Skip to main content

Showing 1–16 of 16 results for author: Moussa, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20189  [pdf, other

    cs.RO cs.AI

    Nadine: An LLM-driven Intelligent Social Robot with Affective Capabilities and Human-like Memory

    Authors: Hangyeol Kang, Maher Ben Moussa, Nadia Magnenat-Thalmann

    Abstract: In this work, we describe our approach to develo** an intelligent and robust social robotic system for the Nadine social robot platform. We achieve this by integrating Large Language Models (LLMs) and skilfully leveraging the powerful reasoning and instruction-following capabilities of these types of models to achieve advanced human-like affective and cognitive capabilities. This approach is nov… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2309.14395  [pdf, other

    cs.LG cs.AI

    Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques

    Authors: Emanuel Figetakis, Yahuza Bello, Ahmed Refaey, Lei Lei, Medhat Moussa

    Abstract: A sudden roadblock on highways due to many reasons such as road maintenance, accidents, and car repair is a common situation we encounter almost daily. Autonomous Vehicles (AVs) equipped with sensors that can acquire vehicle dynamics such as speed, acceleration, and location can make intelligent decisions to change lanes before reaching a roadblock. A number of literature studies have examined car… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  3. arXiv:2107.14348  [pdf, other

    cs.RO

    Towards develo** a realistic robotics simulation environment of an indoor vegetable greenhouse

    Authors: Brent Van De Walker, Brendan Byrne, Joshua Near, Blake Purdie, Matthew Whatman, David Weales, Cole Tarry, Medhat Moussa

    Abstract: This article presents a method for develo** a realistic robotics simulation environment for application in vegetable greenhouses. The method pipeline starts with the construction of a 3D cloud images of the greenhouse rows. This data is then used to develop a robotics simulation environment using the CoppeliaSim simulation software. The method has been tested using images from a commercial green… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

  4. arXiv:2004.03351  [pdf, other

    cs.CV eess.IV

    An Image Labeling Tool and Agricultural Dataset for Deep Learning

    Authors: Patrick Wspanialy, Justin Brooks, Medhat Moussa

    Abstract: We introduce a labeling tool and dataset aimed to facilitate computer vision research in agriculture. The annotation tool introduces novel methods for labeling with a variety of manual, semi-automatic, and fully-automatic tools. The dataset includes original images collected from commercial greenhouses, images from PlantVillage, and images from Google Images. Images were annotated with segmentatio… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

    Comments: 5 pages, 5 figures

  5. arXiv:1905.02161  [pdf, other

    cs.LG stat.ML

    Batch Normalization is a Cause of Adversarial Vulnerability

    Authors: Angus Galloway, Anna Golubeva, Thomas Tanay, Medhat Moussa, Graham W. Taylor

    Abstract: Batch normalization (batch norm) is often used in an attempt to stabilize and accelerate training in deep neural networks. In many cases it indeed decreases the number of parameter updates required to achieve low training error. However, it also reduces robustness to small adversarial input perturbations and noise by double-digit percentages, as we show on five standard datasets. Furthermore, subs… ▽ More

    Submitted 29 May, 2019; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: To appear in the ICML 2019 Workshop on Identifying and Understanding Deep Learning Phenomena

  6. arXiv:1806.08266  [pdf, ps, other

    cs.IT cs.DC

    Beyond RAID 6 --- an Efficient Systematic Code Protecting Against Multiple Errors, Erasures, and Silent Data Corruption

    Authors: Mohamad Moussa, Marek Rychlik

    Abstract: We describe a replacement for RAID 6, based on a new linear, systematic code, which detects and corrects any combination of $E$ errors (unknown location) and $Z$ erasures (known location) provided that $Z+2E \leq 4$. We investigate some scenarios for error correction beyond the code's minimum distance, using list decoding. We describe a decoding algorithm with quasi-logarithmic time complexity, wh… ▽ More

    Submitted 5 July, 2018; v1 submitted 21 June, 2018; originally announced June 2018.

    Comments: 51 pages, Intellectual Property

    MSC Class: 94B05; 94B35

  7. arXiv:1802.04457  [pdf, other

    cs.LG stat.ML

    Predicting Adversarial Examples with High Confidence

    Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa

    Abstract: It has been suggested that adversarial examples cause deep learning models to make incorrect predictions with high confidence. In this work, we take the opposite stance: an overly confident model is more likely to be vulnerable to adversarial examples. This work is one of the most proactive approaches taken to date, as we link robustness with non-calibrated model confidence on noisy images, provid… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: Under review by the International Conference on Machine Learning (ICML)

  8. arXiv:1711.00449  [pdf, other

    cs.LG stat.ML

    Attacking Binarized Neural Networks

    Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa

    Abstract: Neural networks with low-precision weights and activations offer compelling efficiency advantages over their full-precision equivalents. The two most frequently discussed benefits of quantization are reduced memory consumption, and a faster forward pass when implemented with efficient bitwise operations. We propose a third benefit of very low-precision neural networks: improved robustness against… ▽ More

    Submitted 31 January, 2018; v1 submitted 1 November, 2017; originally announced November 2017.

    Comments: Published as a conference paper at ICLR 2018

  9. The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment

    Authors: Angus Galloway, Graham W. Taylor, Aaron Ramsay, Medhat Moussa

    Abstract: An original dataset for semantic segmentation, Ciona17, is introduced, which to the best of the authors' knowledge, is the first dataset of its kind with pixel-level annotations pertaining to invasive species in a marine environment. Diverse outdoor illumination, a range of object shapes, colour, and severe occlusion provide a significant real world challenge for the computer vision community. An… ▽ More

    Submitted 17 February, 2017; originally announced February 2017.

    Comments: Submitted to the Conference on Computer and Robot Vision (CRV) 2017

  10. arXiv:1702.02103  [pdf, other

    cs.RO stat.ML

    An Integrated Simulator and Dataset that Combines Gras** and Vision for Deep Learning

    Authors: Matthew Veres, Medhat Moussa, Graham W. Taylor

    Abstract: Deep learning is an established framework for learning hierarchical data representations. While compute power is in abundance, one of the main challenges in applying this framework to robotic gras** has been obtaining the amount of data needed to learn these representations, and structuring the data to the task at hand. Among contemporary approaches in the literature, we highlight key properties… ▽ More

    Submitted 17 April, 2017; v1 submitted 7 February, 2017; originally announced February 2017.

  11. arXiv:1701.03041  [pdf, other

    cs.RO stat.ML

    Modeling Grasp Motor Imagery through Deep Conditional Generative Models

    Authors: Matthew Veres, Medhat Moussa, Graham W. Taylor

    Abstract: Gras** is a complex process involving knowledge of the object, the surroundings, and of oneself. While humans are able to integrate and process all of the sensory information required for performing this task, equip** machines with this capability is an extremely challenging endeavor. In this paper, we investigate how deep learning techniques can allow us to translate high-level concepts such… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: Accepted for publication in Robotics and Automation Letters (RA-L)

  12. arXiv:1604.02347  [pdf

    cs.IT

    Ladder and Subdivision of Ladder Graphs with Pendant Edges are Odd Graceful

    Authors: M. I. Moussa, E. M. Badr

    Abstract: The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder graph. In particular, we show that the ladder graph Ln with m-pendant Ln + mk1 is odd graceful. We also show that the subdivision of ladder graph Ln with m-pendant S(Ln) + mk1 is odd gracefu… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 8 pages, 2 figures

    ACM Class: B.4.0, B.2.4, C.2.0

  13. arXiv:1411.6466  [pdf, other

    cs.IT

    Interference Cancellation trough Interference Alignment for Downlink of Cognitive Cellular Networks

    Authors: May Moussa, Fotis Foukalas, Tamer Khattab

    Abstract: In this letter, we propose the interference cancellation through interference alignment at the downlink of cognitive cellular networks. Interference alignment helps the spatial resources to be shared among primary and secondary cells and thus, it can provide higher degrees of freedom through interference cancellation. We derive and depict the achievable degrees of freedom. We also analyse and calc… ▽ More

    Submitted 24 November, 2014; originally announced November 2014.

  14. arXiv:1103.4502  [pdf

    cs.DM

    An Algorithm for Odd Gracefulness of the Tensor Product of Two Line Graphs

    Authors: M. Ibrahim Moussa

    Abstract: An odd graceful labeling of a graph G=(V,E) is a function f:V(G)->[0,1,2,...,2|E(G)|-1} such that |f(u)-f(v)| is odd value less than or equal to 2|E(G)-1| for any u, v in V(G). In spite of the large number of papers published on the subject of graph labeling, there are few algorithms to be used by researchers to gracefully label graphs. This work provides generalized odd graceful solutions to all… ▽ More

    Submitted 23 March, 2011; originally announced March 2011.

    Comments: 12 Pages, JGraph-Hoc Journal Vol.3, No. 1, 2011

  15. An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles

    Authors: M. Ibrahim Moussa

    Abstract: In 1991, Gnanajothi [4] proved that the path graph P_n with n vertex and n-1 edge is odd graceful, and the cycle graph C_m with m vertex and m edges is odd graceful if and only if m even, she proved the cycle graph is not graceful if m odd. In this paper, firstly, we studied the graph C_m $\cup$ P_m when m = 4, 6,8,10 and then we proved that the graph C_ $\cup$ P_n is odd graceful if m is even. Fi… ▽ More

    Submitted 21 April, 2010; originally announced April 2010.

    Comments: 9 Pages, JGraph-Hoc Journal

    Report number: 0007736 MSC Class: 68 ACM Class: G.2; G.3; H.1.1

    Journal ref: Vol.2, No.1, March 2010

  16. An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles

    Authors: M. Ibrahim Moussa

    Abstract: In 1991, Gnanajothi [4] proved that the path graph P_n with n vertex and n-1 edge is odd graceful, and the cycle graph C_m with m vertex and m edges is odd graceful if and only if m even, she proved the cycle graph is not graceful if m odd. In this paper, firstly, we studied the graph C_m $\cup$ P_m when m = 4, 6,8,10 and then we proved that the graph C_ $\cup$ P_n is odd graceful if m is even. Fi… ▽ More

    Submitted 18 March, 2010; originally announced March 2010.

    Comments: 9 Pages, JGraph-Hoc Journal

    Journal ref: International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.1 (2010) 112-119