Skip to main content

Showing 1–24 of 24 results for author: Nazari, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14735  [pdf

    eess.IV cs.AI

    An updated overview of radiomics-based artificial intelligence (AI) methods in breast cancer screening and diagnosis

    Authors: Reza Elahi, Mahdis Nazari

    Abstract: Current imaging methods for diagnosing BC are associated with limited sensitivity and specificity and modest positive predictive power. The recent progress in image analysis using artificial intelligence (AI) has created great promise to improve breast cancer (BC) diagnosis and subtype differentiation. In this case, novel quantitative computational methods, such as radiomics, have been developed t… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2404.03115  [pdf, other

    cs.LG eess.SY

    Deep Learning-Based Weather-Related Power Outage Prediction with Socio-Economic and Power Infrastructure Data

    Authors: Xuesong Wang, Nina Fatehi, Caisheng Wang, Masoud H. Nazari

    Abstract: This paper presents a deep learning-based approach for hourly power outage probability prediction within census tracts encompassing a utility company's service territory. Two distinct deep learning models, conditional Multi-Layer Perceptron (MLP) and unconditional MLP, were developed to forecast power outage probabilities, leveraging a rich array of input features gathered from publicly available… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Accepted in 2024 IEEE PES General Meeting, Seattle, Washington (PES GM 2024)

  3. arXiv:2306.06193  [pdf, other

    cs.LG cs.AI cs.CY

    Consistent Explanations in the Face of Model Indeterminacy via Ensembling

    Authors: Dan Ley, Leonard Tang, Matthew Nazari, Hong** Lin, Suraj Srinivas, Himabindu Lakkaraju

    Abstract: This work addresses the challenge of providing consistent explanations for predictive models in the presence of model indeterminacy, which arises due to the existence of multiple (nearly) equally well-performing models for a given dataset and task. Despite their similar performance, such models often exhibit inconsistent or even contradictory explanations for their predictions, posing challenges t… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

  4. arXiv:2204.05189  [pdf, ps, other

    eess.SP cs.IT

    MmWave 6D Radio Localization with a Snapshot Observation from a Single BS

    Authors: Mohammad A. Nazari, Gonzalo Seco-Granados, Pontus Johannisson, Henk Wymeersch

    Abstract: Accurate and ubiquitous localization is crucial for a variety of applications such as logistics, navigation, intelligent transport, monitoring, control, and also for the benefit of communications. Exploiting millimeter-wave (mmWave) signals in 5G and Beyond 5G systems can provide accurate localization with limited infrastructure. We consider the single base station (BS) localization problem and ex… ▽ More

    Submitted 1 December, 2022; v1 submitted 11 April, 2022; originally announced April 2022.

  5. arXiv:2201.06248  [pdf

    cs.AI

    Using Machine Learning Based Models for Personality Recognition

    Authors: Fatemeh Mohades Deilami, Hossein Sadr, Mojdeh Nazari

    Abstract: Personality can be defined as the combination of behavior, emotion, motivation, and thoughts that aim at describing various aspects of human behavior based on a few stable and measurable characteristics. Considering the fact that our personality has a remarkable influence in our daily life, automatic recognition of a person's personality attributes can provide many essential practical applications… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  6. arXiv:2101.01639  [pdf, other

    eess.SP cs.IT

    3D Orientation Estimation with Multiple 5G mmWave Base Stations

    Authors: Mohammad A. Nazari, Gonzalo Seco-Granados, Pontus Johannisson, Henk Wymeersch

    Abstract: We consider the problem of estimating the 3D orientation of a user, using the downlink mmWave signals received from multiple base stations. We show that the received signals from several base stations, having known positions, can be used to estimate the unknown orientation of the user. We formulate the estimation problem as a maximum likelihood estimation problem in the the manifold of rotation ma… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

  7. arXiv:2010.05772  [pdf, other

    cs.LG cs.AI

    AttendLight: Universal Attention-Based Reinforcement Learning Model for Traffic Signal Control

    Authors: Afshin Oroojlooy, Mohammadreza Nazari, Davood Ha**ezhad, Jorge Silva

    Abstract: We propose AttendLight, an end-to-end Reinforcement Learning (RL) algorithm for the problem of traffic signal control. Previous approaches for this problem have the shortcoming that they require training for each new intersection with a different structure or traffic flow distribution. AttendLight solves this issue by training a single, universal model for intersections with any number of roads, l… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

  8. arXiv:2003.14348  [pdf, ps, other

    cs.CV cs.LG

    UniformAugment: A Search-free Probabilistic Data Augmentation Approach

    Authors: Tom Ching LingChen, Ava Khonsari, Amirreza Lashkari, Mina Rafi Nazari, Jaspreet Singh Sambee, Mario A. Nascimento

    Abstract: Augmenting training datasets has been shown to improve the learning effectiveness for several computer vision tasks. A good augmentation produces an augmented dataset that adds variability while retaining the statistical properties of the original dataset. Some techniques, such as AutoAugment and Fast AutoAugment, have introduced a search phase to find a set of suitable augmentation policies for a… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  9. arXiv:2003.14094  [pdf

    cs.CR

    A Lightweight Adaptable DNS Channel for Covert Data Transmission

    Authors: Mahboubeh Nazari, Sousan Tarahomi, Sobhan Aliabady

    Abstract: Due to the vital role of security in online communications and this fact that attackers are develo** their tools, modernizing the security tools is an essential. The efficiency of crypto systems has been proven after years, however one may need to communicate stealthy without drawing attention especially in transferring secret data such as keys. Covert channels are suitable tools that used to co… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  10. arXiv:1905.13562  [pdf, other

    cs.LG cs.AI stat.ML

    Don't Forget Your Teacher: A Corrective Reinforcement Learning Framework

    Authors: Mohammadreza Nazari, Majid Jahani, Lawrence V. Snyder, Martin Takáč

    Abstract: Although reinforcement learning (RL) can provide reliable solutions in many settings, practitioners are often wary of the discrepancies between the RL solution and their status quo procedures. Therefore, they may be reluctant to adapt to the novel way of executing tasks proposed by RL. On the other hand, many real-world problems require relatively small adjustments from the status quo policies to… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

  11. arXiv:1905.04835  [pdf, other

    cs.LG cs.CV cs.MA cs.RO eess.SY stat.ML

    Multi-Agent Image Classification via Reinforcement Learning

    Authors: Hossein K. Mousavi, Mohammadreza Nazari, Martin Takáč, Nader Motee

    Abstract: We investigate a classification problem using multiple mobile agents capable of collecting (partial) pose-dependent observations of an unknown environment. The objective is to classify an image over a finite time horizon. We propose a network architecture on how agents should form a local belief, take local actions, and extract relevant features from their raw partial observations. Agents are allo… ▽ More

    Submitted 6 August, 2019; v1 submitted 12 May, 2019; originally announced May 2019.

    Comments: Preprint of the paper to be published in IROS'19 proceedings

  12. arXiv:1802.04240  [pdf, other

    cs.AI cs.LG stat.ML

    Reinforcement Learning for Solving the Vehicle Routing Problem

    Authors: Mohammadreza Nazari, Afshin Oroojlooy, Lawrence V. Snyder, Martin Takáč

    Abstract: We present an end-to-end framework for solving the Vehicle Routing Problem (VRP) using reinforcement learning. In this approach, we train a single model that finds near-optimal solutions for problem instances sampled from a given distribution, only by observing the reward signals and following feasibility rules. Our model represents a parameterized stochastic policy, and by applying a policy gradi… ▽ More

    Submitted 21 May, 2018; v1 submitted 12 February, 2018; originally announced February 2018.

    Comments: more results and illustrations

  13. arXiv:1708.05924  [pdf, other

    cs.LG cs.MA

    A Deep Q-Network for the Beer Game: A Deep Reinforcement Learning algorithm to Solve Inventory Optimization Problems

    Authors: Afshin Oroojlooyjadid, MohammadReza Nazari, Lawrence Snyder, Martin Takáč

    Abstract: The beer game is a widely used in-class game that is played in supply chain management classes to demonstrate the bullwhip effect. The game is a decentralized, multi-agent, cooperative problem that can be modeled as a serial supply chain network in which agents cooperatively attempt to minimize the total cost of the network even though each agent can only observe its own local information. Each ag… ▽ More

    Submitted 13 October, 2020; v1 submitted 19 August, 2017; originally announced August 2017.

  14. arXiv:1609.04569   

    cs.AR cs.DC

    FPGA Implementation of a Novel Image Steganography for Hiding Images

    Authors: Masoom Nazari, Mina Zolfy Lighvan, Ziaeddin Daie Koozekonani, Ali Sadeghi

    Abstract: As the complexity of current data flow systems and according infrastructure networks increases, the security of data transition through such platforms becomes more important. Thus, different areas of steganography turn to one of the most challengeable topics of current researches. In this paper a novel method is presented to hide an image into the host image and Hardware/Software design is propose… ▽ More

    Submitted 1 October, 2016; v1 submitted 15 September, 2016; originally announced September 2016.

    Comments: please withdraw this paper because of crucial equation error in Table 1

  15. arXiv:1606.05092  [pdf

    cs.SE

    Adaptable Symbol Table Management by Meta Modeling and Generation of Symbol Table Infrastructures

    Authors: Katrin Hölldobler, Pedram Mir Seyed Nazari, Bernhard Rumpe

    Abstract: Many textual software languages share common concepts such as defining and referencing elements, hierarchical structures constraining the visibility of names, and allowing for identical names for different element kinds. Symbol tables are useful to handle those reference and visibility concepts. However, develo** a symbol table can be a tedious task that leads to an additional effort for the lan… ▽ More

    Submitted 16 June, 2016; originally announced June 2016.

    Comments: 8 pages, 9 figures, Domain-Specific Modeling Workshop 2015 (DSM 2015)

    Journal ref: Domain-Specific Modeling Workshop 2015 (DSM 2015)

  16. arXiv:1606.00585  [pdf

    cs.SE

    An Extended Symbol Table Infrastructure to Manage the Composition of Output-Specific Generator Information

    Authors: Pedram Mir Seyed Nazari, Alexander Roth, Bernhard Rumpe

    Abstract: Code generation is regarded as an essential part of model-driven development (MDD) to systematically transform the abstract models to concrete code. One current challenges of templatebased code generation is that output-specific information, i.e., information about the generated source code, is not explicitly modeled and, thus, not accessible during code generation. Existing approaches try to eith… ▽ More

    Submitted 2 June, 2016; originally announced June 2016.

    Comments: 8 pages, 3 figures, Modellierung 2016 Conference

  17. arXiv:1509.04498  [pdf

    cs.SE

    A Comparison of Mechanisms for Integrating Handwritten and Generated Code for Object-Oriented Programming Languages

    Authors: Timo Greifenberg, Katrin Hölldobler, Carsten Kolassa, Markus Look, Pedram Mir Seyed Nazari, Klaus Müller, Antonio Navarro Perez, Dimitri Plotnikov, Dirk Reiss, Alexander Roth, Bernhard Rumpe, Martin Schindler, Andreas Wortmann

    Abstract: Code generation from models is a core activity in model-driven development (MDD). For complex systems it is usually impossible to generate the entire software system from models alone. Thus, MDD requires mechanisms for integrating generated and handwritten code. Applying such mechanisms without considering their effects can cause issues in projects with many model and code artifacts, where a sound… ▽ More

    Submitted 15 September, 2015; originally announced September 2015.

    Comments: 12 pages, 7 figures, 1 table, Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development. Angers, Loire Valley, France, pp. 74-85, 2015

    Journal ref: Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development. Angers, Loire Valley, France, pp. 74-85, 2015

  18. arXiv:1509.02293  [pdf

    cs.SE

    Using Software Categories for the Development of Generative Software

    Authors: Pedram Mir Seyed Nazari, Bernhard Rumpe

    Abstract: In model-driven development (MDD) software emerges by systematically transforming abstract models to concrete source code. Ideally, performing those transformations is to a large extent the task of code generators. One approach for develo** a new code generator is to write a reference implementation and separate it into handwritten and generatable code. Typically, the generator developer manuall… ▽ More

    Submitted 8 September, 2015; originally announced September 2015.

    Comments: 6 pages, 7 figures, Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development, pp. 498-503, Angers, France, SciTePress, 2015

    Journal ref: Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development, pp. 498-503, Angers, France, SciTePress, 2015

  19. First-Class Variability Modeling in Matlab/Simulink

    Authors: Arne Haber, Carsten Kolassa, Peter Manhart, Pedram Mir Seyed Nazari, Bernhard Rumpe, Ina Schaefer

    Abstract: Modern cars exist in an vast number of variants. Thus, variability has to be dealt with in all phases of the development process, in particular during model-based development of software-intensive functionality using Matlab/Simulink. Currently, variability is often encoded within a functional model leading to so called 150%-models which easily become very complex and do not scale for larger produc… ▽ More

    Submitted 25 August, 2014; originally announced August 2014.

    Comments: 8 pages, 8 figures. Workshop on Variability Modelling of Software-intensive Systems. VaMoS 2013 in Pisa, Italy

    ACM Class: D.2.6; D.2.2

    Journal ref: Proceedings of the Seventh International Workshop on Variability Modelling of Software-intensive Systems, 23.-25.1.2013, pp. 11-18, ACM, New York, NY, USA. 2013

  20. arXiv:1407.6321  [pdf

    cs.CV

    Novel and Automatic Parking Inventory System Based on Pattern Recognition and Directional Chain Code

    Authors: Reza Azad, Majid Nazari

    Abstract: The objective of this paper is to design an efficient vehicle license plate recognition System and to implement it for automatic parking inventory system. The system detects the vehicle first and then captures the image of the front view of the vehicle. Vehicle license plate is localized and characters are segmented. For finding the place of plate, a novel and real time method is expressed. A new… ▽ More

    Submitted 23 July, 2014; originally announced July 2014.

    Journal ref: 2013 First International Conference on computer, Information Technology and Digital Media

  21. arXiv:0812.2575  [pdf

    cs.CV cs.LG

    Face Detection Using Adaboosted SVM-Based Component Classifier

    Authors: Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari

    Abstract: Recently, Adaboost has been widely used to improve the accuracy of any given learning algorithm. In this paper we focus on designing an algorithm to employ combination of Adaboost with Support Vector Machine as weak component classifiers to be used in Face Detection Task. To obtain a set of effective SVM-weaklearner Classifier, this algorithm adaptively adjusts the kernel parameter in SVM instea… ▽ More

    Submitted 13 December, 2008; originally announced December 2008.

    Comments: 7 pages

    Report number: ICEIS Portugal 2007

  22. arXiv:0812.2574  [pdf

    cs.CV cs.LG

    Feature Selection By KDDA For SVM-Based MultiView Face Recognition

    Authors: Seyyed Majid Valiollahzadeh, Abolghasem Sayadiyan, Mohammad Nazari

    Abstract: Applications such as face recognition that deal with high-dimensional data need a map** technique that introduces representation of low-dimensional features with enhanced discriminatory power and a proper classifier, able to classify those complex features. Most of traditional Linear Discriminant Analysis suffer from the disadvantage that their optimality criteria are not directly related to t… ▽ More

    Submitted 13 December, 2008; originally announced December 2008.

    Comments: 6 pages

    Report number: IEEE SETIT 2007

  23. arXiv:0812.2411  [pdf

    cs.MM cs.AI

    Probabilistic SVM/GMM Classifier for Speaker-Independent Vowel Recognition in Continues Speech

    Authors: Mohammad Nazari, Abolghasem Sayadiyan, SeyedMajid Valiollahzadeh

    Abstract: In this paper, we discuss the issues in automatic recognition of vowels in Persian language. The present work focuses on new statistical method of recognition of vowels as a basic unit of syllables. First we describe a vowel detection system then briefly discuss how the detected vowels can feed to recognition unit. According to pattern recognition, Support Vector Machines (SVM) as a discriminati… ▽ More

    Submitted 12 December, 2008; originally announced December 2008.

    Comments: 4 pages

    Report number: ICASSP 2009

  24. arXiv:0812.2405  [pdf

    cs.MM cs.AI

    A New Trend in Optimization on Multi Overcomplete Dictionary toward Inpainting

    Authors: SeyyedMajid Valiollahzadeh, Mohammad Nazari, Massoud Babaie-Zadeh, Christian Jutten

    Abstract: Recently, great attention was intended toward overcomplete dictionaries and the sparse representations they can provide. In a wide variety of signal processing problems, sparsity serves a crucial property leading to high performance. Inpainting, the process of reconstructing lost or deteriorated parts of images or videos, is an interesting application which can be handled by suitably decompositi… ▽ More

    Submitted 12 December, 2008; originally announced December 2008.

    Comments: 4 pages

    Report number: ICASSP 2009