-
Impact of bunch intensity asymmetry in colliders featuring strong beamstrahlung
Authors:
Khoi Le Nguyen Nguyen,
Xavier Buffat,
Peter Kicsiny,
Tatiana Pieloni
Abstract:
An analytical investigation of beamstrahlung-induced blow-up in Gaussian beams with arbitrary dimensions is presented, using various approximations for the strength of the hourglass effect and crab waist scheme. The results, applied to the FCC-ee resonances, are compared with simulations and previous calculations, and relative luminosity values are also calculated. The stability of resultant confo…
▽ More
An analytical investigation of beamstrahlung-induced blow-up in Gaussian beams with arbitrary dimensions is presented, using various approximations for the strength of the hourglass effect and crab waist scheme. The results, applied to the FCC-ee resonances, are compared with simulations and previous calculations, and relative luminosity values are also calculated. The stability of resultant conformations are analysed to rule out the existence of a flip-flop phenomenon in the longitudinal plane analogous to the well-known transverse counterpart. Implications for the top-up injection procedures are discussed, and a phenomenological model is proposed to study the transverse-longitudinal coupling in the blowup dynamics.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
Two-dimensional gauge anomalies and $p$-adic numbers
Authors:
Imogen Camp,
Ben Gripaios,
Khoi Le Nguyen Nguyen
Abstract:
We show how methods of number theory can be used to study anomalies in gauge quantum field theories in spacetime dimension two. To wit, the anomaly cancellation conditions for the abelian part of the local anomaly admit solutions if and only if they admit solutions in the reals and in the $p$-adics for every prime $p$ and we use this to build an algorithm to find all solutions.
We show how methods of number theory can be used to study anomalies in gauge quantum field theories in spacetime dimension two. To wit, the anomaly cancellation conditions for the abelian part of the local anomaly admit solutions if and only if they admit solutions in the reals and in the $p$-adics for every prime $p$ and we use this to build an algorithm to find all solutions.
△ Less
Submitted 30 May, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Multi-objective Feature Selection in Remote Health Monitoring Applications
Authors:
Le Ngu Nguyen,
Constantino Álvarez Casado,
Manuel Lage Cañellas,
Anirban Mukherjee,
Nhi Nguyen,
Dinesh Babu Jayagopi,
Miguel Bordallo López
Abstract:
Radio frequency (RF) signals have facilitated the development of non-contact human monitoring tasks, such as vital signs measurement, activity recognition, and user identification. In some specific scenarios, an RF signal analysis framework may prioritize the performance of one task over that of others. In response to this requirement, we employ a multi-objective optimization approach inspired by…
▽ More
Radio frequency (RF) signals have facilitated the development of non-contact human monitoring tasks, such as vital signs measurement, activity recognition, and user identification. In some specific scenarios, an RF signal analysis framework may prioritize the performance of one task over that of others. In response to this requirement, we employ a multi-objective optimization approach inspired by biological principles to select discriminative features that enhance the accuracy of breathing patterns recognition while simultaneously impeding the identification of individual users. This approach is validated using a novel vital signs dataset consisting of 50 subjects engaged in four distinct breathing patterns. Our findings indicate a remarkable result: a substantial divergence in accuracy between breathing recognition and user identification. As a complementary viewpoint, we present a contrariwise result to maximize user identification accuracy and minimize the system's capacity for breathing activity recognition.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Non-contact Multimodal Indoor Human Monitoring Systems: A Survey
Authors:
Le Ngu Nguyen,
Praneeth Susarla,
Anirban Mukherjee,
Manuel Lage Cañellas,
Constantino Álvarez Casado,
Xiaoting Wu,
Olli~Silvén,
Dinesh Babu Jayagopi,
Miguel Bordallo López
Abstract:
Indoor human monitoring systems leverage a wide range of sensors, including cameras, radio devices, and inertial measurement units, to collect extensive data from users and the environment. These sensors contribute diverse data modalities, such as video feeds from cameras, received signal strength indicators and channel state information from WiFi devices, and three-axis acceleration data from ine…
▽ More
Indoor human monitoring systems leverage a wide range of sensors, including cameras, radio devices, and inertial measurement units, to collect extensive data from users and the environment. These sensors contribute diverse data modalities, such as video feeds from cameras, received signal strength indicators and channel state information from WiFi devices, and three-axis acceleration data from inertial measurement units. In this context, we present a comprehensive survey of multimodal approaches for indoor human monitoring systems, with a specific focus on their relevance in elderly care. Our survey primarily highlights non-contact technologies, particularly cameras and radio devices, as key components in the development of indoor human monitoring systems. Throughout this article, we explore well-established techniques for extracting features from multimodal data sources. Our exploration extends to methodologies for fusing these features and harnessing multiple modalities to improve the accuracy and robustness of machine learning models. Furthermore, we conduct comparative analysis across different data modalities in diverse human monitoring tasks and undertake a comprehensive examination of existing multimodal datasets. This extensive survey not only highlights the significance of indoor human monitoring systems but also affirms their versatile applications. In particular, we emphasize their critical role in enhancing the quality of elderly care, offering valuable insights into the development of non-contact monitoring solutions applicable to the needs of aging populations.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Understanding and minimizing ac losses in CORC cables of YBCO superconducting tapes
Authors:
Linh N. Nguyen,
Nathaniel Shields,
Stephen Ashworth,
Doan N. Nguyen
Abstract:
AC losses in conductor-on-rounded-core (CORC) cables of YBCO high-temperature superconducting (HTS) tapes are a significant challenge in HTS power applications. This study employs two finite element analysis (FEA) models to investigate the contributions from different AC loss components and provide approaches for reducing AC losses in cables. An FEA model based on T-A formula treats the cross-sect…
▽ More
AC losses in conductor-on-rounded-core (CORC) cables of YBCO high-temperature superconducting (HTS) tapes are a significant challenge in HTS power applications. This study employs two finite element analysis (FEA) models to investigate the contributions from different AC loss components and provide approaches for reducing AC losses in cables. An FEA model based on T-A formula treats the cross-section of thin superconducting layers as 1D lines and, therefore, only can predict the AC loss generated by the perpendicular magnetic field. In contrast, the model based on H-formulation can be performed on the actual 2D rectangular cross-section HTS tapes to provide the total AC losses generated by magnetic fluxes penetrating from both the edges and surfaces of HTS tapes, although this model requires more computing time and memory. Both 1D and 2D simulation approaches were employed to offer a comprehensive understanding of the effects of cable design and operational parameters on the AC loss components in a 2-layer CORC cable. The research results given in this paper are therefore not only valuable to suggest strategies for reducing AC loss in multi-layer cables but also for develo** more accurate and effective methods to calculate AC loss in CORC HTS cables.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
Efficient Algorithms for Monotone Non-Submodular Maximization with Partition Matroid Constraint
Authors:
Lan N. Nguyen,
My T. Thai
Abstract:
In this work, we study the problem of monotone non-submodular maximization with partition matroid constraint. Although a generalization of this problem has been studied in literature, our work focuses on leveraging properties of partition matroid constraint to (1) propose algorithms with theoretical bound and efficient query complexity; and (2) provide better analysis on theoretical performance gu…
▽ More
In this work, we study the problem of monotone non-submodular maximization with partition matroid constraint. Although a generalization of this problem has been studied in literature, our work focuses on leveraging properties of partition matroid constraint to (1) propose algorithms with theoretical bound and efficient query complexity; and (2) provide better analysis on theoretical performance guarantee of some existing techniques. We further investigate those algorithms' performance in two applications: Boosting Influence Spread and Video Summarization. Experiments show our algorithms return comparative results to the state-of-the-art algorithms while taking much fewer queries.
△ Less
Submitted 28 April, 2022;
originally announced April 2022.
-
Minimum Robust Multi-Submodular Cover for Fairness
Authors:
Lan N. Nguyen,
My T. Thai
Abstract:
In this paper, we study a novel problem, Minimum Robust Multi-Submodular Cover for Fairness (MinRF), as follows: given a ground set $V$; $m$ monotone submodular functions $f_1,...,f_m$; $m$ thresholds $T_1,...,T_m$ and a non-negative integer $r$, MinRF asks for the smallest set $S$ such that for all $i \in [m]$, $\min_{|X| \leq r} f_i(S \setminus X) \geq T_i$. We prove that MinRF is inapproximable…
▽ More
In this paper, we study a novel problem, Minimum Robust Multi-Submodular Cover for Fairness (MinRF), as follows: given a ground set $V$; $m$ monotone submodular functions $f_1,...,f_m$; $m$ thresholds $T_1,...,T_m$ and a non-negative integer $r$, MinRF asks for the smallest set $S$ such that for all $i \in [m]$, $\min_{|X| \leq r} f_i(S \setminus X) \geq T_i$. We prove that MinRF is inapproximable within $(1-ε)\ln m$; and no algorithm, taking fewer than exponential number of queries in term of $r$, is able to output a feasible set to MinRF with high certainty. Three bicriteria approximation algorithms with performance guarantees are proposed: one for $r=0$, one for $r=1$, and one for general $r$. We further investigate our algorithms' performance in two applications of MinRF, Information Propagation for Multiple Groups and Movie Recommendation for Multiple Users. Our algorithms have shown to outperform baseline heuristics in both solution quality and the number of queries in most cases.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Length-Bounded Paths Interdiction in Continuous Domain for Network Performance Assessment
Authors:
Lan N. Nguyen,
My T. Thai
Abstract:
Studying on networked systems, in which a communication between nodes is functional if their distance under a given metric is lower than a pre-defined threshold, has received significant attention recently. In this work, we propose a metric to measure network resilience on guaranteeing the pre-defined performance constraint. This metric is investigated under an optimization problem, namely \textbf…
▽ More
Studying on networked systems, in which a communication between nodes is functional if their distance under a given metric is lower than a pre-defined threshold, has received significant attention recently. In this work, we propose a metric to measure network resilience on guaranteeing the pre-defined performance constraint. This metric is investigated under an optimization problem, namely \textbf{Length-bounded Paths Interdiction in Continuous Domain} (cLPI), which aims to identify a minimum set of nodes whose changes cause routing paths between nodes become undesirable for the network service.
We show the problem is NP-hard and propose a framework by designing two oracles, \textit{Threshold Blocking} (TB) and \textit{Critical Path Listing} (CPL), which communicate back and forth to construct a feasible solution to cLPI with theoretical bicriteria approximation guarantees. Based on this framework, we propose two solutions for each oracle. Each combination of one solution to \tb and one solution to \cpl gives us a solution to cLPI. The bicriteria guarantee of our algorithms allows us to control the solutions's trade-off between the returned size and the performance accuracy. New insights into the advantages of each solution are further discussed via experimental analysis.
△ Less
Submitted 18 September, 2020;
originally announced September 2020.
-
OptChain: Optimal Transactions Placement for Scalable Blockchain Sharding
Authors:
Lan N. Nguyen,
Truc Nguyen,
Thang N. Dinh,
My T. Thai
Abstract:
A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard transactions degrade the system throughput but also double the confirmation time, and exhaust an already scarce network bandwidth. Are cross-shard transactions imminent for sharding schemes? In this paper, we propose a new sharding paradigm, called OptChain, in which cr…
▽ More
A major challenge in blockchain sharding protocols is that more than 95% transactions are cross-shard. Not only those cross-shard transactions degrade the system throughput but also double the confirmation time, and exhaust an already scarce network bandwidth. Are cross-shard transactions imminent for sharding schemes? In this paper, we propose a new sharding paradigm, called OptChain, in which cross-shard transactions are minimized, resulting in almost twice faster confirmation time and throughput. By treating transactions as a stream of nodes in an online graph, OptChain utilizes a lightweight and on-the-fly transaction placement method to group both related and soon-related transactions into the same shards. At the same time, OptChain maintains a temporal balance among shards to guarantee the high parallelism. Our comprehensive and large-scale simulation using Oversim P2P library confirms a significant boost in performance with up to 10 folds reduction in cross-shard transactions, more than twice reduction in confirmation time, and 50% increase in throughput. When combined with Omniledger sharding protocol, OptChain delivers a 6000 transactions per second throughput with 10.5s confirmation time.
△ Less
Submitted 18 October, 2021; v1 submitted 16 July, 2020;
originally announced July 2020.
-
Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid
Authors:
Tianyi Pan,
Subhankar Mishra,
Lan N. Nguyen,
Gunhee Lee,
Jungmin Kang,
Jungtaek Seo,
My T. Thai
Abstract:
Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the…
▽ More
Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the grid. In this paper, we discuss the interdependency in the social network coupled smart grid and focus on its vulnerability. That is, how much can the smart grid be damaged when misinformation related to it diffuses in SNs? To analytically study the problem, we propose the Misinformation Attack Problem in Social-Smart Grid (MAPSS) that identifies the top critical nodes in the SN, such that the smart grid can be greatly damaged when misinformation propagates from those nodes. This problem is challenging as we have to incorporate the complexity of the two networks concurrently. Nevertheless, we propose a technique that can explicitly take into account information diffusion in SN, power flow balance and cascading failure in smart grid integratedly when evaluating node criticality, based on which we propose various strategies in selecting the most critical nodes. Also, we introduce controlled load shedding as a protection strategy to reduce the impact of cascading failure. The effectiveness of our algorithms are demonstrated by experiments on IEEE bus test cases as well as the Pegase data set.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Network Resilience Assessment via QoS Degradation Metrics: An Algorithmic Approach
Authors:
Lan N. Nguyen,
My T. Thai
Abstract:
This paper focuses on network resilience to perturbation of edge weight. Other than connectivity, many network applications nowadays rely upon some measure of network distance between a pair of connected nodes. In these systems, a metric related to network functionality is associated to each edge. A pair of nodes only being functional if the weighted, shortest-path distance between the pair is bel…
▽ More
This paper focuses on network resilience to perturbation of edge weight. Other than connectivity, many network applications nowadays rely upon some measure of network distance between a pair of connected nodes. In these systems, a metric related to network functionality is associated to each edge. A pair of nodes only being functional if the weighted, shortest-path distance between the pair is below a given threshold \texttt{T}. Consequently, a natural question is on which degree the change of edge weights can damage the network functionality? With this motivation, we study a new problem, \textit{Quality of Service Degradation}: given a set of pairs, find a minimum budget to increase the edge weights which ensures the distance between each pair exceeds $\mathtt{T}$. We introduce four algorithms with theoretical performance guarantees for this problem. Each of them has its own strength in trade-off between effectiveness and running time, which are illustrated both in theory and comprehensive experimental evaluation.
△ Less
Submitted 5 February, 2019;
originally announced February 2019.
-
Personalized Image-based User Authentication using Wearable Cameras
Authors:
Le Ngu Nguyen,
Stephan Sigg
Abstract:
Personal devices (e.g. laptops, tablets, and mobile phones) are conventional in daily life and have the ability to store users' private data. The security problems related to these appliances have become a primary concern for both users and researchers. In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provi…
▽ More
Personal devices (e.g. laptops, tablets, and mobile phones) are conventional in daily life and have the ability to store users' private data. The security problems related to these appliances have become a primary concern for both users and researchers. In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest a blurriness-based method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication challenges in the presence of a random and an informed attacker who is familiar with the environment and observed that the time required and the number of attempts are significantly higher than for the legitimate user, making it possible to detect attacks on the authentication system.
△ Less
Submitted 29 March, 2017; v1 submitted 19 December, 2016;
originally announced December 2016.
-
A Mecke-type formula and Markov properties for STIT tessellation processes
Authors:
Werner Nagel,
Linh Ngoc Nguyen,
Christoph Thaele,
Viola Weiss
Abstract:
An analogue of the classical Mecke formula for Poisson point processes is proved for the class of space-time STIT tessellation processes. From this key identity the Markov property of a class of associated random processes is derived. This in turn is used to determine the distribution of the number of internal vertices of the typical maximal tessellation segment.
An analogue of the classical Mecke formula for Poisson point processes is proved for the class of space-time STIT tessellation processes. From this key identity the Markov property of a class of associated random processes is derived. This in turn is used to determine the distribution of the number of internal vertices of the typical maximal tessellation segment.
△ Less
Submitted 13 December, 2016; v1 submitted 9 December, 2016;
originally announced December 2016.