Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–5 of 5 results for author: Elleithy, M

.
  1. arXiv:2403.12553  [pdf, other

    cs.LG

    Pretraining Codomain Attention Neural Operators for Solving Multiphysics PDEs

    Authors: Md Ashiqur Rahman, Robert Joseph George, Mogab Elleithy, Daniel Leibovici, Zongyi Li, Boris Bonev, Colin White, Julius Berner, Raymond A. Yeh, Jean Kossaifi, Kamyar Azizzadenesheli, Anima Anandkumar

    Abstract: Existing neural operator architectures face challenges when solving multiphysics problems with coupled partial differential equations (PDEs), due to complex geometries, interactions between physical variables, and the lack of large amounts of high-resolution training data. To address these issues, we propose Codomain Attention Neural Operator (CoDA-NO), which tokenizes functions along the codomain… ▽ More

    Submitted 5 April, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  2. arXiv:1310.1129  [pdf

    cs.NI

    Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network

    Authors: Abdul Razaque, Khaled. M. Elleithy

    Abstract: The revolution of wireless sensors networks (WSNs) has highly augmented the expectations of people to get the work done efficiently, but there is little bit impediment to deal with deployed nodes in WSNs. The nature of used routing and medium access control (MAC) protocols in WSNs is completely different from wireless adhoc network protocols. Sensor nodes do not have enough capability to synchroni… ▽ More

    Submitted 3 October, 2013; originally announced October 2013.

    Journal ref: CATA-2013, March 4-6, 2013, Honolulu, Hawaii, USA

  3. arXiv:1309.4499  [pdf

    cs.CR cs.CY

    Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment

    Authors: Abdul Razaque, Khald. M. Elleithy

    Abstract: Mobile collaborative learning (MCL) is extensively recognized field all over the world. It demonstrates the cerebral approach combining the several technology to handle the problem of learning. MCL motivates the social and educational activities for creating healthier environment. To advance and promote the baseline of MCL, different frameworks have been introduced for MCL. From other side, there… ▽ More

    Submitted 17 September, 2013; originally announced September 2013.

    Comments: 13 pages, 13 figuers. arXiv admin note: substantial text overlap with arXiv:1208.2073, arXiv:1210.2030

  4. arXiv:0908.0981  [pdf

    cs.CR cs.NI

    A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    Authors: Syed S. Rizvi, Khaled M. Elleithy

    Abstract: The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors t… ▽ More

    Submitted 9 August, 2009; v1 submitted 7 August, 2009; originally announced August 2009.

    Comments: 10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA

  5. arXiv:0908.0980  [pdf

    cs.NI

    Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks

    Authors: Syed S. Rizvi, Khaled M. Elleithy, Aasia Riasat

    Abstract: Wireless Multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity. It has been shown that the computational complex… ▽ More

    Submitted 9 August, 2009; originally announced August 2009.

    Comments: 9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA