-
Wiki Entity Summarization Benchmark
Authors:
Saeedeh Javadi,
Atefeh Moradan,
Mohammad Sorkhpar,
Klim Zaporojets,
Davide Mottin,
Ira Assent
Abstract:
Entity summarization aims to compute concise summaries for entities in knowledge graphs. Existing datasets and benchmarks are often limited to a few hundred entities and discard graph structure in source knowledge graphs. This limitation is particularly pronounced when it comes to ground-truth summaries, where there exist only a few labeled summaries for evaluation and training. We propose WikES,…
▽ More
Entity summarization aims to compute concise summaries for entities in knowledge graphs. Existing datasets and benchmarks are often limited to a few hundred entities and discard graph structure in source knowledge graphs. This limitation is particularly pronounced when it comes to ground-truth summaries, where there exist only a few labeled summaries for evaluation and training. We propose WikES, a comprehensive benchmark comprising of entities, their summaries, and their connections. Additionally, WikES features a dataset generator to test entity summarization algorithms in different areas of the knowledge graph. Importantly, our approach combines graph algorithms and NLP models as well as different data sources such that WikES does not require human annotation, rendering the approach cost-effective and generalizable to multiple domains. Finally, WikES is scalable and capable of capturing the complexities of knowledge graphs in terms of topology and semantics. WikES features existing datasets for comparison. Empirical studies of entity summarization methods confirm the usefulness of our benchmark. Data, code, and models are available at: https://github.com/msorkhpar/wiki-entity-summarization.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Energy Efficient Design of Active STAR-RIS-Aided SWIPT Systems
Authors:
Sajad Faramarzi,
Hosein Zarini,
Sepideh Javadi,
Mohammad Robat Mili,
Rui Zhang,
George K. Karagiannidis,
Naofal Al-Dhahir
Abstract:
In this paper, we consider the downlink transmission of a multi-antenna base station (BS) supported by an active simultaneously transmitting and reconfigurable intelligent surface (STAR-RIS) to serve single-antenna users via simultaneous wireless information and power transfer (SWIPT). In this context, we formulate an energy efficiency maximisation problem that jointly optimises the gain, element…
▽ More
In this paper, we consider the downlink transmission of a multi-antenna base station (BS) supported by an active simultaneously transmitting and reconfigurable intelligent surface (STAR-RIS) to serve single-antenna users via simultaneous wireless information and power transfer (SWIPT). In this context, we formulate an energy efficiency maximisation problem that jointly optimises the gain, element selection and phase shift matrices of the active STAR-RIS, the transmit beamforming of the BS and the power splitting ratio of the users. With respect to the highly coupled and non-convex form of this problem, an alternating optimisation solution approach is proposed, using tools from convex optimisation and reinforcement learning. Specifically, semi-definite relaxation (SDR), difference of concave functions (DC), and fractional programming techniques are employed to transform the non-convex optimisation problem into a convex form for optimising the BS beamforming vector and the power splitting ratio of the SWIPT. Then, by integrating meta-learning with the modified deep deterministic policy gradient (DDPG) and soft actor-critical (SAC) methods, a combinatorial reinforcement learning network is developed to optimise the element selection, gain and phase shift matrices of the active STAR-RIS. Our simulations show the effectiveness of the proposed resource allocation scheme. Furthermore, our proposed active STAR-RIS-based SWIPT system outperforms its passive counterpart by 57% on average.
△ Less
Submitted 23 March, 2024;
originally announced March 2024.
-
Meta Reinforcement Learning for Resource Allocation in Aerial Active-RIS-assisted Networks with Rate-Splitting Multiple Access
Authors:
Sajad Faramarzi,
Sepideh Javadi,
Farshad Zeinali,
Hosein Zarini,
Mohammad Robat Mili,
Mehdi Bennis,
Yonghui Li,
Kai-Kit Wong
Abstract:
Mounting a reconfigurable intelligent surface (RIS) on an unmanned aerial vehicle (UAV) holds promise for improving traditional terrestrial network performance. Unlike conventional methods deploying passive RIS on UAVs, this study delves into the efficacy of an aerial active RIS (AARIS). Specifically, the downlink transmission of an AARIS network is investigated, where the base station (BS) levera…
▽ More
Mounting a reconfigurable intelligent surface (RIS) on an unmanned aerial vehicle (UAV) holds promise for improving traditional terrestrial network performance. Unlike conventional methods deploying passive RIS on UAVs, this study delves into the efficacy of an aerial active RIS (AARIS). Specifically, the downlink transmission of an AARIS network is investigated, where the base station (BS) leverages rate-splitting multiple access (RSMA) for effective interference management and benefits from the support of an AARIS for jointly amplifying and reflecting the BS's transmit signals. Considering both the non-trivial energy consumption of the active RIS and the limited energy storage of the UAV, we propose an innovative element selection strategy for optimizing the on/off status of RIS elements, which adaptively and remarkably manages the system's power consumption. To this end, a resource management problem is formulated, aiming to maximize the system energy efficiency (EE) by jointly optimizing the transmit beamforming at the BS, the element activation, the phase shift and the amplification factor at the RIS, the RSMA common data rate at users, as well as the UAV's trajectory. Due to the dynamicity nature of UAV and user mobility, a deep reinforcement learning (DRL) algorithm is designed for resource allocation, utilizing meta-learning to adaptively handle fast time-varying system dynamics. Simulations indicate that incorporating an active RIS at the UAV leads to substantial EE gain, compared to passive RIS-aided UAV. We observe the superiority of the RSMA-based AARIS system in terms of EE, compared to existing approaches adopting non-orthogonal multiple access (NOMA).
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
SLIPT in Joint Dimming Multi-LED OWC Systems with Rate Splitting Multiple Access
Authors:
Sepideh Javadi,
Sajad Faramarzi,
Farshad Zeinali,
Hosein Zarini,
Mohammad Robat Mili,
Panagiotis D. Diamantoulakis,
Eduard Jorswieck,
George K. Karagiannidis
Abstract:
Optical wireless communication (OWC) systems with multiple light-emitting diodes (LEDs) have recently been explored to support energy-limited devices via simultaneous lightwave information and power transfer (SLIPT). The energy consumption, however, becomes considerable by increasing the number of incorporated LEDs. This paper proposes a joint dimming (JD) scheme that lowers the consumed power of…
▽ More
Optical wireless communication (OWC) systems with multiple light-emitting diodes (LEDs) have recently been explored to support energy-limited devices via simultaneous lightwave information and power transfer (SLIPT). The energy consumption, however, becomes considerable by increasing the number of incorporated LEDs. This paper proposes a joint dimming (JD) scheme that lowers the consumed power of a SLIPT-enabled OWC system by controlling the number of active LEDs. We further enhance the data rate of this system by utilizing rate splitting multiple access (RSMA). More specifically, we formulate a data rate maximization problem to optimize the beamforming design, LED selection and RSMA rate adaptation that guarantees the power budget of the OWC transmitter, as well as the quality-of-service (QoS) and an energy harvesting level for users. We propose a dynamic resource allocation solution based on proximal policy optimization (PPO) reinforcement learning. In simulations, the optimal dimming level is determined to initiate a trade-off between the data rate and power consumption. It is also verified that RSMA significantly improves the data rate.
△ Less
Submitted 28 February, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Resource Allocation in STAR-RIS-Aided SWIPT with RSMA via Meta-Learning
Authors:
Mojtaba Amiri,
Elaheh Vaezpour,
Sepideh Javadi,
Mohammad Robat Mili,
Halim Yanikomeroglu,
Mehdi Bennis
Abstract:
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a cutting-edge concept for the sixth-generation (6G) wireless networks. In this paper, we propose a novel system that incorporates STAR-RIS with simultaneous wireless information and power transfer (SWIPT) using rate splitting multiple access (RSMA). The proposed system facilitates communication from a mult…
▽ More
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a cutting-edge concept for the sixth-generation (6G) wireless networks. In this paper, we propose a novel system that incorporates STAR-RIS with simultaneous wireless information and power transfer (SWIPT) using rate splitting multiple access (RSMA). The proposed system facilitates communication from a multi-antenna base station (BS) to single-antenna users in a downlink transmission. The BS concurrently sends energy and information signals to multiple energy harvesting receivers (EHRs) and information data receivers (IDRs) with the support of a deployed STAR-RIS. Furthermore, an optimization is introduced to strike a balance between users' sum rate and the total harvested energy. To achieve this, an optimization problem is formulated to optimize the energy/information beamforming vectors at the BS, the phase shifts at the STAR-RIS, and the common message rate. Subsequently, we employ a meta deep deterministic policy gradient (Meta-DDPG) approach to solve the complex problem. Simulation results validate that the proposed algorithm significantly enhances both data rate and harvested energy in comparison to conventional DDPG.
△ Less
Submitted 6 May, 2024; v1 submitted 15 January, 2024;
originally announced January 2024.
-
Meta-Learning for Resource Allocation in Uplink Multi STAR-RIS-aided NOMA System
Authors:
Sepideh Javadi,
Armin Farhadi,
Mohammad Robat Mili,
Eduard Jorswieck,
Naofal Al-Dhahir
Abstract:
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a novel technology which enables the full-space coverage. In this letter, a multi STAR-RIS-aided system using non-orthogonal multiple access in an uplink transmission is considered, where the multi-order reflections among multiple STAR-RISs assist the transmission from the single-antenna users to the multi-…
▽ More
Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a novel technology which enables the full-space coverage. In this letter, a multi STAR-RIS-aided system using non-orthogonal multiple access in an uplink transmission is considered, where the multi-order reflections among multiple STAR-RISs assist the transmission from the single-antenna users to the multi-antenna base station. Specifically, the total sum rate maximization problem is solved by jointly optimizing the active beamforming, power allocation, transmission and reflection beamforming at the STAR-RIS, and user-STAR-RIS assignment. To solve the non-convex optimization problem, a novel deep reinforcement learning algorithm is proposed which integrates meta-learning and deep deterministic policy gradient (DDPG), denoted by Meta-DDPG. Numerical results demonstrate that our proposed Meta-DDPG algorithm outperforms the conventional DDPG algorithm with $53\%$ improvement, while multi-order reflections among multi STAR-RISs yields to $14.1\%$ enhancement in the total data rate.
△ Less
Submitted 25 May, 2024; v1 submitted 13 January, 2024;
originally announced January 2024.
-
OpinionConv: Conversational Product Search with Grounded Opinions
Authors:
Vahid Sadiri Javadi,
Martin Potthast,
Lucie Flek
Abstract:
When searching for products, the opinions of others play an important role in making informed decisions. Subjective experiences about a product can be a valuable source of information. This is also true in sales conversations, where a customer and a sales assistant exchange facts and opinions about products. However, training an AI for such conversations is complicated by the fact that language mo…
▽ More
When searching for products, the opinions of others play an important role in making informed decisions. Subjective experiences about a product can be a valuable source of information. This is also true in sales conversations, where a customer and a sales assistant exchange facts and opinions about products. However, training an AI for such conversations is complicated by the fact that language models do not possess authentic opinions for their lack of real-world experience. We address this problem by leveraging product reviews as a rich source of product opinions to ground conversational AI in true subjective narratives. With OpinionConv, we develop the first conversational AI for simulating sales conversations. To validate the generated conversations, we conduct several user studies showing that the generated opinions are perceived as realistic. Our assessors also confirm the importance of opinions as an informative basis for decision-making.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Adaptive Steganography Based on bargain Game
Authors:
Behbod Keshavarzi,
Hamidreza Navidi,
Parvaneh Asghari,
Seyyed Hamid Haji Seyyed Javadi
Abstract:
The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing…
▽ More
The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing security. The proposed model shows that it can be used both of the special domain and the transform domain, which are two important methods of steganography. For this purpose, an example of a special domain model is introduced in which, In the first step, the image is divided into $n \times n$ blocks, and in the second step using the graph coloring algorithm, pixels are considered to embed confidential information in each block. In the third step, regarding the bargaining method in game theory, each block plays the role of a player, that the competition between players is based on the defined goal function, and in the best blocks in terms of two criteria of capacity and security, which here means each block has a higher security-to-capacity ratio, so it has a higher priority, which is determined based on the bargaining model. Also, information embedded in LSB two bits. An example of a conversion domain method is also shows that security increases without decreasing in capacity. The conclusion is evaluated by three criteria: PSNR, histogram, and $ε-secure$ also, 2000 standard images were evaluated and observed that the proposed method improves the block methods of embedding information.
△ Less
Submitted 10 May, 2022; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Binary code optimization
Authors:
Parviz Gharehbagheri,
Sayeed Hamid Haji Sayeed Javadi,
Parvaneh Asghari,
Naser Gharehbagheri
Abstract:
This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. I…
▽ More
This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. It means that instead of the original codewords of each binary data, it replaced the Huffman codewords to reduce the data size. One of the features of this method is the result of positive compression for any type of binary data, that is, regardless of the size of the code table, the difference between the original data size and the data size after compression will be greater than or equal to zero. Another important and practical feature of this method is the use of symmetric codewords instead of the suggested codewords in order to create symmetry, reversibility and error resistance properties with two-way decoding.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Artificial Intelligence Hybrid Deep Learning Model for Groundwater Level Prediction Using MLP-ADAM
Authors:
Pejman Zarafshan,
Saman Javadi,
Abbas Roozbahani,
Seyed Mehdi Hashemy,
Payam Zarafshan,
Hamed Etezadi
Abstract:
Groundwater is the largest storage of freshwater resources, which serves as the major inventory for most of the human consumption through agriculture, industrial, and domestic water supply. In the fields of hydrological, some researchers applied a neural network to forecast rainfall intensity in space-time and introduced the advantages of neural networks compared to numerical models. Then, many re…
▽ More
Groundwater is the largest storage of freshwater resources, which serves as the major inventory for most of the human consumption through agriculture, industrial, and domestic water supply. In the fields of hydrological, some researchers applied a neural network to forecast rainfall intensity in space-time and introduced the advantages of neural networks compared to numerical models. Then, many researches have been conducted applying data-driven models. Some of them extended an Artificial Neural Networks (ANNs) model to forecast groundwater level in semi-confined glacial sand and gravel aquifer under variable state, pum** extraction and climate conditions with significant accuracy. In this paper, a multi-layer perceptron is applied to simulate groundwater level. The adaptive moment estimation optimization algorithm is also used to this matter. The root mean squared error, mean absolute error, mean squared error and the coefficient of determination ( ) are used to evaluate the accuracy of the simulated groundwater level. Total value of and RMSE are 0.9458 and 0.7313 respectively which are obtained from the model output. Results indicate that deep learning algorithms can demonstrate a high accuracy prediction. Although the optimization of parameters is insignificant in numbers, but due to the value of time in modelling setup, it is highly recommended to apply an optimization algorithm in modelling.
△ Less
Submitted 29 July, 2021;
originally announced July 2021.
-
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case
Authors:
V. Chegeni,
H. Haj Seyyed javadi,
M. R Moazami Goudarzi,
A. Rezakhani
Abstract:
Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban traffic management system based on IoT can be vital.…
▽ More
Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban traffic management system based on IoT can be vital. Therefore, this paper focused on security in urban traffic based on using RFID. In our scheme, RFID tags chose as the purpose of this article. We, in this paper, present a mutual authentication protocol that leads to privacy based on hybrid cryptography. Also, an authentication process with RFID tags is proposed that can be read at high speed. The protocol has attempted to reduce the complexity of computing. At the same time, the proposed method can withstand attacks such as spoofing of tag and reader, tag tracking, and replay attack.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices
Authors:
Parvaneh Asghari,
Seyyed Hamid Haj Seyyed Javadi
Abstract:
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed…
▽ More
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed S-Box is analytically evaluated using performance criteria including bijection, nonlinearity, strict avalanche effect, and algebraic degree. The evaluation results endorse that the offered S-Box production algorithm is considerably an effective way to generate cryptographic strong S-Box.
△ Less
Submitted 26 February, 2021;
originally announced February 2021.
-
A novel key pre-distribution scheme based on $μ$-PBIBD combinatorial design in the resource-constrained IoT network
Authors:
Akbar Morshed Aski,
Hamid Haj Seyyed Javadi
Abstract:
In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained devices deployment in the environment. Also, in orde…
▽ More
In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained devices deployment in the environment. Also, in order to reduce the shared key discovery computing and communication overhead, the use of combinatorial design in key pre-distribution has been proposed as a solution in recent years. In this study, a $μ$-PBIBD combinatorial design is introduced and constructed and the map** of such design as a key pre-distribution scheme in the resource-constrained IoT network is explained. Through using such key pre-distribution scheme, more keys are obtained for communication between two devices in the IoT network. This means that there will be a maximum of q + 2 keys between the two devices in the network, where q is the prime power, that is, instead of having a common key for a direct secure connection, the two devices can have q + 2 common keys in their key chain. Accordingly, we would increase the resilience of the key pre-distribution scheme compared to the SBIBD, TD, Trade-KP, UKP *, RD * and 2-D $μ$-PBIBD designs.
Keywords: resource-constrained IoT network; combinatorial design; $μ$-PBIBD; resilience.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
Prediction-Based Power Oversubscription in Cloud Platforms
Authors:
Alok Kumbhare,
Reza Azimi,
Ioannis Manousakis,
Anand Bonde,
Felipe Frujeri,
Nithish Mahalingam,
Pulkit Misra,
Seyyed Ahmad Javadi,
Bianca Schroeder,
Marcus Fontoura,
Ricardo Bianchini
Abstract:
Datacenter designers rely on conservative estimates of IT equipment power draw to provision resources. This leaves resources underutilized and requires more datacenters to be built. Prior work has used power cap** to shave the rare power peaks and add more servers to the datacenter, thereby oversubscribing its resources and lowering capital costs. This works well when the workloads and their ser…
▽ More
Datacenter designers rely on conservative estimates of IT equipment power draw to provision resources. This leaves resources underutilized and requires more datacenters to be built. Prior work has used power cap** to shave the rare power peaks and add more servers to the datacenter, thereby oversubscribing its resources and lowering capital costs. This works well when the workloads and their server placements are known. Unfortunately, these factors are unknown in public clouds, forcing providers to limit the oversubscription so that performance is never impacted.
In this paper, we argue that providers can use predictions of workload performance criticality and virtual machine (VM) resource utilization to increase oversubscription. This poses many challenges, such as identifying the performance-critical workloads from black-box VMs, creating support for criticality-aware power management, and increasing oversubscription while limiting the impact of cap**. We address these challenges for the hardware and software infrastructures of Microsoft Azure. The results show that we enable a 2x increase in oversubscription with minimum impact to critical workloads.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Radar networks: A review of features and challenges
Authors:
S. Hamed Javadi,
Alfonso Farina
Abstract:
Networks of multiple radars are typically used for improving the coverage and tracking accuracy. Recently, such networks have facilitated deployment of commercial radars for civilian applications such as healthcare, gesture recognition, home security, and autonomous automobiles. They exploit advanced signal processing techniques together with efficient data fusion methods in order to yield high pe…
▽ More
Networks of multiple radars are typically used for improving the coverage and tracking accuracy. Recently, such networks have facilitated deployment of commercial radars for civilian applications such as healthcare, gesture recognition, home security, and autonomous automobiles. They exploit advanced signal processing techniques together with efficient data fusion methods in order to yield high performance of event detection and tracking. This paper reviews outstanding features of radar networks, their challenges, and their state-of-the-art solutions from the perspective of signal processing. Each discussed subject can be evolved as a hot research topic.
△ Less
Submitted 28 March, 2020;
originally announced March 2020.
-
Monitoring Misuse for Accountable 'Artificial Intelligence as a Service'
Authors:
Seyyed Ahmad Javadi,
Richard Cloete,
Jennifer Cobbe,
Michelle Seng Ah Lee,
Jatinder Singh
Abstract:
AI is increasingly being offered 'as a service' (AIaaS). This entails service providers offering customers access to pre-built AI models and services, for tasks such as object recognition, text translation, text-to-voice conversion, and facial recognition, to name a few. The offerings enable customers to easily integrate a range of powerful AI-driven capabilities into their applications. Customers…
▽ More
AI is increasingly being offered 'as a service' (AIaaS). This entails service providers offering customers access to pre-built AI models and services, for tasks such as object recognition, text translation, text-to-voice conversion, and facial recognition, to name a few. The offerings enable customers to easily integrate a range of powerful AI-driven capabilities into their applications. Customers access these models through the provider's APIs, sending particular data to which models are applied, the results of which returned. However, there are many situations in which the use of AI can be problematic. AIaaS services typically represent generic functionality, available 'at a click'. Providers may therefore, for reasons of reputation or responsibility, seek to ensure that the AIaaS services they offer are being used by customers for 'appropriate' purposes. This paper introduces and explores the concept whereby AIaaS providers uncover situations of possible service misuse by their customers. Illustrated through topical examples, we consider the technical usage patterns that could signal situations warranting scrutiny, and raise some of the legal and technical challenges of monitoring for misuse. In all, by introducing this concept, we indicate a potential area for further inquiry from a range of perspectives.
△ Less
Submitted 14 January, 2020;
originally announced January 2020.
-
Surface Forces Apparatus Measurements of Interactions between Rough and Reactive Calcite Surfaces
Authors:
Joanna Dziadkowiec,
Shaghayegh Javadi,
Jon E. Bratvold,
Ola Nilsen,
Anja Røyne
Abstract:
Nm-range forces acting between calcite surfaces in water affect macroscopic properties of carbonate rocks and calcite-based granular materials, and are significantly influenced by calcite surface recrystallization. We suggest that the repulsive mechanical effects related to nm-scale surface recrystallization of calcite in water could be partially responsible for the observed decrease of cohesion i…
▽ More
Nm-range forces acting between calcite surfaces in water affect macroscopic properties of carbonate rocks and calcite-based granular materials, and are significantly influenced by calcite surface recrystallization. We suggest that the repulsive mechanical effects related to nm-scale surface recrystallization of calcite in water could be partially responsible for the observed decrease of cohesion in calcitic rocks saturated with water. Using the Surface Forces Apparatus (SFA), we simultaneously followed the calcite reactivity and measured the forces in water in two surface configurations: between two rough calcite surfaces (CC), or between rough calcite and a smooth mica surface (CM). We used nm-scale rough, polycrystalline calcite films prepared by Atomic Layer Deposition (ALD). We measured only repulsive forces in CC in CaCO$_3$-saturated water, which was related to hydration effects and/or roughness. Velocity-dependent adhesion forces were measured in monoethylene glycol (MEG) for relatively smooth surfaces in CC. Adhesive or repulsive forces were measured in CM in CaCO$_3$-saturated water depending on the calcite roughness, and the adhesion was likely enhanced by electrostatic effects. The pull-off adhesive force in CM became stronger with time and this increase was correlated with a decrease of roughness at contacts, which parameter could be estimated from the measured force-distance curves. Reactivity of calcite was affected by mass transport across nm to $μ$m-thick gaps between the surfaces. Major roughening was observed only for the smoothest calcite films, where the gaps between the two opposing surfaces were nm-thick over $μ$m-sized areas, and led to a force of crystallization that could overcome confining pressures of the order of MPa.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
Learning to Project in Multi-Objective Binary Linear Programming
Authors:
Alvaro Sierra-Altamiranda,
Hadi Charkhgard,
Iman Dayarian,
Ali Eshragh,
Sorna Javadi
Abstract:
In this paper, we investigate the possibility of improving the performance of multi-objective optimization solution approaches using machine learning techniques. Specifically, we focus on multi-objective binary linear programs and employ one of the most effective and recently developed criterion space search algorithms, the so-called KSA, during our study. This algorithm computes all nondominated…
▽ More
In this paper, we investigate the possibility of improving the performance of multi-objective optimization solution approaches using machine learning techniques. Specifically, we focus on multi-objective binary linear programs and employ one of the most effective and recently developed criterion space search algorithms, the so-called KSA, during our study. This algorithm computes all nondominated points of a problem with p objectives by searching on a projected criterion space, i.e., a (p-1)-dimensional criterion apace. We present an effective and fast learning approach to identify on which projected space the KSA should work. We also present several generic features/variables that can be used in machine learning techniques for identifying the best projected space. Finally, we present an effective bi-objective optimization based heuristic for selecting the best subset of the features to overcome the issue of overfitting in learning. Through an extensive computational study over 2000 instances of tri-objective Knapsack and Assignment problems, we demonstrate that an improvement of up to 12% in time can be achieved by the proposed learning method compared to a random selection of the projected space.
△ Less
Submitted 30 January, 2019;
originally announced January 2019.
-
The Legendre Spectral-Collocation method for a class of fractional integral equations
Authors:
A. Yousefi,
S. Javadi,
E. Babolian
Abstract:
In this paper, we consider spectral-collocation method base on Legendre-Gauss-Lobatto point. We present a computational method for solving a class of fractional integral equation of the second kind. Then based on Legendre-Gauss-Lobatto point and using, we derive a system of algebraic equations. The method is illustrated by applications and the results obtained are compared with the exact solutions…
▽ More
In this paper, we consider spectral-collocation method base on Legendre-Gauss-Lobatto point. We present a computational method for solving a class of fractional integral equation of the second kind. Then based on Legendre-Gauss-Lobatto point and using, we derive a system of algebraic equations. The method is illustrated by applications and the results obtained are compared with the exact solutions in open literature. The obtained numerical results show that our proposed method is efficient and accurate for fractional integral equations of second kind. In addition, we prove that the error of the approximate solution decay exponentially in L^2 norm.
△ Less
Submitted 3 February, 2018;
originally announced February 2018.
-
Convergence analysis of the Chebyshev-Legendre spectral method for a class of Fredholm fractional integro-differential equations
Authors:
A. Yousefi,
S. Javadi,
E. Babolian,
E. Moradi
Abstract:
In this paper, we propose and analyze a spectral Chebyshev-Legendre approximation for fractional order integro-differential equations of Fredholm type. The fractional derivative is described in the Caputo sense. Our proposed method is illustrated by considering some examples whose exact solutions are available. We prove that the error of the approximate solution decay exponentially in L^2-norm.
In this paper, we propose and analyze a spectral Chebyshev-Legendre approximation for fractional order integro-differential equations of Fredholm type. The fractional derivative is described in the Caputo sense. Our proposed method is illustrated by considering some examples whose exact solutions are available. We prove that the error of the approximate solution decay exponentially in L^2-norm.
△ Less
Submitted 22 January, 2018; v1 submitted 2 January, 2018;
originally announced January 2018.
-
The convergence of operational Tau method for solving a class of nonlinear Fredholm fractional integro-differential equations on Legendre basis
Authors:
A. Yousefi,
E. Babolian,
S. Javadi
Abstract:
In this paper, we investigate approximate solutions for nonlinear Fredholm integro-differential equations of fractional order. We present an operational Tau method by obtaining the Tau matrix representation. We solve a special class of nonlinear Fredholm integro-differential equations based on Legendre-Tau method. By using the Sobolev inequality and some of Banach algebra properties, we prove that…
▽ More
In this paper, we investigate approximate solutions for nonlinear Fredholm integro-differential equations of fractional order. We present an operational Tau method by obtaining the Tau matrix representation. We solve a special class of nonlinear Fredholm integro-differential equations based on Legendre-Tau method. By using the Sobolev inequality and some of Banach algebra properties, we prove that our proposed method converges to the exact solution in L^2-norm.
△ Less
Submitted 12 December, 2017; v1 submitted 25 November, 2017;
originally announced November 2017.
-
Detecting Community Structure in Dynamic Social Networks Using the Concept of Leadership
Authors:
Saeed Haji Seyed Javadi,
Pedram Gharani,
Shahram Khadivi
Abstract:
Detecting community structure in social networks is a fundamental problem empowering us to identify groups of actors with similar interests. There have been extensive works focusing on finding communities in static networks, however, in reality, due to dynamic nature of social networks, they are evolving continuously. Ignoring the dynamic aspect of social networks, neither allows us to capture evo…
▽ More
Detecting community structure in social networks is a fundamental problem empowering us to identify groups of actors with similar interests. There have been extensive works focusing on finding communities in static networks, however, in reality, due to dynamic nature of social networks, they are evolving continuously. Ignoring the dynamic aspect of social networks, neither allows us to capture evolutionary behavior of the network nor to predict the future status of individuals. Aside from being dynamic, another significant characteristic of real-world social networks is the presence of leaders, i.e. nodes with high degree centrality having a high attraction to absorb other members and hence to form a local community. In this paper, we devised an efficient method to incrementally detect communities in highly dynamic social networks using the intuitive idea of importance and persistence of community leaders over time. Our proposed method is able to find new communities based on the previous structure of the network without recomputing them from scratch. This unique feature, enables us to efficiently detect and track communities over time rapidly. Experimental results on the synthetic and real-world social networks demonstrate that our method is both effective and efficient in discovering communities in dynamic social networks.
△ Less
Submitted 6 November, 2017;
originally announced November 2017.
-
Bernstein modal basis: application to the spectral Petrov-Galerkin method for fractional partial differential equations
Authors:
Mostafa Jani,
Esmail Babolian,
Shahnam Javadi
Abstract:
In the spectral Petrov-Galerkin methods, the trial and test functions are required to satisfy particular boundary conditions. By a suitable linear combination of orthogonal polynomials, a basis, that is called the modal basis, is obtained. In this paper, we extend this idea to the non-orthogonal dual Bernstein polynomials. A compact general formula is derived for the modal basis functions based on…
▽ More
In the spectral Petrov-Galerkin methods, the trial and test functions are required to satisfy particular boundary conditions. By a suitable linear combination of orthogonal polynomials, a basis, that is called the modal basis, is obtained. In this paper, we extend this idea to the non-orthogonal dual Bernstein polynomials. A compact general formula is derived for the modal basis functions based on dual Bernstein polynomials. Then, we present a Bernstein-spectral Petrov-Galerkin method for a class of time fractional partial differential equations with Caputo derivative. It is shown that the method leads to banded sparse linear systems for problems with constant coefficient. Some numerical examples are provided to show the efficiency and the spectral accuracy of the method.
△ Less
Submitted 26 June, 2016; v1 submitted 14 June, 2016;
originally announced June 2016.
-
Bernstein dual-Petrov-Galerkin method: application to 2D time fractional diffusion equation
Authors:
Mostafa Jani,
Shahnam Javadi,
Esmail Babolian,
Dambaru Bhatta
Abstract:
In this paper, we develop a Bernstein dual-Petrov-Galerkin method for the numerical simulation of a two-dimensional fractional diffusion equation. A spectral discretization is applied by introducing suitable combinations of dual Bernstein polynomials as the test functions and the Bernstein polynomials as the trial ones. We derive the exact sparse operational matrix of differentiation for the dual…
▽ More
In this paper, we develop a Bernstein dual-Petrov-Galerkin method for the numerical simulation of a two-dimensional fractional diffusion equation. A spectral discretization is applied by introducing suitable combinations of dual Bernstein polynomials as the test functions and the Bernstein polynomials as the trial ones. We derive the exact sparse operational matrix of differentiation for the dual Bernstein basis which provides a matrix based approach for the spatial discretization. It is shown that the method leads to banded linear systems that can be solved efficiently. The stability and convergence of the proposed method is discussed. Finally, some numerical examples are provided to support the theoretical claims and to show the accuracy and efficiency of the method.
△ Less
Submitted 8 May, 2017; v1 submitted 22 May, 2016;
originally announced May 2016.
-
A numerical scheme for space-time fractional advection-dispersion equation
Authors:
S. Javadi,
M. Jani,
E. Babolian
Abstract:
In this paper, we develop a numerical resolution of the space-time fractional advection-dispersion equation. After time discretization, we utilize collocation technique and implement a product integration method in order to simplify the evaluation of the terms involving spatial fractional order derivatives. Then utilizing Bernstein polynomials as basis, the problem is transformed into a linear sys…
▽ More
In this paper, we develop a numerical resolution of the space-time fractional advection-dispersion equation. After time discretization, we utilize collocation technique and implement a product integration method in order to simplify the evaluation of the terms involving spatial fractional order derivatives. Then utilizing Bernstein polynomials as basis, the problem is transformed into a linear system of algebraic equations. Error analysis and order of convergence for the proposed method are also discussed. Some numerical experiments are presented to demonstrate the effectiveness of the proposed method and to confirm the analytic results.
△ Less
Submitted 8 May, 2017; v1 submitted 21 December, 2015;
originally announced December 2015.
-
Banded operational matrices for Bernstein polynomials and application to the fractional advection-dispersion equation
Authors:
M. Jani,
E. Babolian,
S. Javadi,
D. Bhatta
Abstract:
In the papers dealing with derivation and applications of operational matrices of Bernstein polynomials, a basis transformation, commonly a transformation to power basis, is used. The main disadvantage of this method is that the transformation may be ill-conditioned. Moreover, when applied to the numerical simulation of a functional differential equation, it leads to dense operational matrices and…
▽ More
In the papers dealing with derivation and applications of operational matrices of Bernstein polynomials, a basis transformation, commonly a transformation to power basis, is used. The main disadvantage of this method is that the transformation may be ill-conditioned. Moreover, when applied to the numerical simulation of a functional differential equation, it leads to dense operational matrices and so a dense coefficient matrix is obtained. In this paper, we present a new property for Bernstein polynomials. Using this property, we build exact banded operational matrices for derivatives of Bernstein polynomials. Next, as an application, we propose a new numerical method based on a Petrov-Galerkin variational formulation and the new operational matrices utilizing the dual Bernstein basis for the time-fractional advection-dispersion equation. Finally, we show that the proposed method leads to a narrow-banded linear system and so less computational effort is required to obtain the desired accuracy for the approximate solution. Some numerical examples are provided to demonstrate the efficiency of the method.
△ Less
Submitted 15 October, 2016; v1 submitted 21 December, 2015;
originally announced December 2015.
-
On a generalization of McCoy Rings
Authors:
Mohammad Vahdani Mehrabadi,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
We introduce Central McCoy rings, which are a generalization of McCoy rings and investigate their properties. For a ring R, we prove that R is right Central McCoy if and only if the polynomial ring R[x] is right Central McCoy. Also, we give some examples to show that if R is right Central McCoy, then Mn(R) and Tn(R) are not necessary right Central McCoy, but Dn(R) and Vn(R) are right Central McCoy…
▽ More
We introduce Central McCoy rings, which are a generalization of McCoy rings and investigate their properties. For a ring R, we prove that R is right Central McCoy if and only if the polynomial ring R[x] is right Central McCoy. Also, we give some examples to show that if R is right Central McCoy, then Mn(R) and Tn(R) are not necessary right Central McCoy, but Dn(R) and Vn(R) are right Central McCoy, where Dn(R) and Vn(R) are the subrings of the triangular matrices with constant main diagonal and constant main diagonals, respectively.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
On a generalization of NC-McCoy Rings
Authors:
Mohammad Vahdani Mehrabadi,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
In the present paper we concentrate on a natural generalization of NC-McCoy rings that is called J-McCoy and investigate their properties. We prove that local rings are J-McCoy. Also, for an abelian ring R, we show that R is J-McCoy if and only if eR is J-McCoy, where e is an idempotent element of R. Moreover, we give an example to show that the J-McCoy property does not pass Mn(R), but S(R; n);A(…
▽ More
In the present paper we concentrate on a natural generalization of NC-McCoy rings that is called J-McCoy and investigate their properties. We prove that local rings are J-McCoy. Also, for an abelian ring R, we show that R is J-McCoy if and only if eR is J-McCoy, where e is an idempotent element of R. Moreover, we give an example to show that the J-McCoy property does not pass Mn(R), but S(R; n);A(R; n);B(R; n) and T(R; n) are J-McCoy
△ Less
Submitted 12 October, 2014;
originally announced October 2014.
-
On A Generalization of Weak Armendariz Rings
Authors:
Mahboubeh Sanaei,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
We introduce the notion of J-Armendariz rings, which are a generalization of weak Armendariz rings and investigate their properties. We show that any local ring is J-Armendariz, and then fined a local ring that is not weak Armendariz.
We introduce the notion of J-Armendariz rings, which are a generalization of weak Armendariz rings and investigate their properties. We show that any local ring is J-Armendariz, and then fined a local ring that is not weak Armendariz.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
On Central Skew Armendariz rings
Authors:
Mahboubeh Sanaei,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
For a ring endomirphism, we introduce the central skew Armendariz rings, which are a generalization of skew Armendariz rings and central Armendariz rings, and investigate their properties.
For a ring endomirphism, we introduce the central skew Armendariz rings, which are a generalization of skew Armendariz rings and central Armendariz rings, and investigate their properties.
△ Less
Submitted 29 September, 2014;
originally announced September 2014.
-
About the relative importance of compressional heating and current dissipation for the formation of coronal X-ray Bright Points
Authors:
S. Javadi,
J. Buechner,
A. Otto,
J. C. Santos
Abstract:
Context. The solar corona is heated to high temperatures of the order of 10^{6} K. The coronal energy budget and specifically possible mechanisms of coronal heating (wave, DC-electric fields, ..) are poorly understood. This is particularly true as far as the formation of X-ray bright points (BPs) is concerned. Aims. Investigation of the energy budget with emphasis on the relative role and contribu…
▽ More
Context. The solar corona is heated to high temperatures of the order of 10^{6} K. The coronal energy budget and specifically possible mechanisms of coronal heating (wave, DC-electric fields, ..) are poorly understood. This is particularly true as far as the formation of X-ray bright points (BPs) is concerned. Aims. Investigation of the energy budget with emphasis on the relative role and contribution of adiabatic compression versus current dissipation to the formation of coronal BPs. Methods. Three-dimensional resistive MHD simulation starts with the extrapolation of the observed magnetic field from SOHO/MDI magnetograms, which are associated with a BP observed on 19 December 2006 by Hinode. The initial radially non-uniform plasma density and temperature distribution is in accordance with an equilibrium model of chromosphere and corona. The plasma motion is included in the model as a source of energy for coronal heating. Results. Investigation of the energy conversion due to Lorentz force, pressure gradient force and Ohmic current dissipation for this bright point shows the minor effect of Joule heating in comparison to the work done by pressure gradient force in increasing the thermal energy by adiabatic compression. Especially at the time when the temperature enhancement above the bright point starts to form, compressional effects are quite dominant over the direct Joule heating. Conclusions. Choosing non-realistic high resistivity in compressible MHD models for simulation of solar corona can lead to unphysical consequences for the energy balance analysis, especially when local thermal energy enhancements are being considered.
△ Less
Submitted 9 December, 2010; v1 submitted 3 December, 2010;
originally announced December 2010.