Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Fouda, M E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05321  [pdf, other

    cs.CV cs.AI

    A Recurrent YOLOv8-based framework for Event-Based Object Detection

    Authors: Diego A. Silva, Kamilya Smagulova, Ahmed Elsheikh, Mohammed E. Fouda, Ahmed M. Eltawil

    Abstract: Object detection is crucial in various cutting-edge applications, such as autonomous vehicles and advanced robotics systems, primarily relying on data from conventional frame-based RGB sensors. However, these sensors often struggle with issues like motion blur and poor performance in challenging lighting conditions. In response to these challenges, event-based cameras have emerged as an innovative… ▽ More

    Submitted 9 August, 2024; originally announced August 2024.

  2. arXiv:2404.10689  [pdf, other

    cs.LG eess.SP

    Network architecture search of X-ray based scientific applications

    Authors: Adarsha Balaji, Ramyad Hadidi, Gregory Kollmer, Mohammed E. Fouda, Prasanna Balaprakash

    Abstract: X-ray and electron diffraction-based microscopy use bragg peak detection and ptychography to perform 3-D imaging at an atomic resolution. Typically, these techniques are implemented using computationally complex tasks such as a Psuedo-Voigt function or solving a complex inverse problem. Recently, the use of deep neural networks has improved the existing state-of-the-art approaches. However, the de… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  3. arXiv:2309.11462  [pdf, other

    cs.CR cs.AI cs.LG eess.AS

    AudioFool: Fast, Universal and synchronization-free Cross-Domain Attack on Speech Recognition

    Authors: Mohamad Fakih, Rouwaida Kanj, Fadi Kurdahi, Mohammed E. Fouda

    Abstract: Automatic Speech Recognition systems have been shown to be vulnerable to adversarial attacks that manipulate the command executed on the device. Recent research has focused on exploring methods to create such attacks, however, some issues relating to Over-The-Air (OTA) attacks have not been properly addressed. In our work, we examine the needed properties of robust attacks compatible with the OTA… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: 10 pages, 11 Figures

  4. arXiv:2305.19295  [pdf, other

    cs.NE

    Low Precision Quantization-aware Training in Spiking Neural Networks with Differentiable Quantization Function

    Authors: Ayan Shymyrbay, Mohammed E. Fouda, Ahmed Eltawil

    Abstract: Deep neural networks have been proven to be highly effective tools in various domains, yet their computational and memory costs restrict them from being widely deployed on portable devices. The recent rapid increase of edge computing devices has led to an active search for techniques to address the above-mentioned limitations of machine learning frameworks. The quantization of artificial neural ne… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 8 pages, 5 Figures, accepted at IJCNN'23

  5. arXiv:2212.13707  [pdf, other

    cs.AR cs.LG

    Thermal Heating in ReRAM Crossbar Arrays: Challenges and Solutions

    Authors: Kamilya Smagulova, Mohammed E. Fouda, Ahmed Eltawil

    Abstract: The higher speed, scalability and parallelism offered by ReRAM crossbar arrays foster development of ReRAM-based next generation AI accelerators. At the same time, sensitivity of ReRAM to temperature variations decreases R_on/Roff ratio and negatively affects the achieved accuracy and reliability of the hardware. Various works on temperature-aware optimization and remapping in ReRAM crossbar array… ▽ More

    Submitted 31 January, 2023; v1 submitted 28 December, 2022; originally announced December 2022.

    Comments: 18 pages

  6. arXiv:2208.06064  [pdf, other

    cs.LG cs.AI

    Mixed-Precision Neural Networks: A Survey

    Authors: Mariam Rakka, Mohammed E. Fouda, Pramod Khargonekar, Fadi Kurdahi

    Abstract: Mixed-precision Deep Neural Networks achieve the energy efficiency and throughput needed for hardware deployment, particularly when the resources are limited, without sacrificing accuracy. However, the optimal per-layer bit precision that preserves accuracy is not easily found, especially with the abundance of models, datasets, and quantization techniques that creates an enormous search space. In… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  7. arXiv:2205.15505  [pdf, other

    cs.AR cs.ET q-bio.GN

    DNA Pattern Matching Acceleration with Analog Resistive CAM

    Authors: Jinane Bazzi, Jana Sweidan, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: DNA pattern matching is essential for many widely used bioinformatics applications. Disease diagnosis is one of these applications, since analyzing changes in DNA sequences can increase our understanding of possible genetic diseases. The remarkable growth in the size of DNA datasets has resulted in challenges in discovering DNA patterns efficiently in terms of run time and power consumption. In th… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  8. arXiv:2205.07141  [pdf, other

    cs.LG cs.AI

    BackLink: Supervised Local Training with Backward Links

    Authors: Wenzhe Guo, Mohammed E Fouda, Ahmed M. Eltawil, Khaled N. Salama

    Abstract: Empowered by the backpropagation (BP) algorithm, deep neural networks have dominated the race in solving various cognitive tasks. The restricted training pattern in the standard BP requires end-to-end error propagation, causing large memory cost and prohibiting model parallelization. Existing local training methods aim to resolve the training obstacle by completely cutting off the backward path be… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

  9. arXiv:2204.06114  [pdf, other

    cs.AR cs.LG

    DT2CAM: A Decision Tree to Content Addressable Memory Framework

    Authors: Mariam Rakka, Mohammed E. Fouda, Rouwaida Kanj, Fadi Kurdahi

    Abstract: Decision trees are considered one of the most powerful tools for data classification. Accelerating the decision tree search is crucial for on-the-edge applications that have limited power and latency budget. In this paper, we propose a Content Addressable Memory (CAM) Compiler for Decision Tree (DT) inference acceleration. We propose a novel "adaptive-precision" scheme that results in a compact im… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

  10. arXiv:2203.02500  [pdf, other

    cs.AR cs.ET

    Efficient Analog CAM Design

    Authors: Jinane Bazzi, Jana Sweidan, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: Content Addressable Memories (CAMs) are considered a key-enabler for in-memory computing (IMC). IMC shows order of magnitude improvement in energy efficiency and throughput compared to traditional computing techniques. Recently, analog CAMs (aCAMs) were proposed as a means to improve storage density and energy efficiency. In this work, we propose two new aCAM cells to improve data encoding and rob… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

    Comments: This is a revised manuscript that is under consideration for publication at IEEE TCAS-I

  11. arXiv:2203.00662  [pdf, other

    cs.ET cs.AR

    In-memory Associative Processors: Tutorial, Potential, and Challenges

    Authors: Mohammed E. Fouda, Hasan Erdem Yantir, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: In-memory computing is an emerging computing paradigm that overcomes the limitations of exiting Von-Neumann computing architectures such as the memory-wall bottleneck. In such paradigm, the computations are performed directly on the data stored in the memory, which highly reduces the memory-processor communications during computation. Hence, significant speedup and energy savings could be achieved… ▽ More

    Submitted 12 April, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: 7 pages

  12. arXiv:2201.07210  [pdf

    cs.NE cs.LG eess.SP

    Efficient Training of Spiking Neural Networks with Temporally-Truncated Local Backpropagation through Time

    Authors: Wenzhe Guo, Mohammed E. Fouda, Ahmed M. Eltawil, Khaled Nabil Salama

    Abstract: Directly training spiking neural networks (SNNs) has remained challenging due to complex neural dynamics and intrinsic non-differentiability in firing functions. The well-known backpropagation through time (BPTT) algorithm proposed to train SNNs suffers from large memory footprint and prohibits backward and update unlocking, making it impossible to exploit the potential of locally-supervised train… ▽ More

    Submitted 13 December, 2021; originally announced January 2022.

    Comments: 16

  13. arXiv:2110.11459  [pdf, other

    cs.CR

    CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

    Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi

    Abstract: Reverse engineering (RE) in Integrated Circuits (IC) is a process in which one will attempt to extract the internals of an IC, extract the circuit structure, and determine the gate-level information of an IC. In general, RE process can be done for validation as well as intellectual property (IP) stealing intentions. In addition, RE also facilitates different illicit activities such as insertion of… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  14. arXiv:2110.09643  [pdf, other

    cs.AR

    In-memory Multi-valued Associative Processor

    Authors: Mira Hout, Mohammed E. Fouda, Rouwaida Kanj, Ahmed M. Eltawil

    Abstract: In-memory associative processor architectures are offered as a great candidate to overcome memory-wall bottleneck and to enable vector/parallel arithmetic operations. In this paper, we extend the functionality of the associative processor to multi-valued arithmetic. To allow for in-memory compute implementation of arithmetic or logic functions, we propose a structured methodology enabling the auto… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

  15. arXiv:2109.05136  [pdf, other

    quant-ph cs.IT eess.SP

    Efficient Noise Mitigation Technique for Quantum Computing

    Authors: Ali Shaib, Mohamad H. Naim, Mohammed E. Fouda, Rouwaida Kanj, Fadi Kurdahi

    Abstract: Quantum computers have enabled solving problems beyond the current computers' capabilities. However, this requires handling noise arising from unwanted interactions in these systems. Several protocols have been proposed to address efficient and accurate quantum noise profiling and mitigation. In this work, we propose a novel protocol that efficiently estimates the average output of a noisy quantum… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  16. arXiv:2109.03934  [pdf, other

    cs.AR cs.NE

    Resistive Neural Hardware Accelerators

    Authors: Kamilya Smagulova, Mohammed E. Fouda, Fadi Kurdahi, Khaled Salama, Ahmed Eltawil

    Abstract: Deep Neural Networks (DNNs), as a subset of Machine Learning (ML) techniques, entail that real-world data can be learned and that decisions can be made in real-time. However, their wide adoption is hindered by a number of software and hardware limitations. The existing general-purpose hardware platforms used to accelerate DNNs are facing new challenges associated with the growing amount of data an… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

  17. arXiv:2011.10852  [pdf, other

    cs.NE cs.ET

    On-Chip Error-triggered Learning of Multi-layer Memristive Spiking Neural Networks

    Authors: Melika Payvand, Mohammed E. Fouda, Fadi Kurdahi, Ahmed M. Eltawil, Emre O. Neftci

    Abstract: Recent breakthroughs in neuromorphic computing show that local forms of gradient descent learning are compatible with Spiking Neural Networks (SNNs) and synaptic plasticity. Although SNNs can be scalably implemented using neuromorphic VLSI, an architecture that can learn using gradient-descent in situ is still missing. In this paper, we propose a local, gradient-based, error-triggered learning alg… ▽ More

    Submitted 21 November, 2020; originally announced November 2020.

    Comments: 15 pages, 11 figures, Journal of Emerging Technology in Circuits and Systems (JETCAS)

  18. arXiv:2001.00962  [pdf, other

    eess.SP cs.IT

    Application of ICA on Self-Interference Cancellation of In-band Full Duplex Systems

    Authors: Mohammed E. Fouda, Sergey Shaboyan, Ayman Elezabi, Ahmed Eltawil

    Abstract: In this letter, we propose a modified version of Fast Independent Component Analysis (FICA) algorithm to solve the self-interference cancellation (SIC) problem in In-band Full Duplex (IBFD) communication systems. The complex mixing problem is mathematically formulated to suit the real-valued blind source separation (BSS) algorithms. In addition, we propose a method to estimate the ambiguity factor… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  19. arXiv:1909.01771  [pdf, other

    cs.ET

    Spiking Neural Networks for Inference and Learning: A Memristor-based Design Perspective

    Authors: M. E. Fouda, F. Kurdahi, A. Eltawil, E. Neftci

    Abstract: On metrics of density and power efficiency, neuromorphic technologies have the potential to surpass mainstream computing technologies in tasks where real-time functionality, adaptability, and autonomy are essential. While algorithmic advances in neuromorphic computing are proceeding successfully, the potential of memristors to improve neuromorphic computing have not yet born fruit, primarily becau… ▽ More

    Submitted 8 October, 2019; v1 submitted 4 September, 2019; originally announced September 2019.

  20. arXiv:1904.08966  [pdf, other

    cs.IT

    Non-Stationary Polar Codes for Resistive Memories

    Authors: Marwen Zorgui, Mohammed E. Fouda, Zhiying Wang, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: Resistive memories are considered a promising memory technology enabling high storage densities with in-memory computing capabilities. However, the readout reliability of resistive memories is impaired due to the inevitable existence of wire resistance, resulting in the sneak path problem. Motivated by this problem, we study polar coding over channels with different reliability levels, termed non-… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

  21. arXiv:1903.01512  [pdf, other

    cs.ET cs.AR

    On Resistive Memories: One Step Row Readout Technique and Sensing Circuitry

    Authors: Mohammed E Fouda, Ahmed M. Eltawil, Fadi Kurdahi

    Abstract: Transistor-based memories are rapidly approaching their maximum density per unit area. Resistive crossbar arrays enable denser memory due to the small size of switching devices. However, due to the resistive nature of these memories, they suffer from current sneak paths complicating the readout procedure. In this paper, we propose a row readout technique with circuitry that can be used to read {se… ▽ More

    Submitted 4 March, 2019; originally announced March 2019.