-
Grasp the Graph (GtG) 2.0: Ensemble of GNNs for High-Precision Grasp Pose Detection in Clutter
Authors:
Ali Rashidi Moghadam,
Sayedmohammadreza Rastegari,
Mehdi Tale Masouleh,
Ahmad Kalhor
Abstract:
Grasp pose detection in cluttered, real-world environments remains a significant challenge due to noisy and incomplete sensory data combined with complex object geometries. This paper introduces Grasp the Graph 2.0 (GtG 2.0) method, a lightweight yet highly effective hypothesis-and-test robotics grasping framework which leverages an ensemble of Graph Neural Networks for efficient geometric reasoni…
▽ More
Grasp pose detection in cluttered, real-world environments remains a significant challenge due to noisy and incomplete sensory data combined with complex object geometries. This paper introduces Grasp the Graph 2.0 (GtG 2.0) method, a lightweight yet highly effective hypothesis-and-test robotics grasping framework which leverages an ensemble of Graph Neural Networks for efficient geometric reasoning from point cloud data. Building on the success of GtG 1.0, which demonstrated the potential of Graph Neural Networks for grasp detection but was limited by assumptions of complete, noise-free point clouds and 4-Dof grasping, GtG 2.0 employs a conventional Grasp Pose Generator to efficiently produce 7-Dof grasp candidates. Candidates are assessed with an ensemble Graph Neural Network model which includes points within the gripper jaws (inside points) and surrounding contextual points (outside points). This improved representation boosts grasp detection performance over previous methods using the same generator. GtG 2.0 shows up to a 35% improvement in Average Precision on the GraspNet-1Billion benchmark compared to hypothesis-and-test and Graph Neural Network-based methods, ranking it among the top three frameworks. Experiments with a 3-Dof Delta Parallel robot and Kinect-v1 camera show a success rate of 91% and a clutter completion rate of 100%, demonstrating its flexibility and reliability.
△ Less
Submitted 5 May, 2025;
originally announced May 2025.
-
Credit Card Fraud Detection Using Asexual Reproduction Optimization
Authors:
Anahita Farhang Ghahfarokhi,
Taha Mansouri,
Mohammad Reza Sadeghi Moghadam,
Nila Bahrambeik,
Ramin Yavari,
Mohammadreza Fani Sani
Abstract:
As the number of credit card users has increased, detecting fraud in this domain has become a vital issue. Previous literature has applied various supervised and unsupervised machine learning methods to find an effective fraud detection system. However, some of these methods require an enormous amount of time to achieve reasonable accuracy. In this paper, an Asexual Reproduction Optimization (ARO)…
▽ More
As the number of credit card users has increased, detecting fraud in this domain has become a vital issue. Previous literature has applied various supervised and unsupervised machine learning methods to find an effective fraud detection system. However, some of these methods require an enormous amount of time to achieve reasonable accuracy. In this paper, an Asexual Reproduction Optimization (ARO) approach was employed, which is a supervised method to detect credit card fraud. ARO refers to a kind of production in which one parent produces some offspring. By applying this method and sampling just from the majority class, the effectiveness of the classification is increased. A comparison to Artificial Immune Systems (AIS), which is one of the best methods implemented on current datasets, has shown that the proposed method is able to remarkably reduce the required training time and at the same time increase the recall that is important in fraud detection problems. The obtained results show that ARO achieves the best cost in a short time, and consequently, it can be considered a real-time fraud detection system.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
IoT Data Quality Issues and Potential Solutions: A Literature Review
Authors:
Taha Mansouri,
Mohammad Reza Sadeghi Moghadam,
Fatemeh Monshizadeh,
Ahad Zareravasan
Abstract:
The Internet of Things (IoT) is a paradigm that connects everyday items to the Internet. In the recent decade, the IoT's spreading popularity is a promising opportunity for people and industries. IoT utilizes in a wide range of respects such as agriculture, healthcare, smart cities, and manufacturing sectors. IoT data quality is crucial in IoT real-life applications. IoT data quality dimensions an…
▽ More
The Internet of Things (IoT) is a paradigm that connects everyday items to the Internet. In the recent decade, the IoT's spreading popularity is a promising opportunity for people and industries. IoT utilizes in a wide range of respects such as agriculture, healthcare, smart cities, and manufacturing sectors. IoT data quality is crucial in IoT real-life applications. IoT data quality dimensions and issues should be considered because we require data to make accurate and timely decisions, produce commodities, and gain insights about events, people, and the environment. It is essential to point out that we cannot reach valuable results by using poor quality data. This paper aims to develop a new category for IoT data quality. Hence, we examine existing IoT data quality dimensions and IoT data quality issues in general and specific domains and IoT data quality dimensions' categories. It is worth considering that categories in the context of IoT are not many. We developed a new category in which IoT data quality dimensions and issues are separated. Concerning this category, we can get familiar with related dimensions and issues in each category. To enhance data quality dimensions and minimize data quality issues, we suggest potential solutions using Blockchain to overcome IoT's security issues.
△ Less
Submitted 22 January, 2021;
originally announced March 2021.
-
Saliency Detection With Fully Convolutional Neural Network
Authors:
Hooman Misaghi,
Reza Askari Moghadam,
Ali Mahmoudi,
Kurosh Madani
Abstract:
Saliency detection is an important task in image processing as it can solve many problems and it usually is the first step in for other processes. Convolutional neural networks have been proved to be very effective on several image processing tasks such as classification, segmentation, semantic colorization and object manipulation. Besides, using the weights of a pretrained networks is a common pr…
▽ More
Saliency detection is an important task in image processing as it can solve many problems and it usually is the first step in for other processes. Convolutional neural networks have been proved to be very effective on several image processing tasks such as classification, segmentation, semantic colorization and object manipulation. Besides, using the weights of a pretrained networks is a common practice for enhancing the accuracy of a network. In this paper a fully convolutional neural network which uses a part of VGG-16 is proposed for saliency detection in images.
△ Less
Submitted 24 June, 2019;
originally announced June 2019.
-
CAMIRADA: Cancer microRNA association discovery algorithm, a case study on breast cancer
Authors:
Sepideh Shamsizadeh,
Sama Goliaei,
Zahra Razaghi Moghadam
Abstract:
In recent studies, non-coding protein RNAs have been identified as microRNA that can be used as biomarkers for early diagnosis and treatment of cancer, that decrease mortality in cancer. A microRNA may target hundreds or thousands of genes and a gene may regulate several microRNAs, so determining which microRNA is associated with which cancer is a big challenge. Many computational methods have bee…
▽ More
In recent studies, non-coding protein RNAs have been identified as microRNA that can be used as biomarkers for early diagnosis and treatment of cancer, that decrease mortality in cancer. A microRNA may target hundreds or thousands of genes and a gene may regulate several microRNAs, so determining which microRNA is associated with which cancer is a big challenge. Many computational methods have been performed to detect micoRNAs association with cancer, but more effort is needed with higher accuracy. Increasing research has shown that relationship between microRNAs and TFs play a significant role in the diagnosis of cancer. Therefore, we developed a new computational framework (CAMIRADA) to identify cancer-related microRNAs based on the relationship between microRNAs and disease genes (DG) in the protein network, the functional relationships between microRNAs and Transcription Factors (TF) on the co-expression network, and the relationship between microRNAs and the Differential Expression Gene (DEG) on co-expression network. The CAMIRADA was applied to assess breast cancer data from two HMDD and miR2Disease databases. In this study, the AUC for the 65 microRNAs of the top of the list was 0.95, which was more accurate than the similar methods used to detect microRNAs associated with the cancer artery.
△ Less
Submitted 27 February, 2019;
originally announced March 2019.
-
Resilient Synchronization of Distributed Multi-agent Systems under Attacks
Authors:
Aquib Mustafa,
Rohollah Moghadam,
Hamidreza Modares
Abstract:
In this paper, we first address adverse effects of cyber-physical attacks on distributed synchronization of multi-agent systems, by providing conditions under which an attacker can destabilize the underlying network, as well as another set of conditions under which local neighborhood tracking errors of intact agents converge to zero. Based on this analysis, we propose a Kullback-Liebler divergence…
▽ More
In this paper, we first address adverse effects of cyber-physical attacks on distributed synchronization of multi-agent systems, by providing conditions under which an attacker can destabilize the underlying network, as well as another set of conditions under which local neighborhood tracking errors of intact agents converge to zero. Based on this analysis, we propose a Kullback-Liebler divergence based criterion in view of which each agent detects its neighbors' misbehavior and, consequently, forms a self-belief about the trustworthiness of the information it receives. Agents continuously update their self-beliefs and communicate them with their neighbors to inform them of the significance of their outgoing information. Moreover, if the self-belief of an agent is low, it forms trust on its neighbors. Agents incorporate their neighbors' self-beliefs and their own trust values on their control protocols to slow down and mitigate attacks. We show that using the proposed resilient approach, an agent discards the information it receives from a neighbor only if its neighbor is compromised, and not solely based on the discrepancy among neighbors' information, which might be caused by legitimate changes, and not attacks. The proposed approach is guaranteed to work under mild connectivity assumptions.
△ Less
Submitted 8 May, 2019; v1 submitted 8 July, 2018;
originally announced July 2018.
-
Attack Analysis for Distributed Control Systems: An Internal Model Principle Approach
Authors:
Rohollah Moghadam,
Hamidreza Modares
Abstract:
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is no system-theoretic comprehension of how a compromised agent can leverage communication capabilities to maximize the damage in distributed multi-agent systems. A rigorous analysis of cyber-physical attacks enables us to increase the system awareness against attacks and design more resilient control…
▽ More
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is no system-theoretic comprehension of how a compromised agent can leverage communication capabilities to maximize the damage in distributed multi-agent systems. A rigorous analysis of cyber-physical attacks enables us to increase the system awareness against attacks and design more resilient control protocols. To this end, we will take the role of the attacker to identify the worst effects of attacks on root nodes and non-root nodes in a distributed control system. More specifically, we show that a stealthy attack on root nodes can mislead the entire network to a wrong understanding of the situation and even destabilize the synchronization process. This will be called the internal model principle for the attacker and will intensify the urgency of designing novel control protocols to mitigate these types of attacks.
△ Less
Submitted 10 October, 2017;
originally announced October 2017.
-
Resilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments
Authors:
Rohollah Moghadam,
Hamidreza Modares
Abstract:
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or mission in response to environmental changes. A resilient learning-based control protocol is presented to find optimal solutions to the synchronization…
▽ More
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or mission in response to environmental changes. A resilient learning-based control protocol is presented to find optimal solutions to the synchronization problem in the presence of attacks and system dynamic uncertainties. An observer-based distributed H_infinity controller is first designed to prevent propagating the effects of attacks on sensors and actuators throughout the network, as well as to attenuate the effect of these attacks on the compromised agent itself. Non-homogeneous game algebraic Riccati equations are derived to solve the H_infinity optimal synchronization problem and off-policy reinforcement learning is utilized to learn their solution without requiring any knowledge of the agent's dynamics. A trust-confidence based distributed control protocol is then proposed to mitigate attacks that hijack the entire node and attacks on communication links. A confidence value is defined for each agent based solely on its local evidence. The proposed resilient reinforcement learning algorithm employs the confidence value of each agent to indicate the trustworthiness of its own information and broadcast it to its neighbors to put weights on the data they receive from it during and after learning. If the confidence value of an agent is low, it employs a trust mechanism to identify compromised agents and remove the data it receives from them from the learning process. Simulation results are provided to show the effectiveness of the proposed approach.
△ Less
Submitted 8 April, 2018; v1 submitted 31 August, 2017;
originally announced August 2017.
-
Waveform Optimization for Radio-Frequency Wireless Power Transfer
Authors:
Mohammad R. Vedady Moghadam,
Yong Zeng,
Rui Zhang
Abstract:
In this paper, we study the waveform design problem for a single-input single-output (SISO) radio-frequency (RF) wireless power transfer (WPT) system in frequency-selective channels. First, based on the actual non-linear current-voltage model of the diode at the energy receiver, we derive a semi-closed-form expression for the deliverable DC voltage in terms of the incident RF signal and hence obta…
▽ More
In this paper, we study the waveform design problem for a single-input single-output (SISO) radio-frequency (RF) wireless power transfer (WPT) system in frequency-selective channels. First, based on the actual non-linear current-voltage model of the diode at the energy receiver, we derive a semi-closed-form expression for the deliverable DC voltage in terms of the incident RF signal and hence obtain the average harvested power. Next, by adopting a multisine waveform structure for the transmit signal of the energy transmitter, we jointly design the multisine signal amplitudes and phases overall frequency tones according to the channel state information (CSI) to maximize the deliverable DC voltage or harvested power. Although our formulated problem is non-convex and difficult to solve, we propose two suboptimal solutions to it, based on the frequency-domain maximal ratio transmission (MRT) principle and the sequential convex optimization (SCP) technique, respectively. Using various simulations, the performance gain of our solutions over the existing waveform designs is shown.
△ Less
Submitted 26 March, 2017; v1 submitted 11 March, 2017;
originally announced March 2017.
-
Magnetic MIMO Signal Processing and Optimization for Wireless Power Transfer
Authors:
Gang Yang,
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
In magnetic resonant coupling (MRC) enabled multiple-input multiple-output (MIMO) wireless power transfer (WPT) systems, multiple transmitters (TXs) each with one single coil are used to enhance the efficiency of simultaneous power transfer to multiple single-coil receivers (RXs) by constructively combining their induced magnetic fields at the RXs, a technique termed "magnetic beamforming". In thi…
▽ More
In magnetic resonant coupling (MRC) enabled multiple-input multiple-output (MIMO) wireless power transfer (WPT) systems, multiple transmitters (TXs) each with one single coil are used to enhance the efficiency of simultaneous power transfer to multiple single-coil receivers (RXs) by constructively combining their induced magnetic fields at the RXs, a technique termed "magnetic beamforming". In this paper, we study the optimal magnetic beamforming design in a multi-user MIMO MRC-WPT system. We introduce the multi-user power region that constitutes all the achievable power tuples for all RXs, subject to the given total power constraint over all TXs as well as their individual peak voltage and current constraints. We characterize each boundary point of the power region by maximizing the sum-power deliverable to all RXs subject to their minimum harvested power constraints. For the special case without the TX peak voltage and current constraints, we derive the optimal TX current allocation for the single-RX setup in closed-form as well as that for the multi-RX setup. In general, the problem is a non-convex quadratically constrained quadratic programming (QCQP), which is difficult to solve. For the case of one single RX, we show that the semidefinite relaxation (SDR) of the problem is tight. For the general case with multiple RXs, based on SDR we obtain two approximate solutions by applying time-sharing and randomization, respectively. Moreover, for practical implementation of magnetic beamforming, we propose a novel signal processing method to estimate the magnetic MIMO channel due to the mutual inductances between TXs and RXs. Numerical results show that our proposed magnetic channel estimation and adaptive beamforming schemes are practically effective, and can significantly improve the power transfer efficiency and multi-user performance trade-off in MIMO MRC-WPT systems.
△ Less
Submitted 17 February, 2017;
originally announced February 2017.
-
Magnetic Beamforming for Wireless Power Transfer
Authors:
Gang Yang,
Mohammad R. Vedady Moghadam,
Rui Zhang
Abstract:
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). The use of multiple transmitters (TXs) each with one coil can be applied to enhance the WPT performance by focusing the magnetic fields from all TX coils in a beam toward the receiver (RX) coil, termed as "magnetic beamforming". In this paper, we study the optimal magnetic beamformin…
▽ More
Magnetic resonant coupling (MRC) is an efficient method for realizing the near-field wireless power transfer (WPT). The use of multiple transmitters (TXs) each with one coil can be applied to enhance the WPT performance by focusing the magnetic fields from all TX coils in a beam toward the receiver (RX) coil, termed as "magnetic beamforming". In this paper, we study the optimal magnetic beamforming for an MRC-WPT system with multiple TXs and a single RX. We formulate an optimization problem to jointly design the currents flowing through different TXs so as to minimize the total power drawn from their voltage sources, subject to the minimum power required by the RX load as well as the TXs' constraints on the peak voltage and current. For the special case of identical TX resistances and neglecting all TXs' constraints on the peak voltage and current, we show that the optimal current magnitude of each TX is proportional to the mutual inductance between its TX coil and the RX coil. In general, the problem is a non-convex quadratically constrained quadratic programming (QCQP) problem, which is reformulated as a semidefinite programming (SDP) problem. We show that its semidefinite relaxation (SDR) is tight. Numerical results show that magnetic beamforming significantly enhances the deliverable power as well as the WPT efficiency over the uncoordinated benchmark scheme of equal current allocation.
△ Less
Submitted 23 September, 2015; v1 submitted 22 September, 2015;
originally announced September 2015.
-
Multiple ant-bee colony optimization for load balancing in packet-switched networks
Authors:
Mehdi Kashefikia,
Nasser Nematbakhsh,
Reza Askari Moghadam
Abstract:
One of the important issues in computer networks is "Load Balancing" which leads to efficient use of the network resources. To achieve a balanced network it is necessary to find different routes between the source and destination. In the current paper we propose a new approach to find different routes using swarm intelligence techniques and multi colony algorithms. In the proposed algorithm that i…
▽ More
One of the important issues in computer networks is "Load Balancing" which leads to efficient use of the network resources. To achieve a balanced network it is necessary to find different routes between the source and destination. In the current paper we propose a new approach to find different routes using swarm intelligence techniques and multi colony algorithms. In the proposed algorithm that is an improved version of MACO algorithm, we use different colonies of ants and bees and appoint these colony members as intelligent agents to monitor the network and update the routing information. The survey includes comparison and critiques of MACO. The simulation results show a tangible improvement in the aforementioned approach.
△ Less
Submitted 26 October, 2011; v1 submitted 11 October, 2011;
originally announced October 2011.