-
Dyna-LfLH: Learning Agile Navigation in Dynamic Environments from Learned Hallucination
Authors:
Saad Abdul Ghani,
Zizhao Wang,
Peter Stone,
Xuesu Xiao
Abstract:
This paper presents a self-supervised learning method to safely learn a motion planner for ground robots to navigate environments with dense and dynamic obstacles. When facing highly-cluttered, fast-moving, hard-to-predict obstacles, classical motion planners may not be able to keep up with limited onboard computation. For learning-based planners, high-quality demonstrations are difficult to acqui…
▽ More
This paper presents a self-supervised learning method to safely learn a motion planner for ground robots to navigate environments with dense and dynamic obstacles. When facing highly-cluttered, fast-moving, hard-to-predict obstacles, classical motion planners may not be able to keep up with limited onboard computation. For learning-based planners, high-quality demonstrations are difficult to acquire for imitation learning while reinforcement learning becomes inefficient due to the high probability of collision during exploration. To safely and efficiently provide training data, the Learning from Hallucination (LfH) approaches synthesize difficult navigation environments based on past successful navigation experiences in relatively easy or completely open ones, but unfortunately cannot address dynamic obstacles. In our new Dynamic Learning from Learned Hallucination (Dyna-LfLH), we design and learn a novel latent distribution and sample dynamic obstacles from it, so the generated training data can be used to learn a motion planner to navigate in dynamic environments. Dyna-LfLH is evaluated on a ground robot in both simulated and physical environments and achieves up to 25% better success rate compared to baselines.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Kink dynamics in a high-order field model
Authors:
Aliakbar Moradi Marjaneh,
Vakhid A. Gani,
Azam Ghaani,
Kurosh Javidan,
Alexander A. Malnev,
Oleg V. Nagornov
Abstract:
We study various properties of topological solitons (kinks) of a field-theoretic model with a polynomial potential of the twelfth degree. This model is remarkable in that it has several topological sectors, in which kinks have different masses. We obtain asymptotic estimates for the kink-antikink and antikink-kink interaction forces. We also study numerically kink-antikink and antikink-kink collis…
▽ More
We study various properties of topological solitons (kinks) of a field-theoretic model with a polynomial potential of the twelfth degree. This model is remarkable in that it has several topological sectors, in which kinks have different masses. We obtain asymptotic estimates for the kink-antikink and antikink-kink interaction forces. We also study numerically kink-antikink and antikink-kink collisions and observe a number of interesting phenomena: annihilation of a kink-antikink pair in one topological sector and the production in its place of a pair in another sector; resonance phenomena -- escape windows, despite the absence of vibrational modes in the kink excitation spectra.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
Kinks scattering in deformed $\varphi^6$ model
Authors:
Aliakbar Moradi Marjaneh,
Azam Ghaani,
Kurosh Javidan
Abstract:
The deformed model $\tilde{\varphi}^{(6)}$ is introduced based on the $\varphi^4$ model using a deformation functional $F[\varphi]$ including a free parameter $a$. The kink solutions in different sectors and their internal modes are obtained as functions of the deformation parameter and their characteristics are evaluated as well. It is shown that the kinks of the deformed model inherit some of th…
▽ More
The deformed model $\tilde{\varphi}^{(6)}$ is introduced based on the $\varphi^4$ model using a deformation functional $F[\varphi]$ including a free parameter $a$. The kink solutions in different sectors and their internal modes are obtained as functions of the deformation parameter and their characteristics are evaluated as well. It is shown that the kinks of the deformed model inherit some of their dynamical properties (like internal modes) from the standard $\varphi^4$ potential and some of their characteristics from the $\varphi^6$ model. The dynamics of kink-antikink (antikink-kink) scattering is investigated in different sectors with various kink initial conditions as well as different values of deformation parameter. According to the kinks' initial velocity, colliding kinks may be bound together or scatter from each other after the interaction. These two situations are distinguished by the critical velocity, which itself depends on the deformation parameter of the model. Due to the difference in the rest mass of kink solutions related to different sectors, interesting and sometimes rare phenomena are observed during the kink scattering and their interactions.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Towards Smart Education through the Internet of Things: A Review
Authors:
Afzal Badshah,
Anwar Ghani,
Ali Daud,
Ateeqa Jalal,
Muhammad Bilal,
Jon Crowcroft
Abstract:
IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a concrete impact on learners' engagement, motivation, attendance, and deep learning. Traditional education faces many challenges, including administ…
▽ More
IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a concrete impact on learners' engagement, motivation, attendance, and deep learning. Traditional education faces many challenges, including administration, pedagogy, assessment, and classroom supervision. Recent developments in ICT (e.g., IoT, AI and 5G, etc.) have yielded lots of smart solutions for various aspects of life; however, smart solutions are not well integrated into the education system. In particular, the COVID-19 pandemic situation had further emphasized the adoption of new smart solutions in education. This study reviews the related studies and addresses the (i) problems in the traditional education system with possible solutions, (ii) the transition towards smart education, and (iii) research challenges in the transition to smart education (i.e, computational and social resistance). Considering these studies, smart solutions (e.g., smart pedagogy, smart assessment, smart classroom, smart administration, etc.) are introduced to the problems of the traditional system. This exploratory study opens new trends for scholars and the market to integrate ICT, IoT, and AI into smart education.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
Ordinary muon capture rates on $^{100}$Mo and $^{\rm nat}$Mo for astro-antineutrinos and double beta decays
Authors:
I. H. Hashim,
H. Ejiri,
N. N. A. M. A. Ghani,
F. Othman,
R. Razali,
Z. W. Ng,
T. Shima,
D. Tomono,
D. Zinatulina,
M. Schirchenko,
S. Kazartsev,
A. Sato,
Y. Kawashima,
K. Ninomiya,
K. Takahisa
Abstract:
\item[Background] The nuclear responses for antineutrinos associated with double beta decays (DBDs) and astro-antineutrino interactions are studied by measuring ordinary muon capture (OMC) rates. \item[Purpose]The experimental studies of absolute OMC rates and their mass number dependence for $^{100}$Mo and the natural Mo are currently of interest in astro-antineutrinos and DBDs. \item[Method]The…
▽ More
\item[Background] The nuclear responses for antineutrinos associated with double beta decays (DBDs) and astro-antineutrino interactions are studied by measuring ordinary muon capture (OMC) rates. \item[Purpose]The experimental studies of absolute OMC rates and their mass number dependence for $^{100}$Mo and the natural Mo are currently of interest in astro-antineutrinos and DBDs. \item[Method]The OMC rates were obtained experimentally by measuring the time spectrum of the trapped muon's decay into electrons to obtain the half-lives of the trapped muons. \item[Results]The OMC rate for the enriched isotope of $^{100}$Mo is $Λ$($^{100}$Mo)=(7.07$\pm$0.32)$\times10^{6}$ s$^{-1}$, while that for the natural Mo is $Λ$($^{\rm nat}$Mo)=(9.66$\pm$0.44)$\times10^{6}$ s$^{-1}$, i.e., $Λ$($^{100}$Mo) is about 27$\%$ of $Λ$($^{\rm nat}$Mo), reflecting the blocking effect of the excess neutrons for the proton-to-neutron transformation in OMC. The present experimental observation is consistent with the predictions using Goulard-Primakoff's (GPs) and Primakoff's (Ps) empirical equations. \item[Conclusions] The absolute OMC rates for $^{100}$Mo and $^{\rm nat}$Mo were measured. The large neutron excess in $^{100}$Mo gives a much lower OMC rate than $^{\rm nat}$Mo. On both $^{100}$Mo and $^{\rm nat}$Mo, consistent OMC rates with the GP and P values are observed.
△ Less
Submitted 12 February, 2023;
originally announced February 2023.
-
Seq2Seq Surrogates of Epidemic Models to Facilitate Bayesian Inference
Authors:
Giovanni Charles,
Timothy M. Wolock,
Peter Winskill,
Azra Ghani,
Samir Bhatt,
Seth Flaxman
Abstract:
Epidemic models are powerful tools in understanding infectious disease. However, as they increase in size and complexity, they can quickly become computationally intractable. Recent progress in modelling methodology has shown that surrogate models can be used to emulate complex epidemic models with a high-dimensional parameter space. We show that deep sequence-to-sequence (seq2seq) models can serv…
▽ More
Epidemic models are powerful tools in understanding infectious disease. However, as they increase in size and complexity, they can quickly become computationally intractable. Recent progress in modelling methodology has shown that surrogate models can be used to emulate complex epidemic models with a high-dimensional parameter space. We show that deep sequence-to-sequence (seq2seq) models can serve as accurate surrogates for complex epidemic models with sequence based model parameters, effectively replicating seasonal and long-term transmission dynamics. Once trained, our surrogate can predict scenarios a several thousand times faster than the original model, making them ideal for policy exploration. We demonstrate that replacing a traditional epidemic model with a learned simulator facilitates robust Bayesian inference.
△ Less
Submitted 10 March, 2023; v1 submitted 20 September, 2022;
originally announced September 2022.
-
Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware
Authors:
Kaleem Nawaz Khan,
Najeeb Ullah,
Sikandar Ali,
Muhammad Salman Khan,
Mohammad Nauman,
Anwar Ghani
Abstract:
Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. Ho…
▽ More
Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. However, existing detection techniques have severe shortcomings, including the cumbersome process of feature engineering. Designing representative features require expert domain knowledge. There is a need for minimizing human experts' intervention by circumventing handcrafted feature engineering. Deep learning could be exploited by extracting deep features automatically. Previous work has shown that operational codes (opcodes) of executables provide key information to be used with deep learning models for detection process of malicious applications. The only challenge is to feed opcodes information to deep learning models. Existing techniques use one-hot encoding to tackle the challenge. However, the one-hot encoding scheme has severe limitations. In this paper, we introduce; (1) a novel technique for opcodes embedding, which we name Op2Vec, (2) based on the learned Op2Vec we have developed a dataset for end-to-end detection of android malware. Introducing the end-to-end Android malware detection technique avoids expert-intensive handcrafted features extraction, and ensures automation. Some of the recent deep learning-based techniques showed significantly improved results when tested with the proposed approach and achieved an average detection accuracy of 97.47%, precision of 0.976 and F1 score of 0.979.
△ Less
Submitted 1 March, 2022; v1 submitted 10 April, 2021;
originally announced April 2021.
-
Depth lower bounds in Stabbing Planes for combinatorial principles
Authors:
Stefan Dantchev,
Nicola Galesi,
Abdul Ghani,
Barnaby Martin
Abstract:
Stabbing Planes (also known as Branch and Cut) is a proof system introduced very recently which, informally speaking, extends the DPLL method by branching on integer linear inequalities instead of single variables. The techniques known so far to prove size and depth lower bounds for Stabbing Planes are generalizations of those used for the Cutting Planes proof system. For size lower bounds these a…
▽ More
Stabbing Planes (also known as Branch and Cut) is a proof system introduced very recently which, informally speaking, extends the DPLL method by branching on integer linear inequalities instead of single variables. The techniques known so far to prove size and depth lower bounds for Stabbing Planes are generalizations of those used for the Cutting Planes proof system. For size lower bounds these are established by monotone circuit arguments, while for depth these are found via communication complexity and protection. As such these bounds apply for lifted versions of combinatorial statements. Rank lower bounds for Cutting Planes are also obtained by geometric arguments called protection lemmas.
In this work we introduce two new geometric approaches to prove size/depth lower bounds in Stabbing Planes working for any formula: (1) the antichain method, relying on Sperner's Theorem and (2) the covering method which uses results on essential coverings of the boolean cube by linear polynomials, which in turn relies on Alon's combinatorial Nullenstellensatz.
We demonstrate their use on classes of combinatorial principles such as the Pigeonhole principle, the Tseitin contradictions and the Linear Ordering Principle. By the first method we prove almost linear size lower bounds and optimal logarithmic depth lower bounds for the Pigeonhole principle and analogous lower bounds for the Tseitin contradictions over the complete graph and for the Linear Ordering Principle. By the covering method we obtain a superlinear size lower bound and a logarithmic depth lower bound for Stabbing Planes proof of Tseitin contradictions over a grid graph.
△ Less
Submitted 10 January, 2024; v1 submitted 15 February, 2021;
originally announced February 2021.
-
Transverse expansion of (1 + 2) dimensional magneto-hydrodynamics flow with longitudinal boost invariance
Authors:
R. Emamian,
A. F. Kord,
A. Ghaani,
B. Azadegan
Abstract:
In the present work, we investigate the effects of magnetic field on expanding hot and dense nuclear matter as an ideal fluid. We consider QGP, on the particular case of a (1 + 2) dimensional longitudinally boost-invariant fluid expansion, in the background of an inhomogeneous magnetic field that is generated by external sources. We assume the magnetic field points in the direction perpendicular t…
▽ More
In the present work, we investigate the effects of magnetic field on expanding hot and dense nuclear matter as an ideal fluid. We consider QGP, on the particular case of a (1 + 2) dimensional longitudinally boost-invariant fluid expansion, in the background of an inhomogeneous magnetic field that is generated by external sources. We assume the magnetic field points in the direction perpendicular to the reaction plane, follows the power-law decay in proper time, and has two components on the transverse plane. To simplify the calculation, we suppose the investigated fluid has azimuthal symmetry, and magneto-hydrodynamic equations are described in a polar coordinate system on the transverse plane of reaction. Our results depict the space-time evolution of the transverse expansion of the fluid in the presence of an inhomogeneous external magnetic field. Ultimately, we utilize transverse velocity and correction of energy density to estimate the transverse momentum spectrum of final particles that emerge from heavy-ion collisions based on experimental data.
△ Less
Submitted 6 August, 2021; v1 submitted 7 December, 2020;
originally announced December 2020.
-
Proof complexity and the binary encoding of combinatorial principles
Authors:
Stefan Dantchev,
Nicola Galesi,
Abdul Ghani,
Barnaby Martin
Abstract:
We consider Proof Complexity in light of the unusual binary encoding of certain combinatorial principles. We contrast this Proof Complexity with the normal unary encoding in several refutation systems, based on Resolution and Integer Linear Programming. Please consult the article for the full abstract.
We consider Proof Complexity in light of the unusual binary encoding of certain combinatorial principles. We contrast this Proof Complexity with the normal unary encoding in several refutation systems, based on Resolution and Integer Linear Programming. Please consult the article for the full abstract.
△ Less
Submitted 5 April, 2022; v1 submitted 4 August, 2020;
originally announced August 2020.
-
EER: Enterprise Expert Ranking using Employee Reputation
Authors:
Saba Mahmood,
Anwar Ghani,
Ali Daud,
Syed Muhammad Saqlain
Abstract:
The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises uti…
▽ More
The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises utilize PageRank, normal distribution, and hidden Markov model for expertise ranking. These models suffer issue of negative referral, collusion, reputation inflation, and dynamism. The authors have however proposed a Bayesian approach utilizing beta probability distribution based reputation model for employee ranking in enterprises. The experimental results reveal improved performance compared to previous techniques in terms of Precision and Mean Average Error (MAE) with almost 7% improvement in precision on average for the three data sets. The proposed technique is able to differentiate categories of interactions in a dynamic context. The results reveal that the technique is independent of the rating pattern and density of data.
△ Less
Submitted 29 April, 2020;
originally announced April 2020.
-
Revenue Maximization Approaches in IaaS Clouds: Research Challenges and Opportunities
Authors:
Afzal Badshah,
Anwar Ghani,
Ali Daud,
Anthony Theodore Chronopoulos,
Ateeqa Jalal
Abstract:
Revenue generation is the main concern of any business, particularly in the cloud, where there is no direct interaction between the provider and the consumer. Cloud computing is an emerging core for today's businesses, however, Its complications (e.g, installation, and migration) with traditional markets are the main challenges. It earns more but needs exemplary performance and marketing skills. I…
▽ More
Revenue generation is the main concern of any business, particularly in the cloud, where there is no direct interaction between the provider and the consumer. Cloud computing is an emerging core for today's businesses, however, Its complications (e.g, installation, and migration) with traditional markets are the main challenges. It earns more but needs exemplary performance and marketing skills. In recent years, cloud computing has become a successful paradigm for providing desktop services. It is expected that more than \$ 331 billion will be invested by 2023, likewise, 51 billion devices are expected to be connected to the cloud. Infrastructure as a Service (IaaS) provides physical resources (e.g, computing, memory, storage, and network) as VM instances. In this article, the main revenue factors are categorized as SLA and penalty management, resource scalability, customer satisfaction and management, resource utilization and provision, cost and price management, and advertising and auction. These parameters are investigated in detail and new dynamics for researchers in the field of the cloud are discovered.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Estimating the number of infections and the impact of non-pharmaceutical interventions on COVID-19 in European countries: technical description update
Authors:
Seth Flaxman,
Swapnil Mishra,
Axel Gandy,
H Juliette T Unwin,
Helen Coupland,
Thomas A Mellan,
Harrison Zhu,
Tresnia Berah,
Jeffrey W Eaton,
Pablo N P Guzman,
Nora Schmit,
Lucia Callizo,
Imperial College COVID-19 Response Team,
Charles Whittaker,
Peter Winskill,
Xiaoyue Xi,
Azra Ghani,
Christl A. Donnelly,
Steven Riley,
Lucy C Okell,
Michaela A C Vollmer,
Neil M. Ferguson,
Samir Bhatt
Abstract:
Following the emergence of a novel coronavirus (SARS-CoV-2) and its spread outside of China, Europe has experienced large epidemics. In response, many European countries have implemented unprecedented non-pharmaceutical interventions including case isolation, the closure of schools and universities, banning of mass gatherings and/or public events, and most recently, wide-scale social distancing in…
▽ More
Following the emergence of a novel coronavirus (SARS-CoV-2) and its spread outside of China, Europe has experienced large epidemics. In response, many European countries have implemented unprecedented non-pharmaceutical interventions including case isolation, the closure of schools and universities, banning of mass gatherings and/or public events, and most recently, wide-scale social distancing including local and national lockdowns.
In this technical update, we extend a semi-mechanistic Bayesian hierarchical model that infers the impact of these interventions and estimates the number of infections over time. Our methods assume that changes in the reproductive number - a measure of transmission - are an immediate response to these interventions being implemented rather than broader gradual changes in behaviour. Our model estimates these changes by calculating backwards from temporal data on observed to estimate the number of infections and rate of transmission that occurred several weeks prior, allowing for a probabilistic time lag between infection and death.
In this update we extend our original model [Flaxman, Mishra, Gandy et al 2020, Report #13, Imperial College London] to include (a) population saturation effects, (b) prior uncertainty on the infection fatality ratio, (c) a more balanced prior on intervention effects and (d) partial pooling of the lockdown intervention covariate. We also (e) included another 3 countries (Greece, the Netherlands and Portugal).
The model code is available at https://github.com/ImperialCollegeLondon/covid19model/
We are now reporting the results of our updated model online at https://mrc-ide.github.io/covid19estimates/
We estimated parameters jointly for all M=14 countries in a single hierarchical model. Inference is performed in the probabilistic programming language Stan using an adaptive Hamiltonian Monte Carlo (HMC) sampler.
△ Less
Submitted 23 April, 2020;
originally announced April 2020.
-
SOS: Socially Omitting Selfishness in IoT for Smart and Connected Communities
Authors:
Ghani ur Rehman,
Anwar Ghani,
Muhammad Zubair,
Muhammad Imran Saeed,
Dhananjay Singh
Abstract:
Smart and Connected Communities (SCC) is an emerging field of Internet of Things (IoT), and it is having potential applications to improve human life. The improvement may be in terms of preservation, revitalization, livability, and sustainability of a community. The resources of the nodes and devices in the SCC have certain constraints that may not allow the devices and nodes to cooperate to save…
▽ More
Smart and Connected Communities (SCC) is an emerging field of Internet of Things (IoT), and it is having potential applications to improve human life. The improvement may be in terms of preservation, revitalization, livability, and sustainability of a community. The resources of the nodes and devices in the SCC have certain constraints that may not allow the devices and nodes to cooperate to save their resources such as memory, energy, and buffer, or simply maximize their performance. Thus, to stimulate the nodes to avoid selfish behavior, SSC needs a novel and well-organized solution to motivate nodes for cooperation. This article aims to resolve the issue of selfish behaviors in SCC and to encourage the nodes for cooperation. A novel mechanism Socially Omitting Selfishness (SOS) has been proposed to manage/eradicate selfishness using a socially-oriented election process. The election process elects different heads based on weight and cooperation (using VCG model). The election of heads and incentive mechanism encourages the nodes to show participation and behave as highly cooperative members of the community. Furthermore, an extended version of the Dempster-Shafer model has been used to discourage the selfish behavior of the participating nodes in the SOS scheme. It uses different monitoring and gateway nodes to efficiently employ the proposed scheme. A mathematical model has been developed for the aforementioned aspects and simulated through the NS2 simulation environment to analyze the performance of SOS. The results of the proposed scheme outperform the contemporary schemes in terms of average delivery delay, packet delivery ratio, throughput, and average energy.
△ Less
Submitted 19 April, 2020;
originally announced April 2020.
-
Honesty Based Democratic Scheme to Improve Community Cooperation for IoT Based Vehicular Delay Tolerant Networks
Authors:
Ghani ur Rehman,
Anwar Ghani,
Muhammad Zubair,
Shahbaz Ahmad Khan Ghayyure,
Shad Muhammad
Abstract:
Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end re…
▽ More
Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end relay route. It is challenging as some of the nodes show selfish behavior to preserve their resources like memory, and energy level and become non-cooperative. In this article, an Honesty based Democratic Scheme (HBDS) is introduced where vehicles with higher honesty level are elected as heads -- during the process. Vehicles involved in the process would maximize their rewards (reputation) through active participation in the network activities whereas nodes with non-cooperative selfish behavior are punished. The honesty level of the heads is analyzed using Vickrey, Clarke, and Groves (VCG) model. The mathematical model and algorithms developed in the proposed HBDS technique are simulated using the VDTNSim framework to evaluate their efficiency. The performance results show that the proposed scheme dominates current schemes in terms of packet delivery probability, packet delivery delay, number of packets drop, and overhead ratio.
△ Less
Submitted 18 April, 2020;
originally announced April 2020.
-
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network
Authors:
Haseeb Ur Rahman,
Madjid Merabti,
David Llewellyn-Jones,
Sud Sudirman,
Anwar Ghani
Abstract:
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing…
▽ More
A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing similar data in the network and hence increases the size of communities. This article presents a Memory Thread-based Communities for our entity-based social P2P network that partition the network into groups of peers sharing data belonging to an entity - person, place, object or interest, having its own digital memory or be a part another memory. These connected peers having further similarities by organizing the network using linear orderings. A Memory-Thread is the collection of digital memories having a common reference key and organized according to some form of correlation. The simulation results show an increase in network performance for the proposed scheme along with a decrease in network overhead and higher query success rate compared to other similar schemes. The network maintains its performance even while the network traffic and size increase.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment
Authors:
Hafeez Ur Rehman,
Anwar Ghani,
Shehzad Ashraf Chaudhry,
Mohammed H. Alsharif,
Narjes Nabipour
Abstract:
Very recently, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on the stolen smart attack; moreover, it has scalability issues. We then pr…
▽ More
Very recently, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on the stolen smart attack; moreover, it has scalability issues. We then propose an improved and enhanced protocol to overcome the security weaknesses of Barman et al.'s scheme. The security of the proposed protocol is verified using BAN logic and widely accepted automated AVISPA tool. The BAN logic and automated AVISPA along with the informal analysis ensures the robustness of the scheme against all known attacks
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Issues and challenges in Cloud Storage Architecture: A Survey
Authors:
Anwar Ghani,
Afzal Badshah,
Saeedullah Jan,
Abdulrahman A. Alshdadi,
Ali Daud
Abstract:
From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. business, education, health, and home appliances), resulti…
▽ More
From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. business, education, health, and home appliances), resulting in massive data generation. It is expected that more than 175 ZB data will be processed annually by 75 billion devices by 2025. The 5G technology (i.e. mobile communication technology) dramatically increases network speed, enabling users to upload ultra high definition videos in real-time, which will generate a massive stream of big data. Furthermore, smart devices, having artificial intelligence, will act like a human being (e.g, a self-driving vehicle, etc) on the network, will also generate big data. This sudden shift and massive data generation created serious challenges in storing and managing heterogeneous data at such a large scale. This article presents a state-of-the-art review of the issues and challenges involved in storing heterogeneous big data, their countermeasures (i.e, from security and management perspectives), and future opportunities of cloud storage. These challenges are reviewed in detail and new dynamics for researchers in the field of cloud storage are discovered.
△ Less
Submitted 12 July, 2020; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Brain Interface Based Wheel Chair Control System for Handicap -- An advance and viable approach
Authors:
Mohtashim Baqar,
Azfar Ghani,
Azeem Aftab,
Shahzad Karim Khawar
Abstract:
This paper presents advancement towards making an efficient and viable wheel chair control system based on brain computer interface via electro-oculogram (EOG) signals. The system utilizes the movement of eye as the element of purpose for controlling the movement of the wheel chair. Skin-surface electrodes are placed over skin for the purpose of acquiring the electro-oculogram signal and with the…
▽ More
This paper presents advancement towards making an efficient and viable wheel chair control system based on brain computer interface via electro-oculogram (EOG) signals. The system utilizes the movement of eye as the element of purpose for controlling the movement of the wheel chair. Skin-surface electrodes are placed over skin for the purpose of acquiring the electro-oculogram signal and with the help of differential amplifier the bio-potential is measured between the reference and the point of interest, afterwards these obtained low voltage pulses are amplified, then passed through a sallen-key filter for noise removal and smoothening. These pulses are then collected on to the micro-controller; based on these pulses motor is switched to move in either right or left direction. A prototype system was developed and tested. The system showed promising results. The test conducted showed 99.5% efficiency of movement in correct direction.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Analytical solution of magneto-hydrodynamics with acceleration effects of Bjorken expansion in heavy-ion collisions
Authors:
A. F. Kord,
A. Ghaani,
M. Haddadi Moghaddam
Abstract:
In this work, we study the 1+1 longitudinal acceleration expansion of hot and dense quark matter as a conducting relativistic fluid with the electric conductivity $σ$. The plasma has embedded in the presence of electric and magnetic fields which are perpendicular together in the transverse plane. In order to be more realistic, we generalize the Bjorken solution, which includes the acceleration eff…
▽ More
In this work, we study the 1+1 longitudinal acceleration expansion of hot and dense quark matter as a conducting relativistic fluid with the electric conductivity $σ$. The plasma has embedded in the presence of electric and magnetic fields which are perpendicular together in the transverse plane. In order to be more realistic, we generalize the Bjorken solution, which includes the acceleration effects on the fluid expansion. We apply a perturbation fashion in initial condition to solve the relativistic magneto-hydrodynamics equations. This procedure leads us to achieve the exact algebraic expressions for both electric and magnetic fields. We also find the effects of the electromagnetic fields on the acceleration of the fluid, and the correction of energy density obtained from the magneto-hydrodynamics solutions.
△ Less
Submitted 10 November, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Sherali-Adams and the binary encoding of combinatorial principles
Authors:
Stefan Dantchev,
Abdul Ghani,
Barnaby Martin
Abstract:
We consider the Sherali-Adams (SA) refutation system together with the unusual binary encoding of certain combinatorial principles. For the unary encoding of the Pigeonhole Principle and the Least Number Principle, it is known that linear rank is required for refutations in SA, although both admit refutations of polynomial size. We prove that the binary encoding of the Pigeonhole Principle require…
▽ More
We consider the Sherali-Adams (SA) refutation system together with the unusual binary encoding of certain combinatorial principles. For the unary encoding of the Pigeonhole Principle and the Least Number Principle, it is known that linear rank is required for refutations in SA, although both admit refutations of polynomial size. We prove that the binary encoding of the Pigeonhole Principle requires exponentially-sized SA refutations, whereas the binary encoding of the Least Number Principle admits logarithmic rank, polynomially-sized SA refutations. We continue by considering a refutation system between SA and Lasserre (Sum-of-Squares). In this system, the Least Number Principle requires linear rank while the Pigeonhole Principle becomes constant rank.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Nuclear Isotope Production by Ordinary Muon Capture Reaction
Authors:
I. H. Hashim,
H. Ejiri,
F. Othman,
F. Ibrahim,
F. Soberi,
N. N. A. M. A. Ghani,
T. Shima,
A. Sato,
K. Ninomiya
Abstract:
Muon capture isotope production (MuCIP) using negative ordinary muon capture reactions (OMC) is used to efficiently produce various kinds of nuclear isotopes for both fundamental and applied science studies. The large capture probability of muon into a nucleus, together with the high intensity muon beam, make it possible to produce nuclear isotopes in the order of 10^{9-10} per second depending on…
▽ More
Muon capture isotope production (MuCIP) using negative ordinary muon capture reactions (OMC) is used to efficiently produce various kinds of nuclear isotopes for both fundamental and applied science studies. The large capture probability of muon into a nucleus, together with the high intensity muon beam, make it possible to produce nuclear isotopes in the order of 10^{9-10} per second depending on the muon beam intensity. Radioactive isotopes (RIs) produced by MuCIP are complementary to those produced by photon and neutron capture reactions and are used for various science and technology applications. MuCIP on ^{Nat}Mo by using the RCNP MuSIC \muon beam is presented to demonstrate the feasibility of MuCIP. Nuclear isotopes produced by MuCIP are evaluated by using a pre-equilibrium (PEQ) and equilibrium (EQ) proton neutron emission model. Radioactive $^{99}$Mo isotopes and the metastable ^{99m}Tc isotopes, which are used extensively in medical science, are produced by MuCIP on ^{Nat}Mo and ^{100}Mo.
△ Less
Submitted 1 October, 2019; v1 submitted 21 August, 2019;
originally announced August 2019.
-
Classification and study of a new class of $ ξ^{(as)} $-QSO
Authors:
Hamza Abd El-Qader,
Ahmad Termimi Ab Ghani,
Izzat Qaralleh
Abstract:
Many systems are presented using theory of nonlinear operators. A quadratic stochastic operator (QSO) is perceived as a nonlinear operator. It has a wide range of applications in various disciplines, such as mathematics, biology, and other sciences. The central problem that surrounds this nonlinear operator lies in the requirement that behavior should be studied. Nonlinear operators, even QSO (i.e…
▽ More
Many systems are presented using theory of nonlinear operators. A quadratic stochastic operator (QSO) is perceived as a nonlinear operator. It has a wide range of applications in various disciplines, such as mathematics, biology, and other sciences. The central problem that surrounds this nonlinear operator lies in the requirement that behavior should be studied. Nonlinear operators, even QSO (i.e., the simplest nonlinear operator), have not been thoroughly investigated. This study aims to present a new class of $ξ^{(as)}$-QSO defined on 2D simplex and to classify it into 18 non-conjugate (isomorphic) classes based on their conjugacy and the remuneration of coordinates. In addition, the limiting points of the behavior of trajectories for four classes defined on 2D simplex are examined.
△ Less
Submitted 30 July, 2018;
originally announced July 2018.
-
Magnetohydrodynamic equations for cold quark gluon plasmas: Multi fluidity and Solitary wave stability
Authors:
Azam Ghaani,
Kurosh Javidan
Abstract:
By means of magnetohydrodynamic equations in a non relativistic multi fluid framework, we study the behavior of small amplitude perturbations in cold Quark Gluon Plasmas (QGP). Magnetohydrodynamic equations, along with the QGP equation of state are expanded using the reductive perturbation method. It is shown that such a medium should be considered as multi fluid magnetohydrodynamic (MHD) system.…
▽ More
By means of magnetohydrodynamic equations in a non relativistic multi fluid framework, we study the behavior of small amplitude perturbations in cold Quark Gluon Plasmas (QGP). Magnetohydrodynamic equations, along with the QGP equation of state are expanded using the reductive perturbation method. It is shown that such a medium should be considered as multi fluid magnetohydrodynamic (MHD) system. The result is a nonlinear wave equation which complies with a modified form of the "derivative nonlinear Schrodinger" equation instead of the KdV equation. We show that the complete set of equations, by considering the magnetic field which is supported by the Maxwell's equations, create stable solitary waves. An interesting result is the existence of an electric field component along the direction of magnetic field which causes charge separability in the medium. Properties of this solitonic solution is studied by considering different values for the QGP characters such as background mass density and strength of the magnetic field (at the scale of compact stars).
△ Less
Submitted 29 December, 2017;
originally announced December 2017.
-
Handling state space explosion in verification of component-based systems: A review
Authors:
Faranak Nejati,
Abdul Azim Abd. Ghani,
Ng Keng Yap,
Azmi Jaafar
Abstract:
Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model-checking is one of the reliable methods to systematically analyze the correctness of a system. It is a bruce-force c…
▽ More
Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model-checking is one of the reliable methods to systematically analyze the correctness of a system. It is a bruce-force checking of the system's state space that assists to significantly expand the level of confidence in the system. Nevertheless, model-checking is limited by a critical problem called state-space explosion (SSE). To benefit from model-checking, an appropriate method is required to reduce SSE. In the past two decades, a great number of SSE reduction methods have been proposed containing many similarities, dissimilarities, and unclear concepts in some cases. This research, firstly, plans to present a review of SSE handling methods and classify them based on their similarities, principle, and characteristics. Second, it investigates the methods for handling the SSE problem in the verification process of CBSD and provides insight into the potential limitations, underlining the key challenges for future research efforts.
△ Less
Submitted 26 May, 2021; v1 submitted 28 July, 2017;
originally announced September 2017.
-
Stable solitary waves in Super dense plasmas at external magnetic fields
Authors:
Azam Ghaani,
Kurosh Javidanyand,
Mohsen Sarbishaei
Abstract:
Propagation of localized waves in a Fermi-Dirac distributed super dense matter at the presence of strong external magnetic fields is studied using the reductive perturbation method. Previous works indicate that localized waves break down in unmagnetized super dense hadronic matter. We have shown that stable solitons can be created in such non-relativistic fluids in the presence of an external magn…
▽ More
Propagation of localized waves in a Fermi-Dirac distributed super dense matter at the presence of strong external magnetic fields is studied using the reductive perturbation method. Previous works indicate that localized waves break down in unmagnetized super dense hadronic matter. We have shown that stable solitons can be created in such non-relativistic fluids in the presence of an external magnetic field. Such solitary waves are governed by the Zakharov-Kuznetsov (ZK) equation. Properties of solitonic solutions are studied in media with different values of back ground mass density and strength of magnetic field.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.
-
A method to identify potential ambiguous Malay words through Ambiguity Attributes map**: An exploratory Study
Authors:
Hazlina Haron,
Abdul Azim Abd. Ghani
Abstract:
We describe here a methodology to identify a list of ambiguous Malay words that are commonly being used in Malay documentations such as Requirement Specification. We compiled several relevant and appropriate requirement quality attributes and sentence rules from previous literatures and adopt it to come out with a set of ambiguity attributes that most suit Malay words. The extracted Malay ambiguou…
▽ More
We describe here a methodology to identify a list of ambiguous Malay words that are commonly being used in Malay documentations such as Requirement Specification. We compiled several relevant and appropriate requirement quality attributes and sentence rules from previous literatures and adopt it to come out with a set of ambiguity attributes that most suit Malay words. The extracted Malay ambiguous words (potential) are then being mapped onto the constructed ambiguity attributes to confirm their vagueness. The list is then verified by Malay linguist experts. This paper aims to identify a list of potential ambiguous words in Malay as an attempt to assist writers to avoid using the vague words while documenting Malay Requirement Specification as well as to any other related Malay documentation. The result of this study is a list of 120 potential ambiguous Malay words that could act as guidelines in writing Malay sentences
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
A Systematic Literature Review on relationship between agile methods and Open Source Software Development methodology
Authors:
Taghi Javdani Gandomani,
Hazura Zulzalil,
Abdul Azim Abdul Ghani,
Abu Bakar Md Sultan
Abstract:
Agile software development methods (ASD) and open source software development methods (OSSD) are two different approaches which were introduced in last decade and both of them have their fanatical advocators. Yet, it seems that relation and interface between ASD and OSSD is a fertile area and few rigorous studies have been done in this matter. Major goal of this study was assessment of the relatio…
▽ More
Agile software development methods (ASD) and open source software development methods (OSSD) are two different approaches which were introduced in last decade and both of them have their fanatical advocators. Yet, it seems that relation and interface between ASD and OSSD is a fertile area and few rigorous studies have been done in this matter. Major goal of this study was assessment of the relation and integration of ASD and OSSD. Analyzing of collected data shows that ASD and OSSD are able to support each other. Some practices in one of them are useful in the other. Another finding is that however there are some case studies using ASD and OSSD simultaneously, but there is not enough evidence about comprehensive integration of them.
△ Less
Submitted 12 February, 2013;
originally announced February 2013.
-
Effective factors in agile transformation process from change management perspective
Authors:
Taghi Javdani Gandomani,
Hazura Zulzalil,
Abdul Azim Abdul Ghani,
Abu Bakar Md. Sultan
Abstract:
After introducing agile approach in 2001, several agile methods were founded over the last decade. Agile values such as customer collaboration, embracing changes, iteration and frequent delivery, continuous integration, etc. motivate all software stakeholders to use these methods in their projects. The main issue is that for using these methods instead of traditional methods in software developmen…
▽ More
After introducing agile approach in 2001, several agile methods were founded over the last decade. Agile values such as customer collaboration, embracing changes, iteration and frequent delivery, continuous integration, etc. motivate all software stakeholders to use these methods in their projects. The main issue is that for using these methods instead of traditional methods in software development, companies should change their approach from traditional to agile. This change is a fundamental and critical mutation. Several studies have been done for investigating of barriers, challenges and issues in agile movement process and also in how to use agile methods in companies. The main issue is altering attitude from traditional to agile approach. We believe that before managing agile transformation process, its related factors should be studied in deep. This study focuses on different dimensions of changing approach to agile from change management perspective. These factors are how to being agile, method selection and awareness of challenges and issues. These fundamental factors encompass many items for agile movement and adoption process. However these factors may change in different organization, but they should be studied in deep before any action plan for designing a change strategy. The main contribution of this paper is introducing and these factors and discuss on them deeply.
△ Less
Submitted 12 February, 2013;
originally announced February 2013.
-
On the Current Measurement Practices in Agile Software Development
Authors:
Taghi Javdani,
Hazura Zulzalil,
Abdul Azim Abd Ghani,
Abu Bakar Md Sultan,
Reza Meimandi Parizi
Abstract:
Agile software development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus ASD methods require different measurement practices comparing to traditional methods. Agile teams often…
▽ More
Agile software development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus ASD methods require different measurement practices comparing to traditional methods. Agile teams often do their projects in the simplest and most effective way so, measurement practices in agile methods are more important than traditional methods, because lack of appropriate and effective measurement practices, will increase risk of project. The aims of this paper are investigation on current measurement practices in ASD methods, collecting them together in one study and also reviewing agile version of Common Software Measurement International Consortium (COSMIC) publication.
△ Less
Submitted 24 January, 2013;
originally announced January 2013.
-
The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem
Authors:
Muhammad Rezal Kamel Ariffin,
Arif Mandangan,
Aniza Abdul Ghani,
Kamel Ariffin Mohd Atan,
Nor Azman Abu
Abstract:
The El-Gamal AA_β Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_β-function. The AA_β-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It w…
▽ More
The El-Gamal AA_β Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_β-function. The AA_β-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_β Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.
△ Less
Submitted 14 February, 2011; v1 submitted 27 December, 2010;
originally announced December 2010.
-
Hardware/Software Co-Design for Spike Based Recognition
Authors:
Arfan Ghani,
Martin McGinnity,
Liam Maguire,
Jim Harkin
Abstract:
The practical applications based on recurrent spiking neurons are limited due to their non-trivial learning algorithms. The temporal nature of spiking neurons is more favorable for hardware implementation where signals can be represented in binary form and communication can be done through the use of spikes. This work investigates the potential of recurrent spiking neurons implementations on rec…
▽ More
The practical applications based on recurrent spiking neurons are limited due to their non-trivial learning algorithms. The temporal nature of spiking neurons is more favorable for hardware implementation where signals can be represented in binary form and communication can be done through the use of spikes. This work investigates the potential of recurrent spiking neurons implementations on reconfigurable platforms and their applicability in temporal based applications. A theoretical framework of reservoir computing is investigated for hardware/software implementation. In this framework, only readout neurons are trained which overcomes the burden of training at the network level. These recurrent neural networks are termed as microcircuits which are viewed as basic computational units in cortical computation. This paper investigates the potential of recurrent neural reservoirs and presents a novel hardware/software strategy for their implementation on FPGAs. The design is implemented and the functionality is tested in the context of speech recognition application.
△ Less
Submitted 14 July, 2008;
originally announced July 2008.