Zum Hauptinhalt springen

Showing 1–24 of 24 results for author: Habibi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.08526  [pdf, other

    cs.LG

    Inverse design with conditional cascaded diffusion models

    Authors: Milad Habibi, Mark Fuge

    Abstract: Adjoint-based design optimizations are usually computationally expensive and those costs scale with resolution. To address this, researchers have proposed machine learning approaches for inverse design that can predict higher-resolution solutions from lower cost/resolution ones. Due to the recent success of diffusion models over traditional generative models, we extend the use of diffusion models… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: Accepted for presentation at IDETC/CIE 2024 conference, Washington, DC. 11 pages, 9 figures

  2. arXiv:2407.19739  [pdf

    cs.NI cs.ET

    Nomadic Non-Public Networks for 6G: Use Cases and Key Performance Indicators

    Authors: Daniel Lindenschmitt, Benedikt Veith, Khurshid Alam, Ainur Daurembekova, Michael Gundall, Mohammad Asif Habibi, Bin Han, Dennis Krummacker, Philipp Rosemann, Hans D. Schotten

    Abstract: The landscape of wireless communication systems is evolving rapidly, with a pivotal role envisioned for dynamic network structures and self-organizing networks in upcoming technologies like the 6G mobile communications standard. This evolution is fueled by the growing demand from diverse sectors, including industry, manufacturing, agriculture, and the public sector, each with increasingly specific… ▽ More

    Submitted 4 August, 2024; v1 submitted 29 July, 2024; originally announced July 2024.

    Comments: 8 pages, 1 figure

  3. arXiv:2407.16917  [pdf, other

    astro-ph.IM astro-ph.EP cs.LG

    TelescopeML -- I. An End-to-End Python Package for Interpreting Telescope Datasets through Training Machine Learning Models, Generating Statistical Reports, and Visualizing Results

    Authors: Ehsan, Gharib-Nezhad, Natasha E. Batalha, Hamed Valizadegan, Miguel J. S. Martinho, Mahdi Habibi, Gopal Nookula

    Abstract: We are on the verge of a revolutionary era in space exploration, thanks to advancements in telescopes such as the James Webb Space Telescope (\textit{JWST}). High-resolution, high signal-to-noise spectra from exoplanet and brown dwarf atmospheres have been collected over the past few decades, requiring the development of accurate and reliable pipelines and tools for their analysis. Accurately and… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: Please find the accepted paper with complete reference list at https://joss.theoj.org/papers/10.21105/joss.06346

    Journal ref: Journal of Open Source Software, 9(99), 6346 (2024)

  4. arXiv:2406.10118  [pdf, other

    cs.CL

    SEACrowd: A Multilingual Multimodal Data Hub and Benchmark Suite for Southeast Asian Languages

    Authors: Holy Lovenia, Rahmad Mahendra, Salsabil Maulana Akbar, Lester James V. Miranda, Jennifer Santoso, Elyanah Aco, Akhdan Fadhilah, Jonibek Mansurov, Joseph Marvin Imperial, Onno P. Kampman, Joel Ruben Antony Moniz, Muhammad Ravi Shulthan Habibi, Frederikus Hudi, Railey Montalan, Ryan Ignatius, Joanito Agili Lopo, William Nixon, Börje F. Karlsson, James Jaya, Ryandito Diandaru, Yuze Gao, Patrick Amadeus, Bin Wang, Jan Christian Blaise Cruz, Chenxi Whitehouse , et al. (36 additional authors not shown)

    Abstract: Southeast Asia (SEA) is a region rich in linguistic diversity and cultural variety, with over 1,300 indigenous languages and a population of 671 million people. However, prevailing AI models suffer from a significant lack of representation of texts, images, and audio datasets from SEA, compromising the quality of AI models for SEA languages. Evaluating models for SEA languages is challenging due t… ▽ More

    Submitted 8 July, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    Comments: https://github.com/SEACrowd

  5. arXiv:2405.03555  [pdf, other

    cs.NI

    A Comprehensive Overview and Survey of O-RAN: Exploring Slicing-aware Architecture, Deployment Options, and Use Cases

    Authors: Khurshid Alam, Mohammad Asif Habibi, Matthias Tammen, Dennis Krummacker, Walid Saad, Marco Di Renzo, Tommaso Melodia, Xavier Costa-Pérez, Mérouane Debbah, Ashutosh Dutta, Hans D. Schotten

    Abstract: Open-radio access network (O-RAN) seeks to establish principles of openness, programmability, automation, intelligence, and hardware-software disaggregation with interoperable interfaces. It advocates for multi-vendorism and multi-stakeholderism within a cloudified and virtualized wireless infrastructure, aimed at enhancing the deployment, operation, and maintenance of RAN architecture. This enhan… ▽ More

    Submitted 8 May, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

    Comments: 45 pages, 12 figures, 4 tables, submitted to the IEEE for possible publication

  6. arXiv:2403.05700  [pdf, other

    cs.CL

    DADIT: A Dataset for Demographic Classification of Italian Twitter Users and a Comparison of Prediction Methods

    Authors: Lorenzo Lupo, Paul Bose, Mahyar Habibi, Dirk Hovy, Carlo Schwarz

    Abstract: Social scientists increasingly use demographically stratified social media data to study the attitudes, beliefs, and behavior of the general public. To facilitate such analyses, we construct, validate, and release publicly the representative DADIT dataset of 30M tweets of 20k Italian Twitter users, along with their bios and profile pictures. We enrich the user data with high-quality labels for gen… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: Accepted to LREC-COLING 2024

  7. arXiv:2212.03602  [pdf, other

    cs.IT

    DMH-HARQ: Reliable and Open Latency-Constrained Wireless Transport Network

    Authors: Bin Han, Muxia Sun, Yao Zhu, Vincenzo Sciancalepore, Mohammad Asif Habibi, Yulin Hu, Anke Schmeink, Yan-Fu Li, Hans D. Schotten

    Abstract: The extreme requirements for high reliability and low latency in the upcoming Sixth Generation (6G) wireless networks are challenging the design of multi-hop wireless transport networks. Inspired by the advent of the virtualization concept in the wireless networks design and openness paradigm as fostered by the O-RAN Alliance, we target a revolutionary resource allocation scheme to improve the ove… ▽ More

    Submitted 1 July, 2024; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: Submitted to IEEE Transactions on Mobile Computing

  8. arXiv:2210.08970  [pdf

    cs.CY

    Digital Twins for Industry 4.0 in the 6G Era

    Authors: Bin Han, Mohammad Asif Habibi, Bjoern Richerzhagen, Kim Schindhelm, Florian Zeiger, Fabrizio Lamberti, Filippo Gabriele Pratticò, Karthik Upadhya, Charalampos Korovesis, Ioannis-Prodromos Belikaidis, Panagiotis Demestichas, Siyu Yuan, Hans D. Schotten

    Abstract: Having the Fifth Generation (5G) mobile communication system recently rolled out in many countries, the wireless community is now setting its eyes on the next era of Sixth Generation (6G). Inheriting from 5G its focus on industrial use cases, 6G is envisaged to become the infrastructural backbone of future intelligent industry. Especially, a combination of 6G and the emerging technologies of Digit… ▽ More

    Submitted 15 October, 2023; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: Accepted for publication in IEEE Open Journal of Vehicular Technology

  9. CNFET-based design of efficient ternary half adder and 1-trit multiplier circuits using dynamic logic

    Authors: Farzin Mahboob-Sardroudi, Mehdi Habibi, Mohammad-Hossein Moaiyeri

    Abstract: This paper presents a ternary half adder and a 1-trit multiplier using carbon nanotube transistors. The proposed circuits are designed using pass transistor logic and dynamic logic. Ternary logic uses less connections than binary logic, and less voltage changes are required for the same amount of data transmission. Carbon nanotube transistors have advantages over MOSFETs, such as the same mobility… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Journal ref: Microelectronics Journal, 113, 105105

  10. How Should Network Slice Instances be Provided to Multiple Use Cases of a Single Vertical Industry?

    Authors: Mohammad Asif Habibi, Bin Han, Faqir Zarrar Yousaf, Hans D. Schotten

    Abstract: There are a large number of vertical industries implementing multiple use cases, each use case characterized by diverging service, network, and connectivity requirements such as automobile, manufacturing, power grid, etc. Such heterogeneity cannot be effectively managed and efficiently mapped onto a single type of network slice instance (NSI). Thus the tailored provisioning of an end-to-end networ… ▽ More

    Submitted 10 April, 2021; originally announced April 2021.

    Journal ref: in IEEE Communications Standards Magazine, vol. 4, no. 3, pp. 53-61, September 2020

  11. Edge-Assisted Congestion Control Mechanism for 5G Network Using Software-Defined Networking

    Authors: Meysam Nasimi, Mohammad Asif Habibi, Bin Han, Hans D. Schotten

    Abstract: In order to cope with the explosive growth of data traffic which is associated with a wide plethora of emerging applications and services that are expected to be used by both ordinary users and vertical industries, the congestion control mechanism is considered to be vital. In this paper, we proposed a congestion control mechanism that could function within the framework of Multi-Access Edge Compu… ▽ More

    Submitted 1 April, 2021; originally announced April 2021.

    Comments: This paper presented in International Symposium on Wireless Communication Systems (ISWCS 2018)

    Journal ref: 2018 15th International Symposium on Wireless Communication Systems (ISWCS)

  12. arXiv:2101.01062  [pdf, other

    cs.NI

    An Abstracted Survey on 6G: Drivers, Requirements, Efforts, and Enablers

    Authors: Bin Han, Wei Jiang, Mohammad Asif Habibi, Hans D. Schotten

    Abstract: As of today, 5G mobile systems have been already widely rolled out, it is the right time for academia and industry to explore the next generation mobile communication system beyond 5G. To this end, this paper provides an abstracted survey for the 6G mobile system. We shed light on the key driving factors for 6G through predicting the growth trend of mobile traffic and mobile service subscriptions… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Journal ref: Published at NGNA 2020

  13. arXiv:2008.10928  [pdf

    eess.SY cs.NI eess.SP

    Platoon--assisted Vehicular Cloud in VANET: Vision and Challenges

    Authors: Meysam Nasimi, Mohammad Asif Habibi, Hans D. Schotten

    Abstract: Intelligent connected vehicles equipped with wireless sensors, intelligent control system, and communication devices are expected to commercially launch and emerge on road in short-term. These smart vehicles are able to partially/fully drive themselves; collect data from sensors, make and execute decisions based on that data; communicate with other vehicles, pedestrians, and nodes installed on the… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

    Comments: This paper presented in European Symposium on Computer and Communications (ESCC 2019)

  14. arXiv:2008.10856  [pdf, other

    cs.CL

    TabSim: A Siamese Neural Network for Accurate Estimation of Table Similarity

    Authors: Maryam Habibi, Johannes Starlinger, Ulf Leser

    Abstract: Tables are a popular and efficient means of presenting structured information. They are used extensively in various kinds of documents including web pages. Tables display information as a two-dimensional matrix, the semantics of which is conveyed by a mixture of structure (rows, columns), headers, caption, and content. Recent research has started to consider tables as first class objects, not just… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

  15. arXiv:2008.07347  [pdf, other

    cs.CL

    HunFlair: An Easy-to-Use Tool for State-of-the-Art Biomedical Named Entity Recognition

    Authors: Leon Weber, Mario Sänger, Jannes Münchmeyer, Maryam Habibi, Ulf Leser, Alan Akbik

    Abstract: Summary: Named Entity Recognition (NER) is an important step in biomedical information extraction pipelines. Tools for NER should be easy to use, cover multiple entity types, highly accurate, and robust towards variations in text genre and style. To this end, we propose HunFlair, an NER tagger covering multiple entity types integrated into the widely used NLP framework Flair. HunFlair outperforms… ▽ More

    Submitted 18 August, 2020; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: - Corrected author list - Updated project link

  16. arXiv:1907.04504  [pdf

    cs.AR

    A Range Matching CAM for Hierarchical Defect Tolerance Technique in NRAM Structures

    Authors: Hossein Pourmeidani, Mehdi Habibi

    Abstract: Due to the small size of nanoscale devices, they are highly prone to process disturbances which results in manufacturing defects. Some of the defects are randomly distributed throughout the nanodevice layer. Other disturbances tend to be local and lead to cluster defects caused by factors such as layer misintegration and line width variations. In this paper, we propose a method for identifying clu… ▽ More

    Submitted 10 July, 2019; originally announced July 2019.

  17. arXiv:1902.03489  [pdf

    eess.IV cs.LG

    Lumen boundary detection using neutrosophic c-means in IVOCT images

    Authors: Mohammad Habibi, Ahmad Ayatollahi, Niyoosha Dallalazar, Ali Kermani

    Abstract: In this paper, a novel method for lumen boundary identification is proposed using Neutrosophic c_means. This method clusters pixels of the intravascular optical coherence tomography image into several clusters using indeterminacy and Neutrosophic theory, which aims to detect the boundaries. Intravascular optical coherence tomography images are cross-sectional and high-resolution images which are t… ▽ More

    Submitted 16 February, 2019; v1 submitted 9 February, 2019; originally announced February 2019.

    Comments: Accepted on knowledge_based engineering and innovation (KBEI 2019), 6 pages

  18. arXiv:1806.10426  [pdf, other

    cs.NI

    The Structure of Service Level Agreement of Slice-based 5G Network

    Authors: Mohammad Asif Habibi, Bin Han, Meysam Nasimi, Hans D. Schotten

    Abstract: Network slicing is considered to be one of the key enablers to Fifth Generation (5G) communication system. Legacy telecommunication networks have been providing various services to all kinds of customers through a single network infrastructure. In contrast, with the deployment of network slicing, operators are now able to partition entire network into different slices, each with its own configurat… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

  19. Optimal Resource Dedication in Grouped Random Access for Massive Machine-Type Communications

    Authors: Bin Han, Mohammad Asif Habibi, Hans D. Schotten

    Abstract: The high risk of random access collisions leads to huge challenge for the deployment massive Machine-Type Communications (mMTC), which cannot be sufficiently overcome by current solutions in LTE/LTE-A networks such as the extended access barring (EAB) scheme. The recently studied approaches of grouped random access have shown a great potential in simultaneously reducing the collision rate and the… ▽ More

    Submitted 31 July, 2017; originally announced July 2017.

    Comments: Accepted by the 2017 IEEE Conference on Standards for Communications & Networking (CSCN)

    Journal ref: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, 2017, pp. 72-77

  20. arXiv:1707.00852  [pdf, other

    cs.NI

    Network Slicing in 5G Mobile Communication Architecture, Profit Modeling, and Challenges

    Authors: Mohammad Asif Habibi, Bin Han, Hans D. Schotten

    Abstract: Efficient flexibility and higher system scalability call for enhanced network performance, better energy consumption, lower infrastructure cost, and effective resource utilization. To accomplish this, an architectural optimization and reconstruction of existing cellular network is required. Network slicing is considered to be one of the key enablers and an architectural answer of communication sys… ▽ More

    Submitted 4 July, 2017; originally announced July 2017.

  21. arXiv:1706.06933  [pdf

    cs.NI

    Measurement and Statistical Analysis of End User Satisfaction with Mobile Network Coverage in Afghanistan

    Authors: Mohammad Asif Habibi, Milos Ulman, Bahawodin Baha, Michal Stočes

    Abstract: Network coverage is one of the fundamental requirements of any business of a service provider. Mobile operators are expected to deploy base stations in an effective way in order to cover most of the residential areas of a particular country. Improved network coverage leads to increase total revenue, provide end users with enhanced Quality of Services QoS anytime anywhere, and play vital role in th… ▽ More

    Submitted 21 June, 2017; originally announced June 2017.

  22. Measurement and Analysis of Quality of Service of Mobile Networks in Afghanistan End User Perspective

    Authors: M. A. Habibi, M. Ulman, J. Vaněk, J. Pavlík

    Abstract: Enhanced Quality of Service (QoS) and satisfaction of mobile phone user are major concerns of a service provider. In order to manage network efficiently and to provide enhanced end to end Quality of Experience (QoE), operator is expected to measure and analyze QoS from various perspectives and at different relevant points of network. The scope of this paper is measurement and statistically analysi… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: in AGRIS on-line Papers in Economics' and Informatics. December 2016

  23. Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Authors: Mohammad Hassan Habibi, Mahmoud Gardeshi, Mahdi R. Alaghband

    Abstract: Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their secu… ▽ More

    Submitted 4 February, 2011; originally announced February 2011.

    Comments: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel systems

    MSC Class: 68-02

    Journal ref: International Journal of Distributed and Parallel systems, Volume 2, Number 1, pp. 103-114. 2011

  24. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

    Authors: Mohammad Hassan Habibi, Mahmud Gardeshi, Mahdi R. Alaghband

    Abstract: Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole securi… ▽ More

    Submitted 4 February, 2011; v1 submitted 3 February, 2011; originally announced February 2011.

    Comments: 13 page, International Journal of Ubicomp

    MSC Class: 68-02

    Journal ref: International Journal of Ubicomp, Volume 2, Number 1,pp. 1-13, 2011