Skip to main content

Showing 1–6 of 6 results for author: Omar, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.04768  [pdf, other

    quant-ph cond-mat.dis-nn cs.SI physics.bio-ph

    Quantum Link Prediction in Complex Networks

    Authors: João P. Moutinho, André Melo, Bruno Coutinho, István A. Kovács, Yasser Omar

    Abstract: Predicting new links in physical, biological, social, or technological networks has a significant scientific and societal impact. Path-based link prediction methods utilize explicit counting of even and odd-length paths between nodes to quantify a score function and infer new or unobserved links. Here, we propose a quantum algorithm for path-based link prediction, QLP, using a controlled continuou… ▽ More

    Submitted 25 November, 2022; v1 submitted 9 December, 2021; originally announced December 2021.

    Comments: Keywords: Complex Networks, Quantum Algorithms, Link Prediction, Social Networks, Protein-Protein Interaction Networks

  2. arXiv:2109.09659  [pdf, other

    quant-ph cs.ET math.OC

    A QUBO Formulation for Minimum Loss Spanning Tree Reconfiguration Problems in Electric Power Networks

    Authors: Filipe F. C. Silva, Pedro M. S. Carvalho, Luis A. F. M. Ferreira, Yasser Omar

    Abstract: We introduce a novel quadratic unconstrained binary optimization (QUBO) formulation for a classical problem in electrical engineering -- the optimal reconfiguration of distribution grids. For a given graph representing the grid infrastructure and known nodal loads, the problem consists in finding the spanning tree that minimizes the total link ohmic losses. A set of constraints is initially define… ▽ More

    Submitted 15 March, 2022; v1 submitted 20 September, 2021; originally announced September 2021.

    Comments: 21 pages, 9 figures. v2: Added new sections on model scaling and validation. Minor editorial changes

  3. An Innovative Word Encoding Method For Text Classification Using Convolutional Neural Network

    Authors: Amr Adel Helmy, Yasser M. K. Omar, Rania Hodhod

    Abstract: Text classification plays a vital role today especially with the intensive use of social networking media. Recently, different architectures of convolutional neural networks have been used for text classification in which one-hot vector, and word embedding methods are commonly used. This paper presents a new language independent word encoding method for text classification. The proposed model conv… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: Accepted @ 14th International Computer Engineering Conference (ICENCO2018), Faculty of Engineering , Cairo University, Egypt, Dec. 29-30, 2018

  4. arXiv:1807.04912  [pdf, other

    cs.ET cs.NE quant-ph

    Perceptrons from Memristors

    Authors: Francisco Silva, Mikel Sanz, João Seixas, Enrique Solano, Yasser Omar

    Abstract: Memristors, resistors with memory whose outputs depend on the history of their inputs, have been used with success in neuromorphic architectures, particularly as synapses and non-volatile memories. However, to the best of our knowledge, no model for a network in which both the synapses and the neurons are implemented using memristors has been proposed so far. In the present work we introduce model… ▽ More

    Submitted 26 December, 2018; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: Added new result on universality of memristors, minor changes in the introduction and algorithm, references updated

    Journal ref: Neural Networks, Volume 122, 273-278 (2020)

  5. arXiv:0908.2328  [pdf, ps, other

    cs.IT cs.CR

    ARQ Secrecy: From Theory to Practice

    Authors: Yara Omar, Moustafa Youssef, Hesham El Gamal

    Abstract: Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we propose a simple, yet efficient, security overlay protocol to existing 802.11 networks. Our work targets networks secured by the Wired Equivalent Privacy (WEP) protocol because of its widespread use and vulnerability to a multitude of security threats. By exploiting the existing ARQ protocol in the 802.11 standard, our pr… ▽ More

    Submitted 17 August, 2009; originally announced August 2009.

    Comments: 5 pages, invited to ITW'09

  6. arXiv:0806.1231  [pdf, ps, other

    cs.IT cs.CR

    Improving Classical Authentication with Quantum Communication

    Authors: F. M. Assis, P. Mateus, Y. Omar

    Abstract: We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security t… ▽ More

    Submitted 11 February, 2010; v1 submitted 6 June, 2008; originally announced June 2008.

    Comments: New improved version, with several clarifications in the text and new figures