.
△ Less
Submitted 22 August, 2012; v1 submitted 27 June, 2012;
originally announced June 2012.
-
A Survey on Cloud Computing Security
Authors:
Hero Modares,
Rosli Salleh,
Amirhosein Moravejosharieh,
Hassan Keshavarz,
Majid Talebi Shahgoli
Abstract:
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products. The Cloud is a metaphor for the Internet and is a concept for the covered complicated infrastructure; it also depends on…
▽ More
Computation encounter the new approach of cloud computing which maybe keeps the world and possibly can prepare all the human's necessities. In other words, cloud computing is the subsequent regular step in the evolution of on-demand information technology services and products. The Cloud is a metaphor for the Internet and is a concept for the covered complicated infrastructure; it also depends on sketching in computer network diagrams. In this paper we will focus on concept of cloud computing, cloud deployment models, cloud security challenges encryption and data protection, privacy and security and data management and movement from grid to cloud.
△ Less
Submitted 24 June, 2012;
originally announced June 2012.
-
Eliminating Scanning Delay using Advanced Neighbor Discovery with Caching (ANDWC)
Authors:
Hassan Keshavarz,
Ghaith A. Abdulwahed,
Rosli Salleh,
Laeth A. Abdul Wahid
Abstract:
The advance in wireless technologies and portable devices such as smart phones has made the Wireless Local Area Networks (WLANs) popular in the recent years. Nowadays, WLANs have become widely accepted in both private and public sectors due to ease of installation, reasonable prices and high data rates that can support real time applications. However, fast handoff required for such real-time appli…
▽ More
The advance in wireless technologies and portable devices such as smart phones has made the Wireless Local Area Networks (WLANs) popular in the recent years. Nowadays, WLANs have become widely accepted in both private and public sectors due to ease of installation, reasonable prices and high data rates that can support real time applications. However, fast handoff required for such real-time applications is not provided in the current IEEE 802.11 specifications. Consequently, providing seamless mobility in these WLANs is an important issue. To solve this problem, a new fast handoff scheme called Advanced Neighbor Discovery with Caching (ANDWC) is proposed. This new mechanism is based on the user's mobility between two or more different Basic Service Sets (Layer 2 mobility). ANDWC can eliminate scanning delay (which contributes up to 90% of the total handoff latency) to provide seamless handoff by using pre-neighbor-discovery and caching mechanisms.
△ Less
Submitted 25 June, 2012; v1 submitted 22 June, 2012;
originally announced June 2012.
-
Session Initiation Protocol Attacks and Challenges
Authors:
Hassan Keshavarz,
Mohammad Reza Jabbarpour Sattari,
Rafidah Md Noor
Abstract:
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are disc…
▽ More
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.
△ Less
Submitted 2 May, 2012;
originally announced May 2012.