Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Radi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08344  [pdf, other

    cs.CV

    Blind Image Deblurring with FFT-ReLU Sparsity Prior

    Authors: Abdul Mohaimen Al Radi, Prothito Shovon Majumder, Md. Mosaddek Khan

    Abstract: Blind image deblurring is the process of recovering a sharp image from a blurred one without prior knowledge about the blur kernel. It is a small data problem, since the key challenge lies in estimating the unknown degrees of blur from a single image or limited data, instead of learning from large datasets. The solution depends heavily on developing algorithms that effectively model the image degr… ▽ More

    Submitted 11 September, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    Comments: 10 pages

  2. arXiv:2405.19387  [pdf, other

    cs.CV

    Video Anomaly Detection in 10 Years: A Survey and Outlook

    Authors: Moshira Abdalla, Sajid Javed, Muaz Al Radi, Anwaar Ulhaq, Naoufel Werghi

    Abstract: Video anomaly detection (VAD) holds immense importance across diverse domains such as surveillance, healthcare, and environmental monitoring. While numerous surveys focus on conventional VAD methods, they often lack depth in exploring specific approaches and emerging trends. This survey explores deep learning-based VAD, expanding beyond traditional supervised training paradigms to encompass emergi… ▽ More

    Submitted 30 June, 2024; v1 submitted 29 May, 2024; originally announced May 2024.

  3. An End-to-End Authentication Mechanism for Wireless Body Area Networks

    Authors: Mosarrat Jahan, Fatema Tuz Zohra, Md. Kamal Parvez, Upama Kabir, Abdul Mohaimen Al Radi, Shaily Kabir

    Abstract: Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the i… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Journal ref: Smart Health, 2023

  4. arXiv:1809.00121  [pdf, other

    cs.NI cs.OS

    A Review of Software-Defined WLANs: Architectures and Central Control Mechanisms

    Authors: Behnam Dezfouli, Vahid Esmaeelzadeh, Jaykumar Sheth, Marjan Radi

    Abstract: The significant growth in the number of WiFi-enabled devices as well as the increase in the traffic conveyed through wireless local area networks (WLANs) necessitate the adoption of new network control mechanisms. Specifically, dense deployment of access points, client mobility, and emerging QoS demands bring about challenges that cannot be effectively addressed by distributed mechanisms. Recent s… ▽ More

    Submitted 1 September, 2018; originally announced September 2018.

    Report number: SIOTLAB-COMST-SDWLAN-JULY18

  5. arXiv:1503.03460  [pdf

    cs.DC

    Efficient Service Broker Policy For Large-Scale Cloud Environments

    Authors: Mohammed Radi

    Abstract: Algorithms, policies, and methodologies are necessary to achieve high user satisfaction and practical utilization in cloud computing by ensuring the efficient and fair allocation of every computing resource. Whenever a new job arrives in cloud environments, the service broker is responsible for selecting the data center that will execute that job. Selecting data centers serves an important functio… ▽ More

    Submitted 11 March, 2015; originally announced March 2015.

    Journal ref: (2015). International Journal of Computer Science Issues, 12(1): 85-90

  6. A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    Authors: Behnam Dezfouli, Marjan Radi, Shukor Abd Razak

    Abstract: In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower net… ▽ More

    Submitted 17 August, 2010; originally announced August 2010.

    Comments: 17 pages, 16 figures

    ACM Class: C.2.1; C.2.2

    Journal ref: International journal of Computer Networks & Communications, vol. 2, 2010, pp. 126-142