Skip to main content

Showing 1–17 of 17 results for author: Tabatabaei, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07196  [pdf, other

    cs.DB cs.CR cs.DC cs.LG

    Permissioned Blockchain-based Framework for Ranking Synthetic Data Generators

    Authors: Narasimha Raghavan Veeraragavan, Mohammad Hossein Tabatabaei, Severin Elvatun, Vibeke Binz Vallevik, Siri Larønningen, Jan F Nygård

    Abstract: Synthetic data generation is increasingly recognized as a crucial solution to address data related challenges such as scarcity, bias, and privacy concerns. As synthetic data proliferates, the need for a robust evaluation framework to select a synthetic data generator becomes more pressing given the variety of options available. In this research study, we investigate two primary questions: 1) How c… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. Turning hazardous volatile matter compounds into fuel by catalytic steam reforming: An evolutionary machine learning approach

    Authors: Alireza Shafizadeh, Hossein Shahbeik, Mohammad Hossein Nadian, Vijai Kumar Gupta, Abdul-Sattar Nizami, Su Shiung Lam, Wanxi Peng, Junting Pan, Meisam Tabatabaei, Mortaza Aghbashlo

    Abstract: Chemical and biomass processing systems release volatile matter compounds into the environment daily. Catalytic reforming can convert these compounds into valuable fuels, but develo** stable and efficient catalysts is challenging. Machine learning can handle complex relationships in big data and optimize reaction conditions, making it an effective solution for addressing the mentioned issues. Th… ▽ More

    Submitted 25 July, 2023; originally announced August 2023.

  3. Using evolutionary machine learning to characterize and optimize co-pyrolysis of biomass feedstocks and polymeric wastes

    Authors: Hossein Shahbeik, Alireza Shafizadeh, Mohammad Hossein Nadian, Dorsa Jeddi, Seyedali Mirjalili, Yadong Yang, Su Shiung Lam, Junting Pan, Meisam Tabatabaei, Mortaza Aghbashlo

    Abstract: Co-pyrolysis of biomass feedstocks with polymeric wastes is a promising strategy for improving the quantity and quality parameters of the resulting liquid fuel. Numerous experimental measurements are typically conducted to find the optimal operating conditions. However, performing co-pyrolysis experiments is highly challenging due to the need for costly and lengthy procedures. Machine learning (ML… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Journal ref: Journal of Cleaner Production, Volume 387, 10 February 2023, 135881

  4. Machine learning-based characterization of hydrochar from biomass: Implications for sustainable energy and material production

    Authors: Alireza Shafizadeh, Hossein Shahbeik, Shahin Rafiee, Aysooda Moradi, Mohammadreza Shahbaz, Meysam Madadi, Cheng Li, Wanxi Peng, Meisam Tabatabaei, Mortaza Aghbashlo

    Abstract: Hydrothermal carbonization (HTC) is a process that converts biomass into versatile hydrochar without the need for prior drying. The physicochemical properties of hydrochar are influenced by biomass properties and processing parameters, making it challenging to optimize for specific applications through trial-and-error experiments. To save time and money, machine learning can be used to develop a m… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Journal ref: Fuel 347, 1 September 2023, 128467

  5. arXiv:2303.00067  [pdf, ps, other

    cs.MA cs.LO

    Playing to Learn, or to Keep Secret: Alternating-Time Logic Meets Information Theory

    Authors: Masoud Tabatabaei, Wojciech Jamroga

    Abstract: Many important properties of multi-agent systems refer to the participants' ability to achieve a given goal, or to prevent the system from an undesirable event. Among intelligent agents, the goals are often of epistemic nature, i.e., concern the ability to obtain knowledge about an important fact φ. Such properties can be e.g. expressed in ATLK, that is, alternating-time temporal logic ATL extende… ▽ More

    Submitted 18 October, 2023; v1 submitted 28 February, 2023; originally announced March 2023.

  6. arXiv:2207.02264  [pdf, other

    cs.NI cs.DB

    Understanding blockchain: definitions, architecture, design, and system comparison

    Authors: Mohammad Hossein Tabatabaei, Roman Vitenberg, Narasimha Raghavan Veeraragavan

    Abstract: The explosive advent of the blockchain technology has led to hundreds of blockchain systems in the industry, thousands of academic papers published over the last few years, and an even larger number of new initiatives and projects. Despite the emerging consolidation efforts, the area remains highly turbulent without systematization, educational materials, or cross-system comparative analysis. In… ▽ More

    Submitted 26 July, 2023; v1 submitted 5 July, 2022; originally announced July 2022.

    Comments: 34 pages, 10 figures, 8 tables

  7. arXiv:2104.02042  [pdf

    eess.IV cs.CV physics.med-ph

    Automated lung segmentation from CT images of normal and COVID-19 pneumonia patients

    Authors: Faeze Gholamiankhah, Samaneh Mostafapour, Nouraddin Abdi Goushbolagh, Seyedjafar Shojaerazavi, Parvaneh Layegh, Seyyed Mohammad Tabatabaei, Hossein Arabi

    Abstract: Automated semantic image segmentation is an essential step in quantitative image analysis and disease diagnosis. This study investigates the performance of a deep learning-based model for lung segmentation from CT images for normal and COVID-19 patients. Chest CT images and corresponding lung masks of 1200 confirmed COVID-19 cases were used for training a residual neural network. The reference lun… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  8. arXiv:1709.05214  [pdf, other

    cs.IT

    Mutually Uncorrelated Primers for DNA-Based Data Storage

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Ryan Gabrys, Olgica Milenkovic

    Abstract: We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based data storage systems and for synchronization of communication devices. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. WMU sequences used for primer design in DNA-based data storage systems ar… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: 14 pages, 3 figures, 1 Table. arXiv admin note: text overlap with arXiv:1601.08176

  9. arXiv:1608.02247  [pdf, ps, other

    cs.CR

    Information Security as Strategic (In)effectivity

    Authors: Wojciech Jamroga, Masoud Tabatabaei

    Abstract: Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information fl… ▽ More

    Submitted 7 August, 2016; originally announced August 2016.

  10. arXiv:1601.08176  [pdf, ps, other

    cs.IT

    Weakly Mutually Uncorrelated Codes

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Olgica Milenkovic

    Abstract: We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based storage systems and synchronization protocols. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. In addition, WMU sequences used in DNA-based storage systems are required to have balanced compos… ▽ More

    Submitted 29 January, 2016; originally announced January 2016.

    Comments: 1 table

  11. arXiv:1507.01611  [pdf, other

    cs.ET cs.IT

    DNA-Based Storage: Trends and Methods

    Authors: S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Eva Ruiz Garcia, Jian Ma, Huimin Zhao, Olgica Milenkovic

    Abstract: We provide an overview of current approaches to DNA-based storage system design and accompanying synthesis, sequencing and editing methods. We also introduce and analyze a suite of new constrained coding schemes for both archival and random access DNA storage channels. The mathematical basis of our work is the construction and design of sequences over discrete alphabets that avoid pre-specified ad… ▽ More

    Submitted 6 July, 2015; originally announced July 2015.

  12. arXiv:1505.02199  [pdf, other

    cs.IT

    A Rewritable, Random-Access DNA-Based Storage System

    Authors: S. M. Hossein Tabatabaei Yazdi, Yongbo Yuan, Jian Ma, Huimin Zhao, Olgica Milenkovic

    Abstract: We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanyi… ▽ More

    Submitted 8 May, 2015; originally announced May 2015.

    Comments: 26 pages, 12 figures

  13. arXiv:1211.2723  [pdf, ps, other

    cs.IT

    On the Relationships among Optimal Symmetric Fix-Free Codes

    Authors: S. M. Hossein Tabatabaei Yazdi, Serap A. Savari

    Abstract: Symmetric fix-free codes are prefix condition codes in which each codeword is required to be a palindrome. Their study is motivated by the topic of joint source-channel coding. Although they have been considered by a few communities they are not well understood. In earlier work we used a collection of instances of Boolean satisfiability problems as a tool in the generation of all optimal binary sy… ▽ More

    Submitted 12 November, 2012; originally announced November 2012.

  14. arXiv:1207.0290  [pdf, other

    cs.IT

    A Deterministic Polynomial-Time Protocol for Synchronizing from Deletions

    Authors: S. M. Sadegh Tabatabaei Yazdi, Lara Dolecek

    Abstract: In this paper, we consider a synchronization problem between nodes $A$ and $B$ that are connected through a two--way communication channel. {Node $A$} contains a binary file $X$ of length $n$ and {node $B$} contains a binary file $Y$ that is generated by randomly deleting bits from $X$, by a small deletion rate $β$. The location of deleted bits is not known to either node $A$ or node $B$. We offer… ▽ More

    Submitted 21 August, 2013; v1 submitted 2 July, 2012; originally announced July 2012.

    Comments: Accepted to the IEEE Transactions on Information Theory

  15. arXiv:1101.2937  [pdf, other

    cs.IT

    A Deterministic Polynomial--Time Algorithm for Constructing a Multicast Coding Scheme for Linear Deterministic Relay Networks

    Authors: S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari

    Abstract: We propose a new way to construct a multicast coding scheme for linear deterministic relay networks. Our construction can be regarded as a generalization of the well-known multicast network coding scheme of Jaggi et al. to linear deterministic relay networks and is based on the notion of flow for a unicast session that was introduced by the authors in earlier work. We present randomized and determ… ▽ More

    Submitted 14 January, 2011; originally announced January 2011.

    Comments: 12 pages, 2 figures, submitted to CISS 2011

  16. arXiv:1004.1236  [pdf, ps, other

    math.OC cs.IT cs.NI

    On Describing the Routing Capacity Regions of Networks

    Authors: Ali Kakhbod, S. M. Sadegh Tabatabaei Yazdi

    Abstract: The routing capacity region of networks with multiple unicast sessions can be characterized using Farkas' lemma as an infinite set of linear inequalities. In this paper this result is sharpened by exploiting properties of the solution satisfied by each rate-tuple on the boundary of the capacity region, and a finite description of the routing capacity region which depends on network parameters is o… ▽ More

    Submitted 10 February, 2012; v1 submitted 7 April, 2010; originally announced April 2010.

    Journal ref: Mathematical Methods of Operations Research (MMOR), vol 72, no. 1, pp. 95-106, 2010

  17. arXiv:0904.2401  [pdf, other

    cs.IT

    A Combinatorial Study of Linear Deterministic Relay Networks

    Authors: S. M. Sadegh Tabatabaei Yazdi, Serap A. Savari

    Abstract: In the last few years the so--called "linear deterministic" model of relay channels has gained popularity as a means of studying the flow of information over wireless communication networks, and this approach generalizes the model of wireline networks which is standard in network optimization. There is recent work extending the celebrated max--flow/min--cut theorem to the capacity of a unicast s… ▽ More

    Submitted 15 April, 2009; originally announced April 2009.

    Comments: 24 pages, 2 figures