-
Energy-aware Incremental OTA Update for Flash-based Batteryless IoT Devices
Authors:
Wei Wei,
Jishnu Banerjee,
Sahidul Islam,
Chen Pan,
Mimi Xie
Abstract:
Over-the-air (OTA) firmware updates are essential for updating and maintaining IoT devices, especially those batteryless devices reliant on energy harvesting power sources. Flash memory, favored for its low cost and high density, is extensively used for data storage in many IoT devices. However, due to its high energy demands for update operations, there is often insufficient energy for code updat…
▽ More
Over-the-air (OTA) firmware updates are essential for updating and maintaining IoT devices, especially those batteryless devices reliant on energy harvesting power sources. Flash memory, favored for its low cost and high density, is extensively used for data storage in many IoT devices. However, due to its high energy demands for update operations, there is often insufficient energy for code updates. This paper proposes an incremental flash-based OTA update approach tailored for energy harvesting IoT devices, tackling the challenges brought by limited memory resources and fluctuating energy availability. Our approach is composed of three techniques: segmentbased update packet design, deferred flash segment writes, and checkpoint-free update resumption. Segment-based update packet design segments firmware updates into smaller packets, each tailored for specific memory segments, thereby minimizing unnecessary flash operations and conserving energy. Deferred flash segment writes accumulate packets in Static Random-Access Memory (SRAM) for collective processing, reducing the frequency of energy-intensive operations. Crucially, our checkpointfree update resumption ensures efficient recovery from power interruptions without significant energy cost on data backup. Through thorough experimental evaluation, we have observed that our approach significantly reduces the total energy consumed during OTA updates, and decreases the average total update time in energy harvesting environments.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Eco-evolutionary cyclic dominance among predators, prey, and parasites
Authors:
Sayantan Nag Chowdhury,
Jeet Banerjee,
Matjaž Perc,
Dibakar Ghosh
Abstract:
Predator prey interactions are one of ecology's central research themes, but with many interdisciplinary implications across the social and natural sciences. Here we consider an often-overlooked species in these interactions, namely parasites. We first show that a simple predator prey parasite model, inspired by the classical Lotka Volterra equations, fails to produce a stable coexistence of all t…
▽ More
Predator prey interactions are one of ecology's central research themes, but with many interdisciplinary implications across the social and natural sciences. Here we consider an often-overlooked species in these interactions, namely parasites. We first show that a simple predator prey parasite model, inspired by the classical Lotka Volterra equations, fails to produce a stable coexistence of all three species, thus failing to provide a biologically realistic outcome. To improve this, we introduce free space as a relevant eco-evolutionary component in a new mathematical model that uses a game-theoretical payoff matrix to describe a more realistic setup. We then show that the consideration of free space stabilizes the dynamics by means of cyclic dominance that emerges between the three species. We determine the parameter regions of coexistence as well as the types of bifurcations leading to it by means of analytical derivations as well as by means of numerical simulations. We conclude that the consideration of free space as a finite resource reveals the limits of biodiversity in predator prey parasite interactions, and it may also help us in the determination of factors that promote a healthy biota.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Active ploughing through a compressible viscoelastic fluid: Unjamming and emergent nonreciprocity
Authors:
Jyoti Prasad Banerjee,
Rituparno Mandal,
Deb Sankar Banerjee,
Shashi Thutupalli,
Madan Rao
Abstract:
A dilute suspension of active Brownian particles in a dense compressible viscoelastic fluid, forms a natural setting to study the emergence of nonreciprocity during a dynamical phase transition. At these densities, the transport of active particles is strongly influenced by the passive medium and shows a dynamical jamming transition as a function of activity and medium density. In the process, the…
▽ More
A dilute suspension of active Brownian particles in a dense compressible viscoelastic fluid, forms a natural setting to study the emergence of nonreciprocity during a dynamical phase transition. At these densities, the transport of active particles is strongly influenced by the passive medium and shows a dynamical jamming transition as a function of activity and medium density. In the process, the compressible medium is actively churned up -for low activity, the active particle gets self-trapped in a spherical cavity of its own making, while for large activity, the active particle ploughs through the medium, either accompanied by a moving anisotropic wake, or leaving a porous trail. A hydrodynamic approach makes it evident that the active particle generates a long range density wake which breaks fore-aft symmetry, consistent with the simulations. Accounting for the back reaction of the compressible medium leads to (i) dynamical jamming of the active particle, and (ii) a dynamical non-reciprocal attraction between two active particles moving along the same direction, with the trailing particle catching up with the leading one in finite time. We emphasize that these nonreciprocal effects appear only when the active particles are moving and so manifest in the vicinity of the jamming-unjamming transition.
△ Less
Submitted 12 October, 2021; v1 submitted 21 September, 2021;
originally announced September 2021.
-
Eco-evolutionary dynamics of cooperation in the presence of policing
Authors:
Sayantan Nag Chowdhury,
Srilena Kundu,
Jeet Banerjee,
Matjaž Perc,
Dibakar Ghosh
Abstract:
Ecology and evolution are inherently linked, and studying a mathematical model that considers both holds promise of insightful discoveries related to the dynamics of cooperation. In the present article, we use the prisoner's dilemma (PD) game as a basis for long-term apprehension of the essential social dilemma related to cooperation among unrelated individuals. We upgrade the contemporary PD game…
▽ More
Ecology and evolution are inherently linked, and studying a mathematical model that considers both holds promise of insightful discoveries related to the dynamics of cooperation. In the present article, we use the prisoner's dilemma (PD) game as a basis for long-term apprehension of the essential social dilemma related to cooperation among unrelated individuals. We upgrade the contemporary PD game with an inclusion of evolution-induced act of punishment as a third competing strategy in addition to the traditional cooperators and defectors. In a population structure, the abundance of ecologically-viable free space often regulates the reproductive opportunities of the constituents. Hence, additionally, we consider the availability of free space as an ecological footprint, thus arriving at a simple eco-evolutionary model, which displays fascinating complex dynamics. As possible outcomes, we report the individual dominance of cooperators and defectors as well as a plethora of mixed states, where different strategies coexist followed by maintaining the diversity in a socio-ecological framework. These states can either be steady or oscillating, whereby oscillations are sustained by cyclic dominance among different combinations of cooperators, defectors, and punishers. We also observe a novel route to cyclic dominance where cooperators, punishers, and defectors enter a coexistence via an inverse Hopf bifurcation that is followed by an inverse period doubling route.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Using Large Pretrained Language Models for Answering User Queries from Product Specifications
Authors:
Kalyani Roy,
Smit Shah,
Nithish Pai,
Jaidam Ramtej,
Prajit Prashant Nadkarn,
Jyotirmoy Banerjee,
Pawan Goyal,
Surender Kumar
Abstract:
While buying a product from the e-commerce websites, customers generally have a plethora of questions. From the perspective of both the e-commerce service provider as well as the customers, there must be an effective question answering system to provide immediate answers to the user queries. While certain questions can only be answered after using the product, there are many questions which can be…
▽ More
While buying a product from the e-commerce websites, customers generally have a plethora of questions. From the perspective of both the e-commerce service provider as well as the customers, there must be an effective question answering system to provide immediate answers to the user queries. While certain questions can only be answered after using the product, there are many questions which can be answered from the product specification itself. Our work takes a first step in this direction by finding out the relevant product specifications, that can help answering the user questions. We propose an approach to automatically create a training dataset for this problem. We utilize recently proposed XLNet and BERT architectures for this problem and find that they provide much better performance than the Siamese model, previously applied for this problem. Our model gives a good performance even when trained on one vertical and tested across different verticals.
△ Less
Submitted 29 May, 2020;
originally announced May 2020.
-
An inflow-boundary-based Navier-Stokes wave tank: verification and validation for waves propagating over flat and inclined bottoms
Authors:
Shaswat Saincher,
Jyotirmay Banerjee
Abstract:
Development of mass-source function based numerical wave tank (NWT) algorithms in the Navier-Stokes (NSE) framework is impeded by multiple design issues such as: (a) optimization of a number of variables characterizing the source region, (b) wave-vorticity interactions and (c) a mandatory requirement of modeling the domain on both sides of the wavemaker. In this paper, we circumvent these hurdles…
▽ More
Development of mass-source function based numerical wave tank (NWT) algorithms in the Navier-Stokes (NSE) framework is impeded by multiple design issues such as: (a) optimization of a number of variables characterizing the source region, (b) wave-vorticity interactions and (c) a mandatory requirement of modeling the domain on both sides of the wavemaker. In this paper, we circumvent these hurdles by proposing a volume-preserving inflow-boundary based Navier-Stokes wave tank. Wave generation and propagation is modeled in a two-phase PLIC-VOF set-up. Near-exact volume preservation is achieved (at arbitrarily large steepness) using kinematic stretching that is aimed towards balancing the streamwise momentum between points lying above and below the still water level. Numerical dam** of steep waves is prevented by using blended third-order and limiter schemes for momentum advection. In addition, a mesh stair-step** strategy has been adopted for modeling non-Cartesian immersed boundaries on a staggered variable arrangement. The proposed NWT model is rigorously benchmarked against various wave-propagation scenarios. These include the simulation of: (a) monochromatic waves of various steepnesses, (b) monochromatic waves superimposed with free harmonics, (c) irregular waves in deep water and (d) wave transformation occurring over a submerged trapezoidal bar. Excellent agreement with analytical, numerical and experimental data is reported with both validation as well as verification of the proposed NWT model being established.
△ Less
Submitted 25 October, 2019; v1 submitted 25 February, 2019;
originally announced February 2019.
-
A Log-Euclidean and Total Variation based Variational Framework for Computational Sonography
Authors:
Jyotirmoy Banerjee,
Premal A. Patel,
Fred Ushakov,
Donald Peebles,
Jan Deprest,
Sebastien Ourselin,
David Hawkes,
Tom Vercauteren
Abstract:
We propose a spatial compounding technique and variational framework to improve 3D ultrasound image quality by compositing multiple ultrasound volumes acquired from different probe orientations. In the composite volume, instead of intensity values, we estimate a tensor at every voxel. The resultant tensor image encapsulates the directional information of the underlying imaging data and can be used…
▽ More
We propose a spatial compounding technique and variational framework to improve 3D ultrasound image quality by compositing multiple ultrasound volumes acquired from different probe orientations. In the composite volume, instead of intensity values, we estimate a tensor at every voxel. The resultant tensor image encapsulates the directional information of the underlying imaging data and can be used to generate ultrasound volumes from arbitrary, potentially unseen, probe positions. Extending the work of Hennersperger et al., we introduce a log-Euclidean framework to ensure that the tensors are positive-definite, eventually ensuring non-negative images. Additionally, we regularise the underpinning ill-posed variational problem while preserving edge information by relying on a total variation penalisation of the tensor field in the log domain. We present results on in vivo human data to show the efficacy of the approach.
△ Less
Submitted 6 February, 2018;
originally announced February 2018.
-
Finding $K$ Contingency List in Power Networks using a New Model of Dependency
Authors:
Joydeep Banerjee,
Anamitra Pal,
Kaustav Basu,
Malhar Padhee,
Arunabha Sen
Abstract:
Smart grid systems are composed of power and communication network components. The components in either network exhibit complex dependencies on components in its own as well as the other network to drive their functionality. Existing, models fail to capture these complex dependencies. In this paper, we restrict to the dependencies in the power network and propose the Multi-scale Implicative Interd…
▽ More
Smart grid systems are composed of power and communication network components. The components in either network exhibit complex dependencies on components in its own as well as the other network to drive their functionality. Existing, models fail to capture these complex dependencies. In this paper, we restrict to the dependencies in the power network and propose the Multi-scale Implicative Interdependency Relation (MIIR) model that address the existing limitations. A formal description of the model along with its working dynamics and a brief validation with respect to the 2011 Southwest blackout are provided. Utilizing the MIIR model, the $K$ Contingency List problem is proposed. For a given time instant, the problem solves for a set of $K$ entities in a power network which when failed at that time instant would cause the maximum number of entities to fail eventually. Owing to the problem being NP-complete we devised a Mixed Integer Program (MIP) to obtain the optimal solution and a polynomial time sub-optimal heuristic. The efficacy of the heuristic with respect to the MIP is compared by using different bus system data. In general, the heuristic is shown to provide near optimal solution at a much faster time than the MIP.
△ Less
Submitted 21 May, 2017;
originally announced May 2017.
-
On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures
Authors:
Joydeep Banerjee,
Arunabha Sen,
Chenyang Zho
Abstract:
Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as \emph{auxiliary entities})…
▽ More
Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as \emph{auxiliary entities}) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating $6.75 \%$ from optimal on average.
△ Less
Submitted 24 January, 2017;
originally announced March 2017.
-
A Survey of Interdependency Models for Critical Infrastructure Networks
Authors:
Joydeep Banerjee,
Arun Das,
Arunabha Sen
Abstract:
The critical infrastructures of the nation such as the power grid and the communication network are highly interdependent. Also, it has been observed that there exists complex interdependent relationships between individual entities of the power grid and the communication network that further obfuscates the analysis, and mitigation of faults in such multi-layered networks. In recent years, the res…
▽ More
The critical infrastructures of the nation such as the power grid and the communication network are highly interdependent. Also, it has been observed that there exists complex interdependent relationships between individual entities of the power grid and the communication network that further obfuscates the analysis, and mitigation of faults in such multi-layered networks. In recent years, the research community has made significant efforts towards gaining insight and understanding of the interdependency relations in such multi-layered networks, and accordingly, a number of models have been proposed and analyzed towards realizing this goal. In this chapter we study existing interdependency models proposed in the recent literature and discuss their approach, and inherent features, towards modeling interdependent multi-layer networks. We also provide a brief discussion into the drawbacks of each of these models and propose an alternate model that addresses these drawbacks by capturing the interdependency relationships using a combination of conjunctive and disjunctive relations.
△ Less
Submitted 7 February, 2017;
originally announced February 2017.
-
On Robustness in Multilayer Interdependent Network
Authors:
Joydeep Banerjee,
Chenyang Zhou,
Arunabha Sen
Abstract:
Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and failure analysis of these interdependent networks. However, most of these models fail to capture the complex interdependencies that might actually exist between the infrastructures. The \emp…
▽ More
Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and failure analysis of these interdependent networks. However, most of these models fail to capture the complex interdependencies that might actually exist between the infrastructures. The \emph{Implicative Interdependency Model} that utilizes Boolean Logic to capture complex interdependencies was recently proposed which overcome the limitations of the existing models. A number of problems were studies based on this model. In this paper we study the \textit{Robustness} problem in Interdependent Power and Communication Network. The robustness is defined with respect to two parameters $K \in I^{+} \cup \{0\}$ and $ρ\in (0,1]$. We utilized the \emph{Implicative Interdependency Model} model to capture the complex interdependency between the two networks. The model classifies the interdependency relations into four cases. Computational complexity of the problem is analyzed for each of these cases. A polynomial time algorithm is designed for the first case that outputs the optimal solution. All the other cases are proved to be NP-complete. An in-approximability bound is provided for the third case. For the general case we formulate an Integer Linear Program to get the optimal solution and a polynomial time heuristic. The applicability of the heuristic is evaluated using power and communication network data of Maricopa County, Arizona. The experimental results showed that the heuristic almost always produced near optimal value of parameter $K$ for $ρ< 0.42$.
△ Less
Submitted 24 January, 2017;
originally announced February 2017.
-
On Hardening Problems in Critical Infrastructure Systems
Authors:
Joydeep Banerjee,
Kaustav Basu,
Arunabha Sen
Abstract:
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have be…
▽ More
The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have been overcome by the Implicative Interdependency Model, which uses Boolean Logic to denote the dependencies. This paper formulates the Entity Hardening problem and the Targeted Entity Hardening problem using the Implicative Interdependency Model. The Entity Hardening problem describes a situation where an operator, with a limited budget, must decide which entities to harden, which in turn would minimize the damage, provided a set of entities fail initially. The Targeted Entity Hardening problem is a restricted version of the Entity Hardening problem. This problem presents a scenario where, the protection of certain entities is of higher priority. If these entities were to be nonfunctional, the economic and societal damage would be higher when compared to other entities being nonfunctional. It has been shown that both problems are NP-Complete. An Integer Linear Program (ILP) has been devised to find the optimal solution. A heuristic has been described whose accuracy is found by comparing its performance with the optimal solution using real-world and simulated data.
△ Less
Submitted 31 May, 2017; v1 submitted 24 January, 2017;
originally announced January 2017.
-
Comparison of the periodic slab approach with the finite cluster ansatz for metal-organic interfaces at the example of PTCDA on Ag(110)
Authors:
Jaita Banerjee,
Stefan Behnle,
Martin C. E. Galbraith,
Hans-Georg Mack,
Volker Settels,
Bernd Engels,
Ralf Tonner,
Reinhold F. Fink
Abstract:
We present a comparative study of metal-organic interface properties obtained from dispersion corrected density functional theory calculations based on two different approaches: the periodic slab supercell technique and cluster models with 18 to 290 Ag atoms. Fermi smearing and fixing of cluster borders are required to make the cluster calculation feasible and realistic. The considered adsorption…
▽ More
We present a comparative study of metal-organic interface properties obtained from dispersion corrected density functional theory calculations based on two different approaches: the periodic slab supercell technique and cluster models with 18 to 290 Ag atoms. Fermi smearing and fixing of cluster borders are required to make the cluster calculation feasible and realistic. The considered adsorption structure and energy of a PTCDA molecule on the Ag(110) surface is not well reproduced with clusters containing only two metallic layers. However, clusters with four layers of silver atoms and sufficient lateral extension reproduce the adsorbate structure within 0.02 Å and adsorption energies within 10\% of the slab result. A consideration of the computational effort shows that the cluster approach is a competitive alternative to methods using periodic boundary conditions and of particular interest for research at surface defects and other systems that do not show periodic symmetry.
△ Less
Submitted 18 October, 2016;
originally announced October 2016.
-
Stability Analysis of Population Dynamics Model in Microbial Biofilms with Non-participating Strains
Authors:
Jeet Banerjee,
Tanvi Ranjan,
Ritwik Kumar Layek
Abstract:
The existence of phenotypic heterogeneity in single-species bacterial biofilms is well-established in the published literature. However, the modeling of population dynamics in biofilms from the viewpoint of social interactions, i.e. interplay between heterotypic strains, and the analysis of this kind using control theory are not addressed significantly. Therefore, in this paper, we theoretically a…
▽ More
The existence of phenotypic heterogeneity in single-species bacterial biofilms is well-established in the published literature. However, the modeling of population dynamics in biofilms from the viewpoint of social interactions, i.e. interplay between heterotypic strains, and the analysis of this kind using control theory are not addressed significantly. Therefore, in this paper, we theoretically analyze the population dynamics model in microbial biofilms with non-participating strains (coexisting with public goods producers and non-producers) in the context of evolutionary game theory and nonlinear dynamics. Our analysis of the replicator dynamics model is twofold: first without the inclusion of spatial pattern, and second with the consideration of degree of assortment. In the first case, Lyapunov stability analysis of the stable equilibrium point of the proposed replicator system determines (1,0) ('full dominance of cooperators') as a global asymptotic stable equilibrium whenever the return exceeds the metabolic cost of cooperation. Hence, the global asymptotic stable nature of (1,0) in the context of non-consideration of spatial pattern helps to justify mathematically the adversity in the eradication of "cooperative enterprise" that is an infectious biofilm. In the second case, we found non-existence of global asymptotic stability in the system, and it unveils two additional phenomena - bistability and coexistence. In this context, two inequality conditions are derived for the 'full dominance of cooperators' and coexistence. Therefore, the inclusion of spatial pattern in biofilms with non-competing strains intends conditional dominance of pathogenic (with respect to the hosts) public goods producers which can be an effective strategy towards the control of an infectious biofilm with the drug-dependent regulation of degree of segregation.
△ Less
Submitted 20 September, 2016;
originally announced September 2016.
-
A Study of Fractional Schrodinger Equation-composed via Jumarie fractional derivative
Authors:
Joydip Banerjee,
Uttam Ghosh,
Susmita Sarkar,
Shantanu Das
Abstract:
One of the motivations for using fractional calculus in physical systems is due to fact that many times, in the space and time variables we are dealing which exhibit coarse-grained phenomena, meaning that infinitesimal quantities cannot be placed arbitrarily to zero-rather they are non-zero with a minimum length. Especially when we are dealing in microscopic to mesoscopic level of systems. Meaning…
▽ More
One of the motivations for using fractional calculus in physical systems is due to fact that many times, in the space and time variables we are dealing which exhibit coarse-grained phenomena, meaning that infinitesimal quantities cannot be placed arbitrarily to zero-rather they are non-zero with a minimum length. Especially when we are dealing in microscopic to mesoscopic level of systems. Meaning if we denote x the point in space and t as point in time; then the differentials dx (and dt) cannot be taken to limit zero, rather it has spread. A way to take this into account is to use infinitesimal quantities as (\Deltax)^α(and (\Deltat)^α) with 0<α<1, which for very-very small \Deltax (and \Deltat); that is trending towards zero, these 'fractional' differentials are greater that \Deltax (and \Deltat). That is (\Deltax)^α>\Deltax. This way defining the differentials-or rather fractional differentials makes us to use fractional derivatives in the study of dynamic systems. In fractional calculus the fractional order trigonometric functions play important role. The Mittag-Leffler function which plays important role in the field of fractional calculus; and the fractional order trigonometric functions are defined using this Mittag-Leffler function. In this paper we established the fractional order Schrodinger equation-composed via Jumarie fractional derivative; and its solution in terms of Mittag-Leffler function with complex arguments and derive some properties of the fractional Schrodinger equation that are studied for the case of particle in one dimensional infinite potential well.
△ Less
Submitted 25 February, 2016;
originally announced March 2016.
-
Using complex networks towards information retrieval and diagnostics in multidimensional imaging
Authors:
Soumya Jyoti Banerjee,
Mohammad Azharuddin,
Debanjan Sen,
Smruti Savale,
Himadri Datta,
Anjan Kr Dasgupta,
Soumen Roy
Abstract:
We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkabl…
▽ More
We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkably, network analyses of thermal imaging time series of contact lens users and patients upon whom Laser-Assisted in situ Keratomileusis (Lasik) surgery has been conducted, exhibit pronounced similarity with results obtained from ADDE patients. We also propose a general framework for the transformation of multidimensional images to networks for futuristic biometry. Our approach is general and scalable to other fluctuation-based devices where network parameters derived from fluctuations, act as effective discriminators and diagnostic markers.
△ Less
Submitted 1 December, 2015; v1 submitted 8 June, 2015;
originally announced June 2015.
-
On the Entity Hardening Problem in Multi-layered Interdependent Networks
Authors:
Joydeep Banerjee,
Arun Das,
Chenyang Zhou,
Anisha Mazumder,
Arunabha Sen
Abstract:
The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdepe…
▽ More
The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdependencies that exist between the entities of these networks. To overcome the limitations, recently an Implicative Interdependency Model that utilizes Boolean Logic, was proposed and a number of problems were studied. In this paper we study the entity hardening problem, where by entity hardening we imply the ability of the network operator to ensure that an adversary (be it Nature or human) cannot take a network entity from operative to inoperative state. Given that the network operator with a limited budget can only harden k entities, the goal of the entity hardening problem is to identify the set of k entities whose hardening will ensure maximum benefit for the operator, i.e. maximally reduce the ability of the adversary to degrade the network. We show that the problem is solvable in polynomial time for some cases, whereas for others it is NP-complete. We provide the optimal solution using ILP, and propose a heuristic approach to solve the problem. We evaluate the efficacy of our heuristic using power and communication network data of Maricopa County, Arizona. The experiments show that our heuristic almost always produces near optimal results.
△ Less
Submitted 20 December, 2014;
originally announced December 2014.
-
Slow poisoning and destruction of networks: Edge proximity and its implications for biological and infrastructure networks
Authors:
Soumya Jyoti Banerjee,
Saptarshi Sinha,
Soumen Roy
Abstract:
We propose a network metric, edge proximity, ${\cal P}_e$, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high ${\cal P}_e$ might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by ${\cal P}_e$ leads to…
▽ More
We propose a network metric, edge proximity, ${\cal P}_e$, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high ${\cal P}_e$ might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by ${\cal P}_e$ leads to a remarkable increase in the diameter and average shortest path length in undirected real and random networks till the first disconnection and well beyond. ${\cal P}_e$ can be consistently used to rupture the network into two nearly equal parts, thus presenting a very potent strategy to greatly harm a network. Targeting by ${\cal P}_e$ causes notable efficiency loss in U.S. and European power grid networks. ${\cal P}_e$ identifies proteins with essential cellular functions in protein-protein interaction networks. It pinpoints regulatory neural connections and important portions of the neural and brain networks, respectively. Energy flow interactions identified by ${\cal P}_e$ form the backbone of long food web chains. Finally, we scrutinize the potential of ${\cal P}_e$ in edge controllability dynamics of directed networks.
△ Less
Submitted 11 February, 2015; v1 submitted 29 September, 2014;
originally announced September 2014.
-
Analysis of d-Hop Dominating Set Problem for Directed Graph with Indegree Bounded by One
Authors:
Joydeep Banerjee,
Arun Das,
Arunabha Sen
Abstract:
Efficient communication between nodes in ad-hoc networks can be established through repeated cluster formations with designated \textit{cluster-heads}. In this context minimum d-hop dominating set problem was introduced for cluster formation in ad-hoc networks and is proved to be NP-complete. Hence, an exact solution to this problem for certain subclass of graphs (representing an ad-hoc network) c…
▽ More
Efficient communication between nodes in ad-hoc networks can be established through repeated cluster formations with designated \textit{cluster-heads}. In this context minimum d-hop dominating set problem was introduced for cluster formation in ad-hoc networks and is proved to be NP-complete. Hence, an exact solution to this problem for certain subclass of graphs (representing an ad-hoc network) can be beneficial. In this short paper we perform computational complexity analysis of minimum d-hop dominating set problem for directed graphs with in-degree bounded by $1$. The optimum solution of the problem can be found polynomially by exploiting certain properties of the graph under consideration. For a digraph $G_{D}=(V_D,E_D)$ an $\mathcal{O}(|V_D|^2)$ solution is provided to the problem.
△ Less
Submitted 25 January, 2017; v1 submitted 28 April, 2014;
originally announced April 2014.
-
Identification of $\cal K$ Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency
Authors:
Arunabha Sen,
Anisha Mazumder,
Joydeep Banerjee,
Arun Das,
Randy Compton
Abstract:
The critical infrastructures of the nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortu…
▽ More
The critical infrastructures of the nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortunately, most of the models are over simplified and, as such, they fail to capture the complex interdependency that exists between entities of the power grid and the communication networks involving a combination of conjunctive and disjunctive relations. To overcome the limitations of existing models, we propose a new model that is able to capture such complex interdependency relations. Utilizing this model, we provide techniques to identify the $\cal K$ most vulnerable nodes of an interdependent network. We show that the problem can be solved in polynomial time in some special cases, whereas for some others, the problem is NP-complete. We establish that this problem is equivalent to computation of a {\em fixed point} of a multilayered network system and we provide a technique for its computation utilizing Integer Linear Programming. Finally, we evaluate the efficacy of our technique using real data collected from the power grid and the communication network that span the Maricopa County of Arizona.
△ Less
Submitted 8 January, 2014;
originally announced January 2014.
-
Excitation of weakly-bound molecules to trilobite-like Rydberg states
Authors:
M. A. Bellos,
R. Carollo,
J. Banerjee,
E. E. Eyler,
P. L. Gould,
W. C. Stwalley
Abstract:
We observe "trilobite-like" states of ultracold 85Rb2 molecules, in which a ground-state atom is bound by the electronic wavefunction of its Rydberg-atom partner. We populate these states through the ultraviolet excitation of weakly-bound molecules, and access a regime of trilobite-like states at low principal quantum numbers and with vibrational turning points around 35 Bohr radii. This demonstra…
▽ More
We observe "trilobite-like" states of ultracold 85Rb2 molecules, in which a ground-state atom is bound by the electronic wavefunction of its Rydberg-atom partner. We populate these states through the ultraviolet excitation of weakly-bound molecules, and access a regime of trilobite-like states at low principal quantum numbers and with vibrational turning points around 35 Bohr radii. This demonstrates that, unlike previous studies that used free-to-bound transitions, trilobite-like states can also be excited through bound-to-bound transitions. This approach provides high excitation probabilities without requiring high-density samples, and affords the ability to control the excitation radius by selection of the initial-state vibrational level.
△ Less
Submitted 31 May, 2013; v1 submitted 14 March, 2013;
originally announced March 2013.
-
Spectroscopy of the Double Minimum $3\,^3 Π_Ω$ Electronic State of $^{39}$K$^{85}$Rb
Authors:
Jayita Banerjee,
David Rahmlow,
Ryan Carollo,
Michael Bellos,
Edward E. Eyler,
Phillip L. Gould,
William C. Stwalley
Abstract:
We report the observation and analysis of the $3\,^3Π_Ω$ double-minimum electronic excited state of $^{39}$K$^{85}$Rb. The spin-orbit components ($0^{+}, 0^{-}, 1$ and 2) of this state are investigated based on potentials developed from the available \emph{ab initio} potential curves. We have assigned the vibrational levels $v'=2-11$ of the $3\,^3Π_{1,2}$ potentials and $v'=2-12$ of the…
▽ More
We report the observation and analysis of the $3\,^3Π_Ω$ double-minimum electronic excited state of $^{39}$K$^{85}$Rb. The spin-orbit components ($0^{+}, 0^{-}, 1$ and 2) of this state are investigated based on potentials developed from the available \emph{ab initio} potential curves. We have assigned the vibrational levels $v'=2-11$ of the $3\,^3Π_{1,2}$ potentials and $v'=2-12$ of the $3\,^3Π_{0^{+/-}}$ potential. We compare our experimental observations of the $3\,^3Π_Ω$ state with predictions based on theoretical potentials. The observations are based on resonance enhanced multiphoton ionization (REMPI) of ultracold KRb in vibrational levels $v"=14-25$ of the $a\,^3Σ^+$ state. These \emph{a}-state ultracold molecules are formed by photoassociation of ultracold $^{39}$K and $^{85}$Rb atoms to the 5(1) state of KRb followed by spontaneous emission to the \emph{a} state.
△ Less
Submitted 20 January, 2013;
originally announced January 2013.
-
Upper Bound to the Ionization Energy of 85Rb2
Authors:
M. A. Bellos,
R. Carollo,
J. Banerjee,
M. Ascoli,
A. -R. Allouche,
E. E. Eyler,
P. L. Gould,
W. C. Stwalley
Abstract:
We report an upper bound to the ionization energy of 85Rb2 of 31348.0(6) cm-1, which also provides a lower bound to the dissociation energy D0 of 85Rb2+ of 6307.5(6) cm-1. These bounds were measured by the onset of autoionization of excited states of 85Rb2 below the 5s+7p atomic limit. We form 85Rb2 molecules via photoassociation of ultracold 85Rb atoms, and subsequently excite the molecules by si…
▽ More
We report an upper bound to the ionization energy of 85Rb2 of 31348.0(6) cm-1, which also provides a lower bound to the dissociation energy D0 of 85Rb2+ of 6307.5(6) cm-1. These bounds were measured by the onset of autoionization of excited states of 85Rb2 below the 5s+7p atomic limit. We form 85Rb2 molecules via photoassociation of ultracold 85Rb atoms, and subsequently excite the molecules by single-photon ultraviolet transitions to states above the ionization threshold.
△ Less
Submitted 31 December, 2012;
originally announced December 2012.
-
Observation and Analysis of Resonant Coupling Between Near-Degenerate Levels of the 2 1Σg+ and 1 1 Πg States of Ultracold 85Rb2
Authors:
R. Carollo,
M. A. Bellos,
D. Rahmlow,
J. Banerjee,
E. E. Eyler,
P. L. Gould,
W. C. Stwalley
Abstract:
We report on the anomalously high line strength of a single rotational level in the ultracold photoassociation of two 85Rb atoms to form 85Rb2. The v' = 111, J' = 5 level belongs to the Hund's case (c) 2 (0g+) state, which correlates to the Hund's case (a) 2 1 Σg+ state. Its strength is caused by coupling with a very near-resonant long-range state. The long-range component is the energetically deg…
▽ More
We report on the anomalously high line strength of a single rotational level in the ultracold photoassociation of two 85Rb atoms to form 85Rb2. The v' = 111, J' = 5 level belongs to the Hund's case (c) 2 (0g+) state, which correlates to the Hund's case (a) 2 1 Σg+ state. Its strength is caused by coupling with a very near-resonant long-range state. The long-range component is the energetically degenerate v' = 155, J' = 5 level of the case (c) 2 (1g)$ state, correlating to the case (a) 1 1 Πg state. The line strength is enhanced by an order of magnitude through this coupling, relative to nearby vibrational levels and even to nearby rotational levels of the same vibrational level. This enhancement is in addition to the enhancement seen in all J' = 3 and 5 levels of the 2 (0g+) state due to an l = 4 shape resonance in the a 3 Σu+ state continuum, which alters the distribution of levels formed by photoassociation.
△ Less
Submitted 25 February, 2013; v1 submitted 12 December, 2012;
originally announced December 2012.
-
Direct Photoassociative Formation of Ultracold KRb Molecules in the Lowest Vibrational Levels of the Ground State
Authors:
Jayita Banerjee,
David Rahmlow,
Ryan Carollo,
Michael Bellos,
Edward E. Eyler,
Phillip L. Gould,
William C. Stwalley
Abstract:
We report continuous direct photoassociative formation of ultracold KRb molecules in the lowest vibrational levels $(v"=0 -10)$ of the electronic ground state $(X ^1Σ^+)$, starting from $^{39}$K and $^{85}$Rb atoms in a magneto-optical trap. The process exploits a newfound resonant coupling between the $2(1), v'=165$ and $4(1), v'=61$ levels, which exhibit an almost equal admixture of the uncouple…
▽ More
We report continuous direct photoassociative formation of ultracold KRb molecules in the lowest vibrational levels $(v"=0 -10)$ of the electronic ground state $(X ^1Σ^+)$, starting from $^{39}$K and $^{85}$Rb atoms in a magneto-optical trap. The process exploits a newfound resonant coupling between the $2(1), v'=165$ and $4(1), v'=61$ levels, which exhibit an almost equal admixture of the uncoupled eigenstates. The production rate of the $X^1Σ^+$ ($v"$=0) level is estimated to be $5\times10^3$ molecules/sec.
△ Less
Submitted 25 November, 2012;
originally announced November 2012.
-
Key to Network Controllability
Authors:
Soumya Jyoti Banerjee,
Soumen Roy
Abstract:
Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the…
▽ More
Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the controllability of a network decided almost completely by the immediate neighbourhood of a node, while, even slightly distant nodes play no role at all? Motivated by the above question, in this communication, we argue that an effective understanding of controllability in directed networks can be reached using distance based measures of closeness centrality and betweenness centrality and may not require the knowledge of local connectivity measures like in-degree and out-degree.
△ Less
Submitted 17 September, 2012;
originally announced September 2012.
-
Photoassociation to the 2(1)Sigma(g)(+) state in ultracold 85Rb2 in the presence of a shape resonance
Authors:
M. A. Bellos,
R. Carollo,
D. Rahmlow,
J. Banerjee,
E. E. Eyler,
P. L. Gould,
W. C. Stwalley
Abstract:
We report the first observation of photoassociation to the 2(1)Sigma(g)(+) state of 85Rb2 . We have observed two vibrational levels (v'=98, 99) below the 5s1/2+5p1/2 atomic limit and eleven vibrational levels (v'=102-112) above it. The photoassociation---and subsequent spontaneous emission---occur predominantly between 15 and 20 Bohr in a region of internuclear distance best described as a transit…
▽ More
We report the first observation of photoassociation to the 2(1)Sigma(g)(+) state of 85Rb2 . We have observed two vibrational levels (v'=98, 99) below the 5s1/2+5p1/2 atomic limit and eleven vibrational levels (v'=102-112) above it. The photoassociation---and subsequent spontaneous emission---occur predominantly between 15 and 20 Bohr in a region of internuclear distance best described as a transition between Hund's case (a) and Hund's case (c) coupling. The presence of a g-wave shape resonance in the collision of two ground-state atoms affects the photoassociation rate and lineshape of the J'= 3 and 5 rotational levels.
△ Less
Submitted 17 August, 2012;
originally announced August 2012.
-
Integral Value Transformations: A Class of Affine Discrete Dynamical Systems and an Application
Authors:
Sk. S. Hassan,
P. Pal Choudhury,
B. K. Nayak,
A. Ghosh,
J. Banerjee
Abstract:
In this paper, the notion of Integral Value Transformations (IVTs), a class of Discrete Dynamical Maps has been introduced. Then notion of Affine Discrete Dynamical System (ADDS) in the light of IVTs is defined and some rudimentary mathematical properties of the system are depicted. Collatz Conjecture is one of the most enigmatic problems in 20th Century. The Conjecture was posed by German Mathema…
▽ More
In this paper, the notion of Integral Value Transformations (IVTs), a class of Discrete Dynamical Maps has been introduced. Then notion of Affine Discrete Dynamical System (ADDS) in the light of IVTs is defined and some rudimentary mathematical properties of the system are depicted. Collatz Conjecture is one of the most enigmatic problems in 20th Century. The Conjecture was posed by German Mathematician L. Collatz in 1937. There are much advancement in generalizing and defining analogous conjectures, but even to the date, there is no fruitful result for the advancement for the settlement of the conjecture. We have made an effort to make a Collatz type problem in the domain of IVTs and we have been able to solve the problem in 2011 [1]. Here mainly, we have focused and inquired on Collatz-like ADDS. Finally, we have designed the Optimal Distributed and Parallel Environment (ODPE) in the light of ADDS.
△ Less
Submitted 12 October, 2011; v1 submitted 21 September, 2011;
originally announced October 2011.
-
Fractal String Generation and Its Application in Music Composition
Authors:
Avishek Ghosh,
Joydeep Banerjee,
Sk. S. Hassan,
P. Pal Choudhury
Abstract:
Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re, Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their harmonics. Each note corresponds to a particular frequency. When such strings are encoded to form discrete sequences, different frequencies present in the music corresponds to different amplitude levels (value) of the discrete sequence. Initially, a class…
▽ More
Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re, Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their harmonics. Each note corresponds to a particular frequency. When such strings are encoded to form discrete sequences, different frequencies present in the music corresponds to different amplitude levels (value) of the discrete sequence. Initially, a class of discrete sequences has been generated using logistic map. All these discrete sequences have at most n-different amplitude levels (value) (depending on the particular raga). Without loss of generality, we have chosen two discrete sequences of two types of Indian raga viz. Bhairabi and Bhupali having same number of amplitude levels to obtain/search close relatives from the class. The relative / closeness can be assured through correlation coefficient.The search is unbiased, random and non-adaptive. The obtained string is that which maximally resembles the given two sequences. The same can be thought of as a music composition of the given two strings. It is to be noted that all these string are fractal string which can be persuaded by fractal dimension.
△ Less
Submitted 27 September, 2011;
originally announced September 2011.
-
Formation of ultracold metastable Rb2 molecules in their v"=0 level by blue-detuned photoassociation
Authors:
M. A. Bellos,
D. Rahmlow,
R. Carollo,
J. Banerjee,
O. Dulieu,
A. Gerdes,
E. E. Eyler,
P. L. Gould,
W. C. Stwalley
Abstract:
We report on the observation of blue-detuned photoassociation in Rb2, in which vibrational levels are energetically above the corresponding excited atomic asymptote. 85Rb atoms in a MOT were photoassociated at short internuclear distances to levels of the (1)3Pi g state at a rate of approximately 5x10^4 molecules/s. We have observed most of the predicted vibrational levels for all four spin-orbit…
▽ More
We report on the observation of blue-detuned photoassociation in Rb2, in which vibrational levels are energetically above the corresponding excited atomic asymptote. 85Rb atoms in a MOT were photoassociated at short internuclear distances to levels of the (1)3Pi g state at a rate of approximately 5x10^4 molecules/s. We have observed most of the predicted vibrational levels for all four spin-orbit components 0g+, 0g-, 1g, and 2g, including levels of the 0g+ outer well. These molecules decay to the metastable a3Sigma u+ state, some preferentially to the v"=0 level, as we have observed for photoassociation to the v'=8 level of the 1g component.
△ Less
Submitted 2 May, 2011;
originally announced May 2011.
-
Minimization of Handoff latency by co-ordinate evaluation method using GPS based map
Authors:
Debabrata Sarddar,
Joydeep Banerjee,
Souvik Kumar Saha,
Tapas Jana,
Utpal Biswas,
M. K. Naskar
Abstract:
Handoff has become an essential criterion in mobile communication system, specially in urban areas, owing to the limited coverage area of Access Points (AP). Handover of calls between two Base Stations (BSs) is encountered frequently and it is essentially required to minimize the delay of the process. Many solutions attempting to improve this process have been proposed but only a few use geo-locat…
▽ More
Handoff has become an essential criterion in mobile communication system, specially in urban areas, owing to the limited coverage area of Access Points (AP). Handover of calls between two Base Stations (BSs) is encountered frequently and it is essentially required to minimize the delay of the process. Many solutions attempting to improve this process have been proposed but only a few use geo-location systems in the management of the handover. Here we propose to minimize the handoff latency by minimizing the number of APs scanned by the Mobile Node (MN) during each handoff procedure. We consider the whole topographical area as a two dimensional plane. By GPS, we can note down the co-ordinates of the MN at any instant. The average rate of change of its latitudinal distance and longitudinal distance with a specific time period is evaluated at the end of the given time period. With the knowledge of the given parameter, it is possible to determine the latitude and longitude of the MN after a particular instant of time. Hence, the direction of motion of the MN can be determined, which in turns gives the AP towards which the MN is headings. This reduces the number of APs to be scanned. Thus, on an overall basis, the handoff latency can be reduced by almost half to one third of its value.
△ Less
Submitted 10 August, 2010;
originally announced August 2010.
-
Minimization of Handoff Failure Probability for Next-Generation Wireless Systems
Authors:
Debabrata Sarddar,
Tapas Jana,
Souvik Kumar Saha,
Joydeep Banerjee,
Utpal Biswas,
M. K. Naskar
Abstract:
During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized f…
▽ More
During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized for some specific services and coverage area to provide ubiquitous communications to the mobile users. In this paper, we propose to enhance the handoff performance of mobile IP in wireless IP networks by reducing the false handoff probability in the NGWS handoff management protocol. Based on the information of false handoff probability, we analyze its effect on mobile speed and handoff signaling delay.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Self-organised criticality and 1/f noise in single-channel current of voltage-dependent anion channel
Authors:
Jyotirmoy Banerjee,
Mahendra. K. Verma,
Smarajit Manna,
Subhendu Ghosh
Abstract:
Noise profile of Voltage Dependent Anion Channel (VDAC) is investigated in open channel state. Single-channel currents through VDAC from mitochondria of rat brain reconstituted into a planar lipid bilayer are recorded under different voltage clamped conditions across the membrane. Power spectrum analysis of current indicates powerlaw noise of 1/f nature. Moreover, this 1/f nature of the open cha…
▽ More
Noise profile of Voltage Dependent Anion Channel (VDAC) is investigated in open channel state. Single-channel currents through VDAC from mitochondria of rat brain reconstituted into a planar lipid bilayer are recorded under different voltage clamped conditions across the membrane. Power spectrum analysis of current indicates powerlaw noise of 1/f nature. Moreover, this 1/f nature of the open channel noise is seen throughout the range of applied membrane potential -30 to +30 mV. It is being proposed that 1/f noise in open ion channel arises out of obstruction in the passage of ions across the membrane. The process is recognised as a phenomenon of self-organized-criticality (SOC) like sandpile avalanche and other physical systems. Based on SOC it has been theoretically established that the system of ion channel follows powerlaw noise as observed in our experiments. We also show that the first-time return probability of current fluctuations obeys a powerlaw distribution.
△ Less
Submitted 20 April, 2006;
originally announced April 2006.
-
Universal Scaling Laws for Large Events in Driven Nonequilibrium Systems
Authors:
M. K. Verma,
S. Manna,
J. Banerjee,
S. Ghosh
Abstract:
For many driven-nonequilibrium systems, the probability distribution functions of magnitude and recurrence-time of large events follow a powerlaw indicating a strong temporal correlation. In this paper we argue why these probability distribution functions are ubiquitous in driven nonequilibrium systems, and we derive universal scaling laws connecting the magnitudes, recurrence-time, and spatial…
▽ More
For many driven-nonequilibrium systems, the probability distribution functions of magnitude and recurrence-time of large events follow a powerlaw indicating a strong temporal correlation. In this paper we argue why these probability distribution functions are ubiquitous in driven nonequilibrium systems, and we derive universal scaling laws connecting the magnitudes, recurrence-time, and spatial intervals of large events. The relationships between the scaling exponents have also been studied. We show that the ion-channel current in Voltage-dependent Anion Channels obeys the universal scaling law.
△ Less
Submitted 20 April, 2006;
originally announced April 2006.