-
On-chip microwave coherent source with in-situ control of the photon number distribution
Authors:
Pasquale Mastrovito,
Halima Giovanna Ahmad,
Martina Esposito,
Davide Massarotti,
Francesco Tafuri
Abstract:
Coherent photon sources are key elements in different applications, ranging from quantum sensing to quantum computing. In the context of circuit quantum electrodynamics, there have been multiple proposals for potential coherent sources of photons, but a well established candidate is still missing. The possibility of designing and engineering superconducting circuits behaving like artificial atoms…
▽ More
Coherent photon sources are key elements in different applications, ranging from quantum sensing to quantum computing. In the context of circuit quantum electrodynamics, there have been multiple proposals for potential coherent sources of photons, but a well established candidate is still missing. The possibility of designing and engineering superconducting circuits behaving like artificial atoms supports the realization of quantum optics protocols, including microwave photons generation. Here we propose and theoretically investigate a new design that allows a tunable photon injection directly on-chip. The scheme is based on initiating a population inversion in a superconducting circuit that will act as the photon source of one or multiple target resonators. The key novelty of the proposed layout consists in replacing the usual capacitive link between the source and the target cavity with a tunable coupler, with the advantage of having on-demand control on the injected steady-state photons. We validate the dynamical control of the generated coherent states under the effect of an external flux threading the tunable coupler and discuss the possibility of employing this scheme also in the context of multiple bosonic reservoirs.
△ Less
Submitted 27 June, 2024; v1 submitted 15 June, 2024;
originally announced June 2024.
-
Phase dynamics of tunnel Al-based ferromagnetic Josephson junctions
Authors:
Halima Giovanna Ahmad,
Roberta Satariano,
Raffaella Ferraiuolo,
Antonio Vettoliere,
Carmine Granata,
Domenico Montemurro,
Giovanni Ausanio,
Loredana Parlato,
Giovanni Piero Pepe,
Francesco Tafuri,
Davide Massarotti
Abstract:
By measuring the current-voltage characteristics and the switching current distributions as a function of temperature, we have investigated the phase dynamics of Al tunnel ferromagnetic Josephson junctions (JJs), designed to fall in the typical range of parameters of state-of-the-art transmons, providing evidence of phase diffusion processes. The comparison with the experimental outcomes on non-ma…
▽ More
By measuring the current-voltage characteristics and the switching current distributions as a function of temperature, we have investigated the phase dynamics of Al tunnel ferromagnetic Josephson junctions (JJs), designed to fall in the typical range of parameters of state-of-the-art transmons, providing evidence of phase diffusion processes. The comparison with the experimental outcomes on non-magnetic JJs with nominally the same electrodynamical parameters demonstrates that the introduction of ferromagnetic barriers does not cause any sizeable detrimental effect, and supports the notion of including tunnel ferromagnetic JJs in qubit architectures.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Investigating pump harmonics generation in a SNAIL-based Traveling Wave Parametric Amplifier
Authors:
A. Yu. Levochkina,
H. G. Ahmad,
P. Mastrovito,
I. Chatterjee,
G. Serpico,
L. Di Palma,
R. Ferroiuolo,
R. Satariano,
P. Darvehi,
A. Ranadive,
G. Cappelli,
G. Le Gal,
L. Planat,
D. Montemurro,
D. Massarotti,
F. Tafuri,
N. Roch,
G. P. Pepe,
M. Esposito
Abstract:
Traveling Wave Parametric Amplifiers (TWPAs) are extensively employed in experiments involving weak microwave signals for their highly desirable quantum-limited and broadband characteristics. However, TWPAs' broadband nature comes with the disadvantage of admitting the activation of spurious nonlinear processes, such as harmonics generation, that can potentially degrade amplification performance.…
▽ More
Traveling Wave Parametric Amplifiers (TWPAs) are extensively employed in experiments involving weak microwave signals for their highly desirable quantum-limited and broadband characteristics. However, TWPAs' broadband nature comes with the disadvantage of admitting the activation of spurious nonlinear processes, such as harmonics generation, that can potentially degrade amplification performance. Here we experimentally investigate a Josephson TWPA device with SNAIL (Superconducting Nonlinear Asymmetric Inductive Element)-based unit cells focusing on the amplification behaviour along with the generation of second and third harmonics of the pump. By comparing experimental results with transient numerical simulations, we demonstrate the influence of Josephson junctions' fabrication imperfections on the occurrence of harmonics and on the gain behaviour.
△ Less
Submitted 18 June, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
Enhancing Plant Disease Detection: A Novel CNN-Based Approach with Tensor Subspace Learning and HOWSVD-MD
Authors:
Abdelmalik Ouamane,
Ammar Chouchane,
Yassine Himeur,
Abderrazak Debilou,
Abbes Amira,
Shadi Atalla,
Wathiq Mansoor,
Hussain Al Ahmad
Abstract:
Machine learning has revolutionized the field of agricultural science, particularly in the early detection and management of plant diseases, which are crucial for maintaining crop health and productivity. Leveraging advanced algorithms and imaging technologies, researchers are now able to identify and classify plant diseases with unprecedented accuracy and speed. Effective management of tomato dis…
▽ More
Machine learning has revolutionized the field of agricultural science, particularly in the early detection and management of plant diseases, which are crucial for maintaining crop health and productivity. Leveraging advanced algorithms and imaging technologies, researchers are now able to identify and classify plant diseases with unprecedented accuracy and speed. Effective management of tomato diseases is crucial for enhancing agricultural productivity. The development and application of tomato disease classification methods are central to this objective. This paper introduces a cutting-edge technique for the detection and classification of tomato leaf diseases, utilizing insights from the latest pre-trained Convolutional Neural Network (CNN) models. We propose a sophisticated approach within the domain of tensor subspace learning, known as Higher-Order Whitened Singular Value Decomposition (HOWSVD), designed to boost the discriminatory power of the system. Our approach to Tensor Subspace Learning is methodically executed in two phases, beginning with HOWSVD and culminating in Multilinear Discriminant Analysis (MDA). The efficacy of this innovative method was rigorously tested through comprehensive experiments on two distinct datasets, namely PlantVillage and the Taiwan dataset. The findings reveal that HOWSVD-MDA outperforms existing methods, underscoring its capability to markedly enhance the precision and dependability of diagnosing tomato leaf diseases. For instance, up to 98.36\% and 89.39\% accuracy scores have been achieved under PlantVillage and the Taiwan datasets, respectively.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
Classification of Nasopharyngeal Cases using DenseNet Deep Learning Architecture
Authors:
W. S. H. M. W. Ahmad,
M. F. A. Fauzi,
M. K. Abdullahi,
Jenny T. H. Lee,
N. S. A. Basry,
A Yahaya,
A. M. Ismail,
A. Adam,
Elaine W. L. Chan,
F. S. Abas
Abstract:
Nasopharyngeal carcinoma (NPC) is one of the understudied yet deadliest cancers in South East Asia. In Malaysia, the prevalence is identified mainly in Sarawak, among the ethnic of Bidayuh. NPC is often late-diagnosed because it is asymptomatic at the early stage. There are several tissue representations from the nasopharynx biopsy, such as nasopharyngeal inflammation (NPI), lymphoid hyperplasia (…
▽ More
Nasopharyngeal carcinoma (NPC) is one of the understudied yet deadliest cancers in South East Asia. In Malaysia, the prevalence is identified mainly in Sarawak, among the ethnic of Bidayuh. NPC is often late-diagnosed because it is asymptomatic at the early stage. There are several tissue representations from the nasopharynx biopsy, such as nasopharyngeal inflammation (NPI), lymphoid hyperplasia (LHP), nasopharyngeal carcinoma (NPC) and normal tissue. This paper is our first initiative to identify the difference between NPC, NPI and normal cases. Seven whole slide images (WSIs) with gigapixel resolutions from seven different patients and two hospitals were experimented with using two test setups, consisting of a different set of images. The tissue regions are patched into smaller blocks and classified using DenseNet architecture with 21 dense layers. Two tests are carried out, each for proof of concept (Test 1) and real-test scenario (Test 2). The accuracy achieved for NPC class is 94.8% for Test 1 and 67.0% for Test 2.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Reinforcement Learning-based Receding Horizon Control using Adaptive Control Barrier Functions for Safety-Critical Systems
Authors:
Ehsan Sabouni,
H. M. Sabbir Ahmad,
Vittorio Giammarino,
Christos G. Cassandras,
Ioannis Ch. Paschalidis,
Wenchao Li
Abstract:
Optimal control methods provide solutions to safety-critical problems but easily become intractable. Control Barrier Functions (CBFs) have emerged as a popular technique that facilitates their solution by provably guaranteeing safety, through their forward invariance property, at the expense of some performance loss. This approach involves defining a performance objective alongside CBF-based safet…
▽ More
Optimal control methods provide solutions to safety-critical problems but easily become intractable. Control Barrier Functions (CBFs) have emerged as a popular technique that facilitates their solution by provably guaranteeing safety, through their forward invariance property, at the expense of some performance loss. This approach involves defining a performance objective alongside CBF-based safety constraints that must always be enforced. Unfortunately, both performance and solution feasibility can be significantly impacted by two key factors: (i) the selection of the cost function and associated parameters, and (ii) the calibration of parameters within the CBF-based constraints, which capture the trade-off between performance and conservativeness. %as well as infeasibility. To address these challenges, we propose a Reinforcement Learning (RL)-based Receding Horizon Control (RHC) approach leveraging Model Predictive Control (MPC) with CBFs (MPC-CBF). In particular, we parameterize our controller and use bilevel optimization, where RL is used to learn the optimal parameters while MPC computes the optimal control input. We validate our method by applying it to the challenging automated merging control problem for Connected and Automated Vehicles (CAVs) at conflicting roadways. Results demonstrate improved performance and a significant reduction in the number of infeasible cases compared to traditional heuristic approaches used for tuning CBF-based controllers, showcasing the effectiveness of the proposed method.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures
Authors:
Majid Abdulsatar,
Hussain Ahmad,
Diksha Goel,
Faheem Ullah
Abstract:
The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security r…
▽ More
The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security risks associated with microservice architectures. To address this issue, we propose CyberWise Predictor, a framework designed for predicting and assessing security risks associated with microservice architectures. Our framework employs deep learning-based natural language processing models to analyze vulnerability descriptions for predicting vulnerability metrics to assess security risks. Our experimental evaluation shows the effectiveness of CyberWise Predictor, achieving an average accuracy of 92% in automatically predicting vulnerability metrics for new vulnerabilities. Our framework and findings serve as a guide for software developers to identify and mitigate security risks in microservice architectures.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Smart HPA: A Resource-Efficient Horizontal Pod Auto-scaler for Microservice Architectures
Authors:
Hussain Ahmad,
Christoph Treude,
Markus Wagner,
Claudia Szabo
Abstract:
Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, container orchestration platforms such as Kubernetes feature Horizontal Pod Auto-scalers (HPAs) designed to adjust the resources of microservices to accommodate fluctuating workloads. However, existin…
▽ More
Microservice architectures have gained prominence in both academia and industry, offering enhanced agility, reusability, and scalability. To simplify scaling operations in microservice architectures, container orchestration platforms such as Kubernetes feature Horizontal Pod Auto-scalers (HPAs) designed to adjust the resources of microservices to accommodate fluctuating workloads. However, existing HPAs are not suitable for resource-constrained environments, as they make scaling decisions based on the individual resource capacities of microservices, leading to service unavailability and performance degradation. Furthermore, HPA architectures exhibit several issues, including inefficient data processing and a lack of coordinated scaling operations. To address these concerns, we propose Smart HPA, a flexible resource-efficient horizontal pod auto-scaler. It features a hierarchical architecture that integrates both centralized and decentralized architectural styles to leverage their respective strengths while addressing their limitations. We introduce resource-efficient heuristics that empower Smart HPA to exchange resources among microservices, facilitating effective auto-scaling of microservices in resource-constrained environments. Our experimental results show that Smart HPA outperforms the Kubernetes baseline HPA by reducing resource overutilization, overprovisioning, and underprovisioning while increasing resource allocation to microservice applications.
△ Less
Submitted 26 February, 2024;
originally announced March 2024.
-
Numerical simulations of Josephson Traveling Wave Parametric Amplifiers (JTWPAs): comparative study of open-source tools
Authors:
A. Yu. Levochkina,
H. G. Ahmad,
P. Mastrovito,
I. Chatterjee,
D. Massarotti,
D. Montemurro,
F. Tafuri,
G. P. Pepe,
M. Esposito
Abstract:
Josephson Traveling Wave Parametric Amplifiers (JTWPAs) are largely exploited in quantum technologies for their broadband and low noise performance in the microwave regime. When one or more microwave tones are applied at the input, such devices show a complex wave-mixing response due to their intrinsic nonlinear nature. Numerical simulations of the JTWPAs nonlinear behaviour provide useful insight…
▽ More
Josephson Traveling Wave Parametric Amplifiers (JTWPAs) are largely exploited in quantum technologies for their broadband and low noise performance in the microwave regime. When one or more microwave tones are applied at the input, such devices show a complex wave-mixing response due to their intrinsic nonlinear nature. Numerical simulations of the JTWPAs nonlinear behaviour provide useful insights not only for the design of such devices, but also for the interpretation and validation of the experimental results. Here we present and discuss a comparative analysis of different open-source tools which can be used for JTWPAs numerical simulations. We focus on two tools for transient simulations, WRSPICE and PSCAN2, and on one tool for direct simulation of the frequency domain behaviour, JosephsonCircuit.jl. We describe the working principle of these three tools and test them considering as a benchmark a JTWPA based on SNAILs (Superconducting Nonlinear Asymmetric Inductive eLement) with realistic experimental parameters. Our results can serve as a guide for numerical simulations of JTWPAs with open-source tools, highlighting advantages and disadvantages depending on the simulation tasks.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Mitigating Errors on Superconducting Quantum Processors through Fuzzy Clustering
Authors:
Halima G. Ahmad,
Roberto Schiattarella,
Pasquale Mastrovito,
Angela Chiatto,
Anna Levochkina,
Martina Esposito,
Domenico Montemurro,
Giovanni P. Pepe,
Alessandro Bruno,
Francesco Tafuri,
Autilia Vitiello,
Giovanni Acampora,
Davide Massarotti
Abstract:
Quantum utility has been severely limited in superconducting quantum hardware until now by the modest number of qubits and the relatively high level of control and readout errors, due to the intentional coupling with the external environment required for manipulation and readout of the qubit states. Practical applications in the Noisy Intermediate Scale Quantum (NISQ) era rely on Quantum Error Mit…
▽ More
Quantum utility has been severely limited in superconducting quantum hardware until now by the modest number of qubits and the relatively high level of control and readout errors, due to the intentional coupling with the external environment required for manipulation and readout of the qubit states. Practical applications in the Noisy Intermediate Scale Quantum (NISQ) era rely on Quantum Error Mitigation (QEM) techniques, which are able to improve the accuracy of the expectation values of quantum observables by implementing classical post-processing analysis from an ensemble of repeated noisy quantum circuit runs. In this work, we focus on a recent QEM technique that uses Fuzzy C-Means (FCM) clustering to specifically identify measurement error patterns. For the first time, we report a proof-of-principle validation of the technique on a 2-qubit register, obtained as a subset of a real NISQ 5-qubit superconducting quantum processor based on transmon qubits. We demonstrate that the FCM-based QEM technique allows for reasonable improvement of the expectation values of single- and two-qubit gates based quantum circuits, without necessarily invoking state-of-the-art coherence, gate, and readout fidelities.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Capacity Constraint Analysis Using Object Detection for Smart Manufacturing
Authors:
Hafiz Mughees Ahmad,
Afshin Rahimi,
Khizer Hayat
Abstract:
The increasing popularity of Deep Learning (DL) based Object Detection (OD) methods and their real-world applications have opened new venues in smart manufacturing. Traditional industries struck by capacity constraints after Coronavirus Disease (COVID-19) require non-invasive methods for in-depth operations' analysis to optimize and increase their revenue. In this study, we have initially develope…
▽ More
The increasing popularity of Deep Learning (DL) based Object Detection (OD) methods and their real-world applications have opened new venues in smart manufacturing. Traditional industries struck by capacity constraints after Coronavirus Disease (COVID-19) require non-invasive methods for in-depth operations' analysis to optimize and increase their revenue. In this study, we have initially developed a Convolutional Neural Network (CNN) based OD model to tackle this issue. This model is trained to accurately identify the presence of chairs and individuals on the production floor. The identified objects are then passed to the CNN based tracker, which tracks them throughout their life cycle in the workstation. The extracted meta-data is further processed through a novel framework for the capacity constraint analysis. We identified that the Station C is only 70.6% productive through 6 months. Additionally, the time spent at each station is recorded and aggregated for each object. This data proves helpful in conducting annual audits and effectively managing labor and material over time.
△ Less
Submitted 31 January, 2024;
originally announced February 2024.
-
Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions
Authors:
H M Sabbir Ahmad,
Ehsan Sabouni,
Akua Dickson,
Wei Xiao,
Christos G. Cassandras,
Wenchao Li
Abstract:
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to safely navigate through a conflict area (e.g., traffic intersections, merging roadways, roundabouts). Previous studies have shown that such a network can be targeted by adversarial attacks causing traffic jams or safety violations ending in collisions. We focus on attacks targeting the V2X communication…
▽ More
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to safely navigate through a conflict area (e.g., traffic intersections, merging roadways, roundabouts). Previous studies have shown that such a network can be targeted by adversarial attacks causing traffic jams or safety violations ending in collisions. We focus on attacks targeting the V2X communication network used to share vehicle data and consider as well uncertainties due to noise in sensor measurements and communication channels. To combat these, motivated by recent work on the safe control of CAVs, we propose a trust-aware robust event-triggered decentralized control and coordination framework that can provably guarantee safety. We maintain a trust metric for each vehicle in the network computed based on their behavior and used to balance the tradeoff between conservativeness (when deeming every vehicle as untrustworthy) and guaranteed safety and security. It is important to highlight that our framework is invariant to the specific choice of the trust framework. Based on this framework, we propose an attack detection and mitigation scheme which has twofold benefits: (i) the trust framework is immune to false positives, and (ii) it provably guarantees safety against false positive cases. We use extensive simulations (in SUMO and CARLA) to validate the theoretical guarantees and demonstrate the efficacy of our proposed scheme to detect and mitigate adversarial attacks.
△ Less
Submitted 25 March, 2024; v1 submitted 4 January, 2024;
originally announced January 2024.
-
Attention based Dual-Branch Complex Feature Fusion Network for Hyperspectral Image Classification
Authors:
Mohammed Q. Alkhatib,
Mina Al-Saad,
Nour Aburaed,
M. Sami Zitouni,
Hussain Al Ahmad
Abstract:
This research work presents a novel dual-branch model for hyperspectral image classification that combines two streams: one for processing standard hyperspectral patches using Real-Valued Neural Network (RVNN) and the other for processing their corresponding Fourier transforms using Complex-Valued Neural Network (CVNN). The proposed model is evaluated on the Pavia University and Salinas datasets.…
▽ More
This research work presents a novel dual-branch model for hyperspectral image classification that combines two streams: one for processing standard hyperspectral patches using Real-Valued Neural Network (RVNN) and the other for processing their corresponding Fourier transforms using Complex-Valued Neural Network (CVNN). The proposed model is evaluated on the Pavia University and Salinas datasets. Results show that the proposed model outperforms state-of-the-art methods in terms of overall accuracy, average accuracy, and Kappa. Through the incorporation of Fourier transforms in the second stream, the model is able to extract frequency information, which complements the spatial information extracted by the first stream. The combination of these two streams improves the overall performance of the model. Furthermore, to enhance the model performance, the Squeeze and Excitation (SE) mechanism has been utilized. Experimental evidence show that SE block improves the models overall accuracy by almost 1\%.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
Gamma-Bazilevic functions related with generalized telephone numbers
Authors:
Gangadharan Murugusundaramoorthy,
kaliappan Vijaya,
Hijaz Ahmad
Abstract:
The purpose of this paper is to consider coefficient estimates in a class of functions $\mathfrak{G}_{\vartheta}^κ(\mathcal{X},\varkappa)$ consisting of analytic functions $f$ normalized by $f(0)=f'(0)-1=0$\ in the open unit disk $Δ=\{ z:z\in \mathbb{C}\quad \text{and}\quad \left\vert z\right\vert <1\}$ subordinating generalized telephone numbers, to derive certain coefficient estimates $a_2,a_3$…
▽ More
The purpose of this paper is to consider coefficient estimates in a class of functions $\mathfrak{G}_{\vartheta}^κ(\mathcal{X},\varkappa)$ consisting of analytic functions $f$ normalized by $f(0)=f'(0)-1=0$\ in the open unit disk $Δ=\{ z:z\in \mathbb{C}\quad \text{and}\quad \left\vert z\right\vert <1\}$ subordinating generalized telephone numbers, to derive certain coefficient estimates $a_2,a_3$ and Fekete-Szegö inequality for $f\in\mathfrak{G}_{\vartheta}^κ(\mathcal{X},\varkappa)$. A similar results have been done for the function $ f^{-1} $ and $\log\dfrac{f(z)}{z}.$Similarly application of our results to certain functions defined by using convolution products with a normalized analytic function is given, and in particular we state Fekete-Szeg"{o} inequalities for subclasses described through Poisson Borel and Pascal distribution series.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
Optimal Control of Connected Automated Vehicles with Event-Triggered Control Barrier Functions: a Test Bed for Safe Optimal Merging
Authors:
Ehsan Sabouni,
H. M. Sabbir Ahmad,
Wei Xiao,
Christos G. Cassandras,
Wenchao Li
Abstract:
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints. It has been shown that such problems can be solved through a combination of tractable optimal control problems and Control Barrier Functions (CBFs) that guarantee the satisfaction of all constraints. These solutions can be reduced to a sequence of…
▽ More
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints. It has been shown that such problems can be solved through a combination of tractable optimal control problems and Control Barrier Functions (CBFs) that guarantee the satisfaction of all constraints. These solutions can be reduced to a sequence of Quadratic Programs (QPs) which are efficiently solved on line over discrete time steps. However, guaranteeing the feasibility of the CBF-based QP method within each discretized time interval requires the careful selection of time steps which need to be sufficiently small. This creates computational requirements and communication rates between agents which may hinder the controller's application to real CAVs. In this paper, we overcome this limitation by adopting an event-triggered approach for CAVs in a conflict area such that the next QP is triggered by properly defined events with a safety guarantee. We present a laboratory-scale test bed we have developed to emulate merging roadways using mobile robots as CAVs which can be used to demonstrate how the event-triggered scheme is computationally efficient and can handle measurement uncertainties and noise compared to time-driven control while guaranteeing safety.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
eXtended Hybridizable Discontinous Galerkin (X-HDG) Method for Linear Convection-Diffusion Equations on Unfitted Domains
Authors:
Haroon Ahmad,
Ceren GĂ¼rkan
Abstract:
In this work, we propose a novel strategy for the numerical solution of linear convection diffusion equation (CDE) over unfitted domains. In the proposed numerical scheme, strategies from high order Hybridized Discontinuous Galerkin method and eXtended Finite Element method is combined with the level set definition of the boundaries. The proposed scheme and hence, is named as eXtended Hybridizable…
▽ More
In this work, we propose a novel strategy for the numerical solution of linear convection diffusion equation (CDE) over unfitted domains. In the proposed numerical scheme, strategies from high order Hybridized Discontinuous Galerkin method and eXtended Finite Element method is combined with the level set definition of the boundaries. The proposed scheme and hence, is named as eXtended Hybridizable Discontinuous Galerkin (XHDG) method. In this regard, the Hybridizable Discontinuous Galerkin (HDG) method is eXtended to the unfitted domains; i.e, the computational mesh does not need to fit to the domain boundary; instead, the boundary is defined by a level set function and cuts through the background mesh arbitrarily. The original unknown structure of HDG and its hybrid nature ensuring the local conservation of fluxes is kept, while develo** a modified bilinear form for the elements cut by the boundary. At every cut element, an auxiliary nodal trace variable on the boundary is introduced, which is eliminated afterwards while imposing the boundary conditions. Both stationary and time dependent CDEs are studied over a range of flow regimes from diffusion to convection dominated; using high order $(p \leq 4)$ XHDG through benchmark numerical examples over arbitrary unfitted domains. Results proved that XHDG inherits optimal $(p + 1)$ and super $(p + 2)$ convergence properties of HDG while removing the fitting mesh restriction.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Trust-Aware Resilient Control and Coordination of Connected and Automated Vehicles
Authors:
H M Sabbir Ahmad,
Ehsan Sabouni,
Wei Xiao,
Christos G. Cassandras,
Wenchao Li
Abstract:
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can cause safety violations resulting in collisions and traffic jams. In addition, uncooperative (but not necessarily adversarial) CAVs can also induce similar adversarial effects on the traffic network. We propose a decentralize…
▽ More
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can cause safety violations resulting in collisions and traffic jams. In addition, uncooperative (but not necessarily adversarial) CAVs can also induce similar adversarial effects on the traffic network. We propose a decentralized resilient control and coordination scheme that mitigates the effects of adversarial attacks and uncooperative CAVs by utilizing a trust framework. Our trust-aware scheme can guarantee safe collision free coordination and mitigate traffic jams. Simulation results validate the theoretical guarantee of our proposed scheme, and demonstrate that it can effectively mitigate adversarial effects across different traffic scenarios.
△ Less
Submitted 2 June, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Merging control in mixed traffic with safety guarantees: a safe sequencing policy with optimal motion control
Authors:
Ehsan Sabouni,
H. M. Sabbir Ahmad,
Christos G. Cassandras,
Wenchao Li
Abstract:
We address the problem of merging traffic from two roadways consisting of both Connected Autonomous Vehicles (CAVs) and Human Driven Vehicles (HDVs). Guaranteeing safe merging in such mixed traffic settings is challenging due to the unpredictability of possibly uncooperative HDVs. We develop a hierarchical controller where at each discrete time step first a coordinator determines the best possible…
▽ More
We address the problem of merging traffic from two roadways consisting of both Connected Autonomous Vehicles (CAVs) and Human Driven Vehicles (HDVs). Guaranteeing safe merging in such mixed traffic settings is challenging due to the unpredictability of possibly uncooperative HDVs. We develop a hierarchical controller where at each discrete time step first a coordinator determines the best possible Safe Sequence (SS) which can be realized without any knowledge of human driving behavior. Then, a lower-level decentralized motion controller for each CAV jointly minimizes travel time and energy over a prediction horizon, subject to hard safety constraints dependent on the given safe sequence. This is accomplished using a Model Predictive Controller (MPC) subject to constraints based on Control Barrier Functions (CBFs) which render it computationally efficient. Extensive simulation results are included showing that this hierarchical controller outperforms the commonly adopted Shortest Distance First (SDF) passing sequence over the full range of CAV penetration rates, while also providing safe merging guarantees.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
"I think this is the most disruptive technology": Exploring Sentiments of ChatGPT Early Adopters using Twitter Data
Authors:
Mubin Ul Haque,
Isuru Dharmadasa,
Zarrin Tasnim Sworna,
Roshan Namal Rajapakse,
Hussain Ahmad
Abstract:
Large language models have recently attracted significant attention due to their impressive performance on a variety of tasks. ChatGPT developed by OpenAI is one such implementation of a large, pre-trained language model that has gained immense popularity among early adopters, where certain users go to the extent of characterizing it as a disruptive technology in many domains. Understanding such e…
▽ More
Large language models have recently attracted significant attention due to their impressive performance on a variety of tasks. ChatGPT developed by OpenAI is one such implementation of a large, pre-trained language model that has gained immense popularity among early adopters, where certain users go to the extent of characterizing it as a disruptive technology in many domains. Understanding such early adopters' sentiments is important because it can provide insights into the potential success or failure of the technology, as well as its strengths and weaknesses. In this paper, we conduct a mixed-method study using 10,732 tweets from early ChatGPT users. We first use topic modelling to identify the main topics and then perform an in-depth qualitative sentiment analysis of each topic. Our results show that the majority of the early adopters have expressed overwhelmingly positive sentiments related to topics such as Disruptions to software development, Entertainment and exercising creativity. Only a limited percentage of users expressed concerns about issues such as the potential for misuse of ChatGPT, especially regarding topics such as Impact on educational aspects. We discuss these findings by providing specific examples for each topic and then detail implications related to addressing these concerns for both researchers and users.
△ Less
Submitted 12 December, 2022;
originally announced December 2022.
-
Data Dimension Reduction makes ML Algorithms efficient
Authors:
Wisal Khan,
Muhammad Turab,
Waqas Ahmad,
Syed Hasnat Ahmad,
Kelash Kumar,
Bin Luo
Abstract:
Data dimension reduction (DDR) is all about map** data from high dimensions to low dimensions, various techniques of DDR are being used for image dimension reduction like Random Projections, Principal Component Analysis (PCA), the Variance approach, LSA-Transform, the Combined and Direct approaches, and the New Random Approach. Auto-encoders (AE) are used to learn end-to-end map**. In this pap…
▽ More
Data dimension reduction (DDR) is all about map** data from high dimensions to low dimensions, various techniques of DDR are being used for image dimension reduction like Random Projections, Principal Component Analysis (PCA), the Variance approach, LSA-Transform, the Combined and Direct approaches, and the New Random Approach. Auto-encoders (AE) are used to learn end-to-end map**. In this paper, we demonstrate that pre-processing not only speeds up the algorithms but also improves accuracy in both supervised and unsupervised learning. In pre-processing of DDR, first PCA based DDR is used for supervised learning, then we explore AE based DDR for unsupervised learning. In PCA based DDR, we first compare supervised learning algorithms accuracy and time before and after applying PCA. Similarly, in AE based DDR, we compare unsupervised learning algorithm accuracy and time before and after AE representation learning. Supervised learning algorithms including support-vector machines (SVM), Decision Tree with GINI index, Decision Tree with entropy and Stochastic Gradient Descent classifier (SGDC) and unsupervised learning algorithm including K-means clustering, are used for classification purpose. We used two datasets MNIST and FashionMNIST Our experiment shows that there is massive improvement in accuracy and time reduction after pre-processing in both supervised and unsupervised learning.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
Electroencephalography and mild cognitive impairment research: A sco** review and bibliometric analysis (ScoRBA)
Authors:
Adi Wijaya,
Noor Akhmad Setiawan,
Asma Hayati Ahmad,
Rahimah Zakaria,
Zahiruddin Othman
Abstract:
Background: Mild cognitive impairment (MCI) is often considered a precursor to Alzheimer's disease (AD) due to the high rate of progression from MCI to AD. Sensitive neural biomarkers may provide a tool for an accurate MCI diagnosis, enabling earlier and perhaps more effective treatment. Despite the availability of numerous neuroscience techniques, electroencephalography (EEG) is the most popular…
▽ More
Background: Mild cognitive impairment (MCI) is often considered a precursor to Alzheimer's disease (AD) due to the high rate of progression from MCI to AD. Sensitive neural biomarkers may provide a tool for an accurate MCI diagnosis, enabling earlier and perhaps more effective treatment. Despite the availability of numerous neuroscience techniques, electroencephalography (EEG) is the most popular and frequently used tool among researchers due to its low cost and superior temporal resolution. Objective: We conducted a sco** review of EEG and MCI between 2012 and 2022 to track the progression of research in this field. Methods: In contrast to previous sco** reviews, the data charting was aided by co-occurrence analysis using VOSviewer, while data reporting adopted a Patterns, Advances, Gaps, Evidence of Practice, and Research Recommendations (PAGER) framework to increase the quality of the results. Results: Event-related potentials (ERPs) and EEG, epilepsy, quantitative EEG (QEEG), and EEG-based machine learning were the research themes addressed by 2310 peer-reviewed articles on EEG and MCI. Conclusion: Our review identified the main research themes in EEG and MCI with high-accuracy detection of seizure and MCI performed using ERP/EEG, QEEG and EEG-based machine learning frameworks.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
A hybrid ferromagnetic transmon qubit: circuit design, feasibility and detection protocols for magnetic fluctuations
Authors:
Halima Giovanna Ahmad,
Valentina Brosco,
Alessandro Miano,
Luigi Di Palma,
Marco Arzeo,
Domenico Montemurro,
Procolo Lucignano,
Giovanni Piero Pepe,
Francesco Tafuri,
Rosario Fazio,
Davide Massarotti
Abstract:
We propose to exploit currently available tunnel ferromagnetic Josephson junctions to realize a hybrid superconducting qubit. We show that the characteristic hysteretic behavior of the ferromagnetic barrier provides an alternative and intrinsically digital tuning of the qubit frequency by means of magnetic field pulses. To illustrate functionalities and limitation of the device, we discuss the cou…
▽ More
We propose to exploit currently available tunnel ferromagnetic Josephson junctions to realize a hybrid superconducting qubit. We show that the characteristic hysteretic behavior of the ferromagnetic barrier provides an alternative and intrinsically digital tuning of the qubit frequency by means of magnetic field pulses. To illustrate functionalities and limitation of the device, we discuss the coupling to a read-out resonator and the effect of magnetic fluctuations. The possibility to use the qubit as a noise detector and its relevance to investigate the subtle interplay of magnetism and superconductivity is envisaged.
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
Nabla Fractional Derivative and Fractional Integral on Time Scales
Authors:
Bikash Gogoi,
Utpal Kumar Saha,
Bipan Hazarika,
Delfim F. M. Torres,
Hijaz Ahmad
Abstract:
In this paper, we introduce the nabla fractional derivative and fractional integral on time scales in the Riemann-Liouville sense. We also introduce the nabla fractional derivative in GrĂ¼nwald-Letnikov sense. Some of the basic properties and theorems related to nabla fractional calculus are discussed.
In this paper, we introduce the nabla fractional derivative and fractional integral on time scales in the Riemann-Liouville sense. We also introduce the nabla fractional derivative in GrĂ¼nwald-Letnikov sense. Some of the basic properties and theorems related to nabla fractional calculus are discussed.
△ Less
Submitted 24 December, 2021;
originally announced December 2021.
-
Trends in Publishing Blockchain Surveys: A Bibliometric Perspective
Authors:
Hira Ahmad,
Muhammad Ahtazaz Ahsan,
Adnan Noor Mian
Abstract:
A large number of survey papers are being published in blockchain since the first survey appeared in 2017. A person entering into the field of blockchain is faced with the issue of which blockchain surveys to read and why? Who is publishing these surveys and what is the nature of these surveys? Which of the publishers are publishing more such surveys and what are the lengths of the published surve…
▽ More
A large number of survey papers are being published in blockchain since the first survey appeared in 2017. A person entering into the field of blockchain is faced with the issue of which blockchain surveys to read and why? Who is publishing these surveys and what is the nature of these surveys? Which of the publishers are publishing more such surveys and what are the lengths of the published surveys? Which kind of survey is getting more citations? Which of the authors is collaborating on such surveys? etc. All these questions motivated us to analyze the trends in publishing blockchain surveys. In this paper, we have performed a bibliometric analysis on $801$ surveys or review papers published in the field of blockchain in the last approximately five years. We have analyzed the papers with respect to the publication type, publishers and venue, references, citations, paper length, different categories, year, countries, authors, and their collaborations and found interesting insights. To the best of our knowledge, this study is the first of its kind and hope to provide better understanding of the field.
△ Less
Submitted 11 January, 2022; v1 submitted 20 September, 2021;
originally announced September 2021.
-
Thematic analysis of multiple sclerosis research by enhanced strategic diagram
Authors:
Nazlahshaniza Shafina,
Che Aishah Nazariah Ismaila,
Mohd Zulkifli Mustafa,
Nurhafizah Ghani,
Asma Hayati Ahmad,
Zahiruddin Othman,
Adi Wijaya,
Rahimah Zakaria
Abstract:
This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the…
▽ More
This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the enhanced strategic diagram were "covid-19", "teriflunomide", "clinical trial", "microglia", "b cells", "myelin", "brain", "white matter", "functional connectivity", "pain", "employment", "health-related quality of life", "meta-analysis" and "comorbidity". In conclusion, this study demonstrates the tremendous growth of MS literature worldwide, which is expected to grow more than double during the next decade especially in the identified emerging topics.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
Using Biological Variables and Social Determinants to Predict Malaria and Anemia among Children in Senegal
Authors:
Boubacar Sow,
Hiroki Suguri,
Hamid Mukhtar,
Hafiz Farooq Ahmad
Abstract:
Integrating machine learning techniques in healthcare becomes very common nowadays, and it contributes positively to improving clinical care and health decisions planning. Anemia and malaria are two life-threatening diseases in Africa that affect the red blood cells and reduce hemoglobin production. This paper focuses on analyzing child health data in Senegal using four machine learning algorithms…
▽ More
Integrating machine learning techniques in healthcare becomes very common nowadays, and it contributes positively to improving clinical care and health decisions planning. Anemia and malaria are two life-threatening diseases in Africa that affect the red blood cells and reduce hemoglobin production. This paper focuses on analyzing child health data in Senegal using four machine learning algorithms in Python: KNN, Random Forests, SVM, and NaĂ¯ve Bayes. Our task aims to investigate large-scale data from The Demographic and Health Survey (DHS) and to find out hidden information for anemia and malaria. We present two classification models for the two blood disorders using biological variables and social determinants. The findings of this research will contribute to improving child healthcare in Senegal by eradicating anemia and malaria, and decreasing the child mortality rate.
△ Less
Submitted 8 August, 2021;
originally announced August 2021.
-
Inverse magnetic hysteresis of the Josephson supercurrent: study of the magnetic properties of thin niobium/permalloy (Fe_{20}Ni_{80}) interfaces
Authors:
Roberta Satariano,
Loredana Parlato,
Antonio Vettoliere,
Roberta Caruso,
Halima Giovanna Ahmad,
Alessandro Miano,
Luigi Di Palma,
Daniela Salvoni,
Domenico Montemurro,
Carmine Granata,
Gianrico Lamura,
Francesco Tafuri,
Giovanni Piero Pepe,
Davide Massarotti,
Giovanni Ausanio
Abstract:
We propose a picture for the magnetic properties of superconductor/ferromagnet (S/F) heterostructures based on Nb and permalloy (Py: Fe_{20}Ni_{80}). By measuring the magnetic moment as a function of the temperature in S/F/S trilayers for different thicknesses of the middle F layer, we give evidence of the presence of a magnetic stray field of the F layer. For values of F-layer thickness below a t…
▽ More
We propose a picture for the magnetic properties of superconductor/ferromagnet (S/F) heterostructures based on Nb and permalloy (Py: Fe_{20}Ni_{80}). By measuring the magnetic moment as a function of the temperature in S/F/S trilayers for different thicknesses of the middle F layer, we give evidence of the presence of a magnetic stray field of the F layer. For values of F-layer thickness below a threshold, we establish a correlation between the magnetic measurements of the S/F/S trilayers and the anomalous magnetic dependence of the critical current in S/insulator/thin superconducting film/F/S (SIsFS) Josephson junctions (JJs). These complementary investigations provide a self-consistent method to fully characterize S/F heterostructures and possibly demonstrate effects arising from the mutual interactions between ferromagnetism and superconductivity. A shift in the Fraunhofer critical current oscillations has been observed in the opposite direction to the one commonly observed in JJs with F barriers, as it has been recently predicted by inverse and electromagnetic proximity theories. This inverse memory effect is relevant for the design of these heterostructures as memory cells and spintronic devices.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
Coexistence and tuning of spin-singlet and triplet transport in spin-filter Josephson junctions
Authors:
H. G. Ahmad,
M. Minutillo,
R. Capecelatro,
A. Pal,
R. Caruso,
G. Passarelli,
M. G. Blamire,
F. Tafuri,
P. Lucignano,
D. Massarotti
Abstract:
The increased capabilities of coupling more and more materials through functional interfaces are paving the way to a series of exciting experiments and extremely advanced devices. Here we focus on the capability of magnetically inhomogeneous superconductor/ferromagnet (S/F) interfaces to generate spin-polarized triplet pairs. We build on previous achievements on spin-filter ferromagnetic Josephson…
▽ More
The increased capabilities of coupling more and more materials through functional interfaces are paving the way to a series of exciting experiments and extremely advanced devices. Here we focus on the capability of magnetically inhomogeneous superconductor/ferromagnet (S/F) interfaces to generate spin-polarized triplet pairs. We build on previous achievements on spin-filter ferromagnetic Josephson junctions (JJs) and find unique correspondence between neat experimental benchmarks in the temperature behavior of the critical current and theoretical modeling based on microscopic calculations, which allow us to determine a posteriori spin-singlet and triplet correlation functions. This kind of combined analysis provides accurate proof of the coexistence and tunability of singlet and triplet transport. This turns to be a unique opportunity to model disorder and spin-mixing effects in a JJ to enlarge the space of parameters, which regulate the phenomenology of the Josephson effect and could be applied to a variety of novel types of JJs.
△ Less
Submitted 10 January, 2022; v1 submitted 29 June, 2021;
originally announced June 2021.
-
Room And Cryogenic Temperature Behaviour of Magnetic Sensors Based on Gan/Si Single Saw Resonators
Authors:
Alexandra Nicoloiu,
Florin Ciubotaru,
Claudia Nastase,
Adrian Dinescu,
Sergiu Iordanescu,
Hasnain Ahmad,
Philipp Pirro,
Christoph Adelmann,
Alexandru MĂ¼ller
Abstract:
This work analyzes resonance frequency shift vs. the applied magnetic field strength for GHz operating GaN/Si SAW single resonators. Magnetostrictive elements (Ni and CoFeB) were deposited in the proximity of the interdigitated transducers (IDTs) of the resonators (A-type structures) and also over the IDTs, after covering them with a BCB layer to avoid short circuits with IDTs metal (B-type struct…
▽ More
This work analyzes resonance frequency shift vs. the applied magnetic field strength for GHz operating GaN/Si SAW single resonators. Magnetostrictive elements (Ni and CoFeB) were deposited in the proximity of the interdigitated transducers (IDTs) of the resonators (A-type structures) and also over the IDTs, after covering them with a BCB layer to avoid short circuits with IDTs metal (B-type structures). This work targets emerging applications of SAW resonators in driving spin wave pum** and in coupling of surface acoustic waves (SAW) with superconducting Q-bits. Magnetic sensitivity of the SAWs was analyzed at room temperature (RT) and at cryogenic temperatures, obtaining high magnetic sensitivities at 16 K. According to our knowledge, GaN based SAWs are first time used in magnetic applications; also, cryogenic behavior of magnetic SAW sensors is first time analyzed.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
Authors:
Hussain Ahmad,
Isuru Dharmadasa,
Faheem Ullah,
M. Ali Babar
Abstract:
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or…
▽ More
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. Unlike traditional systems facing widespread cyber-attacks, the sensitive nature of C3I tactical operations make their cybersecurity a critical concern. For instance, tampering or intercepting confidential information in military battlefields not only damages C3I operations, but also causes irreversible consequences such as loss of human lives and mission failures. Therefore, C3I systems have become a focal point for cyber adversaries. Moreover, technological advancements and modernization of C3I systems have significantly increased the potential risk of cyber-attacks on C3I systems. Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems. Despite the burgeoning significance of cybersecurity for C3I systems, the existing literature lacks a comprehensive review to systematize the body of knowledge on C3I systems' security. Therefore, in this paper, we have gathered, analyzed, and synthesized the state-of-the-art on the cybersecurity of C3I systems. In particular, this paper has identified security vulnerabilities, attack vectors, and countermeasures/defenses for C3I systems. Furthermore, our survey has enabled us to: (i) propose a taxonomy for security vulnerabilities, attack vectors and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures; and (iii) propose future research directions for advancing the state-of-the-art on the cybersecurity of C3I systems.
△ Less
Submitted 31 January, 2022; v1 submitted 24 April, 2021;
originally announced April 2021.
-
Intelligent Stretch Reduction in Information-CentricNetworking towards 5G-Tactile Internet realization
Authors:
Hussain Ahmad,
Muhammad Zubair Islam,
Amir Haider,
Rashid Ali,
Hyung Seok Kim
Abstract:
In recent years, 5G is widely used in parallel with IoT networks to enable massive data connectivity and exchange with ultra-reliable and low latency communication (URLLC) services. The internet requirements from user's perspective have shifted from simple human to human interactions to different communication paradigms and information-centric networking (ICN). ICN distributes the content among t…
▽ More
In recent years, 5G is widely used in parallel with IoT networks to enable massive data connectivity and exchange with ultra-reliable and low latency communication (URLLC) services. The internet requirements from user's perspective have shifted from simple human to human interactions to different communication paradigms and information-centric networking (ICN). ICN distributes the content among the users based on their trending requests. ICN is responsible not only for the routing and caching but also for naming the network's content. ICN considers several parameters such as cache-hit ratio, content diversity, content redundancy, and stretch to route the content. ICN enables name-based caching of the required content according to the user's request based on the router's interest table. The stretch shows the path covered while retrieving the content from producer to consumer. Reduction in path length also leads to a reduction in end-to-end latency and better data rate availability. ICN routers must have the minimum stretch to obtain a better system efficiency. Reinforcement learning (RL) is widely used in networks environment to increase agent efficiency to make decisions. In ICN, RL can aid to increase caching and stretch efficiency. This paper investigates a stretch reduction strategy for ICN routers by formulating the stretch reduction problem as a Markov decision process. The evaluation of the proposed stretch reduction strategy's accuracy is done by employing Q-Learning, an RL technique. The simulation results indicate that by using the optimal parameters for the proposed stretch reduction strategy.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
A Program Logic to Verify Signal Temporal Logic Specifications of Hybrid Systems: Extended Technical Report
Authors:
Hammad Ahmad,
Jean-Baptiste Jeannin
Abstract:
Signal temporal logic (STL) was introduced for monitoring temporal properties of continuous-time signals for continuous and hybrid systems. Differential dynamic logic (dL) was introduced to reason about the end states of a hybrid program. Over the past decade, STL and its variants have significantly gained in popularity in the industry for monitoring purposes, while dL has gained in popularity for…
▽ More
Signal temporal logic (STL) was introduced for monitoring temporal properties of continuous-time signals for continuous and hybrid systems. Differential dynamic logic (dL) was introduced to reason about the end states of a hybrid program. Over the past decade, STL and its variants have significantly gained in popularity in the industry for monitoring purposes, while dL has gained in popularity for verification of hybrid systems. In this paper, we bridge the gap between the two different logics by introducing signal temporal dynamic logic (STdL) -- a dynamic logic that reasons about a subset of STL specifications over executions of hybrid systems. Our work demonstrates that STL can be used for deductive verification of hybrid systems. STdL significantly augments the expressiveness of dL by allowing reasoning about temporal properties in given time intervals. We provide a semantics and a proof calculus for STdL, along with a proof of soundness and relative completeness.
△ Less
Submitted 15 March, 2021; v1 submitted 14 March, 2021;
originally announced March 2021.
-
Thermal conductivity measurements of sub-surface buried substrates by steady-state thermoreflectance
Authors:
Md Shafkat Bin Hoque,
Yee Rui Koh,
Kiumars Aryana,
Eric Hoglund,
Jeffrey L. Braun,
David H. Olson,
John T. Gaskins,
Habib Ahmad,
Mirza Mohammad Mahbube Elahi,
Jennifer K. Hite,
Zayd C. Leseman,
W. Alan Doolittle,
Patrick E. Hopkins
Abstract:
Measuring the thermal conductivity of sub-surface buried substrates are of significant practical interests. However, this remains challenging with traditional pump-probe spectroscopies due to their limited thermal penetration depths (TPD). Here, we experimentally and numerically investigate the TPD of recently developed optical pump-probe technique steady-state thermoreflectance (SSTR) and explore…
▽ More
Measuring the thermal conductivity of sub-surface buried substrates are of significant practical interests. However, this remains challenging with traditional pump-probe spectroscopies due to their limited thermal penetration depths (TPD). Here, we experimentally and numerically investigate the TPD of recently developed optical pump-probe technique steady-state thermoreflectance (SSTR) and explore its capability for measuring the thermal properties of buried substrates. The conventional definition of the TPD does not truly represent the upper limit of how far beneath the surface SSTR can probe. For estimating the uncertainty of SSTR measurements of a buried substrate a priori, sensitivity calculations provide the best means. Thus, detailed sensitivity calculations are provided to guide future measurements. Due to the steady-state nature of SSTR, it can measure the thermal conductivity of buried substrates typically inaccessible by traditional pump-probe techniques, exemplified by measuring three control samples. We also discuss the required criteria for SSTR to isolate the thermal properties of a buried film. Our study establishes SSTR as a suitable technique for thermal characterizations of sub-surface buried substrates in typical device geometries.
△ Less
Submitted 25 February, 2021;
originally announced February 2021.
-
Smart Grid: A Survey of Architectural Elements, Machine Learning and Deep Learning Applications and Future Directions
Authors:
Navod Neranjan Thilakarathne,
Mohan Krishna Kagita,
Dr. Surekha Lanka,
Hussain Ahmad
Abstract:
The Smart grid (SG), generally known as the next-generation power grid emerged as a replacement for ill-suited power systems in the 21st century. It is in-tegrated with advanced communication and computing capabilities, thus it is ex-pected to enhance the reliability and the efficiency of energy distribution with minimum effects. With the massive infrastructure it holds and the underlying communic…
▽ More
The Smart grid (SG), generally known as the next-generation power grid emerged as a replacement for ill-suited power systems in the 21st century. It is in-tegrated with advanced communication and computing capabilities, thus it is ex-pected to enhance the reliability and the efficiency of energy distribution with minimum effects. With the massive infrastructure it holds and the underlying communication network in the system, it introduced a large volume of data that demands various techniques for proper analysis and decision making. Big data analytics, machine learning (ML), and deep learning (DL) plays a key role when it comes to the analysis of this massive amount of data and generation of valuable insights. This paper explores and surveys the Smart grid architectural elements, machine learning, and deep learning-based applications and approaches in the context of the Smart grid. In addition in terms of machine learning-based data an-alytics, this paper highlights the limitations of the current research and highlights future directions as well.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
High phonon-limited mobility of charged and neutral excitons in mono- and bilayer MoTe2
Authors:
Sophia Helmrich,
Alexander W. Achtstein,
Hery Ahmad,
Matthias Kunz,
Bastian Herzog,
Oliver Schoeps,
Ulrike Woggon,
Nina Owschimikow
Abstract:
We analyze the lineshape of the quasiparticle photoluminescence of monolayer and bilayer molybdenum ditelluride in temperature- and excitation intensity-dependent experiments. We confirm the existence of a negatively charged trion in the bilayer based on its emission characteristics and find hints for a coexistence of intra- and interlayer trions with a few meV splitting in energy. From the linesh…
▽ More
We analyze the lineshape of the quasiparticle photoluminescence of monolayer and bilayer molybdenum ditelluride in temperature- and excitation intensity-dependent experiments. We confirm the existence of a negatively charged trion in the bilayer based on its emission characteristics and find hints for a coexistence of intra- and interlayer trions with a few meV splitting in energy. From the lineshape analysis of exciton and trion emission we extract values for exciton and trion deformation potentials as well as acoustical and optical phonon-limited mobilities in MoTe2, with the mobilities showing the highest values so far reported for transition metal dichalcogenides.
△ Less
Submitted 29 April, 2020;
originally announced April 2020.
-
A robust network architecture to detect normal chest X-ray radiographs
Authors:
Ken C. L. Wong,
Mehdi Moradi,
Joy Wu,
Anup Pillai,
Arjun Sharma,
Yaniv Gur,
Hassan Ahmad,
Minnekanti Sunil Chowdary,
Chiranjeevi J,
Kiran Kumar Reddy Polaka,
Venkateswar Wunnava,
DC Reddy,
Tanveer Syeda-Mahmood
Abstract:
We propose a novel deep neural network architecture for normalcy detection in chest X-ray images. This architecture treats the problem as fine-grained binary classification in which the normal cases are well-defined as a class while leaving all other cases in the broad class of abnormal. It employs several components that allow generalization and prevent overfitting across demographics. The model…
▽ More
We propose a novel deep neural network architecture for normalcy detection in chest X-ray images. This architecture treats the problem as fine-grained binary classification in which the normal cases are well-defined as a class while leaving all other cases in the broad class of abnormal. It employs several components that allow generalization and prevent overfitting across demographics. The model is trained and validated on a large public dataset of frontal chest X-ray images. It is then tested independently on images from a clinical institution of differing patient demographics using a three radiologist consensus for ground truth labeling. The model provides an area under ROC curve of 0.96 when tested on 1271 images. We can automatically remove nearly a third of disease-free chest X-ray screening images from the workflow, without introducing any false negatives (100% sensitivity to disease) thus raising the potential of expediting radiology workflows in hospitals in future.
△ Less
Submitted 13 April, 2020;
originally announced April 2020.
-
Electrodynamics of highly spin-polarized tunnel Josephson junctions
Authors:
H. G. Ahmad,
R. Caruso,
A. Pal,
G. Rotoli,
G. P. Pepe,
M. G. Blamire,
F. Tafuri,
D. Massarotti
Abstract:
The continuous development of superconducting electronics is encouraging several studies on hybrid Josephson junctions (JJs) based on superconductor/ferromagnet/superconductor (SFS) heterostructures, as either spintronic devices or switchable elements in quantum and classical circuits. Recent experimental evidence of macroscopic quantum tunneling and of an incomplete 0-pi transition in tunnel-ferr…
▽ More
The continuous development of superconducting electronics is encouraging several studies on hybrid Josephson junctions (JJs) based on superconductor/ferromagnet/superconductor (SFS) heterostructures, as either spintronic devices or switchable elements in quantum and classical circuits. Recent experimental evidence of macroscopic quantum tunneling and of an incomplete 0-pi transition in tunnel-ferromagnetic spin-filter JJs could enhance the capabilities of SFS JJs also as active elements. Here, we provide a self-consistent electrodynamic characterization of NbN/GdN/NbN spin-filter JJs as a function of the barrier thickness, disentangling the high-frequency dissipation effects due to the environment from the intrinsic low-frequency dissipation processes. The fitting of the IV characteristics at 4.2K and at 300mK by using the Tunnel Junction Microscopic model allows us to determine the subgap resistance Rsg, the quality factor Q and the junction capacitance C. These results provide the scaling behavior of the electrodynamic parameters as a function of the barrier thickness, which represents a fundamental step for the feasibility of tunnel ferromagnetic JJs as active elements in classical and quantum circuits, and are of general interest for tunnel junctions other than conventional SIS JJs.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Automatic Weighted Matching Rectifying Rule Discovery for Data Repairing
Authors:
Hiba Abu Ahmad,
Hongzhi Wang
Abstract:
Data repairing is a key problem in data cleaning which aims to uncover and rectify data errors. Traditional methods depend on data dependencies to check the existence of errors in data, but they fail to rectify the errors. To overcome this limitation, recent methods define repairing rules on which they depend to detect and fix errors. However, all existing data repairing rules are provided by expe…
▽ More
Data repairing is a key problem in data cleaning which aims to uncover and rectify data errors. Traditional methods depend on data dependencies to check the existence of errors in data, but they fail to rectify the errors. To overcome this limitation, recent methods define repairing rules on which they depend to detect and fix errors. However, all existing data repairing rules are provided by experts which is an expensive task in time and effort. Besides, rule-based data repairing methods need an external verified data source or user verifications; otherwise they are incomplete where they can repair only a small number of errors. In this paper, we define weighted matching rectifying rules (WMRRs) based on similarity matching to capture more errors. We propose a novel algorithm to discover WMRRs automatically from dirty data in-hand. We also develop an automatic algorithm for rules inconsistency resolution. Additionally, based on WMRRs, we propose an automatic data repairing algorithm (WMRR-DR) which uncovers a large number of errors and rectifies them dependably. We experimentally verify our method on both real-life and synthetic data. The experimental results prove that our method can discover effective WMRRs from the dirty data in-hand, and perform dependable and full-automatic repairing based on the discovered WMRRs, with higher accuracy than the existing dependable methods.
△ Less
Submitted 21 September, 2019;
originally announced September 2019.
-
Excitation and propagation of spin waves in non-uniformly magnetized waveguides
Authors:
Frederic Vanderveken,
Hasnain Ahmad,
Marc Heyns,
Bart Sorée,
Christoph Adelmann,
Florin Ciubotaru
Abstract:
The characteristics of spin waves in ferromagnetic waveguides with nonuniform magnetization have been investigated for situations where the shape anisotropy field of the waveguide is comparable to the external bias field. Spin-wave generation was realized by the magnetoelastic effect by applying normal and shear strain components, as well as by the Oersted field emitted by an inductive antenna. Th…
▽ More
The characteristics of spin waves in ferromagnetic waveguides with nonuniform magnetization have been investigated for situations where the shape anisotropy field of the waveguide is comparable to the external bias field. Spin-wave generation was realized by the magnetoelastic effect by applying normal and shear strain components, as well as by the Oersted field emitted by an inductive antenna. The magnetoelastic excitation field has a nonuniform profile over the width of the waveguide because of the nonuniform magnetization orientation, whereas the Oersted field remains uniform. Using micromagnetic simulations, we indicate that both types of excitation fields generate quantised width modes with both odd and even mode numbers as well as tilted phase fronts. We demonstrate that these effects originate from the average magnetization orientation with respect to the main axes of the magnetic waveguide. Furthermore, it is indicated that the excitation efficiency of the second-order mode generally surpasses that of the first-order mode due to their symmetry. The relative intensity of the excited modes can be controlled by the strain state as well as by tuning the dimensions of the excitation area. Finally, we demonstrate that the nonreciprocity of spin-wave radiation due to the chirality of an Oersted field generated by an inductive antenna is absent for magnetoelastic spin-wave excitation.
△ Less
Submitted 21 June, 2021; v1 submitted 25 July, 2019;
originally announced July 2019.
-
Building a Benchmark Dataset and Classifiers for Sentence-Level Findings in AP Chest X-rays
Authors:
Tanveer Syeda-Mahmood,
Hassan M. Ahmad,
Nadeem Ansari,
Yaniv Gur,
Satyananda Kashyap,
Alexandros Karargyris,
Mehdi Moradi,
Anup Pillai,
Karthik Sheshadri,
Weiting Wang,
Ken C. L. Wong,
Joy T. Wu
Abstract:
Chest X-rays are the most common diagnostic exams in emergency rooms and hospitals. There has been a surge of work on automatic interpretation of chest X-rays using deep learning approaches after the availability of large open source chest X-ray dataset from NIH. However, the labels are not sufficiently rich and descriptive for training classification tools. Further, it does not adequately address…
▽ More
Chest X-rays are the most common diagnostic exams in emergency rooms and hospitals. There has been a surge of work on automatic interpretation of chest X-rays using deep learning approaches after the availability of large open source chest X-ray dataset from NIH. However, the labels are not sufficiently rich and descriptive for training classification tools. Further, it does not adequately address the findings seen in Chest X-rays taken in anterior-posterior (AP) view which also depict the placement of devices such as central vascular lines and tubes. In this paper, we present a new chest X-ray benchmark database of 73 rich sentence-level descriptors of findings seen in AP chest X-rays. We describe our method of obtaining these findings through a semi-automated ground truth generation process from crowdsourcing of clinician annotations. We also present results of building classifiers for these findings that show that such higher granularity labels can also be learned through the framework of deep learning classifiers.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Thermal Conductance Across Harmonic-matched Epitaxial Al-sapphire Heterointerfaces
Authors:
Zhe Cheng,
Yee Rui Koh,
Habib Ahmad,
Renjiu Hu,
**g**g Shi,
Michael E. Liao,
Yekan Wang,
Tingyu Bai,
Ruiyang Li,
Eungkyu Lee,
Evan A. Clinton,
Christopher M. Matthews,
Zachary Engel,
Yates,
Tengfei Luo,
Mark S. Goorsky,
William Doolittle,
Zhiting Tian,
Patrick E. Hopkins,
Samuel Graham
Abstract:
A unified understanding of interfacial thermal transport is missing due to the complicated nature of interfaces which involves complex factors such as interfacial bonding, interfacial mixing, surface chemistry, crystal orientation, roughness, contamination, and interfacial disorder. This is especially true for metal nonmetal interfaces which incorporate multiple fundamental heat transport mechanis…
▽ More
A unified understanding of interfacial thermal transport is missing due to the complicated nature of interfaces which involves complex factors such as interfacial bonding, interfacial mixing, surface chemistry, crystal orientation, roughness, contamination, and interfacial disorder. This is especially true for metal nonmetal interfaces which incorporate multiple fundamental heat transport mechanisms such as elastic and inelastic phonon scattering as well as electron phonon coupling in the metal and across the interface. All these factors jointly affect thermal boundary conductance (TBC). As a result, the experimentally measured interfaces may not be the same as the ideally modelled interfaces, thus obfuscating any conclusions drawn from experimental and modeling comparisons. This work provides a systematic study of interfacial thermal conductance across well controlled and ultraclean epitaxial (111) Al parallel (0001) sapphire interfaces, known as harmonic matched interface. A comparison with thermal models such as atomistic Green s function (AGF) and a nonequilibrium Landauer approach shows that elastic phonon scattering dominates the interfacial thermal transport of Al sapphire interface. By scaling the TBC with the Al heat capacity, a nearly constant transmission coefficient is observed, indicating that the phonons on the Al side limits the Al sapphire TBC. This nearly constant transmission coefficient validates the assumptions in AGF and nonequilibrium Landauer calculations. Our work not only provides a benchmark for interfacial thermal conductance across metal nonmetal interfaces and enables a quantitative study of TBC to validate theoretical thermal carrier transport mechanisms, but also acts as a reference when studying how other factors impact TBC.
△ Less
Submitted 23 September, 2019; v1 submitted 13 June, 2019;
originally announced June 2019.
-
Lecturer Performance System Using Neural Network with Particle Swarm Optimization
Authors:
Tarik A. Rashid,
Hawraz A. Ahmad
Abstract:
The field of analyzing performance is very important and sensitive in particular when it is related to the performance of lecturers in academic institutions. Locating the weak points of lecturers through a system that provides an early warning to notify or reward the lecturers with warned or punished notices will help them to improve their weaknesses, leads to a better quality in the institutions.…
▽ More
The field of analyzing performance is very important and sensitive in particular when it is related to the performance of lecturers in academic institutions. Locating the weak points of lecturers through a system that provides an early warning to notify or reward the lecturers with warned or punished notices will help them to improve their weaknesses, leads to a better quality in the institutions. The current system has major issues in the higher education at Salahaddin University-Erbil (SUE) in Kurdistan-Iraq. These issues are: first, the assessment of lecturers' activities is conducted traditionally via the Quality Assurance Teams at different departments and colleges at the university, second, the outcomes in some cases of lecturers' performance provoke a low level of acceptance among lectures, as these cases are reflected and viewed by some academic communities as unfair cases, and finally, the current system is not accurate and vigorous. In this paper, Particle Swarm Optimization Neural Network is used to assess performance of lecturers in more fruitful way and also to enhance the accuracy of recognition system. Different real and novel data sets are collected from SUE. The prepared datasets preprocessed and important features are then fed as input source to the training and testing phases. Particle Swarm Optimization is used to find the best weights and biases in the training phase of the neural network. The best accuracy rate obtained in the test phase is 98.28 %.
△ Less
Submitted 8 April, 2019;
originally announced April 2019.
-
Tuning of Magnetic Activity in Spin-Filter Josephson Junctions Towards Spin-Triplet Transport
Authors:
R. Caruso,
D. Massarotti,
G. Campagnano,
A. Pal,
H. G. Ahmad,
P. Lucignano,
M. Eschrig,
M. G. Blamire,
F. Tafuri
Abstract:
The study of superconductor-ferromagnet interfaces has generated great interest in the last decades, leading to the observation of spin-aligned triplet supercurrents and 0-pi transitions in Josephson junctions where two superconductors are separated by an itinerant ferromagnet. Recently, spin-filter Josephson junctions with ferromagnetic barriers have shown unique transport properties, when compar…
▽ More
The study of superconductor-ferromagnet interfaces has generated great interest in the last decades, leading to the observation of spin-aligned triplet supercurrents and 0-pi transitions in Josephson junctions where two superconductors are separated by an itinerant ferromagnet. Recently, spin-filter Josephson junctions with ferromagnetic barriers have shown unique transport properties, when compared to standard metallic ferromagnetic junctions, due to the intrinsically nondissipative nature of the tunneling process. Here we present the first extensive characterization of spin polarized Josephson junctions down to 0.3 K, and the first evidence of an incomplete 0-pi transition in highly spin polarized tunnel ferromagnetic junctions. Experimental data are consistent with a progressive enhancement of the magnetic activity with the increase of the barrier thickness, as neatly captured by the simplest theoretical approach including a nonuniform exchange field. For very long junctions, unconventional magnetic activity of the barrier points to the presence of spin-triplet correlations.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Face Detection and Face Recognition In the Wild Using Off-the-Shelf Freely Available Components
Authors:
Hira Ahmad
Abstract:
This paper presents an easy and efficient face detection and face recognition approach using free software components from the internet. Face detection and face recognition problems have wide applications in home and office security. Therefore this work will helpful for those searching for a free face off-the-shelf face detection system. Using this system, faces can be detected in uncontrolled env…
▽ More
This paper presents an easy and efficient face detection and face recognition approach using free software components from the internet. Face detection and face recognition problems have wide applications in home and office security. Therefore this work will helpful for those searching for a free face off-the-shelf face detection system. Using this system, faces can be detected in uncontrolled environments. In the detection phase, every individual face is detected and in the recognition phase the detected faces are compared with the faces in a given data set and recognized.
△ Less
Submitted 19 January, 2019;
originally announced January 2019.
-
Systimator: A Design Space Exploration Methodology for Systolic Array based CNNs Acceleration on the FPGA-based Edge Nodes
Authors:
Hazoor Ahmad,
Muhammad Tanvir,
Muhammad Abdullah Hanif,
Muhammad Usama Javed,
Rehan Hafiz,
Muhammad Shafique
Abstract:
The evolution of IoT based smart applications demand porting of artificial intelligence algorithms to the edge computing devices. CNNs form a large part of these AI algorithms. Systolic array based CNN acceleration is being widely advocated due its ability to allow scalable architectures. However, CNNs are inherently memory and compute intensive algorithms, and hence pose significant challenges to…
▽ More
The evolution of IoT based smart applications demand porting of artificial intelligence algorithms to the edge computing devices. CNNs form a large part of these AI algorithms. Systolic array based CNN acceleration is being widely advocated due its ability to allow scalable architectures. However, CNNs are inherently memory and compute intensive algorithms, and hence pose significant challenges to be implemented on the resource-constrained edge computing devices. Memory-constrained low-cost FPGA based devices form a substantial fraction of these edge computing devices. Thus, when porting to such edge-computing devices, the designer is left unguided as to how to select a suitable systolic array configuration that could fit in the available hardware resources. In this paper we propose Systimator, a design space exploration based methodology that provides a set of design points that can be mapped within the memory bounds of the target FPGA device. The methodology is based upon an analytical model that is formulated to estimate the required resources for systolic arrays, assuming multiple data reuse patterns. The methodology further provides the performance estimates for each of the candidate design points. We show that Systimator provides an in-depth analysis of resource-requirement of systolic array based CNNs. We provide our resource estimation results for porting of convolutional layers of TINY YOLO, a CNN based object detector, on a Xilinx ARTIX 7 FPGA.
△ Less
Submitted 8 February, 2019; v1 submitted 15 December, 2018;
originally announced January 2019.
-
Energy-efficient switching of nanomagnets for computing: Straintronics and other methodologies
Authors:
Noel D'Souza,
Ayan Biswas,
Hasnain Ahmad,
Mohammad Salehi Fashami,
Md Mamun Al-Rashid,
Vimal Sampath,
Dhritiman Bhattacharya,
Md Ahsanul Abeed,
Jayasimha Atulasimha,
Supriyo Bandyopadhyay
Abstract:
The need for increasingly powerful computing hardware has spawned many ideas stipulating, primarily, the replacement of traditional transistors with alternate "switches" that dissipate miniscule amounts of energy when they switch and provide additional functionality that are beneficial for information processing. An interesting idea that has emerged recently is the notion of using two-phase (piezo…
▽ More
The need for increasingly powerful computing hardware has spawned many ideas stipulating, primarily, the replacement of traditional transistors with alternate "switches" that dissipate miniscule amounts of energy when they switch and provide additional functionality that are beneficial for information processing. An interesting idea that has emerged recently is the notion of using two-phase (piezoelectric/magnetostrictive) multiferroic nanomagnets with bistable (or multi-stable) magnetization states to encode digital information (bits), and switching the magnetization between these states with small voltages (that strain the nanomagnets) to carry out digital information processing. The switching delay is ~1 ns and the energy dissipated in the switching operation can be few to tens of aJ, which is comparable to, or smaller than, the energy dissipated in switching a modern-day transistor. Unlike a transistor, a nanomagnet is "non-volatile", so a nanomagnetic processing unit can store the result of a computation locally without refresh cycles, thereby allowing it to double as both logic and memory. These dual-role elements promise new, robust, energy-efficient, high-speed computing and signal processing architectures (usually non-Boolean and often non-von-Neumann) that can be more powerful, architecturally superior (fewer circuit elements needed to implement a given function) and sometimes faster than their traditional transistor-based counterparts. This topical review covers the important advances in computing and information processing with nanomagnets with emphasis on strain-switched multiferroic nanomagnets acting as non-volatile and energy-efficient switches - a field known as "straintronics". It also outlines key challenges in straintronics.
△ Less
Submitted 22 September, 2018;
originally announced September 2018.
-
Concise Fuzzy Planar Embedding of Graphs: a Dimensionality Reduction Approach
Authors:
Faisal N. Abu-Khzam,
Rana H. Mouawi,
Amer Hajj Ahmad,
Sergio Thoumi
Abstract:
The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of nodes. However, rigorous edge storage might not always be essential to be able to draw the needed conclusions. A similar problem takes records with many variables and attempts to…
▽ More
The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of nodes. However, rigorous edge storage might not always be essential to be able to draw the needed conclusions. A similar problem takes records with many variables and attempts to extract the most discernible features. It is said that the ``dimension'' of this data is reduced. Following an approach with the same objective in mind, we can map a graph representation to a $k$-dimensional space and answer queries of neighboring nodes mainly by measuring Euclidean distances. The accuracy of our answers would decrease but would be compensated for by fuzzy logic which gives an idea about the likelihood of error. This method allows for reasonable representation in memory while maintaining a fair amount of useful information, and allows for concise embedding in $k$-dimensional Euclidean space as well as solving some problems without having to decompress the graph. Of particular interest is the case where $k=2$. Promising highly accurate experimental results are obtained and reported.
△ Less
Submitted 15 December, 2023; v1 submitted 8 March, 2018;
originally announced March 2018.
-
Dual-wavelength generation and tuning by controlling the apodized grating depth in microring resonators
Authors:
IS Amiri,
Volker J. Sorger,
M. M. Ariannejad,
H. Ahmad,
P. Yupapin
Abstract:
Here we show a photonic design for tunable dual-wavelength generation deploying optical nonlinear mode coupling of two coupled III-V semiconductor microring resonators (MRRs) connected to a pump and drop waveguide buses. Here one of the two rings contains a grating, while the other has a planar surface. The underling mechanism for the dual wavelength generation originates from the resonance-detuni…
▽ More
Here we show a photonic design for tunable dual-wavelength generation deploying optical nonlinear mode coupling of two coupled III-V semiconductor microring resonators (MRRs) connected to a pump and drop waveguide buses. Here one of the two rings contains a grating, while the other has a planar surface. The underling mechanism for the dual wavelength generation originates from the resonance-detuning of the spectra resulting in non-linear mode mixing. Tunability of the wavelengths is achieved by altering the grating depth of the MRR and the power coupling coefficients. For the grating design of the MRR we select a trapezoidal-profiled apodized grating to gain low reflectivity at sidelobes. A time-domain travelling wave (TDTW) analysis gives a InGaAsP core refractive index of 3.3 surrounded by a grating InP cladding with n=3.2. We further confirm that the propagation of a Gaussian pulse input with 10 mW power and bandwidth of 0.76 ps is well confined within the mode propagation of the system. Taken together our results show a 2:1 fan-out of two spectrally separate signals for compact and high functional sources on chip.
△ Less
Submitted 20 August, 2017;
originally announced August 2017.
-
Experimental demonstration of complete 180 degree reversal of magnetization in isolated Co-nanomagnets on a PMN-PT substrate with voltage generated strain
Authors:
Ayan Kumar Biswas,
Hasnain Ahmad,
Jayasimha Atulasimha,
Supriyo Bandyopadhyay
Abstract:
Rotating the magnetization of a shape anisotropic magnetostrictive nanomagnet with voltage-generated stress/strain dissipates much less energy than most other magnetization rotation schemes, but its application to writing bits in non-volatile magnetic memory has been hindered by the fundamental inability of stress/strain to rotate magnetization by full 180 degrees. Normally, stress/strain can rota…
▽ More
Rotating the magnetization of a shape anisotropic magnetostrictive nanomagnet with voltage-generated stress/strain dissipates much less energy than most other magnetization rotation schemes, but its application to writing bits in non-volatile magnetic memory has been hindered by the fundamental inability of stress/strain to rotate magnetization by full 180 degrees. Normally, stress/strain can rotate the magnetization of a shape anisotropic elliptical nanomagnet by only up to 90 degrees, resulting in incomplete magnetization reversal. Recently, we predicted that applying uniaxial stress sequentially along two different axes that are not collinear with the major or minor axis of the elliptical nanomagnet will rotate the magnetization by full 180 degrees. Here, we demonstrate this complete 180 degree rotation in elliptical Co-nanomagnets (fabricated on a piezoelectric substrate) at room temperature. The two stresses are generated by sequentially applying voltages to two pairs of shorted electrodes placed on the substrate such that the line joining the centers of the electrodes in one pair intersects the major axis of a nanomagnet at ~+30 degrees and the line joining the centers of the electrodes in the other pair intersects at ~ -30 degrees. A finite element analysis has been performed to determine the stress distribution underneath the nanomagnets when one or both pairs of electrodes are activated, and this has been approximately incorporated into a micromagnetic simulation of magnetization dynamics to confirm that the generated stress can produce the observed magnetization rotations. This result portends an extremely energy-efficient non-volatile "straintronic" memory technology predicated on writing bits in nanomagnets with electrically generated stress.
△ Less
Submitted 30 December, 2016;
originally announced January 2017.
-
Conceptual Knowledge Relationship Model of Enterprise Architecture and Top Management Roles
Authors:
Hawa Ahmad,
Aishah Ahmad,
Nik Hazlina Nik Abdullah Hafaz
Abstract:
Enterprise Architecture (EA) continues to gain global recognition as a management tool that would improve the organizations performance. However, based on literature, it was found that the lack of EA knowledge of top management (TM) hinders the assimiliation of EA. This study aims to gauge EA knowledge required for TM for providing a comprehensive support towards EA assimiliation. A semi-structure…
▽ More
Enterprise Architecture (EA) continues to gain global recognition as a management tool that would improve the organizations performance. However, based on literature, it was found that the lack of EA knowledge of top management (TM) hinders the assimiliation of EA. This study aims to gauge EA knowledge required for TM for providing a comprehensive support towards EA assimiliation. A semi-structured interviews were conducted with several personnels in an organization. Data were analyzed using the constant comparative method. This study found two sets of EA knowledge of TM; business knowledge and technology knowledge. A conceptual knowledge relationship model is proposed through synthesizing the roles of EA and TM in supporting the TM in identifying the EA knowledge required. The findings gave contribution to academicians and practitioners with knowledge of how to improve EA assimiliation and a structured roadmap for understanding EA to achieve high business value.
△ Less
Submitted 4 June, 2016;
originally announced June 2016.