Mohammad Mahdi Mojahedian
YOU?
Author Swipe
View article: Fundamental Trade-Offs in Monostatic ISAC: A Holistic Investigation Toward 6G
Fundamental Trade-Offs in Monostatic ISAC: A Holistic Investigation Toward 6G Open
View article: Paradise of Forking Paths: Revisiting the Adaptive Data Analysis Problem
Paradise of Forking Paths: Revisiting the Adaptive Data Analysis Problem Open
The Adaptive Data Analysis (ADA) problem, where an analyst interacts with a dataset through statistical queries, is often studied under the assumption of adversarial analyst behavior. To decrease this gap, we propose a revised model of ADA…
View article: Toward Intelligent and Sustainable IoT: A DRL Approach for Backscatter-Based Communication Under QoS Constraints
Toward Intelligent and Sustainable IoT: A DRL Approach for Backscatter-Based Communication Under QoS Constraints Open
With the rapid proliferation of vehicular communications and the need to support intelligent Internet-of-Things (IoT) devices in dynamic transportation environments, enhancing the functionality of low-power sensors is essential to realize …
View article: Paradise of Forking Paths: Revisiting the Adaptive Data Analysis Problem
Paradise of Forking Paths: Revisiting the Adaptive Data Analysis Problem Open
View article: Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy
Over-the-Air Federated Adaptive Data Analysis: Preserving Accuracy via Opportunistic Differential Privacy Open
Adaptive data analysis (ADA) involves a dynamic interaction between an analyst and a dataset owner, where the analyst submits queries sequentially, adapting them based on previous answers. This process can become adversarial, as the analys…
View article: Beyond Yao's Millionaires: Secure Multi-Party Computation of Non-Polynomial Functions
Beyond Yao's Millionaires: Secure Multi-Party Computation of Non-Polynomial Functions Open
In this paper, we present an unconditionally secure $N$-party comparison scheme based on Shamir secret sharing, utilizing the binary representation of private inputs to determine the $\max$ without disclosing any private inputs or intermed…
View article: Fundamental Trade-Offs in Monostatic ISAC: A Holistic Investigation Towards 6G
Fundamental Trade-Offs in Monostatic ISAC: A Holistic Investigation Towards 6G Open
This paper undertakes a holistic investigation of two fundamental trade-offs in monostatic OFDM integrated sensing and communication (ISAC) systems-namely, the time-frequency trade-off and the spatial trade-off, originating from the choice…
View article: Output Statistics of Random Binning: Tsallis Divergence and Its Applications
Output Statistics of Random Binning: Tsallis Divergence and Its Applications Open
Random binning is a widely used technique in information theory with diverse applications. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. We analyze all values of $α\in (0, \in…
View article: Adjustable Privacy using Autoencoder-based Learning Structure
Adjustable Privacy using Autoencoder-based Learning Structure Open
Inference centers need more data to have a more comprehensive and beneficial learning model, and for this purpose, they need to collect data from data providers. On the other hand, data providers are cautious about delivering their dataset…
View article: Precoding and Reception for ULA-Based Wide-Aperture MIMO
Precoding and Reception for ULA-Based Wide-Aperture MIMO Open
An approach is presented to compute the capacity-achieving precoder and receiver for wide-aperture MIMO with uniform linear arrays in O(N2min) operations as opposed to the O(N2minNmax) required by the singular-value decomposition of the ch…
View article: Adjustable Privacy Using Autoencoder-Based Learning Structure
Adjustable Privacy Using Autoencoder-Based Learning Structure Open
View article: Psychometric properties of the EQ-5D-5L compared with EQ-5D-3L in cancer patients in Iran
Psychometric properties of the EQ-5D-5L compared with EQ-5D-3L in cancer patients in Iran Open
Background and Objective Psychometric evidence to support the validity and reliability of the EuroQol-5 Dimensions (EQ-5D) in cancer patients is limited. This study aimed to test the validity and reliability of the EQ-5D-5L (5L) in compari…
View article: Spatial-Wideband Effect in Line-of-Sight MIMO Communication
Spatial-Wideband Effect in Line-of-Sight MIMO Communication Open
Comunicació presentada a IEEE International Conference on Communications (ICC 2022), celebrat del 16 al 20 de maig de 2022 a Seül, Corea del Sud.
View article: Subset Regularized Zero-Forcing Precoders for Cell-Free C-RANs
Subset Regularized Zero-Forcing Precoders for Cell-Free C-RANs Open
Comunicació presentada a: 29th European Signal Processing Conference (EUSIPCO) celebrat del 23 al 27 d'agost de 2021 a Dublin, Irlanda.
View article: Pseudo-Inverse vs Generalized Inverse for C-RAN Downlink Precoding
Pseudo-Inverse vs Generalized Inverse for C-RAN Downlink Precoding Open
Comunicació presentada a: GLOBECOM 2020 celebrat del 17 a l'11 de desembre de 2020 a Taipei, Taiwan.
View article: Linear Interference Cancellation for the Cell-Free C-RAN Uplink
Linear Interference Cancellation for the Cell-Free C-RAN Uplink Open
Drawing on the notion of parallel interference cancellation, this paper formulates a one-shot linear receiver for the uplink of centralized, possibly cloud-based, radio access networks (C-RANs) operating in a cell-free fashion. This receiv…
View article: A review on inputs and outputs in determining the efficiency of universities of medical sciences by data envelopment analysis method
A review on inputs and outputs in determining the efficiency of universities of medical sciences by data envelopment analysis method Open
A review on inputs and outputs in determining the efficiency of universities of medical sciences by data envelopment analysis method
View article: A review on inputs and outputs in determining the efficiency of universities of medical sciences by data envelopment analysis method.
A review on inputs and outputs in determining the efficiency of universities of medical sciences by data envelopment analysis method. Open
Background: Increasing the number of students in universities, simultaneously limiting allocation of funds to them, and maintaining the highest efficiency level in education and research are of paramount importance. There are severa…
View article: A Correlation Measure Based on Vector-Valued $L_p$ -Norms
A Correlation Measure Based on Vector-Valued $L_p$ -Norms Open
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α…
View article: Comparison of the Cost-utility Analysis of Electroacupuncture and Nonsteroidal Antiinflammatory Drugs in the Treatment of Chronic Low Back Pain
Comparison of the Cost-utility Analysis of Electroacupuncture and Nonsteroidal Antiinflammatory Drugs in the Treatment of Chronic Low Back Pain Open
The results indicate a significant difference between EA and NSAIDs in cases of both utility and total cost. The findings demonstrate that EA is more cost-effective than NSAIDs, as therefore can be considered as an alternative treatment fo…
View article: Linagliptin versus sitagliptin in patients with type 2 diabetes mellitus: a network meta-analysis of randomized clinical trials
Linagliptin versus sitagliptin in patients with type 2 diabetes mellitus: a network meta-analysis of randomized clinical trials Open
View article: On the equivalency of reliability and security metrics for wireline networks
On the equivalency of reliability and security metrics for wireline networks Open
In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of "perfect secrecy and zero-error constraints…
View article: On the Equivalency of Reliability and Security Metrics for Wireline\n Networks
On the Equivalency of Reliability and Security Metrics for Wireline\n Networks Open
In this paper, we show the equivalency of weak and strong secrecy conditions\nfor a large class of secure network coding problems. When we restrict to linear\noperations, we show the equivalency of "perfect secrecy and zero-error\nconstrai…