Skip to main content

Showing 1–50 of 52 results for author: Aly, S A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.00189  [pdf, other

    eess.IV cs.CV cs.LG

    Detecting Glioma, Meningioma, and Pituitary Tumors, and Normal Brain Tissues based on Yolov11 and Yolov8 Deep Learning Models

    Authors: Ahmed M. Taha, Salah A. Aly, Mohamed F. Darwish

    Abstract: Accurate and quick diagnosis of normal brain tissue Glioma, Meningioma, and Pituitary Tumors is crucial for optimal treatment planning and improved medical results. Magnetic Resonance Imaging (MRI) is widely used as a non-invasive diagnostic tool for detecting brain abnormalities, including tumors. However, manual interpretation of MRI scans is often time-consuming, prone to human error, and depen… ▽ More

    Submitted 31 March, 2025; originally announced April 2025.

    Comments: 6 pages, 7 figures, 8 tables

  2. arXiv:2502.09804  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Acute Lymphoblastic Leukemia Diagnosis Employing YOLOv11, YOLOv8, ResNet50, and Inception-ResNet-v2 Deep Learning Models

    Authors: Alaa Awad, Salah A. Aly

    Abstract: Thousands of individuals succumb annually to leukemia alone. As artificial intelligence-driven technologies continue to evolve and advance, the question of their applicability and reliability remains unresolved. This study aims to utilize image processing and deep learning methodologies to achieve state-of-the-art results for the detection of Acute Lymphoblastic Leukemia (ALL) using data that best… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 12 pages, 28 figures, 5 tables

  3. arXiv:2501.08169  [pdf, other

    cs.CV cs.AI cs.CY cs.LG

    Revolutionizing Communication with Deep Learning and XAI for Enhanced Arabic Sign Language Recognition

    Authors: Mazen Balat, Rewaa Awaad, Ahmed B. Zaky, Salah A. Aly

    Abstract: This study introduces an integrated approach to recognizing Arabic Sign Language (ArSL) using state-of-the-art deep learning models such as MobileNetV3, ResNet50, and EfficientNet-B2. These models are further enhanced by explainable AI (XAI) techniques to boost interpretability. The ArSL2018 and RGB Arabic Alphabets Sign Language (AASL) datasets are employed, with EfficientNet-B2 achieving peak ac… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

    Comments: 13 pages, 25 figures, 16 tables

  4. arXiv:2410.19821  [pdf, other

    cs.CV

    Explainable AI in Handwriting Detection for Dyslexia Using Transfer Learning

    Authors: Mahmoud Robaa, Mazen Balat, Rewaa Awaad, Esraa Omar, Salah A. Aly

    Abstract: This study introduces an explainable AI (XAI) framework for the detection of dyslexia through handwriting analysis, achieving an impressive test precision of 99.65%. The framework integrates transfer learning and transformer-based models, identifying handwriting features associated with dyslexia while ensuring transparency in decision-making via Grad-CAM visualizations. Its adaptability to differe… ▽ More

    Submitted 17 December, 2024; v1 submitted 18 October, 2024; originally announced October 2024.

    Comments: 6 pages, 5 figures, JAC-ECC Conference

  5. arXiv:2410.10701  [pdf, other

    cs.CV cs.AI cs.LG

    Early Diagnosis of Acute Lymphoblastic Leukemia Using YOLOv8 and YOLOv11 Deep Learning Models

    Authors: Alaa Awad, Salah A. Aly

    Abstract: Leukemia, a severe form of blood cancer, claims thousands of lives each year. This study focuses on the detection of Acute Lymphoblastic Leukemia (ALL) using advanced image processing and deep learning techniques. By leveraging recent advancements in artificial intelligence, the research evaluates the reliability of these methods in practical, real-world scenarios. Specifically, it examines the pe… ▽ More

    Submitted 11 January, 2025; v1 submitted 14 October, 2024; originally announced October 2024.

    Comments: 6 pages, 7 figures, 2 tables, JAC-ECC2024

  6. arXiv:2410.06974  [pdf, other

    eess.IV cs.CV cs.LG

    Diagnosis of Malignant Lymphoma Cancer Using Hybrid Optimized Techniques Based on Dense Neural Networks

    Authors: Salah A. Aly, Ali Bakhiet, Mazen Balat

    Abstract: Lymphoma diagnosis, particularly distinguishing between subtypes, is critical for effective treatment but remains challenging due to the subtle morphological differences in histopathological images. This study presents a novel hybrid deep learning framework that combines DenseNet201 for feature extraction with a Dense Neural Network (DNN) for classification, optimized using the Harris Hawks Optimi… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

    Comments: 6 pages, 5 figures, 4 tables, IEEE ICCA

  7. arXiv:2410.00681  [pdf, other

    cs.CV cs.AI cs.LG

    Advanced Arabic Alphabet Sign Language Recognition Using Transfer Learning and Transformer Models

    Authors: Mazen Balat, Rewaa Awaad, Hend Adel, Ahmed B. Zaky, Salah A. Aly

    Abstract: This paper presents an Arabic Alphabet Sign Language recognition approach, using deep learning methods in conjunction with transfer learning and transformer-based models. We study the performance of the different variants on two publicly available datasets, namely ArSL2018 and AASL. This task will make full use of state-of-the-art CNN architectures like ResNet50, MobileNetV2, and EfficientNetB7, a… ▽ More

    Submitted 1 October, 2024; originally announced October 2024.

    Comments: 6 pages, 8 figures

    Journal ref: IEEE ICCA 2024

  8. arXiv:2408.17307  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    Hybridizing Base-Line 2D-CNN Model with Cat Swarm Optimization for Enhanced Advanced Persistent Threat Detection

    Authors: Ali M. Bakhiet, Salah A. Aly

    Abstract: In the realm of cyber-security, detecting Advanced Persistent Threats (APTs) remains a formidable challenge due to their stealthy and sophisticated nature. This research paper presents an innovative approach that leverages Convolutional Neural Networks (CNNs) with a 2D baseline model, enhanced by the cutting-edge Cat Swarm Optimization (CSO) algorithm, to significantly improve APT detection accura… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

    Comments: 6 pages, 5 figures

  9. arXiv:2111.06331  [pdf, other

    cs.SD cs.AI cs.CL cs.LG eess.AS

    Towards an Efficient Voice Identification Using Wav2Vec2.0 and HuBERT Based on the Quran Reciters Dataset

    Authors: Aly Moustafa, Salah A. Aly

    Abstract: Current authentication and trusted systems depend on classical and biometric methods to recognize or authorize users. Such methods include audio speech recognitions, eye, and finger signatures. Recent tools utilize deep learning and transformers to achieve better results. In this paper, we develop a deep learning constructed model for Arabic speakers identification by using Wav2Vec2.0 and HuBERT a… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

    Comments: 5 pages, 9 figures, 2 tables

  10. arXiv:2111.01136  [pdf

    cs.CL cs.AI cs.LG cs.NI

    ASMDD: Arabic Speech Mispronunciation Detection Dataset

    Authors: Salah A. Aly, Abdelrahman Salah, Hesham M. Eraqi

    Abstract: The largest dataset of Arabic speech mispronunciation detections in Egyptian dialogues is introduced. The dataset is composed of annotated audio files representing the top 100 words that are most frequently used in the Arabic language, pronounced by 100 Egyptian children (aged between 2 and 8 years old). The dataset is collected and annotated on segmental pronunciation error detections by expert l… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 3 pages, 2 tables, 2 figures, dataset link: https://drive.google.com/drive/folders/1dhlp-L0n6_RAzoosVK4bRa7hxBnzebqs

  11. arXiv:2110.04425  [pdf, other

    cs.CV cs.AI cs.LG

    Arabic Speech Emotion Recognition Employing Wav2vec2.0 and HuBERT Based on BAVED Dataset

    Authors: Omar Mohamed, Salah A. Aly

    Abstract: Recently, there have been tremendous research outcomes in the fields of speech recognition and natural language processing. This is due to the well-developed multi-layers deep learning paradigms such as wav2vec2.0, Wav2vecU, WavBERT, and HuBERT that provide better representation learning and high information capturing. Such paradigms run on hundreds of unlabeled data, then fine-tuned on a small da… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: 6 pages, 6 figures

  12. arXiv:1508.04921  [pdf, ps, other

    cs.IT

    Robust Node Estimation and Topology Discovery Algorithm in Large-Scale Wireless Sensor Networks

    Authors: Ahmed Douik, Salah A. Aly, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini

    Abstract: This paper introduces a novel algorithm for cardinality, i.e., the number of nodes, estimation in large scale anonymous graphs using statistical inference methods. Applications of this work include estimating the number of sensor devices, online social users, active protein cells, etc. In anonymous graphs, each node possesses little or non-existing information on the network topology. In particula… ▽ More

    Submitted 20 August, 2015; originally announced August 2015.

  13. arXiv:1209.3433  [pdf, ps, other

    cs.CV cs.CY cs.LG

    A Hajj And Umrah Location Classification System For Video Crowded Scenes

    Authors: Hossam M. Zawbaa, Salah A. Aly, Adnan A. Gutub

    Abstract: In this paper, a new automatic system for classifying ritual locations in diverse Hajj and Umrah video scenes is investigated. This challenging subject has mostly been ignored in the past due to several problems one of which is the lack of realistic annotated video datasets. HUER Dataset is defined to model six different Hajj and Umrah ritual locations[26]. The proposed Hajj and Umrah ritual loc… ▽ More

    Submitted 15 September, 2012; originally announced September 2012.

    Comments: 9 pages, 10 figures, 2 tables, 3 algirthms

  14. arXiv:1208.5365  [pdf, ps, other

    cs.CV cs.CY

    A Missing and Found Recognition System for Hajj and Umrah

    Authors: Salah A. Aly

    Abstract: This note describes an integrated recognition system for identifying missing and found objects as well as missing, dead, and found people during Hajj and Umrah seasons in the two Holy cities of Makkah and Madina in the Kingdom of Saudi Arabia. It is assumed that the total estimated number of pilgrims will reach 20 millions during the next decade. The ultimate goal of this system is to integrate fa… ▽ More

    Submitted 27 August, 2012; originally announced August 2012.

    Comments: website available via http://www.mfhajj.com

  15. arXiv:1205.4463  [pdf, ps, other

    cs.CV cs.CY

    Pilgrims Face Recognition Dataset -- HUFRD

    Authors: Salah A. Aly

    Abstract: In this work, we define a new pilgrims face recognition dataset, called HUFRD dataset. The new developed dataset presents various pilgrims' images taken from outside the Holy Masjid El-Harram in Makkah during the 2011-2012 Hajj and Umrah seasons. Such dataset will be used to test our developed facial recognition and detection algorithms, as well as assess in the missing and found recognition syste… ▽ More

    Submitted 29 December, 2012; v1 submitted 20 May, 2012; originally announced May 2012.

    Comments: 5 pages, 13 images, 1 table of a new HUFRD work

  16. arXiv:1205.2345  [pdf, ps, other

    cs.CV cs.CY

    Hajj and Umrah Event Recognition Datasets

    Authors: Hossam Zawbaa, Salah A. Aly

    Abstract: In this note, new Hajj and Umrah Event Recognition datasets (HUER) are presented. The demonstrated datasets are based on videos and images taken during 2011-2012 Hajj and Umrah seasons. HUER is the first collection of datasets covering the six types of Hajj and Umrah ritual events (rotating in Tawaf around Kabaa, performing Sa'y between Safa and Marwa, standing on the mount of Arafat, staying over… ▽ More

    Submitted 10 May, 2012; originally announced May 2012.

    Comments: 4 pages, 18 figures with 33 images

  17. arXiv:1205.2077  [pdf, ps, other

    cs.NI cs.DS cs.IT

    Data Dissemination And Collection Algorithms For Collaborative Sensor Networks Using Dynamic Cluster Heads

    Authors: Salah A. Aly, Mohamed Salim

    Abstract: We develop novel data dissemination and collection algorithms for Wireless Sensor Networks (WSNs) in which we consider $n$ sensor nodes distributed randomly in a certain field to measure a physical phenomena. Such sensors have limited energy, shortage coverage range, bandwidth and memory constraints. We desire to disseminate nodes' data throughout the network such that a base station will be able… ▽ More

    Submitted 9 May, 2012; originally announced May 2012.

    Comments: 6 pages, 5 figures

  18. arXiv:1202.2449  [pdf, ps, other

    cs.CV cs.NI

    Efficient Web-based Facial Recognition System Employing 2DHOG

    Authors: Moataz M. Abdelwahab, Salah A. Aly, Islam Yousry

    Abstract: In this paper, a system for facial recognition to identify missing and found people in Hajj and Umrah is described as a web portal. Explicitly, we present a novel algorithm for recognition and classifications of facial images based on applying 2DPCA to a 2D representation of the Histogram of oriented gradients (2D-HOG) which maintains the spatial relation between pixels of the input images. This a… ▽ More

    Submitted 11 February, 2012; originally announced February 2012.

  19. arXiv:1201.0178  [pdf, ps, other

    cs.NI cs.IT

    Distributed Data Collection and Storage Algorithms for Collaborative Learning Vision Sensor Devices with Applications to Pilgrimage

    Authors: Salah A. Aly

    Abstract: This work presents novel distributed data collection systems and storage algorithms for collaborative learning wireless sensor networks (WSNs). In a large WSN, consider $n$ collaborative sensor devices distributed randomly to acquire information and learn about a certain field. Such sensors have less power, small bandwidth, and short memory, and they might disappear from the network after certain… ▽ More

    Submitted 30 December, 2011; originally announced January 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:0908.4419

  20. arXiv:1012.5997  [pdf, ps, other

    cs.IT cs.CR cs.NI

    Protection Over Asymmetric Channels, S-MATE: Secure Multipath Adaptive Traffic Engineering

    Authors: Salah A. Aly, Nirwan Ansari, H. Vincent Poor, Anwar I. Walid

    Abstract: Several approaches have been proposed to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services between two core (relay) network nodes, an ingress node and an egress node. MATE (Multipath Adaptive Traffic Engineering) has been proposed for… ▽ More

    Submitted 29 December, 2010; originally announced December 2010.

    Comments: 4 figures, 9 pages, journal paper of S-MATE

  21. arXiv:1012.5174  [pdf, ps, other

    cs.NI cs.CR cs.IT

    SNEED: Enhancing Network Security Services Using Network Coding and Joint Capacity

    Authors: Salah A. Aly, Nirwan Ansari, H. Vincent Poor

    Abstract: Traditional network security protocols depend mainly on developing cryptographic schemes and on using biometric methods. These have led to several network security protocols that are unbreakable based on difficulty of solving untractable mathematical problems such as factoring large integers. In this paper, Security of Networks Employing Encoding and Decoding (SNEED) is developed to mitigate sin… ▽ More

    Submitted 23 December, 2010; originally announced December 2010.

  22. arXiv:1011.2795  [pdf, ps, other

    cs.NI cs.IT

    A Distributed Data Collection Algorithm for Wireless Sensor Networks with Persistent Storage Nodes

    Authors: Salah A. Aly, Ahmed Ali-Eldin, H. Vincent Poor

    Abstract: A distributed data collection algorithm to accurately store and forward information obtained by wireless sensor networks is proposed. The proposed algorithm does not depend on the sensor network topology, routing tables, or geographic locations of sensor nodes, but rather makes use of uniformly distributed storage nodes. Analytical and simulation results for this algorithm show that, with high pro… ▽ More

    Submitted 11 November, 2010; originally announced November 2010.

  23. arXiv:1010.4858  [pdf, ps, other

    cs.NI cs.CR cs.IT

    S-MATE: Secure Coding-based Multipath Adaptive Traffic Engineering

    Authors: Salah A. Aly, Nirwan Ansari, Anwar I. Walid, H. Vincent Poor

    Abstract: There have been several approaches to provisioning traffic between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase network capacity, and enhance network security services. MATE (Multipath Adaptive Traffic Engineering) protocol has been proposed for multipath adaptive traffic engineering between an ingress node (source) and an… ▽ More

    Submitted 23 October, 2010; originally announced October 2010.

  24. arXiv:1008.4264  [pdf, ps, other

    cs.IT cs.NI

    Network Protection Design Using Network Coding

    Authors: Salah A. Aly, Ahmed E. Kamal, Anwar I. Walid

    Abstract: Link and node failures are two common fundamental problems that affect operational networks. Protection of communication networks against such failures is essential for maintaining network reliability and performance. Network protection codes (NPC) are proposed to protect operational networks against link and node failures. Furthermore, encoding and decoding operations of such codes are well devel… ▽ More

    Submitted 25 August, 2010; originally announced August 2010.

    Comments: ITW2010

  25. arXiv:1002.2966  [pdf, ps, other

    cs.IT

    Nonbinary Quantum Cyclic and Subsystem Codes Over Asymmetrically-decohered Quantum Channels

    Authors: Salah A. Aly, Alexei Ashikhmin

    Abstract: Quantum computers theoretically are able to solve certain problems more quickly than any deterministic or probabilistic computers. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, one has to mitigate the resulting noise and decoherence effects to avoid computational errors in order to successfully build quantum computers. In this paper, we construct… ▽ More

    Submitted 15 February, 2010; originally announced February 2010.

  26. arXiv:0908.4419  [pdf, ps, other

    cs.IT cs.NI

    Distributed Flooding-based Storage Algorithms for Large-scale Sensor Networks

    Authors: Salah A. Aly, Hager S. Darwish, Moustafa Youssef, Mahmoud Zidan

    Abstract: In this paper we propose distributed flooding-based storage algorithms for large-scale wireless sensor networks. Assume a wireless sensor network with $n$ nodes that have limited power, memory, and bandwidth. Each node is capable of both sensing and storing data. Such sensor nodes might disappear from the network due to failures or battery depletion. Hence it is desired to design efficient schem… ▽ More

    Submitted 30 August, 2009; originally announced August 2009.

  27. arXiv:0906.5339  [pdf, ps, other

    cs.IT cs.MS quant-ph

    Asymmetric Quantum Cyclic Codes

    Authors: Salah A. Aly

    Abstract: It is recently conjectured in quantum information processing that phase-shift errors occur with high probability than qubit-flip errors, hence the former is more disturbing to quantum information than the later one. This leads us to construct asymmetric quantum error controlling codes to protect quantum information over asymmetric channels, $\Pr Z \geq \Pr X$. In this paper we present two generi… ▽ More

    Submitted 29 November, 2009; v1 submitted 29 June, 2009; originally announced June 2009.

  28. arXiv:0905.1778  [pdf, ps, other

    cs.IT cs.CR cs.NI

    Encoding of Network Protection Codes Against Link and Node Failures Over Finite Fields

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: Link and node failures are common two fundamental problems that affect operational networks. Hence, protection of communication networks is essential to increase their reliability, performance, and operations. Much research work has been done to protect against link and node failures, and to provide reliable solutions based on pre-defined provision or dynamic restoration of the domain. In this p… ▽ More

    Submitted 12 May, 2009; originally announced May 2009.

  29. arXiv:0904.4057  [pdf, ps, other

    cs.IT cs.DS cs.NI

    Decentralized Coding Algorithms for Distributed Storage in Wireless Sensor Networks

    Authors: Zhenning Kong, Salah A. Aly, Emina Soljanin

    Abstract: We consider large-scale wireless sensor networks with $n$ nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the n nod… ▽ More

    Submitted 27 October, 2009; v1 submitted 26 April, 2009; originally announced April 2009.

    Comments: Accepted for publication in IEEE JSAC, 2010

  30. arXiv:0903.0445  [pdf, ps, other

    cs.IT cs.DS cs.NI

    Raptor Codes Based Distributed Storage Algorithms for Wireless Sensor Networks

    Authors: Salah A. Aly, Zhenning Kong, Emina Soljanin

    Abstract: We consider a distributed storage problem in a large-scale wireless sensor network with $n$ nodes among which $k$ acquire (sense) independent data. The goal is to disseminate the acquired information throughout the network so that each of the $n$ sensors stores one possibly coded packet and the original $k$ data packets can be recovered later in a computationally simple way from any $(1+ε)k$ of… ▽ More

    Submitted 3 March, 2009; originally announced March 2009.

    Comments: published in IEEE ISIT 2008

  31. arXiv:0902.1278  [pdf, ps, other

    cs.IT cs.DS cs.NI

    Fountain Codes Based Distributed Storage Algorithms for Large-scale Wireless Sensor Networks

    Authors: Salah A. Aly, Zhenning Kong, Emina Soljanin

    Abstract: We consider large-scale sensor networks with n nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the n nodes stores o… ▽ More

    Submitted 8 February, 2009; originally announced February 2009.

    Comments: A method to estimate the total number of nodes in a graph is presented in this 12 pages

    Journal ref: Proc. IEEE/ACM IPSN 2008, pp 171-182

  32. arXiv:0901.4591  [pdf, ps, other

    cs.IT cs.CR cs.NI

    Network Coding-Based Protection Strategy Against Node Failures

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: The enormous increase in the usage of communication networks has made protection against node and link failures essential in the deployment of reliable networks. To prevent loss of data due to node failures, a network protection strategy is proposed that aims to withstand such failures. Particularly, a protection strategy against any single node failure is designed for a given network with a set… ▽ More

    Submitted 29 January, 2009; originally announced January 2009.

    Comments: 5 pages, 2 figures, accepted in ICC'09

  33. arXiv:0812.5104  [pdf, ps, other

    cs.IT quant-ph

    On Quantum and Classical Error Control Codes: Constructions and Applications

    Authors: Salah A. Aly

    Abstract: It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, it is a formidable task to build a quantum computer, since the quantum mechanical systems storing the information unavoidably interact with their environment. Theref… ▽ More

    Submitted 30 December, 2008; originally announced December 2008.

    Comments: Parts of PhD dissertation, Texas A&M University

  34. arXiv:0812.0972  [pdf, ps, other

    cs.NI cs.IT

    Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must be done with the least amount of protection resources, while using simple management plane functionality. Recently, network coding has been proposed as a solution to provide agile and cost efficient network self-healing… ▽ More

    Submitted 16 December, 2008; v1 submitted 4 December, 2008; originally announced December 2008.

    Comments: 12 pages, 2 figures, and 3 tables

  35. arXiv:0811.1693  [pdf, ps, other

    cs.IT cs.NI

    Protection Schemes for Two Link Failures in Optical Networks

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: In this paper we develop network protection schemes against two link failures in optical networks. The motivation behind this work is the fact that the majority of all available links in an optical network suffer from single and double link failures. In the proposed network protection schemes, NPS2-I and NPS2-II, we deploy network coding and reduced capacity on the working paths to provide backu… ▽ More

    Submitted 11 November, 2008; originally announced November 2008.

    Comments: 2 figures, 5 pages, private comments are welcome

    Journal ref: Proc. of ICCTA, 2008

  36. arXiv:0811.1570  [pdf, ps, other

    quant-ph cs.IT

    Constructions of Subsystem Codes over Finite Fields

    Authors: Salah A. Aly, Andreas Klappenecker

    Abstract: Subsystem codes protect quantum information by encoding it in a tensor factor of a subspace of the physical state space. Subsystem codes generalize all major quantum error protection schemes, and therefore are especially versatile. This paper introduces numerous constructions of subsystem codes. It is shown how one can derive subsystem codes from classical cyclic codes. Methods to trade the dime… ▽ More

    Submitted 10 November, 2008; originally announced November 2008.

  37. Network Coding-based Protection Strategies Against a Single Link Failure in Optical Networks

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: In this paper we develop network protection strategies against a single link failure in optical networks. The motivation behind this work is the fact that $%70$ of all available links in an optical network suffers from a single link failure. In the proposed protection strategies, denoted NPS-I and NPS-II, we deploy network coding and reduced capacity on the working paths to provide a backup prot… ▽ More

    Submitted 22 October, 2008; originally announced October 2008.

    Comments: 6 pages, 3 figures, ICCES '08

    Journal ref: Proc. of IEEE ICCES '08, Cairo, EG, 2008

  38. Network Protection Codes Against Link Failures Using Network Coding

    Authors: Salah A. Aly, Ahmed E. Kamal

    Abstract: Protecting against link failures in communication networks is essential to increase robustness, accessibility, and reliability of data transmission. Recently, network coding has been proposed as a solution to provide agile and cost efficient network protection against link failures, which does not require data rerouting, or packet retransmission. To achieve this, separate paths have to be provis… ▽ More

    Submitted 21 December, 2008; v1 submitted 7 September, 2008; originally announced September 2008.

    Journal ref: Proc. of IEEE Globecom 08, New Orleans, LA, 2008

  39. arXiv:0804.4284  [pdf, ps, other

    cs.IT cs.NI

    Network Coding Capacity of Random Wireless Networks under a SINR Model

    Authors: Zhenning Kong, Salah A. Aly, Emina Soljanin, Edmund M. Yeh, Andreas Klappenecker

    Abstract: Previous work on network coding capacity for random wired and wireless networks have focused on the case where the capacities of links in the network are independent. In this paper, we consider a more realistic model, where wireless networks are modelled by random geometric graphs with interference and noise. In this model, the capacities of links are not independent. By employing coupling and m… ▽ More

    Submitted 27 April, 2008; originally announced April 2008.

  40. Secure Hop-by-Hop Aggregation of End-to-End Concealed Data in Wireless Sensor Networks

    Authors: Esam Mlaih, Salah A. Aly

    Abstract: In-network data aggregation is an essential technique in mission critical wireless sensor networks (WSNs) for achieving effective transmission and hence better power conservation. Common security protocols for aggregated WSNs are either hop-by-hop or end-to-end, each of which has its own encryption schemes considering different security primitives. End-to-end encrypted data aggregation protocols… ▽ More

    Submitted 25 March, 2008; originally announced March 2008.

    Journal ref: Proc. 2nd IEEE MCN'08 workshop in conj. with Infocom'08, Phoenix, AZ, 2008

  41. arXiv:0803.0764  [pdf, ps, other

    quant-ph cs.IT

    Asymmetric and Symmetric Subsystem BCH Codes and Beyond

    Authors: Salah A. Aly

    Abstract: Recently, the theory of quantum error control codes has been extended to subsystem codes over symmetric and asymmetric quantum channels -- qubit-flip and phase-shift errors may have equal or different probabilities. Previous work in constructing quantum error control codes has focused on code constructions for symmetric quantum channels. In this paper, we develop a theory and establish the conne… ▽ More

    Submitted 6 March, 2008; originally announced March 2008.

    Comments: 10 pages, 2 figures, and 2 tables of independent work. Private comments and corrections are welcome

  42. arXiv:0802.4270  [pdf, ps, other

    quant-ph cs.IT

    Propagation Rules of Subsystem Codes

    Authors: Salah A. Aly

    Abstract: We demonstrate propagation rules of subsystem code constructions by extending, shortening and combining given subsystem codes. Given an $[[n,k,r,d]]_q$ subsystem code, we drive new subsystem codes with parameters $[[n+1,k,r,\geq d]]_q$, $[[n-1,k+1,r,\geq d-1]]_q$, $[[n,k-1,r+1,d]]_q$. The interested readers shall consult our companion papers for upper and lower bounds on subsystem codes paramete… ▽ More

    Submitted 28 February, 2008; originally announced February 2008.

    Comments: Private comments are welcome

  43. arXiv:0802.4079  [pdf, ps, other

    cs.IT

    Families of LDPC Codes Derived from Nonprimitive BCH Codes and Cyclotomic Cosets

    Authors: Salah A. Aly

    Abstract: Low-density parity check (LDPC) codes are an important class of codes with many applications. Two algebraic methods for constructing regular LDPC codes are derived -- one based on nonprimitive narrow-sense BCH codes and the other directly based on cyclotomic cosets. The constructed codes have high rates and are free of cycles of length four; consequently, they can be decoded using standard itera… ▽ More

    Submitted 27 February, 2008; originally announced February 2008.

    Comments: Private comments are welcome

  44. arXiv:0712.4321  [pdf, ps, other

    quant-ph cs.IT

    Subsystem Code Constructions

    Authors: Salah A. Aly, Andreas Klappenecker

    Abstract: Subsystem codes are the most versatile class of quantum error-correcting codes known to date that combine the best features of all known passive and active error-control schemes. The subsystem code is a subspace of the quantum state space that is decomposed into a tensor product of two vector spaces: the subsystem and the co-subsystem. A generic method to derive subsystem codes from existing sub… ▽ More

    Submitted 8 January, 2008; v1 submitted 28 December, 2007; originally announced December 2007.

    Comments: 5 pages, trading dimensions of subsystem codes, MDS subsystem codes, and propagation rules. All stabilizer codes are converted to subsystem codes. A talk given at QEC07, and submitted to IEEE ISIT 2008

    Journal ref: Proc. of IEEE ISIT 08, Toronto, CA, 2008

  45. A Class of Quantum LDPC Codes Constructed From Finite Geometries

    Authors: Salah A. Aly

    Abstract: Low-density parity check (LDPC) codes are a significant class of classical codes with many applications. Several good LDPC codes have been constructed using random, algebraic, and finite geometries approaches, with containing cycles of length at least six in their Tanner graphs. However, it is impossible to design a self-orthogonal parity check matrix of an LDPC code without introducing cycles o… ▽ More

    Submitted 11 November, 2009; v1 submitted 26 December, 2007; originally announced December 2007.

    Comments: 5pages, 2 figures

    Journal ref: Proc. of IEEE Globecom 08, New Orleans, LA 2008

  46. arXiv:0711.4603  [pdf, ps, other

    quant-ph cs.IT

    A Note on Quantum Hamming Bound

    Authors: Salah A. Aly

    Abstract: Proving the quantum Hamming bound for degenerate nonbinary stabilizer codes has been an open problem for a decade. In this note, I prove this bound for double error-correcting degenerate stabilizer codes. Also, I compute the maximum length of single and double error-correcting MDS stabilizer codes over finite fields.

    Submitted 29 November, 2007; originally announced November 2007.

  47. arXiv:0710.5340  [pdf, other

    cs.IT cs.NI

    Bounds on the Network Coding Capacity for Wireless Random Networks

    Authors: Salah A. Aly, Vishal Kapoor, Jie Meng, Andreas Klappenecker

    Abstract: Recently, it has been shown that the max flow capacity can be achieved in a multicast network using network coding. In this paper, we propose and analyze a more realistic model for wireless random networks. We prove that the capacity of network coding for this model is concentrated around the expected value of its minimum cut. Furthermore, we establish upper and lower bounds for wireless nodes u… ▽ More

    Submitted 29 October, 2007; originally announced October 2007.

    Comments: Netcoding07

  48. arXiv:0708.3070  [pdf, ps, other

    cs.IT

    Network Coding Capacity of Random Wireless Networks under a Signal-to-Interference-and-Noise Model

    Authors: Zhenning Kong, Salah A. Aly, Emina Soljanin, Edmund M. Yeh, Andreas Klappenecker

    Abstract: In this paper, we study network coding capacity for random wireless networks. Previous work on network coding capacity for wired and wireless networks have focused on the case where the capacities of links in the network are independent. In this paper, we consider a more realistic model, where wireless networks are modeled by random geometric graphs with interference and noise. In this model, th… ▽ More

    Submitted 22 August, 2007; originally announced August 2007.

  49. Quantum Convolutional BCH Codes

    Authors: Salah A. Aly, Markus Grassl, Andreas Klappenecker, Martin Roetteler, Pradeep Kiran Sarvepalli

    Abstract: Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular BCH codes. These codes have the property that they contain their Euclidean, respective… ▽ More

    Submitted 9 April, 2007; v1 submitted 13 March, 2007; originally announced March 2007.

    Comments: 4 pages, minor changes, accepted for publication at the 10th Canadian Workshop on Information Theory (CWIT'07)

    Journal ref: Proceedings 2007 Canadian Workshop on Information Theory (CWIT 2007), Edmonton, Canada, June 2007, pp. 180-183

  50. arXiv:quant-ph/0701037  [pdf, ps, other

    quant-ph cs.IT

    Quantum Convolutional Codes Derived From Reed-Solomon and Reed-Muller Codes

    Authors: Salah A. Aly, Andreas Klappenecker, Pradeep Kiran Sarvepalli

    Abstract: Convolutional stabilizer codes promise to make quantum communication more reliable with attractive online encoding and decoding algorithms. This paper introduces a new approach to convolutional stabilizer codes based on direct limit constructions. Two families of quantum convolutional codes are derived from generalized Reed-Solomon codes and from Reed- Muller codes. A Singleton bound for pure co… ▽ More

    Submitted 22 January, 2007; v1 submitted 8 January, 2007; originally announced January 2007.

    Comments: 5 pages; updated parameters of classical (whence quantum) RM convolutional codes