Skip to main content

Showing 1–5 of 5 results for author: Sartipi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.05469  [pdf, other

    cs.CV

    Smart Camera Parking System With Auto Parking Spot Detection

    Authors: Tuan T. Nguyen, Mina Sartipi

    Abstract: Given the rising urban population and the consequential rise in traffic congestion, the implementation of smart parking systems has emerged as a critical matter of concern. Smart parking solutions use cameras, sensors, and algorithms like computer vision to find available parking spaces. This method improves parking place recognition, reduces traffic and pollution, and optimizes travel time. In re… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  2. arXiv:2407.05452  [pdf, other

    cs.CV

    Semantic Segmentation for Real-World and Synthetic Vehicle's Forward-Facing Camera Images

    Authors: Tuan T. Nguyen, Phan Le, Yasir Hassan, Mina Sartipi

    Abstract: In this paper, we present the submission to the 5th Annual Smoky Mountains Computational Sciences Data Challenge, Challenge 3. This is the solution for semantic segmentation problem in both real-world and synthetic images from a vehicle s forward-facing camera. We concentrate in building a robust model which performs well across various domains of different outdoor situations such as sunny, snowy,… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: 13 pages

  3. arXiv:2402.02526  [pdf, other

    cs.LG

    CompeteSMoE -- Effective Training of Sparse Mixture of Experts via Competition

    Authors: Quang Pham, Giang Do, Huy Nguyen, TrungTin Nguyen, Chenghao Liu, Mina Sartipi, Binh T. Nguyen, Savitha Ramasamy, Xiaoli Li, Steven Hoi, Nhat Ho

    Abstract: Sparse mixture of experts (SMoE) offers an appealing solution to scale up the model complexity beyond the mean of increasing the network's depth or width. However, effective training of SMoE has proven to be challenging due to the representation collapse issue, which causes parameter redundancy and limited representation potentials. In this work, we propose a competition mechanism to address this… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

  4. arXiv:2304.02885  [pdf

    cs.CY

    Connected and Automated Vehicles Investment and Smart Infrastructure in Tennessee Part 3: Infrastructure and Vehicular communications: From Dedicated Short-Range Communications to Cellular Vehicle-to-Everything

    Authors: Asad J. Khattak, Austin Harris, Mina Sartipi, Iman Mahdinia, Nastaran Moradloo, Mohammad SafariTaherkhani

    Abstract: This report aims to support the Tennessee Department of Transportation's decisions about vehicle and infrastructure communication technologies. The transition from Dedicated Short-Range communication (DSRC) V2X to Cellular Vehicle to Everything (C-V2X) is explored using USDOT guidance on relevant issues and presenting the results of experimentation in Tennessee and the potential pros and cons. DSR… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: https://www.tn.gov/content/dam/tn/tdot/long-range-planning/research/final-reports/res2019-final-reports/res2019-07/RES2019-07_Part3_Approved.pdf

    Report number: RES2019-07

  5. arXiv:2304.00648  [pdf, other

    eess.SP cs.CR

    Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning

    Authors: Mohamed k. Fadul, Donald R. Reising, Lakmali P. Weerasena, T. Daniel Loveless, Mina Sartipi

    Abstract: The number of Internet of Things (IoT) deployments is expected to reach 75.4 billion by 2025. Roughly 70% of all IoT devices employ weak or no encryption; thus, putting them and their connected infrastructure at risk of attack by devices that are wrongly authenticated or not authenticated at all. A physical layer security approach -- known as Specific Emitter Identification (SEI) -- has been propo… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: 16 pages, 14 figures. Submitted to IEEE Transactions on Information Forensics & Security