Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Ali, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.21788  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Vision-Language Model Based Handwriting Verification

    Authors: Mihir Chauhan, Abhishek Satbhai, Mohammad Abuzar Hashemi, Mir Basheer Ali, Bina Ramamurthy, Mingchen Gao, Siwei Lyu, Sargur Srihari

    Abstract: Handwriting Verification is a critical in document forensics. Deep learning based approaches often face skepticism from forensic document examiners due to their lack of explainability and reliance on extensive training data and handcrafted features. This paper explores using Vision Language Models (VLMs), such as OpenAI's GPT-4o and Google's PaliGemma, to address these challenges. By leveraging th… ▽ More

    Submitted 31 July, 2024; originally announced July 2024.

    Comments: 4 Pages, 1 Figure, 1 Table, Accepted as Short paper at Irish Machine Vision and Image Processing (IMVIP) Conference

  2. arXiv:2407.04053  [pdf, other

    cs.DC

    Edge AI: A Taxonomy, Systematic Review and Future Directions

    Authors: Sukhpal Singh Gill, Muhammed Golec, Jianmin Hu, Minxian Xu, Junhui Du, Huaming Wu, Guneet Kaur Walia, Subramaniam Subramanian Murugesan, Babar Ali, Mohit Kumar, Kejiang Ye, Prabal Verma, Surendra Kumar, Felix Cuadrado, Steve Uhlig

    Abstract: Edge Artificial Intelligence (AI) incorporates a network of interconnected systems and devices that receive, cache, process, and analyse data in close communication with the location where the data is captured with AI technology. Recent advancements in AI efficiency, the widespread use of Internet of Things (IoT) devices, and the emergence of edge computing have unlocked the enormous scope of Edge… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: Preprint Version, 18 Figures

  3. arXiv:2405.18320  [pdf, other

    cs.CV cs.AI cs.CL

    Self-Supervised Learning Based Handwriting Verification

    Authors: Mihir Chauhan, Mohammad Abuzar Hashemi, Abhishek Satbhai, Mir Basheer Ali, Bina Ramamurthy, Mingchen Gao, Siwei Lyu, Sargur Srihari

    Abstract: We present SSL-HV: Self-Supervised Learning approaches applied to the task of Handwriting Verification. This task involves determining whether a given pair of handwritten images originate from the same or different writer distribution. We have compared the performance of multiple generative, contrastive SSL approaches against handcrafted feature extractors and supervised learning on CEDAR AND data… ▽ More

    Submitted 1 August, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: 8 pages, 2 figures, 2 tables, Accepted at Irish Machine Vision and Image Processing Conference 2024

  4. arXiv:2404.14010  [pdf, other

    cs.AR

    A Stochastic Rounding-Enabled Low-Precision Floating-Point MAC for DNN Training

    Authors: Sami Ben Ali, Silviu-Ioan Filip, Olivier Sentieys

    Abstract: Training Deep Neural Networks (DNNs) can be computationally demanding, particularly when dealing with large models. Recent work has aimed to mitigate this computational challenge by introducing 8-bit floating-point (FP8) formats for multiplication. However, accumulations are still done in either half (16-bit) or single (32-bit) precision arithmetic. In this paper, we investigate lowering accumulat… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Journal ref: DATE 2024 - 27th IEEE/ACM Design, Automation and Test in Europe, Mar 2024, Valencia, Spain. pp.1-6

  5. How good are my search strings? Reflections on using an existing review as a quasi-gold standard

    Authors: Huynh Khanh Vi Tran, Jürgen Börstler, Nauman Bin Ali, Michael Unterkalmsteiner

    Abstract: Background: Systematic literature studies (SLS) have become a core research methodology in Evidence-based Software Engineering (EBSE). Search completeness, ie, finding all relevant papers on the topic of interest, has been recognized as one of the most commonly discussed validity issues of SLSs. Aim: This study aims at raising awareness on the issues related to search string construction and on se… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Journal ref: e Informatica Softw. Eng. J. 16(1) (2022)

  6. Assessing test artifact quality -- A tertiary study

    Authors: Huynh Khanh Vi Tran, Michael Unterkalmsteiner, Jürgen Börstler, Nauman bin Ali

    Abstract: Context: Modern software development increasingly relies on software testing for an ever more frequent delivery of high quality software. This puts high demands on the quality of the central artifacts in software testing, test suites and test cases. Objective: We aim to develop a comprehensive model for capturing the dimensions of test case/suite quality, which are relevant for a variety of perspe… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Journal ref: Information and Software Technology 139 (2021): 106620

  7. Help Me to Understand this Commit! -- A Vision for Contextualized Code Reviews

    Authors: Michael Unterkalmsteiner, Deepika Badampudi, Ricardo Britto, Nauman bin Ali

    Abstract: Background: Modern Code Review (MCR) is a key component for delivering high-quality software and sharing knowledge among developers. Effective reviews require an in-depth understanding of the code and demand from the reviewers to contextualize the change from different perspectives. Aim: While there is a plethora of research on solutions that support developers to understand changed code, we have… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: First IDE Workshop (IDE '24), April 20, 2024, Lisbon, Portugal

  8. Optimisation and Performance Computation of a Phase Frequency Detector Module for IoT Devices

    Authors: Md. Shahriar Khan Hemel, Mamun Bin Ibne Reaz, Sawal Hamid Bin Md Ali, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz

    Abstract: The Internet of Things (IoT) is pivotal in transforming the way we live and interact with our surroundings. To cope with the advancement in technologies, it is vital to acquire accuracy with the speed. A phase frequency detector (PFD) is a critical device to regulate and provide accurate frequency in IoT devices. Designing a PFD poses challenges in achieving precise phase detection, minimising dea… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

    Journal ref: Annals of Emerging Technologies in Computing (AETiC), Print ISSN: 2516-0281, Online ISSN: 2516-029X, pp. 13-21, Vol. 8, No. 1, 1st January 2024, Available: http://aetic.theiaer.org/archive/v8/v8n1/p1.html

  9. Test-Case Quality -- Understanding Practitioners' Perspectives

    Authors: Huynh Khanh Vi Tran, Nauman Bin Ali, Jürgen Börstler, Michael Unterkalmsteiner

    Abstract: Background: Test-case quality has always been one of the major concerns in software testing. To improve test-case quality, it is important to better understand how practitioners perceive the quality of test-cases. Objective: Motivated by that need, we investigated how practitioners define test-case quality and which aspects of test-cases are important for quality assessment. Method: We conducted s… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: PROFES 2019: 37-52

  10. arXiv:2307.12484  [pdf, other

    cs.SE

    Use and evaluation of simulation for software process education: a case study

    Authors: Nauman bin Ali, Michael Unterkalmsteiner

    Abstract: Software Engineering is an applied discipline and concepts are difficult to grasp only at a theoretical level alone. In the context of a project management course, we introduced and evaluated the use of software process simulation (SPS) based games for improving students' understanding of software development processes. The effects of the intervention were measured by evaluating the students' argu… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

    Comments: European Conference Software Engineering Education (ECSEE), pp. 1-15, Seeon Monastery, Germany (2014)

  11. arXiv:2305.05860  [pdf, other

    math.AT cs.SI math.SP physics.soc-ph

    Topology and spectral interconnectivities of higher-order multilayer networks

    Authors: Elkaïoum M. Moutuou, Obaï B. K. Ali, Habib Benali

    Abstract: Multilayer networks have permeated all the sciences as a powerful mathematical abstraction for interdependent heterogenous complex systems such as multimodal brain connectomes, transportation, ecological systems, and scientific collaboration. But describing such systems through a purely graph-theoretic formalism presupposes that the interactions that define the underlying infrastructures and suppo… ▽ More

    Submitted 26 June, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

  12. arXiv:2211.00733  [pdf

    cs.CV cs.AI

    State-of-the-art Models for Object Detection in Various Fields of Application

    Authors: Syed Ali John Naqvi, Syed Bazil Ali

    Abstract: We present a list of datasets and their best models with the goal of advancing the state-of-the-art in object detection by placing the question of object recognition in the context of the two types of state-of-the-art methods: one-stage methods and two stage-methods. We provided an in-depth statistical analysis of the five top datasets in the light of recent developments in granulated Deep Learnin… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 4 pages, 5 tables

  13. arXiv:2210.10545  [pdf, other

    eess.IV cs.CV

    Improved lung segmentation based on U-Net architecture and morphological operations

    Authors: S Ali John Naqvi, Abdullah Tauqeer, Rohaib Bhatti, S Bazil Ali

    Abstract: An essential stage in computer aided diagnosis of chest X rays is automated lung segmentation. Due to rib cages and the unique modalities of each persons lungs, it is essential to construct an effective automated lung segmentation model. This paper presents a reliable model for the segmentation of lungs in chest radiographs. Our model overcomes the challenges by learning to ignore unimportant area… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

    Comments: 8 pages, 5 figures, conference

  14. Evaluating Plant Disease Detection Mobile Applications: Quality and Limitations

    Authors: Ayesha Siddiqua, Muhammad Ashad Kabir, Tanzina Ferdous, Israt Bintea Ali, Leslie A. Weston

    Abstract: In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each with a variety of features. These apps need to be categorized and reviewed following a proper framework that ensures their quality. This study aims to present an approach to evaluating plant disease detection mobile apps… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Journal ref: Agronomy, 12(8), 2022

  15. arXiv:2109.10134  [pdf, other

    cs.SE

    A Quality Assessment Instrument for Systematic Literature Reviews in Software Engineering

    Authors: Muhammad Usman, Nauman bin Ali, Claes Wohlin

    Abstract: Context: Systematic literature reviews (SLRs) have become standard practise as part of software engineering research, although their quality varies. To build on the reviews, both for future research and industry practice, they need to be of high quality. Objective: To assess the quality of SLRs in software engineering, we put forward an appraisal instrument for SLRs. The instrument is intended for… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

  16. arXiv:2109.08013  [pdf, other

    cs.CV cs.CL cs.LG cs.MM

    Detecting Propaganda Techniques in Memes

    Authors: Dimitar Dimitrov, Bishr Bin Ali, Shaden Shaar, Firoj Alam, Fabrizio Silvestri, Hamed Firooz, Preslav Nakov, Giovanni Da San Martino

    Abstract: Propaganda can be defined as a form of communication that aims to influence the opinions or the actions of people towards a specific goal; this is achieved by means of well-defined rhetorical and psychological devices. Propaganda, in the form we know it today, can be dated back to the beginning of the 17th century. However, it is with the advent of the Internet and the social media that it has sta… ▽ More

    Submitted 7 August, 2021; originally announced September 2021.

    Comments: propaganda, disinformation, fake news, memes, multimodality. arXiv admin note: text overlap with arXiv:2105.09284

    MSC Class: 68T50 ACM Class: I.2.7

    Journal ref: ACL-2021

  17. arXiv:2105.09284  [pdf, other

    cs.MM cs.CL cs.LG

    SemEval-2021 Task 6: Detection of Persuasion Techniques in Texts and Images

    Authors: Dimitar Dimitrov, Bishr Bin Ali, Shaden Shaar, Firoj Alam, Fabrizio Silvestri, Hamed Firooz, Preslav Nakov, Giovanni Da San Martino

    Abstract: We describe SemEval-2021 task 6 on Detection of Persuasion Techniques in Texts and Images: the data, the annotation guidelines, the evaluation setup, the results, and the participating systems. The task focused on memes and had three subtasks: (i) detecting the techniques in the text, (ii) detecting the text spans where the techniques are used, and (iii) detecting techniques in the entire meme, i.… ▽ More

    Submitted 25 April, 2021; originally announced May 2021.

    Comments: propaganda, disinformation, misinformation, fake news, memes, multimodality

    MSC Class: 68T50 ACM Class: F.2.2; I.2.7

    Journal ref: SemEval-2021

  18. arXiv:2105.04767  [pdf, ps, other

    cs.SE

    A Value-driven Approach for Software Process Improvement -- A Solution Proposal

    Authors: Ramtin Jabbari, Nauman bin Ali, Kai Petersen

    Abstract: Software process improvement (SPI) is a means to an end, not an end in itself (e.g., a goal is to achieve shorter time to market and not just compliance to a process standard). Therefore, SPI initiatives ought to be streamlined to meet the desired values for an organization. Through a literature review, seven secondary studies aggregating maturity models and assessment frameworks were identified.… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  19. arXiv:2101.06502  [pdf, ps, other

    cs.IT

    Stable Matching for Selection of Intelligent Reflecting Surfaces in Multiuser MISO Systems

    Authors: Jawad Mirza, Bakhtiar Ali, Muhammad Awais Javed

    Abstract: In this letter, we present an intelligent reflecting surface (IRS) selection strategy for multiple IRSs aided multiuser multiple-input single-output (MISO) systems. In particular, we pose the IRS selection problem as a stable matching problem. A two stage user-IRS assignment algorithm is proposed, where the main objective is to carry out a stable user-IRS matching, such that the sum rate of the sy… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

    Comments: 5 pages and 4 figures, submitted for publication

  20. arXiv:2010.03525  [pdf

    cs.SE cs.GL

    Empirical Standards for Software Engineering Research

    Authors: Paul Ralph, Nauman bin Ali, Sebastian Baltes, Domenico Bianculli, Jessica Diaz, Yvonne Dittrich, Neil Ernst, Michael Felderer, Robert Feldt, Antonio Filieri, Breno Bernard Nicolau de França, Carlo Alberto Furia, Greg Gay, Nicolas Gold, Daniel Graziotin, Pinjia He, Rashina Hoda, Natalia Juristo, Barbara Kitchenham, Valentina Lenarduzzi, Jorge Martínez, Jorge Melegati, Daniel Mendez, Tim Menzies, Jefferson Molleri , et al. (18 additional authors not shown)

    Abstract: Empirical Standards are natural-language models of a scientific community's expectations for a specific kind of study (e.g. a questionnaire survey). The ACM SIGSOFT Paper and Peer Review Quality Initiative generated empirical standards for research methods commonly used in software engineering. These living documents, which should be continuously revised to reflect evolving consensus around resear… ▽ More

    Submitted 4 March, 2021; v1 submitted 7 October, 2020; originally announced October 2020.

    Comments: For the complete standards, supplements and other resources, see https://github.com/acmsigsoft/EmpiricalStandards

  21. arXiv:2008.04570  [pdf

    nlin.AO cs.CG math.CO

    Analysis of self-equilibrated networks through cellular modeling

    Authors: Omar Aloui, David Orden, Nizar Bel Hadj Ali, Landolf Rhode-Barbarigos

    Abstract: Network equilibrium models represent a versatile tool for the analysis of interconnected objects and their relationships. They have been widely employed in both science and engineering to study the behavior of complex systems under various conditions, including external perturbations and damage. In this paper, network equilibrium models are revisited through graph-theory laws and attributes with s… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: 38 pages, 23 figures

  22. arXiv:2005.05218  [pdf, other

    eess.IV cs.CV

    Medical Image Segmentation Using a U-Net type of Architecture

    Authors: Eshal Zahra, Bostan Ali, Wajahat Siddique

    Abstract: Deep convolutional neural networks have been proven to be very effective in image related analysis and tasks, such as image segmentation, image classification, image generation, etc. Recently many sophisticated CNN based architectures have been proposed for the purpose of image segmentation. Some of these newly designed networks are used for the specific purpose of medical image segmentation, mode… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Comments: 6 Pages

  23. arXiv:1912.10671  [pdf, ps, other

    cs.IT eess.SP

    Channel Estimation Method and Phase Shift Design for Reconfigurable Intelligent Surface Assisted MIMO Networks

    Authors: Jawad Mirza, Bakhtiar Ali

    Abstract: In this paper, we investigate channel estimation for a large intelligent surface (LIS) aided multiple-input multiple-output (MIMO) communication system. Due to the close proximity of communication devices and LIS terminal, the desired channels can be modeled as line-of-sight channels which are ill-conditioned. To estimate these channel matrices with high quality, we propose a two-stage channel est… ▽ More

    Submitted 1 June, 2020; v1 submitted 23 December, 2019; originally announced December 2019.

    Comments: 10 pages, 7 figures

  24. arXiv:1901.09062  [pdf, other

    cs.SE

    A quality model for evaluating and choosing a stream processing framework architecture

    Authors: Youness Dendane, Fabio Petrillo, Hamid Mcheick, Souhail Ben Ali

    Abstract: Today, we have to deal with many data (Big data) and we need to make decisions by choosing an architectural framework to analyze these data coming from different area. Due to this, it become problematic when we want to process these data, and even more, when it is continuous data. When you want to process some data, you have to first receive it, store it, and then query it. This is what we call Ba… ▽ More

    Submitted 25 January, 2019; originally announced January 2019.

  25. Modeling the Throughput of the Linux-Based Agile-SD Transmission Control Protocol

    Authors: Mohamed A. Alrshah, Mohamed Othman, Borhanuddin Ali, Zurina Hanapi

    Abstract: Agile-SD is one of the latest versions of loss-based congestion control algorithm (CCA), which has been proposed to improve the total performance of transmission control protocol (TCP) over high-speed and short-distance networks. It has introduced a new mechanism, called agility factor mechanism, which shortens the epoch time to reduce the sensitivity to packet losses and in turn to increase the a… ▽ More

    Submitted 16 February, 2017; originally announced February 2017.

    Comments: 14 figures

    Journal ref: Mohamed Alrshah, Mohamed Othman, Borhanuddin Ali and Zurina Hanapi, "Modeling the Throughput of the Linux-Based Agile-SD Transmission Control Protocol," in IEEE Access 4 (2016): 9724-9732

  26. Comparative study of High-speed Linux TCP Variants over High-BDP Networks

    Authors: Mohamed A. Alrshah, Mohamed Othman, Borhanuddin Ali, Zurina Mohd Hanapia

    Abstract: Transmission Control Protocol (TCP) has been profusely used by most of internet applications. Since 1970s, several TCP variants have been developed in order to cope with the fast increasing of network capacities especially in high Bandwidth Delay Product (high-BDP) networks. In these TCP variants, several approaches have been used, some of these approaches have the ability to estimate available ba… ▽ More

    Submitted 26 January, 2016; originally announced October 2016.

    Comments: Review and performance evaluation work

    Journal ref: Journal of Network and Computer Applications, 43, pp.66-75 (2014)

  27. Adaptive Multi-polling Scheduler for QoS Support of Video Transmission in IEEE 802.11e WLANs

    Authors: Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi

    Abstract: The 802.11E Task Group has been established to enhance Quality of Service (QoS) provision for time-bounded services in the current IEEE 802.11 Medium Access Control (MAC) protocol. The QoS is introduced throughout Hybrid Coordination Function Controlled Channel Access (HCCA) for the rigorous QoS provision. In HCCA, the station is allocated a fixed Transmission Opportunity (TXOP) based on its TSPEC… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.

    Comments: arXiv admin note: text overlap with arXiv:1602.03699, arXiv:1602.03886

  28. Providing Dynamic TXOP for QoS Support of Video Transmission in IEEE 802.11e WLANs

    Authors: Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi

    Abstract: The IEEE 802.11e standard introduced by IEEE 802.11 Task Group E (TGe) enhances the Quality of Service (QoS) by means of HCF Controlled Channel Access (HCCA). The scheduler of HCCA allocates Transmission Opportunities (TXOPs) to QoS-enabled Station (QSTA) based on their TS Specifications (TSPECs) negotiated at the traffic setup time so that it is only efficient for Constant Bit Rate (CBR) applicat… ▽ More

    Submitted 11 February, 2016; originally announced February 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1602.03699

  29. Feasible HCCA Polling Mechanism for Video Transmission in IEEE 802.11e WLANs

    Authors: Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi

    Abstract: IEEE 802.11e standard defines two Medium Access Control (MAC) functions to support Quality of Service (QoS) for wireless local area networks: Enhanced Distributed Channel Access (EDCA) and HCF Controlled Channel Access (HCCA). EDCA provides fair prioritized QoS support while HCCA guarantees parameterized QoS for the traffics with rigid QoS requirements. The latter shows higher QoS provisioning wit… ▽ More

    Submitted 11 February, 2016; originally announced February 2016.

  30. Adaptive TXOP Assignment for QoS Support of Video Traffic in IEEE 802.11e Networks

    Authors: Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi

    Abstract: Quality of Service (QoS) is provided in IEEE 802.11e protocol by means of HCF Controlled Channel Access (HCCA) scheduler which is efficient for supporting Constant Bit Rate (CBR) applications. Numerous researches have been carried out to enhance the HCCA scheduler attempting to accommodate the needs of Variable Bit Rate (VBR) video traffics which probably demonstrates a non-deterministic profile d… ▽ More

    Submitted 11 February, 2016; originally announced February 2016.

  31. Agile-SD: A Linux-based TCP Congestion Control Algorithm for Supporting High-speed and Short-distance Networks

    Authors: Mohamed A. Alrshah, Mohamed Othman, Borhanuddin Ali, Zurina Mohd Hanapi

    Abstract: Recently, high-speed and short-distance networks are widely deployed and their necessity is rapidly increasing everyday. This type of networks is used in several network applications; such as Local Area Networks (LAN) and Data Center Networks (DCN). In LANs and DCNs, high-speed and short-distance networks are commonly deployed to connect between computing and storage elements in order to provide r… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: 12 Pages

    Journal ref: Journal of Network and Computer Applications, 55, pp.181-190 (2015)

  32. Greedy-Knapsack Algorithm for Optimal Downlink Resource Allocation in LTE Networks

    Authors: Nasim Ferdosian, Mohamed Othman, Borhanuddin Mohd Ali, Kweh Yeah Lun

    Abstract: The Long Term Evolution (LTE) as a mobile broadband technology supports a wide domain of communication services with different requirements. Therefore, scheduling of all flows from various applications in overload states in which the requested amount of bandwidth exceeds the limited available spectrum resources is a challenging issue. Accordingly, in this paper, a greedy algorithm is presented to… ▽ More

    Submitted 13 January, 2016; originally announced January 2016.

    Comments: Wireless Networks, 2015

  33. Implications of Burn-In Stress on NBTI Degradation

    Authors: Mohd Azman Abdul Latif, Noohul Basheer Zain Ali, Fawnizu Azmadi Hussin, Mark Zwolinski

    Abstract: Burn-in is accepted as a way to evaluate ageing effects in an accelerated manner. It has been suggested that burn-in stress may have a significant effect on the Negative Bias Temperature Instability (NBTI) of subthreshold CMOS circuits. This paper analyses the effect of burn-in on NBTI in the context of a Digital to Analogue Converter (DAC) circuit. Analogue circuits require matched device pairs;… ▽ More

    Submitted 5 October, 2015; originally announced October 2015.

  34. arXiv:1307.3489  [pdf

    cs.CL cs.NE

    Genetic approach for arabic part of speech tagging

    Authors: Bilel Ben Ali, Fethi Jarray

    Abstract: With the growing number of textual resources available, the ability to understand them becomes critical. An essential first step in understanding these sources is the ability to identify the part of speech in each sentence. Arabic is a morphologically rich language, wich presents a challenge for part of speech tagging. In this paper, our goal is to propose, improve and implement a part of speech t… ▽ More

    Submitted 11 July, 2013; originally announced July 2013.

    Comments: 12 pages, 8 figures

    MSC Class: 68T50

    Journal ref: International Journal on Natural Language Computing (IJNLC) Vol. 2, No.3, June 2013

  35. arXiv:1001.3178  [pdf, ps, other

    cs.IT

    A performance analysis of multi-hop ad hoc networks with adaptive antenna array systems

    Authors: Olfa Ben Sik Ali, Christian Cardinal, Francois Gagnon

    Abstract: Based on a stochastic geometry framework, we establish an analysis of the multi-hop spatial reuse aloha protocol (MSR-Aloha) in ad hoc networks. We compare MSR-Aloha to a simple routing strategy, where a node selects the next relay of the treated packet as to be its nearest receiver with a forward progress toward the final destination (NFP). In addition, performance gains achieved by employing a… ▽ More

    Submitted 20 January, 2010; v1 submitted 18 January, 2010; originally announced January 2010.

    Comments: Submitted to ISIT'10

  36. Performance of Optimum Combining in a Poisson Field of Interferers and Rayleigh Fading Channels

    Authors: Olfa Ben Sik Ali, Christian Cardinal, Francois Gagnon

    Abstract: This paper studies the performance of antenna array processing in distributed multiple access networks without power control. The interference is represented as a Poisson point process. Desired and interfering signals are subject to both path-loss fading (with an exponent greater than 2) and to independent Rayleigh fading. Using these assumptions, we derive the exact closed form expression for t… ▽ More

    Submitted 20 January, 2010; v1 submitted 10 January, 2010; originally announced January 2010.

    Comments: Submitted to IEEE Trans. on Wireless Communication (Jan. 2009)