-
Reduced order modeling of fluid flows: Machine learning, Kolmogorov barrier, closure modeling, and partitioning
Authors:
Shady Ahmed,
Suraj Pawar,
Omer San,
Adil Rasheed
Abstract:
In this paper, we put forth a long short-term memory (LSTM) nudging framework for the enhancement of reduced order models (ROMs) of fluid flows utilizing noisy measurements. We build on the fact that in a realistic application, there are uncertainties in initial conditions, boundary conditions, model parameters, and/or field measurements. Moreover, conventional nonlinear ROMs based on Galerkin pro…
▽ More
In this paper, we put forth a long short-term memory (LSTM) nudging framework for the enhancement of reduced order models (ROMs) of fluid flows utilizing noisy measurements. We build on the fact that in a realistic application, there are uncertainties in initial conditions, boundary conditions, model parameters, and/or field measurements. Moreover, conventional nonlinear ROMs based on Galerkin projection (GROMs) suffer from imperfection and solution instabilities due to the modal truncation, especially for advection-dominated flows with slow decay in the Kolmogorov width. In the presented LSTM-Nudge approach, we fuse forecasts from a combination of imperfect GROM and uncertain state estimates, with sparse Eulerian sensor measurements to provide more reliable predictions in a dynamical data assimilation framework. We illustrate the idea with the viscous Burgers problem, as a benchmark test bed with quadratic nonlinearity and Laplacian dissipation. We investigate the effects of measurements noise and state estimate uncertainty on the performance of the LSTM-Nudge behavior. We also demonstrate that it can sufficiently handle different levels of temporal and spatial measurement sparsity. This first step in our assessment of the proposed model shows that the LSTM nudging could represent a viable realtime predictive tool in emerging digital twin systems.
△ Less
Submitted 28 May, 2020;
originally announced May 2020.
-
Long short-term memory embedded nudging schemes for nonlinear data assimilation of geophysical flows
Authors:
Suraj Pawar,
Shady E. Ahmed,
Omer San,
Adil Rasheed,
Ionel M. Navon
Abstract:
Reduced rank nonlinear filters are increasingly utilized in data assimilation of geophysical flows, but often require a set of ensemble forward simulations to estimate forecast covariance. On the other hand, predictor-corrector type nudging approaches are still attractive due to their simplicity of implementation when more complex methods need to be avoided. However, optimal estimate of nudging ga…
▽ More
Reduced rank nonlinear filters are increasingly utilized in data assimilation of geophysical flows, but often require a set of ensemble forward simulations to estimate forecast covariance. On the other hand, predictor-corrector type nudging approaches are still attractive due to their simplicity of implementation when more complex methods need to be avoided. However, optimal estimate of nudging gain matrix might be cumbersome. In this paper, we put forth a fully nonintrusive recurrent neural network approach based on a long short-term memory (LSTM) embedding architecture to estimate the nudging term, which plays a role not only to force the state trajectories to the observations but also acts as a stabilizer. Furthermore, our approach relies on the power of archival data and the trained model can be retrained effectively due to power of transfer learning in any neural network applications. In order to verify the feasibility of the proposed approach, we perform twin experiments using Lorenz 96 system. Our results demonstrate that the proposed LSTM nudging approach yields more accurate estimates than both extended Kalman filter (EKF) and ensemble Kalman filter (EnKF) when only sparse observations are available. With the availability of emerging AI-friendly and modular hardware technologies and heterogeneous computing platforms, we articulate that our simplistic nudging framework turns out to be computationally more efficient than either the EKF or EnKF approaches.
△ Less
Submitted 22 May, 2020;
originally announced May 2020.
-
Forward sensitivity approach for estimating eddy viscosity closures in nonlinear model reduction
Authors:
Shady E. Ahmed,
Kinjal Bhar,
Omer San,
Adil Rasheed
Abstract:
In this paper, we propose a variational approach to estimate eddy viscosity using forward sensitivity method (FSM) for closure modeling in nonlinear reduced order models. FSM is a data assimilation technique that blends model's predictions with noisy observations to correct initial state and/or model parameters. We apply this approach on a projection based reduced order model (ROM) of the one-dime…
▽ More
In this paper, we propose a variational approach to estimate eddy viscosity using forward sensitivity method (FSM) for closure modeling in nonlinear reduced order models. FSM is a data assimilation technique that blends model's predictions with noisy observations to correct initial state and/or model parameters. We apply this approach on a projection based reduced order model (ROM) of the one-dimensional viscous Burgers equation with a square wave defining a moving shock, and the two-dimensional vorticity transport equation formulating a decay of Kraichnan turbulence. We investigate the capability of the approach to approximate an optimal value for eddy viscosity with different measurement configurations. Specifically, we show that our approach can sufficiently assimilate information either through full field or sparse noisy measurements to estimate eddy viscosity closure to cure standard Galerkin reduced order model (GROM) predictions. Therefore, our approach provides a modular framework to correct forecasting error from a sparse observational network on a latent space. We highlight that the proposed GROM-FSM framework is promising for emerging digital twin applications, where real-time sensor measurements can be used to update and optimize surrogate model's parameters.
△ Less
Submitted 4 November, 2020; v1 submitted 21 May, 2020;
originally announced May 2020.
-
Solving Vehicle Routing Problem Using Quantum Approximate Optimization Algorithm
Authors:
Utkarsh Azad,
Bikash K. Behera,
Emad A. Ahmed,
Prasanta K. Panigrahi,
Ahmed Farouk
Abstract:
In this paper, we describe the usage of the Quantum Approximate Optimization Algorithm (QAOA), which is a quantum-classical heuristic, to solve a combinatorial optimization and integer programming task known as Vehicle Routing Problem (VRP). We outline the Ising formulation for VRP and present a detailed procedure to solve VRP by minimizing its simulated Ising Hamiltonian using the IBM Qiskit plat…
▽ More
In this paper, we describe the usage of the Quantum Approximate Optimization Algorithm (QAOA), which is a quantum-classical heuristic, to solve a combinatorial optimization and integer programming task known as Vehicle Routing Problem (VRP). We outline the Ising formulation for VRP and present a detailed procedure to solve VRP by minimizing its simulated Ising Hamiltonian using the IBM Qiskit platform. Here, we attempt to find solutions for the VRP problems: (4,2), (5,2), and (5,3), where each (n, k) represents a VRP problem with n locations and k vehicles. We find that the performance of QAOA is not just dependent upon the classical optimizer used, the number of steps p in which an adiabatic path is realized, or the way parameters are initialized, but also on the problem instance itself.
△ Less
Submitted 23 September, 2022; v1 submitted 2 February, 2020;
originally announced February 2020.
-
A long short-term memory embedding for hybrid uplifted reduced order models
Authors:
Shady E. Ahmed,
Omer San,
Adil Rasheed,
Traian Iliescu
Abstract:
In this paper, we introduce an uplifted reduced order modeling (UROM) approach through the integration of standard projection based methods with long short-term memory (LSTM) embedding. Our approach has three modeling layers or components. In the first layer, we utilize an intrusive projection approach to model dynamics represented by the largest modes. The second layer consists of an LSTM model t…
▽ More
In this paper, we introduce an uplifted reduced order modeling (UROM) approach through the integration of standard projection based methods with long short-term memory (LSTM) embedding. Our approach has three modeling layers or components. In the first layer, we utilize an intrusive projection approach to model dynamics represented by the largest modes. The second layer consists of an LSTM model to account for residuals beyond this truncation. This closure layer refers to the process of including the residual effect of the discarded modes into the dynamics of the largest scales. However, the feasibility of generating a low rank approximation tails off for higher Kolmogorov $n$-width systems due to the underlying nonlinear processes. The third uplifting layer, called super-resolution, addresses this limited representation issue by expanding the span into a larger number of modes utilizing the versatility of LSTM. Therefore, our model integrates a physics-based projection model with a memory embedded LSTM closure and an LSTM based super-resolution model. In several applications, we exploit the use of Grassmann manifold to construct UROM for unseen conditions. We performed numerical experiments by using the Burgers and Navier-Stokes equations with quadratic nonlinearity. Our results show robustness of the proposed approach in building reduced order models for parameterized systems and confirm the improved trade-off between accuracy and efficiency.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
An evolve-then-correct reduced order model for hidden fluid dynamics
Authors:
Suraj Pawar,
Shady E. Ahmed,
O. San,
A. Rasheed
Abstract:
In this paper, we put forth an evolve-then-correct reduced order modeling approach that combines intrusive and nonintrusive models to take hidden physical processes into account. Specifically, we split the underlying dynamics into known and unknown components. In the known part, we first utilize an intrusive Galerkin method projected on a set of basis functions obtained by proper orthogonal decomp…
▽ More
In this paper, we put forth an evolve-then-correct reduced order modeling approach that combines intrusive and nonintrusive models to take hidden physical processes into account. Specifically, we split the underlying dynamics into known and unknown components. In the known part, we first utilize an intrusive Galerkin method projected on a set of basis functions obtained by proper orthogonal decomposition. We then formulate a recurrent neural network emulator based on the assumption that observed data is a manifestation of all relevant processes. We further enhance our approach by using an orthonormality conforming basis interpolation approach on a Grassmannian manifold to address off-design conditions. The proposed framework is illustrated here with the application of two-dimensional co-rotating vortex simulations under modeling uncertainty. The results demonstrate highly accurate predictions underlining the effectiveness of the evolve-then-correct approach toward realtime simulations, where the full process model is not known a priori.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Data-driven recovery of hidden physics in reduced order modeling of fluid flows
Authors:
Suraj Pawar,
Shady E. Ahmed,
Omer San,
Adil Rasheed
Abstract:
In this article, we introduce a modular hybrid analysis and modeling (HAM) approach to account for hidden physics in reduced order modeling (ROM) of parameterized systems relevant to fluid dynamics. The hybrid ROM framework is based on using the first principles to model the known physics in conjunction with utilizing the data-driven machine learning tools to model remaining residual that is hidde…
▽ More
In this article, we introduce a modular hybrid analysis and modeling (HAM) approach to account for hidden physics in reduced order modeling (ROM) of parameterized systems relevant to fluid dynamics. The hybrid ROM framework is based on using the first principles to model the known physics in conjunction with utilizing the data-driven machine learning tools to model remaining residual that is hidden in data. This framework employs proper orthogonal decomposition as a compression tool to construct orthonormal bases and Galerkin projection (GP) as a model to built the dynamical core of the system. Our proposed methodology hence compensates structural or epistemic uncertainties in models and utilizes the observed data snapshots to compute true modal coefficients spanned by these bases. The GP model is then corrected at every time step with a data-driven rectification using a long short-term memory (LSTM) neural network architecture to incorporate hidden physics. A Grassmannian manifold approach is also adapted for interpolating basis functions to unseen parametric conditions. The control parameter governing the system's behavior is thus implicitly considered through true modal coefficients as input features to the LSTM network. The effectiveness of the HAM approach is discussed through illustrative examples that are generated synthetically to take hidden physics into account. Our approach thus provides insights addressing a fundamental limitation of the physics-based models when the governing equations are incomplete to represent underlying physical processes.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
Sampling and resolution characteristics in reduced order models of shallow water equations: intrusive vs non-intrusive
Authors:
Shady E. Ahmed,
Omer San,
Diana A. Bistrian,
Ionel M. Navon
Abstract:
We investigate the sensitivity of reduced order models (ROMs) to training data resolution as well as sampling rate. In particular, we consider proper orthogonal decomposition (POD), coupled with Galerkin projection (POD-GP), as an intrusive reduced order modeling technique. For non-intrusive ROMs, we consider two frameworks. The first is using dynamic mode decomposition (DMD), and the second is ba…
▽ More
We investigate the sensitivity of reduced order models (ROMs) to training data resolution as well as sampling rate. In particular, we consider proper orthogonal decomposition (POD), coupled with Galerkin projection (POD-GP), as an intrusive reduced order modeling technique. For non-intrusive ROMs, we consider two frameworks. The first is using dynamic mode decomposition (DMD), and the second is based on artificial neural networks (ANNs). For ANN, we utilized a residual deep neural network, and for DMD we have studied two versions of DMD approaches; one with hard thresholding and the other with sorted bases selection. Also, we highlight the differences between mean-subtracting the data (i.e., centering) and using the data without mean-subtraction. We tested these ROMs using a system of 2D shallow water equations for four different numerical experiments, adopting combinations of sampling rates and resolutions. For these cases, we found that the DMD basis obtained with hard threshodling is sensitive to sampling rate, performing worse at very high rates. The sorted DMD algorithm helps to mitigate this problem and yields more stabilized and converging solution. Furthermore, we demonstrate that both DMD approaches with mean subtraction provide significantly more accurate results than DMD with mean-subtracting the data. On the other hand, POD is relatively insensitive to sampling rate and yields better representation of the flow field. Meanwhile, resolution has little effect on both POD and DMD performances. Therefore, we preferred to train the neural network in POD space, since it is more stable and better represents our dataset. Numerical results reveal that an artificial neural network on POD subspace (POD-ANN) performs remarkably better than POD-GP and DMD in capturing system dynamics, even with a small number of modes.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Memory embedded non-intrusive reduced order modeling of non-ergodic flows
Authors:
Shady E. Ahmed,
Sk. Mashfiqur Rahman,
Omer San,
Adil Rasheed,
Ionel M. Navon
Abstract:
Generating a digital twin of any complex system requires modeling and computational approaches that are efficient, accurate, and modular. Traditional reduced order modeling techniques are targeted at only the first two but the novel non-intrusive approach presented in this study is an attempt at taking all three into account effectively compared to their traditional counterparts. Based on dimensio…
▽ More
Generating a digital twin of any complex system requires modeling and computational approaches that are efficient, accurate, and modular. Traditional reduced order modeling techniques are targeted at only the first two but the novel non-intrusive approach presented in this study is an attempt at taking all three into account effectively compared to their traditional counterparts. Based on dimensionality reduction using proper orthogonal decomposition (POD), we introduce a long short-term memory (LSTM) neural network architecture together with a principal interval decomposition (PID) framework as an enabler to account for localized modal deformation, which is a key element in accurate reduced order modeling of convective flows. Our applications for convection dominated systems governed by Burgers, Navier-Stokes, and Boussinesq equations demonstrate that the proposed approach yields significantly more accurate predictions than the POD-Galerkin method, and could be a key enabler towards near real-time predictions of unsteady flows.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Energy Harvesting in 5G Networks: Taxonomy, Requirements, Challenges, and Future Directions
Authors:
Muhammad Imran,
Latif U. Khan,
Ibrar Yaqoob,
Ejaz Ahmed,
Muhammad Ahsan Qureshi,
Arif Ahmed
Abstract:
Consciousness of energy saving is increasing in fifth-generation (5G) wireless networks due to the high energy consumption issue. Energy harvesting technology is a possible appealing solution for ultimately prolonging the lifetime of devices and networks. Although considerable research efforts have been conducted in the context of using energy harvesting technology in 5G wireless networks, these e…
▽ More
Consciousness of energy saving is increasing in fifth-generation (5G) wireless networks due to the high energy consumption issue. Energy harvesting technology is a possible appealing solution for ultimately prolonging the lifetime of devices and networks. Although considerable research efforts have been conducted in the context of using energy harvesting technology in 5G wireless networks, these efforts are in their infancy, and a tutorial on this topic is still lacking. This study aims to discuss the beneficial role of energy harvesting technology in 5G networks. We categorize and classify the literature available on energy harvesting in 5G networks by devising a taxonomy based on energy sources; energy harvesting devices, phases, and models; energy conversion methods, and energy propagation medium. The key requirements for enabling energy harvesting in 5G networks are also outlined. Several core research challenges that remain to be addressed are discussed. Furthermore, future research directions are provided.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
Robust linear domain decomposition schemes for reduced non-linear fracture flow models
Authors:
Elyes Ahmed,
Alessio Fumagalli,
Ana Budiša,
Eirik Keilegavlen,
Jan Martin Nordbotten,
Florin Adrian Radu
Abstract:
In this work, we consider compressible single-phase flow problems in a porous media containing a fracture. In the latter, a non-linear pressure-velocity relation is prescribed. Using a non-overlap** domain decomposition procedure, we reformulate the global problem into a non-linear interface problem. We then introduce two new algorithms that are able to efficiently handle the non-linearity and t…
▽ More
In this work, we consider compressible single-phase flow problems in a porous media containing a fracture. In the latter, a non-linear pressure-velocity relation is prescribed. Using a non-overlap** domain decomposition procedure, we reformulate the global problem into a non-linear interface problem. We then introduce two new algorithms that are able to efficiently handle the non-linearity and the coupling between the fracture and the matrix, both based on linearization by the so-called L-scheme. The first algorithm, named MoLDD, uses the L-scheme to resolve the non-linearity, requiring at each iteration to solve the dimensional coupling via a domain decomposition approach. The second algorithm, called ItLDD, uses a sequential approach in which the dimensional coupling is part of the linearization iterations. For both algorithms, the computations are reduced only to the fracture by pre-computing, in an offline phase, a multiscale flux basis (the linear Robin-to-Neumann co-dimensional map), that represent the flux exchange between the fracture and the matrix. We present extensive theoretical findings and in particular, the stability and the convergence of both schemes are obtained, where user given parameters are optimized to minimise the number of iterations. Examples on two important fracture models are computed with the library PorePy and agree with the developed theory.
△ Less
Submitted 1 October, 2020; v1 submitted 13 June, 2019;
originally announced June 2019.
-
Splitting-based domain decomposition methods for two-phase flow with different rock types
Authors:
Elyes Ahmed
Abstract:
In this paper, we are concerned with the global pressure formulation of immiscible incompressible two-phase flow between different rock types. We develop for this problem two robust schemes based on domain decomposition (DD) methods and operator-splitting techniques. The first scheme follows a sequential procedure in which the (global) pressure, the saturation-advection and the saturation-diffusio…
▽ More
In this paper, we are concerned with the global pressure formulation of immiscible incompressible two-phase flow between different rock types. We develop for this problem two robust schemes based on domain decomposition (DD) methods and operator-splitting techniques. The first scheme follows a sequential procedure in which the (global) pressure, the saturation-advection and the saturation-diffusion problems are fully decoupled. In this scheme, each problem is treated individually using various DD approaches and specialized numerical methods. The coupling between the different problems is explicit and the time-marching is with no iterations. To adapt to different time scales of problem components and different rock types, the novel scheme uses a multirate time step** strategy, by taking multiple finer time steps for saturation-advection within one coarse time step for saturation-diffusion and pressure, and permits independent time steps for the advection step in the different rocks. In the second scheme, we review the classical Implicit Pressure--Explicit Saturation (IMPES) method (by decoupling only pressure and saturation) in the context of multirate coupling schemes and nonconforming-in-time DD approaches. For the discretization, the saturation-advection problem is approximated with the explicit Euler method in time, and in space with the cell-centered finite volume method of first order of Godunov type. The saturation-diffusion problem is approximated in time with the implicit Euler method and in space with the mixed finite element method, as in the pressure problem. Finally, in a series of numerical experiments, we investigate the practicality of the proposed schemes, the accuracy-in-time of the multirate and nonconforming time strategies, and compare the convergence of various DD methods within each approach.
△ Less
Submitted 9 September, 2019; v1 submitted 8 June, 2019;
originally announced June 2019.
-
Predicting the scoring time in hockey
Authors:
Abdolnasser Sadeghkhani,
Syed Ejaz Ahmed
Abstract:
In this paper, we propose a Bayesian predictive density estimator to predict the time until the r-th goal is scored in a hockey game, using ancillary information such as their performances in the past, points and specialists' opinions. To be more specific, we consider a gamma distribution as a waiting scoring model. The proposed density estimator belongs to an interesting new version of weighted b…
▽ More
In this paper, we propose a Bayesian predictive density estimator to predict the time until the r-th goal is scored in a hockey game, using ancillary information such as their performances in the past, points and specialists' opinions. To be more specific, we consider a gamma distribution as a waiting scoring model. The proposed density estimator belongs to an interesting new version of weighted beta prime distribution and outperforms the other estimator in the literature. The efficiency of our estimator is evaluated using frequentist risk along with measuring the prediction error from the old dataset, 2016-17, to the current season (2018-19) of the National Hockey League.
△ Less
Submitted 26 March, 2019;
originally announced March 2019.
-
A dynamic closure modeling framework for model order reduction of geophysical flows
Authors:
Sk. Mashfiqur Rahman,
Shady E. Ahmed,
Omer San
Abstract:
In this paper, a dynamic closure modeling approach has been derived to stabilize the projection-based reduced order models in the long-term evolution of forced-dissipative dynamical systems. To simplify our derivation without losing generalizability, the proposed reduced order modeling (ROM) framework is first constructed by Galerkin projection of the single-layer quasi-geostrophic equation, a sta…
▽ More
In this paper, a dynamic closure modeling approach has been derived to stabilize the projection-based reduced order models in the long-term evolution of forced-dissipative dynamical systems. To simplify our derivation without losing generalizability, the proposed reduced order modeling (ROM) framework is first constructed by Galerkin projection of the single-layer quasi-geostrophic equation, a standard prototype of large-scale general circulation models, onto a set of dominant proper orthogonal decomposition (POD) modes. We then propose an eddy viscosity closure approach to stabilize the resulting surrogate model considering the analogy between large eddy simulation (LES) and truncated modal projection. Our efforts, in particular, include the translation of the dynamic subgrid-scale model into our ROM setting by defining a test truncation similar to the test filtering in LES. The a posteriori analysis shows that our approach is remarkably accurate, allowing us to integrate simulations over long time intervals at a nominally small computational overhead.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Monolithic and splitting based solution schemes for fully coupled quasi-static thermo-poroelasticity with nonlinear convective transport
Authors:
Mats Kirkesæther Brun,
Elyes Ahmed,
Inga Berre,
Jan Martin Nordbotten,
Florin Adrian Radu
Abstract:
This paper concerns splitting-based iterative procedures for the coupled nonlinear thermo-poroelasticity model problem. The thermo-poroelastic model problem we consider is formulated as a three-field system of PDE's, consisting of an energy balance equation, a mass balance equation and a momentum balance equation, where the primary variables are temperature, fluid pressure, and elastic displacemen…
▽ More
This paper concerns splitting-based iterative procedures for the coupled nonlinear thermo-poroelasticity model problem. The thermo-poroelastic model problem we consider is formulated as a three-field system of PDE's, consisting of an energy balance equation, a mass balance equation and a momentum balance equation, where the primary variables are temperature, fluid pressure, and elastic displacement. Due to the presence of a nonlinear convective transport term in the energy balance equation, it is convenient to have access to both the pressure and temperature gradients. Hence, we introduce these as two additional variables and extend the original three-field model to a five-field model. For the numerical solution of this five-field formulation, we compare three approaches that differ by how we treat the coupling/decoupling between the flow and/from heat and/from mechanics; these approaches have in common a simultaneous application of the fixed-stress splitting scheme on both the non-linearity and the coupling structure of the problem. More precisely, the derived procedures transform a nonlinear and fully coupled problem into a set of simpler subproblems to be solved sequentially in an iterative fashion. We provide a convergence proof for the derived algorithms, and validate our results through several numerical examples.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
Adaptive asynchronous time-step**, stop** criteria, and a posteriori error estimates for fixed-stress iterative schemes for coupled poromechanics problems
Authors:
Elyes Ahmed,
Jan Martin Nordbotten,
Florin Adrian Radu
Abstract:
In this paper we develop adaptive iterative coupling schemes for the Biot system modeling coupled poromechanics problems. We particularly consider the space-time formulation of the fixed-stress iterative scheme, in which we first solve the problem of flow over the whole space-time interval, then exploiting the space-time information for solving the mechanics. Two common discretizations of this alg…
▽ More
In this paper we develop adaptive iterative coupling schemes for the Biot system modeling coupled poromechanics problems. We particularly consider the space-time formulation of the fixed-stress iterative scheme, in which we first solve the problem of flow over the whole space-time interval, then exploiting the space-time information for solving the mechanics. Two common discretizations of this algorithm are then introduced based on two coupled mixed finite element methods in-space and the backward Euler scheme in-time. Therefrom, adaptive fixed-stress algorithms are build on conforming reconstructions of the pressure and displacement together with equilibrated flux and stresses reconstructions. These ingredients are used to derive a posteriori error estimates for the fixed-stress algorithms, distinguishing the different error components, namely the spatial discretization, the temporal discretization, and the fixed-stress iteration components. Precisely, at the iteration $k\geq 1$ of the adaptive algorithm, we prove that our estimate gives a guaranteed and fully computable upper bound on the energy-type error measuring the difference between the exact and approximate pressure and displacement. These error components are efficiently used to design adaptive asynchronous time-step** and adaptive stop** criteria for the fixed-stress algorithms. Numerical experiments illustrate the efficiency of our estimates and the performance of the adaptive iterative coupling algorithms.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
A multiscale flux basis for mortar mixed discretizations of reduced Darcy-Forchheimer fracture models
Authors:
Elyes Ahmed,
Alessio Fumagalli,
Ana Budiša
Abstract:
In this paper, a multiscale flux basis algorithm is developed to efficiently solve a flow problem in fractured porous media. Here, we take into account a mixed-dimensional setting of the discrete fracture matrix model, where the fracture network is represented as lower-dimensional object. We assume the linear Darcy model in the rock matrix and the non-linear Forchheimer model in the fractures. In…
▽ More
In this paper, a multiscale flux basis algorithm is developed to efficiently solve a flow problem in fractured porous media. Here, we take into account a mixed-dimensional setting of the discrete fracture matrix model, where the fracture network is represented as lower-dimensional object. We assume the linear Darcy model in the rock matrix and the non-linear Forchheimer model in the fractures. In our formulation, we are able to reformulate the matrix-fracture problem to only the fracture network problem and, therefore, significantly reduce the computational cost. The resulting problem is then a non-linear interface problem that can be solved using a fixed-point or Newton-Krylov methods, which in each iteration require several solves of Robin problems in the surrounding rock matrices. To achieve this, the flux exchange (a linear Robin-to-Neumann co-dimensional map**) between the porous medium and the fracture network is done offline by pre-computing a multiscale flux basis that consists of the flux response from each degree of freedom on the fracture network. This delivers a conserve for the basis that handles the solutions in the rock matrices for each degree of freedom in the fractures pressure space. Then, any Robin sub-domain problems are replaced by linear combinations of the multiscale flux basis during the interface iteration. The proposed approach is, thus, agnostic to the physical model in the fracture network. Numerical experiments demonstrate the computational gains of pre-computing the flux exchange between the porous medium and the fracture network against standard non-linear domain decomposition approaches.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
Searching for Biosignatures in Exoplanetary Impact Ejecta
Authors:
Gianni Cataldi,
Alexis Brandeker,
Philippe Thébault,
Kelsi Singer,
Engy Ahmed,
Bernard L. de Vries,
Anna Neubeck,
Göran Olofsson
Abstract:
With the number of confirmed rocky exoplanets increasing steadily, their characterisation and the search for exoplanetary biospheres is becoming an increasingly urgent issue in astrobiology. We aim to investigate the possibility of characterising an exoplanet (in terms of habitability, geology, presence of life etc.) by studying material ejected from the surface during an impact event. For given p…
▽ More
With the number of confirmed rocky exoplanets increasing steadily, their characterisation and the search for exoplanetary biospheres is becoming an increasingly urgent issue in astrobiology. We aim to investigate the possibility of characterising an exoplanet (in terms of habitability, geology, presence of life etc.) by studying material ejected from the surface during an impact event. For given parameters characterising the impact event, we estimate the esca** mass and assess its subsequent collisional evolution in a circumstellar orbit, assuming a Sun-like host star. We calculate the fractional luminosity of the dust as a function of time after the impact event and study its detectability with current and future instrumentation. We consider the possibility to constrain the dust composition, giving information on the geology or the presence of a biosphere. As examples, we investigate whether calcite, silica or ejected microorganisms could be detected. For a 20 km diameter impactor, we find that the dust mass esca** the exoplanet is roughly comparable to the zodiacal dust. The collisional evolution is best modelled by considering two independent dust populations, a spalled population consisting of non-melted ejecta evolving on timescales of millions of years, and dust recondensed from melt or vapour evolving on much shorter timescales. While the presence of dust can potentially be inferred with current telescopes, studying its composition requires advanced instrumentation not yet available. The direct detection of biological matter turns out to be extremely challenging. Despite considerable difficulties (small dust masses, noise such as exozodiacal dust etc.), studying dusty material ejected from an exoplanetary surface might become an interesting complement to atmospheric studies in the future.
△ Less
Submitted 13 August, 2018;
originally announced August 2018.
-
Resonant Temperature Fluctuations in Nebulae Ionized by Short-Period Binary Stars
Authors:
Manuel A. Bautista,
Ehab E. Ahmed
Abstract:
A prevailing open problem in planetary nebulae research, and photoionized gaseous nebulae research at large, is the systematic discrepancies in electron temperatures and ionic abundances as derived from recombination and collisionally excited lines. Peimbert (1967) proposed the presence of 'temperature fluctuations' in these nebulae, but the apparent amplitude of such fluctuations, as deduced from…
▽ More
A prevailing open problem in planetary nebulae research, and photoionized gaseous nebulae research at large, is the systematic discrepancies in electron temperatures and ionic abundances as derived from recombination and collisionally excited lines. Peimbert (1967) proposed the presence of 'temperature fluctuations' in these nebulae, but the apparent amplitude of such fluctuations, as deduced from spectral diagnostics and/or abundance discrepancy factors, remain unexplained by standard photoionization modeling. While this and other alternative models to explain the temperature and abundance discrepancies remain inconclusive, recent observations seem to point at a connection between nebular abundance discrepancy factors and a binary nature of photoionizing stars. In this paper we show that large amplitude temperature fluctuations are expected to form in planetary nebulae photoionized by short-period binary stars. Resonant temperature fluctuations are first formed along the orbital disk around the binary stars, as the periodically varying ionizing radiation field induces periodic oscillations in the heating-minus-cooling function. Then, the temperatures fluctuations propagate vertically to the disk as thermal waves that later steepen into radiative shocks. The binary period of the ionizing stars is determinant in the formation and propagation of temperature fluctuations, as well as in associated density fluctuations. Fluctuations propagate efficiently only in systems with binary periods significantly shorter than the gas thermalization time, of the order of 10 days.
Further, we propose temperature diagnostic line ratios that combine [O III] collisionally excited lines and O II recombination lines to determine the equilibrium temperature and the magnitude of resonant temperature fluctuations in nebulae.
△ Less
Submitted 10 August, 2018;
originally announced August 2018.
-
A survey on Deep Learning Advances on Different 3D Data Representations
Authors:
Eman Ahmed,
Alexandre Saint,
Abd El Rahman Shabayek,
Kseniya Cherenkova,
Rig Das,
Gleb Gusev,
Djamila Aouada,
Bjorn Ottersten
Abstract:
3D data is a valuable asset the computer vision filed as it provides rich information about the full geometry of sensed objects and scenes. Recently, with the availability of both large 3D datasets and computational power, it is today possible to consider applying deep learning to learn specific tasks on 3D data such as segmentation, recognition and correspondence. Depending on the considered 3D d…
▽ More
3D data is a valuable asset the computer vision filed as it provides rich information about the full geometry of sensed objects and scenes. Recently, with the availability of both large 3D datasets and computational power, it is today possible to consider applying deep learning to learn specific tasks on 3D data such as segmentation, recognition and correspondence. Depending on the considered 3D data representation, different challenges may be foreseen in using existent deep learning architectures. In this work, we provide a comprehensive overview about various 3D data representations highlighting the difference between Euclidean and non-Euclidean ones. We also discuss how Deep Learning methods are applied on each representation, analyzing the challenges to overcome.
△ Less
Submitted 6 April, 2019; v1 submitted 4 August, 2018;
originally announced August 2018.
-
Well-posedness of the fully coupled quasi-static thermo-poro-elastic equations with nonlinear convective transport
Authors:
Mats K. Brun,
Elyes Ahmed,
Florin A. Radu,
Jan Martin Nordbotten
Abstract:
This paper is concerned with the analysis of the quasi-static thermo-poroelastic model. This model is nonlinear and includes thermal effects compared to the classical quasi-static poroelastic model (also known as Biot's model). It consists of a momentum balance equation, a mass balance equation, and an energy balance equation, fully coupled and nonlinear due to a convective transport term in the e…
▽ More
This paper is concerned with the analysis of the quasi-static thermo-poroelastic model. This model is nonlinear and includes thermal effects compared to the classical quasi-static poroelastic model (also known as Biot's model). It consists of a momentum balance equation, a mass balance equation, and an energy balance equation, fully coupled and nonlinear due to a convective transport term in the energy balance equation. The aim of this article is to investigate, in the context of mixed formulations, the existence and uniqueness of a weak solution to this model problem. The primary variables in these formulations are the fluid pressure, temperature and elastic displacement as well as the Darcy flux, heat flux and total stress. The well-posedness of a linearized formulation is addressed first through the use of a Galerkin method and suitable a priori estimates. This is used next to study the well-posedness of an iterative solution procedure for the full nonlinear problem. A convergence proof for this algorithm is then inferred by a contraction of successive difference functions of the iterates using suitable norms.
△ Less
Submitted 4 July, 2018; v1 submitted 3 July, 2018;
originally announced July 2018.
-
Optimal Spectrum Sensing Policy with Traffic Classification in RF-Powered CRNs
Authors:
Hae Sol Lee,
Muhammad Ejaz Ahmed,
Dong In Kim
Abstract:
An orthogonal frequency division multiple access (OFDMA)-based primary user (PU) network is considered, which provides different spectral access/energy harvesting opportunities in RF-powered cognitive radio networks (CRNs). In this scenario, we propose an optimal spectrum sensing policy for opportunistic spectrum access/energy harvesting under both the PU collision and energy causality constraints…
▽ More
An orthogonal frequency division multiple access (OFDMA)-based primary user (PU) network is considered, which provides different spectral access/energy harvesting opportunities in RF-powered cognitive radio networks (CRNs). In this scenario, we propose an optimal spectrum sensing policy for opportunistic spectrum access/energy harvesting under both the PU collision and energy causality constraints. PU subchannels can have different traffic patterns and exhibit distinct idle/busy frequencies, due to which the spectral access/energy harvesting opportunities are application specific. Secondary user (SU) collects traffic pattern information through observation of the PU subchannels and classifies the idle/busy period statistics for each subchannel. Based on the statistics, we invoke stochastic models for evaluating SU capacity by which the energy detection threshold for spectrum sensing can be adjusted with higher sensing accuracy. To this end, we employ the Markov decision process (MDP) model obtained by quantizing the amount of SU battery and the duty cycle model obtained by the ratio of average harvested energy and energy consumption rates. We demonstrate the effectiveness of the proposed stochastic models through comparison with the optimal one obtained from an exhaustive method.
△ Less
Submitted 6 April, 2018; v1 submitted 24 March, 2018;
originally announced March 2018.
-
The lamplighter group of rank two generated by a bireversible automaton
Authors:
Elsayed Ahmed,
Dmytro Savchuk
Abstract:
We construct a 4-state 2-letter bireversible automaton generating the lamplighter group $(\mathbb Z_2^2)\wr\mathbb Z$ of rank two. The action of the generators on the boundary of the tree can be induced by the affine transformations on the ring $\mathbb Z_2[[t]]$ of formal power series over $\mathbb Z_2$.
We construct a 4-state 2-letter bireversible automaton generating the lamplighter group $(\mathbb Z_2^2)\wr\mathbb Z$ of rank two. The action of the generators on the boundary of the tree can be induced by the affine transformations on the ring $\mathbb Z_2[[t]]$ of formal power series over $\mathbb Z_2$.
△ Less
Submitted 11 February, 2018;
originally announced February 2018.
-
Endomorphisms of regular rooted trees induced by the action of polynomials on the ring $\mathbb Z_d$ of $d$-adic integers
Authors:
Elsayed Ahmed,
Dmytro Savchuk
Abstract:
We show that every polynomial in $\mathbb Z[x]$ defines an endomorphism of the $d$-ary rooted tree induced by its action on the ring $\mathbb Z_d$ of $d$-adic integers. The sections of this endomorphism also turn out to be induced by polynomials in $\mathbb Z[x]$ of the same degree. In the case of permutational polynomials acting on $\mathbb Z_d$ by bijections the induced endomorphisms are automor…
▽ More
We show that every polynomial in $\mathbb Z[x]$ defines an endomorphism of the $d$-ary rooted tree induced by its action on the ring $\mathbb Z_d$ of $d$-adic integers. The sections of this endomorphism also turn out to be induced by polynomials in $\mathbb Z[x]$ of the same degree. In the case of permutational polynomials acting on $\mathbb Z_d$ by bijections the induced endomorphisms are automorphisms of the tree. In the case of $\mathbb Z_2$ such polynomials were completely characterized by Rivest. As our main application we utilize the result of Rivest to derive the condition on the coefficients of a permutational polynomial $f(x)\in\mathbb Z[x]$ that is necessary and sufficient for $f$ to induce a level transitive automorphism of the binary tree, which is equivalent to the ergodicity of the action of $f(x)$ on $\mathbb Z_2$ with respect to the normalized Haar measure.
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
Resonant temperature fluctuations in nebulae ionized by short-period binary stars
Authors:
Manuel A. Bautista,
Ehab E. Ahmed
Abstract:
A present prevailing open problem planetary nebulae research, and photoionized gaseous nebulae research at large, is the systematic discrepancies in ionic abundances derived from recombination and collisionally excited lines in many H II regions and planetary nebulae. Peimbert (1967) proposed that these discrepancies were due to 'temperature fluctuations' in the plasma, but the amplitude of such f…
▽ More
A present prevailing open problem planetary nebulae research, and photoionized gaseous nebulae research at large, is the systematic discrepancies in ionic abundances derived from recombination and collisionally excited lines in many H II regions and planetary nebulae. Peimbert (1967) proposed that these discrepancies were due to 'temperature fluctuations' in the plasma, but the amplitude of such fluctuations remain unexplained by standard phtoionization modeling. In this letter we show that large amplitude temperature oscillations are expected to form in gaseous nebulae photoionized by short-period binary stars. Such stars yield periodically varying ionizing radiation fields, which induce periodic oscilla- tions in the heating-minus-cooling function across the nebula. For flux oscillation periods of a few days any temperature perturbations in the gas with frequencies similar to those of the ionizing source will undergo resonant amplification. In this case, the rate of growth of the perturbations increases with the amplitude of the variations of the ionizing flux and with decreasing nebular equilibrium temperature. We also present a line ratios diagnostic plot that combines [O III] collisional lines and O II recombination lines for diagnosing equilibrium and fluctuation am- plitude temperatures in gaseous nebulae. When applying this diagnostic to the planetary nebula M 1-42 we find an equilibrium temperature of ~6000 K and a resonant temperature fluctuation amplitude (Trtf ) of ~4000 K. This equilibrium temperature is significantly lower than the temperature estimated when temperature perturbations are ignored.
△ Less
Submitted 22 September, 2017;
originally announced September 2017.
-
Liu-type Shrinkage Estimations in Linear Models
Authors:
Bahadır Yüzbaşı,
Yasin Asar,
S. Ejaz Ahmed
Abstract:
In this study, we present the preliminary test, Stein-type and positive part Liu estimators in the linear models when the parameter vector $\boldsymbolβ$ is partitioned into two parts, namely, the main effects $\boldsymbolβ_1$ and the nuisance effects $\boldsymbolβ_2$ such that $\boldsymbolβ=\left(\boldsymbolβ_1, \boldsymbolβ_2 \right)$. We consider the case that a priori known or suspected set of…
▽ More
In this study, we present the preliminary test, Stein-type and positive part Liu estimators in the linear models when the parameter vector $\boldsymbolβ$ is partitioned into two parts, namely, the main effects $\boldsymbolβ_1$ and the nuisance effects $\boldsymbolβ_2$ such that $\boldsymbolβ=\left(\boldsymbolβ_1, \boldsymbolβ_2 \right)$. We consider the case that a priori known or suspected set of the explanatory variables do not contribute to predict the response so that a sub-model may be enough for this purpose. Thus, the main interest is to estimate $\boldsymbolβ_1$ when $\boldsymbolβ_2$ is close to zero. Therefore, we conduct a Monte Carlo simulation study to evaluate the relative efficiency of the suggested estimators, where we demonstrate the superiority of the proposed estimators.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Shrinkage Estimation Strategies in Generalized Ridge Regression Models Under Low/High-Dimension Regime
Authors:
Bahadır Yüzbaşı,
Mohammad Arashi,
S. Ejaz Ahmed
Abstract:
In this study, we propose shrinkage methods based on {\it generalized ridge regression} (GRR) estimation which is suitable for both multicollinearity and high dimensional problems with small number of samples (large $p$, small $n$). Also, it is obtained theoretical properties of the proposed estimators for Low/High Dimensional cases. Furthermore, the performance of the listed estimators is demonst…
▽ More
In this study, we propose shrinkage methods based on {\it generalized ridge regression} (GRR) estimation which is suitable for both multicollinearity and high dimensional problems with small number of samples (large $p$, small $n$). Also, it is obtained theoretical properties of the proposed estimators for Low/High Dimensional cases. Furthermore, the performance of the listed estimators is demonstrated by both simulation studies and real-data analysis, and compare its performance with existing penalty methods. We show that the proposed methods compare well to competing regularization techniques.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Big Data Analysis Using Shrinkage Strategies
Authors:
B. Yuzbasi,
M. Arashi,
S. E. Ahmed
Abstract:
In this paper, we apply shrinkage strategies to estimate regression coefficients efficiently for the high-dimensional multiple regression model, where the number of samples is smaller than the number of predictors. We assume in the sparse linear model some of the predictors have very weak influence on the response of interest. We propose to shrink estimators more than usual. Specifically, we use i…
▽ More
In this paper, we apply shrinkage strategies to estimate regression coefficients efficiently for the high-dimensional multiple regression model, where the number of samples is smaller than the number of predictors. We assume in the sparse linear model some of the predictors have very weak influence on the response of interest. We propose to shrink estimators more than usual. Specifically, we use integrated estimation strategies in sub and full models and shrink the integrated estimators by incorporating a bounded measurable function of some weights. The exhibited double shrunken estimators improve the prediction performance of sub models significantly selected from existing Lasso-type variable selection methods. Monte Carlo simulation studies as well as real examples of eye data and Riboavin data confirm the superior performance of the estimators in the high-dimensional regression model.
△ Less
Submitted 17 April, 2017;
originally announced April 2017.
-
House price estimation from visual and textual features
Authors:
Eman Ahmed,
Mohamed Moustafa
Abstract:
Most existing automatic house price estimation systems rely only on some textual data like its neighborhood area and the number of rooms. The final price is estimated by a human agent who visits the house and assesses it visually. In this paper, we propose extracting visual features from house photographs and combining them with the house's textual information. The combined features are fed to a f…
▽ More
Most existing automatic house price estimation systems rely only on some textual data like its neighborhood area and the number of rooms. The final price is estimated by a human agent who visits the house and assesses it visually. In this paper, we propose extracting visual features from house photographs and combining them with the house's textual information. The combined features are fed to a fully connected multilayer Neural Network (NN) that estimates the house price as its single output. To train and evaluate our network, we have collected the first houses dataset (to our knowledge) that combines both images and textual attributes. The dataset is composed of 535 sample houses from the state of California, USA. Our experiments showed that adding the visual features increased the R-value by a factor of 3 and decreased the Mean Square Error (MSE) by one order of magnitude compared with textual-only features. Additionally, when trained on the benchmark textual-only features housing dataset, our proposed NN still outperformed the existing model published results.
△ Less
Submitted 27 September, 2016;
originally announced September 2016.
-
Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey
Authors:
Syed Adeel Ali Shah,
Ejaz Ahmed,
Feng Xia,
Ahmad Karim,
Muhammad Shiraz,
Rafidah MD Noor
Abstract:
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope…
▽ More
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope with application requirements. To this end, this paper is motivated by the classifications and capability evaluations of existing adaptive beaconing approaches. To begin with, we explore the anatomy and the performance requirements of beaconing. Then, the beaconing design is analyzed to introduce a design-based beaconing taxonomy. A survey of the state-of-the-art is conducted with an emphasis on the salient features of the beaconing approaches. We also evaluate the capabilities of beaconing approaches using several key parameters. A comparison among beaconing approaches is presented, which is based on the architectural and implementation characteristics. The paper concludes by discussing open challenges in the field.
△ Less
Submitted 24 May, 2016;
originally announced May 2016.
-
Post Selection Shrinkage Estimation for High Dimensional Data Analysis
Authors:
Xiaoli Gao,
S. E. Ahmed,
Yang Feng
Abstract:
In high-dimensional data settings where $p\gg n$, many penalized regularization approaches were studied for simultaneous variable selection and estimation. However, with the existence of covariates with weak effect, many existing variable selection methods, including Lasso and its generations, cannot distinguish covariates with weak and no contribution. Thus, prediction based on a subset model of…
▽ More
In high-dimensional data settings where $p\gg n$, many penalized regularization approaches were studied for simultaneous variable selection and estimation. However, with the existence of covariates with weak effect, many existing variable selection methods, including Lasso and its generations, cannot distinguish covariates with weak and no contribution. Thus, prediction based on a subset model of selected covariates only can be inefficient. In this paper, we propose a post selection shrinkage estimation strategy to improve the prediction performance of a selected subset model. Such a post selection shrinkage estimator (PSE) is data-adaptive and constructed by shrinking a post selection weighted ridge estimator in the direction of a selected candidate subset. Under an asymptotic distributional quadratic risk criterion, its prediction performance is explored analytically. We show that the proposed post selection PSE performs better than the post selection weighted ridge estimator. More importantly, it improves the prediction performance of any candidate subset model selected from most existing Lasso-type variable selection methods significantly. The relative performance of the post selection PSE is demonstrated by both simulation studies and real data analysis.
△ Less
Submitted 23 March, 2016;
originally announced March 2016.
-
All-Digital Self-interference Cancellation Technique for Full-duplex Systems
Authors:
Elsayed Ahmed,
Ahmed M. Eltawil
Abstract:
Full-duplex systems are expected to double the spectral efficiency compared to conventional half-duplex systems if the self-interference signal can be significantly mitigated. Digital cancellation is one of the lowest complexity self-interference cancellation techniques in full-duplex systems. However, its mitigation capability is very limited, mainly due to transmitter and receiver circuit's impa…
▽ More
Full-duplex systems are expected to double the spectral efficiency compared to conventional half-duplex systems if the self-interference signal can be significantly mitigated. Digital cancellation is one of the lowest complexity self-interference cancellation techniques in full-duplex systems. However, its mitigation capability is very limited, mainly due to transmitter and receiver circuit's impairments. In this paper, we propose a novel digital self-interference cancellation technique for full-duplex systems. The proposed technique is shown to significantly mitigate the self-interference signal as well as the associated transmitter and receiver impairments. In the proposed technique, an auxiliary receiver chain is used to obtain a digital-domain copy of the transmitted Radio Frequency (RF) self-interference signal. The self-interference copy is then used in the digital-domain to cancel out both the self-interference signal and the associated impairments. Furthermore, to alleviate the receiver phase noise effect, a common oscillator is shared between the auxiliary and ordinary receiver chains. A thorough analytical and numerical analysis for the effect of the transmitter and receiver impairments on the cancellation capability of the proposed technique is presented. Finally, the overall performance is numerically investigated showing that using the proposed technique, the self-interference signal could be mitigated to ~3dB higher than the receiver noise floor, which results in up to 76% rate improvement compared to conventional half-duplex systems at 20dBm transmit power values.
△ Less
Submitted 20 June, 2014;
originally announced June 2014.
-
Full-Duplex Systems Using Multi-Reconfigurable Antennas
Authors:
Elsayed Ahmed,
Ahmed M. Eltawil,
Zhouyuan Li,
Bedri A. Cetiner
Abstract:
Full-duplex systems are expected to achieve 100% rate improvement over half-duplex systems if the self-interference signal can be significantly mitigated. In this paper, we propose the first full-duplex system utilizing Multi-Reconfigurable Antenna (MRA) with ?90% rate improvement compared to half-duplex systems. MRA is a dynamically reconfigurable antenna structure, that is capable of changing it…
▽ More
Full-duplex systems are expected to achieve 100% rate improvement over half-duplex systems if the self-interference signal can be significantly mitigated. In this paper, we propose the first full-duplex system utilizing Multi-Reconfigurable Antenna (MRA) with ?90% rate improvement compared to half-duplex systems. MRA is a dynamically reconfigurable antenna structure, that is capable of changing its properties according to certain input configurations. A comprehensive experimental analysis is conducted to characterize the system performance in typical indoor environments. The experiments are performed using a fabricated MRA that has 4096 configurable radiation patterns. The achieved MRA-based passive self-interference suppression is investigated, with detailed analysis for the MRA training overhead. In addition, a heuristic-based approach is proposed to reduce the MRA training overhead. The results show that at 1% training overhead, a total of 95dB self-interference cancellation is achieved in typical indoor environments. The 95dB self-interference cancellation is experimentally shown to be sufficient for 90% full-duplex rate improvement compared to half-duplex systems.
△ Less
Submitted 29 May, 2014;
originally announced May 2014.
-
On Phase Noise Suppression in Full-Duplex Systems
Authors:
Elsayed Ahmed,
Ahmed M. Eltawil
Abstract:
Oscillator phase noise has been shown to be one of the main performance limiting factors in full-duplex systems. In this paper, we consider the problem of self-interference cancellation with phase noise suppression in full-duplex systems. The feasibility of performing phase noise suppression in full-duplex systems in terms of both complexity and achieved gain is analytically and experimentally inv…
▽ More
Oscillator phase noise has been shown to be one of the main performance limiting factors in full-duplex systems. In this paper, we consider the problem of self-interference cancellation with phase noise suppression in full-duplex systems. The feasibility of performing phase noise suppression in full-duplex systems in terms of both complexity and achieved gain is analytically and experimentally investigated. First, the effect of phase noise on full-duplex systems and the possibility of performing phase noise suppression are studied. Two different phase noise suppression techniques with a detailed complexity analysis are then proposed. For each suppression technique, both free-running and phase locked loop based oscillators are considered. Due to the fact that full-duplex system performance highly depends on hardware impairments, experimental analysis is essential for reliable results. In this paper, the performance of the proposed techniques is experimentally investigated in a typical indoor environment. The experimental results are shown to confirm the results obtained from numerical simulations on two different experimental research platforms. At the end, the tradeoff between the required complexity and the gain achieved using phase noise suppression is discussed.
△ Less
Submitted 6 November, 2014; v1 submitted 24 January, 2014;
originally announced January 2014.
-
On evolutionary games with periodic payoffs
Authors:
E. Ahmed,
Muntaser Safan
Abstract:
Two cases of evolutionary stable strategy with periodic payoffs are studied. The first is a generalization of Uyttendaele et al. The second is prisoner's dilemma with periodic payoff. It is shown that reducing the defection payoff by a periodic term is sufficient to introduce cooperation provided that the initial fraction of cooperators is greater than 0.6.
Two cases of evolutionary stable strategy with periodic payoffs are studied. The first is a generalization of Uyttendaele et al. The second is prisoner's dilemma with periodic payoff. It is shown that reducing the defection payoff by a periodic term is sufficient to introduce cooperation provided that the initial fraction of cooperators is greater than 0.6.
△ Less
Submitted 5 September, 2013;
originally announced September 2013.
-
Self-Interference Cancellation with Phase Noise Induced ICI Suppression for Full-Duplex Systems
Authors:
Elsayed Ahmed,
Ahmed M. Eltawil,
Ashutosh Sabharwal
Abstract:
One of the main bottlenecks in practical full-duplex systems is the oscillator phase noise, which bounds the possible cancellable self-interference power. In this paper, a digitaldomain self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable selfinterference power by suppressing th…
▽ More
One of the main bottlenecks in practical full-duplex systems is the oscillator phase noise, which bounds the possible cancellable self-interference power. In this paper, a digitaldomain self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable selfinterference power by suppressing the effect of both transmitter and receiver oscillator phase noise. The proposed scheme consists of two main phases, an estimation phase and a cancellation phase. In the estimation phase, the minimum mean square error estimator is used to jointly estimate the transmitter and receiver phase noise associated with the incoming self-interference signal. In the cancellation phase, the estimated phase noise is used to suppress the intercarrier interference caused by the phase noise associated with the incoming self-interference signal. The performance of the proposed scheme is numerically investigated under different operating conditions. It is demonstrated that the proposed scheme could achieve up to 9dB more self-interference cancellation than the existing digital-domain cancellation schemes that ignore the intercarrier interference suppression.
△ Less
Submitted 15 July, 2013;
originally announced July 2013.
-
Self-Interference Cancellation with Nonlinear Distortion Suppression for Full-Duplex Systems
Authors:
Elsayed Ahmed,
Ahmed M. Eltawil,
Ashutosh Sabharwal
Abstract:
In full-duplex systems, due to the strong self-interference signal, system nonlinearities become a significant limiting factor that bounds the possible cancellable self-interference power. In this paper, a self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable self-interference po…
▽ More
In full-duplex systems, due to the strong self-interference signal, system nonlinearities become a significant limiting factor that bounds the possible cancellable self-interference power. In this paper, a self-interference cancellation scheme for full-duplex orthogonal frequency division multiplexing systems is proposed. The proposed scheme increases the amount of cancellable self-interference power by suppressing the distortion caused by the transmitter and receiver nonlinearities. An iterative technique is used to jointly estimate the self-interference channel and the nonlinearity coefficients required to suppress the distortion signal. The performance is numerically investigated showing that the proposed scheme achieves a performance that is less than 0.5dB off the performance of a linear full-duplex system.
△ Less
Submitted 23 September, 2013; v1 submitted 14 July, 2013;
originally announced July 2013.
-
Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
Authors:
Saeid Abolfazli,
Zohreh Sanaei,
Ejaz Ahmed,
Abdullah Gani,
Rajkumar Buyya
Abstract:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive c…
▽ More
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
△ Less
Submitted 20 June, 2013;
originally announced June 2013.
-
Rate Gain Region and Design Tradeoffs for Full-Duplex Wireless Communications
Authors:
Elsayed Ahmed,
Ahmed Eltawil,
Ashutosh Sabharwal
Abstract:
In this paper, we analytically study the regime in which practical full-duplex systems can achieve larger rates than an equivalent half-duplex systems. The key challenge in practical full-duplex systems is uncancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, we first present a signal model which captures the effect of significan…
▽ More
In this paper, we analytically study the regime in which practical full-duplex systems can achieve larger rates than an equivalent half-duplex systems. The key challenge in practical full-duplex systems is uncancelled self-interference signal, which is caused by a combination of hardware and implementation imperfections. Thus, we first present a signal model which captures the effect of significant impairments such as oscillator phase noise, low-noise amplifier noise figure, mixer noise, and analog-to-digital converter quantization noise. Using the detailed signal model, we study the rate gain region, which is defined as the region of received signal-of-interest strength where full-duplex systems outperform half-duplex systems in terms of achievable rate. The rate gain region is derived as a piece-wise linear approximation in log-domain, and numerical results show that the approximation closely matches the exact region. Our analysis shows that when phase noise dominates mixer and quantization noise, full-duplex systems can use either active analog cancellation or base-band digital cancellation to achieve near-identical rate gain regions. Finally, as a design example, we numerically investigate the full-duplex system performance and rate gain region in typical indoor environments for practical wireless applications.
△ Less
Submitted 24 January, 2014; v1 submitted 7 March, 2013;
originally announced March 2013.
-
On Dynamical Cournot Game on a Graph
Authors:
E. Ahmed,
M. I. Shehata,
H. A. A. El-Saka
Abstract:
Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission.
Cournot dynamical game is studied on a graph. The stability of the system is studied. Prisoner's dilemma game is used to model natural gas transmission.
△ Less
Submitted 13 July, 2012;
originally announced August 2012.
-
Building MultiView Analyst Profile From Multidimensional Query Logs: From Consensual to Conflicting Preferences
Authors:
Eya Ben Ahmed,
Ahlem Nabli,
Faïez Gargouri
Abstract:
In order to provide suitable results to the analyst needs, user preferences summarization is widely used in several domains. In this paper, we introduce a new approach for user profile construction from OLAP query logs. The key idea is to learn the user's preferences by drawing the evidence from OLAP logs. In fact, the analyst preferences are clustered into three main pools : (i) consensual or non…
▽ More
In order to provide suitable results to the analyst needs, user preferences summarization is widely used in several domains. In this paper, we introduce a new approach for user profile construction from OLAP query logs. The key idea is to learn the user's preferences by drawing the evidence from OLAP logs. In fact, the analyst preferences are clustered into three main pools : (i) consensual or non conflicting preferences referring to same preferences for all analysts; (ii) semi-conflicting preferences corresponding to similar preferences for some analysts; (iii) conflicting preferences related to disjoint preferences for all analysts. To build generic and global model accurately describing the analyst, we enrich the obtained characteristics through including several views, namely the personal view, the professional view and the behavioral view. After that, the multiview profile extracted from multidimensional database can be annotated.
△ Less
Submitted 15 March, 2012;
originally announced March 2012.
-
Usage Des Mesures Pour La Génération Des Règles d'Associations Cycliques
Authors:
Eya Ben Ahmed,
Ahlem Nabli,
Faïez Gargouri
Abstract:
The online analytical processing (OLAP) does not provide any explanation of correlations discovered between data. Thus, the coupling of OLAP and data mining, especially association rules, is considered as an efficient solution to this problem. In this context, we mainly focus on a particular class of association rules which is the cyclic association rules. These rules aimed to discover patterns th…
▽ More
The online analytical processing (OLAP) does not provide any explanation of correlations discovered between data. Thus, the coupling of OLAP and data mining, especially association rules, is considered as an efficient solution to this problem. In this context, we mainly focus on a particular class of association rules which is the cyclic association rules. These rules aimed to discover patterns that display regular variation over user-defined intervals. Generally,the generated patterns do not take an advantage from the specificities of the multidimensional context namely, the consideration of the measures and their aggregations. In this paper, we introduce a novel method for extracting cyclic association rules from measures, and we redefine the evaluation metrics of association rules quality inspired of the temporal summarizability of measures concept through the integration of appropriate aggregation functions. To prove the usefulness of our approach, we conduct an empirical study on a real data warehouse.
△ Less
Submitted 9 September, 2012; v1 submitted 27 December, 2011;
originally announced December 2011.
-
Positive-shrinkage and Pretest Estimation in Multiple Regression: A Monte Carlo study with Applications
Authors:
SM Enayetur Raheem,
S. Ejaz Ahmed
Abstract:
Consider a problem of predicting a response variable using a set of covariates in a linear regression model. If it is \emph{a priori} known or suspected that a subset of the covariates do not significantly contribute to the overall fit of the model, a restricted model that excludes these covariates, may be sufficient. If, on the other hand, the subset provides useful information, shrinkage method…
▽ More
Consider a problem of predicting a response variable using a set of covariates in a linear regression model. If it is \emph{a priori} known or suspected that a subset of the covariates do not significantly contribute to the overall fit of the model, a restricted model that excludes these covariates, may be sufficient. If, on the other hand, the subset provides useful information, shrinkage method combines restricted and unrestricted estimators to obtain the parameter estimates. Such an estimator outperforms the classical maximum likelihood estimators. Any \emph{prior} information may be validated through preliminary test (or pretest), and depending on the validity, may be incorporated in the model as a parametric restriction. Thus, pretest estimator chooses between the restricted and unrestricted estimators depending on the outcome of the preliminary test. Examples using three real life data sets are provided to illustrate the application of shrinkage and pretest estimation. Performance of positive-shrinkage and pretest estimators are compared with unrestricted estimator under varying degree of uncertainty of the prior information. Monte Carlo study reconfirms the asymptotic properties of the estimators available in the literature.
△ Less
Submitted 12 September, 2011;
originally announced September 2011.
-
A Survey of User-Centric Data Warehouses: From Personalization to Recommendation
Authors:
Eya Ben Ahmed,
Ahlem Nabli,
Faïez Gargouri
Abstract:
Providing a customized support for the OLAP brings tremendous challenges to the OLAP technology. Standing at the crossroads of the preferences and the data warehouse, two emerging trends are pointed out; namely: (i) the personalization and (ii) the recommendation. Although the panoply of the proposed approaches, the user-centric data warehouse community issues have not been addressed yet. In this…
▽ More
Providing a customized support for the OLAP brings tremendous challenges to the OLAP technology. Standing at the crossroads of the preferences and the data warehouse, two emerging trends are pointed out; namely: (i) the personalization and (ii) the recommendation. Although the panoply of the proposed approaches, the user-centric data warehouse community issues have not been addressed yet. In this paper we draw an overview of several user centric data warehouse proposals. We also discuss the two promising concepts in this issue, namely, the personalization and the recommendation of the data warehouses. We compare the current approaches among each others with respect to some criteria.
△ Less
Submitted 9 July, 2011;
originally announced July 2011.
-
Global analysis of data on the spin-orbit coupled $A^{1}Σ_{u}^{+}$ and $b^{3}Π_{u}$ states of Cs2
Authors:
Jianmei Bai,
E. H. Ahmed,
B. Beser,
Y. Guan,
S. Kotochigova,
A. M. Lyyra,
S. Ashman,
C. M. Wolfe,
J. Huennekens,
Feng Xie,
Dan Li,
Li Li,
M. Tamanis,
R. Ferber,
A. Drozdova,
E. Pazyuk,
A. V. Stolyarov,
J. G. Danzl,
H. -C. Nägerl,
N. Bouloufa,
O. Dulieu,
C. Amiot,
H. Salami,
T. Bergeman
Abstract:
We present experimentally derived potential curves and spin-orbit interaction functions for the strongly perturbed $A^{1}Σ_{u}^{+}$ and $b^{3}Π_{u}$ states of the cesium dimer. The results are based on data from several sources. Laser-induced fluorescence Fourier transform spectroscopy (LIF FTS) was used some time ago in the Laboratoire Aimé Cotton primarily to study the $X ^{1}Σ_{g}^{+}$ state. M…
▽ More
We present experimentally derived potential curves and spin-orbit interaction functions for the strongly perturbed $A^{1}Σ_{u}^{+}$ and $b^{3}Π_{u}$ states of the cesium dimer. The results are based on data from several sources. Laser-induced fluorescence Fourier transform spectroscopy (LIF FTS) was used some time ago in the Laboratoire Aimé Cotton primarily to study the $X ^{1}Σ_{g}^{+}$ state. More recent work at Tsinghua University provides information from moderate resolution spectroscopy on the lowest levels of the $b^{3}Π_{0u}^{\pm}$ states as well as additional high resolution data. From Innsbruck University, we have precision data obtained with cold Cs$_{2}$ molecules. Recent data from Temple University was obtained using the optical-optical double resonance polarization spectroscopy technique, and finally, a group at the University of Latvia has added additional LIF FTS data. In the Hamiltonian matrix, we have used analytic potentials (the Expanded Morse Oscillator form) with both finite-difference (FD) coupled-channels and discrete variable representation (DVR) calculations of the term values. Fitted diagonal and off-diagonal spin-orbit functions are obtained and compared with {\it ab initio} results from Temple and Moscow State universities.
△ Less
Submitted 27 January, 2011;
originally announced January 2011.
-
Towards an incremental maintenance of cyclic association rules
Authors:
Eya ben Ahmed,
Mohamed Salah Gouider
Abstract:
Recently, the cyclic association rules have been introduced in order to discover rules from items characterized by their regular variation over time. In real life situations, temporal databases are often appended or updated. Rescanning the whole database every time is highly expensive while existing incremental mining techniques can efficiently solve such a problem. In this paper, we propose an in…
▽ More
Recently, the cyclic association rules have been introduced in order to discover rules from items characterized by their regular variation over time. In real life situations, temporal databases are often appended or updated. Rescanning the whole database every time is highly expensive while existing incremental mining techniques can efficiently solve such a problem. In this paper, we propose an incremental algorithm for cyclic association rules maintenance. The carried out experiments of our proposal stress on its efficiency and performance.
△ Less
Submitted 26 September, 2010;
originally announced September 2010.
-
Nernst Effect of stripe ordering La$_{1.8-x}$Eu$_{0.2}$Sr$_x$CuO$_4$
Authors:
Christian Hess,
Emad M. Ahmed,
Udo Ammerahl,
Alexandre Revcolevschi,
Bernd Büchner
Abstract:
We investigate the transport properties of La$_{1.8-x}$Eu$_{0.2}$Sr$_x$CuO$_4$ ($x=0.04$, 0.08, 0.125, 0.15, 0.2) with a special focus on the Nernst effect in the normal state. Various anomalous features are present in the data. For $x=0.125$ and 0.15 a kink-like anomaly is present in the vicinity of the onset of charge stripe order in the LTT phase, suggestive of enhanced positive quasiparticle N…
▽ More
We investigate the transport properties of La$_{1.8-x}$Eu$_{0.2}$Sr$_x$CuO$_4$ ($x=0.04$, 0.08, 0.125, 0.15, 0.2) with a special focus on the Nernst effect in the normal state. Various anomalous features are present in the data. For $x=0.125$ and 0.15 a kink-like anomaly is present in the vicinity of the onset of charge stripe order in the LTT phase, suggestive of enhanced positive quasiparticle Nernst response in the stripe ordered phase. At higher temperature, all do** levels except $x=0.2$ exhibit a further kink anomaly in the LTO phase which cannot unambiguously be related to stripe order. Moreover, a direct comparison between the Nernst coefficients of stripe ordering La$_{1.8-x}$Eu$_{0.2}$Sr$_x$CuO$_4$ and superconducting La$_{2-x}$Sr$_x$CuO$_4$ at the do** levels $x=0.125$ and $x=0.15$ reveals only weak differences. Our findings make high demands on any scenario interpreting the Nernst response in hole-doped cuprates.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Authors:
Eslam Gamal Ahmed,
Eman Shaaban,
Mohamed Hashem
Abstract:
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low c…
▽ More
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.
△ Less
Submitted 25 May, 2010;
originally announced May 2010.
-
On applications of Ulam-Hyers stability in biology and economics
Authors:
E. Ahmed,
A. M. A. El-Sayed,
H. A. A. El-Saka,
Gehan A. Ashry
Abstract:
We argue that Ulam-Hyers stability concept is quite significant in realistic problems in numerical analysis, biology and economics. A generalization to nonlinear systems is proposed and applied to the logistic equation (both differential and difference), SIS epidemic model, Cournot model in economics and a reaction diffusion equation. To the best of our knowledge this is the first time Ulam-Hyers…
▽ More
We argue that Ulam-Hyers stability concept is quite significant in realistic problems in numerical analysis, biology and economics. A generalization to nonlinear systems is proposed and applied to the logistic equation (both differential and difference), SIS epidemic model, Cournot model in economics and a reaction diffusion equation. To the best of our knowledge this is the first time Ulam-Hyers stability is considered from the applications point of view.
△ Less
Submitted 3 April, 2010;
originally announced April 2010.
-
Lightweight Distance bound Protocol for Low Cost RFID Tags
Authors:
Eslam Gamal Ahmed,
Eman Shaaban,
Mohamed Hashem
Abstract:
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a prom…
▽ More
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.
△ Less
Submitted 7 May, 2010; v1 submitted 7 April, 2010;
originally announced April 2010.