Skip to main content

Showing 1–6 of 6 results for author: Abdullah, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.13196  [pdf, other

    cs.LG cs.AI stat.ML

    Wasserstein Robust Reinforcement Learning

    Authors: Mohammed Amin Abdullah, Hang Ren, Haitham Bou Ammar, Vladimir Milenkovic, Rui Luo, Mingtian Zhang, Jun Wang

    Abstract: Reinforcement learning algorithms, though successful, tend to over-fit to training environments hampering their application to the real-world. This paper proposes $\text{W}\text{R}^{2}\text{L}$ -- a robust reinforcement learning algorithm with significant robust performance on low and high-dimensional control tasks. Our method formalises robust reinforcement learning as a novel min-max game with a… ▽ More

    Submitted 16 September, 2019; v1 submitted 30 July, 2019; originally announced July 2019.

  2. arXiv:1904.11033  [pdf, ps, other

    cs.IT cs.CR

    Optimal Downlink Transmission for Cell Free SWIPT Massive MIMO Systems with Active Eavesdropping

    Authors: Mahmoud Alageli, Aissa Ikhlef, Fahad Alsifiany, Mohammed A. M. Abdullah, Gaojie Chen, Jonathon Chambers

    Abstract: This paper considers secure simultaneous wireless information and power transfer (SWIPT) in cell-free massive multiple-input multiple-output (MIMO) systems. The system consists of a large number of randomly (Poisson-distributed) located access points (APs) serving multiple information users (IUs) and an information-untrusted dual-antenna active energy harvester (EH). The active EH uses one antenna… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

  3. arXiv:1802.03976  [pdf, other

    cs.LG cs.AI

    Reinforcement Learning with Wasserstein Distance Regularisation, with Applications to Multipolicy Learning

    Authors: Mohammed Amin Abdullah, Aldo Pacchiano, Moez Draief

    Abstract: We describe an application of Wasserstein distance to Reinforcement Learning. The Wasserstein distance in question is between the distribution of mappings of trajectories of a policy into some metric space, and some other fixed distribution (which may, for example, come from another policy). Different policies induce different distributions, so given an underlying metric, the Wasserstein distance… ▽ More

    Submitted 30 July, 2019; v1 submitted 12 February, 2018; originally announced February 2018.

  4. arXiv:1605.04192  [pdf, other

    cs.IT

    Robust On-line Matrix Completion on Graphs

    Authors: Symeon Chouvardas, Mohammed Amin Abdullah, Lucas Claude, Moez Draief

    Abstract: We study online robust matrix completion on graphs. At each iteration a vector with some entries missing is revealed and our goal is to reconstruct it by identifying the underlying low-dimensional subspace from which the vectors are drawn. We assume there is an underlying graph structure to the data, that is, the components of each vector correspond to nodes of a certain (known) graph, and their v… ▽ More

    Submitted 13 May, 2016; originally announced May 2016.

  5. arXiv:1209.5025  [pdf, ps, other

    cs.DC math.PR

    Global Majority Consensus by Local Majority Polling on Graphs of a Given Degree Sequence

    Authors: Mohammed Amin Abdullah, Moez Draief

    Abstract: Suppose in a graph $G$ vertices can be either red or blue. Let $k$ be odd. At each time step, each vertex $v$ in $G$ polls $k$ random neighbours and takes the majority colour. If it doesn't have $k$ neighbours, it simply polls all of them, or all less one if the degree of $v$ is even. We study this protocol on graphs of a given degree sequence, in the following setting: initially each vertex of… ▽ More

    Submitted 30 July, 2019; v1 submitted 22 September, 2012; originally announced September 2012.

    Comments: Discrete Applied Mathematics 180:1-10 2015

  6. arXiv:1206.1518  [pdf

    cs.CV

    Off-Line Arabic Handwriting Character Recognition Using Word Segmentation

    Authors: Manal A. Abdullah, Lulwah M. Al-Harigy, Hanadi H. Al-Fraidi

    Abstract: The ultimate aim of handwriting recognition is to make computers able to read and/or authenticate human written texts, with a performance comparable to or even better than that of humans. Reading means that the computer is given a piece of handwriting and it provides the electronic transcription of that (e.g. in ASCII format). Two types of handwriting: on-line and offline. The most important purpo… ▽ More

    Submitted 7 June, 2012; originally announced June 2012.

    Comments: 5 pages; Journal of Computing, Volume 4, Issue 3, March 2012, ISSN 2151-9617