-
Deposit of Red Blood Cells at low concentrations in evaporating droplets: central edge growth and potential applications
Authors:
Vahideh Sardari,
Mahsa Mohammadian,
Shima Asfia,
Felix Maurer,
Diana Örüm,
Ralf Seemann,
Thomas John,
Lars Kaestner,
Christian Wagner,
Maniya Maleki,
Alexis Darras
Abstract:
Evaporation of blood droplets and diluted blood samples is a topic of intensive research, as it is seen as a possible low-cost tool for diagnosis. So far, samples with volume fraction down to a few percents of Red Blood Cells (RBCs) have been studied, and those were reportedly dominated by a ``coffee-ring'' deposit. In this study, samples with lower volume fractions have been used in order to stud…
▽ More
Evaporation of blood droplets and diluted blood samples is a topic of intensive research, as it is seen as a possible low-cost tool for diagnosis. So far, samples with volume fraction down to a few percents of Red Blood Cells (RBCs) have been studied, and those were reportedly dominated by a ``coffee-ring'' deposit. In this study, samples with lower volume fractions have been used in order to study the growth of the evaporative deposit from sessile droplets more in details. We observed that blood samples and salt solutions with less than 1\% volume fraction of RBCs are dominated by a central deposit. We characterized the growth process of this central deposit by evaporating elongated drops, and determined that it is consistent with the Kardar-Parisi-Zhang process in the presence of quenched disorder. Our results showed a sensitivity of this deposit size to the fibrinogen concentration and shape of the RBCs, meaning that this parameter could be used to develop a new and cost-effective clinical marker for inflammation and RBC deformation.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Bootstrap percolation on the Hamming graphs
Authors:
Meysam Miralaei,
Ali Mohammadian,
Behruz Tayfeh-Rezaie
Abstract:
The $r$-edge bootstrap percolation on a graph is an activation process of the edges. The process starts with some initially activated edges and then, in each round, any inactive edge whose one of endpoints is incident to at least $r$ active edges becomes activated. A set of initially activated edges leading to the activation of all edges is said to be a percolating set. Denote the minimum size of…
▽ More
The $r$-edge bootstrap percolation on a graph is an activation process of the edges. The process starts with some initially activated edges and then, in each round, any inactive edge whose one of endpoints is incident to at least $r$ active edges becomes activated. A set of initially activated edges leading to the activation of all edges is said to be a percolating set. Denote the minimum size of a percolating set in the $r$-edge bootstrap percolation process on a graph $G$ by $m_e(G, r)$. The importance of the $r$-edge bootstrap percolation relies on the fact that $m_e(G, r)$ provides bounds on $m(G, r)$, that is, the minimum size of a percolating set in the $r$-neighbor bootstrap percolation process on $G$. In this paper, we explicitly determine $m_e(K_n^d, r)$, where $K_n^d$ is the Cartesian product of $d$ copies of the complete graph on $n$ vertices which is referred as Hamming graph. Using this, we show that $m(K_n^d, r)=(1+o(1))\frac{d^{r-1}}{r!}$ when $n, r$ are fixed and $d$ goes to infinity which extends a known result on hypercubes.
△ Less
Submitted 9 March, 2024;
originally announced March 2024.
-
On the classification of skew Hadamard matrices of order 36 and related structures
Authors:
Makoto Araya,
Masaaki Harada,
Hadi Kharaghani,
Ali Mohammadian,
Behruz Tayfeh-Rezaie
Abstract:
Two skew Hadamard matrices are considered {\sf SH}-equivalent if they are similar by a signed permutation matrix. This paper determines the number of {\sf SH}-inequivalent skew Hadamard matrices of order $36$ for some types. We also study ternary self-dual codes and association schemes constructed from the skew Hadamard matrices of order $36$.
Two skew Hadamard matrices are considered {\sf SH}-equivalent if they are similar by a signed permutation matrix. This paper determines the number of {\sf SH}-inequivalent skew Hadamard matrices of order $36$ for some types. We also study ternary self-dual codes and association schemes constructed from the skew Hadamard matrices of order $36$.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
Measuring the Kapitza Resistance between a Passivated Semiconductor and Liquid Helium
Authors:
Babak Mohammadian,
Mark A. McCulloch,
Valerio Gilles,
Thomas Sweetnam,
Lucio Piccirilo
Abstract:
In this paper, we describe an experimental investigation into the effect of passivation layer thickness on heat dissipation between a quartz substrate and liquid helium. We have observed that by depositing SiN from 0 to 240 nm, the Kapitza resistance increases by 0.0365 m^2.K/W per nanometer more than for an unpassivated semiconductor. We hypothesize that this increase in Kapitza resistance repres…
▽ More
In this paper, we describe an experimental investigation into the effect of passivation layer thickness on heat dissipation between a quartz substrate and liquid helium. We have observed that by depositing SiN from 0 to 240 nm, the Kapitza resistance increases by 0.0365 m^2.K/W per nanometer more than for an unpassivated semiconductor. We hypothesize that this increase in Kapitza resistance represents an additional barrier to the cooling of semiconductor devices in liquid helium.
△ Less
Submitted 16 November, 2023;
originally announced December 2023.
-
Spatial Arbitrage Through Bidirectional Electric Vehicle Charging with Delivery Fleets
Authors:
Mostafa Mohammadian,
Constance Crozier,
Kyri Baker
Abstract:
The adoption of electric vehicles (EVs), including electric taxis and buses, as a mode of transportation, is rapidly increasing in cities. In addition to providing economic and environmental benefits, these fleets can potentially participate in the energy arbitrage market by leveraging their mobile energy storage capabilities. This presents an opportunity for EV owners to contribute to a more sust…
▽ More
The adoption of electric vehicles (EVs), including electric taxis and buses, as a mode of transportation, is rapidly increasing in cities. In addition to providing economic and environmental benefits, these fleets can potentially participate in the energy arbitrage market by leveraging their mobile energy storage capabilities. This presents an opportunity for EV owners to contribute to a more sustainable and efficient energy system while also reducing their operational costs. The present study introduces deterministic and single-stage stochastic optimization frameworks that aim to maximize revenue by optimizing the charging, discharging, and travel of a fleet of electric vehicles in the context of uncertainty surrounding both spatial and temporal energy prices. The simulations are performed on a fleet of electric delivery trucks, which have to make deliveries to certain locations on specific dates.
The findings indicate the promising potential of bidirectional electric vehicle charging as a mobile grid asset. However, it is important to note that significant revenue is only realized in scenarios where there is substantial variation in prices between different areas, and when these price variations can be accurately forecasted with a high level of confidence.
△ Less
Submitted 19 November, 2023;
originally announced November 2023.
-
Persis: A Persian Font Recognition Pipeline Using Convolutional Neural Networks
Authors:
Mehrdad Mohammadian,
Neda Maleki,
Tobias Olsson,
Fredrik Ahlgren
Abstract:
What happens if we encounter a suitable font for our design work but do not know its name? Visual Font Recognition (VFR) systems are used to identify the font typeface in an image. These systems can assist graphic designers in identifying fonts used in images. A VFR system also aids in improving the speed and accuracy of Optical Character Recognition (OCR) systems. In this paper, we introduce the…
▽ More
What happens if we encounter a suitable font for our design work but do not know its name? Visual Font Recognition (VFR) systems are used to identify the font typeface in an image. These systems can assist graphic designers in identifying fonts used in images. A VFR system also aids in improving the speed and accuracy of Optical Character Recognition (OCR) systems. In this paper, we introduce the first publicly available datasets in the field of Persian font recognition and employ Convolutional Neural Networks (CNN) to address this problem. The results show that the proposed pipeline obtained 78.0% top-1 accuracy on our new datasets, 89.1% on the IDPL-PFOD dataset, and 94.5% on the KAFD dataset. Furthermore, the average time spent in the entire pipeline for one sample of our proposed datasets is 0.54 and 0.017 seconds for CPU and GPU, respectively. We conclude that CNN methods can be used to recognize Persian fonts without the need for additional pre-processing steps such as feature extraction, binarization, normalization, etc.
△ Less
Submitted 10 October, 2023; v1 submitted 8 October, 2023;
originally announced October 2023.
-
The Impact of Surface Passivation on Kapitza Resistance at the Interface between a Semiconductor and Liquid Nitrogen
Authors:
Babak Mohammadian,
Mark A. McCulloch,
Thomas Sweetnam,
Valerio Gilles,
Lucio Piccirillo
Abstract:
Cooling electronic devices to cryogenic temperatures (< 77 K) is crucial in various scientific and engineering domains. Efficient cooling involves the removal of heat generated from these devices through thermal contact with either a liquid cryogen or a dry cryostat cold stage. However, as these devices cool, thermal boundary resistance, also known as Kapitza resistance, hinders the heat flow acro…
▽ More
Cooling electronic devices to cryogenic temperatures (< 77 K) is crucial in various scientific and engineering domains. Efficient cooling involves the removal of heat generated from these devices through thermal contact with either a liquid cryogen or a dry cryostat cold stage. However, as these devices cool, thermal boundary resistance, also known as Kapitza resistance, hinders the heat flow across thermal interfaces, resulting in elevated device temperatures. In transistors, the presence of passivation layers like Silicon Nitride (SiN) introduces additional interfaces that further impede heat dissipation. This paper investigates the impact of passivation layer thickness on Kapitza resistance at the interface between a solid device and liquid nitrogen. The Kapitza resistance is measured using a capacitance thermometer that has been passivated with SiN layers ranging from 0 to 240 nm. We observe that Kapitza resistance increases with increasing passivation thickness.
△ Less
Submitted 25 September, 2023; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Heuristic Solutions to the Single Depot Electric Vehicle Scheduling Problem with Next Day Operability Constraints
Authors:
Amir Davatgari,
Taner Cokyasar,
Omer Verbas,
Abolfazl Kouros Mohammadian
Abstract:
This study focuses on the single depot electric vehicle scheduling problem (SDEVSP) within the broader context of the vehicle scheduling problem (VSP). By develo** an effective scheduling model using mixed-integer linear programming, we generate bus blocks that accommodate electric vehicles (EVs), ensuring successful completion of each block while considering recharging requirements between bloc…
▽ More
This study focuses on the single depot electric vehicle scheduling problem (SDEVSP) within the broader context of the vehicle scheduling problem (VSP). By develo** an effective scheduling model using mixed-integer linear programming, we generate bus blocks that accommodate electric vehicles (EVs), ensuring successful completion of each block while considering recharging requirements between blocks and during off-hours. Next day operability constraints are also incorporated, allowing for seamless repetition of blocks on subsequent days. The SDEVSP is known to be computationally complex, deriving optimal solutions unattainable for large-scale problems within reasonable timeframes. To address this, we propose a two-step solution approach: first solving the single depot VSP, and then addressing the block chaining problem (BCP) using the blocks generated in the first step. The BCP focuses on optimizing block combinations to facilitate recharging between consecutive blocks, considering operational constraints. A case study conducted reveals that nearly 100% electrification for Chicago, IL and Austin, TX transit buses is viable yet requires 1.6 EVs at 150-mile range per diesel vehicle.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Exploring the Role of Perceived Range Anxiety in Adoption Behavior of Plug-in Electric Vehicles
Authors:
Fatemeh Nazari,
Abolfazl Mohammadian,
Thomas Stephens
Abstract:
A sustainable solution to negative externalities imposed by road transportation is replacing internal combustion vehicles with electric vehicles (EVs), especially plug-in EV (PEV) encompassing plug-in hybrid EV (PHEV) and battery EV (BEV). However, EV market share is still low and is forecast to remain low and uncertain. This shows a research need for an in-depth understanding of EV adoption behav…
▽ More
A sustainable solution to negative externalities imposed by road transportation is replacing internal combustion vehicles with electric vehicles (EVs), especially plug-in EV (PEV) encompassing plug-in hybrid EV (PHEV) and battery EV (BEV). However, EV market share is still low and is forecast to remain low and uncertain. This shows a research need for an in-depth understanding of EV adoption behavior with a focus on one of the main barriers to the mass EV adoption, which is the limited electric driving range. The present study extends the existing literature in two directions; First, the influence of the psychological aspect of driving range, which is referred to as range anxiety, is explored on EV adoption behavior by presenting a nested logit (NL) model with a latent construct. Second, the two-level NL model captures individuals' decision on EV adoption behavior distinguished by vehicle transaction type and EV type, where the upper level yields the vehicle transaction type selected from the set of alternatives including no-transaction, sell, trade, and add. The fuel type of the vehicles decided to be acquired, either as traded-for or added vehicles, is simultaneously determined at the lower level from a set including conventional vehicle, hybrid EV, PHEV, and BEV. The model is empirically estimated using a stated preferences dataset collected in the State of California. A notable finding is that anxiety about driving range influences the preference for BEV, especially as an added than traded-for vehicle, but not the decision on PHEV adoption.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Weak saturation numbers in random graphs
Authors:
Olga Kalinichenko,
Meysam Miralaei,
Ali Mohammadian,
Behruz Tayfeh-Rezaie
Abstract:
For two given graphs $G$ and $F$, a graph $ H$ is said to be weakly $ (G, F) $-saturated if $H$ is a spanning subgraph of $ G$ which has no copy of $F$ as a subgraph and one can add all edges in $ E(G)\setminus E(H)$ to $ H$ in some order so that a new copy of $F$ is created at each step. The weak saturation number $ wsat(G, F)$ is the minimum number of edges of a weakly $(G, F)$-saturated graph.…
▽ More
For two given graphs $G$ and $F$, a graph $ H$ is said to be weakly $ (G, F) $-saturated if $H$ is a spanning subgraph of $ G$ which has no copy of $F$ as a subgraph and one can add all edges in $ E(G)\setminus E(H)$ to $ H$ in some order so that a new copy of $F$ is created at each step. The weak saturation number $ wsat(G, F)$ is the minimum number of edges of a weakly $(G, F)$-saturated graph. In this paper, we deal with the relation between $ wsat(G(n,p), F)$ and $ wsat(K_n, F)$, where $G(n,p)$ denotes the Erdős--Rényi random graph and $ K_n$ denotes the complete graph on $ n$ vertices. For every graph $ F$ and constant $ p$, we prove that $ wsat( G(n,p),F)= wsat(K_n,F)(1+o(1))$ with high probability. Also, for some graphs $ F$ including complete graphs, complete bipartite graphs, and connected graphs with minimum degree $ 1$ or $ 2$, it is shown that there exists an $ \varepsilon(F)>0$ such that, for any $ p\geqslant n^{-\varepsilon(F)}\log n$, $ wsat( G(n,p),F)= wsat(K_n,F)$ with high probability.
△ Less
Submitted 10 March, 2024; v1 submitted 17 June, 2023;
originally announced June 2023.
-
Electric Vehicle Supply Equipment Location and Capacity Allocation for Fixed-Route Networks
Authors:
Amir Davatgari,
Taner Cokyasar,
Anirudh Subramanyam,
Jeffrey Larson,
Abolfazl Mohammadian
Abstract:
Electric vehicle (EV) supply equipment location and allocation (EVSELCA) problems for freight vehicles are becoming more important because of the trending electrification shift. Some previous works address EV charger location and vehicle routing problems simultaneously by generating vehicle routes from scratch. Although such routes can be efficient, introducing new routes may violate practical con…
▽ More
Electric vehicle (EV) supply equipment location and allocation (EVSELCA) problems for freight vehicles are becoming more important because of the trending electrification shift. Some previous works address EV charger location and vehicle routing problems simultaneously by generating vehicle routes from scratch. Although such routes can be efficient, introducing new routes may violate practical constraints, such as drive schedules, and satisfying electrification requirements can require dramatically altering existing routes. To address the challenges in the prevailing adoption scheme, we approach the problem from a fixed-route perspective. We develop a mixed-integer linear program, a clustering approach, and a metaheuristic solution method using a genetic algorithm (GA) to solve the EVSELCA problem. The clustering approach simplifies the problem by grou** customers into clusters, while the GA generates solutions that are shown to be nearly optimal for small problem cases. A case study examines how charger costs, energy costs, the value of time (VOT), and battery capacity impact the cost of the EVSELCA. Charger equipment costs were found to be the most significant component in the objective function, leading to a substantial reduction in cost when decreased. VOT costs exhibited a significant decrease with rising energy costs. An increase in VOT resulted in a notable rise in the number of fast chargers. Longer EV ranges decrease total costs up to a certain point, beyond which the decrease in total costs is negligible.
△ Less
Submitted 22 February, 2024; v1 submitted 1 May, 2023;
originally announced May 2023.
-
Saturation numbers of bipartite graphs in random graphs
Authors:
Meysam Miralaei,
Ali Mohammadian,
Behruz Tayfeh-Rezaie,
Maksim Zhukovskii
Abstract:
For a given graph $F$, the $F$-saturation number of a graph $G$, denoted by $ {sat}(G, F)$, is the minimum number of edges in an edge-maximal $F$-free subgraph of $G$. In 2017, Korándi and Sudakov determined $ {sat}({G}(n, p), K_r)$ asymptotically, where ${G}(n, p) $ denotes the Erdős-Rényi random graph and $ K_r$ is the complete graph on $r$ vertices. In this paper, among other results, we presen…
▽ More
For a given graph $F$, the $F$-saturation number of a graph $G$, denoted by $ {sat}(G, F)$, is the minimum number of edges in an edge-maximal $F$-free subgraph of $G$. In 2017, Korándi and Sudakov determined $ {sat}({G}(n, p), K_r)$ asymptotically, where ${G}(n, p) $ denotes the Erdős-Rényi random graph and $ K_r$ is the complete graph on $r$ vertices. In this paper, among other results, we present an asymptotic upper bound on ${sat}({G}(n, p), F)$ for any bipartite graph $F$ and also an asymptotic lower bound on ${sat}({G}(n, p), F)$ for any complete bipartite graph $F$.
△ Less
Submitted 16 April, 2023;
originally announced April 2023.
-
Behavioral acceptance of automated vehicles: The roles of perceived safety concern and current travel behavior
Authors:
Fatemeh Nazari,
Mohamadhossein Noruzoliaee,
Abolfazl Mohammadian
Abstract:
With the prospect of next-generation automated mobility ecosystem, the realization of the contended traffic efficiency and safety benefits are contingent upon the demand landscape for automated vehicles (AVs). Focusing on the public acceptance behavior of AVs, this empirical study addresses two gaps in the plethora of travel behavior research on identifying the potential determinants thereof. Firs…
▽ More
With the prospect of next-generation automated mobility ecosystem, the realization of the contended traffic efficiency and safety benefits are contingent upon the demand landscape for automated vehicles (AVs). Focusing on the public acceptance behavior of AVs, this empirical study addresses two gaps in the plethora of travel behavior research on identifying the potential determinants thereof. First, a clear behavioral understanding is lacking as to the perceived concern about AV safety and the consequent effect on AV acceptance behavior. Second, how people appraise the benefits of enhanced automated mobility to meet their current (pre-AV era) travel behavior and needs, along with the resulting impacts on AV acceptance and perceived safety concern, remain equivocal. To fill these gaps, a recursive trivariate econometric model with ordinal-continuous outcomes is employed, which jointly estimates AV acceptance (ordinal), perceived AV safety concern (ordinal), and current annual vehicle-miles traveled (VMT) approximating the current travel behavior (continuous). Importantly, the co-estimation of the three endogenous outcomes allows to capture the true interdependencies among them, net of any correlated unobserved factors that can have common impacts on these outcomes. Besides the classical socio-economic characteristics, the outcome variables are further explained by the latent preferences for vehicle attributes (including vehicle cost, reliability, performance, and refueling) and for existing shared mobility systems. The model estimation results on a stated preference survey in the State of California provide insights into proactive policies that can popularize AVs through gearing towards the most affected population groups, particularly vehicle cost-conscious, safety-concerned, and lower-VMT (such as travel-restrictive) individuals.
△ Less
Submitted 24 January, 2024; v1 submitted 23 February, 2023;
originally announced February 2023.
-
The weak saturation number of $\boldsymbol{K_{2, t}}$
Authors:
Meysam Miralaei,
Ali Mohammadian,
Behruz Tayfeh-Rezaie
Abstract:
For two graphs $G$ and $F$, we say that $G$ is weakly $F$-saturated if $G$ contains no copy of $F$ as a subgraph and one could join all the nonadjacent pairs of vertices of $G$ in some order so that a new copy of $F$ is created at each step. The weak saturation number $\mathrm{wsat}(n, F)$ is the minimum number of edges of a weakly $F$-saturated graph on $n$ vertices. In this paper, we examine…
▽ More
For two graphs $G$ and $F$, we say that $G$ is weakly $F$-saturated if $G$ contains no copy of $F$ as a subgraph and one could join all the nonadjacent pairs of vertices of $G$ in some order so that a new copy of $F$ is created at each step. The weak saturation number $\mathrm{wsat}(n, F)$ is the minimum number of edges of a weakly $F$-saturated graph on $n$ vertices. In this paper, we examine $\mathrm{wsat}(n, K_{s, t})$, where $K_{s, t}$ is the complete bipartite graph with parts of sizes $s$ and $ t $.
We determine $\mathrm{wsat}(n, K_{2, t})$, correcting a previous report in the literature. It is also shown that $\mathrm{wsat}(s+t, K_{s,t})=\binom{s+t-1}{2}$ if $\gcd(s, t)=1$ and $\mathrm{wsat}(s+t, K_{s,t})=\binom{s+t-1}{2}+1$, otherwise.
△ Less
Submitted 13 January, 2024; v1 submitted 20 November, 2022;
originally announced November 2022.
-
DyFEn: Agent-Based Fee Setting in Payment Channel Networks
Authors:
Kiana Asgari,
Aida Afshar Mohammadian,
Mojtaba Tefagh
Abstract:
In recent years, with the development of easy to use learning environments, implementing and reproducible benchmarking of reinforcement learning algorithms has been largely accelerated by utilizing these frameworks. In this article, we introduce the Dynamic Fee learning Environment (DyFEn), an open-source real-world financial network model. It can provide a testbed for evaluating different reinfor…
▽ More
In recent years, with the development of easy to use learning environments, implementing and reproducible benchmarking of reinforcement learning algorithms has been largely accelerated by utilizing these frameworks. In this article, we introduce the Dynamic Fee learning Environment (DyFEn), an open-source real-world financial network model. It can provide a testbed for evaluating different reinforcement learning techniques. To illustrate the promise of DyFEn, we present a challenging problem which is a simultaneous multi-channel dynamic fee setting for off-chain payment channels. This problem is well-known in the Bitcoin Lightning Network and has no effective solutions. Specifically, we report the empirical results of several commonly used deep reinforcement learning methods on this dynamic fee setting task as a baseline for further experiments. To the best of our knowledge, this work proposes the first virtual learning environment based on a simulation of blockchain and distributed ledger technologies, unlike many others which are based on physics simulations or game platforms.
△ Less
Submitted 15 October, 2022;
originally announced October 2022.
-
The COVID-19 Pandemic and the Future of Telecommuting in the United States
Authors:
Deborah Salon,
Laura Mirtich,
Matthew Wigginton Bhagat-Conway,
Adam Costello,
Ehsan Rahimi,
Abolfazl,
Mohammadian,
Rishabh Singh Chauhan,
Sybil Derrible,
Denise da Silva Baker,
Ram M. Pendyala
Abstract:
This study focuses on an important transport-related long-term effect of the COVID-19 pandemic in the United States: an increase in telecommuting. Analyzing a nationally representative panel survey of adults, we find that 40-50% of workers expect to telecommute at least a few times per month post-pandemic, up from 24% pre-COVID. If given the option, 90-95% of those who first telecommuted during th…
▽ More
This study focuses on an important transport-related long-term effect of the COVID-19 pandemic in the United States: an increase in telecommuting. Analyzing a nationally representative panel survey of adults, we find that 40-50% of workers expect to telecommute at least a few times per month post-pandemic, up from 24% pre-COVID. If given the option, 90-95% of those who first telecommuted during the pandemic plan to continue the practice regularly. We also find that new telecommuters are demographically similar to pre-COVID telecommuters. Both pre- and post-COVID, higher educational attainment and income, together with certain job categories, largely determine whether workers have the option to telecommute. Despite growth in telecommuting, approximately half of workers expect to remain unable to telecommute and between 2/3 and 3/4 of workers expect their post-pandemic telecommuting patterns to be unchanged from their pre-COVID patterns. This limits the contribution telecommuting can make to reducing peak hour transport demand.
△ Less
Submitted 30 September, 2022;
originally announced October 2022.
-
COVID Future Panel Survey: A Unique Public Dataset Documenting How U.S. Residents' Travel Related Choices Changed During the COVID-19 Pandemic
Authors:
Rishabh Singh Chauhan,
Matthew Wigginton Bhagat-Conway,
Tassio Magassy,
Nicole Corcoran,
Ehsan Rahimi,
Abbie Dirks,
Ram Pendyala,
Abolfazl Mohammadian,
Sybil Derrible,
Deborah Salon
Abstract:
The COVID-19 pandemic is an unprecedented global crisis that has impacted virtually everyone. We conducted a nationwide online longitudinal survey in the United States to collect information about the shifts in travel-related behavior and attitudes before, during, and after the pandemic. The survey asked questions about commuting, long distance travel, working from home, online learning, online sh…
▽ More
The COVID-19 pandemic is an unprecedented global crisis that has impacted virtually everyone. We conducted a nationwide online longitudinal survey in the United States to collect information about the shifts in travel-related behavior and attitudes before, during, and after the pandemic. The survey asked questions about commuting, long distance travel, working from home, online learning, online shop**, pandemic experiences, attitudes, and demographic information. The survey has been deployed to the same respondents thrice to observe how the responses to the pandemic have evolved over time. The first wave of the survey was conducted from April 2020 to June 2021, the second wave from November 2020 to August 2021, and the third wave from October 2021 to November 2021. In total, 9,265 responses were collected in the first wave; of these, 2,877 respondents returned for the second wave and 2,728 for the third wave. Survey data are publicly available. This unique dataset can aid policy makers in making decisions in areas including transport, workforce development, and more. This article demonstrates the framework for conducting this online longitudinal survey. It details the step-by-step procedure involved in conducting the survey and in curating the data to make it representative of the national trends.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
SiamixFormer: a fully-transformer Siamese network with temporal Fusion for accurate building detection and change detection in bi-temporal remote sensing images
Authors:
Amir Mohammadian,
Foad Ghaderi
Abstract:
Building detection and change detection using remote sensing images can help urban and rescue planning. Moreover, they can be used for building damage assessment after natural disasters. Currently, most of the existing models for building detection use only one image (pre-disaster image) to detect buildings. This is based on the idea that post-disaster images reduce the model's performance because…
▽ More
Building detection and change detection using remote sensing images can help urban and rescue planning. Moreover, they can be used for building damage assessment after natural disasters. Currently, most of the existing models for building detection use only one image (pre-disaster image) to detect buildings. This is based on the idea that post-disaster images reduce the model's performance because of presence of destroyed buildings. In this paper, we propose a siamese model, called SiamixFormer, which uses pre- and post-disaster images as input. Our model has two encoders and has a hierarchical transformer architecture. The output of each stage in both encoders is given to a temporal transformer for feature fusion in a way that query is generated from pre-disaster images and (key, value) is generated from post-disaster images. To this end, temporal features are also considered in feature fusion. Another advantage of using temporal transformers in feature fusion is that they can better maintain large receptive fields generated by transformer encoders compared with CNNs. Finally, the output of the temporal transformer is given to a simple MLP decoder at each stage. The SiamixFormer model is evaluated on xBD, and WHU datasets, for building detection and on LEVIR-CD and CDD datasets for change detection and could outperform the state-of-the-art.
△ Less
Submitted 21 July, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Gradient-Enhanced Physics-Informed Neural Networks for Power Systems Operational Support
Authors:
Mostafa Mohammadian,
Kyri Baker,
Ferdinando Fioretto
Abstract:
The application of deep learning methods to speed up the resolution of challenging power flow problems has recently shown very encouraging results. However, power system dynamics are not snap-shot, steady-state operations. These dynamics must be considered to ensure that the optimal solutions provided by these models adhere to practical dynamical constraints, avoiding frequency fluctuations and gr…
▽ More
The application of deep learning methods to speed up the resolution of challenging power flow problems has recently shown very encouraging results. However, power system dynamics are not snap-shot, steady-state operations. These dynamics must be considered to ensure that the optimal solutions provided by these models adhere to practical dynamical constraints, avoiding frequency fluctuations and grid instabilities. Unfortunately, dynamic system models based on ordinary or partial differential equations are frequently unsuitable for direct application in control or state estimates due to their high computational costs. To address these challenges, this paper introduces a machine learning method to approximate the behavior of power systems dynamics in near real time. The proposed framework is based on gradient-enhanced physics-informed neural networks (gPINNs) and encodes the underlying physical laws governing power systems. A key characteristic of the proposed gPINN is its ability to train without the need of generating expensive training data. The paper illustrates the potential of the proposed approach in both forward and inverse problems in a single-machine infinite bus system for predicting rotor angles and frequency, and uncertain parameters such as inertia and dam** to showcase its potential for a range of power systems applications.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
WIDESim: A toolkit for simulating resource management techniques of scientific Workflows In Distributed Environments with graph topology
Authors:
Mohammad Amin Rayej,
Hajar Siar,
Ahmadreza Hamzei,
Mohammad Sadegh Majidi Yazdi,
Parsa Mohammadian,
Mohammad Izadi
Abstract:
IoT devices trigger real-time applications by receiving data from their vicinity. Modeling these applications in the form of workflows enables automating their procedure, especially for the business and industry. Depending on the features of the applications, they can be modeled in different forms, including single workflow, multiple workflows, and workflow ensembles. Since the whole data must be…
▽ More
IoT devices trigger real-time applications by receiving data from their vicinity. Modeling these applications in the form of workflows enables automating their procedure, especially for the business and industry. Depending on the features of the applications, they can be modeled in different forms, including single workflow, multiple workflows, and workflow ensembles. Since the whole data must be sent to the cloud servers for processing and storage, cloud computing has many challenges for executing real-time applications, such as bandwidth limitation, delay, and privacy. Edge paradigms are introduced to address the challenges of cloud computing in executing IoT applications. Executing IoT applications using device-to-device communications in edge paradigms requiring direct communication between devices in a network with a graph topology. While there is no simulator supporting simulating workflow-based applications and device-to-device communication, this paper introduces a toolkit for simulating resource management of scientific workflows in distributed environments with graph topology called WIDESim.The graph topology of WIDESim enables D2D communications in edge paradigms. WIDESim can work with all three different structures of scientific workflows: single, multiple workflows, and workflow ensembles. It has no constraint on the topology of the distributed environment. Also, unlike most existing network simulators, this simulator enables dynamic resource management and scheduling. We have validated the performance of WIDESim in comparison to standard simulators and workflow management tools. Also, we have evaluated its performance in different scenarios of distributed computing systems using different types of workflow-based applications. The results indicate that WIDESim's performance is close to existing standard simulators besides its improvements.
△ Less
Submitted 13 December, 2023; v1 submitted 7 June, 2022;
originally announced June 2022.
-
PROMISSING: Pruning Missing Values in Neural Networks
Authors:
Seyed Mostafa Kia,
Nastaran Mohammadian Rad,
Daniel van Opstal,
Bart van Schie,
Andre F. Marquand,
Josien Pluim,
Wiepke Cahn,
Hugo G. Schnack
Abstract:
While data are the primary fuel for machine learning models, they often suffer from missing values, especially when collected in real-world scenarios. However, many off-the-shelf machine learning models, including artificial neural network models, are unable to handle these missing values directly. Therefore, extra data preprocessing and curation steps, such as data imputation, are inevitable befo…
▽ More
While data are the primary fuel for machine learning models, they often suffer from missing values, especially when collected in real-world scenarios. However, many off-the-shelf machine learning models, including artificial neural network models, are unable to handle these missing values directly. Therefore, extra data preprocessing and curation steps, such as data imputation, are inevitable before learning and prediction processes. In this study, we propose a simple and intuitive yet effective method for pruning missing values (PROMISSING) during learning and inference steps in neural networks. In this method, there is no need to remove or impute the missing values; instead, the missing values are treated as a new source of information (representing what we do not know). Our experiments on simulated data, several classification and regression benchmarks, and a multi-modal clinical dataset show that PROMISSING results in similar prediction performance compared to various imputation techniques. In addition, our experiments show models trained using PROMISSING techniques are becoming less decisive in their predictions when facing incomplete samples with many unknowns. This finding hopefully advances machine learning models from being pure predicting machines to more realistic thinkers that can also say "I do not know" when facing incomplete sources of information.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
Towards Understanding the Unreasonable Effectiveness of Learning AC-OPF Solutions
Authors:
My H. Dinh,
Ferdinando Fioretto,
Mostafa Mohammadian,
Kyri Baker
Abstract:
Optimal Power Flow (OPF) is a fundamental problem in power systems. It is computationally challenging and a recent line of research has proposed the use of Deep Neural Networks (DNNs) to find OPF approximations at vastly reduced runtimes when compared to those obtained by classical optimization methods. While these works show encouraging results in terms of accuracy and runtime, little is known on…
▽ More
Optimal Power Flow (OPF) is a fundamental problem in power systems. It is computationally challenging and a recent line of research has proposed the use of Deep Neural Networks (DNNs) to find OPF approximations at vastly reduced runtimes when compared to those obtained by classical optimization methods. While these works show encouraging results in terms of accuracy and runtime, little is known on why these models can predict OPF solutions accurately, as well as about their robustness. This paper provides a step forward to address this knowledge gap. The paper connects the volatility of the outputs of the generators to the ability of a learning model to approximate them, it sheds light on the characteristics affecting the DNN models to learn good predictors, and it proposes a new model that exploits the observations made by this paper to produce accurate and robust OPF predictions.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Continuum modeling of freeway traffic flows: State-of-the-art, challenges and future directions in the era of connected and automated vehicles
Authors:
Saeed Mohammadian,
Zuduo Zheng,
Md. Mazharul Haque,
Ashish Bhaskar
Abstract:
Connected and automated vehicles (CAVs) are expected to reshape traffic flow dynamics and present new challenges and opportunities for traffic flow modeling. While numerous studies have proposed optimal modeling and control strategies for CAVs with various objectives (e.g., traffic efficiency and safety), there are uncertainties about the flow dynamics of CAVs in real-world traffic. The uncertaint…
▽ More
Connected and automated vehicles (CAVs) are expected to reshape traffic flow dynamics and present new challenges and opportunities for traffic flow modeling. While numerous studies have proposed optimal modeling and control strategies for CAVs with various objectives (e.g., traffic efficiency and safety), there are uncertainties about the flow dynamics of CAVs in real-world traffic. The uncertainties are especially amplified for mixed traffic flows, consisting of CAVs and human-driven vehicles, where the implications can be significant from the continuum-modeling perspective, which aims to capture macroscopic traffic flow dynamics based on hyperbolic systems of partial differential equations. This paper aims to highlight and discuss some essential problems in continuum modeling of real-world freeway traffic flows in the era of CAVs. We first provide a select review of some existing continuum models for conventional human-driven traffic as well as the recent attempts for incorporating CAVs into the continuum-modeling framework. Wherever applicable, we provide new insights about the properties of existing models and revisit their implications for traffic flows of CAVs using recent empirical observations with CAVs and the previous discussions and debates in the literature. The paper then discusses some major problems inherent to continuum modeling of real-world (mixed) CAV traffic flows modeling by distinguishing between two major research directions: (a) modeling for explaining purposes, where making reproducible inferences about the physical aspects of macroscopic properties is of the primary interest, and (b) modeling for practical purposes, in which the focus is on the reliable predictions for operation and control. The paper proposes some potential solutions in each research direction and recommends some future research topics.
△ Less
Submitted 29 November, 2023; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Crash Severity Pattern of Motorcycle Crashes in Develo** Country Context
Authors:
Sina Asgharpour,
Mohammadjavad Javadinasr,
Zeinab Bayati,
Abolfazl,
Mohammadian
Abstract:
Despite paying special attention to the motorcycle-involved crashes in the safety research, little is known about their pattern and impacts in develo** countries. The widespread adoption of motorcycles in such regions in tandem with the vulnerability of motorcyclists exacerbates the likelihood of severe crashes. The main objective of this paper is to investigate the underlying factors contributi…
▽ More
Despite paying special attention to the motorcycle-involved crashes in the safety research, little is known about their pattern and impacts in develo** countries. The widespread adoption of motorcycles in such regions in tandem with the vulnerability of motorcyclists exacerbates the likelihood of severe crashes. The main objective of this paper is to investigate the underlying factors contributing to the severity of motorcycle-involved crashes through employing crash data from March 2018 to March 2019 from Iran. Considering the ordinal nature of three injury classes of property-damage-only (PDO), injury, and fatal crashes in our data, an ordered logistic regression model is employed to address the problem. The data statistics suggest that motorcycle is responsible for 38% of injury and 15% of all fatal crashes in the dataset. The results indicate that significant factors contributing to more severe crashes include collision, road, temporal, and motorcycle rider characteristics. Among all attributes, our model is most sensitive to the motorcycle-pedestrian accident, which increases the probability of belonging a crash into injury and fatal crashes by 0.289 and 0.019, respectively. Moreover, we discovered a significant degree of correlation between young riders and riders without a license. Finally, upon the insights obtained from the results, we propose safety countermeasures, including 1) strict traffic rule enforcement upon riders and pedestrians, 2) educational programs, and 3) road-specific adjustment policies.
△ Less
Submitted 7 April, 2022; v1 submitted 19 September, 2021;
originally announced October 2021.
-
A Deep-Learning Based Optimization Approach to Address Stop-Skip** Strategy in Urban Rail Transit Lines
Authors:
Mohammadjavad Javadinasr,
Amir Bahador Parsa,
Abolfazl,
Mohammadian
Abstract:
Different passenger demand rates in transit stations underscore the importance of adopting operational strategies to provide a demand-responsive service. Aiming at improving passengers' travel time, the present study introduces an advanced data-driven optimization approach to determine the optimal stop-skip pattern in urban rail transit lines. In detail, first, using the time-series smart card dat…
▽ More
Different passenger demand rates in transit stations underscore the importance of adopting operational strategies to provide a demand-responsive service. Aiming at improving passengers' travel time, the present study introduces an advanced data-driven optimization approach to determine the optimal stop-skip pattern in urban rail transit lines. In detail, first, using the time-series smart card data for an entire month, we employ a Long Short-Term Memory (LSTM) deep learning model to predict the station-level demand rates for the peak hour. This prediction is based on four preceding hours and is especially important knowing that the true demand rates of the peak hour are posterior information that can be obtained only after the peak hour operation is finished. Moreover, utilizing a real-time prediction instead of assuming fixed demand rates, allows us to account for unexpected real-time changes which can be detrimental to the subsequent analyses. Then, we integrate the output of the LSTM model as an input to an optimization model with the objective of minimizing patrons' total travel time. Considering the exponential nature of the problem, we propose an Ant Colony Optimization technique to solve the problem in a desirable amount of time. Finally, the performance of the proposed models and the solution algorithm is assessed using real case data. The results suggest that the proposed approach can enhance the performance of the service by improving both passengers' in-vehicle time as well as passengers' waiting time.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
The Enduring Effects of COVID-19 on Travel Behavior in the United States: A Panel Study on Observed and Expected Changes in Telecommuting, Mode Choice, Online Shop** and Air Travel
Authors:
Mohammadjavad Javadinasr,
Tassio B. Magassy,
Ehsan Rahimi,
Motahare,
Mohammadi,
Amir Davatgari,
Abolfazl,
Mohammadian,
Deborah Salon,
Matthew Wigginton Bhagat-Conway,
Rishabh Singh Chauhan,
Ram M. Pendyala,
Sybil Derrible,
Sara Khoeini
Abstract:
The explosive nature of Covid-19 transmission drastically altered the rhythm of daily life by forcing billions of people to stay at their homes. A critical challenge facing transportation planners is to identify the type and the extent of changes in people's activity-travel behavior in the post-pandemic world. In this study, we investigated the travel behavior evolution by analyzing a longitudinal…
▽ More
The explosive nature of Covid-19 transmission drastically altered the rhythm of daily life by forcing billions of people to stay at their homes. A critical challenge facing transportation planners is to identify the type and the extent of changes in people's activity-travel behavior in the post-pandemic world. In this study, we investigated the travel behavior evolution by analyzing a longitudinal two-wave panel survey data conducted in the United States from April 2020 to October 2020 (wave 1) and from November 2020 to May 2021(wave 2). Encompassing nearly 3,000 respondents across different states, we explored pandemic-induced changes and underlying reasons in four major categories of telecommute/telemedicine, commute mode choice, online shop**, and air travel. Upon concrete evidence, our findings substantiate significantly observed and expected changes in habits and preferences. According to results, nearly half of employees anticipate having the alternative to telecommute and among which 71% expect to work from home at least twice a week after the pandemic. In the post-pandemic period, auto and transit commuters are expected to be 9% and 31% less than pre-pandemic, respectively. A considerable rise in hybrid work and grocery/non-grocery online shop** is expected. Moreover, 41% of pre-covid business travelers expect to have fewer flights (after the pandemic) while only 8% anticipate more, compared to the pre-pandemic. Upon our analyses, we discuss a spectrum of policy implications in all mentioned areas.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
A Recursive Delay Estimation Algorithm for Linear Multivariable Systems with Time-varying Delays
Authors:
Iman Shafikhani,
Hazhar Sufi Karimi,
Mohammad Mohammadian,
Amin Ramezani,
Hamid Reza Momeni
Abstract:
Time delay estimation plays a critical role in control, stabilization and state estimation of many practical system with time delay. In this paper, we propose a method to estimate delay for discrete time linear multiple-input multiple-output systems with time-varying input delays. This method is purposefully given for situations where only a limited amount of information is available for the syste…
▽ More
Time delay estimation plays a critical role in control, stabilization and state estimation of many practical system with time delay. In this paper, we propose a method to estimate delay for discrete time linear multiple-input multiple-output systems with time-varying input delays. This method is purposefully given for situations where only a limited amount of information is available for the system. Although, this approach is primarily developed in a deterministic framework, it can also be applied to noisy data under special circumstances. In addition, switched linear autoregressive models with exogenous inputs are introduced as possible applications of the presented algorithm provided that the switching frequencies are small. Finally, effectiveness of the algorithm is illustrated by two numerical examples.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Hybrid Deep Neural Network for Brachial Plexus Nerve Segmentation in Ultrasound Images
Authors:
Juul P. A. van Boxtel,
Vincent R. J. Vousten,
Josien Pluim,
Nastaran Mohammadian Rad
Abstract:
Ultrasound-guided regional anesthesia (UGRA) can replace general anesthesia (GA), improving pain control and recovery time. This method can be applied on the brachial plexus (BP) after clavicular surgeries. However, identification of the BP from ultrasound (US) images is difficult, even for trained professionals. To address this problem, convolutional neural networks (CNNs) and more advanced deep…
▽ More
Ultrasound-guided regional anesthesia (UGRA) can replace general anesthesia (GA), improving pain control and recovery time. This method can be applied on the brachial plexus (BP) after clavicular surgeries. However, identification of the BP from ultrasound (US) images is difficult, even for trained professionals. To address this problem, convolutional neural networks (CNNs) and more advanced deep neural networks (DNNs) can be used for identification and segmentation of the BP nerve region. In this paper, we propose a hybrid model consisting of a classification model followed by a segmentation model to segment BP nerve regions in ultrasound images. A CNN model is employed as a classifier to precisely select the images with the BP region. Then, a U-net or M-net model is used for the segmentation. Our experimental results indicate that the proposed hybrid model significantly improves the segmentation performance over a single segmentation model.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
The potential stickiness of pandemic-induced behavior changes in the United States
Authors:
Deborah Salon,
Matthew Wigginton Conway,
Denise Capasso da Silva,
Rishabh Singh Chauhan,
Sybil Derrible,
Kouros Mohammadian,
Sara Khoeini,
Nathan Parker,
Laura Mirtich,
Ali Shamshiripour,
Ehsan Rahimi,
Ram Pendyala
Abstract:
Human behavior is notoriously difficult to change, but a disruption of the magnitude of the COVID-19 pandemic has the potential to bring about long-term behavioral changes. During the pandemic, people have been forced to experience new ways of interacting, working, learning, shop**, traveling, and eating meals. A critical question going forward is how these experiences have actually changed pref…
▽ More
Human behavior is notoriously difficult to change, but a disruption of the magnitude of the COVID-19 pandemic has the potential to bring about long-term behavioral changes. During the pandemic, people have been forced to experience new ways of interacting, working, learning, shop**, traveling, and eating meals. A critical question going forward is how these experiences have actually changed preferences and habits in ways that might persist after the pandemic ends. Many observers have suggested theories about what the future will bring, but concrete evidence has been lacking. We present evidence on how much U.S. adults expect their own post-pandemic choices to differ from their pre-pandemic lifestyles in the areas of telecommuting, restaurant patronage, air travel, online shop**, transit use, car commuting, uptake of walking and biking, and home location. The analysis is based on a nationally-representative survey dataset collected between July and October 2020. Key findings include that the new normal will feature a doubling of telecommuting, reduced air travel, and improved quality of life for some.
△ Less
Submitted 25 May, 2021; v1 submitted 29 April, 2021;
originally announced April 2021.
-
A database of travel-related behaviors and attitudes before, during, and after COVID-19 in the United States
Authors:
Rishabh Singh Chauhan,
Matthew Wigginton Conway,
Denise Capasso da Silva,
Deborah Salon,
Ali Shamshiripour,
Ehsan Rahimi,
Sara Khoeini,
Abolfazl Mohammadian,
Sybil Derrible,
Ram Pendyala
Abstract:
The COVID-19 pandemic has impacted billions of people around the world. To capture some of these impacts in the United States, we are conducting a nationwide longitudinal survey collecting information about activity and travel-related behaviors and attitudes before, during, and after the COVID-19 pandemic. The survey questions cover a wide range of topics including commuting, daily travel, air tra…
▽ More
The COVID-19 pandemic has impacted billions of people around the world. To capture some of these impacts in the United States, we are conducting a nationwide longitudinal survey collecting information about activity and travel-related behaviors and attitudes before, during, and after the COVID-19 pandemic. The survey questions cover a wide range of topics including commuting, daily travel, air travel, working from home, online learning, shop**, and risk perception, along with attitudinal, socioeconomic, and demographic information. The survey is deployed over multiple waves to the same respondents to monitor how behaviors and attitudes evolve over time. Version 1.0 of the survey contains 8,723 Wave 1 responses that are publicly available. This article details the methodology adopted for the collection, cleaning, and processing of the data. In addition, the data are weighted to be representative of national and regional demographics. This survey dataset can aid researchers, policymakers, businesses, and government agencies in understanding both the extent of behavioral shifts and the likelihood that changes in behaviors will persist after COVID-19.
△ Less
Submitted 9 October, 2021; v1 submitted 29 March, 2021;
originally announced March 2021.
-
On the location of zeros of the Laplacian matching polynomials of graphs
Authors:
Jiang-Chao Wan,
Yi Wang,
Ali Mohammadian
Abstract:
The Laplacian matching polynomial of a graph $G$, denoted by $\mathscr{L\hspace{-0.7mm}M}(G,x)$, is a new graph polynomial whose all roots are nonnegative real numbers. In this paper, we investigate the location of zeros of the Laplacian matching polynomials. Let $G$ be a connected graph. We show that $0$ is a root of $\mathscr{L\hspace{-0.7mm}M}(G, x)$ if and only if $G$ is a tree. We prove that…
▽ More
The Laplacian matching polynomial of a graph $G$, denoted by $\mathscr{L\hspace{-0.7mm}M}(G,x)$, is a new graph polynomial whose all roots are nonnegative real numbers. In this paper, we investigate the location of zeros of the Laplacian matching polynomials. Let $G$ be a connected graph. We show that $0$ is a root of $\mathscr{L\hspace{-0.7mm}M}(G, x)$ if and only if $G$ is a tree. We prove that the number of distinct positive zeros of $\mathscr{L\hspace{-0.7mm}M}(G,x)$ is at least equal to the length of the longest path in $G$. It is also established that the zeros of $\mathscr{L\hspace{-0.7mm}M}(G,x)$ and $\mathscr{L\hspace{-0.7mm}M}(G-e,x)$ interlace for each edge $e$ of $G$. Using the path-tree of $G$, we present a linear algebraic approach to investigate the largest zero of $\mathscr{L\hspace{-0.7mm}M}(G,x)$ and particularly to give tight upper and lower bounds on it.
△ Less
Submitted 22 June, 2021; v1 submitted 18 March, 2021;
originally announced March 2021.
-
An adaptive central-upwind scheme on quadtree grids for variable density shallow water equations
Authors:
Mohammad A. Ghazizadeh,
Abdolmajid Mohammadian
Abstract:
Minimizing computational cost is one of the major challenges in the modelling and numerical analysis of hydrodynamics, and one of the ways to achieve this is by the use of quadtree grids. In this paper, we present an adaptive scheme on quadtree grids for variable density shallow water equations. A scheme for the coupled system is developed based on the well-balanced positivity-preserving central-u…
▽ More
Minimizing computational cost is one of the major challenges in the modelling and numerical analysis of hydrodynamics, and one of the ways to achieve this is by the use of quadtree grids. In this paper, we present an adaptive scheme on quadtree grids for variable density shallow water equations. A scheme for the coupled system is developed based on the well-balanced positivity-preserving central-upwind scheme proposed in [18]. The scheme is capable of exactly preserving "lake-at-rest" steady states. A continuous piecewise bi-linear interpolation of the bottom topography function is used to achieve higher-order in space in order to preserve the positivity of water depth for the point values of each computational cell. Necessary conditions are checked to be able to preserve the positivity of water depth and density, and to ensure the achievement of a stable numerical scheme. At each timestep, local gradients are examined to find new seeding points to locally refine/coarsen the computational grid.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Threshold for weak saturation stability
Authors:
M. Bidgoli,
A. Mohammadian,
B. Tayfeh-Rezaie,
M. Zhukovskii
Abstract:
We study the weak $K_s$-saturation number of the Erdős--Rényi random graph $\mathbbmsl{G}(n, p)$, denoted by $\mathrm{wsat}(\mathbbmsl{G}(n, p), K_s)$, where $K_s$ is the complete graph on $s$ vertices. Korándi and Sudakov in 2017 proved that the weak $K_s$-saturation number of $K_n$ is stable, in the sense that it remains the same after removing edges with constant probability. In this paper, we…
▽ More
We study the weak $K_s$-saturation number of the Erdős--Rényi random graph $\mathbbmsl{G}(n, p)$, denoted by $\mathrm{wsat}(\mathbbmsl{G}(n, p), K_s)$, where $K_s$ is the complete graph on $s$ vertices. Korándi and Sudakov in 2017 proved that the weak $K_s$-saturation number of $K_n$ is stable, in the sense that it remains the same after removing edges with constant probability. In this paper, we prove that there exists a threshold for this stability property and give upper and lower bounds on the threshold. This generalizes the result of Korándi and Sudakov. A general upper bound for $\mathrm{wsat}(\mathbbmsl{G}(n, p), K_s)$ is also provided.
△ Less
Submitted 12 November, 2021; v1 submitted 11 June, 2020;
originally announced June 2020.
-
Passengers' Travel Behavior in Response to Unplanned Transit Disruptions
Authors:
Nima Golshani,
Ehsan Rahimi,
Ramin Shabanpour,
Kouros Mohammadian,
Joshua Auld,
Hubert Ley
Abstract:
Public transit disruption is becoming more common across different transit services, which can have a destructive influence on the resiliency and reliability of the transportation system. Utilizing a recently collected data of transit users in the Chicago Metropolitan Area, the current study aims to analyze how transit users respond to unplanned service disruption and disclose the factors that aff…
▽ More
Public transit disruption is becoming more common across different transit services, which can have a destructive influence on the resiliency and reliability of the transportation system. Utilizing a recently collected data of transit users in the Chicago Metropolitan Area, the current study aims to analyze how transit users respond to unplanned service disruption and disclose the factors that affect their behavior.
△ Less
Submitted 23 July, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
Applying Deep Learning to Detect Traffic Accidents in Real Time Using Spatiotemporal Sequential Data
Authors:
Amir Bahador Parsa,
Rishabh Singh Chauhan,
Homa Taghipour,
Sybil Derrible,
Abolfazl Mohammadian
Abstract:
Accident detection is a vital part of traffic safety. Many road users suffer from traffic accidents, as well as their consequences such as delay, congestion, air pollution, and so on. In this study, we utilize two advanced deep learning techniques, Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRUs), to detect traffic accidents in Chicago. These two techniques are selected because they…
▽ More
Accident detection is a vital part of traffic safety. Many road users suffer from traffic accidents, as well as their consequences such as delay, congestion, air pollution, and so on. In this study, we utilize two advanced deep learning techniques, Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRUs), to detect traffic accidents in Chicago. These two techniques are selected because they are known to perform well with sequential data (i.e., time series). The full dataset consists of 241 accident and 6,038 non-accident cases selected from Chicago expressway, and it includes traffic spatiotemporal data, weather condition data, and congestion status data. Moreover, because the dataset is imbalanced (i.e., the dataset contains many more non-accident cases than accident cases), Synthetic Minority Over-sampling Technique (SMOTE) is employed. Overall, the two models perform significantly well, both with an Area Under Curve (AUC) of 0.85. Nonetheless, the GRU model is observed to perform slightly better than LSTM model with respect to detection rate. The performance of both models is similar in terms of false alarm rate.
△ Less
Submitted 22 December, 2019; v1 submitted 15 December, 2019;
originally announced December 2019.
-
An adaptive well-balanced positivity preserving central-upwind scheme on quadtree grids for shallow water equations
Authors:
Mohammad A. Ghazizadeh,
Abdolmajid Mohammadian,
Alexander Kurganov
Abstract:
We present an adaptive well-balanced positivity preserving central-upwind scheme on quadtree grids for shallow water equations. The use of quadtree grids results in a robust, efficient and highly accurate numerical method. The quadtree model is developed based on the well-balanced positivity preserving central-upwind scheme proposed in [A. Kurganov and G. Petrova, Commun. Math. Sci., 5 (2007), pp.…
▽ More
We present an adaptive well-balanced positivity preserving central-upwind scheme on quadtree grids for shallow water equations. The use of quadtree grids results in a robust, efficient and highly accurate numerical method. The quadtree model is developed based on the well-balanced positivity preserving central-upwind scheme proposed in [A. Kurganov and G. Petrova, Commun. Math. Sci., 5 (2007), pp. 133--160]. The designed scheme is well-balanced in the sense that it is capable of exactly preserving "lake-at-rest" steady states. In order to achieve this as well as to preserve positivity of water depth, a continuous piecewise bilinear interpolation of the bottom topography function is utilized. This makes the proposed scheme capable of modelling flows over discontinuous bottom topography. Local gradients are examined to determine new seeding points in grid refinement for the next timestep. Numerical examples demonstrate the promising performance of the central-upwind quadtree scheme.
△ Less
Submitted 11 February, 2020; v1 submitted 27 November, 2019;
originally announced November 2019.
-
Constructive Domains with Classical Witnesses
Authors:
Dirk Pattinson,
Mina Mohammadian
Abstract:
We develop a constructive theory of continuous domains from the perspective of program extraction. Our goal that programs represent (provably correct) computation without witnesses of correctness is achieved by formulating correctness assertions classically. Technically, we start from a predomain base and construct a completion. We then investigate continuity with respect to the Scott topology, an…
▽ More
We develop a constructive theory of continuous domains from the perspective of program extraction. Our goal that programs represent (provably correct) computation without witnesses of correctness is achieved by formulating correctness assertions classically. Technically, we start from a predomain base and construct a completion. We then investigate continuity with respect to the Scott topology, and present a construction of the function space. We then discuss our main motivating example in detail, and instantiate our theory to real numbers that we conceptualise as the total elements of the completion of the predomain of rational intervals, and prove a representation theorem that precisely delineates the class of representable continuous functions.
△ Less
Submitted 1 March, 2021; v1 submitted 10 October, 2019;
originally announced October 2019.
-
Feasible bases for a polytope related to the Hamilton cycle problem
Authors:
Thomas Kalinowski,
Sogol Mohammadian
Abstract:
We study a certain polytope depending on a graph $G$ and a parameter $β\in(0,1)$ which arises from embedding the Hamiltonian cycle problem in a discounted Markov decision process. Eshragh \emph{et al.} conjectured a lower bound on the proportion of feasible bases corresponding to Hamiltonian cycles in the set of all feasible bases. We make progress towards a proof of the conjecture by proving resu…
▽ More
We study a certain polytope depending on a graph $G$ and a parameter $β\in(0,1)$ which arises from embedding the Hamiltonian cycle problem in a discounted Markov decision process. Eshragh \emph{et al.} conjectured a lower bound on the proportion of feasible bases corresponding to Hamiltonian cycles in the set of all feasible bases. We make progress towards a proof of the conjecture by proving results about the structure of feasible bases. In particular, we prove three main results: (1) the set of feasible bases is independent of the parameter $β$ when the parameter is close to 1, (2) the polytope can be interpreted as a generalized network flow polytope and (3) we deduce a combinatorial interpretation of the feasible bases. We also provide a full characterization for a special class of feasible bases, and we apply this to provide some computational support for the conjecture.
△ Less
Submitted 29 July, 2019;
originally announced July 2019.
-
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation
Authors:
Esmaeil Mohammadian Koruyeh,
Shirin Haji Amin Shirazi,
Khaled N. Khasawneh,
Chengyu Song,
Nael Abu-Ghazaleh
Abstract:
Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijackin…
▽ More
Spectre attacks and their many subsequent variants are a new vulnerability class affecting modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by exploiting the branch prediction structures, to execute a vulnerable code sequence speculatively. In this paper, we propose to use Control-Flow Integrity (CFI), a security technique used to stop control-flow hijacking attacks, on the committed path, to prevent speculative control-flow from being hijacked to launch the most dangerous variants of the Spectre attacks (Spectre-BTB and Spectre-RSB). Specifically, CFI attempts to constrain the possible targets of an indirect branch to a set of legal targets defined by a pre-calculated control-flow graph (CFG). As CFI is being adopted by commodity software (e.g., Windows and Android) and commodity hardware (e.g., Intel's CET and ARM's BTI), the CFI information becomes readily available through the hardware CFI extensions. With the CFI information, we apply CFI principles to also constrain illegal control-flow during speculative execution. Specifically, our proposed defense, SPECCFI, ensures that control flow instructions target legal destinations to constrain dangerous speculation on forward control-flow paths (indirect calls and branches). We augment this protection with a precise speculation-aware hardware stack to constrain speculation on backward control-flow edges (returns). We combine this solution with existing solutions against branch target predictor attacks (Spectre-PHT) to close all known non-vendor-specific Spectre vulnerabilities. We show that SPECCFI results in small overheads both in terms of performance and additional hardware complexity.
△ Less
Submitted 4 December, 2019; v1 submitted 4 June, 2019;
originally announced June 2019.
-
Percolating sets in bootstrap percolation on the Hamming graphs
Authors:
M. R. Bidgoli,
A. Mohammadian,
B. Tayfeh-Rezaie
Abstract:
For any integer $r\geqslant0$, the $r$-neighbor bootstrap percolation on a graph is an activation process of the vertices. The process starts with some initially activated vertices and then, in each round, any inactive vertex with at least $r$ active neighbors becomes activated. A set of initially activated vertices leading to the activation of all vertices is said to be a percolating set. Denote…
▽ More
For any integer $r\geqslant0$, the $r$-neighbor bootstrap percolation on a graph is an activation process of the vertices. The process starts with some initially activated vertices and then, in each round, any inactive vertex with at least $r$ active neighbors becomes activated. A set of initially activated vertices leading to the activation of all vertices is said to be a percolating set. Denote the minimum size of a percolating set in the $r$-neighbor bootstrap percolation process on a graph $G$ by $m(G, r)$. In this paper, we present upper and lower bounds on $m(K_n^d, r)$, where $K_n^d$ is the Cartesian product of $d$ copies of the complete graph $K_n$ which is referred as the Hamming graph. Among other results, we show that $m(K_n^d, r)=\frac{1+o(1)}{(d+1)!}r^d$ when both $r$ and $d$ go to infinity with $r<n$ and $d=o(\!\sqrt{r})$.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
Full-Duplex GFDM Radio Transceivers in the Presence of Phase Noise, CFO and IQ Imbalance
Authors:
Amirhossein Mohammadian,
Chintha Tellambura
Abstract:
This paper addresses the performance of a full-duplex (FD) generalized frequency division multiplexing (GFDM) transceiver in the presence of radio frequency (RF) impairments including phase noise, carrier frequency offset (CFO) and in-phase (I) and quadrature (Q) imbalance. We study analog and digital self-interference (SI) cancellation and develop a complementary SI suppression method. Closed-for…
▽ More
This paper addresses the performance of a full-duplex (FD) generalized frequency division multiplexing (GFDM) transceiver in the presence of radio frequency (RF) impairments including phase noise, carrier frequency offset (CFO) and in-phase (I) and quadrature (Q) imbalance. We study analog and digital self-interference (SI) cancellation and develop a complementary SI suppression method. Closed-form solutions for the residual SI power and the desired signal power and signal-to-interference ratio (SIR) are provided. Simulation results show that the RF impairments degrade SI cancellation and FD GFDM is more sensitive to them compares to FD orthogonal frequency division multiplexing (OFDM). Hence, we propose an FD GFDM receiver filter for maximizing the SIR. Significantly, it achieves 25 dB higher SIR than FD OFDM transceiver.
△ Less
Submitted 29 March, 2019;
originally announced April 2019.
-
Partial Shading Detection and Smooth Maximum Power Point Tracking of PV Arrays under PSC
Authors:
Mohammad Amin Ghasemi,
Hossein Mohammadian Foroushani,
Mostafa Parniani
Abstract:
One of the most important issues in the operation of a photovoltaic (PV) system is extracting maximum power from the PV array, especially in partial shading condition (PSC). Under PSC, P-V characteristic of PV arrays will have multiple peak points, only one of which is global maximum. Conventional maximum power point tracking (MPPT) methods are not able to extract maximum power in this condition.…
▽ More
One of the most important issues in the operation of a photovoltaic (PV) system is extracting maximum power from the PV array, especially in partial shading condition (PSC). Under PSC, P-V characteristic of PV arrays will have multiple peak points, only one of which is global maximum. Conventional maximum power point tracking (MPPT) methods are not able to extract maximum power in this condition. In this paper, a novel two-stage MPPT method is presented to overcome this drawback. In the first stage, a method is proposed to determine the occurrence of PSC, and in the second stage, using a new algorithm that is based on ramp change of the duty cycle and continuous sampling from the P-V characteristic of the array, global maximum power point of array is reached. P&O algorithm is then re-activated to trace small changes of the new MPP. Open loop operation of the proposed method makes its implementation cheap and simple. The method is robust in the face of changing environmental conditions and array characteristics, and has minimum negative impact on the connected power system. Simulations in Matlab/Simulink and experimental results validate the performance of the proposed methods.
△ Less
Submitted 29 October, 2018;
originally announced October 2018.
-
Fast Maximum Power Point Tracking for PV Arrays under Partial shaded Conditions
Authors:
M. Amin Ghasemi,
Mostafa Parniani,
S. Fariborz Zarei,
Hossein Mohammadian Foroushani
Abstract:
P-V characteristic of photovoltaic (PV) arrays under partially shaded conditions (PSC) has multiple peaks, and conventional maximum power point tracking (MPPT) algorithms may fail to track the global maximum power point (GMPP) because of their insufficient intelligence in discriminating the local and global peaks. This paper proposes a novel fast MPPT method to achieve GMPP of PV array under all P…
▽ More
P-V characteristic of photovoltaic (PV) arrays under partially shaded conditions (PSC) has multiple peaks, and conventional maximum power point tracking (MPPT) algorithms may fail to track the global maximum power point (GMPP) because of their insufficient intelligence in discriminating the local and global peaks. This paper proposes a novel fast MPPT method to achieve GMPP of PV array under all PSCs. The proposed method reduces the number of required samples and increases the speed of GMPP tracking based on comprehensive study of I-V and P-V characteristics of PV array. Performance of the proposed method has been evaluated in simulations of different PSCs. Also, its performance has been compared with two selected methods in the literature through simulations. Comparisons highlight the superiority of the proposed method.
△ Less
Submitted 16 September, 2018;
originally announced September 2018.
-
Spectre Returns! Speculation Attacks using the Return Stack Buffer
Authors:
Esmaeil Mohammadian Koruyeh,
Khaled Khasawneh,
Chengyu Song,
Nael Abu-Ghazaleh
Abstract:
The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection boundaries. In this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than exploiting the branch predictor unit, SpectreRSB exploits the return stack buffer (RSB), a common predictor…
▽ More
The recent Spectre attacks exploit speculative execution, a pervasively used feature of modern microprocessors, to allow the exfiltration of sensitive data across protection boundaries. In this paper, we introduce a new Spectre-class attack that we call SpectreRSB. In particular, rather than exploiting the branch predictor unit, SpectreRSB exploits the return stack buffer (RSB), a common predictor structure in modern CPUs used to predict return addresses. We show that both local attacks (within the same process such as Spectre 1) and attacks on SGX are possible by constructing proof of concept attacks. We also analyze additional types of the attack on the kernel or across address spaces and show that under some practical and widely used conditions they are possible. Importantly, none of the known defenses including Retpoline and Intel's microcode patches stop all SpectreRSB attacks. We believe that future system developers should be aware of this vulnerability and consider it in develo** defenses against speculation attacks. In particular, on Core-i7 Skylake and newer processors (but not on Intel's Xeon processor line), a patch called RSB refilling is used to address a vulnerability when the RSB underfills; this defense interferes with SpectreRSB's ability to launch attacks that switch into the kernel. We recommend that this patch should be used on all machines to protect against SpectreRSB.
△ Less
Submitted 20 July, 2018;
originally announced July 2018.
-
On $K_{2,t}$-bootstrap percolation
Authors:
M. R. Bidgoli,
A. Mohammadian,
B. Tayfeh-Rezaie
Abstract:
Given two graphs $G$ and $H$, it is said that $G$ percolates in $H$-bootstrap process if one could join all the nonadjacent pairs of vertices of $G$ in some order such that a new copy of $H$ is created at each step. Balogh, Bollobás and Morris in 2012 investigated the threshold of $H$-bootstrap percolation in the Erdős-Rényi model for the complete graph $H$ and proposed the similar problem for…
▽ More
Given two graphs $G$ and $H$, it is said that $G$ percolates in $H$-bootstrap process if one could join all the nonadjacent pairs of vertices of $G$ in some order such that a new copy of $H$ is created at each step. Balogh, Bollobás and Morris in 2012 investigated the threshold of $H$-bootstrap percolation in the Erdős-Rényi model for the complete graph $H$ and proposed the similar problem for $H=K_{s,t}$, the complete bipartite graph. In this paper, we provide lower and upper bounds on the threshold of $K_{2, t}$-bootstrap percolation. In addition, a threshold function is derived for $K_{2, 4}$-bootstrap percolation.
△ Less
Submitted 27 June, 2018;
originally announced June 2018.
-
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
Authors:
Khaled N. Khasawneh,
Esmaeil Mohammadian Koruyeh,
Chengyu Song,
Dmitry Evtyushkin,
Dmitry Ponomarev,
Nael Abu-Ghazaleh
Abstract:
Speculative execution which is used pervasively in modern CPUs can leave side effects in the processor caches and other structures even when the speculated instructions do not commit and their direct effect is not visible. The recent Meltdown and Spectre attacks have shown that this behavior can be exploited to expose privileged information to an unprivileged attacker. In particular, the attack fo…
▽ More
Speculative execution which is used pervasively in modern CPUs can leave side effects in the processor caches and other structures even when the speculated instructions do not commit and their direct effect is not visible. The recent Meltdown and Spectre attacks have shown that this behavior can be exploited to expose privileged information to an unprivileged attacker. In particular, the attack forces the speculative execution of a code gadget that will carry out the illegal read, which eventually gets squashed, but which leaves a side-channel trail that can be used by the attacker to infer the value. Several attack variations are possible, allowing arbitrary exposure of the full kernel memory to an unprivileged attacker. In this paper, we introduce a new model (SafeSpec) for supporting speculation in a way that is immune to side-channel leakage necessary for attacks such as Meltdown and Spectre. In particular, SafeSpec stores side effects of speculation in a way that is not visible to the attacker while the instructions are speculative. The speculative state is then either committed to the main CPU structures if the branch commits, or squashed if it does not, making all direct side effects of speculative code invisible. The solution must also address the possibility of a covert channel from speculative instructions to committed instructions before these instructions are committed. We show that SafeSpec prevents all three variants of Spectre and Meltdown, as well as new variants that we introduce. We also develop a cycle accurate model of modified design of an x86-64 processor and show that the performance impact is negligible. We build prototypes of the hardware support in a hardware description language to show that the additional overhead is small. We believe that SafeSpec completely closes this class of attacks, and that it is practical to implement.
△ Less
Submitted 15 June, 2018; v1 submitted 13 June, 2018;
originally announced June 2018.
-
Hamiltonian cycles and subsets of discounted occupational measures
Authors:
Ali Eshragh,
Jerzy A. Filar,
Thomas Kalinowski,
Sogol Mohammadian
Abstract:
We study a certain polytope arising from embedding the Hamiltonian cycle problem in a discounted Markov decision process. The Hamiltonian cycle problem can be reduced to finding particular extreme points of a certain polytope associated with the input graph. This polytope is a subset of the space of discounted occupational measures. We characterize the feasible bases of the polytope for a general…
▽ More
We study a certain polytope arising from embedding the Hamiltonian cycle problem in a discounted Markov decision process. The Hamiltonian cycle problem can be reduced to finding particular extreme points of a certain polytope associated with the input graph. This polytope is a subset of the space of discounted occupational measures. We characterize the feasible bases of the polytope for a general input graph $G$, and determine the expected numbers of different types of feasible bases when the underlying graph is random. We utilize these results to demonstrate that augmenting certain additional constraints to reduce the polyhedral domain can eliminate a large number of feasible bases that do not correspond to Hamiltonian cycles. Finally, we develop a random walk algorithm on the feasible bases of the reduced polytope and present some numerical results. We conclude with a conjecture on the feasible bases of the reduced polytope.
△ Less
Submitted 25 January, 2019; v1 submitted 12 May, 2018;
originally announced May 2018.
-
Analysis and Rate Optimization of GFDM-based Cognitive Radios
Authors:
A. Mohammadian,
M. Baghani,
C. Tellambura
Abstract:
Generalized frequency division multiplexing (GFDM) is suitable for cognitive radio (CR) networks due to its low out-of-band (OOB) emission and high spectral efficiency. In this paper, we thus consider the use of GFDM to allow an unlicensed secondary user (SU) to access a spectrum hole. However, in an extremely congested spectrum scenario, both active incumbent primary users (PUs) on the left and r…
▽ More
Generalized frequency division multiplexing (GFDM) is suitable for cognitive radio (CR) networks due to its low out-of-band (OOB) emission and high spectral efficiency. In this paper, we thus consider the use of GFDM to allow an unlicensed secondary user (SU) to access a spectrum hole. However, in an extremely congested spectrum scenario, both active incumbent primary users (PUs) on the left and right channels of the spectrum hole will experience OOB interference. While constraining this interference, we thus investigate the problem of power allocation to the SU transmit subcarriers in order to maximize the overall data rate where the SU receiver is employing Matched filter (MF) and zero-forcing (ZF) structures. The power allocation problem is thus solved as a classic convex optimization problem. Finally, total transmission rate of GFDM is compared with that of orthogonal frequency division multiplexing (OFDM). For instance, when right and left interference temperature should be below 10 dBm, the capacity gain of GFDM over OFDM is 400 %.
△ Less
Submitted 8 March, 2018;
originally announced March 2018.
-
Spectral Analysis of GFDM Modulated Signal under Nonlinear Behavior of Power Amplifier
Authors:
Amirhossein Mohammadian,
Abbas Mohammadi,
Abdolali Abdipour,
Mina Baghani
Abstract:
General frequency division multiplexing (GFDM) is a flexible non-orthogonal waveform candidate for 5G which can offer some advantages such as low out-of-band (OOB) emission and high spectral efficiency. In this paper, the effects of nonlinear behavior of practical PAs on GFDM signal are studied. In the first step, a closed form expression for power spectral density (PSD) of GFDM signal is extracte…
▽ More
General frequency division multiplexing (GFDM) is a flexible non-orthogonal waveform candidate for 5G which can offer some advantages such as low out-of-band (OOB) emission and high spectral efficiency. In this paper, the effects of nonlinear behavior of practical PAs on GFDM signal are studied. In the first step, a closed form expression for power spectral density (PSD) of GFDM signal is extracted. Then, the PSD at the output of PA as a function of input power and the coefficients of nonlinear polynomial PA model is derived. In addition, the adjacent channel power (ACP) and ACP ratio, as two important performance metrics, are evaluated. The simulation results confirm the accuracy of derived analytical expressions. Moreover, to validate the performance of GFDM modulation after nonlinear PA, it is compared with OFDM modulation.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Star Saturation Number of Random Graphs
Authors:
A. Mohammadian,
B. Tayfeh-Rezaie
Abstract:
For a given graph $F$, the $F$-saturation number of a graph $G$ is the minimum number of edges in an edge-maximal $F$-free subgraph of $G$. Recently, the $F$-saturation number of the Erdős$\text{\bf--}$Rényi random graph $\mathbbmsl{G}(n, p)$ has been determined asymptotically for any complete graph $F$. In this paper, we give an asymptotic formula for the $F$-saturation number of…
▽ More
For a given graph $F$, the $F$-saturation number of a graph $G$ is the minimum number of edges in an edge-maximal $F$-free subgraph of $G$. Recently, the $F$-saturation number of the Erdős$\text{\bf--}$Rényi random graph $\mathbbmsl{G}(n, p)$ has been determined asymptotically for any complete graph $F$. In this paper, we give an asymptotic formula for the $F$-saturation number of $\mathbbmsl{G}(n, p)$ when $F$ is a star graph.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.