-
Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines
Authors:
Mazen Mohamad,
Ramana Reddy Avula,
Peter Folkesson,
Pierre Kleberger,
Aria Mirzai,
Martin Skoglund,
Marvin Damschen
Abstract:
The increased importance of cybersecurity in autonomous machinery is becoming evident in the forestry domain. Forestry worksites are becoming more complex with the involvement of multiple systems and system of systems. Hence, there is a need to investigate how to address cybersecurity challenges for autonomous systems of systems in the forestry domain. Using a literature review and adapting standa…
▽ More
The increased importance of cybersecurity in autonomous machinery is becoming evident in the forestry domain. Forestry worksites are becoming more complex with the involvement of multiple systems and system of systems. Hence, there is a need to investigate how to address cybersecurity challenges for autonomous systems of systems in the forestry domain. Using a literature review and adapting standards from similar domains, as well as collaborative sessions with domain experts, we identify challenges towards CE-certified autonomous forestry machines focusing on cybersecurity and safety. Furthermore, we discuss the relationship between safety and cybersecurity risk assessment and their relation to AI, highlighting the need for a holistic methodology for their assurance.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Managing Security Evidence in Safety-Critical Organizations
Authors:
Mazen Mohamad,
Jan-Philipp Steghöfer,
Eric Knauss,
Riccardo Scandariato
Abstract:
With the increasing prevalence of open and connected products, cybersecurity has become a serious issue in safety-critical domains such as the automotive industry. As a result, regulatory bodies have become more stringent in their requirements for cybersecurity, necessitating security assurance for products developed in these domains. In response, companies have implemented new or modified process…
▽ More
With the increasing prevalence of open and connected products, cybersecurity has become a serious issue in safety-critical domains such as the automotive industry. As a result, regulatory bodies have become more stringent in their requirements for cybersecurity, necessitating security assurance for products developed in these domains. In response, companies have implemented new or modified processes to incorporate security into their product development lifecycle, resulting in a large amount of evidence being created to support claims about the achievement of a certain level of security. However, managing evidence is not a trivial task, particularly for complex products and systems. This paper presents a qualitative interview study conducted in six companies on the maturity of managing security evidence in safety-critical organizations. We find that the current maturity of managing security evidence is insufficient for the increasing requirements set by certification authorities and standardization bodies. Organisations currently fail to identify relevant artifacts as security evidence and manage this evidence on an organizational level. One part of the reason are educational gaps, the other a lack of processes. The impact of AI on the management of security evidence is still an open question
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice
Authors:
Ranim Khojah,
Mazen Mohamad,
Philipp Leitner,
Francisco Gomes de Oliveira Neto
Abstract:
Large Language Models (LLMs) are frequently discussed in academia and the general public as support tools for virtually any use case that relies on the production of text, including software engineering. Currently there is much debate, but little empirical evidence, regarding the practical usefulness of LLM-based tools such as ChatGPT for engineers in industry. We conduct an observational study of…
▽ More
Large Language Models (LLMs) are frequently discussed in academia and the general public as support tools for virtually any use case that relies on the production of text, including software engineering. Currently there is much debate, but little empirical evidence, regarding the practical usefulness of LLM-based tools such as ChatGPT for engineers in industry. We conduct an observational study of 24 professional software engineers who have been using ChatGPT over a period of one week in their jobs, and qualitatively analyse their dialogues with the chatbot as well as their overall experience (as captured by an exit survey). We find that, rather than expecting ChatGPT to generate ready-to-use software artifacts (e.g., code), practitioners more often use ChatGPT to receive guidance on how to solve their tasks or learn about a topic in more abstract terms. We also propose a theoretical framework for how (i) purpose of the interaction, (ii) internal factors (e.g., the user's personality), and (iii) external factors (e.g., company policy) together shape the experience (in terms of perceived usefulness and trust). We envision that our framework can be used by future research to further the academic discussion on LLM usage by software engineering practitioners, and to serve as a reference point for the design of future empirical LLM research in this domain.
△ Less
Submitted 21 May, 2024; v1 submitted 23 April, 2024;
originally announced April 2024.
-
Estimation Large- Scale Fading Channels for Transmit Orthogonal Pilot Reuse Sequences in Massive MIMO System
Authors:
Qazwan Abdullah,
Nor Shahida Mohd Shah,
Shipun Hamzah,
Adeb Salh,
Mahathir Mohamad,
Shahilah Nordin,
Maisarah Abu,
Mohammed Abdo Albaom,
safwan sadeq
Abstract:
Massive multiple-input multiple-output (MIMO) is a critical technology for future fifth-generation (5G) systems. Reduced pilot contamination (PC) enhanced system performance, and reduced inter-cell interference and improved channel estimation. However, because the pilot sequence transmitted by users in a single cell to neighboring cells is not orthogonal, massive MIMO systems are still constrained…
▽ More
Massive multiple-input multiple-output (MIMO) is a critical technology for future fifth-generation (5G) systems. Reduced pilot contamination (PC) enhanced system performance, and reduced inter-cell interference and improved channel estimation. However, because the pilot sequence transmitted by users in a single cell to neighboring cells is not orthogonal, massive MIMO systems are still constrained. We propose channel evaluation using orthogonal pilot reuse sequences (PRS) and zero forced (ZF) pre-coding techniques to eliminate channel quality in end users with poor channel quality based on channel evaluation, large-scale shutdown evaluation, and analysis of maximum transmission efficiency. We derived the lower bounds on the downlink data rate (DR) and signal-to-interference noise ratio (SINR) that can be achieved based on PRS assignment to a group of users where the number of antenna elements mitigated the interference when the number of antennas reaches infinity. The channel coherence interval limitation, the orthogonal PRS cannot be allocated to all UEs in each cell. The short coherence intervals able to reduce the PC and improve the quality of channel. The results of the modelling showed that higher DR can be achieved due to better channel evaluation and lower loss.
△ Less
Submitted 20 October, 2022;
originally announced December 2022.
-
TEP-GNN: Accurate Execution Time Prediction of Functional Tests using Graph Neural Networks
Authors:
Hazem Peter Samoaa,
Antonio Longa,
Mazen Mohamad,
Morteza Haghir Chehreghani,
Philipp Leitner
Abstract:
Predicting the performance of production code prior to actually executing or benchmarking it is known to be highly challenging. In this paper, we propose a predictive model, dubbed TEP-GNN, which demonstrates that high-accuracy performance prediction is possible for the special case of predicting unit test execution times. TEP-GNN uses FA-ASTs, or flow-augmented ASTs, as a graph-based code represe…
▽ More
Predicting the performance of production code prior to actually executing or benchmarking it is known to be highly challenging. In this paper, we propose a predictive model, dubbed TEP-GNN, which demonstrates that high-accuracy performance prediction is possible for the special case of predicting unit test execution times. TEP-GNN uses FA-ASTs, or flow-augmented ASTs, as a graph-based code representation approach, and predicts test execution times using a powerful graph neural network (GNN) deep learning model. We evaluate TEP-GNN using four real-life Java open source programs, based on 922 test files mined from the projects' public repositories. We find that our approach achieves a high Pearson correlation of 0.789, considerable outperforming a baseline deep learning model. However, we also find that more work is needed for trained models to generalize to unseen projects. Our work demonstrates that FA-ASTs and GNNs are a feasible approach for predicting absolute performance values, and serves as an important intermediary step towards being able to predict the performance of arbitrary code prior to execution.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
FedOS: using open-set learning to stabilize training in federated learning
Authors:
Mohamad Mohamad,
Julian Neubert,
Juan Segundo Argayo
Abstract:
Federated Learning is a recent approach to train statistical models on distributed datasets without violating privacy constraints. The data locality principle is preserved by sharing the model instead of the data between clients and the server. This brings many advantages but also poses new challenges. In this report, we explore this new research area and perform several experiments to deepen our…
▽ More
Federated Learning is a recent approach to train statistical models on distributed datasets without violating privacy constraints. The data locality principle is preserved by sharing the model instead of the data between clients and the server. This brings many advantages but also poses new challenges. In this report, we explore this new research area and perform several experiments to deepen our understanding of what these challenges are and how different problem settings affect the performance of the final model. Finally, we present a novel approach to one of these challenges and compare it to other methods found in literature.
△ Less
Submitted 26 August, 2022; v1 submitted 22 August, 2022;
originally announced August 2022.
-
Real-time Autonomous Robot for Object Tracking using Vision System
Authors:
Qazwan Abdullah,
Nor Shahida Mohd Shah,
Mahathir Mohamad,
Muaammar Hadi Kuzman Ali,
Nabil Farah,
Adeb Salh,
Maged Aboali,
Mahmod Abd Hakim Mohamad,
Abdu Saif
Abstract:
Researchers and robotic development groups have recently started paying special attention to autonomous mobile robot navigation in indoor environments using vision sensors. The required data is provided for robot navigation and object detection using a camera as a sensor. The aim of the project is to construct a mobile robot that has integrated vision system capability used by a webcam to locate,…
▽ More
Researchers and robotic development groups have recently started paying special attention to autonomous mobile robot navigation in indoor environments using vision sensors. The required data is provided for robot navigation and object detection using a camera as a sensor. The aim of the project is to construct a mobile robot that has integrated vision system capability used by a webcam to locate, track and follow a moving object. To achieve this task, multiple image processing algorithms are implemented and processed in real-time. A mini-laptop was used for collecting the necessary data to be sent to a PIC microcontroller that turns the processes of data obtained to provide the robot's proper orientation. A vision system can be utilized in object recognition for robot control applications. The results demonstrate that the proposed mobile robot can be successfully operated through a webcam that detects the object and distinguishes a tennis ball based on its color and shape.
△ Less
Submitted 26 April, 2021;
originally announced May 2021.
-
Internet of Fly Things For Post-Disaster Recovery Based on Multi-environment
Authors:
Abdu Saif,
Kaharudin Bin Dimyati,
Kamarul Ariffin Bin Noordin,
Nor Shahida Mohd Shah,
Qazwan Abdullah,
Fadhil Mukhlif,
Mahathir Mohamad
Abstract:
Natural disasters such as floods and earthquakes immensely impact the telecommunication network infrastructure, leading to the malfunctioning and interruption of wireless services. Consequently, the user devices under the disaster zone are unable to access the cellular base stations. Wireless coverage on an unmanned aerial vehicle (UAV) is considered for providing coverage service to ground user d…
▽ More
Natural disasters such as floods and earthquakes immensely impact the telecommunication network infrastructure, leading to the malfunctioning and interruption of wireless services. Consequently, the user devices under the disaster zone are unable to access the cellular base stations. Wireless coverage on an unmanned aerial vehicle (UAV) is considered for providing coverage service to ground user devices in disaster events. This work evaluated the efficient performance of wireless coverage services of UAVs to provide the internet to fly things to help recover the communications link in a natural disaster in multi environments. The results demonstrate the line of sight, nonline of sight, path loss, and coverage probability for the radio propagation environment scenario. Therefore, the path loss and coverage probability are affected by the user devices' elevation angle and distance in the multi-environment system. The user position's optimum user device distance and elevation angle are also investigated to improve the coverage probability, which could be especially useful for the UAV deployment design.
△ Less
Submitted 8 May, 2021; v1 submitted 18 April, 2021;
originally announced April 2021.
-
Unmanned Aerial Vehicle and Optimal Relay for Extending Coverage in Post-Disaster Scenarios
Authors:
Abdu Saif,
Kaharudin Dimyati,
Kamarul Ariffin Noordin,
Nor Shahida Mohd Shah,
Qazwan Abdullah,
Mahathir Mohamad,
Mahmod Abd Hakim Mohamad,
Ahmed M. Al-Saman
Abstract:
The malfunction or interruption of wireless coverage services has been shown to increase the mortality rate during natural disasters. Wireless coverage by an unmanned aerial vehicle (UAV) provides network coverage to ground user devices during and post-disaster events. The relay hops receive wireless coverage and can be forwarded to user devices that are out of coverage allowing reliable connectiv…
▽ More
The malfunction or interruption of wireless coverage services has been shown to increase the mortality rate during natural disasters. Wireless coverage by an unmanned aerial vehicle (UAV) provides network coverage to ground user devices during and post-disaster events. The relay hops receive wireless coverage and can be forwarded to user devices that are out of coverage allowing reliable connectivity for large-scale user devices. This work evaluates the optimal relay hops performance to improve wireless coverage services and establish connectivity in post-disaster scenarios. The results demonstrate the UAV line of sights understanding to select an optimal relay for improving wireless coverage services. The path loss probability and system capacity were all affected by the user device distance and relay densities. The optimal relay hop distance and the UAV positions static are also investigated to improve coverage likelihood which could be especially useful for UAV deployment design. It is found that the dense relays node in UAV systems enhances the capacity coverage area and energy efficiency by decentralized connectivity through a multihop device to device wireless network.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
Security Assurance Cases -- State of the Art of an Emerging Approach
Authors:
Mazen Mohamad,
Jan-Philipp Steghöfer,
Riccardo Scandariato
Abstract:
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SACs are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regul…
▽ More
Security Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SACs are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regulations. Accordingly, research in the field of SAC has flourished in the past decade, with different approaches being investigated. In an effort to systematize this active field of research, we conducted a systematic literature review (SLR) of the existing academic studies on SAC. Our review resulted in an in-depth analysis and comparison of 51 papers. Our results indicate that, while there are numerous papers discussing the importance of security assurance cases and their usage scenarios, the literature is still immature with respect to concrete support for practitioners on how to build and maintain a SAC. More importantly, even though some methodologies are available, their validation and tool support is still lacking.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
Cross-project Classification of Security-related Requirements
Authors:
Mazen Mohamad,
Jan-Philipp Steghöfer,
Riccardo Scandariato
Abstract:
We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online. This is helpful in case different requirement types are not differentiated in a large existing requirement specification. Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessit…
▽ More
We investigate the feasibility of using a classifier for security-related requirements trained on requirement specifications available online. This is helpful in case different requirement types are not differentiated in a large existing requirement specification. Our work is motivated by the need to identify security requirements for the creation of security assurance cases that become a necessity for many organizations with new and upcoming standards like GDPR and HiPAA. We base our investigation on ten requirement specifications, randomly selected from a Google Search and partially pre-labeled. To validate the model, we run 10-fold cross-validation on the data where each specification constitutes a group. Our results indicate the feasibility of training a model from a heterogeneous data set including specifications from multiple domains and in different styles. However, performance benefits from revising the pre-labeled data for consistency. Additionally, we show that classifiers trained only on a specific specification type fare worse and that the way requirements are written has no impact on classifier accuracy.
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
Security Assurance Cases for Road Vehicles: an Industry Perspective
Authors:
Mazen Mohamad,
Alexander Åström,
Örjan Askerdal,
Jörgen Borg,
Riccardo Scandariato
Abstract:
Assurance cases are structured arguments that are commonly used to reason about the safety of a product or service. Currently, there is an ongoing push towards using assurance cases for also cybersecurity, especially in safety-critical domains, like automotive. While the industry is faced with the challenge of defining a sound methodology to build security assurance cases, the state of the art is…
▽ More
Assurance cases are structured arguments that are commonly used to reason about the safety of a product or service. Currently, there is an ongoing push towards using assurance cases for also cybersecurity, especially in safety-critical domains, like automotive. While the industry is faced with the challenge of defining a sound methodology to build security assurance cases, the state of the art is rather immature. Therefore, we have conducted a thorough investigation of the (external) constraints and (internal) needs that security assurance cases have to satisfy in the context of the automotive industry. This has been done in the context of two large automotive companies in Sweden. The end result is a set of recommendations that automotive companies can apply in order to define security assurance cases that are (i) aligned with the constraints imposed by the existing and upcoming standards and regulations and (ii)harmonized with the internal product development processes and organizational practices. We expect the results to be also of interest for product companies in other safety-critical domains, like healthcare, transportation, and so on
△ Less
Submitted 31 March, 2020;
originally announced March 2020.
-
A sequential sampling strategy for extreme event statistics in nonlinear dynamical systems
Authors:
Mustafa A. Mohamad,
Themistoklis P. Sapsis
Abstract:
We develop a method for the evaluation of extreme event statistics associated with nonlinear dynamical systems, using a small number of samples. From an initial dataset of design points, we formulate a sequential strategy that provides the 'next-best' data point (set of parameters) that when evaluated results in improved estimates of the probability density function (pdf) for a scalar quantity of…
▽ More
We develop a method for the evaluation of extreme event statistics associated with nonlinear dynamical systems, using a small number of samples. From an initial dataset of design points, we formulate a sequential strategy that provides the 'next-best' data point (set of parameters) that when evaluated results in improved estimates of the probability density function (pdf) for a scalar quantity of interest. The approach utilizes Gaussian process regression to perform Bayesian inference on the parameter-to-observation map describing the quantity of interest. We then approximate the desired pdf along with uncertainty bounds utilizing the posterior distribution of the inferred map. The 'next-best' design point is sequentially determined through an optimization procedure that selects the point in parameter space that maximally reduces uncertainty between the estimated bounds of the pdf prediction. Since the optimization process utilizes only information from the inferred map it has minimal computational cost. Moreover, the special form of the metric emphasizes the tails of the pdf. The method is practical for systems where the dimensionality of the parameter space is of moderate size, i.e. order O(10). We apply the method to estimate the extreme event statistics for a very high-dimensional system with millions of degrees of freedom: an offshore platform subjected to three-dimensional irregular waves. It is demonstrated that the developed approach can accurately determine the extreme event statistics using limited number of samples.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
Extreme events and their optimal mitigation in nonlinear structural systems excited by stochastic loads: Application to ocean engineering systems
Authors:
Han Kyul Joo,
Mustafa A. Mohamad,
Themistoklis P. Sapsis
Abstract:
We develop an efficient numerical method for the probabilistic quantification of the response statistics of nonlinear multi-degree-of-freedom structural systems under extreme forcing events, emphasizing accurate heavy-tail statistics. The response is decomposed to a statistically stationary part and an intermittent component. The stationary part is quantified using a statistical linearization meth…
▽ More
We develop an efficient numerical method for the probabilistic quantification of the response statistics of nonlinear multi-degree-of-freedom structural systems under extreme forcing events, emphasizing accurate heavy-tail statistics. The response is decomposed to a statistically stationary part and an intermittent component. The stationary part is quantified using a statistical linearization method while the intermittent part, associated with extreme transient responses, is quantified through i) either a few carefully selected simulations or ii) through the use of effective measures (effective stiffness and dam**). The developed approach is able to accurately capture the extreme response statistics orders of magnitude faster compared with direct methods. The scheme is applied to the design and optimization of small attachments that can mitigate and suppress extreme forcing events delivered to a primary structural system. Specifically, we consider the problem of suppression of extreme responses in two prototype ocean engineering systems. First, we consider linear and cubic springs and perform parametric optimization by minimizing the forth-order moments of the response. We then consider a more generic, possibly asymmetric, piecewise linear spring and optimize its nonlinear characteristics. The resulting asymmetric spring design far outperforms the optimal cubic energy sink and the linear tuned mass dampers.
△ Less
Submitted 1 June, 2017;
originally announced June 2017.
-
Probabilistic response and rare events in Mathieu's equation under correlated parametric excitation
Authors:
Mustafa A. Mohamad,
Themistoklis P. Sapsis
Abstract:
We derive an analytical approximation to the probability distribution function (pdf) for the response of Mathieu's equation under parametric excitation by a random process with a spectrum peaked at the main resonant frequency, motivated by the problem of large amplitude ship roll resonance in random seas. The inclusion of random stochastic excitation renders the otherwise straightforward response…
▽ More
We derive an analytical approximation to the probability distribution function (pdf) for the response of Mathieu's equation under parametric excitation by a random process with a spectrum peaked at the main resonant frequency, motivated by the problem of large amplitude ship roll resonance in random seas. The inclusion of random stochastic excitation renders the otherwise straightforward response to a system undergoing intermittent resonances: randomly occurring large amplitude bursts. Intermittent resonance occurs precisely when the random parametric excitation pushes the system into the instability region, causing an extreme magnitude response. As a result, the statistics are characterized by heavy-tails. We apply a recently developed mathematical technique, the probabilistic decomposition-synthesis method, to derive an analytical approximation to the non-Gaussian pdf of the response. We illustrate the validity of this analytic approximation through comparisons with Monte-Carlo simulations that demonstrate our result accurately captures the strong non-Gaussianity of the response.
△ Less
Submitted 2 June, 2017; v1 submitted 31 May, 2017;
originally announced June 2017.
-
Heavy-tailed response of structural systems subjected to stochastic excitation containing extreme forcing events
Authors:
Han Kyul Joo,
Mustafa A. Mohamad,
Themistoklis P. Sapsis
Abstract:
We characterize the complex, heavy-tailed probability distribution functions (pdf) describing the response and its local extrema for structural systems subjected to random forcing that includes extreme events. Our approach is based on the recent probabilistic decomposition-synthesis technique, where we decouple rare events regimes from the background fluctuations. The result of the analysis has th…
▽ More
We characterize the complex, heavy-tailed probability distribution functions (pdf) describing the response and its local extrema for structural systems subjected to random forcing that includes extreme events. Our approach is based on the recent probabilistic decomposition-synthesis technique, where we decouple rare events regimes from the background fluctuations. The result of the analysis has the form of a semi-analytical approximation formula for the pdf of the response (displacement, velocity, and acceleration) and the pdf of the local extrema. For special limiting cases (lightly damped or heavily damped systems) our analysis provides fully analytical approximations. We also demonstrate how the method can be applied to high dimensional structural systems through a two-degrees-of-freedom structural system undergoing rare events due to intermittent forcing. The derived formulas can be evaluated with very small computational cost and are shown to accurately capture the complicated heavy-tailed and asymmetrical features in the probability distribution many standard deviations away from the mean, through comparisons with expensive Monte-Carlo simulations.
△ Less
Submitted 31 May, 2017; v1 submitted 19 October, 2016;
originally announced October 2016.
-
Spectrally-Precoded OFDM for 5G Wideband Operation in Fragmented sub-6GHz Spectrum
Authors:
Renaud-Alexandre Pitaval,
Branislav M. Popović,
Medhat Mohamad,
Rickard Nilsson,
Jaap van de Beek
Abstract:
We consider spectrally-precoded OFDM waveforms for 5G wideband transmission in sub-6GHz band. In this densely packed spectrum, a low out-of-band (OOB) waveform is a critical 5G component to achieve the promised high spectral efficiency. By precoding data symbols before OFDM modulation, it is possible to achieve extremely low out-of-band emission with very sharp spectrum transition enabling an effi…
▽ More
We consider spectrally-precoded OFDM waveforms for 5G wideband transmission in sub-6GHz band. In this densely packed spectrum, a low out-of-band (OOB) waveform is a critical 5G component to achieve the promised high spectral efficiency. By precoding data symbols before OFDM modulation, it is possible to achieve extremely low out-of-band emission with very sharp spectrum transition enabling an efficient and flexible usage of frequency resources. Spectrally-precoded OFDM shows promising results for reaching 5G targets in high-data rate enhanced mobile broadband and ultra-reliable low-latency communications use cases. Spectral precoding is particularly efficient for wideband transmission enabling short-time transmission, which will often require flexible fragmented spectrum usage.
△ Less
Submitted 2 June, 2016;
originally announced June 2016.
-
A probabilistic decomposition-synthesis method for the quantification of rare events due to internal instabilities
Authors:
Mustafa A. Mohamad,
Will Cousins,
Themistoklis P. Sapsis
Abstract:
We consider the problem of probabilistic quantification of dynamical systems that have heavy-tailed characteristics. These heavy-tailed features are associated with rare transient responses due to the occurrence of internal instabilities. Here we develop a computational method, a probabilistic decomposition-synthesis technique, that takes into account the nature of internal instabilities to inexpe…
▽ More
We consider the problem of probabilistic quantification of dynamical systems that have heavy-tailed characteristics. These heavy-tailed features are associated with rare transient responses due to the occurrence of internal instabilities. Here we develop a computational method, a probabilistic decomposition-synthesis technique, that takes into account the nature of internal instabilities to inexpensively determine the non-Gaussian probability density function for any arbitrary quantity of interest. Our approach relies on the decomposition of the statistics into a `non-extreme core', typically Gaussian, and a heavy-tailed component. This decomposition is in full correspondence with a partition of the phase space into a `stable' region where we have no internal instabilities, and a region where non-linear instabilities lead to rare transitions with high probability. We quantify the statistics in the stable region using a Gaussian approximation approach, while the non-Gaussian distributions associated with the intermittently unstable regions of the phase space are inexpensively computed through order-reduction methods that take into account the strongly nonlinear character of the dynamics. The probabilistic information in the two domains is analytically synthesized through a total probability argument. The proposed approach allows for the accurate quantification of non-Gaussian tails at more than 10 standard deviations, at a fraction of the cost associated with the direct Monte-Carlo simulations. We demonstrate the probabilistic decomposition-synthesis method for rare events for two dynamical systems exhibiting extreme events: a two-degree-of-freedom system of nonlinearly coupled oscillators, and in a nonlinear envelope equation characterizing the propagation of unidirectional water waves.
△ Less
Submitted 7 November, 2015;
originally announced November 2015.
-
Probabilistic description of extreme events in intermittently unstable systems excited by correlated stochastic processes
Authors:
Mustafa A. Mohamad,
Themistoklis P. Sapsis
Abstract:
In this work, we consider systems that are subjected to intermittent instabilities due to external stochastic excitation. These intermittent instabilities, though rare, have a large impact on the probabilistic response of the system and give rise to heavy-tailed probability distributions. By making appropriate assumptions on the form of these instabilities, which are valid for a broad range of sys…
▽ More
In this work, we consider systems that are subjected to intermittent instabilities due to external stochastic excitation. These intermittent instabilities, though rare, have a large impact on the probabilistic response of the system and give rise to heavy-tailed probability distributions. By making appropriate assumptions on the form of these instabilities, which are valid for a broad range of systems, we formulate a method for the analytical approximation of the probability distribution function (pdf) of the system response (both the main probability mass and the heavy-tail structure). In particular, this method relies on conditioning the probability density of the response on the occurrence of an instability and the separate analysis of the two states of the system, the unstable and stable state. In the stable regime we employ steady state assumptions, which lead to the derivation of the conditional response pdf using standard methods for random dynamical systems. The unstable regime is inherently transient and in order to analyze this regime we characterize the statistics under the assumption of an exponential growth phase and a subsequent decay phase until the system is brought back to the stable attractor. The method we present allows us to capture the statistics associated with the dynamics that give rise to heavy-tails in the system response and the analytical approximations compare favorably with direct Monte Carlo simulations, which we illustrate for two prototype intermittent systems: an intermittently unstable mechanical oscillator excited by correlated multiplicative noise and a complex mode in a turbulent signal with fixed frequency, where multiplicative stochastic dam** and additive noise model interactions between various modes.
△ Less
Submitted 13 October, 2014; v1 submitted 21 July, 2014;
originally announced July 2014.
-
The Designing of Online Multiple Intelligence Tools for Lecturers at Polytechnic
Authors:
Sazilah Salam,
Siti Nurul Mahfuzah Mohamad,
Norasiken Bakar,
Linda Khoo Mei Sui
Abstract:
This paper addresses the designing of Online Multiple Intelligence (MI) Teaching Tools for Polytechnic lecturers. These teaching tools can assist lecturers to create their own teaching materials without having any knowledge of Information Technology (IT) especially in programming. The theory of MI is used in this paper and this theory postulates that everybody has at least two or more intelligence…
▽ More
This paper addresses the designing of Online Multiple Intelligence (MI) Teaching Tools for Polytechnic lecturers. These teaching tools can assist lecturers to create their own teaching materials without having any knowledge of Information Technology (IT) especially in programming. The theory of MI is used in this paper and this theory postulates that everybody has at least two or more intelligences. Multiple approaches embedded into a series of activities via online teaching tools must be implemented in order to achieve effective teaching and learning in the classroom. The objectives of this paper are to identify the relationship between the students self-perceived MI and their academic achievement in Polytechnic, and design online MI tools for teaching at Polytechnic. This paper also addressed the theoretical framework and MI teaching activities. The instrument used for this study was Ujian Multiple Intelligence (UMI). The results showed Polytechnic students have strength in Interpersonal, Visual-Spatial and Verbal-Linguistic intelligences.
△ Less
Submitted 2 February, 2014;
originally announced February 2014.
-
Practical Bijective S-box Design
Authors:
Abdurashid Mamadolimov,
Herman Isa,
Moesfa Soeheila Mohamad
Abstract:
We construct 8 x 8 bijective cryptographically strong S-boxes. Our construction is based on using non-bijective power functions over the finite filed.
We construct 8 x 8 bijective cryptographically strong S-boxes. Our construction is based on using non-bijective power functions over the finite filed.
△ Less
Submitted 20 January, 2013;
originally announced January 2013.
-
Performance Evaluation of Mobile U-Navigation based on GPS/WLAN Hybridization
Authors:
Wan Mohd Yaakob Wan Bejuri,
Mohd Murtadha Mohamad,
Maimunah Sapri,
Mohd Adly Rosly
Abstract:
This paper present our mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type of environment in order to ensure the ubiquity of posi…
▽ More
This paper present our mobile u-navigation system. This approach utilizes hybridization of wireless local area network and Global Positioning System internal sensor which to receive signal strength from access point and the same time retrieve Global Navigation System Satellite signal. This positioning information will be switched based on type of environment in order to ensure the ubiquity of positioning system. Finally we present our results to illustrate the performance of the localization system for an indoor/ outdoor environment set-up.
△ Less
Submitted 10 October, 2012;
originally announced October 2012.
-
Investigation of Color Constancy for Ubiquitous Wireless LAN/Camera Positioning: An Initial Outcome
Authors:
Wan Mohd Yaakob Wan Bejuri,
Mohd Murtadha Mohamad,
Maimunah Sapri,
Mohd Adly Rosly
Abstract:
This paper present our color constancy investigation in the hybridization of Wireless LAN and Camera positioning in the mobile phone. Five typical color constancy schemes are analyzed in different location environment. The results can be used to combine with RF signals from Wireless LAN positioning by using model fitting approach in order to establish absolute positioning output. There is no conve…
▽ More
This paper present our color constancy investigation in the hybridization of Wireless LAN and Camera positioning in the mobile phone. Five typical color constancy schemes are analyzed in different location environment. The results can be used to combine with RF signals from Wireless LAN positioning by using model fitting approach in order to establish absolute positioning output. There is no conventional searching algorithm required, thus it is expected to reduce the complexity of computation. Finally we present our preliminary results to illustrate the indoor positioning algorithm performance evaluation for an indoor environment set-up.
△ Less
Submitted 27 June, 2012;
originally announced June 2012.
-
Ubiquitous WLAN/Camera Positioning using Inverse Intensity Chromaticity Space-based Feature Detection and Matching: A Preliminary Result
Authors:
Wan Mohd Yaakob Wan Bejuri,
Mohd Murtadha Mohamad,
Maimunah Sapri,
Mohd Adly Rosly
Abstract:
This paper present our new intensity chromaticity space-based feature detection and matching algorithm. This approach utilizes hybridization of wireless local area network and camera internal sensor which to receive signal strength from a access point and the same time retrieve interest point information from hallways. This information is combined by model fitting approach in order to find the abs…
▽ More
This paper present our new intensity chromaticity space-based feature detection and matching algorithm. This approach utilizes hybridization of wireless local area network and camera internal sensor which to receive signal strength from a access point and the same time retrieve interest point information from hallways. This information is combined by model fitting approach in order to find the absolute of user target position. No conventional searching algorithm is required, thus it is expected reducing the computational complexity. Finally we present pre-experimental results to illustrate the performance of the localization system for an indoor environment set-up.
△ Less
Submitted 10 April, 2012;
originally announced April 2012.
-
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navigation System
Authors:
Wan Mohd. Yaakob Wan Bejuri,
Mohd. Murtadha Mohamad,
Maimunah Sapri
Abstract:
The location determination in obstructed area can be very challenging especially if Global Positioning System are blocked. Users will find it difficult to navigate directly on-site in such condition, especially indoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors and positioning methods in order to determine the location with more intelligent, reliable a…
▽ More
The location determination in obstructed area can be very challenging especially if Global Positioning System are blocked. Users will find it difficult to navigate directly on-site in such condition, especially indoor car park lot or obstructed environment. Sometimes, it needs to combine with other sensors and positioning methods in order to determine the location with more intelligent, reliable and ubiquity. By using ubiquitous positioning in mobile navigation system, it is a promising ubiquitous location technique in a mobile phone since as it is a familiar personal electronic device for many people. However, as research on ubiquitous positioning systems goes beyond basic methods there is an increasing need for better comparison of proposed ubiquitous positioning systems. System developers are also lacking of good frameworks for understanding different options during building ubiquitous positioning systems. This paper proposes taxonomy to address both of these problems. The proposed taxonomy has been constructed from a literature study of papers and articles on positioning estimation that can be used to determine location everywhere on mobile navigation system. For researchers the taxonomy can also be used as an aid for sco** out future research in the area of ubiquitous positioning.
△ Less
Submitted 25 March, 2011;
originally announced March 2011.
-
Zero Action on Perfect Crystals for U_q(G_2^{(1)})
Authors:
Kailash C. Misra,
Mahathir Mohamad,
Masato Okado
Abstract:
The actions of 0-Kashiwara operators on the $U'_q(G_2^{(1)})$-crystal $B_l$ in [Yamane S., J. Algebra 210 (1998), 440-486] are made explicit by using a similarity technique from that of a $U'_q(D_4^{(3)})$-crystal. It is shown that $\{B_l\}_{l\ge1}$ forms a coherent family of perfect crystals.
The actions of 0-Kashiwara operators on the $U'_q(G_2^{(1)})$-crystal $B_l$ in [Yamane S., J. Algebra 210 (1998), 440-486] are made explicit by using a similarity technique from that of a $U'_q(D_4^{(3)})$-crystal. It is shown that $\{B_l\}_{l\ge1}$ forms a coherent family of perfect crystals.
△ Less
Submitted 9 March, 2010; v1 submitted 13 November, 2009;
originally announced November 2009.
-
On the metrizability of spaces with a sharp base
Authors:
Chris Good,
Robin W. Knight,
Abdul M. Mohamad
Abstract:
A base $\mathcal{B}$ for a space $X$ is said to be sharp if, whenever $x\in X$ and $(B_n)_{n\inω}$ is a sequence of pairwise distinct elements of $\mathcal{B}$ each containing $x$, the collection $\{\bigcap_{j\le n}B_j:n\inω\}$ is a local base at $x$. We answer questions raised by Alleche et al. and Arhangel$'$skiĭ et al. by showing that a pseudocompact Tychonoff space with a sharp base need not…
▽ More
A base $\mathcal{B}$ for a space $X$ is said to be sharp if, whenever $x\in X$ and $(B_n)_{n\inω}$ is a sequence of pairwise distinct elements of $\mathcal{B}$ each containing $x$, the collection $\{\bigcap_{j\le n}B_j:n\inω\}$ is a local base at $x$. We answer questions raised by Alleche et al. and Arhangel$'$skiĭ et al. by showing that a pseudocompact Tychonoff space with a sharp base need not be metrizable and that the product of a space with a sharp base and $[0,1]$ need not have a sharp base. We prove various metrization theorems and provide a characterization along the lines of Ponomarev's for point countable bases.
△ Less
Submitted 10 April, 2002;
originally announced April 2002.