Skip to main content

Showing 51–100 of 165 results for author: Ismail, M

.
  1. arXiv:2104.11846  [pdf, other

    cs.LG cs.AI cs.CR eess.SY

    Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks

    Authors: Osman Boyaci, Mohammad Rasoul Narimani, Katherine Davis, Muhammad Ismail, Thomas J Overbye, Erchin Serpedin

    Abstract: False data injection attacks (FDIA) are a main category of cyber-attacks threatening the security of power systems. Contrary to the detection of these attacks, less attention has been paid to identifying the attacked units of the grid. To this end, this work jointly studies detecting and localizing the stealth FDIA in power grids. Exploiting the inherent graph topology of power systems as well as… ▽ More

    Submitted 9 October, 2021; v1 submitted 23 April, 2021; originally announced April 2021.

    Comments: 13 pages

  2. arXiv:2104.02012  [pdf, other

    eess.SP cs.AI cs.LG eess.SY

    Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids

    Authors: Osman Boyaci, Amarachi Umunnakwe, Abhijeet Sahu, Mohammad Rasoul Narimani, Muhammad Ismail, Katherine Davis, Erchin Serpedin

    Abstract: False data injection attacks (FDIAs) represent a major class of attacks that aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids. To the best of authors' knowledge, no study has attempted to design a detector that automatically models the underlying graph topology and spatially correlated measurement data of the smart grids to better de… ▽ More

    Submitted 10 October, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: 12 pages, 10 figures, journal

  3. arXiv:2103.07423  [pdf, other

    eess.IV cs.CV cs.LG

    Radiomic Deformation and Textural Heterogeneity (R-DepTH) Descriptor to characterize Tumor Field Effect: Application to Survival Prediction in Glioblastoma

    Authors: Marwa Ismail, Prateek Prasanna, Kaustav Bera, Volodymyr Statsevych, Virginia Hill, Gagandeep Singh, Sasan Partovi, Niha Beig, Sean McGarry, Peter Laviolette, Manmeet Ahluwalia, Anant Madabhushi, Pallavi Tiwari

    Abstract: The concept of tumor field effect implies that cancer is a systemic disease with its impact way beyond the visible tumor confines. For instance, in Glioblastoma (GBM), an aggressive brain tumor, the increase in intracranial pressure due to tumor burden often leads to brain herniation and poor outcomes. Our work is based on the rationale that highly aggressive tumors tend to grow uncontrollably, le… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

  4. arXiv:2103.06928  [pdf, ps, other

    econ.TH

    Conditional strategy equilibrium

    Authors: Lorenzo Bastianello, Mehmet S. Ismail

    Abstract: In this note, we prove the existence of an equilibrium concept, dubbed conditional strategy equilibrium, for non-cooperative games in which a strategy of a player is a function from the other players' actions to her own actions. We study the properties of efficiency and coalition-proofness of the conditional strategy equilibrium in $n$-person games.

    Submitted 5 May, 2022; v1 submitted 11 March, 2021; originally announced March 2021.

  5. arXiv:2101.10723  [pdf, ps, other

    econ.TH cs.MA

    No-harm principle, rationality, and Pareto optimality in games

    Authors: Shaun Hargreaves Heap, Mehmet S. Ismail

    Abstract: Mill's classic argument for liberty requires that people's exercise of freedom should be governed by a no-harm principle (NHP). In this paper, we develop the concept of a no-harm equilibrium in $n$-person games where players maximize utility subject to the constraint of the NHP. Our main result is in the spirit of the fundamental theorems of welfare economics. We show that for every initial `refer… ▽ More

    Submitted 2 November, 2022; v1 submitted 26 January, 2021; originally announced January 2021.

    MSC Class: 91A18; 91A10

  6. arXiv:2101.01736  [pdf, other

    gr-qc hep-th

    Late time tails and nonlinear memories in asymptotically de Sitter spacetimes

    Authors: Yi-Zen Chu, M. Afif Ismail, Yen-Wei Liu

    Abstract: We study the propagation of a massless scalar wave in de Sitter spacetime perturbed by an arbitrary central mass. By focusing on the late time limit, this probes the portion of the scalar signal traveling inside the null cone. Unlike in asymptotically flat spacetimes, the amplitude of the scalar field detected by an observer at timelike infinity does not decay back to zero but develops a spacetime… ▽ More

    Submitted 7 May, 2021; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: 37 pages, 4 figures

  7. arXiv:2012.07549  [pdf, ps, other

    math.CA

    q-Fractional Askey-Wilson Integrals and Related Semigroups of Operators

    Authors: Mourad E. H. Ismail, Ruiming Zhang, Keru Zhou

    Abstract: We introduce three one-parameter semigroups of operators and determine their spectra. Two of them are fractional integrals associated with the Askey-Wilson operator. We also study these families as families of positive linear approximation operators. Applications include connection relations and bilinear formulas for the Askey-Wilson polynomials. We also introduce a q-Gauss-Weierstrass transform a… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 31 pages

    MSC Class: 33D45; 33C45; 47D03; 26A33; 41A36

  8. arXiv:2012.06086  [pdf, ps, other

    cs.SE

    WITCHER : Detecting Crash Consistency Bugs in Non-volatile Memory Programs

    Authors: Xinwei Fu, Wook-Hee Kim, Ajay Paddayuru Shreepathi, Mohannad Ismail, Sunny Wadkar, Changwoo Min, Dongyoon Lee

    Abstract: The advent of non-volatile main memory (NVM) enables the development of crash-consistent software without paying storage stack overhead. However, building a correct crash-consistent program remains very challenging in the presence of a volatile cache. This paper presents WITCHER, a crash consistency bug detector for NVM software, that is (1) scalable -- does not suffer from test space explosion, (… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

  9. Diffusion-redistanciation schemes for 2D and 3D constrained Willmore flow: application to the equilibrium shapes of vesicles

    Authors: Thibaut Metivet, Arnaud Sengers, Mourad Ismaïl, Emmanuel Maitre

    Abstract: In this paper we present a novel algorithm for simulating geometrical flows, and in particular the Willmore flow, with conservation of volume and area. The idea is to adapt the class of diffusion-redistanciation algorithms to the Willmore flow in both two and three dimensions. These algorithms rely on alternating diffusions of the signed distance function to the interface and a redistanciation ste… ▽ More

    Submitted 27 August, 2021; v1 submitted 6 November, 2020; originally announced November 2020.

  10. Interpreting glottal flow dynamics for detecting COVID-19 from voice

    Authors: Soham Deshmukh, Mahmoud Al Ismail, Rita Singh

    Abstract: In the pathogenesis of COVID-19, impairment of respiratory functions is often one of the key symptoms. Studies show that in these cases, voice production is also adversely affected -- vocal fold oscillations are asynchronous, asymmetrical and more restricted during phonation. This paper proposes a method that analyzes the differential dynamics of the glottal flow waveform (GFW) during voice produc… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

  11. arXiv:2010.10707  [pdf, other

    eess.AS cs.LG cs.SD

    Detection of COVID-19 through the analysis of vocal fold oscillations

    Authors: Mahmoud Al Ismail, Soham Deshmukh, Rita Singh

    Abstract: Phonation, or the vibration of the vocal folds, is the primary source of vocalization in the production of voiced sounds by humans. It is a complex bio-mechanical process that is highly sensitive to changes in the speaker's respiratory parameters. Since most symptomatic cases of COVID-19 present with moderate to severe impairment of respiratory functions, we hypothesize that signatures of COVID-19… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: 5 pages, 6 figures

  12. arXiv:2010.05087  [pdf, ps, other

    econ.TH

    Proportional resource allocation in dynamic n-player Blotto games

    Authors: Nejat Anbarcı, Kutay Cingiz, Mehmet S. Ismail

    Abstract: A variety of social, economic, and political interactions have long been modelled after Blotto games. In this paper, we introduce a general model of dynamic $n$-player Blotto contests. The players have asymmetric resources, and the battlefield prizes are not necessarily homogeneous. Each player's probability of winning the prize in a battlefield is governed by a contest success function and player… ▽ More

    Submitted 26 July, 2022; v1 submitted 10 October, 2020; originally announced October 2020.

  13. arXiv:2010.01154  [pdf, other

    physics.flu-dyn

    Drop spreading dynamics with a liquid needle drop deposition technique

    Authors: Abrar Ahmed, Anuvrat Mishra, MD Farhad Ismail, Aleksey Baldygin, Thomas Willers, Prashant R. Waghmare

    Abstract: This paper represents a theoretical and an experimental study of the spreading dynamics of a liquid droplet, generated by a needle free deposition system called the liquid needle droplet deposition technique. This technique utilizes a continuous liquid jet generated from a pressurized dosing system which generates a liquid drop on a substrate to be characterized by optical contact angle measuremen… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

  14. arXiv:2007.15783  [pdf, ps, other

    physics.atom-ph

    Suppression of Three-Body Loss Near a p-Wave Resonance Due to Quasi-1D Confinement

    Authors: Andrew S. Marcum, Francisco R. Fonta, Arif Mawardi Ismail, Kenneth M. O'Hara

    Abstract: We investigate the three-body recombination rate of a Fermi gas of $^6$Li atoms confined in quasi-1D near a $p$-wave Feshbach resonance. We confirm that the quasi-1D loss rate constant $K_3$ follows the predicted threshold scaling law that $K_3$ is energy independent on resonance, and find consistency with the scaling law $K_3 \propto (k \, a_{1D})^6$ far from resonance [Mehta et al. Phys. Rev. A… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 6 pages, 5 figures

  15. arXiv:2006.09878  [pdf, other

    q-bio.QM cs.LG eess.IV

    Spatial-And-Context aware (SpACe) "virtual biopsy" radiogenomic maps to target tumor mutational status on structural MRI

    Authors: Marwa Ismail, Ramon Correa, Kaustav Bera, Ruchika Verma, Anas Saeed Bamashmos, Niha Beig, Jacob Antunes, Prateek Prasanna, Volodymyr Statsevych, Manmeet Ahluwalia, Pallavi Tiwari

    Abstract: With growing emphasis on personalized cancer-therapies,radiogenomics has shown promise in identifying target tumor mutational status on routine imaging (i.e. MRI) scans. These approaches fall into 2 categories: (1) deep-learning/radiomics (context-based), using image features from the entire tumor to identify the gene mutation status, or (2) atlas (spatial)-based to obtain likelihood of gene mutat… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  16. arXiv:2006.09483  [pdf

    q-bio.QM cs.LG eess.IV

    Can tumor location on pre-treatment MRI predict likelihood of pseudo-progression versus tumor recurrence in Glioblastoma? A feasibility study

    Authors: Marwa Ismail, Virginia Hill, Volodymyr Statsevych, Evan Mason, Ramon Correa, Prateek Prasanna, Gagandeep Singh, Kaustav Bera, Rajat Thawani, Anant Madabhushi, Manmeet Ahluwalia, Pallavi Tiwari

    Abstract: A significant challenge in Glioblastoma (GBM) management is identifying pseudo-progression (PsP), a benign radiation-induced effect, from tumor recurrence, on routine imaging following conventional treatment. Previous studies have linked tumor lobar presence and laterality to GBM outcomes, suggesting that disease etiology and progression in GBM may be impacted by tumor location. Hence, in this fea… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  17. arXiv:2005.14026  [pdf

    cs.AI

    An Exploratory Study of Hierarchical Fuzzy Systems Approach in Recommendation System

    Authors: Tajul Rosli Razak, Iman Hazwam Abd Halim, Muhammad Nabil Fikri Jamaludin, Mohammad Hafiz Ismail, Shukor Sanim Mohd Fauzi

    Abstract: Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in develo** a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. Howe… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Journal ref: Jurnal Intelek Vol 14 No 2 December 2019

  18. The Asymptotic Iteration Method Revisited

    Authors: Mourad E. H. Ismail, Nasser Saad

    Abstract: The Asymptotic Iteration Method (AIM) is a technique for solving analytically and approximately the linear second-order differential equation, especially the eigenvalue problems that frequently appear in theoretical and mathematical physics. The analysis and mathematical justifications of the success and failure of the asymptotic iteration method are detailed in this work. A theorem explaining why… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

    Comments: 11 pages

    MSC Class: 34A05; 34C20; 81Q05; 65L15; 65L07

    Journal ref: Journal of Mathematical Physics 61, 033501 (2020)

  19. arXiv:2003.06726  [pdf, ps, other

    math.CA

    A discrete and $q$ Asymptotic Iteration Method

    Authors: Mourad E. H. Ismail, Nasser Saad

    Abstract: We introduce a finite difference and $q$-difference analogues of the Asymptotic Iteration Method of Ciftci, Hall, and Saad. We give necessary, and sufficient condition for the existence of a polynomial solution to a general linear second-order difference or $q$-difference equation subject to a "terminating condition", which is precisely defined. When a difference or $q$-difference equation has a p… ▽ More

    Submitted 10 July, 2020; v1 submitted 14 March, 2020; originally announced March 2020.

    Comments: 17 pages

    MSC Class: Primary 39A10; 29A13; Secondary 33D99

    Journal ref: Journal of Difference Equations and Applications, 2020

  20. arXiv:2003.04537  [pdf

    q-bio.MN

    Metastatic melanoma-A review of current and future perspective

    Authors: Qurat-ul-Ain, Muhammad Ismail

    Abstract: Metastatic Melanoma, the fifth most common cancer in the western countries and the most common malignancy diagnosed in United States present itself as the most lethal treatment resistant cancer worldwide. In addition to the reactive oxygen species(ROS), mutations in the genes encoding receptors and non-receptor tyrosine/serene/threonine protein kinases are known to be involved in its etiology. Kin… ▽ More

    Submitted 20 April, 2020; v1 submitted 6 March, 2020; originally announced March 2020.

    Comments: 12 pages, 1 figure

  21. arXiv:2001.06306  [pdf

    nucl-th

    Systematic behavior of the fusion barrier parameters for heavy ion pairs [MSc Thesis]

    Authors: M. Ismail, A. Y. Ellithi, A. Adel, A. R. Abdulghany

    Abstract: The nucleus-nucleus potential is calculated in the frame work of the double folding model (DFM) to obtain the Coulomb barrier parameters (barrier position and height), starting from M3Y-Reid nucleon-nucleon interaction and realistic nuclear matter distribution. The systematic behavior of the barrier parameters with mass numbers, charges, and radii of interacting nuclei is studied. The relation bet… ▽ More

    Submitted 20 January, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

    Comments: Archived at the Central Library of Cairo University. Archiving information can be accessed via this link: http://lis.cl.cu.edu.eg/record=b1122408

  22. arXiv:1912.07802  [pdf

    eess.SP

    Leakage Localisation Using Cross Correlation for Wireless Three-Axis Vibration Sensors

    Authors: Airull Azizi Awang Lah, Rudzidatul Akmam Dzyauddin, Nelidya Md Yusoff, Mohd Ismifaizul Mohd Ismail, Noor Azurati Ahmad Salleh, Robiah Ahmad

    Abstract: The objective of this paper is to investigate the application of the cross-correlation technique in localizing the leakage in Acrylonitrile Butadiene Styrene (ABS) pipeline using wireless three-axis vibration sensors. Most of the existing leak localization techniques that utilized the cross-correlation method is using acoustic and pressure sensors. This study explored the impact of using three-axi… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

  23. arXiv:1912.07801  [pdf

    eess.SP cs.NI

    An RSSI-based Wireless Sensor Node Localisation using Trilateration and Multilateration Methods for Outdoor Environment

    Authors: Mohd Ismifaizul Mohd Ismail, Rudzidatul Akmam Dzyauddin, Shafiqa Samsul, Nur Aisyah Azmi, Yoshihide Yamada, Mohd Fitri Mohd Yakub, Noor Azurati Binti Ahmad Salleh

    Abstract: Localisation can be defined as estimating or finding a position of the node. There are two techniques in localisation, which are range-based and range-free techniques. This paper focusses on the Received Signal Strength Indicator (RSSI) localisation method, which is categorised in a range-based technique along with the time of arrival, time difference of arrival and angle of arrival. Therefore, th… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

  24. arXiv:1912.00211  [pdf, other

    econ.TH

    Super-Nash performance in games

    Authors: Mehmet S. Ismail

    Abstract: Since the 1990s, artificial intelligence (AI) systems have achieved 'superhuman performance' in major zero-sum games, where winning has an unambiguous definition. However, most economic and social interactions are non-zero-sum, where measuring 'performance' is a non-trivial task. In this paper, I introduce a novel benchmark, super-Nash performance, and a solution concept, optimin, whereby every pl… ▽ More

    Submitted 6 September, 2023; v1 submitted 30 November, 2019; originally announced December 2019.

  25. arXiv:1911.07633  [pdf

    cs.CY cs.NI

    Reducing Honeypot Log Storage Capacity Consumption -- Cron Job with Perl-Script Approach

    Authors: Iman Hazwam Abd Halim, Nur Muhammad Irfan Abu Hassan, Tajul Rosli Razak, Muhammad Nabil Fikri Jamaluddin, Mohammad Hafiz Ismail

    Abstract: Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty w… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

    Journal ref: Journal of Computing Research & Innovation (JCRINN) Vol 4, No 1 (2019)

  26. arXiv:1908.03475  [pdf

    cs.IR

    A Simple Recommender Engine for Matching Final-Year Project Student with Supervisor

    Authors: Mohammad Hafiz Ismail, Tajul Rosli Razak, Muhamad Arif Hashim, Alif Faisal Ibrahim

    Abstract: This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender en… ▽ More

    Submitted 8 August, 2019; originally announced August 2019.

    Journal ref: Colloquium in Computer & Mathematical Sciences Education (2015)

  27. arXiv:1908.03333  [pdf, ps, other

    math.CA

    On Entry II.16.12: A continued fraction of Ramanujan

    Authors: Gaurav Bhatnagar, Mourad E. H. Ismail

    Abstract: We study a continued fraction due to Ramanujan, that he recorded as Entry 12 in Chapter 16 of his second notebook. It is presented in Part III of Berndt's volumes on Ramanujan's notebooks. We give two alternate approaches to proving Ramanujan's Entry 12, one using a method of Euler, and another using the theory of orthogonal polynomials. We consider a natural generalization of Entry 12 suggested… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: 15 Pages

    MSC Class: 33D45 (Primary); 30B70 (Secondary)

  28. arXiv:1906.12143  [pdf, other

    cs.NI

    A DTLS Abstraction Layer for the Recursive Networking Architecture in RIOT

    Authors: M. Aiman Ismail, Thomas C. Schmidt

    Abstract: On the Internet of Things (IoT), devices continuously communicate with each other, with a gateway, or other Internet nodes. Often devices are constrained and use insecure channels for their communication, which exposes them to a selection of attacks that may extract sensitive pieces of information or manipulate dialogues for the purpose of sabotaging. This paper presents a new layer in the RIOT… ▽ More

    Submitted 28 June, 2019; originally announced June 2019.

  29. arXiv:1901.10383  [pdf

    stat.AP physics.ao-ph

    A New Weighting Scheme in Weighted Markov Model for Predicting the Probability of Drought Episodes

    Authors: Zulfiqar Ali, Ijaz Hussain, Muhammad Faisal, Ibrahim M. Almanjahie, Muhammad Ismail, Maqsood Ahmad, Ishfaq Ahmad

    Abstract: Drought is a complex stochastic natural hazard caused by prolonged shortage of rainfall. Several environmental factors are involved in determining drought classes at the specific monitoring station. Therefore, efficient sequence processing techniques are required to explore and predict the periodic information about the various episodes of drought classes. In this study, we proposed a new weightin… ▽ More

    Submitted 18 January, 2019; originally announced January 2019.

    Journal ref: Advances in Meteorology,2018

  30. arXiv:1901.09985  [pdf, ps, other

    math.CA

    Orthogonal polynomials associated with a continued fraction of Hirschhorn

    Authors: Gaurav Bhatnagar, Mourad E. H. Ismail

    Abstract: We study orthogonal polynomials associated with a continued fraction due to Hirschhorn. Hirschhorn's continued fraction contains as special cases the famous Rogers--Ramanujan continued fraction and two of Ramanujan's generalizations. The orthogonality measure of the set of polynomials obtained has an absolutely continuous component. We find generating functions, asymptotic formulas, orthogonality… ▽ More

    Submitted 18 February, 2022; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: 22 Pages. To appear in Ramanujan Journal. Final version after incorporating referees comments for second time

    MSC Class: Primary 33D45; Secondary 30B70

  31. arXiv:1811.07219  [pdf, ps, other

    math.CA math-ph

    Matrix valued Hermite polynomials, Burchnall formulas and non-abelian Toda lattice

    Authors: Mourad E. H. Ismail, Erik Koelink, Pablo Román

    Abstract: A general family of matrix valued Hermite type orthogonal polynomials is introduced and studied in detail by deriving Pearson equations for the weight and matrix valued differential equations for these matrix polynomials. This is used to derive Rodrigues formulas, explicit formulas for the squared norm and to give an explicit expression of the matrix entries as well to derive a connection formula… ▽ More

    Submitted 17 November, 2018; originally announced November 2018.

    Comments: 28 pages

    Journal ref: Advances in Applied Mathematics 110 (2019), 235-269

  32. arXiv:1811.02001  [pdf, other

    cs.CR

    Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units

    Authors: Mohamed Baza, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, Mohammad Rahman

    Abstract: Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordina… ▽ More

    Submitted 2 April, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

  33. arXiv:1809.01774  [pdf, other

    cs.LG cs.CR stat.ML

    Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters

    Authors: Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, Erchin Serpedin

    Abstract: Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity thef… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

  34. arXiv:1808.06922  [pdf, ps, other

    math.HO econ.TH

    Catch-Up: A Rule that Makes Service Sports More Competitive

    Authors: Steven J. Brams, Mehmet S. Ismail, D. Marc Kilgour, Walter Stromquist

    Abstract: Service sports include two-player contests such as volleyball, badminton, and squash. We analyze four rules, including the Standard Rule (SR), in which a player continues to serve until he or she loses. The Catch-Up Rule (CR) gives the serve to the player who has lost the previous point - as opposed to the player who won the previous point, as under SR. We also consider two Trailing Rules that mak… ▽ More

    Submitted 17 August, 2018; originally announced August 2018.

    Comments: 31 pages. Forthcoming in The American Mathematical Monthly, 2018

    MSC Class: 60J20; 91A80; 91A20

  35. arXiv:1808.06750  [pdf, ps, other

    econ.TH cs.MA q-bio.PE

    The strategy of conflict and cooperation

    Authors: Mehmet S. Ismail

    Abstract: This paper introduces a unified framework called cooperative extensive form games, which (i) generalizes standard non-cooperative games, and (ii) allows for more complex coalition formation dynamics than previous concepts like coalition-proof Nash equilibrium. Central to this framework is a novel solution concept called cooperative equilibrium system (CES). CES differs from Nash equilibrium in two… ▽ More

    Submitted 25 September, 2023; v1 submitted 20 August, 2018; originally announced August 2018.

    Comments: 67 pages

    MSC Class: 91A18; 91A10; 91A12

  36. arXiv:1808.01193  [pdf, ps, other

    math-ph

    Asymptotics of partition functions in a fermionic matrix model and of related $q$-polynomials

    Authors: Dan Dai, Mourad E. H. Ismail, Xiang-Sheng Wang

    Abstract: In this paper, we study asymptotics of the thermal partition function of a model of quantum mechanical fermions with matrix-like index structure and quartic interactions. This partition function is given explicitly by a Wronskian of the Stieltjes-Wigert polynomials. Our asymptotic results involve the theta function and its derivatives. We also develop a new asymptotic method for general $q$-polyno… ▽ More

    Submitted 3 August, 2018; originally announced August 2018.

    Comments: 16 pages

    MSC Class: 33D90; 41A60

  37. arXiv:1807.04836  [pdf, other

    cs.CV

    Disjoint Map** Network for Cross-modal Matching of Voices and Faces

    Authors: Yandong Wen, Mahmoud Al Ismail, Weiyang Liu, Bhiksha Raj, Rita Singh

    Abstract: We propose a novel framework, called Disjoint Map** Network (DIMNet), for cross-modal biometric matching, in particular of voices and faces. Different from the existing methods, DIMNet does not explicitly learn the joint relationship between the modalities. Instead, DIMNet learns a shared representation for different modalities by map** them individually to their common covariates. These share… ▽ More

    Submitted 15 July, 2018; v1 submitted 12 July, 2018; originally announced July 2018.

    Comments: Tech report

  38. arXiv:1807.04834  [pdf, other

    cs.CV

    Optimal Strategies for Matching and Retrieval Problems by Comparing Covariates

    Authors: Yandong Wen, Mahmoud Al Ismail, Bhiksha Raj, Rita Singh

    Abstract: In many retrieval problems, where we must retrieve one or more entries from a gallery in response to a probe, it is common practice to learn to do by directly comparing the probe and gallery entries to one another. In many situations the gallery and probe have common covariates -- external variables that are common to both. In principle it is possible to perform the retrieval based merely on these… ▽ More

    Submitted 15 July, 2018; v1 submitted 12 July, 2018; originally announced July 2018.

    Comments: support material for "Disjoint Map** Network for Cross-modal Matching of Voices and Faces"

  39. arXiv:1805.06950  [pdf, ps, other

    q-bio.GN

    The sequencing and interpretation of the genome obtained from a Serbian individual

    Authors: Wazim Mohammed Ismail, Kymberleigh A. Pagel, Vikas Pejaver, Simo V. Zhang, Sofia Casasa, Matthew Mort, David N. Cooper, Matthew W. Hahn, Predrag Radivojac

    Abstract: Recent genetic studies and whole-genome sequencing projects have greatly improved our understanding of human variation and clinically actionable genetic information. Smaller ethnic populations, however, remain underrepresented in both individual and large-scale sequencing efforts and hence present an opportunity to discover new variants of biomedical and demographic significance. This report descr… ▽ More

    Submitted 17 May, 2018; originally announced May 2018.

    Comments: 18 pages, 2 figures

  40. Generalized Burchnall-Type Identities for Orthogonal Polynomials and Expansions

    Authors: Mourad E. H. Ismail, Erik Koelink, Pablo Román

    Abstract: Burchnall's method to invert the Feldheim-Watson linearization formula for the Hermite polynomials is extended to all polynomial families in the Askey-scheme and its $q$-analogue. The resulting expansion formulas are made explicit for several families corresponding to measures with infinite support, including the Wilson and Askey-Wilson polynomials. An integrated version gives the possibility to g… ▽ More

    Submitted 17 July, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Journal ref: SIGMA 14 (2018), 072, 24 pages

  41. arXiv:1705.06338  [pdf, other

    cs.IR cs.AI

    Distributed Vector Representation Of Shop** Items, The Customer And Shop** Cart To Build A Three Fold Recommendation System

    Authors: Bibek Behera, Manoj Joshi, Abhilash KK, Mohammad Ansari Ismail

    Abstract: The main idea of this paper is to represent shop** items through vectors because these vectors act as the base for building em- beddings for customers and shop** carts. Also, these vectors are input to the mathematical models that act as either a recommendation engine or help in targeting potential customers. We have used exponential family embeddings as the tool to construct two basic vectors… ▽ More

    Submitted 17 May, 2017; originally announced May 2017.

    Comments: Cicling 2017

  42. arXiv:1703.10719  [pdf, other

    cs.NI

    From D2D to Ds2D: Prolonging the Battery Life of Mobile Devices via Ds2D Communications

    Authors: Muhammad Z. Shakir, Muhammad Ismail, Xianbin Wang, Khalid A. Qaraqe, Erchin Serpedin

    Abstract: Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: Accepted for publication in IEEE Wireless Communications, Mar 21, 2017

  43. arXiv:1701.03352  [pdf

    cond-mat.mtrl-sci

    Graphene nanoplatelets induced tailoring in photocatalytic activity and antibacterial characteristics of MgO/graphene nanoplatelets nanocomposites

    Authors: Aqsa Arshad, Javed Iqbal, M. Siddiq, Qaisar Mansoor, M. Ismail, Faisal Mehmood, M. Ajmal, Zubia Abid

    Abstract: The synthesis, physical, photocatalytic, and antibacterial properties of MgO and graphene nanoplatelets (GNPs) nanocomposites are reported. The crystallinity, phase, morphology, chemical bonding, and vibrational modes of prepared nanomaterials are studied. The conductive nature of GNPs is tailored via photocatalysis and enhanced antibacterial activity. It is interestingly observed that the MgO/GNP… ▽ More

    Submitted 12 January, 2017; originally announced January 2017.

    Comments: 10 pages, 12 figures

    Journal ref: Journal of Applied Physics, 2017, 121(2)

  44. arXiv:1610.03639  [pdf, other

    physics.optics physics.class-ph

    Electromagnetic wave propagation through a slab of a dispersive medium

    Authors: Mohamed Ismail, Boris Gralak

    Abstract: A method is proposed for the analysis of the propagation of electromagnetic waves through a homogeneous slab of a medium with Drude-Lorentz dispersion behavior, and excited by a causal sinusoidal source. An expression of the time dependent field, free from branch-cuts in the plane of complex frequencies, is established. This method provides the complete temporal response in both the steady-state a… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Comments: 13 pages, 18 figures

  45. arXiv:1606.08055  [pdf, ps, other

    math.CA

    $R_{II}$ type recurrence, generalized eigenvalue problem and orthogonal polynomials on the unit circle

    Authors: Mourad E. H. Ismail, Alagacone Sri Ranga

    Abstract: We consider a sequence of polynomials $\{P_n\}_{n \geq 0}$ satisfying a special $R_{II}$ type recurrence relation where the zeros of $P_n$ are simple and lie on the real line. It turns out that the polynomial $P_n$, for any $n \geq 2$, is the characteristic polynomial of a simple $n \times n$ generalized eigenvalue problem. It is shown that with this $R_{II}$ type recurrence relation one can alway… ▽ More

    Submitted 15 March, 2017; v1 submitted 26 June, 2016; originally announced June 2016.

    MSC Class: 15A18; 42C05

  46. arXiv:1606.01588  [pdf, other

    cs.DC

    HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases

    Authors: Salman Niazi, Mahmoud Ismail, Steffen Grohsschmiedt, Mikael Ronström, Seif Haridi, Jim Dowling

    Abstract: Recent improvements in both the performance and scalability of shared-nothing, transactional, in-memory NewSQL databases have reopened the research question of whether distributed metadata for hierarchical file systems can be managed using commodity databases. In this paper, we introduce HopsFS, a next generation distribution of the Hadoop Distributed File System (HDFS) that replaces HDFS' single… ▽ More

    Submitted 22 February, 2017; v1 submitted 5 June, 2016; originally announced June 2016.

    Journal ref: The 15th USENIX Conference on File and Storage Technologies (FAST 17) (2017) 89-104

  47. arXiv:1605.02728  [pdf, ps, other

    math.CA

    Integrals and Series Representations of $q$-Polynomials and Functions: Part II Schur Polynomials and the Rogers-Ramanujan Identities

    Authors: Mourad E. H. Ismail, Ruiming Zhang

    Abstract: We give several expansion and identities involving the Ramanujan function $A_q$ and the Stieltjes--Wigert polynomials. Special values of our idenitities give $m$-versions of some of the items on the Slater list of Rogers-Ramanujan type identities. We also study some bilateral extensions of certain transformations in the theory of basic hypergeometric functions.

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 15 pages

  48. arXiv:1605.00393  [pdf, ps, other

    math.SP

    Spectral analysis of two doubly infinite Jacobi matrices with exponential entries

    Authors: Mourad E. H. Ismail, František Štampach

    Abstract: We provide a complete spectral analysis of all self-adjoint operators acting on $\ell^{2}(\mathbb{Z})$ which are associated with two doubly infinite Jacobi matrices with entries given by $$ q^{-n+1}δ_{m,n-1}+q^{-n}δ_{m,n+1} $$ and $$ δ_{m,n-1}+αq^{-n}δ_{m,n}+δ_{m,n+1}, $$ respectively, where $q\in(0,1)$ and $α\in\mathbb{R}$. As an application, we derive orthogonality relations for the Ramanujan en… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 22 pages, preprint

    MSC Class: 47B36; 33D90

  49. arXiv:1604.08441  [pdf, ps, other

    math.CA

    Integral and Series Representations of $q$-Polynomials and Functions: Part I

    Authors: Mourad E. H. Ismail, Ruiming Zhang

    Abstract: By applying an integral representation for $q^{k^{2}}$ we systematically derive a large number of new Fourier and Mellin transform pairs and establish new integral representations for a variety of $q$-functions and polynomials that naturally arise from combinatorics, analysis, and orthogonal polynomials corresponding to indeterminate moment problems. These functions include $q$-Bessel functions, t… ▽ More

    Submitted 9 May, 2016; v1 submitted 27 April, 2016; originally announced April 2016.

    Comments: 61 pages

    MSC Class: 33D15; 33D45; 33D60; 44A20; 42A38

  50. Optimum orientation versus orientation averaging description of cluster radioactivity

    Authors: W. M. Seif, M. Ismail, A. I. Refaie, L. H. Amer

    Abstract: Background: The deformation of the nuclei involved in the cluster decay of heavy nuclei affect seriously their half-lives against the decay. Purpose: We investigate the description of the different decay stages in both the optimum orientation and the orientation-averaged pictures of the cluster decay process. Method: We consider the decays of 232,233,234U and 236,238Pu isotopes. The quantum mechan… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.