-
Connecting the Dots: Evaluating Abstract Reasoning Capabilities of LLMs Using the New York Times Connections Word Game
Authors:
Prisha Samadarshi,
Mariam Mustafa,
Anushka Kulkarni,
Raven Rothkopf,
Tuhin Chakrabarty,
Smaranda Muresan
Abstract:
The New York Times Connections game has emerged as a popular and challenging pursuit for word puzzle enthusiasts. We collect 200 Connections games to evaluate the performance of state-of-the-art large language models (LLMs) against expert and novice human players. Our results show that even the best-performing LLM, GPT-4o, which has otherwise shown impressive reasoning abilities on a wide variety…
▽ More
The New York Times Connections game has emerged as a popular and challenging pursuit for word puzzle enthusiasts. We collect 200 Connections games to evaluate the performance of state-of-the-art large language models (LLMs) against expert and novice human players. Our results show that even the best-performing LLM, GPT-4o, which has otherwise shown impressive reasoning abilities on a wide variety of benchmarks, can only fully solve 8% of the games. Compared to GPT-4o, novice and expert players perform better, with expert human players significantly outperforming GPT-4o. To deepen our understanding we create a taxonomy of the knowledge types required to successfully categorize words in the Connections game, revealing that LLMs struggle with associative, encyclopedic, and linguistic knowledge. Our findings establish the New York Times Connections game as a challenging benchmark for evaluating abstract reasoning capabilities in humans and AI systems.
△ Less
Submitted 5 July, 2024; v1 submitted 16 June, 2024;
originally announced June 2024.
-
Proactive Load-Sha** Strategies with Privacy-Cost Trade-offs in Residential Households based on Deep Reinforcement Learning
Authors:
Ruichang Zhang,
Youcheng Sun,
Mustafa A. Mustafa
Abstract:
Smart meters play a crucial role in enhancing energy management and efficiency, but they raise significant privacy concerns by potentially revealing detailed user behaviors through energy consumption patterns. Recent scholarly efforts have focused on develo** battery-aided load-sha** techniques to protect user privacy while balancing costs. This paper proposes a novel deep reinforcement learni…
▽ More
Smart meters play a crucial role in enhancing energy management and efficiency, but they raise significant privacy concerns by potentially revealing detailed user behaviors through energy consumption patterns. Recent scholarly efforts have focused on develo** battery-aided load-sha** techniques to protect user privacy while balancing costs. This paper proposes a novel deep reinforcement learning-based load-sha** algorithm (PLS-DQN) designed to protect user privacy by proactively creating artificial load signatures that mislead potential attackers. We evaluate our proposed algorithm against a non-intrusive load monitoring (NILM) adversary. The results demonstrate that our approach not only effectively conceals real energy usage patterns but also outperforms state-of-the-art methods in enhancing user privacy while maintaining cost efficiency.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Privacy-Preserving Billing for Local Energy Markets (Long Version)
Authors:
Eman Alqahtani,
Mustafa A. Mustafa
Abstract:
We propose a privacy-preserving billing protocol for local energy markets (PBP-LEMs) that takes into account market participants' energy volume deviations from their bids. PBP-LEMs enables a group of market entities to jointly compute participants' bills in a decentralized and privacy-preserving manner without sacrificing correctness. It also mitigates risks on individuals' privacy arising from an…
▽ More
We propose a privacy-preserving billing protocol for local energy markets (PBP-LEMs) that takes into account market participants' energy volume deviations from their bids. PBP-LEMs enables a group of market entities to jointly compute participants' bills in a decentralized and privacy-preserving manner without sacrificing correctness. It also mitigates risks on individuals' privacy arising from any potential internal collusion. We first propose a novel, efficient, and privacy-preserving individual billing scheme, achieving information-theoretic security, which serves as a building block. PBP-LEMs utilizes this scheme, along with other techniques such as multiparty computation, Pedersen commitments and inner product functional encryption, to ensure data confidentiality and accuracy. Additionally, we present three approaches, resulting in different levels of privacy and performance. We prove that the protocol meets its security and privacy requirements and is feasible for deployment in real LEMs. Our analysis also shows variations in overall performance and identifies areas where overhead is concentrated based on the applied approach.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Hard Thermal Loop -- theory and applications
Authors:
Najmul Haque,
Munshi G. Mustafa
Abstract:
In this review, we present the most key aspects of modern thermal perturbation theory based on hard thermal loop (HTL) approximation including its theoretical foundations and discuss some applications within quantum electrodynamics (QED) and quantum chromodynamics (QCD) plasma. To maintain conciseness, our discussion is confined to thermal equilibrium scenarios, but consider a variety of different…
▽ More
In this review, we present the most key aspects of modern thermal perturbation theory based on hard thermal loop (HTL) approximation including its theoretical foundations and discuss some applications within quantum electrodynamics (QED) and quantum chromodynamics (QCD) plasma. To maintain conciseness, our discussion is confined to thermal equilibrium scenarios, but consider a variety of different quantities and settings. Specifically, we discuss both bulk thermodynamic properties and real-time observables, spanning the domain of high temperatures, relevant for heavy-ion physics.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
Privacy-Preserving Distributed Learning for Residential Short-Term Load Forecasting
Authors:
Yi Dong,
Yingjie Wang,
Mariana Gama,
Mustafa A. Mustafa,
Geert Deconinck,
Xiaowei Huang
Abstract:
In the realm of power systems, the increasing involvement of residential users in load forecasting applications has heightened concerns about data privacy. Specifically, the load data can inadvertently reveal the daily routines of residential users, thereby posing a risk to their property security. While federated learning (FL) has been employed to safeguard user privacy by enabling model training…
▽ More
In the realm of power systems, the increasing involvement of residential users in load forecasting applications has heightened concerns about data privacy. Specifically, the load data can inadvertently reveal the daily routines of residential users, thereby posing a risk to their property security. While federated learning (FL) has been employed to safeguard user privacy by enabling model training without the exchange of raw data, these FL models have shown vulnerabilities to emerging attack techniques, such as Deep Leakage from Gradients and poisoning attacks. To counteract these, we initially employ a Secure-Aggregation (SecAgg) algorithm that leverages multiparty computation cryptographic techniques to mitigate the risk of gradient leakage. However, the introduction of SecAgg necessitates the deployment of additional sub-center servers for executing the multiparty computation protocol, thereby escalating computational complexity and reducing system robustness, especially in scenarios where one or more sub-centers are unavailable. To address these challenges, we introduce a Markovian Switching-based distributed training framework, the convergence of which is substantiated through rigorous theoretical analysis. The Distributed Markovian Switching (DMS) topology shows strong robustness towards the poisoning attacks as well. Case studies employing real-world power system load data validate the efficacy of our proposed algorithm. It not only significantly minimizes communication complexity but also maintains accuracy levels comparable to traditional FL methods, thereby enhancing the scalability of our load forecasting algorithm.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Privacy Preserving Billing in Local Energy Markets with Imperfect Bid-Offer Fulfillment (Long Version)
Authors:
Andrei Hutu,
Mustafa A. Mustafa
Abstract:
Smart grids are being increasingly deployed worldwide, as they constitute the electricity grid of the future, providing bidirectional communication between households. One of their main potential applications is the peer-to-peer (P2P) energy trading market, which promises users better electricity prices and higher incentives to produce renewable energy. However, most P2P markets require users to s…
▽ More
Smart grids are being increasingly deployed worldwide, as they constitute the electricity grid of the future, providing bidirectional communication between households. One of their main potential applications is the peer-to-peer (P2P) energy trading market, which promises users better electricity prices and higher incentives to produce renewable energy. However, most P2P markets require users to submit energy bids/offers in advance, which cannot account for unexpected surpluses of energy consumption/production. Moreover, the fine-grained metering information used in calculating and settling bills/rewards is inherently sensitive and must be protected in conformity with existing privacy regulations.
To address these issues, this report proposes a novel privacy-preserving billing and settlements protocol, PPBSP, for use in local energy markets with imperfect bid-offer fulfillment, which only uses homomorphically encrypted versions of the half-hourly user consumption data. PPBSP also supports various cost-sharing mechanisms among market participants, including two new and improved methods of proportionally redistributing the cost of maintaining the balance of the grid in a fair manner. An informal privacy analysis is performed, highlighting the privacy-enhancing characteristics of the protocol, which include metering data and bill confidentiality. PPBSP is also evaluated in terms of computation cost and communication overhead, demonstrating its efficiency and feasibility for markets with varying sizes.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
Zone-Based Privacy-Preserving Billing for Local Energy Market Based on Multiparty Computation
Authors:
Eman Alqahtani,
Mustafa A. Mustafa
Abstract:
This paper proposes a zone-based privacy-preserving billing protocol for local energy markets that takes into account energy volume deviations of market participants from their bids. Our protocol incorporates participants' locations on the grid for splitting the deviations cost. The proposed billing model employs multiparty computation so that the accurate calculation of individual bills is perfor…
▽ More
This paper proposes a zone-based privacy-preserving billing protocol for local energy markets that takes into account energy volume deviations of market participants from their bids. Our protocol incorporates participants' locations on the grid for splitting the deviations cost. The proposed billing model employs multiparty computation so that the accurate calculation of individual bills is performed in a decentralised and privacy-preserving manner. We also present a security analysis as well as performance evaluations for different security settings. The results show superiority of the honest-majority model to the dishonest majority in terms of computational efficiency. They also show that the billing can be executed for 5000 users in less than nine seconds in the online phase for all security settings, demonstrating its feasibility to be deployed in real local energy markets.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
A Privacy-Preserving and Accountable Billing Protocol for Peer-to-Peer Energy Trading Markets
Authors:
Kamil Erdayandi,
Lucas C. Cordeiro,
Mustafa A. Mustafa
Abstract:
This paper proposes a privacy-preserving and accountable billing (PA-Bill) protocol for trading in peer-to-peer energy markets, addressing situations where there may be discrepancies between the volume of energy committed and delivered. Such discrepancies can lead to challenges in providing both privacy and accountability while maintaining accurate billing. To overcome these challenges, a universa…
▽ More
This paper proposes a privacy-preserving and accountable billing (PA-Bill) protocol for trading in peer-to-peer energy markets, addressing situations where there may be discrepancies between the volume of energy committed and delivered. Such discrepancies can lead to challenges in providing both privacy and accountability while maintaining accurate billing. To overcome these challenges, a universal cost splitting mechanism is proposed that prioritises privacy and accountability. It leverages a homomorphic encryption cryptosystem to provide privacy and employs blockchain technology to establish accountability. A dispute resolution mechanism is also introduced to minimise the occurrence of erroneous bill calculations while ensuring accountability and non-repudiation throughout the billing process. Our evaluation demonstrates that PA-Bill offers an effective billing mechanism that maintains privacy and accountability in peer-to-peer energy markets utilising a semi-decentralised approach.
△ Less
Submitted 11 September, 2023; v1 submitted 10 July, 2023;
originally announced July 2023.
-
QNNRepair: Quantized Neural Network Repair
Authors:
Xidan Song,
Youcheng Sun,
Mustafa A. Mustafa,
Lucas C. Cordeiro
Abstract:
We present QNNRepair, the first method in the literature for repairing quantized neural networks (QNNs). QNNRepair aims to improve the accuracy of a neural network model after quantization. It accepts the full-precision and weight-quantized neural networks and a repair dataset of passing and failing tests. At first, QNNRepair applies a software fault localization method to identify the neurons tha…
▽ More
We present QNNRepair, the first method in the literature for repairing quantized neural networks (QNNs). QNNRepair aims to improve the accuracy of a neural network model after quantization. It accepts the full-precision and weight-quantized neural networks and a repair dataset of passing and failing tests. At first, QNNRepair applies a software fault localization method to identify the neurons that cause performance degradation during neural network quantization. Then, it formulates the repair problem into a linear programming problem of solving neuron weights parameters, which corrects the QNN's performance on failing tests while not compromising its performance on passing tests. We evaluate QNNRepair with widely used neural network architectures such as MobileNetV2, ResNet, and VGGNet on popular datasets, including high-resolution images. We also compare QNNRepair with the state-of-the-art data-free quantization method SQuant. According to the experiment results, we conclude that QNNRepair is effective in improving the quantized model's performance in most cases. Its repaired models have 24% higher accuracy than SQuant's in the independent validation set, especially for the ImageNet dataset.
△ Less
Submitted 10 September, 2023; v1 submitted 23 June, 2023;
originally announced June 2023.
-
A Survey of Safety and Trustworthiness of Large Language Models through the Lens of Verification and Validation
Authors:
Xiaowei Huang,
Wenjie Ruan,
Wei Huang,
Gaojie **,
Yi Dong,
Changshun Wu,
Saddek Bensalem,
Ronghui Mu,
Yi Qi,
Xingyu Zhao,
Kaiwen Cai,
Yanghao Zhang,
Sihao Wu,
Peipei Xu,
Dengyu Wu,
Andre Freitas,
Mustafa A. Mustafa
Abstract:
Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response to their fast adoption in many industrial applications, this survey concerns their safety and trustworthiness. First, we review known vulnerabilities and limitations of the LLMs, categorisi…
▽ More
Large Language Models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and articulate answers across many knowledge domains. In response to their fast adoption in many industrial applications, this survey concerns their safety and trustworthiness. First, we review known vulnerabilities and limitations of the LLMs, categorising them into inherent issues, attacks, and unintended bugs. Then, we consider if and how the Verification and Validation (V&V) techniques, which have been widely developed for traditional software and deep learning models such as convolutional neural networks as independent processes to check the alignment of their implementations against the specifications, can be integrated and further extended throughout the lifecycle of the LLMs to provide rigorous analysis to the safety and trustworthiness of LLMs and their applications. Specifically, we consider four complementary techniques: falsification and evaluation, verification, runtime monitoring, and regulations and ethical use. In total, 370+ references are considered to support the quick understanding of the safety and trustworthiness issues from the perspective of V&V. While intensive research has been conducted to identify the safety and trustworthiness issues, rigorous yet practical methods are called for to ensure the alignment of LLMs with safety and trustworthiness requirements.
△ Less
Submitted 27 August, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Free bicommutative superalgebras
Authors:
Vesselin Drensky,
Nurlan Ismailov,
Manat Mustafa,
Bekzat Zhakhayev
Abstract:
We introduce the variety ${\mathfrak B}_{\textrm{sup}}$ of bicommutative superalgebras over an arbitrary field of characteristic different from 2. The variety consists of all nonassociative ${\mathbb Z}_2$-graded algebras satisfying the polynomial super-identities of super- left- and right-commutativity \[ x(yz)= (-1)^{\overline{x}\,\overline{y}} y(xz)\text{ and } (xy)z=(-1)^{\overline{y}\,\overli…
▽ More
We introduce the variety ${\mathfrak B}_{\textrm{sup}}$ of bicommutative superalgebras over an arbitrary field of characteristic different from 2. The variety consists of all nonassociative ${\mathbb Z}_2$-graded algebras satisfying the polynomial super-identities of super- left- and right-commutativity \[ x(yz)= (-1)^{\overline{x}\,\overline{y}} y(xz)\text{ and } (xy)z=(-1)^{\overline{y}\,\overline{z}} (xz)y, \] where $\overline{u}\in\{0,1\}$ is the parity of the homogeneous element $u$.
We present an explicit construction of the free bicommutative superalgebras, find their bases as vector spaces and show that they share many properties typical for ordinary bicommutative algebras and super-commutative associative superalgebras. In particular, in the case of free algebras of finite rank we compute the Hilbert series and find explicitly its coefficients. As a consequence we give a formula for the codimension sequence. We establish an analogue of the classical Hilbert Basissatz for two-sided ideals. We see that the Gröbner-Shirshov bases of these ideals are finite, the Gelfand-Kirillov dimensions of finitely generated bicommutative superalgebras are nonnegative integers and the Hilbert series of finitely generated graded bicommutative superalgebras are rational functions. Concerning problems studied in the theory of varieties of algebraic systems, we prove that the variety of bicommutative superalgebras satisfies the Specht property. In the case of characteristic 0 we compute the sequence of cocharacters.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Improvement of Color Image Analysis Using a New Hybrid Face Recognition Algorithm based on Discrete Wavelets and Chebyshev Polynomials
Authors:
Hassan Mohamed Muhi-Aldeen,
Maha Ammar Mustafa,
Asma A. Abdulrahman,
Jabbar Abed Eleiwy,
Fouad S. Tahir,
Yurii Khlaponin
Abstract:
This work is unique in the use of discrete wavelets that were built from or derived from Chebyshev polynomials of the second and third kind, filter the Discrete Second Chebyshev Wavelets Transform (DSCWT), and derive two effective filters. The Filter Discrete Third Chebyshev Wavelets Transform (FDTCWT) is used in the process of analyzing color images and removing noise and impurities that accompan…
▽ More
This work is unique in the use of discrete wavelets that were built from or derived from Chebyshev polynomials of the second and third kind, filter the Discrete Second Chebyshev Wavelets Transform (DSCWT), and derive two effective filters. The Filter Discrete Third Chebyshev Wavelets Transform (FDTCWT) is used in the process of analyzing color images and removing noise and impurities that accompany the image, as well as because of the large amount of data that makes up the image as it is taken. These data are massive, making it difficult to deal with each other during transmission. However to address this issue, the image compression technique is used, with the image not losing information due to the readings that were obtained, and the results were satisfactory. Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR), Bit Per Pixel (BPP), and Compression Ratio (CR) Coronavirus is the initial treatment, while the processing stage is done with network training for Convolutional Neural Networks (CNN) with Discrete Second Chebeshev Wavelets Convolutional Neural Network (DSCWCNN) and Discrete Third Chebeshev Wavelets Convolutional Neural Network (DTCWCNN) to create an efficient algorithm for face recognition, and the best results were achieved in accuracy and in the least amount of time. Two samples of color images that were made or implemented were used. The proposed theory was obtained with fast and good results; the results are evident shown in the tables below.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Representations via differential algebras and equationally Noetherian algebras
Authors:
Alexander A. Mikhalev,
Manat Mustafa,
Ualbai Umirbaev
Abstract:
We show that free algebras of the variety of algebras generated by the Witt algebra $W_n$, the left-symmetric Witt algebra $L_n$, and the symplectic Poisson algebra $P_n$ can be described as subalgebras of differential polynomial algebras with respect to appropriately defined products. Using these representations, we prove that $W_n$, $L_n$, $P_n$, and the free algebras of the varieties of algebra…
▽ More
We show that free algebras of the variety of algebras generated by the Witt algebra $W_n$, the left-symmetric Witt algebra $L_n$, and the symplectic Poisson algebra $P_n$ can be described as subalgebras of differential polynomial algebras with respect to appropriately defined products. Using these representations, we prove that $W_n$, $L_n$, $P_n$, and the free algebras of the varieties of algebras generated by these algebras are equationally Noetherian.
△ Less
Submitted 16 January, 2023;
originally announced January 2023.
-
AIREPAIR: A Repair Platform for Neural Networks
Authors:
Xidan Song,
Youcheng Sun,
Mustafa A. Mustafa,
Lucas Cordeiro
Abstract:
We present AIREPAIR, a platform for repairing neural networks. It features the integration of existing network repair tools. Based on AIREPAIR, one can run different repair methods on the same model, thus enabling the fair comparison of different repair techniques. We evaluate AIREPAIR with three state-of-the-art repair tools on popular deep-learning datasets and models. Our evaluation confirms th…
▽ More
We present AIREPAIR, a platform for repairing neural networks. It features the integration of existing network repair tools. Based on AIREPAIR, one can run different repair methods on the same model, thus enabling the fair comparison of different repair techniques. We evaluate AIREPAIR with three state-of-the-art repair tools on popular deep-learning datasets and models. Our evaluation confirms the utility of AIREPAIR, by comparing and analyzing the results from different repair techniques. A demonstration is available at https://youtu.be/UkKw5neeWhw.
△ Less
Submitted 21 March, 2023; v1 submitted 24 November, 2022;
originally announced November 2022.
-
10 dB emission suppression in a structured low index medium
Authors:
Soumyadeep Saha,
Meraj E Mustafa,
Manfred Eich,
Alexander Yu. Petrov
Abstract:
Significant suppression of radiation in 3D structured media with small refractive index 1.4-1.6, such as of glass or polymers, is a desirable feature yet to be obtained. For periodical structures this is realised at frequencies of the complete photonic band gap (CPBG), which up to now was demonstrated to open for materials with refractive index of at least 1.9. We present here a quasiperiodic 3D s…
▽ More
Significant suppression of radiation in 3D structured media with small refractive index 1.4-1.6, such as of glass or polymers, is a desirable feature yet to be obtained. For periodical structures this is realised at frequencies of the complete photonic band gap (CPBG), which up to now was demonstrated to open for materials with refractive index of at least 1.9. We present here a quasiperiodic 3D structure consisting of multiple overlap** gratings with a homogeneous distribution of Bragg peaks on a sphere in reciprocal space, which allows efficient suppression of emission. Recently we have presented the theoretical model, considering interaction with the neighbouring gratings only, that estimates a finite CPBG for arbitrarily small refractive indices and thus complete emission suppression in infinite structures. However, numerical simulations demonstrate a finite leakage of power from emitter not predicted by the model. Still the simulations show -10 dB suppression in 3D structures with optimised number of gratings. Astonishingly, as we show here, this limit is almost independent of the refractive index contrast. Also, the structures with a defined number of gratings show maximal suppression at certain refractive indices, losing the suppression even at higher refractive indices. The -10 dB suppression is demonstrated for refractive index contrast as low as 1.30.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
An introduction to Thermal Field Theory and Some of its Application
Authors:
Munshi G. Mustafa
Abstract:
In this article an introduction to the thermal field theory within imaginary time has been discussed in details. The imaginary time formalism has been introduced through both the operatorial and the functional integration method. The prescription to perform frequency sum for boson and fermion has been discussed. Green's function both in Minkowski time as well as in Euclidean time has been derived.…
▽ More
In this article an introduction to the thermal field theory within imaginary time has been discussed in details. The imaginary time formalism has been introduced through both the operatorial and the functional integration method. The prescription to perform frequency sum for boson and fermion has been discussed. Green's function both in Minkowski time as well as in Euclidean time has been derived. The tadpole diagram in $φ^4$ theory and the self-energy in $φ^3$ theory have been computed. The basic features of general two point functions for both fermions and bosons in presence of a heat bath have been discussed. Then the free partition functions for scalar, fermion and gauge field, and interacting scalar field have been obtained. The quantum electrodynamics (QED) and gauge fixing have been discussed in details. The one-loop self-energy for electron and photon in QED have been obtained in hard thermal loop (HTL) approximation. The dispersion properties and collective excitations of both electron and photon in a thermal medium have been presented. The spectral representation of fermion and gauge boson propagators have been obtained. In HTL approximation, the generalisation of QED results of two point functions to quantum chromodynamics (QCD) have been outlined that mostly involve group theoretical factors. As an effective field theory approach the HTL resummation and the HTL perturbation theory have been introduced. The leading order, next-to-leading order and next-to-next-leading order free energy and pressure for deconfined QCD medium created in heavy-ion collisions have been computed within HTLpt. The general features of the deconfined QCD medium have also been outlined with non-perturbative effects like gluon condensate and Gribov-Zwanziger action. The dilepton production rates from quark-gluon plasma with these non-perturbative effects have been computed.
△ Less
Submitted 7 August, 2023; v1 submitted 1 July, 2022;
originally announced July 2022.
-
Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs
Authors:
Fatimah K. Aljaafari,
Rafael Menezes,
Edoardo Manino,
Fedor Shmarov,
Mustafa A. Mustafa,
Lucas C. Cordeiro
Abstract:
Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) -- a technique that combines Bounded Model Checking (BMC) and Gray-Box Fuzzing (GBF) to find…
▽ More
Finding software vulnerabilities in concurrent programs is a challenging task due to the size of the state-space exploration, as the number of interleavings grows exponentially with the number of program threads and statements. We propose and evaluate EBF (Ensembles of Bounded Model Checking with Fuzzing) -- a technique that combines Bounded Model Checking (BMC) and Gray-Box Fuzzing (GBF) to find software vulnerabilities in concurrent programs. Since there are no publicly-available GBF tools for concurrent code, we first propose OpenGBF -- a new open-source concurrency-aware gray-box fuzzer that explores different thread schedules by instrumenting the code under test with random delays. Then, we build an ensemble of a BMC tool and OpenGBF in the following way. On the one hand, when the BMC tool in the ensemble returns a counterexample, we use it as a seed for OpenGBF, thus increasing the likelihood of executing paths guarded by complex mathematical expressions. On the other hand, we aggregate the outcomes of the BMC and GBF tools in the ensemble using a decision matrix, thus improving the accuracy of EBF. We evaluate EBF against state-of-the-art pure BMC tools and show that it can generate up to 14.9% more correct verification witnesses than the corresponding BMC tools alone. Furthermore, we demonstrate the efficacy of OpenGBF, by showing that it can find 24.2% of the vulnerabilities in our evaluation suite, while non-concurrency-aware GBF tools can only find 0.55%. Finally, thanks to our concurrency-aware OpenGBF, EBF detects a data race in the open-source wolfMqtt library and reproduces known bugs in several other real-world programs, which demonstrates its effectiveness in finding vulnerabilities in real-world software.
△ Less
Submitted 20 October, 2022; v1 submitted 13 June, 2022;
originally announced June 2022.
-
An accurate IoT Intrusion Detection Framework using Apache Spark
Authors:
Mohamed Abushwereb,
Mouhammd Alkasassbeh,
Mohammad Almseidin,
Muhannad Mustafa
Abstract:
The internet has caused tremendous changes since its appearance in the 1980s, and now, the Internet of Things (IoT) seems to be doing the same. The potential of IoT has made it the center of attention for many people, but, where some see an opportunity to contribute, others may see IoT networks as a target to be exploited. The high number of IoT devices makes them the perfect setup for staging den…
▽ More
The internet has caused tremendous changes since its appearance in the 1980s, and now, the Internet of Things (IoT) seems to be doing the same. The potential of IoT has made it the center of attention for many people, but, where some see an opportunity to contribute, others may see IoT networks as a target to be exploited. The high number of IoT devices makes them the perfect setup for staging denial-of-service attacks (DoS) that can have devastating consequences. This renders the need for cybersecurity measures such as intrusion detection systems (IDSs) evident. The aim of this paper is to build an IDS using the big data platform, Apache Spark. Apache Spark was used along with its ML library (MLlib) and the BoT-IoT dataset. The IDS was then tested and evaluated based on F-Measure (f1), as was the standard when evaluating imbalanced data. Two rounds of tests were performed, a partial dataset for minimizing bias, and the full BoT-IoT dataset for exploring big data and ML capabilities in a security setting. For the partial dataset, the Random Forest algorithm had the highest performance for binary classification at an average f1 measure of 99.7%, as well as 99.6% for main category classification, and an 88.5% f1 measure for sub category classification. As for the complete dataset, the Decision Tree algorithm scored the highest f1 measures for all conducted tests; 97.9% for binary classification, 79% for main category classification, and 77% for sub category classification.
△ Less
Submitted 21 February, 2022;
originally announced March 2022.
-
Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing
Authors:
Khlood Jastaniah,
Ning Zhang,
Mustafa A. Mustafa
Abstract:
Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly data processing and sharing that can accommodate three main use cases: (i) data owners requesting processing of their own data, and multipl…
▽ More
Wearable devices can offer services to individuals and the public. However, wearable data collected by cloud providers may pose privacy risks. To reduce these risks while maintaining full functionality, healthcare systems require solutions for privacy-friendly data processing and sharing that can accommodate three main use cases: (i) data owners requesting processing of their own data, and multiple data requesters requesting data processing of (ii) a single or (iii) multiple data owners. Existing work lacks data owner access control and does not efficiently support these cases, making them unsuitable for wearable devices. To address these limitations, we propose a novel, efficient, user-centric, privacy-friendly, and flexible data aggregation and sharing scheme, named SAMA. SAMA uses a multi-key partial homomorphic encryption scheme to allow flexibility in accommodating the aggregation of data originating from a single or multiple data owners while preserving privacy during the processing. It also uses ciphertext-policy attribute-based encryption scheme to support fine-grain sharing with multiple data requesters based on user-centric access control. Formal security analysis shows that SAMA supports data confidentiality and authorisation. SAMA has also been analysed in terms of computational and communication overheads. Our experimental results demonstrate that SAMA supports privacy-preserving flexible data aggregation more efficiently than the relevant state-of-the-art solutions.
△ Less
Submitted 3 March, 2024; v1 submitted 1 March, 2022;
originally announced March 2022.
-
Privacy-Friendly Peer-to-Peer Energy Trading: A Game Theoretical Approach
Authors:
Kamil Erdayandi,
Amrit Paudel,
Lucas Cordeiro,
Mustafa A. Mustafa
Abstract:
In this paper, we propose a decentralized, privacy-friendly energy trading platform (PFET) based on game theoretical approach - specifically Stackelberg competition. Unlike existing trading schemes, PFET provides a competitive market in which prices and demands are determined based on competition, and computations are performed in a decentralized manner which does not rely on trusted third parties…
▽ More
In this paper, we propose a decentralized, privacy-friendly energy trading platform (PFET) based on game theoretical approach - specifically Stackelberg competition. Unlike existing trading schemes, PFET provides a competitive market in which prices and demands are determined based on competition, and computations are performed in a decentralized manner which does not rely on trusted third parties. It uses homomorphic encryption cryptosystem to encrypt sensitive information of buyers and sellers such as sellers$'$ prices and buyers$'$ demands. Buyers calculate total demand on particular seller using an encrypted data and sensitive buyer profile data is hidden from sellers. Hence, privacy of both sellers and buyers is preserved. Through privacy analysis and performance evaluation, we show that PFET preserves users$'$ privacy in an efficient manner.
△ Less
Submitted 28 May, 2022; v1 submitted 5 January, 2022;
originally announced January 2022.
-
Consistent approach to study gluon quasi-particles
Authors:
Chowdhury Aminul Islam,
Munshi G. Mustafa,
Rajarshi Ray,
Pracheta Singha
Abstract:
We discuss a novel approach to estimate the partition function in effective model frameworks when the effective potentials have multiple extrema, so that ascertaining a mean field becomes difficult. Using this approach we present a consistent model to study the thermodynamic properties of gluon quasi-particles as a function of temperature, both in the color confined and the color deconfined phases…
▽ More
We discuss a novel approach to estimate the partition function in effective model frameworks when the effective potentials have multiple extrema, so that ascertaining a mean field becomes difficult. Using this approach we present a consistent model to study the thermodynamic properties of gluon quasi-particles as a function of temperature, both in the color confined and the color deconfined phases.
△ Less
Submitted 12 March, 2023; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Thematic analysis of multiple sclerosis research by enhanced strategic diagram
Authors:
Nazlahshaniza Shafina,
Che Aishah Nazariah Ismaila,
Mohd Zulkifli Mustafa,
Nurhafizah Ghani,
Asma Hayati Ahmad,
Zahiruddin Othman,
Adi Wijaya,
Rahimah Zakaria
Abstract:
This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the…
▽ More
This bibliometric review summarised the research trends and analysed research areas in multiple sclerosis (MS) over the last decade. The documents containing the term "multiple sclerosis" in the article title were retrieved from the Scopus database. We found a total of 18003 articles published in journals in the English language between 2012 and 2021. The emerging keywords identified utilising the enhanced strategic diagram were "covid-19", "teriflunomide", "clinical trial", "microglia", "b cells", "myelin", "brain", "white matter", "functional connectivity", "pain", "employment", "health-related quality of life", "meta-analysis" and "comorbidity". In conclusion, this study demonstrates the tremendous growth of MS literature worldwide, which is expected to grow more than double during the next decade especially in the identified emerging topics.
△ Less
Submitted 12 September, 2021;
originally announced September 2021.
-
Approximating approximate reasoning: Fuzzy sets and the Ershov hierarchy
Authors:
Nikolay Bazhenov,
Manat Mustafa,
Sergei Ospichev,
Luca San Mauro
Abstract:
Computability theorists have introduced multiple hierarchies to measure the complexity of sets of natural numbers. The Kleene Hierarchy classifies sets according to the first-order complexity of their defining formulas. The Ershov Hierarchy classifies $Δ^0_2$ sets with respect to the number of mistakes that are needed to approximate them. Biacino and Gerla extended the Kleene Hierarchy to the real…
▽ More
Computability theorists have introduced multiple hierarchies to measure the complexity of sets of natural numbers. The Kleene Hierarchy classifies sets according to the first-order complexity of their defining formulas. The Ershov Hierarchy classifies $Δ^0_2$ sets with respect to the number of mistakes that are needed to approximate them. Biacino and Gerla extended the Kleene Hierarchy to the realm of fuzzy sets, whose membership functions range in a complete lattice $L$ (e.g., the real interval $[0; 1]_\mathbb{R}$). In this paper, we combine the Ershov Hierarchy and fuzzy set theory, by introducing and investigating the Fuzzy Ershov Hierarchy. In particular, we focus on the fuzzy $n$-c.e. sets which form the finite levels of this hierarchy. Intuitively, a fuzzy set is $n$-c.e. if its membership function can be approximated by changing monotonicity at most $n-1$ times. We prove that the Fuzzy Ershov Hierarchy does not collapse; that, in analogy with the classical case, each fuzzy $n$-c.e. set can be represented as a Boolean combination of fuzzy c.e. sets; but that, contrary to the classical case, the Fuzzy Ershov Hierarchy does not exhaust the class of all $Δ^0_2$ fuzzy sets.
△ Less
Submitted 21 July, 2021;
originally announced July 2021.
-
The algebraic and geometric classification of nilpotent right alternative algebras
Authors:
Nurlan Ismailov,
Ivan Kaygorodov,
Manat Mustafa
Abstract:
We present algebraic and geometric classifications of the $4$-dimensional complex nilpotent right alternative algebras. Specifically, we find that, up to isomorphism, there are only $9$ non-isomorphic nontrivial nilpotent right alternative algebras. The corresponding geometric variety has dimension $13$ and it is determined by the Zariski closure of $4$ rigid algebras and one one-parametric family…
▽ More
We present algebraic and geometric classifications of the $4$-dimensional complex nilpotent right alternative algebras. Specifically, we find that, up to isomorphism, there are only $9$ non-isomorphic nontrivial nilpotent right alternative algebras. The corresponding geometric variety has dimension $13$ and it is determined by the Zariski closure of $4$ rigid algebras and one one-parametric family of algebras.
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Fast, high-fidelity Lyman $α$ forests with convolutional neural networks
Authors:
Peter Harrington,
Mustafa Mustafa,
Max Dornfest,
Benjamin Horowitz,
Zarija Lukić
Abstract:
Full-physics cosmological simulations are powerful tools for studying the formation and evolution of structure in the universe but require extreme computational resources. Here, we train a convolutional neural network to use a cheaper N-body-only simulation to reconstruct the baryon hydrodynamic variables (density, temperature, and velocity) on scales relevant to the Lyman-$α$ (Ly$α$) forest, usin…
▽ More
Full-physics cosmological simulations are powerful tools for studying the formation and evolution of structure in the universe but require extreme computational resources. Here, we train a convolutional neural network to use a cheaper N-body-only simulation to reconstruct the baryon hydrodynamic variables (density, temperature, and velocity) on scales relevant to the Lyman-$α$ (Ly$α$) forest, using data from Nyx simulations. We show that our method enables rapid estimation of these fields at a resolution of $\sim$20kpc, and captures the statistics of the Ly$α$ forest with much greater accuracy than existing approximations. Because our model is fully-convolutional, we can train on smaller simulation boxes and deploy on much larger ones, enabling substantial computational savings. Furthermore, as our method produces an approximation for the hydrodynamic fields instead of Ly$α$ flux directly, it is not limited to a particular choice of ionizing background or mean transmitted flux.
△ Less
Submitted 23 June, 2021;
originally announced June 2021.
-
Investigating Misinformation Dissemination on Social Media in Pakistan
Authors:
Danyal Haroon,
Hammad Arif,
Ahmed Abdullah Tariq,
fareeda nawaz,
Dr. Ihsan Ayyub Qazi,
Dr. Maryam mustafa
Abstract:
Fake news and misinformation are one of the most significant challenges brought about by advances in communication technologies. We chose to research the spread of fake news in Pakistan because of some unfortunate incidents that took place during 2020. These included the downplaying of the severity of the COVID-19 pandemic, and protests by right-wing political movements. We observed that fake news…
▽ More
Fake news and misinformation are one of the most significant challenges brought about by advances in communication technologies. We chose to research the spread of fake news in Pakistan because of some unfortunate incidents that took place during 2020. These included the downplaying of the severity of the COVID-19 pandemic, and protests by right-wing political movements. We observed that fake news and misinformation contributed significantly to these events and especially affected low-literate and low-income populations. We conducted a cross-platform comparison of misinformation on WhatsApp, Twitter and YouTube with a primary focus on messages shared in public WhatsApp groups, and analysed the characteristics of misinformation, techniques used to make is believable, and how users respond to it. To the best of our knowledge, this is the first attempt to compare misinformation on all three platforms in Pakistan. Data collected over a span of eight months helped us identify fake news and misinformation related to politics, religion and health, among other categories. Common elements which were used by fake news creators in Pakistan to make false content seem believable included: appeals to emotion, conspiracy theories, political and religious polarization, incorrect facts and impersonation of credible sources.
△ Less
Submitted 8 August, 2021; v1 submitted 17 June, 2021;
originally announced June 2021.
-
A Beyond Mean Field Approach to Yang-Mills Thermodynamics
Authors:
Pracheta Singha,
Rajarshi Ray,
Chowdhury Aminul Islam,
Munshi G Mustafa
Abstract:
We propose a beyond mean field approach to evaluate Yang-Mills thermodynamics from the partition function with n-body gluon contribution, in the presence of a uniform background Polyakov field. Using a path integral based formalism, we obtain, unlike the previous mean field studies within this model framework, physically consistent results with good agreement to the lattice data throughout the tem…
▽ More
We propose a beyond mean field approach to evaluate Yang-Mills thermodynamics from the partition function with n-body gluon contribution, in the presence of a uniform background Polyakov field. Using a path integral based formalism, we obtain, unlike the previous mean field studies within this model framework, physically consistent results with good agreement to the lattice data throughout the temperature range.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Algorithms for Simultaneous Block Triangularization and Block Diagonalization of Sets of Matrices
Authors:
Ahmad Y. Al-Dweik,
Ryad Ghanam,
Gerard Thompson,
M. T. Mustafa
Abstract:
In a recent paper, a new method was proposed to find the common invariant subspaces of a set of matrices. This paper invstigates the more general problem of putting a set of matrices into block triangular or block-diagonal form simultaneously. Based on common invariant subspaces, two algorithms for simultaneous block triangularization and block diagonalization of sets of matrices are presented. As…
▽ More
In a recent paper, a new method was proposed to find the common invariant subspaces of a set of matrices. This paper invstigates the more general problem of putting a set of matrices into block triangular or block-diagonal form simultaneously. Based on common invariant subspaces, two algorithms for simultaneous block triangularization and block diagonalization of sets of matrices are presented. As an alternate approach for simultaneous block diagonalization of sets of matrices by an invertible matrix, a new algorithm is developed based on the generalized eigen vectors of a commuting matrix. Moreover, a new characterization for the simultaneous block diagonalization by an invertible matrix is provided. The algorithms are applied to concrete examples using the symbolic manipulation system Maple.
△ Less
Submitted 5 June, 2022; v1 submitted 4 April, 2021;
originally announced April 2021.
-
Anisotropic pressure and quark number susceptibility of strongly magnetized QCD medium
Authors:
Bithika Karmakar,
Ritesh Ghosh,
Aritra Bandyopadhyay,
Najmul Haque,
Munshi G Mustafa
Abstract:
In this work, we compute the hard thermal loop pressure of quark-gluon plasma within strong magnetic field approximation at one-loop order. Magnetic field breaks the rotational symmetry of the system. As a result, the pressure of QGP becomes anisotropic and one finds two different pressures along the longitudinal (along the magnetic field direction) and transverse direction. Similarly, the second-…
▽ More
In this work, we compute the hard thermal loop pressure of quark-gluon plasma within strong magnetic field approximation at one-loop order. Magnetic field breaks the rotational symmetry of the system. As a result, the pressure of QGP becomes anisotropic and one finds two different pressures along the longitudinal (along the magnetic field direction) and transverse direction. Similarly, the second-order quark number susceptibility, which represents the fluctuation of the net quark number density, also becomes anisotropic. We compute the second order QNS of deconfined QCD matter in strong field approximation considering same chemical potential for two quark flavors.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
General structure of a gauge boson propagator and pressure of deconfined QCD matter in a weakly magnetized medium
Authors:
Bithika Karmakar,
Aritra Bandyopadhyay,
Najmul Haque,
Munshi G Mustafa
Abstract:
We have systematically constructed the general structure of the gauge boson self-energy and the effective propagator in presence of a nontrivial background like hot magnetized material medium. Based on this as well as the general structure of fermion propagator in weakly magnetized medium we have calculated pressure of deconfined QCD matter within HTL approximation.
We have systematically constructed the general structure of the gauge boson self-energy and the effective propagator in presence of a nontrivial background like hot magnetized material medium. Based on this as well as the general structure of fermion propagator in weakly magnetized medium we have calculated pressure of deconfined QCD matter within HTL approximation.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Impact of Local Energy Markets on the Distribution Systems: A Comprehensive Review
Authors:
Viktorija Dudjak,
Diana Neves,
Tarek Alskaif,
Shafi Khadem,
Alejandro Pena-Bello,
Pietro Saggese,
Benjamin Bowler,
Merlinda Andoni,
Marina Bertolini,
Yue Zhou,
Blanche Lormeteau,
Mustafa A. Mustafa,
Yingjie Wang,
Christina Francis,
Fairouz Zobiri,
David Parra,
Antonios Papaemmanouil
Abstract:
In recent years extensive research has been conducted on the development of different models that enable energy trading between prosumers and consumers due to expected high integration of distributed energy resources. Some of the most researched mechanisms include Peer-to-Peer energy trading, Community Self-Consumption and Transactive Energy Models. Here, we present an exhaustive review of existin…
▽ More
In recent years extensive research has been conducted on the development of different models that enable energy trading between prosumers and consumers due to expected high integration of distributed energy resources. Some of the most researched mechanisms include Peer-to-Peer energy trading, Community Self-Consumption and Transactive Energy Models. Here, we present an exhaustive review of existing research around Local Energy Market integration into distribution systems, in particular benefits and challenges that the power grid can expect from integrating these models. We also present a detailed overview of methods that are used to integrate physical network constraints into the market mechanisms, their advantages, drawbacks, and scaling potential. We find that financial energy transactions do not directly reflect the physical energy flows imposed by the constraints of the installed electrical infrastructure. Therefore, ensuring the stable and reliable delivery of electricity, it is vital to understand the impact of these transactions on the grid infrastructure, e.g., impacts on the control, operation, and planning of electricity distribution systems.
△ Less
Submitted 27 May, 2021; v1 submitted 30 March, 2021;
originally announced March 2021.
-
Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations
Authors:
Fatimah Aljaafari,
Rafael Menezes,
Mustafa A. Mustafa,
Lucas C. Cordeiro
Abstract:
Internet of Things (IoT) consists of a large number of devices connected through a network, which exchange a high volume of data, thereby posing new security, privacy, and trust issues. One way to address these issues is ensuring data confidentiality using lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in…
▽ More
Internet of Things (IoT) consists of a large number of devices connected through a network, which exchange a high volume of data, thereby posing new security, privacy, and trust issues. One way to address these issues is ensuring data confidentiality using lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in the implementation can lead to devastating security vulnerabilities. Here we propose a new verification approach named Encryption-BMC and Fuzzing (EBF), which combines Bounded Model Checking (BMC) and Fuzzing techniques to check for security vulnerabilities that arise from concurrent implementations of cyrptographic protocols, which include data race, thread leak, arithmetic overflow, and memory safety. EBF models IoT protocols as a client and server using POSIX threads, thereby simulating both entities' communication. It also employs static and dynamic verification to cover the system's state-space exhaustively. We evaluate EBF against three benchmarks. First, we use the concurrency benchmark from SV-COMP and show that it outperforms other state-of-the-art tools such as ESBMC, AFL, Lazy-CSeq, and TSAN with respect to bug finding. Second, we evaluate an open-source implementation called WolfMQTT. It is an MQTT client implementation that uses the WolfSSL library. We show that \tool detects a data race bug, which other approaches are unable to find. Third, to show the effectiveness of EBF, we replicate some known vulnerabilities in OpenSSL and CyaSSL (lately WolfSSL) libraries. EBF can detect the bugs in minimum time.
△ Less
Submitted 27 April, 2021; v1 submitted 21 March, 2021;
originally announced March 2021.
-
Towards physically consistent data-driven weather forecasting: Integrating data assimilation with equivariance-preserving deep spatial transformers
Authors:
Ashesh Chattopadhyay,
Mustafa Mustafa,
Pedram Hassanzadeh,
Eviatar Bach,
Karthik Kashinath
Abstract:
There is growing interest in data-driven weather prediction (DDWP), for example using convolutional neural networks such as U-NETs that are trained on data from models or reanalysis. Here, we propose 3 components to integrate with commonly used DDWP models in order to improve their physical consistency and forecast accuracy. These components are 1) a deep spatial transformer added to the latent sp…
▽ More
There is growing interest in data-driven weather prediction (DDWP), for example using convolutional neural networks such as U-NETs that are trained on data from models or reanalysis. Here, we propose 3 components to integrate with commonly used DDWP models in order to improve their physical consistency and forecast accuracy. These components are 1) a deep spatial transformer added to the latent space of the U-NETs to preserve a property called equivariance, which is related to correctly capturing rotations and scalings of features in spatio-temporal data, 2) a data-assimilation (DA) algorithm to ingest noisy observations and improve the initial conditions for next forecasts, and 3) a multi-time-step algorithm, which combines forecasts from DDWP models with different time steps through DA, improving the accuracy of forecasts at short intervals. To show the benefit/feasibility of each component, we use geopotential height at 500~hPa (Z500) from ERA5 reanalysis and examine the short-term forecast accuracy of specific setups of the DDWP framework. Results show that the equivariance-preserving networks (U-STNs) clearly outperform the U-NETs, for example improving the forecast skill by $45\%$. Using a sigma-point ensemble Kalman (SPEnKF) algorithm for DA and U-STN as the forward model, we show that stable, accurate DA cycles are achieved even with high observation noise. The DDWP+DA framework substantially benefits from large ($O(1000)$) ensembles that are inexpensively generated with the data-driven forward model in each DA cycle. The multi-time-step DDWP+DA framework also shows promises, e.g., it reduces the average error by factors of 2-3.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Chiral susceptibility in dense thermo-magnetic QCD medium within HTL approximation
Authors:
Ritesh Ghosh,
Bithika Karmakar,
Munshi Golam Mustafa
Abstract:
We have computed the chiral susceptibility in quark-gluon plasma in presence of finite chemical potential and weak magnetic field within hard thermal loop approximation. First we construct the massive effective quark propagator in a thermomagnetic medium. Then we obtain completely analytic expression for the chiral susceptibility in weak magnetic field approximation. In the absence of magnetic fie…
▽ More
We have computed the chiral susceptibility in quark-gluon plasma in presence of finite chemical potential and weak magnetic field within hard thermal loop approximation. First we construct the massive effective quark propagator in a thermomagnetic medium. Then we obtain completely analytic expression for the chiral susceptibility in weak magnetic field approximation. In the absence of magnetic field the thermal chiral susceptibility increases in presence of finite chemical potential. The effect of thermomagnetic correction is found to be very marginal as temperature is the dominant scale in weak field approximation.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
Estimating Galactic Distances From Images Using Self-supervised Representation Learning
Authors:
Md Abul Hayat,
Peter Harrington,
George Stein,
Zarija Lukić,
Mustafa Mustafa
Abstract:
We use a contrastive self-supervised learning framework to estimate distances to galaxies from their photometric images. We incorporate data augmentations from computer vision as well as an application-specific augmentation accounting for galactic dust. We find that the resulting visual representations of galaxy images are semantically useful and allow for fast similarity searches, and can be succ…
▽ More
We use a contrastive self-supervised learning framework to estimate distances to galaxies from their photometric images. We incorporate data augmentations from computer vision as well as an application-specific augmentation accounting for galactic dust. We find that the resulting visual representations of galaxy images are semantically useful and allow for fast similarity searches, and can be successfully fine-tuned for the task of redshift estimation. We show that (1) pretraining on a large corpus of unlabeled data followed by fine-tuning on some labels can attain the accuracy of a fully-supervised model which requires 2-4x more labeled data, and (2) that by fine-tuning our self-supervised representations using all available data labels in the Main Galaxy Sample of the Sloan Digital Sky Survey (SDSS), we outperform the state-of-the-art supervised learning method.
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Authors:
Iraklis Symeonidis,
Dragos Rotaru,
Mustafa A. Mustafa,
Bart Mennink,
Bart Preneel,
Panos Papadimitratos
Abstract:
We propose HERMES, a scalable, secure, and privacy-enhancing system for users to share and access vehicles. HERMES securely outsources operations of vehicle access token generation to a set of untrusted servers. It builds on an earlier proposal, namely SePCAR [1], and extends the system design for improved efficiency and scalability. To cater to system and user needs for secure and private computa…
▽ More
We propose HERMES, a scalable, secure, and privacy-enhancing system for users to share and access vehicles. HERMES securely outsources operations of vehicle access token generation to a set of untrusted servers. It builds on an earlier proposal, namely SePCAR [1], and extends the system design for improved efficiency and scalability. To cater to system and user needs for secure and private computations, HERMES utilizes and combines several cryptographic primitives with secure multiparty computation efficiently. It conceals secret keys of vehicles and transaction details from the servers, including vehicle booking details, access token information, and user and vehicle identities. It also provides user accountability in case of disputes. Besides, we provide semantic security analysis and prove that HERMES meets its security and privacy requirements. Last but not least, we demonstrate that HERMES is efficient and, in contrast to SePCAR, scales to a large number of users and vehicles, making it practical for real-world deployments. We build our evaluations with two different multiparty computation protocols: HtMAC-MiMC and CBC-MAC-AES. Our results demonstrate that HERMES with HtMAC-MiMC requires only approx 1,83 ms for generating an access token for a single-vehicle owner and approx 11,9 ms for a large branch of rental companies with over a thousand vehicles. It handles 546 and 84 access token generations per second, respectively. This results in HERMES being 696 (with HtMAC-MiMC) and 42 (with CBC-MAC-AES) times faster compared to in SePCAR for a single-vehicle owner access token generation. Furthermore, we show that HERMES is practical on the vehicle side, too, as access token operations performed on a prototype vehicle on-board unit take only approx 62,087 ms.
△ Less
Submitted 19 March, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Self-Supervised Representation Learning for Astronomical Images
Authors:
Md Abul Hayat,
George Stein,
Peter Harrington,
Zarija Lukić,
Mustafa Mustafa
Abstract:
Sky surveys are the largest data generators in astronomy, making automated tools for extracting meaningful scientific information an absolute necessity. We show that, without the need for labels, self-supervised learning recovers representations of sky survey images that are semantically useful for a variety of scientific tasks. These representations can be directly used as features, or fine-tuned…
▽ More
Sky surveys are the largest data generators in astronomy, making automated tools for extracting meaningful scientific information an absolute necessity. We show that, without the need for labels, self-supervised learning recovers representations of sky survey images that are semantically useful for a variety of scientific tasks. These representations can be directly used as features, or fine-tuned, to outperform supervised methods trained only on labeled data. We apply a contrastive learning framework on multi-band galaxy photometry from the Sloan Digital Sky Survey (SDSS) to learn image representations. We then use them for galaxy morphology classification, and fine-tune them for photometric redshift estimation, using labels from the Galaxy Zoo 2 dataset and SDSS spectroscopy. In both downstream tasks, using the same learned representations, we outperform the supervised state-of-the-art results, and we show that our approach can achieve the accuracy of supervised models while using 2-4 times fewer labels for training.
△ Less
Submitted 8 April, 2021; v1 submitted 23 December, 2020;
originally announced December 2020.
-
Quantization of the Szekeres spacetime through generalized symmetries
Authors:
Andronikos Paliathanasis,
Adamantia Zampeli,
Theodosios Christodoulakis,
M. T. Mustafa
Abstract:
We present the effect of the quantum corrections on the Szekeres spacetime, a system important for the study of the inhomogeneities of the pre-inflationary era of the universe. The study is performed in the context of canonical quantisation in the presence of symmetries. We construct an effective classical Lagrangian and impose the quantum version of its classical integrals of motion on the wave f…
▽ More
We present the effect of the quantum corrections on the Szekeres spacetime, a system important for the study of the inhomogeneities of the pre-inflationary era of the universe. The study is performed in the context of canonical quantisation in the presence of symmetries. We construct an effective classical Lagrangian and impose the quantum version of its classical integrals of motion on the wave function. The interpretational scheme of the quantum solution is that of Bohmian mechanics, in which one can avoid the unitarity problem of quantum cosmology. We discuss our results in this context.
△ Less
Submitted 13 December, 2020;
originally announced December 2020.
-
Rogers semilattices in the analytical hierarchy: The case of finite families
Authors:
Nikolay Bazhenov,
Manat Mustafa
Abstract:
A numbering of a countable family $S$ is a surjective map from the set of natural numbers $ω$ onto $S$. The paper studies Rogers semilattices, i.e. upper semilattices induced by the reducibility between numberings, for families $S\subset P(ω)$. Working in set theory ZF+DC+PD, we obtain the following results on families from various levels of the analytical hierarchy.
For a non-zero number $n$, b…
▽ More
A numbering of a countable family $S$ is a surjective map from the set of natural numbers $ω$ onto $S$. The paper studies Rogers semilattices, i.e. upper semilattices induced by the reducibility between numberings, for families $S\subset P(ω)$. Working in set theory ZF+DC+PD, we obtain the following results on families from various levels of the analytical hierarchy.
For a non-zero number $n$, by $E^1_n$ we denote $Π^1_n$ if $n$ is odd, and $Σ^1_n$ if $n$ is even. We show that for a finite family $S$ of $E^1_n$ sets, its Rogers $E^1_n$-semilattice has the greatest element if and only if $S$ contains the least element under set-theoretic inclusion. Furthermore, if $S$ does not have the $\subseteq$-least element, then the corresponding Rogers $E^1_n$-semilattice is upwards dense.
△ Less
Submitted 2 October, 2020;
originally announced October 2020.
-
Using Machine Learning to Augment Coarse-Grid Computational Fluid Dynamics Simulations
Authors:
Jaideep Pathak,
Mustafa Mustafa,
Karthik Kashinath,
Emmanuel Motheau,
Thorsten Kurth,
Marcus Day
Abstract:
Simulation of turbulent flows at high Reynolds number is a computationally challenging task relevant to a large number of engineering and scientific applications in diverse fields such as climate science, aerodynamics, and combustion. Turbulent flows are typically modeled by the Navier-Stokes equations. Direct Numerical Simulation (DNS) of the Navier-Stokes equations with sufficient numerical reso…
▽ More
Simulation of turbulent flows at high Reynolds number is a computationally challenging task relevant to a large number of engineering and scientific applications in diverse fields such as climate science, aerodynamics, and combustion. Turbulent flows are typically modeled by the Navier-Stokes equations. Direct Numerical Simulation (DNS) of the Navier-Stokes equations with sufficient numerical resolution to capture all the relevant scales of the turbulent motions can be prohibitively expensive. Simulation at lower-resolution on a coarse-grid introduces significant errors. We introduce a machine learning (ML) technique based on a deep neural network architecture that corrects the numerical errors induced by a coarse-grid simulation of turbulent flows at high-Reynolds numbers, while simultaneously recovering an estimate of the high-resolution fields. Our proposed simulation strategy is a hybrid ML-PDE solver that is capable of obtaining a meaningful high-resolution solution trajectory while solving the system PDE at a lower resolution. The approach has the potential to dramatically reduce the expense of turbulent flow simulations. As a proof-of-concept, we demonstrate our ML-PDE strategy on a two-dimensional turbulent (Rayleigh Number $Ra=10^9$) Rayleigh-Bénard Convection (RBC) problem.
△ Less
Submitted 3 October, 2020; v1 submitted 30 September, 2020;
originally announced October 2020.
-
Dynamics of QCD Matter -- current status
Authors:
Amaresh Jaiswal,
Najmul Haque,
Aman Abhishek,
Raktim Abir,
Aritra Bandyopadhyay,
Khatiza Banu,
Samapan Bhadury,
Sumana Bhattacharyya,
Trambak Bhattacharyya,
Deeptak Biswas,
H. C. Chandola,
Vinod Chandra,
Bhaswar Chatterjee,
Chandrodoy Chattopadhyay,
Nilanjan Chaudhuri,
Aritra Das,
Arpan Das,
Santosh K. Das,
Ashutosh Dash,
Kishan Deka,
Jayanta Dey,
Ricardo L. S. Farias,
Utsab Gangopadhyaya,
Ritesh Ghosh,
Sabyasachi Ghosh
, et al. (36 additional authors not shown)
Abstract:
In this article, there are 18 sections discussing various current topics in the field of relativistic heavy-ion collisions and related phenomena, which will serve as a snapshot of the current state of the art.
Section 1 reviews experimental results of some recent light-flavored particle production data from ALICE collaboration. Other sections are mostly theoretical in nature.
Very strong but t…
▽ More
In this article, there are 18 sections discussing various current topics in the field of relativistic heavy-ion collisions and related phenomena, which will serve as a snapshot of the current state of the art.
Section 1 reviews experimental results of some recent light-flavored particle production data from ALICE collaboration. Other sections are mostly theoretical in nature.
Very strong but transient magnetic field created in relativistic heavy-ion collisions could have important observational consequences. This has generated a lot of theoretical activity in the last decade. Sections 2, 7, 9, 10 and 11 deal with the effects of the magnetic field on the properties of the QCD matter. There are several unanswered questions about the QCD phase diagram. Sections 3, 11 and 18 discuss various aspects of the QCD phase diagram and phase transitions.
Recent years have witnessed interesting developments in foundational aspects of hydrodynamics and their application to heavy-ion collisions. Sections 12, 15, 16 and 17 of this article probe some aspects of this exciting field.
Transport coefficients together with their temperature- and density-dependence, are essential inputs in hydrodynamical calculations. Sections 5, 8 and 14 deal with calculation/estimation of various transport coefficients (shear and bulk viscosity, thermal conductivity, relaxation times, etc.) of quark matter and hadronic matter.
Sections 4, 6 and 13 deals with interesting new developments in the field. Section 4 discusses color dipole gluon distribution function at small transverse momentum in the form of a series of Bells polynomials. Section 6 discusses the properties of Higgs boson in the quark gluon plasma using Higgs-quark interaction. Section 13 discusses modification of coalescence model to incorporate viscous corrections and application of this model.
△ Less
Submitted 4 March, 2021; v1 submitted 29 July, 2020;
originally announced July 2020.
-
An image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Authors:
Temadher Alassiry Al-Maadeed,
Iqtadar Hussain,
Amir Anees,
M. T. Mustafa
Abstract:
Nowadays, the chaotic cryptosystems are gaining more attention due to their efficiency, the assurance of robustness and high sensitivity corresponding to initial conditions. In literature, on one hand there are many encryption algorithms that only guarantee security while on the other hand there are schemes based on chaotic systems that only promise the uncertainty. Due to these limitations, each…
▽ More
Nowadays, the chaotic cryptosystems are gaining more attention due to their efficiency, the assurance of robustness and high sensitivity corresponding to initial conditions. In literature, on one hand there are many encryption algorithms that only guarantee security while on the other hand there are schemes based on chaotic systems that only promise the uncertainty. Due to these limitations, each of these approaches cannot adequately encounter the challenges of current scenario. Here we take a unified approach and propose an image encryption algorithm based on Lorenz chaotic system and primitive irreducible polynomial S-boxes. First, we propose 16 different S-boxes based on projective general linear group and 16 primitive irreducible polynomials of Galois field of order 256, and then utilize these S-boxes with combination of chaotic map in image encryption scheme. Three chaotic sequences can be produced by the Lorenz chaotic system corresponding to variables $x$, $y$ and $z$. We construct a new pseudo random chaotic sequence $k_i$ based on $x$, $y$ and $z$. The plain image is encrypted by the use of chaotic sequence $k_i$ and XOR operation to get a ciphered image. To demonstrate the strength of presented image encryption, some renowned analyses as well as MATLAB simulations are performed.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
ADAHESSIAN: An Adaptive Second Order Optimizer for Machine Learning
Authors:
Zhewei Yao,
Amir Gholami,
Sheng Shen,
Mustafa Mustafa,
Kurt Keutzer,
Michael W. Mahoney
Abstract:
We introduce ADAHESSIAN, a second order stochastic optimization algorithm which dynamically incorporates the curvature of the loss function via ADAptive estimates of the HESSIAN. Second order algorithms are among the most powerful optimization algorithms with superior convergence properties as compared to first order methods such as SGD and Adam. The main disadvantage of traditional second order m…
▽ More
We introduce ADAHESSIAN, a second order stochastic optimization algorithm which dynamically incorporates the curvature of the loss function via ADAptive estimates of the HESSIAN. Second order algorithms are among the most powerful optimization algorithms with superior convergence properties as compared to first order methods such as SGD and Adam. The main disadvantage of traditional second order methods is their heavier per iteration computation and poor accuracy as compared to first order methods. To address these, we incorporate several novel approaches in ADAHESSIAN, including: (i) a fast Hutchinson based method to approximate the curvature matrix with low computational overhead; (ii) a root-mean-square exponential moving average to smooth out variations of the Hessian diagonal across different iterations; and (iii) a block diagonal averaging to reduce the variance of Hessian diagonal elements. We show that ADAHESSIAN achieves new state-of-the-art results by a large margin as compared to other adaptive optimization methods, including variants of Adam. In particular, we perform extensive tests on CV, NLP, and recommendation system tasks and find that ADAHESSIAN: (i) achieves 1.80%/1.45% higher accuracy on ResNets20/32 on Cifar10, and 5.55% higher accuracy on ImageNet as compared to Adam; (ii) outperforms AdamW for transformers by 0.13/0.33 BLEU score on IWSLT14/WMT14 and 2.7/1.0 PPL on PTB/Wikitext-103; (iii) outperforms AdamW for SqueezeBert by 0.41 points on GLUE; and (iv) achieves 0.032% better score than Adagrad for DLRM on the Criteo Ad Kaggle dataset. Importantly, we show that the cost per iteration of ADAHESSIAN is comparable to first order methods, and that it exhibits robustness towards its hyperparameters.
△ Less
Submitted 28 April, 2021; v1 submitted 1 June, 2020;
originally announced June 2020.
-
MeshfreeFlowNet: A Physics-Constrained Deep Continuous Space-Time Super-Resolution Framework
Authors:
Chiyu Max Jiang,
Soheil Esmaeilzadeh,
Kamyar Azizzadenesheli,
Karthik Kashinath,
Mustafa Mustafa,
Hamdi A. Tchelepi,
Philip Marcus,
Prabhat,
Anima Anandkumar
Abstract:
We propose MeshfreeFlowNet, a novel deep learning-based super-resolution framework to generate continuous (grid-free) spatio-temporal solutions from the low-resolution inputs. While being computationally efficient, MeshfreeFlowNet accurately recovers the fine-scale quantities of interest. MeshfreeFlowNet allows for: (i) the output to be sampled at all spatio-temporal resolutions, (ii) a set of Par…
▽ More
We propose MeshfreeFlowNet, a novel deep learning-based super-resolution framework to generate continuous (grid-free) spatio-temporal solutions from the low-resolution inputs. While being computationally efficient, MeshfreeFlowNet accurately recovers the fine-scale quantities of interest. MeshfreeFlowNet allows for: (i) the output to be sampled at all spatio-temporal resolutions, (ii) a set of Partial Differential Equation (PDE) constraints to be imposed, and (iii) training on fixed-size inputs on arbitrarily sized spatio-temporal domains owing to its fully convolutional encoder. We empirically study the performance of MeshfreeFlowNet on the task of super-resolution of turbulent flows in the Rayleigh-Benard convection problem. Across a diverse set of evaluation metrics, we show that MeshfreeFlowNet significantly outperforms existing baselines. Furthermore, we provide a large scale implementation of MeshfreeFlowNet and show that it efficiently scales across large clusters, achieving 96.80% scaling efficiency on up to 128 GPUs and a training time of less than 4 minutes.
△ Less
Submitted 21 August, 2020; v1 submitted 1 May, 2020;
originally announced May 2020.
-
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Authors:
Iqtadar Hussain,
Amir Anees,
Temadher Alassiry Al-Maadeed,
M. T. Mustafa
Abstract:
With the tremendous benefits of internet and advanced communications, there is a serious threat from the data security perspective. There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. Also, in block symmetric encryption algorithms, substitution boxes are the most vital part. In this paper, we investigate semifield s…
▽ More
With the tremendous benefits of internet and advanced communications, there is a serious threat from the data security perspective. There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. Also, in block symmetric encryption algorithms, substitution boxes are the most vital part. In this paper, we investigate semifield substitution boxes using permutation of symmetric group on a set of size 8 S_8 and establish an effective procedure for generating S_8 semifield substitution boxes having same algebraic properties. Further, the strength analysis of the generated substitution boxes is carried out using the well-known standards namely bijectivity, nonlinearity, strict avalanche criterion, bit independence criterion, XOR table and differential invariant. Based on the analysis results, it is shown that the cryptographic strength of generated substitution boxes is on par with the best known $8\times 8$ substitution boxes. As application, an encryption algorithm is proposed that can be employed to strengthen any kind of secure communication. The presented algorithm is mainly based on the Shannon idea of (S-P) network where the process of substitution is performed by the proposed S_8 semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. In addition, the proposed encryption algorithm utilizes two different chaotic maps. In order to ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly. The statistical and simulation results imply that our encryption scheme is secure against different attacks and can resist linear and differential cryptanalysis.
△ Less
Submitted 25 April, 2020;
originally announced April 2020.
-
Second-order quark number susceptibility of deconfined QCD matter in the presence of a magnetic field
Authors:
Bithika Karmakar,
Najmul Haque,
Munshi G Mustafa
Abstract:
Considering the strong field approximation we compute the hard thermal loop pressure at finite temperature and chemical potential of hot and dense deconfined QCD matter in lowest Landau level in one-loop order. We consider the anisotropic pressure in the presence of the strong magnetic field i.e., longitudinal and transverse pressure along parallel and perpendicular to the magnetic field direction…
▽ More
Considering the strong field approximation we compute the hard thermal loop pressure at finite temperature and chemical potential of hot and dense deconfined QCD matter in lowest Landau level in one-loop order. We consider the anisotropic pressure in the presence of the strong magnetic field i.e., longitudinal and transverse pressure along parallel and perpendicular to the magnetic field direction. As a first effort, we compute and discuss the anisotropic quark number susceptibility of deconfined QCD matter in lowest Landau level. The longitudinal quark number susceptibility is found to increase with the temperature whereas the transverse one decreases with the temperature. We also compute the quark number susceptibility in the weak field approximation. We find that the thermomagnetic correction to the quark number susceptibility is very marginal in the weak field approximation.
△ Less
Submitted 9 September, 2020; v1 submitted 25 March, 2020;
originally announced March 2020.
-
Verifying Software Vulnerabilities in IoT Cryptographic Protocols
Authors:
Fatimah Aljaafari,
Lucas C. Cordeiro,
Mustafa A. Mustafa
Abstract:
Internet of Things (IoT) is a system that consists of a large number of smart devices connected through a network. The number of these devices is increasing rapidly, which creates a massive and complex network with a vast amount of data communicated over that network. One way to protect this data in transit, i.e., to achieve data confidentiality, is to use lightweight encryption algorithms for IoT…
▽ More
Internet of Things (IoT) is a system that consists of a large number of smart devices connected through a network. The number of these devices is increasing rapidly, which creates a massive and complex network with a vast amount of data communicated over that network. One way to protect this data in transit, i.e., to achieve data confidentiality, is to use lightweight encryption algorithms for IoT protocols. However, the design and implementation of such protocols is an error-prone task; flaws in the implementation can lead to devastating security vulnerabilities. These vulnerabilities can be exploited by an attacker and affect users' privacy. There exist various techniques to verify software and detect vulnerabilities. Bounded Model Checking (BMC) and Fuzzing are useful techniques to check the correctness of a software system concerning its specifications. Here we describe a framework called Encryption-BMC and Fuzzing (EBF) using combined BMC and fuzzing techniques. We evaluate the application of EBF verification framework on a case study, i.e., the S-MQTT protocol, to check security vulnerabilities in cryptographic protocols for IoT.
△ Less
Submitted 27 January, 2020;
originally announced January 2020.
-
Attack based DoS attack detection using multiple classifier
Authors:
Mohamed Abushwereb,
Muhannad Mustafa,
Mouhammd Al-kasassbeh,
Malik Qasaimeh
Abstract:
One of the most common internet attacks causing significant economic losses in recent years is the Denial of Service (DoS) flooding attack. As a countermeasure, intrusion detection systems equipped with machine learning classification algorithms were developed to detect anomalies in network traffic. These classification algorithms had varying degrees of success, depending on the type of DoS attack…
▽ More
One of the most common internet attacks causing significant economic losses in recent years is the Denial of Service (DoS) flooding attack. As a countermeasure, intrusion detection systems equipped with machine learning classification algorithms were developed to detect anomalies in network traffic. These classification algorithms had varying degrees of success, depending on the type of DoS attack used. In this paper, we use an SNMP-MIB dataset from real testbed to explore the most prominent DoS attacks and the chances of their detection based on the classification algorithm used. The results show that most DOS attacks used nowadays can be detected with high accuracy using machine learning classification techniques based on features provided by SNMP-MIB. We also conclude that of all the attacks we studied, the Slowloris attack had the highest detection rate, on the other hand TCP-SYN had the lowest detection rate throughout all classification techniques, despite being one of the most used DoS attacks.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Contributions to the 36th International Cosmic Ray Conference (ICRC 2019) of the JEM-EUSO Collaboration
Authors:
G. Abdellaoui,
S. Abe,
J. H. Adams Jr.,
A. Ahriche,
D. Allard,
L. Allen,
G. Alonso,
L. Anchordoqui,
A. Anzalone,
Y. Arai,
K. Asano,
R. Attallah,
H. Attoui,
M. Ave Pernas,
S. Bacholle,
M. Bakiri,
P. Baragatti,
P. Barrillon,
S. Bartocci,
J. Bayer,
B. Beldjilali,
T. Belenguer,
N. Belkhalfa,
R. Bellotti,
A. Belov
, et al. (287 additional authors not shown)
Abstract:
Compilation of papers presented by the JEM-EUSO Collaboration at the 36th International Cosmic Ray Conference (ICRC), held July 24 through August 1, 2019 in Madison, Wisconsin.
Compilation of papers presented by the JEM-EUSO Collaboration at the 36th International Cosmic Ray Conference (ICRC), held July 24 through August 1, 2019 in Madison, Wisconsin.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Towards Physics-informed Deep Learning for Turbulent Flow Prediction
Authors:
Rui Wang,
Karthik Kashinath,
Mustafa Mustafa,
Adrian Albert,
Rose Yu
Abstract:
While deep learning has shown tremendous success in a wide range of domains, it remains a grand challenge to incorporate physical principles in a systematic manner to the design, training, and inference of such models. In this paper, we aim to predict turbulent flow by learning its highly nonlinear dynamics from spatiotemporal velocity fields of large-scale fluid flow simulations of relevance to t…
▽ More
While deep learning has shown tremendous success in a wide range of domains, it remains a grand challenge to incorporate physical principles in a systematic manner to the design, training, and inference of such models. In this paper, we aim to predict turbulent flow by learning its highly nonlinear dynamics from spatiotemporal velocity fields of large-scale fluid flow simulations of relevance to turbulence modeling and climate modeling. We adopt a hybrid approach by marrying two well-established turbulent flow simulation techniques with deep learning. Specifically, we introduce trainable spectral filters in a coupled model of Reynolds-averaged Navier-Stokes (RANS) and Large Eddy Simulation (LES), followed by a specialized U-net for prediction. Our approach, which we call turbulent-Flow Net (TF-Net), is grounded in a principled physics model, yet offers the flexibility of learned representations. We compare our model, TF-Net, with state-of-the-art baselines and observe significant reductions in error for predictions 60 frames ahead. Most importantly, our method predicts physical fields that obey desirable physical characteristics, such as conservation of mass, whilst faithfully emulating the turbulent kinetic energy field and spectrum, which are critical for accurate prediction of turbulent flows.
△ Less
Submitted 13 June, 2020; v1 submitted 19 November, 2019;
originally announced November 2019.