-
A Cutting-Edge Deep Learning Method For Enhancing IoT Security
Authors:
Nadia Ansar,
Mohammad Sadique Ansari,
Mohammad Sharique,
Aamina Khatoon,
Md Abdul Malik,
Md Munir Siddiqui
Abstract:
There have been significant issues given the IoT, with heterogeneity of billions of devices and with a large amount of data. This paper proposed an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks. Our model, based on the CICIDS2017 dataset,…
▽ More
There have been significant issues given the IoT, with heterogeneity of billions of devices and with a large amount of data. This paper proposed an innovative design of the Internet of Things (IoT) Environment Intrusion Detection System (or IDS) using Deep Learning-integrated Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks. Our model, based on the CICIDS2017 dataset, achieved an accuracy of 99.52% in classifying network traffic as either benign or malicious. The real-time processing capability, scalability, and low false alarm rate in our model surpass some traditional IDS approaches and, therefore, prove successful for application in today's IoT networks. The development and the performance of the model, with possible applications that may extend to other related fields of adaptive learning techniques and cross-domain applicability, are discussed. The research involving deep learning for IoT cybersecurity offers a potent solution for significantly improving network security.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Analysis of the BraTS 2023 Intracranial Meningioma Segmentation Challenge
Authors:
Dominic LaBella,
Ujjwal Baid,
Omaditya Khanna,
Shan McBurney-Lin,
Ryan McLean,
Pierre Nedelec,
Arif Rashid,
Nourel Hoda Tahon,
Talissa Altes,
Radhika Bhalerao,
Yaseen Dhemesh,
Devon Godfrey,
Fathi Hilal,
Scott Floyd,
Anastasia Janas,
Anahita Fathi Kazerooni,
John Kirkpatrick,
Collin Kent,
Florian Kofler,
Kevin Leu,
Nazanin Maleki,
Bjoern Menze,
Maxence Pajot,
Zachary J. Reitman,
Jeffrey D. Rudie
, et al. (96 additional authors not shown)
Abstract:
We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning…
▽ More
We describe the design and results from the BraTS 2023 Intracranial Meningioma Segmentation Challenge. The BraTS Meningioma Challenge differed from prior BraTS Glioma challenges in that it focused on meningiomas, which are typically benign extra-axial tumors with diverse radiologic and anatomical presentation and a propensity for multiplicity. Nine participating teams each developed deep-learning automated segmentation models using image data from the largest multi-institutional systematically expert annotated multilabel multi-sequence meningioma MRI dataset to date, which included 1000 training set cases, 141 validation set cases, and 283 hidden test set cases. Each case included T2, T2/FLAIR, T1, and T1Gd brain MRI sequences with associated tumor compartment labels delineating enhancing tumor, non-enhancing tumor, and surrounding non-enhancing T2/FLAIR hyperintensity. Participant automated segmentation models were evaluated and ranked based on a scoring system evaluating lesion-wise metrics including dice similarity coefficient (DSC) and 95% Hausdorff Distance. The top ranked team had a lesion-wise median dice similarity coefficient (DSC) of 0.976, 0.976, and 0.964 for enhancing tumor, tumor core, and whole tumor, respectively and a corresponding average DSC of 0.899, 0.904, and 0.871, respectively. These results serve as state-of-the-art benchmarks for future pre-operative meningioma automated segmentation algorithms. Additionally, we found that 1286 of 1424 cases (90.3%) had at least 1 compartment voxel abutting the edge of the skull-stripped image edge, which requires further investigation into optimal pre-processing face anonymization steps.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Dynamics of Steered Quantum Coherence and Magic Resource under Sudden Quench
Authors:
Saeid Ansari,
Alireza Akbari,
R. Jafari
Abstract:
We explore the dynamics of l_1-norm of steered quantum coherence (SQC), steered quantum relative entropy (SQRE), and magic resource quantifier (QRM) in the one-dimensional XY spin chain in the presence of time dependent transverse magnetic field. We find that the system's response is highly sensitive to the initial state and magnetic field strength. % We show that the dynamics of SQC, SQRE and MRQ…
▽ More
We explore the dynamics of l_1-norm of steered quantum coherence (SQC), steered quantum relative entropy (SQRE), and magic resource quantifier (QRM) in the one-dimensional XY spin chain in the presence of time dependent transverse magnetic field. We find that the system's response is highly sensitive to the initial state and magnetic field strength. % We show that the dynamics of SQC, SQRE and MRQ revealing the critical point associated with equilibrium quantum phase transition (QPT) of the system. All quantities show maximum at QPT when the initial state is prepared in the ferromagnetic phase. Conversely, they undergo abrupt changes at quantum critical point if the initial state of the system is paramagnetic. Moreover, our results confirm that, when quench is done to the quantum critical point, the first suppression (revival) time scales linearly with the system size, and remarkably, its scaling ratio remains consistent for all quenches, irrespective of the initial phase of the system. % These results highlight the interplay between the quantum information resources and dynamics of quantum systems away from the equilibrium. Such insights could be vital for quantum information processing and understanding non-equilibrium phenomena in quantum many-body systems.
△ Less
Submitted 11 May, 2024;
originally announced May 2024.
-
Modelling Technique for GDPR-compliance: Toward a Comprehensive Solution
Authors:
Naila Azam,
Anna Lito Michala,
Shuja Ansari,
Nguyen Truong
Abstract:
Data-driven applications and services have been increasingly deployed in all aspects of life including healthcare and medical services in which a huge amount of personal data is collected, aggregated, and processed in a centralised server from various sources. As a consequence, preserving the data privacy and security of these applications is of paramount importance. Since May 2018, the new data p…
▽ More
Data-driven applications and services have been increasingly deployed in all aspects of life including healthcare and medical services in which a huge amount of personal data is collected, aggregated, and processed in a centralised server from various sources. As a consequence, preserving the data privacy and security of these applications is of paramount importance. Since May 2018, the new data protection legislation in the EU/UK, namely the General Data Protection Regulation (GDPR), has come into force and this has called for a critical need for modelling compliance with the GDPR's sophisticated requirements. Existing threat modelling techniques are not designed to model GDPR compliance, particularly in a complex system where personal data is collected, processed, manipulated, and shared with third parties. In this paper, we present a novel comprehensive solution for develo** a threat modelling technique to address threats of non-compliance and mitigate them by taking GDPR requirements as the baseline and combining them with the existing security and privacy modelling techniques (i.e., \textit{STRIDE} and \textit{LINDDUN}, respectively). For this purpose, we propose a new data flow diagram integrated with the GDPR principles, develop a knowledge base for the non-compliance threats, and leverage an inference engine for reasoning the GDPR non-compliance threats over the knowledge base. Finally, we demonstrate our solution for threats of non-compliance with legal basis and accountability in a telehealth system to show the feasibility and effectiveness of the proposed solution.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
On Secure mmWave RSMA Systems
Authors:
Hongjiang Lei,
Sha Zhou,
Xinhu Chen,
Imran Shafique Ansari,
Yun Li,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
This work considers a multiple-input-single-output mmWave RSMA system wherein a base station serves two users in the presence of a passive eavesdropper. Different eavesdrop** scenarios are considered corresponding to the overlapped resolvable paths between the main and the wiretap channels under the considered transmission schemes. The analytical expressions for the secrecy outage probability ar…
▽ More
This work considers a multiple-input-single-output mmWave RSMA system wherein a base station serves two users in the presence of a passive eavesdropper. Different eavesdrop** scenarios are considered corresponding to the overlapped resolvable paths between the main and the wiretap channels under the considered transmission schemes. The analytical expressions for the secrecy outage probability are derived respectively through the Gaussian Chebyshev quadrature method. Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of system parameters on the SOP of the considered mmWave RSMA systems.
△ Less
Submitted 25 February, 2024; v1 submitted 3 February, 2024;
originally announced February 2024.
-
Exploration of Activation Fault Reliability in Quantized Systolic Array-Based DNN Accelerators
Authors:
Mahdi Taheri,
Natalia Cherezova,
Mohammad Saeed Ansari,
Maksim Jenihhin,
Ali Mahani,
Masoud Daneshtalab,
Jaan Raik
Abstract:
The stringent requirements for the Deep Neural Networks (DNNs) accelerator's reliability stand along with the need for reducing the computational burden on the hardware platforms, i.e. reducing the energy consumption and execution time as well as increasing the efficiency of DNN accelerators. Moreover, the growing demand for specialized DNN accelerators with tailored requirements, particularly for…
▽ More
The stringent requirements for the Deep Neural Networks (DNNs) accelerator's reliability stand along with the need for reducing the computational burden on the hardware platforms, i.e. reducing the energy consumption and execution time as well as increasing the efficiency of DNN accelerators. Moreover, the growing demand for specialized DNN accelerators with tailored requirements, particularly for safety-critical applications, necessitates a comprehensive design space exploration to enable the development of efficient and robust accelerators that meet those requirements. Therefore, the trade-off between hardware performance, i.e. area and delay, and the reliability of the DNN accelerator implementation becomes critical and requires tools for analysis. This paper presents a comprehensive methodology for exploring and enabling a holistic assessment of the trilateral impact of quantization on model accuracy, activation fault reliability, and hardware efficiency. A fully automated framework is introduced that is capable of applying various quantization-aware techniques, fault injection, and hardware implementation, thus enabling the measurement of hardware parameters. Moreover, this paper proposes a novel lightweight protection technique integrated within the framework to ensure the dependable deployment of the final systolic-array-based FPGA implementation. The experiments on established benchmarks demonstrate the analysis flow and the profound implications of quantization on reliability, hardware performance, and network accuracy, particularly concerning the transient faults in the network's activations.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Faedo-Galerkin approximation technique to non-instantaneous impulsive abstract functional differential equations
Authors:
Shahin Ansari,
Muslim Malik
Abstract:
This manuscript is devoted to the study of a class of nonlinear non-instantaneous impulsive first order abstract retarded type functional differential equations in an arbitrary separable Hilbert space H. A new set of sufficient conditions are derived to ensure the existence of approximate solutions. Finite dimensional approximations are derived using the projection operator. Through the utilizatio…
▽ More
This manuscript is devoted to the study of a class of nonlinear non-instantaneous impulsive first order abstract retarded type functional differential equations in an arbitrary separable Hilbert space H. A new set of sufficient conditions are derived to ensure the existence of approximate solutions. Finite dimensional approximations are derived using the projection operator. Through the utilization of analytic semigroup theory, fixed point theorem and Gronwall inequality, we establish the uniqueness and convergence of approximate solutions. Additionally, we study the Faedo-Galerkin approximate solutions and establish some convergence results. Finally, an illustrative instance demonstrating the applications of obtained results to partial differential equations is provided.
△ Less
Submitted 3 October, 2023;
originally announced November 2023.
-
Trajectory and Power Design for Aerial Multi-User Covert Communications
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a frien…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a friendly jammer UAV transmits artificial jamming signals to fight with the wardens. The scenario of wardens being outfitted with a single antenna is considered, and the detection error probability (DEP) of wardens with finite observations is researched. Then, considering the uncertainty of wardens' location, a robust optimization problem with worst-case covertness constraint is formulated to maximize the average covert rate by jointly optimizing power allocation and trajectory. To cope with the optimization problem, an algorithm based on successive convex approximation methods is proposed. Thereafter, the results are extended to the case where all the wardens are equipped with multiple antennas. After analyzing the DEP in this scenario, a tractable lower bound of the DEP is obtained by utilizing Pinsker's inequality. Subsequently, the non-convex optimization problem was established and efficiently coped by utilizing a similar algorithm as in the single-antenna scenario. Numerical results indicate the effectiveness of our proposed algorithm.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radi…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radio networks (CRNs) with multiple uncertainties colluding eavesdroppers. A cognitive aerial base station transmits messages to cognitive terrestrial users using the spectrum resource of the primary users. All secondary terrestrial users and illegitimate receivers jointly decode the received message. The average secrecy rate of the aerial CRNs is maximized by jointly optimizing the UAV's trajectory and transmission power. An iterative algorithm based on block coordinate descent and successive convex approximation is proposed to solve the non-convex mixed-variable optimization problem. Numerical results verify the effectiveness of our proposed algorithm and show that our scheme improves the secrecy performance of airborne CRNs.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
A high sensitivity Cherenkov detector for Prompt Gamma Timing and Time Imaging
Authors:
Maxime Jacquet,
Saba Ansari,
Marie-Laure Gallin-Martel,
Adélie André,
Yannick Boursier,
Mathieu Dupont,
Jilali Es-smimih,
Laurent Gallin-Martel,
Joël Hérault,
Christophe Hoarau,
Johan-Petter Hofverberg,
Daniel Maneval,
Christian Morel,
Jean-François Muraz,
Fabrice Salicis,
Sara Marcatili
Abstract:
We recently proposed a new approach for the real-time monitoring of particle therapy treatments with the goal of achieving high sensitivities on the particle range measurement already at limited counting statistics. This method extends the Prompt Gamma (PG) timing technique to obtain the PG vertex distribution from the exclusive measurement of particle Time-Of-Flight (TOF). It was previously shown…
▽ More
We recently proposed a new approach for the real-time monitoring of particle therapy treatments with the goal of achieving high sensitivities on the particle range measurement already at limited counting statistics. This method extends the Prompt Gamma (PG) timing technique to obtain the PG vertex distribution from the exclusive measurement of particle Time-Of-Flight (TOF). It was previously shown, through Monte Carlo simulation, that an original data reconstruction algorithm (Prompt Gamma Time Imaging) allows to combine the response of multiple detectors placed around the target. In this work we focus on the experimental feasibility of PGTI in Single Proton Regime (SPR) through the development of a multi-channel, Cherenkov-based PG detector with a targeted time resolution of 235 ps (FWHM): the TOF Imaging ARrAy (TIARA). The PG module that we developed is composed of a small PbF$_{2}$ crystal coupled to a silicon photoMultiplier to provide the time stamp of the PG. This prototype was tested with 63 MeV protons delivered from a cyclotron: a time resolution of 276 ps (FWHM) was obtained, resulting in a proton range sensitivity of 4 mm at 2$σ$ with the acquisition of only 600 PGs. A second prototype was also evaluated with 148 MeV protons delivered from a synchro-cyclotron obtaining a time resolution below 167 ps (FWHM) for the gamma detector. Moreover, using two identical PG modules, it was shown that a uniform sensitivity on the PG profiles would be achievable by combining the response of gamma detectors uniformly distributed around the target. This work provides the experimental proof-of-concept for the development of a high sensitivity detector that can be used to monitor particle therapy treatments and potentially act in real-time if the irradiation does not comply to treatment plan.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Finite dimensional approximation to fractional stochastic integro-differential equations with non-instantaneous impulses
Authors:
Shahin Ansari,
Muslim Malik
Abstract:
This manuscript proposes a class of fractional stochastic integro-differential equation (FSIDE) with non-instantaneous impulses in an arbitrary separable Hilbert space. We use a projection scheme of increasing sequence of finite dimensional subspaces and projection operators to define approximations. In order to demonstrate the existence and convergence of an approximate solution, we utilize stoch…
▽ More
This manuscript proposes a class of fractional stochastic integro-differential equation (FSIDE) with non-instantaneous impulses in an arbitrary separable Hilbert space. We use a projection scheme of increasing sequence of finite dimensional subspaces and projection operators to define approximations. In order to demonstrate the existence and convergence of an approximate solution, we utilize stochastic analysis theory, fractional calculus, theory of fractional cosine family of linear operators and fixed point approach. Furthermore, we examine the convergence of Faedo-Galerkin(F-G) approximate solution to the mild solution of our given problem. Finally, a concrete example involving partial differential equation is provided to validate the main abstract results.
△ Less
Submitted 10 August, 2023;
originally announced September 2023.
-
A fixed point approach for finding approximate solutions to second order non-instantaneous impulsive abstract differential equations
Authors:
Shahin Ansari,
Muslim Malik,
Javid Ali
Abstract:
This paper is concerned with the approximation of solutions to a class of second order non linear abstract differential equations. The finite-dimensional approximate solutions of the given system are built with the aid of the projection operator. We investigate the connection between the approximate solution and exact solution, and the question of convergence. Moreover, we define the Faedo-Galerki…
▽ More
This paper is concerned with the approximation of solutions to a class of second order non linear abstract differential equations. The finite-dimensional approximate solutions of the given system are built with the aid of the projection operator. We investigate the connection between the approximate solution and exact solution, and the question of convergence. Moreover, we define the Faedo-Galerkin(F-G) approximations and prove the existence and convergence results. The results are obtained by using the theory of cosine functions, Banach fixed point theorem and fractional power of closed linear operators. At last, an example of abstract formulation is provided.
△ Less
Submitted 1 February, 2024; v1 submitted 11 August, 2023;
originally announced September 2023.
-
The Impact of Loss Functions and Scene Representations for 3D/2D Registration on Single-view Fluoroscopic X-ray Pose Estimation
Authors:
Chaochao Zhou,
Syed Hasib Akhter Faruqui,
Abhinav Patel,
Ramez N. Abdalla,
Michael C. Hurley,
Ali Shaibani,
Matthew B. Potts,
Babak S. Jahromi,
Sameer A. Ansari,
Donald R. Cantrell
Abstract:
Many tasks performed in image-guided procedures can be cast as pose estimation problems, where specific projections are chosen to reach a target in 3D space. In this study, we first develop a differentiable projection (DiffProj) rendering framework for the efficient computation of Digitally Reconstructed Radiographs (DRRs) with automatic differentiability from either Cone-Beam Computerized Tomogra…
▽ More
Many tasks performed in image-guided procedures can be cast as pose estimation problems, where specific projections are chosen to reach a target in 3D space. In this study, we first develop a differentiable projection (DiffProj) rendering framework for the efficient computation of Digitally Reconstructed Radiographs (DRRs) with automatic differentiability from either Cone-Beam Computerized Tomography (CBCT) or neural scene representations, including two newly proposed methods, Neural Tuned Tomography (NeTT) and masked Neural Radiance Fields (mNeRF). We then perform pose estimation by iterative gradient descent using various candidate loss functions, that quantify the image discrepancy of the synthesized DRR with respect to the ground-truth fluoroscopic X-ray image. Compared to alternative loss functions, the Mutual Information loss function can significantly improve pose estimation accuracy, as it can effectively prevent entrapment in local optima. Using the Mutual Information loss, a comprehensive evaluation of pose estimation performed on a tomographic X-ray dataset of 50 patients$'$ skulls shows that utilizing either discretized (CBCT) or neural (NeTT/mNeRF) scene representations in DiffProj leads to comparable performance in DRR appearance and pose estimation (3D angle errors: mean $\leq$ 3.2° and 90% quantile $\leq$ 3.4°), despite the latter often incurring considerable training expenses and time. These findings could be instrumental for selecting appropriate approaches to improve the efficiency and effectiveness of fluoroscopic X-ray pose estimation in widespread image-guided interventions.
△ Less
Submitted 27 February, 2024; v1 submitted 31 July, 2023;
originally announced August 2023.
-
Ion Transport Mechanisms in Pectin-containing EC-LiTFSI Electrolytes
Authors:
Sipra Mohapatra,
Hema Teherpuria,
Sapta Sindhu Paul Chowdhury,
Suleman Jalilahmad Ansari,
Prabhat K Jaiswal,
Roland R. Netz,
Santosh Mogurampelly
Abstract:
Using all-atom molecular dynamics simulations, we report the structure and ion transport characteristics of a new class of solid polymer electrolytes that contain biodegradable and mechanically stable biopolymer pectin. We simulate a highly conducting ethylene carbonate (EC) as a solvent for lithium-trifluoromethanesulfonimide (LiTFSI) salt containing different weight percentages of pectin. Our si…
▽ More
Using all-atom molecular dynamics simulations, we report the structure and ion transport characteristics of a new class of solid polymer electrolytes that contain biodegradable and mechanically stable biopolymer pectin. We simulate a highly conducting ethylene carbonate (EC) as a solvent for lithium-trifluoromethanesulfonimide (LiTFSI) salt containing different weight percentages of pectin. Our simulations reveal that the pectin chains reduce the coordination numbers of lithium ions around the counterions (and vice-versa) because of stronger lithium-pectin interactions compared to lithium-TFSI interactions. Further, the pectin is found to promote smaller ionic aggregates over larger ones, contrary to results typically reported for liquid and polymer electrolytes. We observe that the loading of pectin in EC-LiTFSI electrolytes increases the viscosity ($η$) and relaxation timescales ($τ_c$), indicating higher mechanical stability and, consequently, the mean squared displacements, diffusion coefficients (D), and the Nernst-Einstein conductivity ($σ_{NE}$) decrease. Interestingly, while the lithium diffusivities are related to the ion-pair relaxation timescales as $D_+\sim τ_c^{-3.1}$, the TFSI$^-$ diffusivities exhibit excellent correlations with ion-pair relaxation timescales as $D_-\sim τ_c^{-0.95}$. On the other hand, the NE conductivities are dictated by distinct transport mechanisms and scales with ion-pair relaxation timescale as $σ_{NE}\sim τ_c^{-1.85}$.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
A Novel Deep Learning based Model for Erythrocytes Classification and Quantification in Sickle Cell Disease
Authors:
Manish Bhatia,
Balram Meena,
Vipin Kumar Rathi,
Prayag Tiwari,
Amit Kumar Jaiswal,
Shagaf M Ansari,
Ajay Kumar,
Pekka Marttinen
Abstract:
The shape of erythrocytes or red blood cells is altered in several pathological conditions. Therefore, identifying and quantifying different erythrocyte shapes can help diagnose various diseases and assist in designing a treatment strategy. Machine Learning (ML) can be efficiently used to identify and quantify distorted erythrocyte morphologies. In this paper, we proposed a customized deep convolu…
▽ More
The shape of erythrocytes or red blood cells is altered in several pathological conditions. Therefore, identifying and quantifying different erythrocyte shapes can help diagnose various diseases and assist in designing a treatment strategy. Machine Learning (ML) can be efficiently used to identify and quantify distorted erythrocyte morphologies. In this paper, we proposed a customized deep convolutional neural network (CNN) model to classify and quantify the distorted and normal morphology of erythrocytes from the images taken from the blood samples of patients suffering from Sickle cell disease ( SCD). We chose SCD as a model disease condition due to the presence of diverse erythrocyte morphologies in the blood samples of SCD patients. For the analysis, we used 428 raw microscopic images of SCD blood samples and generated the dataset consisting of 10, 377 single-cell images. We focused on three well-defined erythrocyte shapes, including discocytes, oval, and sickle. We used 18 layered deep CNN architecture to identify and quantify these shapes with 81% accuracy, outperforming other models. We also used SHAP and LIME for further interpretability. The proposed model can be helpful for the quick and accurate analysis of SCD blood samples by the clinicians and help them make the right decision for better management of SCD.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
RIS-aided Mixed RF-FSO Wireless Networks: Secrecy Performance Analysis with Simultaneous Eavesdrop**
Authors:
Md. Mijanur Rahman,
A. S. M. Badrudduza,
Noor Ahmad Sarker,
Md. Ibrahim,
Imran Shafique Ansari
Abstract:
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehen…
▽ More
The appearance of sixth-generation networks has resulted in the proposal of several solutions to tackle signal loss. One of these solutions is the utilization of reconfigurable intelligent surfaces (RIS), which can reflect or refract signals as required. This integration offers significant potential to improve the coverage area from the sender to the receiver. In this paper, we present a comprehensive framework for analyzing the secrecy performance of a RIS-aided mixed radio frequency (RF)-free space optics (FSO) system, for the first time. Our study assumes that a secure message is transmitted from a RF transmitter to a FSO receiver through an intermediate relay. The RF link experiences Rician fading while the FSO link experiences Málaga distributed turbulence with pointing errors. We examine three scenarios: 1) RF-link eavesdrop**, 2) FSO-link eavesdrop**, and 3) a simultaneous eavesdrop** attack on both RF and FSO links. We evaluate the secrecy performance using analytical expressions to compute secrecy metrics such as the average secrecy capacity, secrecy outage probability, strictly positive secrecy capacity, effective secrecy throughput, and intercept probability. Our results are confirmed via Monte-Carlo simulations and demonstrate that fading parameters, atmospheric turbulence conditions, pointing errors, and detection techniques play a crucial role in enhancing secrecy performance.
△ Less
Submitted 9 April, 2023;
originally announced April 2023.
-
Reconfigurable Intelligent Surface-Assisted Cross-Layer Authentication for Secure and Efficient Vehicular Communications
Authors:
Mahmoud A. Shawky,
Syed Tariq Shah,
Michael S. Mollel,
Jalil R. Kazim,
Muhammad Ali Imran,
Qammer H. Abbasi,
Shuja Ansari,
Ahmad Taha
Abstract:
Intelligent transportation systems increasingly depend on wireless communication, facilitating real-time vehicular communication. In this context, message authentication is crucial for establishing secure and reliable communication. However, security solutions must consider the dynamic nature of vehicular communication links, which fluctuate between line-of-sight (LoS) and non-line-of-sight (NLoS)…
▽ More
Intelligent transportation systems increasingly depend on wireless communication, facilitating real-time vehicular communication. In this context, message authentication is crucial for establishing secure and reliable communication. However, security solutions must consider the dynamic nature of vehicular communication links, which fluctuate between line-of-sight (LoS) and non-line-of-sight (NLoS). In this paper, we propose a lightweight cross-layer authentication scheme that employs public-key infrastructure-based authentication for initial legitimacy detection while using keyed-based physical-layer re-authentication for message verification. However, the latter's detection probability (P_d) decreases with the reduction of the signal-to-noise ratio (SNR). Therefore, we examine using Reconfigurable Intelligent Surface (RIS) to enhance the SNR value directed toward the designated vehicle and consequently improve the P_d, especially for NLoS scenarios. We conducted theoretical analysis and practical implementation of the proposed scheme using a 1-bit RIS, consisting of 64 x 64 reflective units. Experimental results show a significant improvement in the P_d, increasing from 0.82 to 0.96 at SNR = - 6 dB for an orthogonal frequency division multiplexing system with 128 subcarriers. We also conducted informal and formal security analyses, using Burrows-Abadi-Needham (BAN)-logic, to prove the scheme's ability to resist passive and active attacks. Finally, the computation and communication comparisons demonstrate the superior performance of the proposed scheme compared to traditional crypto-based methods.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Effects of Co-channel Interference on RIS Empowered Wireless Networks amid Multiple Eavesdrop** Attempts
Authors:
Md. Roisul Ajom Ruku,
Md. Ibrahim,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdr…
▽ More
This letter is concerned with the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination. To be more precise, we analyze three critical issues in the design of secure RIS-assisted networks: 1) How do interferers affect the performance of secure wireless networks? 2) Which of the two groups of eavesdroppers (i.e., colluding and non-colluding) is more severe? 3) How can RIS improve network confidentiality? To do so, we develop the analytical expression of secrecy outage probability in closed-form, along with asymptotic analysis at high signal-to-noise ratio regime to better understand the impacts of different system parameters on secrecy performance. Finally, we validate our analytical results using a computer based Monte-Carlo simulation.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers
Authors:
Moloy Kumar Ghosh,
Milton Kumar Kundu,
Md Ibrahim,
A. S. M. Badrudduza,
Md. Shamim Anower,
Imran Shafique Ansari,
Ali A. Shaikhi,
Mohammed A. Mohandes
Abstract:
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination…
▽ More
This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination node with the help of harvested energy by the relay from an integrated power beacon within the system. The source-to-relay link (UOWC) follows a mixture exponential generalized Gamma turbulence with pointing error impairments whereas all the remaining links (RF) undergo $κ-μ$ shadowed fading. With regards to the types of intruders, herein two scenarios are considered, i.e., colluding (\textit{Scenario-I}) and non-colluding (\textit{Scenario-II}) eavesdroppers and the analytical expressions of secure outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived in closed form for each scenario. Furthermore, the impacts of UOWC and RF channel parameters as well as detection techniques on secrecy capacity are demonstrated, and following this a comparison between the two considered scenarios is demonstrated that reveals the collusion between the eavesdroppers imposes the most harmful threat on secrecy throughput but a better secrecy level can be attained adopting diversity at the destination and power beacon nodes along with heterodyne detection rather than intensity modulation and direct detection technique. Finally, all the derived expressions are corroborated via Monte Carlo simulations.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Error Rate and Ergodic Capacity of RF-FSO System with Partial Relay Selection in the Presence of Pointing Errors
Authors:
Milica I. Petkovic,
Imran Shafique Ansari,
Goran T. Djordjevic,
Khalid A. Qaraqe
Abstract:
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh…
▽ More
This paper presents an analysis of a multiple dual-hop relaying system, which is composed of km-class radio frequency (RF)-free-space optical (FSO) links. Partial relay selection based on outdated channel state information (CSI) is employed in order to select active relay for further transmission. Amplify-and-forward relaying protocol is utilized. The RF links are assumed to be subject to Rayleigh fading, and the FSO links are influenced by both Gamma-Gamma atmospheric turbulence and pointing errors. On the basis of our previously derived expression for cumulative distribution function of the equivalent signal-to-noise ratio of the whole system, we derive novel analytical expressions for the average bit-error rate (BER) and ergodic capacity that are presented in terms of the Meijer's G-function and extended generalized bivariate Meijer's G-function, respectively. The numerical results are confirmed by Monte Carlo simulations. Considering the effect of time-correlation between outdated CSI and actual CSI related to the RF channel at the time of transmission, the average BER and the ergodic capacity dependence on various system and channel parameters are observed and discussed. The results illustrate that the temporal correlation between outdated and actual CSI has strong effect on system performance, particularly on BER values, when FSO hop is influenced by favorable conditions. Keywords: Bit error rate, ergodic capacity, free-space optical systems, partial relay selection, radio frequency systems.
△ Less
Submitted 28 September, 2022; v1 submitted 27 September, 2022;
originally announced September 2022.
-
On the Integral and Derivative Identities of Bivariate Fox H-Function: Application in Wireless System Performance Analysis
Authors:
Puspraj Singh Chauhan,
Sandeep Kumar,
Imran Shafique Ansari
Abstract:
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with reference to wireless communication environment, w…
▽ More
The present work proposes analytical solutions for the integral of bivariate Fox H-function in combination with algebraic, exponential, and complementary error functions. In addition, the work also presents the derivative identities with respect to function arguments. Further, the suitability of the proposed mathematical solutions is verified with reference to wireless communication environment, where a fading behaviour of the channel acquired the bivariate Fox H-function structure. Further more, asymptotic results for the outage probability and average symbol error probability are presented utilizing the origin probability density function based approach. The obtained results are free from complex analytical functions. At last, the analytical findings of the paper are compared with the numerical results and also with the Monte-Carlo simulation results to confirm their accuracy.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Efficient NLP Model Finetuning via Multistage Data Filtering
Authors:
Xu Ouyang,
Shahina Mohd Azam Ansari,
Felix Xiaozhu Lin,
Yangfeng Ji
Abstract:
As model finetuning is central to the modern NLP, we set to maximize its efficiency. Motivated by redundancy in training examples and the sheer sizes of pretrained models, we exploit a key opportunity: training only on important data. To this end, we set to filter training examples in a streaming fashion, in tandem with training the target model. Our key techniques are two: (1) automatically deter…
▽ More
As model finetuning is central to the modern NLP, we set to maximize its efficiency. Motivated by redundancy in training examples and the sheer sizes of pretrained models, we exploit a key opportunity: training only on important data. To this end, we set to filter training examples in a streaming fashion, in tandem with training the target model. Our key techniques are two: (1) automatically determine a training loss threshold for skip** backward training passes; (2) run a meta predictor for further skip** forward training passes. We integrate the above techniques in a holistic, three-stage training process. On a diverse set of benchmarks, our method reduces the required training examples by up to 5.3$\times$ and training time by up to 6.8$\times$, while only seeing minor accuracy degradation. Our method is effective even when training one epoch, where each training example is encountered only once. It is simple to implement and is compatible with the existing finetuning techniques. Code is available at: https://github.com/xo28/efficient- NLP-multistage-training
△ Less
Submitted 18 May, 2023; v1 submitted 28 July, 2022;
originally announced July 2022.
-
Improved measurement of the $0_2^+\rightarrow0_1^+$ E0 transition strength for $^{72}$Se using the SPICE spectrometer
Authors:
J. Smallcombe,
A. B. Garnsworthy,
W. Korten,
P. Singh,
F. A. Ali,
C. Andreoiu,
S. Ansari,
G. C. Ball,
C. J. Barton,
S. S. Bhattacharjee,
M. Bowry,
R. Caballero-Folch,
A. Chester,
S. A. Gillespie,
G. F. Grinyer,
G. Hackman,
C. Jones,
B. Melon,
M. Moukaddam,
A. Nannini,
P. Ruotsalainen,
K. Starosta,
C. E. Svensson,
R. Wadsworth,
J. Williams
Abstract:
The selenium isotopes lie at the heart of a tumultuous region of the nuclear chart where shape coexistence effects grapple with neutron-proton pairing correlations, triaxiality, and the impending proton dripline. In this work a study of $^{72}$Se by internal conversion electron and $γ$-ray spectroscopy was undertaken with the SPICE and TIGRESS arrays. New measurements of the branching ratio and li…
▽ More
The selenium isotopes lie at the heart of a tumultuous region of the nuclear chart where shape coexistence effects grapple with neutron-proton pairing correlations, triaxiality, and the impending proton dripline. In this work a study of $^{72}$Se by internal conversion electron and $γ$-ray spectroscopy was undertaken with the SPICE and TIGRESS arrays. New measurements of the branching ratio and lifetime of the $0_2^+$ state were performed yielding a determination of $ρ^2(E0;0_2^+{\rightarrow}0_1^+)=29(3)$ milliunits. two state mixing calculations were performed that highlighted the importance of interpretation of such $E0$ strength values in the context of shape-coexistence.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
On Secure NOMA-CDRT Systems with Physical Layer Network Coding
Authors:
Hongjiang Lei,
Xusheng She,
Ki-Hong Park,
Imran Shafique Ansari,
Zheng Shi,
**g Jiang,
Mohamed-Slim Alouini
Abstract:
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jamming signals are utilized to suppress the eavesdropp…
▽ More
This paper proposes a new scheme to enhance the secrecy performance of a NOMA-based coordinated direct relay transmission system (NOMA-CDRT) with an untrusted relay. The physical-layer network coding and the non-orthogonal multiple access scheme are combined to improve the spectrum efficiency. Furthermore, inter-user interference and friendly jamming signals are utilized to suppress the eavesdrop** ability of the untrusted relay without affecting the acceptance quality of legitimate users. Specifically, the far user in the first slot and the near user in the second slot act as jammers to generate jamming signals to ensure secure transmissions of the confidential signals. We investigate the secrecy performance of the proposed scheme in NOMA-CDRT systems and derive the closed-form expression for the ergodic secrecy sum rate. The asymptotic analysis at high signal-to-noise ratio is performed to obtain more insights. Finally, simulation results are presented to demonstrate the effectiveness of the proposed scheme and the correctness of the theoretical analysis.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Outage Analysis of Aerial Semi-Grant-Free NOMA Systems
Authors:
Hongjiang Lei,
Chen Zhu,
Ki-Hong Park,
Imran Shafique Ansari,
Weijia Lei,
Hong Tang,
Kyeong ** Kim
Abstract:
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellatio…
▽ More
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellation scheme is implemented in the downlink NOMA scenarios for the first time. The analytical expressions for the exact and asymptotic outage probability (OP) of the grant-free (GF) user are derived. The results demonstrate that no-zero diversity order can be achieved only under stringent conditions on users' quality of service requirements. Subsequently, we propose an efficient dynamic power allocation (DPA) scheme to relax such data rate constraints to address this issue. The analytical expressions for the exact and asymptotic OP of the GF user with the DPA scheme are derived. Finally, Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of the UAV's location and altitude on the OP of the GF user.
△ Less
Submitted 18 February, 2024; v1 submitted 12 May, 2022;
originally announced May 2022.
-
Joint Trajectory Design and User Scheduling of Aerial Cognitive Radio Networks
Authors:
Hongjiang Lei,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
**g Jiang,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge t…
▽ More
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. This paper investigates the security of aerial cognitive radio networks (CRNs). An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial base station transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdrop** node locations is considered, and the average secrecy rate of the cognitive user is maximized by optimizing multiple users' scheduling, the UAVs' trajectory, and transmit power. To solve the non-convex optimization problem with mixed multiple integers variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial to improving the secrecy performance of aerial CRNs.
△ Less
Submitted 21 April, 2022;
originally announced April 2022.
-
On Secure NOMA-Aided Semi-Grant-Free Systems
Authors:
Hongjiang Lei,
Fangtao Yang,
Hongwu Liu,
Imran Shafique Ansari,
Kyeong ** Kim,
Theodoros A. Tsiftsis
Abstract:
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aid…
▽ More
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB users. This work investigates the secrecy performance of non-orthogonal multiple access (NOMA)-aided SGF systems. First, analytical expressions for the exact and asymptotic secrecy outage probability (SOP) of NOMA-aided SGF systems with a single GF user are derived. Then, the SGF systems with multiple GF users and the best-user scheduling scheme is considered. Analytical expressions for the exact and asymptotic SOP are derived by utilizing order statistics theory. Monte Carlo simulation results are provided and compared with two benchmark schemes. The effects of system parameters on the SOP of the considered system are demonstrated and the accuracy of the developed analytical results is verified. The results indicate that both the outage target rate for GB and the secure target rate for GF are the main factors of the secrecy performance of SGF systems.
△ Less
Submitted 27 February, 2023; v1 submitted 17 April, 2022;
originally announced April 2022.
-
Eye-focused Detection of Bell's Palsy in Videos
Authors:
Sharik Ali Ansari,
Koteswar Rao Jerripothula,
Pragya Nagpal,
Ankush Mittal
Abstract:
In this paper, we present how Bell's Palsy, a neurological disorder, can be detected just from a subject's eyes in a video. We notice that Bell's Palsy patients often struggle to blink their eyes on the affected side. As a result, we can observe a clear contrast between the blinking patterns of the two eyes. Although previous works did utilize images/videos to detect this disorder, none have expli…
▽ More
In this paper, we present how Bell's Palsy, a neurological disorder, can be detected just from a subject's eyes in a video. We notice that Bell's Palsy patients often struggle to blink their eyes on the affected side. As a result, we can observe a clear contrast between the blinking patterns of the two eyes. Although previous works did utilize images/videos to detect this disorder, none have explicitly focused on the eyes. Most of them require the entire face. One obvious advantage of having an eye-focused detection system is that subjects' anonymity is not at risk. Also, our AI decisions based on simple blinking patterns make them explainable and straightforward. Specifically, we develop a novel feature called blink similarity, which measures the similarity between the two blinking patterns. Our extensive experiments demonstrate that the proposed feature is quite robust, for it helps in Bell's Palsy detection even with very few labels. Our proposed eye-focused detection system is not only cheaper but also more convenient than several existing methods.
△ Less
Submitted 27 January, 2022;
originally announced January 2022.
-
An Experimentally Informed Continuum Grain Boundary Model
Authors:
Syed Ansari,
Amit Acharya,
Alankar Alankar
Abstract:
A continuum grain boundary model is developed that uses experimentally measured grain boundary energy data as a function of misorientation to simulate idealized grain boundary evolution in a 1-D grain array. The model uses a continuum representation of the misorientation in terms of spatial gradients of the orientation as a fundamental field. The grain boundary energy density employed is non-conve…
▽ More
A continuum grain boundary model is developed that uses experimentally measured grain boundary energy data as a function of misorientation to simulate idealized grain boundary evolution in a 1-D grain array. The model uses a continuum representation of the misorientation in terms of spatial gradients of the orientation as a fundamental field. The grain boundary energy density employed is non-convex in this orientation gradient, based on physical grounds. Simple gradient descent dynamics of the energy are utilized for idealized microstructure evolution, which requires higher-order regularization of the energy density for the model to be well-set; the regularization is physically justified. Microstructure evolution is presented using two plausible energy density functions, both defined from the same experimental data: a 'smooth' and a 'cusp' energy density. Results of grain boundary equilibria and microstructure evolution representing grain reorientation in one space dimension are presented. The different shapes of the energy density functions representing a common data set are shown to result in different overall microstructural evolution of the system. Mathematically, the constructed energy functional formally is of the Aviles-Giga/Cross-Newell type but with unequal well-depths, resulting in a difference in the structural feature of solutions that can be identified with grain boundaries, as well as in the approach to equilibria from identical initial conditions. This study also investigates the metastability of grain boundaries. It supports the general thermodynamics belief that they persist for extended periods before eventually vanishing due to the lowest energy configuration favored by fluctuations over infinite time.
△ Less
Submitted 25 January, 2024; v1 submitted 24 January, 2022;
originally announced January 2022.
-
On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network
Authors:
T. Hossain,
S. Shabab,
A. S. M. Badrudduza,
M. K. Kundu,
I. S. Ansari
Abstract:
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic…
▽ More
Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic waves to improve both spectrum and energy efficiency of wireless networks. Besides, in underwater communication, underwater optical wireless communication (UOWC) is a better alternative/replacement for conventional acoustic and radio frequency (RF) technologies. Hence, mixed RIS-aided RF-UOWC can be treated as a promising technology for future wireless networks. This work focuses on the secrecy performance of mixed dual-hop RIS-aided RF-UOWC networks under the intercepting effort of a probable eavesdropper. The RF link operates under generalized Gamma fading distribution; likewise, the UOWC link experiences the mixture exponential generalized Gamma distribution. The secrecy analysis subsumes the derivations of closed-form expressions for average secrecy capacity, exact and lower bound of secrecy outage probability, and strictly positive secrecy capacity, all in terms of Meijer G functions. Capitalizing on these derivations, the effects of heterodyne and intensity modulation/direct detection systems, underwater turbulence resulting from air bubble levels, temperature gradients, and salinity gradients, are measured. Unlike conventional models that merely deal with thermally uniform scenarios, this proposed model is likely to be unique in terms of dealing with secrecy analysis of a temperature gradient RIS-aided RF-UOWC network. Lastly, the derivations are validated via Monte-Carlo simulations.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Simulation of energy transport by dark matter scattering in stars
Authors:
Hannah Banks,
Siyam Ansari,
Aaron C. Vincent,
Pat Scott
Abstract:
Asymmetric dark matter (ADM) that is captured in stars can act as an efficient conductor of heat. Small ADM-induced changes in a star's temperature gradient are known to alter neutrino fluxes and asteroseismological signatures, erase convective cores and modify a star's main sequence lifetime. The Sun's proximity to us makes it an ideal laboratory for studying these effects. However, the two forma…
▽ More
Asymmetric dark matter (ADM) that is captured in stars can act as an efficient conductor of heat. Small ADM-induced changes in a star's temperature gradient are known to alter neutrino fluxes and asteroseismological signatures, erase convective cores and modify a star's main sequence lifetime. The Sun's proximity to us makes it an ideal laboratory for studying these effects. However, the two formalisms commonly used to parametrize such heat transport were developed over 30 years ago, and calibrated with a single set of simulations. What's more, both are based on assumptions that break down at the Knudsen transition, where heat transport is maximized. We construct a Monte Carlo simulation to exactly solve the Boltzmann collision equation, determining the steady-state distribution and luminosity carried in stars by ADM with cross sections that depend on velocity and momentum. We find that, although the established (Gould and Raffelt) formalism based on local thermal equilibrium does well for constant cross sections, the isothermal (Spergel and Press) method actually performs better across all models with a simple, universal rescaling function. Based on simulation results, we provide recommendations on the parametrization of DM heat transport in stellar evolution models.
△ Less
Submitted 2 June, 2022; v1 submitted 12 November, 2021;
originally announced November 2021.
-
On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
M. K. Kundu,
Imran Shafique Ansari
Abstract:
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda…
▽ More
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a secondary receiver, and an eavesdropper where the secret communication takes place between two legitimate secondary peers over the RF and FSO links simultaneously, and the eavesdropper can overhear the RF link only. In particular, the maximum transmit power limitation at the secondary user as well as the permissible interference power restriction at the primary user are also taken into consideration. All the RF links are modeled with $α$-$μ$ fading whereas the FSO link undergoes Málaga (M) turbulence with link blockage and pointing error impairments. At the receiver, the selection combining diversity technique is utilized to select the signal with the best electrical signal-to-ratio (SNR). Moreover, the closed-form expressions for the secrecy outage probability, probability of strictly positive secrecy capacity, and effective secrecy throughput are derived to analyze the secrecy performance. Besides, the impacts of fading, primary-secondary interference, detection techniques, link blockage probability, atmospheric turbulence, and pointing error are examined. Finally, Monte-Carlo simulations are performed to corroborate the derived expressions.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Towards the cellular-scale simulation of motor-driven cytoskeletal assemblies
Authors:
Wen Yan,
Saad Ansari,
Adam Lamson,
Matthew A. Glaser,
Meredith Betterton,
Michael J. Shelley
Abstract:
The cytoskeleton -- a collection of polymeric filaments, molecular motors, and crosslinkers -- is a foundational example of active matter, and in the cell assembles into organelles that guide basic biological functions. Simulation of cytoskeletal assemblies is an important tool for modeling cellular processes and understanding their surprising material properties. Here we present aLENS, a novel co…
▽ More
The cytoskeleton -- a collection of polymeric filaments, molecular motors, and crosslinkers -- is a foundational example of active matter, and in the cell assembles into organelles that guide basic biological functions. Simulation of cytoskeletal assemblies is an important tool for modeling cellular processes and understanding their surprising material properties. Here we present aLENS, a novel computational framework to surmount the limits of conventional simulation methods. We model molecular motors with crosslinking kinetics that adhere to a thermodynamic energy landscape, and integrate the system dynamics while efficiently and stably enforcing hard-body repulsion between filaments -- molecular potentials are entirely avoided in imposing steric constraints. Utilizing parallel computing, we simulate different mixtures of tens to hundreds of thousands of cytoskeletal filaments and crosslinking motors, recapitulating self-emergent phenomena such as bundle formation and buckling, and elucidating how motor type, thermal fluctuations, internal stresses, and confinement determine the evolution of active matter aggregates.
△ Less
Submitted 9 June, 2022; v1 submitted 16 September, 2021;
originally announced September 2021.
-
On the Intercept Probability and Secure Outage Analysis of Mixed ($α$-$κ$-$μ$)-shadowed and Málaga Turbulent Model
Authors:
N. A. Sarker,
A. S. M. Badrudduza,
S. M. R. Islam,
S. H. Islam,
M. K. Kundu,
I. S. Ansari,
K. -S. Kwak
Abstract:
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy…
▽ More
This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy performance of the mixed system is studied by deriving closed-form analytical expressions of secure outage probability (SOP), strictly positive secrecy capacity (SPSC), and intercept probability (IP). Besides, we also derive the asymptotic SOP, SPSC, and IP upon utilizing the unfolding of Meijer's G function where the electrical SNR of the FSO link tends to infinity. Finally, the Monte-Carlo simulation is performed to corroborate the analytical expressions. Our results illustrate that fading, shadowing, detection techniques (i.e., heterodyne detection (HD) and intensity modulation and direct detection (IM/DD)), atmospheric turbulence, and pointing error significantly affect the secrecy performance. In addition, better performance is obtained exploiting the HD technique at the destination relative to IM/DD technique.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
Secrecy Performance of α-κ-μ Shadowed Fading Channel
Authors:
A. S. M. Badrudduza,
S. H. Islam,
M. K. Kundu,
I. S. Ansari
Abstract:
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime…
▽ More
In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime in order to achieve secrecy diversity gain. Capitalizing on these expressions, the consequences due to the simultaneous occurrence of fading and shadowing are quantified. Finally, Monte-Carlo simulations are demonstrated to assess the correctness of the expressions.
△ Less
Submitted 3 September, 2021;
originally announced September 2021.
-
Effects of Eavesdropper on the Performance of Mixed η-μ and DGG Cooperative Relaying System
Authors:
Noor Ahmed Sarker,
A. S. M. Badrudduza,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days.…
▽ More
Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days. But conventional FSO models except for the double generalized Gamma (DGG) model can not demonstrate secrecy performance for all ranges of turbulence severity. This reason has led us to propose a dual-hop eta-mu and unified DGG mixed RF-FSO network while considering eavesdrop** at both RF and FSO hops. The security of these proposed scenarios is investigated in terms of two metrics, i.e., strictly positive secrecy capacity and secure outage probability. Exploiting these expressions, we further investigate how the secrecy performance is affected by various system parameters, i.e., fading, turbulence, and pointing errors. A demonstration is made between heterodyne detection (HD) and intensity modulation and direct detection (IM/DD) techniques while exhibiting superior secrecy performance for HD technique over IM/DD technique. Finally, all analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
The structure of the unit group of the group algebra $F(C_3 \times D_{10})$
Authors:
Meena Sahai,
Sheere Farhat Ansari
Abstract:
Let $D_{n}$ be the dihedral group of order $n$. The structure of the unit group $U(F(C_3 \times D_{10}))$ of the group algebra $F(C_3 \times D_{10})$ over a finite field $F$ of characteristic $3$ is given in \cite{sh13}. In this article, the structure of $U(F(C_3 \times D_{10}))$ is obtained over any finite field $F$ of characteristic $p \neq 3$.
Let $D_{n}$ be the dihedral group of order $n$. The structure of the unit group $U(F(C_3 \times D_{10}))$ of the group algebra $F(C_3 \times D_{10})$ over a finite field $F$ of characteristic $3$ is given in \cite{sh13}. In this article, the structure of $U(F(C_3 \times D_{10}))$ is obtained over any finite field $F$ of characteristic $p \neq 3$.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Units in $F(C_n \times Q_{12})$ and $F(C_n \times D_{12})$
Authors:
Meena Sahai,
Sheere Farhat Ansari
Abstract:
Let $C_n$, $Q_n$ and $D_n$ be the cyclic group, the quaternion group and the dihedral group of order $n$, respectively. The structures of the unit groups of the finite group algebras $FQ_{12}$ and $F(C_2 \times Q_{12})$ over a finite field $F$ have been studied in J. Gildea, F. Monaghan (2011), F. Monaghan (2012), G. Tang, Y. Gao (2011) and G. Tang, Y. Wei, Y. Li (2014) whereas the structures of t…
▽ More
Let $C_n$, $Q_n$ and $D_n$ be the cyclic group, the quaternion group and the dihedral group of order $n$, respectively. The structures of the unit groups of the finite group algebras $FQ_{12}$ and $F(C_2 \times Q_{12})$ over a finite field $F$ have been studied in J. Gildea, F. Monaghan (2011), F. Monaghan (2012), G. Tang, Y. Gao (2011) and G. Tang, Y. Wei, Y. Li (2014) whereas the structures of the unit groups of the finite group algebras $FD_{12}$ and $F(C_2 \times D_{12})$ have been studied in J. Gildea, F. Monaghan (2011), N. Makhijani, R. K. Sharma, J. B. Srivastava (2016), F. Monaghan (2012), M. Sahai, S. F. Ansari and G. Tang, Y. Gao (2011). In this paper, we continue this study and establish the structures of the unit groups of the group algebras $F(C_n \times Q_{12})$ and $F(C_n \times D_{12})$, over a finite field $F$ of characteristic $p$ containing $p^k$ elements.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
On Secrecy Performance of Mixed α-η-μ and Malaga RF-FSO Variable Gain Relaying Channel
Authors:
Nandita Swanan Mandira,
Milton Kumar Kundu,
Sheikh Habibul Islam,
A. S. M. Badrudduza,
Imran Shafique Ansari
Abstract:
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we p…
▽ More
With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we propose a secure radio frequency (RF)-free-space optical (FSO) mixed framework under the attempt of wiretap** by an eavesdropper at the RF hop. We assume the RF links undergo alpha-eta-mu fading whereas the FSO link exhibits a unified Malaga turbulence model with pointing error. The secrecy performance is evaluated by deducing expressions for three secrecy metrics i.e. average secrecy capacity, secure outage probability, and probability of non-zero secrecy capacity in terms of univariate and bivariate Meijer's G and Fox's H functions. We further capitalize on these expressions to demonstrate the impacts of fading, atmospheric turbulence, and pointing errors and show a comparison between two detection techniques (i.e. heterodyne detection (HD) and intensity modulation with direct detection (IM/DD)) that clearly reveals better secrecy can be achieved with HD technique relative to the IM/DD method. The inclusion of generalized fading models at the RF and FSO hops offers unification of several classical scenarios as special cases thereby exhibiting a more generic nature relative to the existing literature. Finally, all the analytical results are corroborated via Monte-Carlo simulations.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect
Authors:
Md. Ibrahim,
A. S. M. Badrudduza,
Md. Shakhawat Hossen,
Milton Kumar Kundu,
Imran Shafique Ansari
Abstract:
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques…
▽ More
Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques over high-frequency free-space or underwater optical wireless communication (UOWC) technologies. But in long-distance communication, turbulence components drastically affect the optical signals, leading to the invention of the combination of radio-frequency (RF) links with optical links. This work deals with the secrecy performance analysis of a mixed RF-UOWC system where an eavesdropper tries to intercept RF communications. RF and optical links undergo $η-μ$ and mixture exponential generalized Gamma distributions, respectively. To keep pace with the high data rate of optical technologies, we exploit the antenna selection scheme at the source and maximal ratio combining diversity at the relay and eavesdropper, while the eavesdropper is unaware of the antenna selection scheme. We derive closed-form expressions of average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity to demonstrate the impacts of the system parameters on the secrecy behavior. Finally, the expressions are corroborated via Monte-Carlo simulations.
△ Less
Submitted 21 November, 2021; v1 submitted 19 May, 2021;
originally announced May 2021.
-
An Appraisal Transition System for Event-driven Emotions in Agent-based Player Experience Testing
Authors:
Saba Gholizadeh Ansari,
I. S. W. B. Prasetya,
Mehdi Dastani,
Frank Dignum,
Gabriele Keller
Abstract:
Player experience (PX) evaluation has become a field of interest in the game industry. Several manual PX techniques have been introduced to assist developers to understand and evaluate the experience of players in computer games. However, automated testing of player experience still needs to be addressed. An automated player experience testing framework would allow designers to evaluate the PX req…
▽ More
Player experience (PX) evaluation has become a field of interest in the game industry. Several manual PX techniques have been introduced to assist developers to understand and evaluate the experience of players in computer games. However, automated testing of player experience still needs to be addressed. An automated player experience testing framework would allow designers to evaluate the PX requirements in the early development stages without the necessity of participating human players. In this paper, we propose an automated player experience testing approach by suggesting a formal model of event-based emotions. In particular, we discuss an event-based transition system to formalize relevant emotions using Ortony, Clore, & Collins (OCC) theory of emotions. A working prototype of the model is integrated on top of Aplib, a tactical agent programming library, to create intelligent PX test agents, capable of appraising emotions in a 3D game case study. The results are graphically shown e.g. as heat maps. Emotion visualization of the test agent would ultimately help game designers in creating content that evokes a certain experience in players.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
A Novel Falling-Ball Algorithm for Image Segmentation
Authors:
Asra Aslam,
Ekram Khan,
Mohammad Samar Ansari,
M. M. Sufyan Beg
Abstract:
Image segmentation refers to the separation of objects from the background, and has been one of the most challenging aspects of digital image processing. Practically it is impossible to design a segmentation algorithm which has 100% accuracy, and therefore numerous segmentation techniques have been proposed in the literature, each with certain limitations. In this paper, a novel Falling-Ball algor…
▽ More
Image segmentation refers to the separation of objects from the background, and has been one of the most challenging aspects of digital image processing. Practically it is impossible to design a segmentation algorithm which has 100% accuracy, and therefore numerous segmentation techniques have been proposed in the literature, each with certain limitations. In this paper, a novel Falling-Ball algorithm is presented, which is a region-based segmentation algorithm, and an alternative to watershed transform (based on waterfall model). The proposed algorithm detects the catchment basins by assuming that a ball falling from hilly terrains will stop in a catchment basin. Once catchment basins are identified, the association of each pixel with one of the catchment basin is obtained using multi-criterion fuzzy logic. Edges are constructed by dividing image into different catchment basins with the help of a membership function. Finally closed contour algorithm is applied to find closed regions and objects within closed regions are segmented using intensity information. The performance of the proposed algorithm is evaluated both objectively as well as subjectively. Simulation results show that the proposed algorithms gives superior performance over conventional Sobel edge detection methods and the watershed segmentation algorithm. For comparative analysis, various comparison methods are used for demonstrating the superiority of proposed methods over existing segmentation methods.
△ Less
Submitted 12 May, 2021; v1 submitted 6 May, 2021;
originally announced May 2021.
-
A Single-Layer Asymmetric RNN: Potential Low Hardware Complexity Linear Equation Solver
Authors:
Mohammad Samar Ansari
Abstract:
A single layer neural network for the solution of linear equations is presented. The proposed circuit is based on the standard Hopfield model albeit with the added flexibility that the interconnection weight matrix need not be symmetric. This results in an asymmetric Hopfield neural network capable of solving linear equations. PSPICE simulation results are given which verify the theoretical predic…
▽ More
A single layer neural network for the solution of linear equations is presented. The proposed circuit is based on the standard Hopfield model albeit with the added flexibility that the interconnection weight matrix need not be symmetric. This results in an asymmetric Hopfield neural network capable of solving linear equations. PSPICE simulation results are given which verify the theoretical predictions. Experimental results for circuits set up to solve small problems further confirm the operation of the proposed circuit.
△ Less
Submitted 4 May, 2021; v1 submitted 1 May, 2021;
originally announced May 2021.
-
A Survey of Modern Deep Learning based Object Detection Models
Authors:
Syed Sahil Abbas Zaidi,
Mohammad Samar Ansari,
Asra Aslam,
Nadia Kanwal,
Mamoona Asghar,
Brian Lee
Abstract:
Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep learning based object detectors. Concise overview of benchmark datasets and evaluation metrics used in detection is also provided along with some of the prominent backbone archi…
▽ More
Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep learning based object detectors. Concise overview of benchmark datasets and evaluation metrics used in detection is also provided along with some of the prominent backbone architectures used in recognition tasks. It also covers contemporary lightweight classification models used on edge devices. Lastly, we compare the performances of these architectures on multiple metrics.
△ Less
Submitted 12 May, 2021; v1 submitted 24 April, 2021;
originally announced April 2021.
-
An Agent-based Architecture for AI-Enhanced Automated Testing for XR Systems, a Short Paper
Authors:
I. S. W. B. Prasetya,
Samira Shirzadehhajimahmood,
Saba Gholizadeh Ansari,
Pedro Fernandes,
Rui Prada
Abstract:
This short paper presents an architectural overview of an agent-based framework called iv4XR for automated testing that is currently under development by an H2020 project with the same name. The framework's intended main use case of is testing the family of Extended Reality (XR) based systems (e.g. 3D games, VR sytems, AR systems), though the approach can indeed be adapted to target other types of…
▽ More
This short paper presents an architectural overview of an agent-based framework called iv4XR for automated testing that is currently under development by an H2020 project with the same name. The framework's intended main use case of is testing the family of Extended Reality (XR) based systems (e.g. 3D games, VR sytems, AR systems), though the approach can indeed be adapted to target other types of interactive systems. The framework is unique in that it is an agent-based system. Agents are inherently reactive, and therefore are arguably a natural match to deal with interactive systems. Moreover, it is also a natural vessel for mounting and combining different AI capabilities, e.g. reasoning, navigation, and learning.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
Moving the epidemic tip** point through topologically targeted social distancing
Authors:
Sara Ansari,
Mehrnaz Anvari,
Oskar Pfeffer,
Nora Molkenthin,
Frank Hellmann,
Jobst Heitzig,
Juergen Kurths
Abstract:
The epidemic threshold of a social system is the ratio of infection and recovery rate above which a disease spreading in it becomes an epidemic. In the absence of pharmaceutical interventions (i.e. vaccines), the only way to control a given disease is to move this threshold by non-pharmaceutical interventions like social distancing, past the epidemic threshold corresponding to the disease, thereby…
▽ More
The epidemic threshold of a social system is the ratio of infection and recovery rate above which a disease spreading in it becomes an epidemic. In the absence of pharmaceutical interventions (i.e. vaccines), the only way to control a given disease is to move this threshold by non-pharmaceutical interventions like social distancing, past the epidemic threshold corresponding to the disease, thereby tip** the system from epidemic into a non-epidemic regime. Modeling the disease as a spreading process on a social graph, social distancing can be modeled by removing some of the graphs links. It has been conjectured that the largest eigenvalue of the adjacency matrix of the resulting graph corresponds to the systems epidemic threshold. Here we use a Markov chain Monte Carlo (MCMC) method to study those link removals that do well at reducing the largest eigenvalue of the adjacency matrix. The MCMC method generates samples from the relative canonical network ensemble with a defined expectation value of $λ_{max}$. We call this the "well-controlling network ensemble" (WCNE) and compare its structure to randomly thinned networks with the same link density. We observe that networks in the WCNE tend to be more homogeneous in the degree distribution and use this insight to define two ad-hoc removal strategies, which also substantially reduce the largest eigenvalue. A targeted removal of 80\% of links can be as effective as a random removal of 90\%, leaving individuals with twice as many contacts.
△ Less
Submitted 13 July, 2021; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Navigation and Exploration in 3D-Game Automated Play Testing
Authors:
I. S. W. B. Prasetya,
Maurin Voshol,
Tom Tanis,
Adam Smits,
Bram Smit,
Jacco van Mourik,
Menno Klunder,
Frank Hoogmoed,
Stijn Hinlopen,
August van Casteren,
Jesse van de Berg,
Naraenda G. W. Y. Prasetya,
Samira Shirzadehhajimahmood,
Saba Gholizadeh Ansari
Abstract:
To enable automated software testing, the ability to automatically navigate to a state of interest and to explore all, or at least sufficient number of, instances of such a state is fundamental. When testing a computer game the problem has an extra dimension, namely the virtual world where the game is played on. This world often plays a dominant role in constraining which logical states are reacha…
▽ More
To enable automated software testing, the ability to automatically navigate to a state of interest and to explore all, or at least sufficient number of, instances of such a state is fundamental. When testing a computer game the problem has an extra dimension, namely the virtual world where the game is played on. This world often plays a dominant role in constraining which logical states are reachable, and how to reach them. So, any automated testing algorithm for computer games will inevitably need a layer that deals with navigation on a virtual world. Unlike e.g. navigating through the GUI of a typical web-based application, navigating over a virtual world is much more challenging. This paper discusses how concepts from geometry and graph-based path finding can be applied in the context of game testing to solve the problem of automated navigation and exploration. As a proof of concept, the paper also briefly discusses the implementation of the proposed approach.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
DMR-based Technique for Fault Tolerant AES S-box Architecture
Authors:
Mahdi Taheri,
Saeideh Sheikhpour,
Mohammad Saeed Ansari,
Ali Mahani
Abstract:
This paper presents a high-throughput fault-resilient hardware implementation of AES S-box, called HFS-box. If a transient natural or even malicious fault in each pipeline stage is detected, the corresponding error signal becomes high and as a result, the control unit holds the output of our proposed DMR voter till the fault effect disappears. The proposed low-cost HFS-box provides a high capabili…
▽ More
This paper presents a high-throughput fault-resilient hardware implementation of AES S-box, called HFS-box. If a transient natural or even malicious fault in each pipeline stage is detected, the corresponding error signal becomes high and as a result, the control unit holds the output of our proposed DMR voter till the fault effect disappears. The proposed low-cost HFS-box provides a high capability of fault-tolerant against transient faults with any duration by putting low area overhead, i.e. 137%, and low throughput degradation, i.e. 11.3%, on the original implementation.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
A Review on the State of the Art in Non Contact Sensing for COVID-19
Authors:
William Taylor,
Qammer H. Abbasi,
Kia Dashtipour,
Shuja Ansari,
Aziz Shah,
Arslan Khan,
Muhammad Ali Imran
Abstract:
COVID-19 disease, caused by SARS-CoV-2, has resulted in a global pandemic recently. With no approved vaccination or treatment, governments around the world have issued guidance to their citizens to remain at home in efforts to control the spread of the disease. The goal of controlling the spread of the virus is to prevent strain on hospital. In this paper, we have focus on how non-invasive methods…
▽ More
COVID-19 disease, caused by SARS-CoV-2, has resulted in a global pandemic recently. With no approved vaccination or treatment, governments around the world have issued guidance to their citizens to remain at home in efforts to control the spread of the disease. The goal of controlling the spread of the virus is to prevent strain on hospital. In this paper, we have focus on how non-invasive methods are being used to detect the COVID-19 and assist healthcare workers in caring for COVID-19 patients. Early detection of the COVID-19 virus can allow for early isolation to prevent further spread. This study outlines the advantages and disadvantages and a breakdown of the methods applied in the current state-of-the-art approaches. In addition, the paper highlights some future research directions, which are required to be explored further to come up with innovative technologies to control this pandemic.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
On the Effective Capacity of IRS-assisted wireless communication
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Shuja Ansari,
Ali Arshad Nasir,
Khalid Qaraqe,
M. Ali Imran,
Qammer H. Abbasi
Abstract:
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective cap…
▽ More
We consider futuristic, intelligent reflecting surfaces (IRS)-aided communication between a base station (BS) and a user equipment (UE) for two distinct scenarios: a single-input, single-output (SISO) system whereby the BS has a single antenna, and a multi-input, single-output (MISO) system whereby the BS has multiple antennas. For the considered IRS-assisted downlink, we compute the effective capacity (EC), which is a quantitative measure of the statistical quality-of-service (QoS) offered by a communication system experiencing random fading. For our analysis, we consider the two widely-known assumptions on channel state information (CSI) -- i.e., perfect CSI and no CSI, at the BS. Thereafter, we first derive the distribution of the signal-to-noise ratio (SNR) for both SISO and MISO scenarios, and subsequently derive closed-form expressions for the EC under perfect CSI and no CSI cases, for both SISO and MISO scenarios. Furthermore, for the SISO and MISO systems with no CSI, it turns out that the EC could be maximized further by searching for an optimal transmission rate $r^*$, which is computed by exploiting the iterative gradient-descent method. We provide extensive simulation results which investigate the impact of the various system parameters, e.g., QoS exponent, power budget, number of transmit antennas at the BS, number of reflective elements at the IRS etc., on the EC of the system.
△ Less
Submitted 21 January, 2021; v1 submitted 14 July, 2020;
originally announced July 2020.