-
Joint Detection and Localization of Stealth False Data Injection Attacks in Smart Grids using Graph Neural Networks
Authors:
Osman Boyaci,
Mohammad Rasoul Narimani,
Katherine Davis,
Muhammad Ismail,
Thomas J Overbye,
Erchin Serpedin
Abstract:
False data injection attacks (FDIA) are a main category of cyber-attacks threatening the security of power systems. Contrary to the detection of these attacks, less attention has been paid to identifying the attacked units of the grid. To this end, this work jointly studies detecting and localizing the stealth FDIA in power grids. Exploiting the inherent graph topology of power systems as well as…
▽ More
False data injection attacks (FDIA) are a main category of cyber-attacks threatening the security of power systems. Contrary to the detection of these attacks, less attention has been paid to identifying the attacked units of the grid. To this end, this work jointly studies detecting and localizing the stealth FDIA in power grids. Exploiting the inherent graph topology of power systems as well as the spatial correlations of measurement data, this paper proposes an approach based on the graph neural network (GNN) to identify the presence and location of the FDIA. The proposed approach leverages the auto-regressive moving average (ARMA) type graph filters (GFs) which can better adapt to sharp changes in the spectral domain due to their rational type filter composition compared to the polynomial type GFs such as Chebyshev. To the best of our knowledge, this is the first work based on GNN that automatically detects and localizes FDIA in power systems. Extensive simulations and visualizations show that the proposed approach outperforms the available methods in both detection and localization of FDIA for different IEEE test systems. Thus, the targeted areas can be identified and preventive actions can be taken before the attack impacts the grid.
△ Less
Submitted 9 October, 2021; v1 submitted 23 April, 2021;
originally announced April 2021.
-
Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids
Authors:
Osman Boyaci,
Amarachi Umunnakwe,
Abhijeet Sahu,
Mohammad Rasoul Narimani,
Muhammad Ismail,
Katherine Davis,
Erchin Serpedin
Abstract:
False data injection attacks (FDIAs) represent a major class of attacks that aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids. To the best of authors' knowledge, no study has attempted to design a detector that automatically models the underlying graph topology and spatially correlated measurement data of the smart grids to better de…
▽ More
False data injection attacks (FDIAs) represent a major class of attacks that aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids. To the best of authors' knowledge, no study has attempted to design a detector that automatically models the underlying graph topology and spatially correlated measurement data of the smart grids to better detect cyber attacks. The contributions of this paper to detect and mitigate FDIAs are twofold. First, we present a generic, localized, and stealth (unobservable) attack generation methodology and publicly accessible datasets for researchers to develop and test their algorithms. Second, we propose a Graph Neural Network (GNN) based, scalable and real-time detector of FDIAs that efficiently combines model-driven and data-driven approaches by incorporating the inherent physical connections of modern AC power grids and exploiting the spatial correlations of the measurement. It is experimentally verified by comparing the proposed GNN based detector with the currently available FDIA detectors in the literature that our algorithm outperforms the best available solutions by 3.14%, 4.25%, and 4.41% in F1 score for standard IEEE testbeds with 14, 118, and 300 buses, respectively.
△ Less
Submitted 10 October, 2021; v1 submitted 5 April, 2021;
originally announced April 2021.
-
Radiomic Deformation and Textural Heterogeneity (R-DepTH) Descriptor to characterize Tumor Field Effect: Application to Survival Prediction in Glioblastoma
Authors:
Marwa Ismail,
Prateek Prasanna,
Kaustav Bera,
Volodymyr Statsevych,
Virginia Hill,
Gagandeep Singh,
Sasan Partovi,
Niha Beig,
Sean McGarry,
Peter Laviolette,
Manmeet Ahluwalia,
Anant Madabhushi,
Pallavi Tiwari
Abstract:
The concept of tumor field effect implies that cancer is a systemic disease with its impact way beyond the visible tumor confines. For instance, in Glioblastoma (GBM), an aggressive brain tumor, the increase in intracranial pressure due to tumor burden often leads to brain herniation and poor outcomes. Our work is based on the rationale that highly aggressive tumors tend to grow uncontrollably, le…
▽ More
The concept of tumor field effect implies that cancer is a systemic disease with its impact way beyond the visible tumor confines. For instance, in Glioblastoma (GBM), an aggressive brain tumor, the increase in intracranial pressure due to tumor burden often leads to brain herniation and poor outcomes. Our work is based on the rationale that highly aggressive tumors tend to grow uncontrollably, leading to pronounced biomechanical tissue deformations in the normal parenchyma, which when combined with local morphological differences in the tumor confines on MRI scans, will comprehensively capture tumor field effect. Specifically, we present an integrated MRI-based descriptor, radiomic-Deformation and Textural Heterogeneity (r-DepTH). This descriptor comprises measurements of the subtle perturbations in tissue deformations throughout the surrounding normal parenchyma due to mass effect. This involves non-rigidly aligning the patients MRI scans to a healthy atlas via diffeomorphic registration. The resulting inverse map** is used to obtain the deformation field magnitudes in the normal parenchyma. These measurements are then combined with a 3D texture descriptor, Co-occurrence of Local Anisotropic Gradient Orientations (COLLAGE), which captures the morphological heterogeneity within the tumor confines, on MRI scans. R-DepTH, on N = 207 GBM cases (training set (St) = 128, testing set (Sv) = 79), demonstrated improved prognosis of overall survival by categorizing patients into low- (prolonged survival) and high-risk (poor survival) groups (on St, p-value = 0.0000035, and on Sv, p-value = 0.0024). R-DepTH descriptor may serve as a comprehensive MRI-based prognostic marker of disease aggressiveness and survival in solid tumors.
△ Less
Submitted 12 March, 2021;
originally announced March 2021.
-
Conditional strategy equilibrium
Authors:
Lorenzo Bastianello,
Mehmet S. Ismail
Abstract:
In this note, we prove the existence of an equilibrium concept, dubbed conditional strategy equilibrium, for non-cooperative games in which a strategy of a player is a function from the other players' actions to her own actions. We study the properties of efficiency and coalition-proofness of the conditional strategy equilibrium in $n$-person games.
In this note, we prove the existence of an equilibrium concept, dubbed conditional strategy equilibrium, for non-cooperative games in which a strategy of a player is a function from the other players' actions to her own actions. We study the properties of efficiency and coalition-proofness of the conditional strategy equilibrium in $n$-person games.
△ Less
Submitted 5 May, 2022; v1 submitted 11 March, 2021;
originally announced March 2021.
-
No-harm principle, rationality, and Pareto optimality in games
Authors:
Shaun Hargreaves Heap,
Mehmet S. Ismail
Abstract:
Mill's classic argument for liberty requires that people's exercise of freedom should be governed by a no-harm principle (NHP). In this paper, we develop the concept of a no-harm equilibrium in $n$-person games where players maximize utility subject to the constraint of the NHP. Our main result is in the spirit of the fundamental theorems of welfare economics. We show that for every initial `refer…
▽ More
Mill's classic argument for liberty requires that people's exercise of freedom should be governed by a no-harm principle (NHP). In this paper, we develop the concept of a no-harm equilibrium in $n$-person games where players maximize utility subject to the constraint of the NHP. Our main result is in the spirit of the fundamental theorems of welfare economics. We show that for every initial `reference point' in a game the associated no-harm equilibrium is Pareto efficient and, conversely, every Pareto efficient point can be supported as a no-harm equilibrium for some initial reference point.
△ Less
Submitted 2 November, 2022; v1 submitted 26 January, 2021;
originally announced January 2021.
-
Late time tails and nonlinear memories in asymptotically de Sitter spacetimes
Authors:
Yi-Zen Chu,
M. Afif Ismail,
Yen-Wei Liu
Abstract:
We study the propagation of a massless scalar wave in de Sitter spacetime perturbed by an arbitrary central mass. By focusing on the late time limit, this probes the portion of the scalar signal traveling inside the null cone. Unlike in asymptotically flat spacetimes, the amplitude of the scalar field detected by an observer at timelike infinity does not decay back to zero but develops a spacetime…
▽ More
We study the propagation of a massless scalar wave in de Sitter spacetime perturbed by an arbitrary central mass. By focusing on the late time limit, this probes the portion of the scalar signal traveling inside the null cone. Unlike in asymptotically flat spacetimes, the amplitude of the scalar field detected by an observer at timelike infinity does not decay back to zero but develops a spacetime constant shift - both at zeroth and first order in the central mass M. This indicates that massless scalar field propagation in asymptotically de Sitter spacetimes exhibits both linear and nonlinear tail-induced memories. On the other hand, for sufficiently late retarded times, the monopole portion of the scalar signal measured at null infinity is found to be amplified relative to its timelike infinity counterpart, by its nonlinear interactions with the gravitation field at first order in M.
△ Less
Submitted 7 May, 2021; v1 submitted 5 January, 2021;
originally announced January 2021.
-
q-Fractional Askey-Wilson Integrals and Related Semigroups of Operators
Authors:
Mourad E. H. Ismail,
Ruiming Zhang,
Keru Zhou
Abstract:
We introduce three one-parameter semigroups of operators and determine their spectra. Two of them are fractional integrals associated with the Askey-Wilson operator. We also study these families as families of positive linear approximation operators. Applications include connection relations and bilinear formulas for the Askey-Wilson polynomials. We also introduce a q-Gauss-Weierstrass transform a…
▽ More
We introduce three one-parameter semigroups of operators and determine their spectra. Two of them are fractional integrals associated with the Askey-Wilson operator. We also study these families as families of positive linear approximation operators. Applications include connection relations and bilinear formulas for the Askey-Wilson polynomials. We also introduce a q-Gauss-Weierstrass transform and prove a representation and inversion theorem for it.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
WITCHER : Detecting Crash Consistency Bugs in Non-volatile Memory Programs
Authors:
Xinwei Fu,
Wook-Hee Kim,
Ajay Paddayuru Shreepathi,
Mohannad Ismail,
Sunny Wadkar,
Changwoo Min,
Dongyoon Lee
Abstract:
The advent of non-volatile main memory (NVM) enables the development of crash-consistent software without paying storage stack overhead. However, building a correct crash-consistent program remains very challenging in the presence of a volatile cache. This paper presents WITCHER, a crash consistency bug detector for NVM software, that is (1) scalable -- does not suffer from test space explosion, (…
▽ More
The advent of non-volatile main memory (NVM) enables the development of crash-consistent software without paying storage stack overhead. However, building a correct crash-consistent program remains very challenging in the presence of a volatile cache. This paper presents WITCHER, a crash consistency bug detector for NVM software, that is (1) scalable -- does not suffer from test space explosion, (2) automatic -- does not require manual source code annotations, and (3) precise -- does not produce false positives. WITCHER first infers a set of "likely invariants" that are believed to be true to be crash consistent by analyzing source codes and NVM access traces. WITCHER automatically composes NVM images that simulate those potentially inconsistent (crashing) states violating the likely invariants. Then WITCHER performs "output equivalence checking" by comparing the output of program executions with and without a simulated crash. It validates if a likely invariant violation under test is a true crash consistency bug. Evaluation with ten persistent data structures, two real-world servers, and five example codes in Intel's PMDK library shows that WITCHER outperforms state-of-the-art tools. WITCHER discovers 37 (32 new) crash consistency bugs, which were all confirmed.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
Diffusion-redistanciation schemes for 2D and 3D constrained Willmore flow: application to the equilibrium shapes of vesicles
Authors:
Thibaut Metivet,
Arnaud Sengers,
Mourad Ismaïl,
Emmanuel Maitre
Abstract:
In this paper we present a novel algorithm for simulating geometrical flows, and in particular the Willmore flow, with conservation of volume and area. The idea is to adapt the class of diffusion-redistanciation algorithms to the Willmore flow in both two and three dimensions. These algorithms rely on alternating diffusions of the signed distance function to the interface and a redistanciation ste…
▽ More
In this paper we present a novel algorithm for simulating geometrical flows, and in particular the Willmore flow, with conservation of volume and area. The idea is to adapt the class of diffusion-redistanciation algorithms to the Willmore flow in both two and three dimensions. These algorithms rely on alternating diffusions of the signed distance function to the interface and a redistanciation step, and with careful choice of the applied diffusions, end up moving the zero level-set of the distance function by some geometrical quantity without resorting to any explicit transport equation. The constraints are enforced between the diffusion and redistanciation steps via a simple rescaling method. The energy globally decreases at the end of each global step. The algorithms feature the computational efficiency of thresholding methods without requiring any adaptive remeshing thanks to the use of a signed distance function to describe the interface. This opens their application to dynamic fluid-structure simulations for large and realistic cases. The methodology is validated by computing the equilibrium shapes of two- and three-dimensional vesicles, as well as the Clifford torus.
△ Less
Submitted 27 August, 2021; v1 submitted 6 November, 2020;
originally announced November 2020.
-
Interpreting glottal flow dynamics for detecting COVID-19 from voice
Authors:
Soham Deshmukh,
Mahmoud Al Ismail,
Rita Singh
Abstract:
In the pathogenesis of COVID-19, impairment of respiratory functions is often one of the key symptoms. Studies show that in these cases, voice production is also adversely affected -- vocal fold oscillations are asynchronous, asymmetrical and more restricted during phonation. This paper proposes a method that analyzes the differential dynamics of the glottal flow waveform (GFW) during voice produc…
▽ More
In the pathogenesis of COVID-19, impairment of respiratory functions is often one of the key symptoms. Studies show that in these cases, voice production is also adversely affected -- vocal fold oscillations are asynchronous, asymmetrical and more restricted during phonation. This paper proposes a method that analyzes the differential dynamics of the glottal flow waveform (GFW) during voice production to identify features in them that are most significant for the detection of COVID-19 from voice. Since it is hard to measure this directly in COVID-19 patients, we infer it from recorded speech signals and compare it to the GFW computed from physical model of phonation. For normal voices, the difference between the two should be minimal, since physical models are constructed to explain phonation under assumptions of normalcy. Greater differences implicate anomalies in the bio-physical factors that contribute to the correctness of the physical model, revealing their significance indirectly. Our proposed method uses a CNN-based 2-step attention model that locates anomalies in time-feature space in the difference of the two GFWs, allowing us to infer their potential as discriminative features for classification. The viability of this method is demonstrated using a clinically curated dataset of COVID-19 positive and negative subjects.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Detection of COVID-19 through the analysis of vocal fold oscillations
Authors:
Mahmoud Al Ismail,
Soham Deshmukh,
Rita Singh
Abstract:
Phonation, or the vibration of the vocal folds, is the primary source of vocalization in the production of voiced sounds by humans. It is a complex bio-mechanical process that is highly sensitive to changes in the speaker's respiratory parameters. Since most symptomatic cases of COVID-19 present with moderate to severe impairment of respiratory functions, we hypothesize that signatures of COVID-19…
▽ More
Phonation, or the vibration of the vocal folds, is the primary source of vocalization in the production of voiced sounds by humans. It is a complex bio-mechanical process that is highly sensitive to changes in the speaker's respiratory parameters. Since most symptomatic cases of COVID-19 present with moderate to severe impairment of respiratory functions, we hypothesize that signatures of COVID-19 may be observable by examining the vibrations of the vocal folds. Our goal is to validate this hypothesis, and to quantitatively characterize the changes observed to enable the detection of COVID-19 from voice. For this, we use a dynamical system model for the oscillation of the vocal folds, and solve it using our recently developed ADLES algorithm to yield vocal fold oscillation patterns directly from recorded speech. Experimental results on a clinically curated dataset of COVID-19 positive and negative subjects reveal characteristic patterns of vocal fold oscillations that are correlated with COVID-19. We show that these are prominent and discriminative enough that even simple classifiers such as logistic regression yields high detection accuracies using just the recordings of isolated extended vowels.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Proportional resource allocation in dynamic n-player Blotto games
Authors:
Nejat Anbarcı,
Kutay Cingiz,
Mehmet S. Ismail
Abstract:
A variety of social, economic, and political interactions have long been modelled after Blotto games. In this paper, we introduce a general model of dynamic $n$-player Blotto contests. The players have asymmetric resources, and the battlefield prizes are not necessarily homogeneous. Each player's probability of winning the prize in a battlefield is governed by a contest success function and player…
▽ More
A variety of social, economic, and political interactions have long been modelled after Blotto games. In this paper, we introduce a general model of dynamic $n$-player Blotto contests. The players have asymmetric resources, and the battlefield prizes are not necessarily homogeneous. Each player's probability of winning the prize in a battlefield is governed by a contest success function and players' resource allocation on that battlefield. We show that there exists a subgame perfect equilibrium in which players allocate their resources proportional to the battlefield prizes for every history. This result is robust to exogenous resource shocks throughout the game.
△ Less
Submitted 26 July, 2022; v1 submitted 10 October, 2020;
originally announced October 2020.
-
Drop spreading dynamics with a liquid needle drop deposition technique
Authors:
Abrar Ahmed,
Anuvrat Mishra,
MD Farhad Ismail,
Aleksey Baldygin,
Thomas Willers,
Prashant R. Waghmare
Abstract:
This paper represents a theoretical and an experimental study of the spreading dynamics of a liquid droplet, generated by a needle free deposition system called the liquid needle droplet deposition technique. This technique utilizes a continuous liquid jet generated from a pressurized dosing system which generates a liquid drop on a substrate to be characterized by optical contact angle measuremen…
▽ More
This paper represents a theoretical and an experimental study of the spreading dynamics of a liquid droplet, generated by a needle free deposition system called the liquid needle droplet deposition technique. This technique utilizes a continuous liquid jet generated from a pressurized dosing system which generates a liquid drop on a substrate to be characterized by optical contact angle measurements. Although many studies have explored the theoretical modelling of the droplet spreading scenario, a theoretical model representing the spreading dynamics of a droplet, generated by the jet impact and continuous addition of liquid mass, is yet to be addressed. In this study, we developed a theoretical model based on the overall energy balance approach which enables us to study on the physics of variation of droplet spreading under surrounding medium of various viscosities. The numerical solution of the non-linear ordinary differential equation has provided us the opportunity to comment on the variation of droplet spreading, as a function of Weber number ($We$), Reynolds number ($Re$) and Bond number ($Bo$) ranging from 0.5-3, 75-150, and 0.001-0.3, respectively. We have also presented a liquid jet impact model in order to predict the initial droplet diameter as an initial condition for the proposed governing equation. The model has been verified further with the experimental measurements and reasonable agreement has been observed. Experimental observations and theoretical investigations also highlight the precision, repeatability and wide range of the applicability of liquid needle drop deposition technique.
△ Less
Submitted 2 October, 2020;
originally announced October 2020.
-
Suppression of Three-Body Loss Near a p-Wave Resonance Due to Quasi-1D Confinement
Authors:
Andrew S. Marcum,
Francisco R. Fonta,
Arif Mawardi Ismail,
Kenneth M. O'Hara
Abstract:
We investigate the three-body recombination rate of a Fermi gas of $^6$Li atoms confined in quasi-1D near a $p$-wave Feshbach resonance. We confirm that the quasi-1D loss rate constant $K_3$ follows the predicted threshold scaling law that $K_3$ is energy independent on resonance, and find consistency with the scaling law $K_3 \propto (k \, a_{1D})^6$ far from resonance [Mehta et al. Phys. Rev. A…
▽ More
We investigate the three-body recombination rate of a Fermi gas of $^6$Li atoms confined in quasi-1D near a $p$-wave Feshbach resonance. We confirm that the quasi-1D loss rate constant $K_3$ follows the predicted threshold scaling law that $K_3$ is energy independent on resonance, and find consistency with the scaling law $K_3 \propto (k \, a_{1D})^6$ far from resonance [Mehta et al. Phys. Rev. A 76, 022711 (2007)]. Further we develop a theory based on Breit-Wigner analysis that describes the loss feature for intermediate fields. Lastly we measure how the loss rate constant scales with transverse confinement and find that $K_3 \propto V_L^{-1}$, where $V_L$ is the lattice depth. Importantly, at our attainable transverse confinements and temperatures, we see a 74-fold suppression of the on-resonant three-body loss rate constant in quasi-1D compared to 3D. With significant further enhancement of the transverse confinement, this suppression may pave the way for realizing stable $p$-wave superfluids.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Spatial-And-Context aware (SpACe) "virtual biopsy" radiogenomic maps to target tumor mutational status on structural MRI
Authors:
Marwa Ismail,
Ramon Correa,
Kaustav Bera,
Ruchika Verma,
Anas Saeed Bamashmos,
Niha Beig,
Jacob Antunes,
Prateek Prasanna,
Volodymyr Statsevych,
Manmeet Ahluwalia,
Pallavi Tiwari
Abstract:
With growing emphasis on personalized cancer-therapies,radiogenomics has shown promise in identifying target tumor mutational status on routine imaging (i.e. MRI) scans. These approaches fall into 2 categories: (1) deep-learning/radiomics (context-based), using image features from the entire tumor to identify the gene mutation status, or (2) atlas (spatial)-based to obtain likelihood of gene mutat…
▽ More
With growing emphasis on personalized cancer-therapies,radiogenomics has shown promise in identifying target tumor mutational status on routine imaging (i.e. MRI) scans. These approaches fall into 2 categories: (1) deep-learning/radiomics (context-based), using image features from the entire tumor to identify the gene mutation status, or (2) atlas (spatial)-based to obtain likelihood of gene mutation status based on population statistics. While many genes (i.e. EGFR, MGMT) are spatially variant, a significant challenge in reliable assessment of gene mutation status on imaging has been the lack of available co-localized ground truth for training the models. We present Spatial-And-Context aware (SpACe) "virtual biopsy" maps that incorporate context-features from co-localized biopsy site along with spatial-priors from population atlases, within a Least Absolute Shrinkage and Selection Operator (LASSO) regression model, to obtain a per-voxel probability of the presence of a mutation status (M+ vs M-). We then use probabilistic pair-wise Markov model to improve the voxel-wise prediction probability. We evaluate the efficacy of SpACe maps on MRI scans with co-localized ground truth obtained from corresponding biopsy, to predict the mutation status of 2 driver genes in Glioblastoma: (1) EGFR (n=91), and (2) MGMT (n=81). When compared against deep-learning (DL) and radiomic models, SpACe maps obtained training and testing accuracies of 90% (n=71) and 90.48% (n=21) in identifying EGFR amplification status,compared to 80% and 71.4% via radiomics, and 74.28% and 65.5% via DL. For MGMT status, training and testing accuracies using SpACe were 88.3% (n=61) and 71.5% (n=20), compared to 52.4% and 66.7% using radiomics,and 79.3% and 68.4% using DL. Following validation,SpACe maps could provide surgical navigation to improve localization of sampling sites for targeting of specific driver genes in cancer.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
Can tumor location on pre-treatment MRI predict likelihood of pseudo-progression versus tumor recurrence in Glioblastoma? A feasibility study
Authors:
Marwa Ismail,
Virginia Hill,
Volodymyr Statsevych,
Evan Mason,
Ramon Correa,
Prateek Prasanna,
Gagandeep Singh,
Kaustav Bera,
Rajat Thawani,
Anant Madabhushi,
Manmeet Ahluwalia,
Pallavi Tiwari
Abstract:
A significant challenge in Glioblastoma (GBM) management is identifying pseudo-progression (PsP), a benign radiation-induced effect, from tumor recurrence, on routine imaging following conventional treatment. Previous studies have linked tumor lobar presence and laterality to GBM outcomes, suggesting that disease etiology and progression in GBM may be impacted by tumor location. Hence, in this fea…
▽ More
A significant challenge in Glioblastoma (GBM) management is identifying pseudo-progression (PsP), a benign radiation-induced effect, from tumor recurrence, on routine imaging following conventional treatment. Previous studies have linked tumor lobar presence and laterality to GBM outcomes, suggesting that disease etiology and progression in GBM may be impacted by tumor location. Hence, in this feasibility study, we seek to investigate the following question: Can tumor location on treatment-naïve MRI provide early cues regarding likelihood of a patient develo** pseudo-progression versus tumor recurrence? In this study, 74 pre-treatment Glioblastoma MRI scans with PsP (33) and tumor recurrence (41) were analyzed. First, enhancing lesion on Gd-T1w MRI and peri-lesional hyperintensities on T2w/FLAIR were segmented by experts and then registered to a brain atlas. Using patients from the two phenotypes, we construct two atlases by quantifying frequency of occurrence of enhancing lesion and peri-lesion hyperintensities, by averaging voxel intensities across the population. Analysis of differential involvement was then performed to compute voxel-wise significant differences (p-value<0.05) across the atlases. Statistically significant clusters were finally mapped to a structural atlas to provide anatomic localization of their location. Our results demonstrate that patients with tumor recurrence showed prominence of their initial tumor in the parietal lobe, while patients with PsP showed a multi-focal distribution of the initial tumor in the frontal and temporal lobes, insula, and putamen. These preliminary results suggest that lateralization of pre-treatment lesions towards certain anatomical areas of the brain may allow to provide early cues regarding assessing likelihood of occurrence of pseudo-progression from tumor recurrence on MRI scans.
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
An Exploratory Study of Hierarchical Fuzzy Systems Approach in Recommendation System
Authors:
Tajul Rosli Razak,
Iman Hazwam Abd Halim,
Muhammad Nabil Fikri Jamaludin,
Mohammad Hafiz Ismail,
Shukor Sanim Mohd Fauzi
Abstract:
Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in develo** a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. Howe…
▽ More
Recommendation system or also known as a recommender system is a tool to help the user in providing a suggestion of a specific dilemma. Thus, recently, the interest in develo** a recommendation system in many fields has increased. Fuzzy Logic system (FLSs) is one of the approaches that can be used to model the recommendation systems as it can deal with uncertainty and imprecise information. However, one of the fundamental issues in FLS is the problem of the curse of dimensionality. That is, the number of rules in FLSs is increasing exponentially with the number of input variables. One effective way to overcome this problem is by using Hierarchical Fuzzy System (HFSs). This paper aims to explore the use of HFSs for Recommendation system. Specifically, we are interested in exploring and comparing the HFS and FLS for the Career path recommendation system (CPRS) based on four key criteria, namely topology, the number of rules, the rules structures and interpretability. The findings suggested that the HFS has advantages over FLS towards improving the interpretability models, in the context of a recommendation system example. This study contributes to providing an insight into the development of interpretable HFSs in the Recommendation systems.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
The Asymptotic Iteration Method Revisited
Authors:
Mourad E. H. Ismail,
Nasser Saad
Abstract:
The Asymptotic Iteration Method (AIM) is a technique for solving analytically and approximately the linear second-order differential equation, especially the eigenvalue problems that frequently appear in theoretical and mathematical physics. The analysis and mathematical justifications of the success and failure of the asymptotic iteration method are detailed in this work. A theorem explaining why…
▽ More
The Asymptotic Iteration Method (AIM) is a technique for solving analytically and approximately the linear second-order differential equation, especially the eigenvalue problems that frequently appear in theoretical and mathematical physics. The analysis and mathematical justifications of the success and failure of the asymptotic iteration method are detailed in this work. A theorem explaining why the asymptotic iteration method works for the eigenvalue problem is presented. As a byproduct, a new procedure to generate unlimited classes of exactly solvable differential equations is also introduced.
△ Less
Submitted 14 March, 2020;
originally announced March 2020.
-
A discrete and $q$ Asymptotic Iteration Method
Authors:
Mourad E. H. Ismail,
Nasser Saad
Abstract:
We introduce a finite difference and $q$-difference analogues of the Asymptotic Iteration Method of Ciftci, Hall, and Saad. We give necessary, and sufficient condition for the existence of a polynomial solution to a general linear second-order difference or $q$-difference equation subject to a "terminating condition", which is precisely defined. When a difference or $q$-difference equation has a p…
▽ More
We introduce a finite difference and $q$-difference analogues of the Asymptotic Iteration Method of Ciftci, Hall, and Saad. We give necessary, and sufficient condition for the existence of a polynomial solution to a general linear second-order difference or $q$-difference equation subject to a "terminating condition", which is precisely defined. When a difference or $q$-difference equation has a polynomial solution, we show how to find the second solution.
△ Less
Submitted 10 July, 2020; v1 submitted 14 March, 2020;
originally announced March 2020.
-
Metastatic melanoma-A review of current and future perspective
Authors:
Qurat-ul-Ain,
Muhammad Ismail
Abstract:
Metastatic Melanoma, the fifth most common cancer in the western countries and the most common malignancy diagnosed in United States present itself as the most lethal treatment resistant cancer worldwide. In addition to the reactive oxygen species(ROS), mutations in the genes encoding receptors and non-receptor tyrosine/serene/threonine protein kinases are known to be involved in its etiology. Kin…
▽ More
Metastatic Melanoma, the fifth most common cancer in the western countries and the most common malignancy diagnosed in United States present itself as the most lethal treatment resistant cancer worldwide. In addition to the reactive oxygen species(ROS), mutations in the genes encoding receptors and non-receptor tyrosine/serene/threonine protein kinases are known to be involved in its etiology. Kinases are molecular players of cell survival, growth, and proliferation and migration that mediate their effects via various signal transduction pathways. A number of such molecular players have been previously found to be mutated and hyper phosphorylated in melanoma. Although, several systemic therapies including cytotoxic chemotherapy, targeted drugs, hormonal therapy, radiation therapy, bio-chemotherapy, and therapies that inhibit negative regulation of immune system have been approved from U. S. Food and Drug Administration (FDA) for metastatic melanoma treatment. However, no systemic therapy has meaningfully changed its survival end points so far and surgery still presents primary treatment option for advanced and metastatic melanomaa due to its highly resistant nature towards systemic drugs, high rate of severe, life-threatening, or fatal side effects, and un satisfactory overall response rate. Therefore, there is still a need to develop therapies that target the unique molecular profile of melanoma tumors.
△ Less
Submitted 20 April, 2020; v1 submitted 6 March, 2020;
originally announced March 2020.
-
Systematic behavior of the fusion barrier parameters for heavy ion pairs [MSc Thesis]
Authors:
M. Ismail,
A. Y. Ellithi,
A. Adel,
A. R. Abdulghany
Abstract:
The nucleus-nucleus potential is calculated in the frame work of the double folding model (DFM) to obtain the Coulomb barrier parameters (barrier position and height), starting from M3Y-Reid nucleon-nucleon interaction and realistic nuclear matter distribution. The systematic behavior of the barrier parameters with mass numbers, charges, and radii of interacting nuclei is studied. The relation bet…
▽ More
The nucleus-nucleus potential is calculated in the frame work of the double folding model (DFM) to obtain the Coulomb barrier parameters (barrier position and height), starting from M3Y-Reid nucleon-nucleon interaction and realistic nuclear matter distribution. The systematic behavior of the barrier parameters with mass numbers, charges, and radii of interacting nuclei is studied. The relation between the barrier height and radius is also discussed. The systematic behavior of the barrier parameters is presented in the form of simple analytical formulae, which can be used to calculate the barrier position and height directly, and show which factors can affect them. The potentials obtained from DFM are used to derive a universal function of the nuclear proximity potential which is useful for barrier calculations for heavy ion reactions. The obtained universal function reproduces the barrier parameters within less than 2% deviation from the values obtained using DFM for heavy and super heavy ion reactions. Reactions involving α-particle are studied individually, and another form of the universal function is presented.
△ Less
Submitted 20 January, 2020; v1 submitted 15 January, 2020;
originally announced January 2020.
-
Leakage Localisation Using Cross Correlation for Wireless Three-Axis Vibration Sensors
Authors:
Airull Azizi Awang Lah,
Rudzidatul Akmam Dzyauddin,
Nelidya Md Yusoff,
Mohd Ismifaizul Mohd Ismail,
Noor Azurati Ahmad Salleh,
Robiah Ahmad
Abstract:
The objective of this paper is to investigate the application of the cross-correlation technique in localizing the leakage in Acrylonitrile Butadiene Styrene (ABS) pipeline using wireless three-axis vibration sensors. Most of the existing leak localization techniques that utilized the cross-correlation method is using acoustic and pressure sensors. This study explored the impact of using three-axi…
▽ More
The objective of this paper is to investigate the application of the cross-correlation technique in localizing the leakage in Acrylonitrile Butadiene Styrene (ABS) pipeline using wireless three-axis vibration sensors. Most of the existing leak localization techniques that utilized the cross-correlation method is using acoustic and pressure sensors. This study explored the impact of using three-axis vibration sensor ADXL335 to localize the leakages in ABS pipeline. The study focused on the small leak size of 1 mm and the effect of sensor distance and different water pressure is studied. The vibration data used in the cross-correlation data were filtered against the noise interference from the water pipeline. The source of noise interference from the water pipeline are motor, water pump, and valve. The computed leak localization accuracy against the actual leak distance from the three-axis was analyzed. The leakage localization formula is improvised by adding buffer time to have an accurate result. From the experiment, it was discovered that three-axis vibration sensor can be used to localize the leakages in plastic water pipeline and it is suitable for deployment in small to medium water distribution network or within a building.
△ Less
Submitted 16 December, 2019;
originally announced December 2019.
-
An RSSI-based Wireless Sensor Node Localisation using Trilateration and Multilateration Methods for Outdoor Environment
Authors:
Mohd Ismifaizul Mohd Ismail,
Rudzidatul Akmam Dzyauddin,
Shafiqa Samsul,
Nur Aisyah Azmi,
Yoshihide Yamada,
Mohd Fitri Mohd Yakub,
Noor Azurati Binti Ahmad Salleh
Abstract:
Localisation can be defined as estimating or finding a position of the node. There are two techniques in localisation, which are range-based and range-free techniques. This paper focusses on the Received Signal Strength Indicator (RSSI) localisation method, which is categorised in a range-based technique along with the time of arrival, time difference of arrival and angle of arrival. Therefore, th…
▽ More
Localisation can be defined as estimating or finding a position of the node. There are two techniques in localisation, which are range-based and range-free techniques. This paper focusses on the Received Signal Strength Indicator (RSSI) localisation method, which is categorised in a range-based technique along with the time of arrival, time difference of arrival and angle of arrival. Therefore, this study aims to compare the trilateration and multilateration method for RSSI-based technique for localising the transmitted (Tx) node. The wireless sensor module in the work used LOng-RAnge radio (LoRa) with 868MHz frequency. Nowadays, wireless networks have been a key technology for smart environments, monitoring, and object tracking due to low power consumption with long-range connectivity. The number of received (Rx) nodes are three and four for trilateration and multilateration methods, respectively. The transmitted node is placed at 32 different coordinates within the 10x10 meter outdoor area. The results show that error localisation obtained for General Error Localisation (GER) for multilateration and trilateration is 1.83m and 2.30m, respectively. An additional, the maximum and minimum error for multilateration and trilateration from 1.00 to 5.28m and 0.5 to 3.61m. The study concludes that the multilateration method more accurate than trilateration. Therefore, with the increasing number of Rx node, the accuracy of localisation of the Tx node increases.
△ Less
Submitted 16 December, 2019;
originally announced December 2019.
-
Super-Nash performance in games
Authors:
Mehmet S. Ismail
Abstract:
Since the 1990s, artificial intelligence (AI) systems have achieved 'superhuman performance' in major zero-sum games, where winning has an unambiguous definition. However, most economic and social interactions are non-zero-sum, where measuring 'performance' is a non-trivial task. In this paper, I introduce a novel benchmark, super-Nash performance, and a solution concept, optimin, whereby every pl…
▽ More
Since the 1990s, artificial intelligence (AI) systems have achieved 'superhuman performance' in major zero-sum games, where winning has an unambiguous definition. However, most economic and social interactions are non-zero-sum, where measuring 'performance' is a non-trivial task. In this paper, I introduce a novel benchmark, super-Nash performance, and a solution concept, optimin, whereby every player maximizes their minimal payoff under unilateral profitable deviations of the others. Optimin achieves super-Nash performance in that, for every Nash equilibrium, there exists an optimin where each player not only receives but also guarantees super-Nash payoffs, even if other players deviate unilaterally and profitably from the optimin. Further, optimin generalizes and unifies several key results across domains: it coincides with (i) the maximin strategies in zero-sum games, and (ii) the core in cooperative games when the core is nonempty, though it exists even if the core is empty; additionally, optimin generalizes (iii) Nash equilibrium in $n$-person constant-sum games. Finally, optimin is consistent with the direction of non-Nash deviations in games in which cooperation has been extensively studied, including the finitely repeated prisoner's dilemma, the centipede game, the traveler's dilemma, and the finitely repeated public goods game.
△ Less
Submitted 6 September, 2023; v1 submitted 30 November, 2019;
originally announced December 2019.
-
Reducing Honeypot Log Storage Capacity Consumption -- Cron Job with Perl-Script Approach
Authors:
Iman Hazwam Abd Halim,
Nur Muhammad Irfan Abu Hassan,
Tajul Rosli Razak,
Muhammad Nabil Fikri Jamaluddin,
Mohammad Hafiz Ismail
Abstract:
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty w…
▽ More
Honeypot is a decoy computer system that is used to attract and monitor hackers' activities in the network. The honeypot aims to collect information from the hackers in order to create a more secure system. However, the log file generated by honeypot can grow very large when heavy traffic occurred in the system, such as Distributed Denial of Services' (DDoS) attack. The DDoS possesses difficulty when it is being processed and analyzed by the network administrator as it required a lot of time and resources. Therefore, in this paper, we propose an approach to decrease the log size that is by using a Cron job that will run with a Perl-script. This approach parses the collected data into the database periodically to decrease the log size. Three DDoS attack cases were conducted in this study to show the increasing of the log size by sending a different amount of packet per second for 8 hours in each case. The results have shown that by utilizing the Cron job with Perl-script, the log size has been significantly reduced, the disk space used in the system has also decreased. Consequently, this approach capable of speeding up the process of parsing the log file into the database and thus, improving the overall system performance. This study contributes to providing a pathway in reducing honeypot log storage using the Cron job with Perl-Script.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
A Simple Recommender Engine for Matching Final-Year Project Student with Supervisor
Authors:
Mohammad Hafiz Ismail,
Tajul Rosli Razak,
Muhamad Arif Hashim,
Alif Faisal Ibrahim
Abstract:
This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender en…
▽ More
This paper discusses a simple recommender engine, which can match final year project student based on their interests with potential supervisors. The recommender engine is constructed based on Euclidean distance algorithm. The initial input data for the recommender system is obtained by distributing questionnaire to final year students and recording their response in CSV format. The recommender engine is implemented using Java class and application, and result of the initial tests has shown promises that the project is feasible to be pursued as it has the potential of solving the problem of final year students in finding their potential supervisors.
△ Less
Submitted 8 August, 2019;
originally announced August 2019.
-
On Entry II.16.12: A continued fraction of Ramanujan
Authors:
Gaurav Bhatnagar,
Mourad E. H. Ismail
Abstract:
We study a continued fraction due to Ramanujan, that he recorded as Entry 12 in Chapter 16 of his second notebook. It is presented in Part III of Berndt's volumes on Ramanujan's notebooks.
We give two alternate approaches to proving Ramanujan's Entry 12, one using a method of Euler, and another using the theory of orthogonal polynomials. We consider a natural generalization of Entry 12 suggested…
▽ More
We study a continued fraction due to Ramanujan, that he recorded as Entry 12 in Chapter 16 of his second notebook. It is presented in Part III of Berndt's volumes on Ramanujan's notebooks.
We give two alternate approaches to proving Ramanujan's Entry 12, one using a method of Euler, and another using the theory of orthogonal polynomials. We consider a natural generalization of Entry 12 suggested by the theory of orthogonal polynomials.
△ Less
Submitted 9 August, 2019;
originally announced August 2019.
-
A DTLS Abstraction Layer for the Recursive Networking Architecture in RIOT
Authors:
M. Aiman Ismail,
Thomas C. Schmidt
Abstract:
On the Internet of Things (IoT), devices continuously communicate with each other, with a gateway, or other Internet nodes. Often devices are constrained and use insecure channels for their communication, which exposes them to a selection of attacks that may extract sensitive pieces of information or manipulate dialogues for the purpose of sabotaging.
This paper presents a new layer in the RIOT…
▽ More
On the Internet of Things (IoT), devices continuously communicate with each other, with a gateway, or other Internet nodes. Often devices are constrained and use insecure channels for their communication, which exposes them to a selection of attacks that may extract sensitive pieces of information or manipulate dialogues for the purpose of sabotaging.
This paper presents a new layer in the RIOT networking architecture to seamlessly integrate secure communication between applications using DTLS. The layer acts as a modular abstraction layer of the different DTLS implementations, enabling swap** of the underlying implementation with just a few lines of code. This paper also introduces credman, a new module to manage credentials used for (D)TLS connections.
△ Less
Submitted 28 June, 2019;
originally announced June 2019.
-
A New Weighting Scheme in Weighted Markov Model for Predicting the Probability of Drought Episodes
Authors:
Zulfiqar Ali,
Ijaz Hussain,
Muhammad Faisal,
Ibrahim M. Almanjahie,
Muhammad Ismail,
Maqsood Ahmad,
Ishfaq Ahmad
Abstract:
Drought is a complex stochastic natural hazard caused by prolonged shortage of rainfall. Several environmental factors are involved in determining drought classes at the specific monitoring station. Therefore, efficient sequence processing techniques are required to explore and predict the periodic information about the various episodes of drought classes. In this study, we proposed a new weightin…
▽ More
Drought is a complex stochastic natural hazard caused by prolonged shortage of rainfall. Several environmental factors are involved in determining drought classes at the specific monitoring station. Therefore, efficient sequence processing techniques are required to explore and predict the periodic information about the various episodes of drought classes. In this study, we proposed a new weighting scheme to predict the probability of various drought classes under Weighted Markov Chain (WMC) model. We provide a standardized scheme of weights for ordinal sequences of drought classifications by normalizing squared weighted Cohen Kappa. Illustrations of the proposed scheme are given by including temporal ordinal data on drought classes determined by the standardized precipitation temperature index (SPTI). Experimental results show that the proposed weighting scheme for WMC model is sufficiently flexible to address actual changes in drought classifications by restructuring the transient behavior of a Markov chain. In summary, this paper proposes a new weighting scheme to improve the accuracy of the WMC, specifically in the field of hydrology.
△ Less
Submitted 18 January, 2019;
originally announced January 2019.
-
Orthogonal polynomials associated with a continued fraction of Hirschhorn
Authors:
Gaurav Bhatnagar,
Mourad E. H. Ismail
Abstract:
We study orthogonal polynomials associated with a continued fraction due to Hirschhorn. Hirschhorn's continued fraction contains as special cases the famous Rogers--Ramanujan continued fraction and two of Ramanujan's generalizations. The orthogonality measure of the set of polynomials obtained has an absolutely continuous component. We find generating functions, asymptotic formulas, orthogonality…
▽ More
We study orthogonal polynomials associated with a continued fraction due to Hirschhorn. Hirschhorn's continued fraction contains as special cases the famous Rogers--Ramanujan continued fraction and two of Ramanujan's generalizations. The orthogonality measure of the set of polynomials obtained has an absolutely continuous component. We find generating functions, asymptotic formulas, orthogonality relations, and the Stieltjes transform of the measure. Using standard generating function techniques, we show how to obtain formulas for the convergents of Ramanujan's continued fractions, including a formula that Ramanujan recorded himself as Entry 16 in Chapter 16 of his second notebook.
△ Less
Submitted 18 February, 2022; v1 submitted 28 January, 2019;
originally announced January 2019.
-
Matrix valued Hermite polynomials, Burchnall formulas and non-abelian Toda lattice
Authors:
Mourad E. H. Ismail,
Erik Koelink,
Pablo Román
Abstract:
A general family of matrix valued Hermite type orthogonal polynomials is introduced and studied in detail by deriving Pearson equations for the weight and matrix valued differential equations for these matrix polynomials. This is used to derive Rodrigues formulas, explicit formulas for the squared norm and to give an explicit expression of the matrix entries as well to derive a connection formula…
▽ More
A general family of matrix valued Hermite type orthogonal polynomials is introduced and studied in detail by deriving Pearson equations for the weight and matrix valued differential equations for these matrix polynomials. This is used to derive Rodrigues formulas, explicit formulas for the squared norm and to give an explicit expression of the matrix entries as well to derive a connection formula for the matrix polynomials of Hermite type. We derive matrix valued analogues of Burchnall formulas in operational form as well explicit expansions for the matrix valued Hermite type orthogonal polynomials as well as for previously introduced matrix valued Gegenbauer type orthogonal polynomials. The Burchnall approach gives two descriptions of the matrix valued orthogonal polynomials for the Toda modification of the matrix weight for the Hermite setting. In particular, we obtain a non-trivial solution to the non-abelian Toda lattice equations.
△ Less
Submitted 17 November, 2018;
originally announced November 2018.
-
Blockchain-based Charging Coordination Mechanism for Smart Grid Energy Storage Units
Authors:
Mohamed Baza,
Mahmoud Nabil,
Muhammad Ismail,
Mohamed Mahmoud,
Erchin Serpedin,
Mohammad Rahman
Abstract:
Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordina…
▽ More
Energy storage units (ESUs) enable several attractive features of modern smart grids such as enhanced grid resilience, effective demand response, and reduced bills. However, uncoordinated charging of ESUs stresses the power system and can lead to a blackout. On the other hand, existing charging coordination mechanisms suffer from several limitations. First, the need for a central charging coordinator (CC) presents a single point of failure that jeopardizes the effectiveness of the charging coordination. Second, a transparent charging coordination mechanism does not exist where users are not aware whether the CC is honest or not in coordination charging requests among them in a fair way. Third, existing mechanisms overlook the privacy concerns of the involved customers. To address these limitations, in this paper, we leverage the blockchain and smart contracts to build a decentralized charging coordination mechanism without the need for a centralized charging coordinator. First ESUs should use tokens for anonymously authenticate themselves to the blockchain. Then each ESU sends a charging request that contains its State-of-Charge (SoC), Time-to-complete-charge (TCC) and amount of required charging to the smart contract address on the blockchain. The smart contract will then run the charging coordination mechanism in a self-executed manner such that ESUs with the highest priorities are charged in the present time slot while charging requests of lower priority ESUs are deferred to future time slots. In this way, each ESU can make sure that charging schedules are computed correctly. Finally, we have implemented the proposed mechanism on the Ethereum test-bed blockchain, and our analysis shows that execution cost can be acceptable in terms of gas consumption while enabling decentralized charging coordination with increased transparency, reliability, and privacy preserving.
△ Less
Submitted 2 April, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters
Authors:
Mahmoud Nabil,
Muhammad Ismail,
Mohamed Mahmoud,
Mostafa Shahin,
Khalid Qaraqe,
Erchin Serpedin
Abstract:
Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity thef…
▽ More
Modern smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, such an approach suffers from electricity theft cyberattacks. Different from the existing research that utilizes shallow, static, and customer-specific-based electricity theft detectors, this paper proposes a generalized deep recurrent neural network (RNN)-based electricity theft detector that can effectively thwart these cyberattacks. The proposed model exploits the time series nature of the customers' electricity consumption to implement a gated recurrent unit (GRU)-RNN, hence, improving the detection performance. In addition, the proposed RNN-based detector adopts a random search analysis in its learning stage to appropriately fine-tune its hyper-parameters. Extensive test studies are carried out to investigate the detector's performance using publicly available real data of 107,200 energy consumption days from 200 customers. Simulation results demonstrate the superior performance of the proposed detector compared with state-of-the-art electricity theft detectors.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
Catch-Up: A Rule that Makes Service Sports More Competitive
Authors:
Steven J. Brams,
Mehmet S. Ismail,
D. Marc Kilgour,
Walter Stromquist
Abstract:
Service sports include two-player contests such as volleyball, badminton, and squash. We analyze four rules, including the Standard Rule (SR), in which a player continues to serve until he or she loses. The Catch-Up Rule (CR) gives the serve to the player who has lost the previous point - as opposed to the player who won the previous point, as under SR. We also consider two Trailing Rules that mak…
▽ More
Service sports include two-player contests such as volleyball, badminton, and squash. We analyze four rules, including the Standard Rule (SR), in which a player continues to serve until he or she loses. The Catch-Up Rule (CR) gives the serve to the player who has lost the previous point - as opposed to the player who won the previous point, as under SR. We also consider two Trailing Rules that make the server the player who trails in total score. Surprisingly, compared with SR, only CR gives the players the same probability of winning a game while increasing its expected length, thereby making it more competitive and exciting to watch. Unlike one of the Trailing Rules, CR is strategy-proof. By contrast, the rules of tennis fix who serves and when; its tiebreaker, however, keeps play competitive by being fair - not favoring either the player who serves first or who serves second.
△ Less
Submitted 17 August, 2018;
originally announced August 2018.
-
The strategy of conflict and cooperation
Authors:
Mehmet S. Ismail
Abstract:
This paper introduces a unified framework called cooperative extensive form games, which (i) generalizes standard non-cooperative games, and (ii) allows for more complex coalition formation dynamics than previous concepts like coalition-proof Nash equilibrium. Central to this framework is a novel solution concept called cooperative equilibrium system (CES). CES differs from Nash equilibrium in two…
▽ More
This paper introduces a unified framework called cooperative extensive form games, which (i) generalizes standard non-cooperative games, and (ii) allows for more complex coalition formation dynamics than previous concepts like coalition-proof Nash equilibrium. Central to this framework is a novel solution concept called cooperative equilibrium system (CES). CES differs from Nash equilibrium in two important respects. First, a CES is immune to both unilateral and multilateral `credible' deviations. Second, unlike Nash equilibrium, whose stability relies on the assumption that the strategies of non-deviating players are held fixed, CES allows for the possibility that players may regroup and adjust their strategies in response to a deviation. The main result establishes that every cooperative extensive form game, possibly with imperfect information, possesses a CES. For games with perfect information, the proof is constructive. This framework is broadly applicable in contexts such as oligopolistic markets and dynamic political bargaining.
△ Less
Submitted 25 September, 2023; v1 submitted 20 August, 2018;
originally announced August 2018.
-
Asymptotics of partition functions in a fermionic matrix model and of related $q$-polynomials
Authors:
Dan Dai,
Mourad E. H. Ismail,
Xiang-Sheng Wang
Abstract:
In this paper, we study asymptotics of the thermal partition function of a model of quantum mechanical fermions with matrix-like index structure and quartic interactions. This partition function is given explicitly by a Wronskian of the Stieltjes-Wigert polynomials. Our asymptotic results involve the theta function and its derivatives. We also develop a new asymptotic method for general $q$-polyno…
▽ More
In this paper, we study asymptotics of the thermal partition function of a model of quantum mechanical fermions with matrix-like index structure and quartic interactions. This partition function is given explicitly by a Wronskian of the Stieltjes-Wigert polynomials. Our asymptotic results involve the theta function and its derivatives. We also develop a new asymptotic method for general $q$-polynomials.
△ Less
Submitted 3 August, 2018;
originally announced August 2018.
-
Disjoint Map** Network for Cross-modal Matching of Voices and Faces
Authors:
Yandong Wen,
Mahmoud Al Ismail,
Weiyang Liu,
Bhiksha Raj,
Rita Singh
Abstract:
We propose a novel framework, called Disjoint Map** Network (DIMNet), for cross-modal biometric matching, in particular of voices and faces. Different from the existing methods, DIMNet does not explicitly learn the joint relationship between the modalities. Instead, DIMNet learns a shared representation for different modalities by map** them individually to their common covariates. These share…
▽ More
We propose a novel framework, called Disjoint Map** Network (DIMNet), for cross-modal biometric matching, in particular of voices and faces. Different from the existing methods, DIMNet does not explicitly learn the joint relationship between the modalities. Instead, DIMNet learns a shared representation for different modalities by map** them individually to their common covariates. These shared representations can then be used to find the correspondences between the modalities. We show empirically that DIMNet is able to achieve better performance than other current methods, with the additional benefits of being conceptually simpler and less data-intensive.
△ Less
Submitted 15 July, 2018; v1 submitted 12 July, 2018;
originally announced July 2018.
-
Optimal Strategies for Matching and Retrieval Problems by Comparing Covariates
Authors:
Yandong Wen,
Mahmoud Al Ismail,
Bhiksha Raj,
Rita Singh
Abstract:
In many retrieval problems, where we must retrieve one or more entries from a gallery in response to a probe, it is common practice to learn to do by directly comparing the probe and gallery entries to one another. In many situations the gallery and probe have common covariates -- external variables that are common to both. In principle it is possible to perform the retrieval based merely on these…
▽ More
In many retrieval problems, where we must retrieve one or more entries from a gallery in response to a probe, it is common practice to learn to do by directly comparing the probe and gallery entries to one another. In many situations the gallery and probe have common covariates -- external variables that are common to both. In principle it is possible to perform the retrieval based merely on these covariates. The process, however, becomes gated by our ability to recognize the covariates for the probe and gallery entries correctly.
In this paper we analyze optimal strategies for retrieval based only on matching covariates, when the recognition of the covariates is itself inaccurate. We investigate multiple problems: recovering one item from a gallery of $N$ entries, matching pairs of instances, and retrieval from large collections. We verify our analytical formulae through experiments to verify their correctness in practical settings.
△ Less
Submitted 15 July, 2018; v1 submitted 12 July, 2018;
originally announced July 2018.
-
The sequencing and interpretation of the genome obtained from a Serbian individual
Authors:
Wazim Mohammed Ismail,
Kymberleigh A. Pagel,
Vikas Pejaver,
Simo V. Zhang,
Sofia Casasa,
Matthew Mort,
David N. Cooper,
Matthew W. Hahn,
Predrag Radivojac
Abstract:
Recent genetic studies and whole-genome sequencing projects have greatly improved our understanding of human variation and clinically actionable genetic information. Smaller ethnic populations, however, remain underrepresented in both individual and large-scale sequencing efforts and hence present an opportunity to discover new variants of biomedical and demographic significance. This report descr…
▽ More
Recent genetic studies and whole-genome sequencing projects have greatly improved our understanding of human variation and clinically actionable genetic information. Smaller ethnic populations, however, remain underrepresented in both individual and large-scale sequencing efforts and hence present an opportunity to discover new variants of biomedical and demographic significance. This report describes the sequencing and analysis of a genome obtained from an individual of Serbian origin, introducing tens of thousands of previously unknown variants to the currently available pool. Ancestry analysis places this individual in close proximity of the Central and Eastern European populations; i.e., closest to Croatian, Bulgarian and Hungarian individuals and, in terms of other Europeans, furthest from Ashkenazi Jewish, Spanish, Sicilian, and Baltic individuals. Our analysis confirmed gene flow between Neanderthal and ancestral pan-European populations, with similar contributions to the Serbian genome as those observed in other European groups. Finally, to assess the burden of potentially disease-causing/clinically relevant variation in the sequenced genome, we utilized manually curated genotype-phenotype association databases and variant-effect predictors. We identified several variants that have previously been associated with severe early-onset disease that is not evident in the proband, as well as variants that could yet prove to be clinically relevant to the proband over the next decades. The presence of numerous private and low-frequency variants along with the observed and predicted disease-causing mutations in this genome exemplify some of the global challenges of genome interpretation, especially in the context of understudied ethnic groups.
△ Less
Submitted 17 May, 2018;
originally announced May 2018.
-
Generalized Burchnall-Type Identities for Orthogonal Polynomials and Expansions
Authors:
Mourad E. H. Ismail,
Erik Koelink,
Pablo Román
Abstract:
Burchnall's method to invert the Feldheim-Watson linearization formula for the Hermite polynomials is extended to all polynomial families in the Askey-scheme and its $q$-analogue. The resulting expansion formulas are made explicit for several families corresponding to measures with infinite support, including the Wilson and Askey-Wilson polynomials. An integrated version gives the possibility to g…
▽ More
Burchnall's method to invert the Feldheim-Watson linearization formula for the Hermite polynomials is extended to all polynomial families in the Askey-scheme and its $q$-analogue. The resulting expansion formulas are made explicit for several families corresponding to measures with infinite support, including the Wilson and Askey-Wilson polynomials. An integrated version gives the possibility to give alternate expression for orthogonal polynomials with respect to a modified weight. This gives expansions for polynomials, such as Hermite, Laguerre, Meixner, Charlier, Meixner-Pollaczek and big $q$-Jacobi polynomials and big $q$-Laguerre polynomials. We show that one can find expansions for the orthogonal polynomials corresponding to the Toda-modification of the weight for the classical polynomials that correspond to known explicit solutions for the Toda lattice, i.e., for Hermite, Laguerre, Charlier, Meixner, Meixner-Pollaczek and Krawtchouk polynomials.
△ Less
Submitted 17 July, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Distributed Vector Representation Of Shop** Items, The Customer And Shop** Cart To Build A Three Fold Recommendation System
Authors:
Bibek Behera,
Manoj Joshi,
Abhilash KK,
Mohammad Ansari Ismail
Abstract:
The main idea of this paper is to represent shop** items through vectors because these vectors act as the base for building em- beddings for customers and shop** carts. Also, these vectors are input to the mathematical models that act as either a recommendation engine or help in targeting potential customers. We have used exponential family embeddings as the tool to construct two basic vectors…
▽ More
The main idea of this paper is to represent shop** items through vectors because these vectors act as the base for building em- beddings for customers and shop** carts. Also, these vectors are input to the mathematical models that act as either a recommendation engine or help in targeting potential customers. We have used exponential family embeddings as the tool to construct two basic vectors - product embeddings and context vectors. Using the basic vectors, we build combined embeddings, trip embeddings and customer embeddings. Combined embeddings mix linguistic properties of product names with their shop** patterns. The customer embeddings establish an understand- ing of the buying pattern of customers in a group and help in building customer profile. For example a customer profile can represent customers frequently buying pet-food. Identifying such profiles can help us bring out offers and discounts. Similarly, trip embeddings are used to build trip profiles. People happen to buy similar set of products in a trip and hence their trip embeddings can be used to predict the next product they would like to buy. This is a novel technique and the first of its kind to make recommendation using product, trip and customer embeddings.
△ Less
Submitted 17 May, 2017;
originally announced May 2017.
-
From D2D to Ds2D: Prolonging the Battery Life of Mobile Devices via Ds2D Communications
Authors:
Muhammad Z. Shakir,
Muhammad Ismail,
Xianbin Wang,
Khalid A. Qaraqe,
Erchin Serpedin
Abstract:
Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone…
▽ More
Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone users to explore the emerging applications in DCS. It is anticipated that the owners of 5G-enabled smartphones use their devices more extensively to talk, text, email, and surf the Web more often than do customers with 4G smartphones or traditional handsets, which puts a significantly higher demand on the battery life. Smartphones are currently equipped with multiple radio interfaces that enable them to access different types of wireless networks including LTE-direct and Wi-Fi-direct, besides cellular networks. Such a capability is not well explored within the context of DCS. This article proposes a new scheme to support the emerging features in DCS where a D2D-enabled mobile device (sink device or a file/content requester) aggregates the radio resources of multiple mobile devices (source devices or file/content providers) via its multiple radio interfaces such that the scheme is referred to as devices-to-device (Ds2D) communications. Ds2D communication scheme ensures an optimal packet split among the source mobile devices to improve the file/content transfer latency (FTL), energy efficiency, and battery life. Simulation results demonstrate that the proposed optimal packet split scheme among multiple source devices participating in Ds2D communication scheme guarantees an improvement in mobile battery life over wide range of data rate levels in comparison with the random packet split strategy and traditional D2D communication paradigm between the sink and source mobile devices.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Graphene nanoplatelets induced tailoring in photocatalytic activity and antibacterial characteristics of MgO/graphene nanoplatelets nanocomposites
Authors:
Aqsa Arshad,
Javed Iqbal,
M. Siddiq,
Qaisar Mansoor,
M. Ismail,
Faisal Mehmood,
M. Ajmal,
Zubia Abid
Abstract:
The synthesis, physical, photocatalytic, and antibacterial properties of MgO and graphene nanoplatelets (GNPs) nanocomposites are reported. The crystallinity, phase, morphology, chemical bonding, and vibrational modes of prepared nanomaterials are studied. The conductive nature of GNPs is tailored via photocatalysis and enhanced antibacterial activity. It is interestingly observed that the MgO/GNP…
▽ More
The synthesis, physical, photocatalytic, and antibacterial properties of MgO and graphene nanoplatelets (GNPs) nanocomposites are reported. The crystallinity, phase, morphology, chemical bonding, and vibrational modes of prepared nanomaterials are studied. The conductive nature of GNPs is tailored via photocatalysis and enhanced antibacterial activity. It is interestingly observed that the MgO/GNPs nanocomposite with optimized GNPs content show a significant photocatalytic activity (97.23% degradation) as compared to bare MgO (43%) which makes it the potential photocatalyst for purification of industrial waste water. In addition, the effect of increased amount of GNPs on antibacterial performance of nanocomposites against pathogenic micro-organisms is researched, suggesting them toxic. MgO/GNPs 25% nanocomposite may have potential applications in waste water treatment and nanomedicine due its multifunctionality.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Electromagnetic wave propagation through a slab of a dispersive medium
Authors:
Mohamed Ismail,
Boris Gralak
Abstract:
A method is proposed for the analysis of the propagation of electromagnetic waves through a homogeneous slab of a medium with Drude-Lorentz dispersion behavior, and excited by a causal sinusoidal source. An expression of the time dependent field, free from branch-cuts in the plane of complex frequencies, is established. This method provides the complete temporal response in both the steady-state a…
▽ More
A method is proposed for the analysis of the propagation of electromagnetic waves through a homogeneous slab of a medium with Drude-Lorentz dispersion behavior, and excited by a causal sinusoidal source. An expression of the time dependent field, free from branch-cuts in the plane of complex frequencies, is established. This method provides the complete temporal response in both the steady-state and transient regimes in terms of discrete poles contributions. The Sommerfeld and Brillouin precursors are retrieved and the corresponding set of poles are identified. In addition, the contribution in the transient field of the resonance frequency in the Drude-Lorentz model is exhybited, and the effect of reflections resulting from the refractive index mismatch at the interfaces of the slab are analyzed.
△ Less
Submitted 12 October, 2016;
originally announced October 2016.
-
$R_{II}$ type recurrence, generalized eigenvalue problem and orthogonal polynomials on the unit circle
Authors:
Mourad E. H. Ismail,
Alagacone Sri Ranga
Abstract:
We consider a sequence of polynomials $\{P_n\}_{n \geq 0}$ satisfying a special $R_{II}$ type recurrence relation where the zeros of $P_n$ are simple and lie on the real line. It turns out that the polynomial $P_n$, for any $n \geq 2$, is the characteristic polynomial of a simple $n \times n$ generalized eigenvalue problem. It is shown that with this $R_{II}$ type recurrence relation one can alway…
▽ More
We consider a sequence of polynomials $\{P_n\}_{n \geq 0}$ satisfying a special $R_{II}$ type recurrence relation where the zeros of $P_n$ are simple and lie on the real line. It turns out that the polynomial $P_n$, for any $n \geq 2$, is the characteristic polynomial of a simple $n \times n$ generalized eigenvalue problem. It is shown that with this $R_{II}$ type recurrence relation one can always associate a positive measure on the unit circle. The orthogonality property satisfied by $P_n$ with respect to this measure is also obtained. Finally, examples are given to justify the results.
△ Less
Submitted 15 March, 2017; v1 submitted 26 June, 2016;
originally announced June 2016.
-
HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases
Authors:
Salman Niazi,
Mahmoud Ismail,
Steffen Grohsschmiedt,
Mikael Ronström,
Seif Haridi,
Jim Dowling
Abstract:
Recent improvements in both the performance and scalability of shared-nothing, transactional, in-memory NewSQL databases have reopened the research question of whether distributed metadata for hierarchical file systems can be managed using commodity databases. In this paper, we introduce HopsFS, a next generation distribution of the Hadoop Distributed File System (HDFS) that replaces HDFS' single…
▽ More
Recent improvements in both the performance and scalability of shared-nothing, transactional, in-memory NewSQL databases have reopened the research question of whether distributed metadata for hierarchical file systems can be managed using commodity databases. In this paper, we introduce HopsFS, a next generation distribution of the Hadoop Distributed File System (HDFS) that replaces HDFS' single node in-memory metadata service, with a distributed metadata service built on a NewSQL database. By removing the metadata bottleneck, HopsFS enables an order of magnitude larger and higher throughput clusters compared to HDFS. Metadata capacity has been increased to at least 37 times HDFS' capacity, and in experiments based on a workload trace from Spotify, we show that HopsFS supports 16 to 37 times the throughput of Apache HDFS. HopsFS also has lower latency for many concurrent clients, and no downtime during failover. Finally, as metadata is now stored in a commodity database, it can be safely extended and easily exported to external systems for online analysis and free-text search.
△ Less
Submitted 22 February, 2017; v1 submitted 5 June, 2016;
originally announced June 2016.
-
Integrals and Series Representations of $q$-Polynomials and Functions: Part II Schur Polynomials and the Rogers-Ramanujan Identities
Authors:
Mourad E. H. Ismail,
Ruiming Zhang
Abstract:
We give several expansion and identities involving the Ramanujan function $A_q$ and the Stieltjes--Wigert polynomials. Special values of our idenitities give $m$-versions of some of the items on the Slater list of Rogers-Ramanujan type identities. We also study some bilateral extensions of certain transformations in the theory of basic hypergeometric functions.
We give several expansion and identities involving the Ramanujan function $A_q$ and the Stieltjes--Wigert polynomials. Special values of our idenitities give $m$-versions of some of the items on the Slater list of Rogers-Ramanujan type identities. We also study some bilateral extensions of certain transformations in the theory of basic hypergeometric functions.
△ Less
Submitted 9 May, 2016;
originally announced May 2016.
-
Spectral analysis of two doubly infinite Jacobi matrices with exponential entries
Authors:
Mourad E. H. Ismail,
František Štampach
Abstract:
We provide a complete spectral analysis of all self-adjoint operators acting on $\ell^{2}(\mathbb{Z})$ which are associated with two doubly infinite Jacobi matrices with entries given by $$ q^{-n+1}δ_{m,n-1}+q^{-n}δ_{m,n+1} $$ and $$ δ_{m,n-1}+αq^{-n}δ_{m,n}+δ_{m,n+1}, $$ respectively, where $q\in(0,1)$ and $α\in\mathbb{R}$. As an application, we derive orthogonality relations for the Ramanujan en…
▽ More
We provide a complete spectral analysis of all self-adjoint operators acting on $\ell^{2}(\mathbb{Z})$ which are associated with two doubly infinite Jacobi matrices with entries given by $$ q^{-n+1}δ_{m,n-1}+q^{-n}δ_{m,n+1} $$ and $$ δ_{m,n-1}+αq^{-n}δ_{m,n}+δ_{m,n+1}, $$ respectively, where $q\in(0,1)$ and $α\in\mathbb{R}$. As an application, we derive orthogonality relations for the Ramanujan entire function and the third Jackson $q$-Bessel function.
△ Less
Submitted 2 May, 2016;
originally announced May 2016.
-
Integral and Series Representations of $q$-Polynomials and Functions: Part I
Authors:
Mourad E. H. Ismail,
Ruiming Zhang
Abstract:
By applying an integral representation for $q^{k^{2}}$ we systematically derive a large number of new Fourier and Mellin transform pairs and establish new integral representations for a variety of $q$-functions and polynomials that naturally arise from combinatorics, analysis, and orthogonal polynomials corresponding to indeterminate moment problems. These functions include $q$-Bessel functions, t…
▽ More
By applying an integral representation for $q^{k^{2}}$ we systematically derive a large number of new Fourier and Mellin transform pairs and establish new integral representations for a variety of $q$-functions and polynomials that naturally arise from combinatorics, analysis, and orthogonal polynomials corresponding to indeterminate moment problems. These functions include $q$-Bessel functions, the Ramanujan function, Stieltjes--Wigert polynomials, $q$-Hermite and $q^{-1}$-Hermite polynomials, and the $q$-exponential functions $e_{q}$, $E_{q}$ and $\mathcal{E}_{q}$. Their representations are in turn used to derive many new identities involving $q$-functions and polynomials. In this work we also present contour integral representations for the above mentioned functions and polynomials.
△ Less
Submitted 9 May, 2016; v1 submitted 27 April, 2016;
originally announced April 2016.
-
Optimum orientation versus orientation averaging description of cluster radioactivity
Authors:
W. M. Seif,
M. Ismail,
A. I. Refaie,
L. H. Amer
Abstract:
Background: The deformation of the nuclei involved in the cluster decay of heavy nuclei affect seriously their half-lives against the decay. Purpose: We investigate the description of the different decay stages in both the optimum orientation and the orientation-averaged pictures of the cluster decay process. Method: We consider the decays of 232,233,234U and 236,238Pu isotopes. The quantum mechan…
▽ More
Background: The deformation of the nuclei involved in the cluster decay of heavy nuclei affect seriously their half-lives against the decay. Purpose: We investigate the description of the different decay stages in both the optimum orientation and the orientation-averaged pictures of the cluster decay process. Method: We consider the decays of 232,233,234U and 236,238Pu isotopes. The quantum mechanical knocking frequency and penetration probability based on the Wentzel-Kramers-Brillouin approximation are used to find the decay width. Results: We found that the orientation-averaged decay width is one or two orders of magnitude less than its value along the non-compact optimum orientation. The difference between the two values increases with decreasing the mass number of the emitted cluster. Correspondingly, the extracted preformation probability based on the averaged decay width increases with the same orders of magnitude compared to its value obtained considering the optimum orientation. The cluster preformation probabilities (Sc) obtained in the two considered schemes give more or less comparable agreement with the Blendowske-Walliser (BW) formula based on the preformation probability of Sa(ave.) obtained from the orientation-averaging scheme. All the obtained results, including those obtained in the optimum-orientation scheme, deviate substantially from the BW law based on Sa(opt.) obtained using the optimum-orientation scheme. Conclusion: In order to account for deformations of the participating nuclei, it is more relevant to calculate the decay width by averaging over the different possible orientations of the participating deformed nucleus, rather than considering the corresponding non-compact optimum orientation.
△ Less
Submitted 15 March, 2016;
originally announced March 2016.