-
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Authors:
Mst Shapna Akter,
Hossain Shahriar,
Juan Rodriguez Cardenas,
Sheikh Iqbal Ahamed,
Alfredo Cuzzocrea
Abstract:
One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and more software flaws are discovered, either internally in proprietary code or publicly disclosed. These flaws are highly likely to be exploited and can lead to system compromise, data leakage, or denial of service. To create a large-scale mac…
▽ More
One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and more software flaws are discovered, either internally in proprietary code or publicly disclosed. These flaws are highly likely to be exploited and can lead to system compromise, data leakage, or denial of service. To create a large-scale machine learning system for function level vulnerability identification, we utilized a sizable dataset of C and C++ open-source code containing millions of functions with potential buffer overflow exploits. We have developed an efficient and scalable vulnerability detection method based on neural network models that learn features extracted from the source codes. The source code is first converted into an intermediate representation to remove unnecessary components and shorten dependencies. We maintain the semantic and syntactic information using state of the art word embedding algorithms such as GloVe and fastText. The embedded vectors are subsequently fed into neural networks such as LSTM, BiLSTM, LSTM Autoencoder, word2vec, BERT, and GPT2 to classify the possible vulnerabilities. We maintain the semantic and syntactic information using state of the art word embedding algorithms such as GloVe and fastText. The embedded vectors are subsequently fed into neural networks such as LSTM, BiLSTM, LSTM Autoencoder, word2vec, BERT, and GPT2 to classify the possible vulnerabilities. Furthermore, we have proposed a neural network model that can overcome issues associated with traditional neural networks. We have used evaluation metrics such as F1 score, precision, recall, accuracy, and total execution time to measure the performance. We have conducted a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Authors:
Mst Shapna Akter,
Hossain Shahriar,
Sheikh Iqbal Ahamed,
Kishor Datta Gupta,
Muhammad Rahman,
Atef Mohamed,
Mohammad Rahman,
Akond Rahman,
Fan Wu
Abstract:
Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity related challenges. Considering the novelty and complex architecture of QML, resources are not yet explicitly available that can pave cybersecurity learners to instill…
▽ More
Quantum machine learning (QML) is an emerging field of research that leverages quantum computing to improve the classical machine learning approach to solve complex real world problems. QML has the potential to address cybersecurity related challenges. Considering the novelty and complex architecture of QML, resources are not yet explicitly available that can pave cybersecurity learners to instill efficient knowledge of this emerging technology. In this research, we design and develop QML-based ten learning modules covering various cybersecurity topics by adopting student centering case-study based learning approach. We apply one subtopic of QML on a cybersecurity topic comprised of pre-lab, lab, and post-lab activities towards providing learners with hands-on QML experiences in solving real-world security problems. In order to engage and motivate students in a learning environment that encourages all students to learn, pre-lab offers a brief introduction to both the QML subtopic and cybersecurity problem. In this paper, we utilize quantum support vector machine (QSVM) for malware classification and protection where we use open source Pennylane QML framework on the drebin215 dataset. We demonstrate our QSVM model and achieve an accuracy of 95% in malware classification and protection. We will develop all the modules and introduce them to the cybersecurity community in the coming days.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Room Temperature Ferroelectricity, Ferromagnetism, and Anomalous Hall Effect in Half-metallic Monolayer CrTe
Authors:
Imran Ahamed,
Atasi Chakraborty,
Pushpendra Yadav,
Rik Dey,
Yogesh Singh Chauhan,
Somnath Bhowmick,
Amit Agarwal
Abstract:
Two-dimensional materials hosting ferroelectricity and ferromagnetism are crucial for low-power and high-speed information processing technologies. However, intrinsic 2D multiferroics in the monolayer limit are rare. Here, we demonstrate that monolayer CrTe, obtained by cleaving the [002] surface, is dynamically stable multiferroic at temperatures beyond room temperature. We show that it orders fe…
▽ More
Two-dimensional materials hosting ferroelectricity and ferromagnetism are crucial for low-power and high-speed information processing technologies. However, intrinsic 2D multiferroics in the monolayer limit are rare. Here, we demonstrate that monolayer CrTe, obtained by cleaving the [002] surface, is dynamically stable multiferroic at temperatures beyond room temperature. We show that it orders ferromagnetically with significant in-plane magnetocrystalline anisotropy, and it is a half-metal featuring a large half-metal gap. Remarkably, the broken inversion symmetry and buckled geometry of monolayer CrTe make it a ferroelectric with a large spontaneous out-of-plane polarization and significant magnetoelectric coupling. In addition, we demonstrate polarization or electric field-induced tunability of the anomalous Hall effect, accompanied by substantial bandstructure modulation. Our findings establish monolayer CrTe as a room-temperature multiferroic with great potential for applications in spintronics and ferroelectric devices.
△ Less
Submitted 24 October, 2023; v1 submitted 4 February, 2023;
originally announced February 2023.
-
Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption
Authors:
Syed Imtiaz Ahamed,
Vadlamani Ravi
Abstract:
The Machine Learning and Deep Learning Models require a lot of data for the training process, and in some scenarios, there might be some sensitive data, such as customer information involved, which the organizations might be hesitant to outsource for model building. Some of the privacy-preserving techniques such as Differential Privacy, Homomorphic Encryption, and Secure Multi-Party Computation ca…
▽ More
The Machine Learning and Deep Learning Models require a lot of data for the training process, and in some scenarios, there might be some sensitive data, such as customer information involved, which the organizations might be hesitant to outsource for model building. Some of the privacy-preserving techniques such as Differential Privacy, Homomorphic Encryption, and Secure Multi-Party Computation can be integrated with different Machine Learning and Deep Learning algorithms to provide security to the data as well as the model. In this paper, we propose a Chaotic Extreme Learning Machine and its encrypted form using Fully Homomorphic Encryption where the weights and biases are generated using a logistic map instead of uniform distribution. Our proposed method has performed either better or similar to the Traditional Extreme Learning Machine on most of the datasets.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques
Authors:
Md Jobair Hossain Faruk,
Shashank Trivedi,
Mohammad Masum,
Maria Valero,
Hossain Shahriar,
Sheikh Iqbal Ahamed
Abstract:
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary…
▽ More
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary importance among people, especially for the elderly population living alone at home or in an assisted living facility. This paper presents a novel and non-invasive framework for monitoring human hygiene using vibration sensors where we adopt Machine Learning techniques. The approach is based on a combination of a geophone sensor, a digitizer, and a cost-efficient computer board in a practical enclosure. Monitoring daily hygiene routines may help healthcare professionals be proactive rather than reactive in identifying and controlling the spread of potential outbreaks within the community. The experimental result indicates that applying a Support Vector Machine (SVM) for binary classification exhibits a promising accuracy of ~95% in the classification of different hygiene habits. Furthermore, both tree-based classifier (Random Forrest and Decision Tree) outperforms other models by achieving the highest accuracy (100%), which means that classifying hygiene events using vibration and non-invasive sensors is possible for monitoring hygiene activity.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Privacy-Preserving Wavelet Neural Network with Fully Homomorphic Encryption
Authors:
Syed Imtiaz Ahamed,
Vadlamani Ravi
Abstract:
The main aim of Privacy-Preserving Machine Learning (PPML) is to protect the privacy and provide security to the data used in building Machine Learning models. There are various techniques in PPML such as Secure Multi-Party Computation, Differential Privacy, and Homomorphic Encryption (HE). The techniques are combined with various Machine Learning models and even Deep Learning Networks to protect…
▽ More
The main aim of Privacy-Preserving Machine Learning (PPML) is to protect the privacy and provide security to the data used in building Machine Learning models. There are various techniques in PPML such as Secure Multi-Party Computation, Differential Privacy, and Homomorphic Encryption (HE). The techniques are combined with various Machine Learning models and even Deep Learning Networks to protect the data privacy as well as the identity of the user. In this paper, we propose a fully homomorphic encrypted wavelet neural network to protect privacy and at the same time not compromise on the efficiency of the model. We tested the effectiveness of the proposed method on seven datasets taken from the finance and healthcare domains. The results show that our proposed model performs similarly to the unencrypted model.
△ Less
Submitted 31 May, 2022; v1 submitted 26 May, 2022;
originally announced May 2022.
-
Causal Discovery on the Effect of Antipsychotic Drugs on Delirium Patients in the ICU using Large EHR Dataset
Authors:
Riddhiman Adib,
Md Osman Gani,
Sheikh Iqbal Ahamed,
Mohammad Adibuzzaman
Abstract:
Delirium occurs in about 80% cases in the Intensive Care Unit (ICU) and is associated with a longer hospital stay, increased mortality and other related issues. Delirium does not have any biomarker-based diagnosis and is commonly treated with antipsychotic drugs (APD). However, multiple studies have shown controversy over the efficacy or safety of APD in treating delirium. Since randomized control…
▽ More
Delirium occurs in about 80% cases in the Intensive Care Unit (ICU) and is associated with a longer hospital stay, increased mortality and other related issues. Delirium does not have any biomarker-based diagnosis and is commonly treated with antipsychotic drugs (APD). However, multiple studies have shown controversy over the efficacy or safety of APD in treating delirium. Since randomized controlled trials (RCT) are costly and time-expensive, we aim to approach the research question of the efficacy of APD in the treatment of delirium using retrospective cohort analysis. We plan to use the Causal inference framework to look for the underlying causal structure model, leveraging the availability of large observational data on ICU patients. To explore safety outcomes associated with APD, we aim to build a causal model for delirium in the ICU using large observational data sets connecting various covariates correlated with delirium. We utilized the MIMIC III database, an extensive electronic health records (EHR) dataset with 53,423 distinct hospital admissions. Our null hypothesis is: there is no significant difference in outcomes for delirium patients under different drug-group in the ICU. Through our exploratory, machine learning based and causal analysis, we had findings such as: mean length-of-stay and max length-of-stay is higher for patients in Haloperidol drug group, and haloperidol group has a higher rate of death in a year compared to other two-groups. Our generated causal model explicitly shows the functional relationships between different covariates. For future work, we plan to do time-varying analysis on the dataset.
△ Less
Submitted 28 April, 2022;
originally announced May 2022.
-
Pragmatic Clinical Trials in the Rubric of Structural Causal Models
Authors:
Riddhiman Adib,
Sheikh Iqbal Ahamed,
Mohammad Adibuzzaman
Abstract:
Explanatory studies, such as randomized controlled trials, are targeted to extract the true causal effect of interventions on outcomes and are by design adjusted for covariates through randomization. On the contrary, observational studies are a representation of events that occurred without intervention. Both can be illustrated using the Structural Causal Model (SCM), and do-calculus can be employ…
▽ More
Explanatory studies, such as randomized controlled trials, are targeted to extract the true causal effect of interventions on outcomes and are by design adjusted for covariates through randomization. On the contrary, observational studies are a representation of events that occurred without intervention. Both can be illustrated using the Structural Causal Model (SCM), and do-calculus can be employed to estimate the causal effects. Pragmatic clinical trials (PCT) fall between these two ends of the trial design spectra and are thus hard to define. Due to its pragmatic nature, no standardized representation of PCT through SCM has been yet established. In this paper, we approach this problem by proposing a generalized representation of PCT under the rubric of structural causal models (SCM). We discuss different analysis techniques commonly employed in PCT using the proposed graphical model, such as intention-to-treat, as-treated, and per-protocol analysis. To show the application of our proposed approach, we leverage an experimental dataset from a pragmatic clinical trial. Our proposition of SCM through PCT creates a pathway to leveraging do-calculus and related mathematical operations on clinical datasets.
△ Less
Submitted 28 April, 2022;
originally announced April 2022.
-
CKH: Causal Knowledge Hierarchy for Estimating Structural Causal Models from Data and Priors
Authors:
Riddhiman Adib,
Md Mobasshir Arshed Naved,
Chih-Hao Fang,
Md Osman Gani,
Ananth Grama,
Paul Griffin,
Sheikh Iqbal Ahamed,
Mohammad Adibuzzaman
Abstract:
Structural causal models (SCMs) provide a principled approach to identifying causation from observational and experimental data in disciplines ranging from economics to medicine. However, SCMs, which is typically represented as graphical models, cannot rely only on data, rather require support of domain knowledge. A key challenge in this context is the absence of a methodological framework for enc…
▽ More
Structural causal models (SCMs) provide a principled approach to identifying causation from observational and experimental data in disciplines ranging from economics to medicine. However, SCMs, which is typically represented as graphical models, cannot rely only on data, rather require support of domain knowledge. A key challenge in this context is the absence of a methodological framework for encoding priors (background knowledge) into causal models in a systematic manner. We propose an abstraction called causal knowledge hierarchy (CKH) for encoding priors into causal models. Our approach is based on the foundation of "levels of evidence" in medicine, with a focus on confidence in causal information. Using CKH, we present a methodological framework for encoding causal priors from various information sources and combining them to derive an SCM. We evaluate our approach on a simulated dataset and demonstrate overall performance compared to the ground truth causal model with sensitivity analysis.
△ Less
Submitted 1 September, 2022; v1 submitted 28 April, 2022;
originally announced April 2022.
-
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Authors:
Mohammad Masum,
Mohammad Nazim,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Md Abdullah Hafiz Khan,
Gias Uddin,
Shabir Barzanjeh,
Erhan Saglamyurek,
Akond Rahman,
Sheikh Iqbal Ahamed
Abstract:
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This pap…
▽ More
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This paper analyzes speed up performance of QC when applied to machine learning algorithms, known as Quantum Machine Learning (QML). We applied QML methods such as Quantum Support Vector Machine (QSVM), and Quantum Neural Network (QNN) to detect Software Supply Chain (SSC) attacks. Due to the access limitations of real quantum computers, the QML methods were implemented on open-source quantum simulators such as IBM Qiskit and TensorFlow Quantum. We evaluated the performance of QML in terms of processing speed and accuracy and finally, compared with its classical counterparts. Interestingly, the experimental results differ to the speed up promises of QC by demonstrating higher computational time and lower accuracy in comparison to the classical approaches for SSC attacks.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Authors:
Paramita Basak Upama,
Md Jobair Hossain Faruk,
Mohammad Nazim,
Mohammad Masum,
Hossain Shahriar,
Gias Uddin,
Shabir Barzanjeh,
Sheikh Iqbal Ahamed,
Akond Rahman
Abstract:
Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts and phenomena of Quantum Mechanic (QM) with the significant potential to unlock a remarkable opportunity to solve complex and computationally intractable problems that scientists could not tackle previously. In recent years, tremendous efforts and progress in QC mark a significant milestone in solving…
▽ More
Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts and phenomena of Quantum Mechanic (QM) with the significant potential to unlock a remarkable opportunity to solve complex and computationally intractable problems that scientists could not tackle previously. In recent years, tremendous efforts and progress in QC mark a significant milestone in solving real-world problems much more efficiently than classical computing technology. While considerable progress is being made to move quantum computing in recent years, significant research efforts need to be devoted to move this domain from an idea to a working paradigm. In this paper, we conduct a systematic survey and categorize papers, tools, frameworks, platforms that facilitate quantum computing and analyze them from an application and Quantum Computing perspective. We present quantum Computing Layers, Characteristics of Quantum Computer platforms, Circuit Simulator, Open-source Tools Cirq, TensorFlow Quantum, ProjectQ that allow implementing quantum programs in Python using a powerful and intuitive syntax. Following that, we discuss the current essence, identify open challenges and provide future research direction. We conclude that scores of frameworks, tools and platforms are emerged in the past few years, improvement of currently available facilities would exploit the research activities in the quantum research community.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
mTOCS: Mobile Teleophthalmology in Community Settings to improve Eye-health in Diabetic Population
Authors:
Jannat Tumpa,
Riddhiman Adib,
Dipranjan Das,
Nathalie Abenoza,
Andrew Zolot,
Velinka Medic,
Judy Kim,
Al Castro,
Mirtha Sosa Pacheco,
Jay Romant,
Sheikh Iqbal Ahamed
Abstract:
Diabetic eye diseases, particularly Diabetic Retinopathy,is the leading cause of vision loss worldwide and can be prevented by early diagnosis through annual eye-screenings. However, cost, healthcare disparities, cultural limitations, etc. are the main barriers against regular screening. Eye-screenings conducted in community events with native-speaking staffs can facilitate regular check-up and de…
▽ More
Diabetic eye diseases, particularly Diabetic Retinopathy,is the leading cause of vision loss worldwide and can be prevented by early diagnosis through annual eye-screenings. However, cost, healthcare disparities, cultural limitations, etc. are the main barriers against regular screening. Eye-screenings conducted in community events with native-speaking staffs can facilitate regular check-up and development of awareness among underprivileged communities compared to traditional clinical settings. However, there are not sufficient technology support for carrying out the screenings in community settings with collaboration from community partners using native languages. In this paper, we have proposed and discussed the development of our software framework, "Mobile Teleophthalomogy in Community Settings (mTOCS)", that connects the community partners with eye-specialists and the Health Department staffs of respective cities to expedite this screening process. Moreover, we have presented the analysis from our study on the acceptance of community-based screening methods among the community participants as well as on the effectiveness of mTOCS among the community partners. The results have evinced that mTOCS has been capable of providing an improved rate of eye-screenings and better health outcomes.
△ Less
Submitted 28 October, 2020;
originally announced November 2020.
-
State Feedback Control and Observer Based Adaptive Synchronization of Chaos in a Memristive Murali-Lakshmanan-Chua Circuit
Authors:
A Ishaq Ahamed,
M Lakshmanan
Abstract:
In this paper we report the control and synchronization of chaos in a Memristive Murali-Lakshmanan-Chua circuit. This circuit, introduced by the present authors in 2013, is basically a non-smooth system having two discontinuity boundaries by virtue of it having a flux controlled active memristor as its nonlinear element. While the control of chaos has been effected using state feedback techniques,…
▽ More
In this paper we report the control and synchronization of chaos in a Memristive Murali-Lakshmanan-Chua circuit. This circuit, introduced by the present authors in 2013, is basically a non-smooth system having two discontinuity boundaries by virtue of it having a flux controlled active memristor as its nonlinear element. While the control of chaos has been effected using state feedback techniques, the concept of adaptive synchronization and observer based approaches have been used to effect synchronization of chaos. Both of these techniques are based on state space representation theory which is well known in the field of control engineering. As in our earlier works on this circuit, we have derived the Poincaré Discontinuity Map** (PDM) and Zero Time Discontinuity Map** (ZDM) corrections, both of which are essential for realizing the true dynamics of non-smooth systems. Further we have constructed the observer and controller based canonical forms of the state space representations, have set up the Luenberger observer, derived the controller gain vector to implement state feedback control and calculated the gain matrices for switch feed back and finally performed parameter estimation for effecting observer based adaptive synchronization. Our results obtained by numerical simulation include time plots, phase portraits, estimation of the parameters and convergence of errors graphs and phase plots showing complete synchronization.
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
A Causally Formulated Hazard Ratio Estimation through Backdoor Adjustment on Structural Causal Model
Authors:
Riddhiman Adib,
Paul Griffin,
Sheikh Iqbal Ahamed,
Mohammad Adibuzzaman
Abstract:
Identifying causal relationships for a treatment intervention is a fundamental problem in health sciences. Randomized controlled trials (RCTs) are considered the gold standard for identifying causal relationships. However, recent advancements in the theory of causal inference based on the foundations of structural causal models (SCMs) have allowed the identification of causal relationships from ob…
▽ More
Identifying causal relationships for a treatment intervention is a fundamental problem in health sciences. Randomized controlled trials (RCTs) are considered the gold standard for identifying causal relationships. However, recent advancements in the theory of causal inference based on the foundations of structural causal models (SCMs) have allowed the identification of causal relationships from observational data, under certain assumptions. Survival analysis provides standard measures, such as the hazard ratio, to quantify the effects of an intervention. While hazard ratios are widely used in clinical and epidemiological studies for RCTs, a principled approach does not exist to compute hazard ratios for observational studies with SCMs. In this work, we review existing approaches to compute hazard ratios as well as their causal interpretation, if it exists. We also propose a novel approach to compute hazard ratios from observational studies using backdoor adjustment through SCMs and do-calculus. Finally, we evaluate the approach using experimental data for Ewing's sarcoma.
△ Less
Submitted 22 June, 2020;
originally announced June 2020.
-
Sliding Bifurcations in the Memristive Murali-Lakshmanan-Chua Circuit and the Memristive Driven Chua Oscillator
Authors:
A. Ishaq Ahamed,
M. Lakshmanan
Abstract:
In this paper we report the occurrence of sliding bifurcations admitted by the memristive Murali-Lakshmanan-Chua circuit \cite{icha13} and the memristive driven Chua oscillator \citep{icha11}. Both of these circuits have a flux-controlled active memristor designed by the authors in 2011, as their non-linear element. The three segment piecewise-linear characteristic of this memristor bestows on the…
▽ More
In this paper we report the occurrence of sliding bifurcations admitted by the memristive Murali-Lakshmanan-Chua circuit \cite{icha13} and the memristive driven Chua oscillator \citep{icha11}. Both of these circuits have a flux-controlled active memristor designed by the authors in 2011, as their non-linear element. The three segment piecewise-linear characteristic of this memristor bestows on the circuits two discontinuity boundaries, dividing their phase spaces into three sub-regions. For proper choice of parameters, these circuits take on a degree of smoothness equal to one at each of their two discontinuities, thereby causing them to behave as \textit{Filippov} systems. Sliding bifurcations, which are characteristic of Filippov systems, arise when the periodic orbits in each of the sub-regions, interact with the discontinuity boundaries, giving rise to many interesting dynamical phenomena. The numerical simulations are carried out after incorporating proper zero time discontinuity map** (ZDM) corrections. These are found to agree well with the experimental observations which we report here appropriately.
△ Less
Submitted 8 May, 2020;
originally announced May 2020.
-
Asymmetric modification of the magnetic proximity effect in Pt/Co/Pt trilayers by the insertion of a Ta buffer layer
Authors:
Ankan Mukhopadhyay,
Sarathlal Koyiloth Vayalil,
Dominik Graulich,
Imran Ahamed,
Sonia Francoual,
Arti Kashyap,
Timo Kuschel,
P S Anil Kumar
Abstract:
The magnetic proximity effect in top and bottom Pt layers induced by Co in Ta/Pt/Co/Pt multilayers has been studied by interface sensitive, element specific x-ray resonant magnetic reflectivity. The asymmetry ratio for circularly polarized x-rays of left and right helicity has been measured at the Pt $L_3$ absorption edge (11567 eV) with an in-plane magnetic field ($\pm158$ mT) to verify its magne…
▽ More
The magnetic proximity effect in top and bottom Pt layers induced by Co in Ta/Pt/Co/Pt multilayers has been studied by interface sensitive, element specific x-ray resonant magnetic reflectivity. The asymmetry ratio for circularly polarized x-rays of left and right helicity has been measured at the Pt $L_3$ absorption edge (11567 eV) with an in-plane magnetic field ($\pm158$ mT) to verify its magnetic origin. The proximity-induced magnetic moment in the bottom Pt layer decreases with the thickness of the Ta buffer layer. Grazing incidence x-ray diffraction has been carried out to show that the Ta buffer layer induces the growth of Pt(011) rather than Pt(111) which in turn reduces the induced moment. A detailed density functional theory study shows that an adjacent Co layer induces more magnetic moment in Pt(111) than in Pt(011). The manipulation of the magnetism in Pt by the insertion of a Ta buffer layer provides a new way of controlling the magnetic proximity effect which is of huge importance in spin-transport experiments across similar kind of interfaces.
△ Less
Submitted 27 November, 2019;
originally announced November 2019.
-
A Novel Technique of Noninvasive Hemoglobin Level Measurement Using HSV Value of Fingertip Image
Authors:
Md Kamrul Hasan,
Nazmus Sakib,
Joshua Field,
Richard R. Love,
Sheikh I. Ahamed
Abstract:
Over the last decade, smartphones have changed radically to support us with mHealth technology, cloud computing, and machine learning algorithm. Having its multifaceted facilities, we present a novel smartphone-based noninvasive hemoglobin (Hb) level prediction model by analyzing hue, saturation and value (HSV) of a fingertip video. Here, we collect 60 videos of 60 subjects from two different loca…
▽ More
Over the last decade, smartphones have changed radically to support us with mHealth technology, cloud computing, and machine learning algorithm. Having its multifaceted facilities, we present a novel smartphone-based noninvasive hemoglobin (Hb) level prediction model by analyzing hue, saturation and value (HSV) of a fingertip video. Here, we collect 60 videos of 60 subjects from two different locations: Blood Center of Wisconsin, USA and AmaderGram, Bangladesh. We extract red, green, and blue (RGB) pixel intensities of selected images of those videos captured by the smartphone camera with flash on. Then we convert RGB values of selected video frames of a fingertip video into HSV color space and we generate histogram values of these HSV pixel intensities. We average these histogram values of a fingertip video and consider as an observation against the gold standard Hb concentration. We generate two input feature matrices based on observation of two different data sets. Partial Least Squares (PLS) algorithm is applied on the input feature matrix. We observe R2=0.95 in both data sets through our research. We analyze our data using Python OpenCV, Matlab, and R statistics tool.
△ Less
Submitted 6 October, 2019;
originally announced October 2019.
-
Revisiting comparison between entanglement measures for two-qubit pure states
Authors:
Ashutosh Singh,
Ijaz Ahamed,
Dipankar Home,
Urbasi Sinha
Abstract:
Given a non-maximally entangled state, an operationally significant question is to quantitatively assess as to what extent the state is away from the maximally entangled state, which is of importance in evaluating the efficacy of the state for its various uses as a resource. It is this question which is examined in this paper for two-qubit pure entangled states in terms of different entanglement m…
▽ More
Given a non-maximally entangled state, an operationally significant question is to quantitatively assess as to what extent the state is away from the maximally entangled state, which is of importance in evaluating the efficacy of the state for its various uses as a resource. It is this question which is examined in this paper for two-qubit pure entangled states in terms of different entanglement measures like Negativity (N), Logarithmic Negativity (LN), and Entanglement of Formation (EOF). Although these entanglement measures are defined differently, to what extent they differ in quantitatively addressing the earlier mentioned question has remained uninvestigated. Theoretical estimate in this paper shows that an appropriately defined parameter characterizing the fractional deviation of any given entangled state from the maximally entangled state in terms of N is quite different from that computed in terms of EOF with their values differing up to ~ 15 % for states further away from the maximally entangled state. Similarly, the values of such fractional deviation parameters estimated using the entanglement measures LN and EOF, respectively, also strikingly differ among themselves with the maximum value of this difference being around 23 %. This analysis is complemented by illustration of these differences in terms of empirical results obtained from a suitably planned experimental study. Thus, such appreciable amount of quantitative non-equivalence between the entanglement measures in addressing the experimentally relevant question considered in the present paper highlights the requirement of an appropriate quantifier for such intent. We indicate directions of study that can be explored towards finding such a quantifier.
△ Less
Submitted 19 December, 2019; v1 submitted 22 July, 2019;
originally announced July 2019.
-
Discontinuity Induced Hopf and Neimark-Sacker Bifurcations in a Memristive Murali-Lakshmanan-Chua Circuit
Authors:
A. Ishaq Ahamed,
M. Lakshmanan
Abstract:
We report using Clarke's concept of generalised differential and a modification of Floquet theory to non-smooth oscillations, the occurrence of discontinuity induced Hopf bifurcations and Neimark-Sacker bifurcations leading to quasiperiodic attractors in a memristive Murali-Lakshmanan-Chua (memristive MLC) circuit. The above bifurcations arise because of the fact that a memristive MLC circuit is b…
▽ More
We report using Clarke's concept of generalised differential and a modification of Floquet theory to non-smooth oscillations, the occurrence of discontinuity induced Hopf bifurcations and Neimark-Sacker bifurcations leading to quasiperiodic attractors in a memristive Murali-Lakshmanan-Chua (memristive MLC) circuit. The above bifurcations arise because of the fact that a memristive MLC circuit is basically a nonsmooth system by virtue of having a memristive element as its nonlinearity. The switching and modulating properties of the memristor which we have considered endow the circuit with two discontinuity boundaries and multiple equilibrium points as well. As the Jacobian matrices about these equilibrium points are non-invertible, they are non-hyperbolic, some of these admit local bifurcations as well. Consequently when these equilibrium points are perturbed, they lose their stability giving rise to quasiperiodic orbits. The numerical simulations carried out by incorporating proper discontinuity map**s (DMs), such as the Poincaré discontinuity map (PDM) and zero time discontinuity map (ZDM), are found to agree well with experimental observations.
△ Less
Submitted 4 April, 2017;
originally announced April 2017.
-
Nonsmooth Bifurcations, Transient Hyperchaos and Hyperchaotic Beats in a Memristive Murali-Lakshmanan-Chua Circuit
Authors:
A. Ishaq Ahamed,
M. Lakshmanan
Abstract:
In this paper, a memristive Murali-Lakshmanan-Chua (MLC) circuit is built by replacing the nonlinear element of an ordinary MLC circuit, namely the Chua's diode, with a three segment piecewise linear active flux controlled memristor. The bistability nature of the memristor introduces two discontinuty boundaries or switching manifolds in the circuit topology. As a result, the circuit becomes a piec…
▽ More
In this paper, a memristive Murali-Lakshmanan-Chua (MLC) circuit is built by replacing the nonlinear element of an ordinary MLC circuit, namely the Chua's diode, with a three segment piecewise linear active flux controlled memristor. The bistability nature of the memristor introduces two discontinuty boundaries or switching manifolds in the circuit topology. As a result, the circuit becomes a piecewise smooth system of second order. Grazing bifurcations, which are essentially a form of discontinuity induced non-smooth bifurcations, occur at these boundaries and govern the dynamics of the circuit. While the interaction of the memristor aided self oscillations of the circuit and the external sinusoidal forcing result in the phenomenon of beats occurring in the circuit, grazing bifurcations endow them with chaotic and hyper chaotic nature. In addition the circuit admits a codimension-5 bifurcation and transient hyper chaos. Grazing bifurcations as well as other behaviors have been analyzed numerically using time series plots, phase portraits, bifurcation diagram, power spectra and Lyapunov spectrum, as well as the recent 0-1 K test for chaos, obtained after constructing a proper Zero Time Discontinuity Map (ZDM) and Poincare Discontinuity Map (PDM) analytically. Multisim simulations using a model of piecewise linear memristor have also been used to confirm some of the behaviors.
△ Less
Submitted 14 March, 2013;
originally announced March 2013.
-
Observation of chaotic beats in a driven memristive Chua's circuit
Authors:
A. Ishaq Ahamed,
K. Srinivasan,
K. Murali,
M. Lakshmanan
Abstract:
In this paper, a time varying resistive circuit realising the action of an active three segment piecewise linear flux controlled memristor is proposed. Using this as the nonlinearity, a driven Chua's circuit is implemented. The phenomenon of chaotic beats in this circuit is observed for a suitable choice of parameters. The memristor acts as a chaotically time varying resistor (CTVR), switching bet…
▽ More
In this paper, a time varying resistive circuit realising the action of an active three segment piecewise linear flux controlled memristor is proposed. Using this as the nonlinearity, a driven Chua's circuit is implemented. The phenomenon of chaotic beats in this circuit is observed for a suitable choice of parameters. The memristor acts as a chaotically time varying resistor (CTVR), switching between a less conductive OFF state and a more conductive ON state. This chaotic switching is governed by the dynamics of the driven Chua's circuit of which the memristor is an integral part. The occurrence of beats is essentially due to the interaction of the memristor aided self oscillations of the circuit and the external driving sinusoidal forcing. Upon slight tuning/detuning of the frequencies of the memristor switching and that of the external force, constructive and destructive interferences occur leading to revivals and collapses in amplitudes of the circuit variables, which we refer as chaotic beats. Numerical simulations and Multisim modelling as well as statistical analyses have been carried out to observe as well as to understand and verify the mechanism leading to chaotic beats.
△ Less
Submitted 27 August, 2010;
originally announced August 2010.