Skip to main content

Showing 1–11 of 11 results for author: Sadati, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.02507  [pdf, other

    cs.CV

    Deep learning powered real-time identification of insects using citizen science data

    Authors: Shivani Chiranjeevi, Mojdeh Sadaati, Zi K Deng, Jayanth Koushik, Talukder Z Jubery, Daren Mueller, Matthew E O Neal, Nirav Merchant, Aarti Singh, Asheesh K Singh, Soumik Sarkar, Arti Singh, Baskar Ganapathysubramanian

    Abstract: Insect-pests significantly impact global agricultural productivity and quality. Effective management involves identifying the full insect community, including beneficial insects and harmful pests, to develop and implement integrated pest management strategies. Automated identification of insects under real-world conditions presents several challenges, including differentiating similar-looking spec… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

  2. arXiv:2305.01823  [pdf, other

    cs.CV cs.LG

    Out-of-distribution detection algorithms for robust insect classification

    Authors: Mojdeh Saadati, Aditya Balu, Shivani Chiranjeevi, Talukder Zaki Jubery, Asheesh K Singh, Soumik Sarkar, Arti Singh, Baskar Ganapathysubramanian

    Abstract: Deep learning-based approaches have produced models with good insect classification accuracy; Most of these models are conducive for application in controlled environmental conditions. One of the primary emphasis of researchers is to implement identification and classification models in the real agriculture fields, which is challenging because input images that are wildly out of the distribution (… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  3. arXiv:2210.08923  [pdf, other

    cs.CR cs.DC cs.IT

    RPoA: Redefined Proof of Activity

    Authors: Sina Kamali, Shayan Shabihi, Mohammad Taha Fakharian, Alireza Arbabi, Pouriya Tajmehrabi, Mohammad Saadati, Behnam Bahrak

    Abstract: The consensus protocol is the core of a blockchain system which guarantees its secure and stable operation. Proof of Activity (PoA) is a consensus protocol that tries to address some of the issues pertinent to the most widely used protocols, such as Proof of Stake (PoS) and Proof of Work (PoW). However, it still needs to solve the issues regarding high energy consumption, significant resources req… ▽ More

    Submitted 29 November, 2022; v1 submitted 17 October, 2022; originally announced October 2022.

    Comments: 11 pages with 1 figure

    MSC Class: 94A08 ACM Class: D.4.6; E.3; C.2.4; H.1.1

  4. arXiv:2207.06228  [pdf

    cs.LG

    Machine Learning Application in Health

    Authors: Ghadah Alshabana, Marjn Sadati, Thao Tran, Michael Thompson, Ashritha Chitimalla

    Abstract: Coronavirus can be transmitted through the air by close proximity to infected persons. Commercial aircraft are a likely way to both transmit the virus among passengers and move the virus between locations. The importance of learning about where and how coronavirus has entered the United States will help further our understanding of the disease. Air travelers can come from countries or areas with a… ▽ More

    Submitted 9 June, 2022; originally announced July 2022.

  5. arXiv:2112.13544  [pdf, other

    cs.LG cs.AI

    FitAct: Error Resilient Deep Neural Networks via Fine-Grained Post-Trainable Activation Functions

    Authors: Behnam Ghavami, Mani Sadati, Zhenman Fang, Lesley Shannon

    Abstract: Deep neural networks (DNNs) are increasingly being deployed in safety-critical systems such as personal healthcare devices and self-driving cars. In such DNN-based systems, error resilience is a top priority since faults in DNN inference could lead to mispredictions and safety hazards. For latency-critical DNN inference on resource-constrained edge devices, it is nontrivial to apply conventional r… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

    Comments: Accepted in the Design, Automation and Test in Europe Conference (DATE 2022)

  6. arXiv:2112.03477  [pdf, other

    cs.CR cs.LG

    BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks

    Authors: Behnam Ghavami, Mani Sadati, Mohammad Shahidzadeh, Zhenman Fang, Lesley Shannon

    Abstract: Adversarial bit-flip attack (BFA) on Neural Network weights can result in catastrophic accuracy degradation by flip** a very small number of bits. A major drawback of prior bit flip attack techniques is their reliance on test data. This is frequently not possible for applications that contain sensitive or proprietary data. In this paper, we propose Blind Data Adversarial Bit-flip Attack (BDFA),… ▽ More

    Submitted 6 January, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

  7. arXiv:2108.02267  [pdf, other

    cs.RO

    A Method to use Nonlinear Dynamics in a Whisker Sensor for Terrain Identification by Mobile Robots

    Authors: Zhenhua Yu, S. M. Hadi Sadati, Hasitha Wegiriya, Peter Childs, Thrishantha Nanayakkara

    Abstract: This paper shows analytical and experimental evidence of using the vibration dynamics of a compliant whisker for accurate terrain classification during steady state motion of a mobile robot. A Hall effect sensor was used to measure whisker vibrations due to perturbations from the ground. Analytical results predict that the whisker vibrations will have a dominant frequency at the vertical perturbat… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  8. arXiv:2105.07857  [pdf

    cs.CY

    An Enterprise Architecture Framework for E-learning

    Authors: Abbas Najafizadeh, Maryam Saadati, S. Mahdi Jamei, S. Shervin Ostadzadeh

    Abstract: With a trend toward becoming more and more information and communication based, learning services and processes were also evolved. E-learning comprises all forms of electronically supported learning and teaching. The information and communication systems serve as a fundamental role to implement these learning processes. In the typical information-driven organizations, the E-learning is part of a m… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: E-learning; Enterprise Architecture; Framework; Information System; Zachman Framework

  9. arXiv:1909.12749  [pdf

    cs.IR

    Movie Recommender Systems: Implementation and Performance Evaluation

    Authors: Mojdeh Saadati, Syed Shihab, Mohammed Shaiqur Rahman

    Abstract: Over the years, explosive growth in the number of items in the catalog of e-commerce businesses, such as Amazon, Netflix, Pandora, etc., have warranted the development of recommender systems to guide consumers towards their desired products based on their preferences and tastes. Some of the popular approaches for building recommender systems, for mining user, derived input datasets, are: content-b… ▽ More

    Submitted 15 September, 2019; originally announced September 2019.

  10. arXiv:1907.01654  [pdf, ps, other

    cs.LG stat.ML

    Adjustment Criteria for Recovering Causal Effects from Missing Data

    Authors: Mojdeh Saadati, ** Tian

    Abstract: Confounding bias, missing data, and selection bias are three common obstacles to valid causal inference in the data sciences. Covariate adjustment is the most pervasive technique for recovering casual effects from confounding bias. In this paper, we introduce a covariate adjustment formulation for controlling confounding bias in the presence of missing-not-at-random data and develop a necessary an… ▽ More

    Submitted 15 September, 2019; v1 submitted 2 July, 2019; originally announced July 2019.

  11. arXiv:1402.4834  [pdf

    math.OC cs.AI

    The Application of Imperialist Competitive Algorithm for Fuzzy Random Portfolio Selection Problem

    Authors: Mir Ehsan Hesam Sadati, Jamshid Bagherzadeh Mohasefi

    Abstract: This paper presents an implementation of the Imperialist Competitive Algorithm (ICA) for solving the fuzzy random portfolio selection problem where the asset returns are represented by fuzzy random variables. Portfolio Optimization is an important research field in modern finance. By using the necessity-based model, fuzzy random variables reformulate to the linear programming and ICA will be desig… ▽ More

    Submitted 19 February, 2014; originally announced February 2014.

    Comments: 5 pages, 2 tables, Published with International Journal of Computer Applications (IJCA)

    Journal ref: International Journal of Computer Applications 79(9):10-14, October 2013