-
Evidence of random spin-singlet state in a three-dimensional quantum spin liquid candidate Sr$_3$CuNb$_2$O$_9$
Authors:
S. M. Hossain,
S. S. Rahaman,
H. Gujrati,
Dilip Bhoi,
A. Matsuo,
K. Kindo,
M. Kumar,
M. Majumder
Abstract:
Disorder is ubiquitous in any quantum many-body system and is usually considered to be an obstacle to the elucidation of the underlying physics of complex systems, but its presence can often introduce exotic phases of matter that cannot generally be realized in a clean system. We report here a detailed experimental and theoretical study of magnetic properties of highly disordered Sr$_3$CuNb$_2$O…
▽ More
Disorder is ubiquitous in any quantum many-body system and is usually considered to be an obstacle to the elucidation of the underlying physics of complex systems, but its presence can often introduce exotic phases of matter that cannot generally be realized in a clean system. We report here a detailed experimental and theoretical study of magnetic properties of highly disordered Sr$_3$CuNb$_2$O$_9$ material which exhibits random site mixing between Cu and Nb. The magnetic moments (Cu$^{2+}$) are arranged in a quasi-cubic (three-dimensional) manner, leading to a high degree of frustration with a Curie-Weiss temperature ($θ_{CW}$) of about -60 K without any long-range magnetic ordering down to 466 mK. These observations suggest that Sr$_3$CuNb$_2$O$_9$ is a candidate for a quantum spin liquid. More interestingly, the susceptibility ($χ= M/μ_0H$) and the $C_m/T$ ($C_m$ is the magnetic part of the heat capacity) follow a power-law behavior with decreasing temperature. In addition, $M(T,μ_0H)$ and $C_m(T,μ_0H)/T$ show scaling relationships over a wide temperature and field range. This unusual behavior with respect to the conventional behavior of a QSL can be discussed qualitatively as the coexistence of a disorder-induced random spin singlet (RSS) state and a QSL state. A quantitative description has been given by numerical calculations considering a power-law probability distribution $P(J) \propto J^{-γ}$ ($J$ is the exchange interaction) of random spin singlets. The parameters extracted from the numerical calculations are in excellent agreement with the experimental data. Furthermore, the analytical results are also consistent with the power-law and scaling behavior of $χ$ and $C_m(T,μ_0H)/T$ as a whole. Thus, our comprehensive experimental and theoretical analysis provides evidence for the stabilization of the RSS state in a three-dimensional lattice.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Trust, Because You Can't Verify:Privacy and Security Hurdles in Education Technology Acquisition Practices
Authors:
Easton Kelso,
Ananta Soneji,
Sazzadur Rahaman,
Yan Soshitaishvili,
Rakibul Hasan
Abstract:
The education technology (EdTech) landscape is expanding rapidly in higher education institutes (HEIs). This growth brings enormous complexity. Protecting the extensive data collected by these tools is crucial for HEIs. Privacy incidents of data breaches and misuses can have dire security and privacy consequences on the data subjects, particularly students, who are often compelled to use these too…
▽ More
The education technology (EdTech) landscape is expanding rapidly in higher education institutes (HEIs). This growth brings enormous complexity. Protecting the extensive data collected by these tools is crucial for HEIs. Privacy incidents of data breaches and misuses can have dire security and privacy consequences on the data subjects, particularly students, who are often compelled to use these tools. This urges an in-depth understanding of HEI and EdTech vendor dynamics, which is largely understudied.
To address this gap, we conduct a semi-structured interview study with 13 participants who are in the EdTech leadership roles at seven HEIs. Our study uncovers the EdTech acquisition process in the HEI context, the consideration of security and privacy issues throughout that process, the pain points of HEI personnel in establishing adequate security and privacy protection mechanisms in service contracts, and their struggle in holding vendors accountable due to a lack of visibility into their system and power-asymmetry, among other reasons. We discuss certain observations about the status quo and conclude with recommendations to improve the situation.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
The feasibility of ultra-relativistic bubbles in SMEFT
Authors:
Upalaparna Banerjee,
Sabyasachi Chakraborty,
Suraj Prakash,
Shakeel Ur Rahaman
Abstract:
A first order electroweak phase transition probes physics beyond the Standard Model on multiple frontiers and therefore is of immense interest for theoretical exploration. We conduct a model-independent study of the effects of relevant dimension 6 operators, of the Standard Model Effective Field Theory, on electroweak phase transition. We use a thermally corrected and renormalization group improve…
▽ More
A first order electroweak phase transition probes physics beyond the Standard Model on multiple frontiers and therefore is of immense interest for theoretical exploration. We conduct a model-independent study of the effects of relevant dimension 6 operators, of the Standard Model Effective Field Theory, on electroweak phase transition. We use a thermally corrected and renormalization group improved potential and study its impact on nucleation temperature. We then outline bubble dynamics that lead to ultra-relativistic bubble wall velocities which are mainly motivated from the viewpoint of gravitational wave detection. We highlight the ranges of the Wilson coefficients that give rise to such bubble wall velocities and predict gravitational wave spectra generated by such transitions which can be tested in future experiments. The low new physics scale necessitates the inclusion of dimension 8 contributions. We also quantify their impact on ultra-relativistic bubble wall dynamics.
△ Less
Submitted 8 March, 2024; v1 submitted 5 February, 2024;
originally announced February 2024.
-
One-loop Effective Action up to any Mass-dimension for Non-degenerate Scalars and Fermions including Light-Heavy Mixing
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Shakeel Ur Rahaman,
Kaanapuli Ramkumar
Abstract:
We propose a Heat-Kernel-based method to compute one-loop effective action up to any mass-dimension with arbitrary numbers of non-degenerate scalars and fermions. We demonstrate our prescription by computing the dimension six effective action for arbitrary numbers of non-degenerate scalars, which are consistent with degenerate results presented in prior studies. We have further shown that the effe…
▽ More
We propose a Heat-Kernel-based method to compute one-loop effective action up to any mass-dimension with arbitrary numbers of non-degenerate scalars and fermions. We demonstrate our prescription by computing the dimension six effective action for arbitrary numbers of non-degenerate scalars, which are consistent with degenerate results presented in prior studies. We have further shown that the effective action for any partially degenerate mass-spectrum can be easily derived from that for the non-degenerate case by employing suitable limits for masses. Our prescription allows us to express the effective action in terms of local operators for the scenarios that involve light-heavy mixing as well, simply by employing an infrared regulator in the non-degenerate action. Along with the formalism, we have also provided the algorithm and outlined the Mathematica program to compute the result up to any mass dimension.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
On the Contents and Utility of IoT Cybersecurity Guidelines
Authors:
Jesse Chen,
Dharun Anandayuvaraj,
James C Davis,
Sazzadur Rahaman
Abstract:
Cybersecurity concerns of Internet of Things (IoT) devices and infrastructure are growing each year. In response, organizations worldwide have published IoT security guidelines to protect their citizens and customers by providing recommendations on the development and operation of IoT systems. While these guidelines are being adopted, e.g. by US federal contractors, their content and merits have n…
▽ More
Cybersecurity concerns of Internet of Things (IoT) devices and infrastructure are growing each year. In response, organizations worldwide have published IoT security guidelines to protect their citizens and customers by providing recommendations on the development and operation of IoT systems. While these guidelines are being adopted, e.g. by US federal contractors, their content and merits have not been critically examined. Specifically, we do not know what topics and recommendations they cover and their effectiveness at preventing real-world IoT failures. In this paper, we address these gaps through a qualitative study of guidelines. We collect 142 IoT cybersecurity guidelines and sample them for recommendations until reaching saturation at 25 guidelines. From the resulting 958 unique recommendations, we iteratively develop a hierarchical taxonomy following grounded theory coding principles and study the guidelines' comprehensiveness. In addition, we evaluate the actionability and specificity of each recommendation and match recommendations to CVEs and security failures in the news they can prevent. We report that: (1) Each guideline has gaps in its topic coverage and comprehensiveness; (2) 87.2% recommendations are actionable and 38.7% recommendations can prevent specific threats; and (3) although the union of the guidelines mitigates all 17 of the failures from our news stories corpus, 21% of the CVEs evade the guidelines. In summary, we report shortcomings in each guideline's depth and breadth, but as a whole they address major security issues.
△ Less
Submitted 25 June, 2024; v1 submitted 2 October, 2023;
originally announced October 2023.
-
Internal Shocks Hydrodynamics: the Collision of Two Cold Shells in Detail
Authors:
Sk. Minhajur Rahaman,
Jonathan Granot,
Paz Beniamini
Abstract:
Emission in many astrophysical transients originates from a shocked fluid. A central engine typically produces an outflow with varying speeds, leading to internal collisions within the outflow at finite distances from the source. Each such collision produces a pair of forward and reverse shocks with the two shocked regions separated by a contact discontinuity (CD). As a useful approximation, we co…
▽ More
Emission in many astrophysical transients originates from a shocked fluid. A central engine typically produces an outflow with varying speeds, leading to internal collisions within the outflow at finite distances from the source. Each such collision produces a pair of forward and reverse shocks with the two shocked regions separated by a contact discontinuity (CD). As a useful approximation, we consider the head-on collision between two cold and uniform shells (a slower leading shell and a faster trailing shell) of finite radial width, and study the dynamics of shock propagation in planar geometry. We find significant differences between the forward and reverse shocks, in terms of their strength, internal energy production efficiency, and the time it takes for the shocks to sweep through the respective shells. We consider the subsequent propagation of rarefaction waves in the shocked regions and explore the cases where these waves can catch up with the shock fronts and thereby limit the internal energy dissipation. We demonstrate the importance of energy transfer from the trailing to leading shell through $pdV$ work across the CD. We outline the parameter space regions relevant for models of different transients,e.g., Gamma-ray burst (GRB) internal shock model, fast radio burst (FRB) blastwave model, Giant flare due to magnetars, and superluminous supernovae (SLSN) ejecta. We find that the reverse shock likely dominates the internal energy production for many astrophysical transients.
△ Less
Submitted 22 December, 2023; v1 submitted 28 September, 2023;
originally announced September 2023.
-
One-loop Effective Action up to Dimension Eight: Integrating out Heavy Fermion(s)
Authors:
Joydeep Chakrabortty,
Shakeel Ur Rahaman,
Kaanapuli Ramkumar
Abstract:
We present the universal one-loop effective action up to dimension eight after integrating out heavy fermion(s) using the Heat-Kernel method. We have discussed how the Dirac operator being a weak elliptic operator, the fermionic operator still can be written in the form of a strong elliptic one such that the Heat-Kernel coefficients can be used to compute the fermionic effective action. This actio…
▽ More
We present the universal one-loop effective action up to dimension eight after integrating out heavy fermion(s) using the Heat-Kernel method. We have discussed how the Dirac operator being a weak elliptic operator, the fermionic operator still can be written in the form of a strong elliptic one such that the Heat-Kernel coefficients can be used to compute the fermionic effective action. This action captures the footprint of both the CP conserving as well as violating UV interactions. As it does not rely on the specific forms of either UV or low energy theories, can be applicable for a very generic action. Our result encapsulates the effects of heavy fermion loops only.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Prompt Gamma-Ray Burst Emission from Internal Shocks -- New Insights
Authors:
Sk. Minhajur Rahaman,
Jonathan Granot,
Paz Beniamini
Abstract:
Internal shocks are a leading candidate for the dissipation mechanism that powers the prompt $γ$-ray emission in gamma-ray bursts (GRBs). In this scenario a compact central source produces an ultra-relativistic outflow with varying speeds, causing faster parts or shells to collide with slower ones. Each collision produces a pair of shocks -- a forward shock (FS) propagating into the slower leading…
▽ More
Internal shocks are a leading candidate for the dissipation mechanism that powers the prompt $γ$-ray emission in gamma-ray bursts (GRBs). In this scenario a compact central source produces an ultra-relativistic outflow with varying speeds, causing faster parts or shells to collide with slower ones. Each collision produces a pair of shocks -- a forward shock (FS) propagating into the slower leading shell and a reverse shock (RS) propagating into the faster trailing shell. The RS's lab-frame speed is always smaller, while the RS is typically stronger than the FS, leading to different conditions in the two shocked regions that both contribute to the observed emission. We show that optically-thin synchrotron emission from both (weaker FS + stronger RS) can naturally explain key features of prompt GRB emission such as the pulse shapes, time-evolution of the $νF_ν$ peak flux and photon-energy, and the spectrum. Particularly, it can account for two features commonly observed in GRB spectra: (i) a sub-dominant low-energy spectral component (often interpreted as ``photospheric''-like), or (ii) a doubly-broken power-law spectrum with the low-energy spectral slope approaching the slow cooling limit. Both features can be obtained while maintaining high overall radiative efficiency without any fine-tuning of the physical conditions.
△ Less
Submitted 22 December, 2023; v1 submitted 1 August, 2023;
originally announced August 2023.
-
A System of Monitoring and Analyzing Human Indoor Mobility and Air Quality
Authors:
Kyle K. Qin,
Mohammad S. Rahaman,
Yongli Ren,
Chi-Tsun Cheng,
Ivan Cole,
Flora D. Salim
Abstract:
Human movements in the workspace usually have non-negligible relations with air quality parameters (e.g., CO$_2$, PM2.5, and PM10). We establish a system to monitor indoor human mobility with air quality and assess the interrelationship between these two types of time series data. More specifically, a sensor network was designed in indoor environments to observe air quality parameters continuously…
▽ More
Human movements in the workspace usually have non-negligible relations with air quality parameters (e.g., CO$_2$, PM2.5, and PM10). We establish a system to monitor indoor human mobility with air quality and assess the interrelationship between these two types of time series data. More specifically, a sensor network was designed in indoor environments to observe air quality parameters continuously. Simultaneously, another sensing module detected participants' movements around the study areas. In this module, modern data analysis and machine learning techniques have been applied to reconstruct the trajectories of participants with relevant sensor information. Finally, a further study revealed the correlation between human indoor mobility patterns and indoor air quality parameters. Our experimental results demonstrate that human movements in different environments can significantly impact air quality during busy hours. With the results, we propose recommendations for future studies.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
One-loop Effective Action up to Dimension Eight: Integrating out Heavy Scalar(s)
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Shakeel Ur Rahaman,
Kaanapuli Ramkumar
Abstract:
We present the complete one-loop effective action up to dimension eight after integrating out degenerate scalars using the Heat-Kernel method. The result is provided without assuming any specific form of either UV or low energy theories, i.e., universal. In this paper, we consider the effects of only heavy scalar propagators in the loops. We also verify part of the results using the covariant diag…
▽ More
We present the complete one-loop effective action up to dimension eight after integrating out degenerate scalars using the Heat-Kernel method. The result is provided without assuming any specific form of either UV or low energy theories, i.e., universal. In this paper, we consider the effects of only heavy scalar propagators in the loops. We also verify part of the results using the covariant diagram technique.
△ Less
Submitted 15 June, 2023;
originally announced June 2023.
-
Magnetic plateaus and jumps in a spin-1/2 ladder with alternate Ising-Heisenberg rungs: a field dependent study
Authors:
Sk Saniur Rahaman,
Manoranjan Kumar,
Shaon Sahoo
Abstract:
We study a frustrated two-leg spin-1/2 ladder with alternate Ising and isotropic Heisenberg rung exchange interactions, whereas, interactions along legs and diagonals are Ising type. The ground-state (GS) of this model has four exotic phases: (i) the stripe rung ferromagnet (SRFM), (ii) the anisotropic anti-ferromagnet (AAFM), (iii) the Dimer, and (iv) the stripe leg ferromagnet (SLFM) in absence…
▽ More
We study a frustrated two-leg spin-1/2 ladder with alternate Ising and isotropic Heisenberg rung exchange interactions, whereas, interactions along legs and diagonals are Ising type. The ground-state (GS) of this model has four exotic phases: (i) the stripe rung ferromagnet (SRFM), (ii) the anisotropic anti-ferromagnet (AAFM), (iii) the Dimer, and (iv) the stripe leg ferromagnet (SLFM) in absence of any external magnetic field. In this work, we study the effect of externally applied longitudinal and transverse fields on GS phases and note that there are two plateaus with per-site magnetization $1/4$ and $1/2$. There is another plateau at zero magnetization due to a finite spin gap in the presence of a longitudinal field. The exact diagonalization (ED) and the transfer matrix (TM) methods are used to solve the model Hamiltonian and the mechanism of plateau formation is analyzed using spin density, quantum fidelity, and quantum concurrence. In the (i) SRFM phase, Ising exchanges are dominant for all spins but the Heisenberg rungs are weak, and therefore, the magnetization shows a continuous transition as a function of the transverse field. In the other three phases [(ii)-(iv)], the Ising dimer rungs are weak and those are broken first to reach a plateau with per-site magnetization $1/4$, having a large gap which is closed by further application of the transverse field.
△ Less
Submitted 19 June, 2024; v1 submitted 24 April, 2023;
originally announced April 2023.
-
EFT, decoupling, Higgs boson mixing, and higher dimensional operators
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Christoph Englert,
Wrishik Naskar,
Shakeel Ur Rahaman,
Michael Spannowsky
Abstract:
The effective field theory (EFT) framework is a precise approximation procedure when the inherent assumptions of a large-scale separation between the Standard Model (SM) and new interactions alongside perturbativity are realised. Constraints from available data might not automatically guarantee these circumstances when contrasted with UV scenarios that the EFT analysis wishes to inform. From an EF…
▽ More
The effective field theory (EFT) framework is a precise approximation procedure when the inherent assumptions of a large-scale separation between the Standard Model (SM) and new interactions alongside perturbativity are realised. Constraints from available data might not automatically guarantee these circumstances when contrasted with UV scenarios that the EFT analysis wishes to inform. From an EFT perspective, achieving sufficient precision in navigating the alignment or decoupling limits beyond the SM scenarios can necessitate moving beyond the SM's leading, dimension six EFT deformation. Using the example of Higgs boson mixing, we demonstrated the importance of higher-dimensional terms in the EFT expansion. We analyse the relevance of virtual EFT corrections and dimension eight contributions for well-determined electroweak precision observables. We find that when moving away from the decoupling limit, the relevance of additional terms in the EFT expansion quickly becomes relevant. This demonstrates the necessity to move beyond dimension six interactions for any scenario that contains Higgs boson mixing.
△ Less
Submitted 21 March, 2024; v1 submitted 9 March, 2023;
originally announced March 2023.
-
Integrating out heavy scalars with modified EOMs: matching computation of dimension-eight SMEFT coefficients
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Christoph Englert,
Shakeel Ur Rahaman,
Michael Spannowsky
Abstract:
The shift in focus towards searches for physics beyond the Standard Model (SM) employing model-independent Effective Field Theory (EFT) methods necessitates a rigorous approach to matching to guarantee the validity of the obtained results and constraints. The limits on the leading dimension-six EFT effects can be rather inaccurate for LHC searches that suffer from large uncertainties while explori…
▽ More
The shift in focus towards searches for physics beyond the Standard Model (SM) employing model-independent Effective Field Theory (EFT) methods necessitates a rigorous approach to matching to guarantee the validity of the obtained results and constraints. The limits on the leading dimension-six EFT effects can be rather inaccurate for LHC searches that suffer from large uncertainties while exploring an extensive energy range. Similarly, precise measurements can, in principle, test the subleading effects of the operator expansion. In this work, we present an algorithmic approach to automatise matching computations for dimension-eight operators for generic scalar extensions with proper implementation of equations of motion. We devise a step-by-step procedure to obtain the dimension-eight Wilson coefficients (WCs) in a non-redundant basis to arrive at complete matching results. We apply this formalism to a range of scalar extensions of the SM and provide tree-level and loop-suppressed results. Finally, we discuss the relevance of the dimension-eight operators for a range of phenomenological analyses, particularly focusing on Higgs and electroweak physics.
△ Less
Submitted 5 February, 2023; v1 submitted 26 October, 2022;
originally announced October 2022.
-
Solar Power Time Series Forecasting Utilising Wavelet Coefficients
Authors:
Sarah Almaghrabi,
Mashud Rana,
Margaret Hamilton,
Mohammad Saiedur Rahaman
Abstract:
Accurate and reliable prediction of Photovoltaic (PV) power output is critical to electricity grid stability and power dispatching capabilities. However, Photovoltaic (PV) power generation is highly volatile and unstable due to different reasons. The Wavelet Transform (WT) has been utilised in time series applications, such as Photovoltaic (PV) power prediction, to model the stochastic volatility…
▽ More
Accurate and reliable prediction of Photovoltaic (PV) power output is critical to electricity grid stability and power dispatching capabilities. However, Photovoltaic (PV) power generation is highly volatile and unstable due to different reasons. The Wavelet Transform (WT) has been utilised in time series applications, such as Photovoltaic (PV) power prediction, to model the stochastic volatility and reduce prediction errors. Yet the existing Wavelet Transform (WT) approach has a limitation in terms of time complexity. It requires reconstructing the decomposed components and modelling them separately and thus needs more time for reconstruction, model configuration and training. The aim of this study is to improve the efficiency of applying Wavelet Transform (WT) by proposing a new method that uses a single simplified model. Given a time series and its Wavelet Transform (WT) coefficients, it trains one model with the coefficients as features and the original time series as labels. This eliminates the need for component reconstruction and training numerous models. This work contributes to the day-ahead aggregated solar Photovoltaic (PV) power time series prediction problem by proposing and comprehensively evaluating a new approach of employing WT. The proposed approach is evaluated using 17 months of aggregated solar Photovoltaic (PV) power data from two real-world datasets. The evaluation includes the use of a variety of prediction models, including Linear Regression, Random Forest, Support Vector Regression, and Convolutional Neural Networks. The results indicate that using a coefficients-based strategy can give predictions that are comparable to those obtained using the components-based approach while requiring fewer models and less computational time.
△ Less
Submitted 1 October, 2022;
originally announced October 2022.
-
Pulsar radio emission mechanism II. On the origin of relativistic Langmuir solitons in pulsar plasma
Authors:
Sk. Minhajur Rahaman,
Dipanjan Mitra,
George I. Melikidze,
Taras Lakoba
Abstract:
Observations suggest that coherent radio emission from pulsars is excited in a dense pulsar plasma by curvature radiation from charge bunches. Numerous studies propose that these charge bunches are relativistic charge solitons which are solutions of the non-linear Schrödinger equation (NLSE) with a group velocity dispersion ($G$), cubic-nonlinearity($q$) and non-linear Landau dam** ($s$). The fo…
▽ More
Observations suggest that coherent radio emission from pulsars is excited in a dense pulsar plasma by curvature radiation from charge bunches. Numerous studies propose that these charge bunches are relativistic charge solitons which are solutions of the non-linear Schrödinger equation (NLSE) with a group velocity dispersion ($G$), cubic-nonlinearity($q$) and non-linear Landau dam** ($s$). The formation of stable solitons crucially depends on the parameters $G, q$ and $s$ and the particle distribution function. In this work, we use realistic pulsar plasma parameters obtained from observational constraints to explore the parameter space of NLSE for two representative distribution functions (DF) of particles' momenta: Lorentzian (long-tailed) and Gaussian (short-tailed). The choice of DF critically affects the value of $|s/q|$, which, in turn, determines whether solitons can form. Numerical simulations show that well-formed solitons are obtained only for small values of $|s/q| \lesssim 0.1$ while for moderate and higher values of $|s/q| \gtrsim 0.5$ soliton formation is suppressed. Small values for $|s/q| \sim 0.1$ are readily obtained for long-tailed DF for a wide range of plasma temperatures. On the other hand, short-tailed DF provides these values only for some narrow range of plasma parameters. Thus, the presence of a prominent high-energy tail in the particle DF favours soliton formation for a wide range of plasma parameters. Besides pair plasma, we also include an iron ion component and find that they make a negligible contribution in either modifying the NLSE coefficients or contributing to charge separation.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Imagining Future Digital Assistants at Work: A Study of Task Management Needs
Authors:
Yonchanok Khaokaew,
Indigo Holcombe-James,
Mohammad Saiedur Rahaman,
Jonathan Liono,
Johanne R. Trippas,
Damiano Spina,
Nicholas Belkin,
Peter Bailey,
Paul N. Bennett,
Yongli Ren,
Mark Sanderson,
Falk Scholer,
Ryen W. White,
Flora D. Salim
Abstract:
Digital Assistants (DAs) can support workers in the workplace and beyond. However, target user needs are not fully understood, and the functions that workers would ideally want a DA to support require further study. A richer understanding of worker needs could help inform the design of future DAs. We investigate user needs of future workplace DAs using data from a user study of 40 workers over a f…
▽ More
Digital Assistants (DAs) can support workers in the workplace and beyond. However, target user needs are not fully understood, and the functions that workers would ideally want a DA to support require further study. A richer understanding of worker needs could help inform the design of future DAs. We investigate user needs of future workplace DAs using data from a user study of 40 workers over a four-week period. Our qualitative analysis confirms existing research and generates new insight on the role of DAs in managing people's time, tasks, and information. Placing these insights in relation to quantitative analysis of self-reported task data, we highlight how different occupation roles require DAs to take varied approaches to these domains and the effect of task characteristics on the imagined features. Our findings have implications for the design of future DAs in work settings, and we offer some recommendations for reduction to practice.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Memories of quenches in operator mixing
Authors:
Joydeep Chakrabortty,
Diptarka Das,
Bidyut Dey,
Suraj Prakash,
Shakeel Ur Rahaman
Abstract:
We work perturbatively with an interacting quantum field theory comprised of two distinct scalar fields. In this theory, we introduce a sudden quench of the mass of one of the scalars at time $t_0$. Also, the quartic interaction between the two scalars is turned on at time $t_{in}$. These break time-translation invariance. In this setup we examine the effects of the relative ordering of $t_0$ and…
▽ More
We work perturbatively with an interacting quantum field theory comprised of two distinct scalar fields. In this theory, we introduce a sudden quench of the mass of one of the scalars at time $t_0$. Also, the quartic interaction between the two scalars is turned on at time $t_{in}$. These break time-translation invariance. In this setup we examine the effects of the relative ordering of $t_0$ and $t_{in}$ on composite operator mixing. We study how such operator mixing affect features of the scalar potential. We find that the late time effective potential can be sensitive enough to the quenches to trigger phase transitions.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Study of the Berezinskii-Kosterlitz-Thouless transition: An unsupervised machine learning approach
Authors:
Sumit Haldar,
Sk Saniur Rahaman,
Manoranjan Kumar
Abstract:
The Berezinskii-Kosterlitz-Thouless (BKT) transition in magnetic system is an intriguing phenomena and an accurate estimation of the BKT transition temperature has been a long-standing problem. In this work we explore the anisotropic classical Heisenberg XY and XXZ models with ferromagnetic exchange on a square lattice and antiferromagnetic exchange on a triangular lattice using an unsupervised ma…
▽ More
The Berezinskii-Kosterlitz-Thouless (BKT) transition in magnetic system is an intriguing phenomena and an accurate estimation of the BKT transition temperature has been a long-standing problem. In this work we explore the anisotropic classical Heisenberg XY and XXZ models with ferromagnetic exchange on a square lattice and antiferromagnetic exchange on a triangular lattice using an unsupervised machine learning approach called principal component analysis (PCA). In earlier studies of the BKT transition, spin configurations and vorticities calculated from Monte Carlo method are used to determine the transition temperature $T_{BKT}$, but those methods fail to give any conclusive results by analyzing the principal components in the PCA approach. In this work vorticities are used as initial input to the PCA and curve of the first principal component with temperature is fitted with a function to determine an accurate value of $T_{BKT}$. This procedure works well for anisotropic classical Heisenberg with ferromagnetic exchange on square lattice as well as for frustrated antiferromagnetic exchange on a triangular lattice. The classical anisotropic Heisenberg antiferromagnetic model on the triangular lattice has two close transitions; the BKT at $T_{BKT}$ and Ising like phase transition for chirality at $T_c$ and it is difficult to separate these transition points. It is also noted that using the PCA method and manipulation of their first principal component, not only separation of transition points are possible but also transition temperature can be determined accurately.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
EFT Diagrammatica II: Tracing the UV origin of bosonic D6 CPV and D8 SMEFT operators
Authors:
Wrishik Naskar,
Suraj Prakash,
Shakeel Ur Rahaman
Abstract:
In recent times, SMEFT, along with a superlative repertoire of theoretical and computational tools, has emerged as an efficacious platform to test the viability of proposed BSM scenarios. With symmetry as the backbone, higher mass dimensional ($\geq 5$) SMEFT operators constitute the \textit{lingua franca} for studying and comparing the direct or indirect effects of UV models on low energy observa…
▽ More
In recent times, SMEFT, along with a superlative repertoire of theoretical and computational tools, has emerged as an efficacious platform to test the viability of proposed BSM scenarios. With symmetry as the backbone, higher mass dimensional ($\geq 5$) SMEFT operators constitute the \textit{lingua franca} for studying and comparing the direct or indirect effects of UV models on low energy observables. The steady increase in the accessible energy scales for contemporary particle collision experiments prompts us to inspect effective operators beyond the leading order and investigate their measurable impact as well as their connections with the appropriate BSM proposals. We take the next step in delineating the possible UV roots of SMEFT operators by extending our diagrammatic approach, previously employed for CP, baryon, and lepton number conserving dimension-6 operators, to the complete set of purely bosonic SMEFT operators up to mass dimension-8. We catalogue a diverse array of Feynman diagrams elucidating how the operators encapsulate heavy field propagators while abiding by a notion of minimalism.
△ Less
Submitted 21 July, 2022; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Externally-driven plasma models as candidates for pulsar radio emission
Authors:
Sk. Minhajur Rahaman,
Dipanjan Mitra,
George I. Melikidze
Abstract:
Coherent radio emission from pulsars originates from excited plasma waves in an ultra-relativistic and strongly magnetized electron-positron pair plasma streaming along the open magnetic field lines of the pulsar. Traditional coherent radio emission models have relied on instabilities in this pair plasma. Recently alternative models have been suggested. These models appeal to direct coupling of th…
▽ More
Coherent radio emission from pulsars originates from excited plasma waves in an ultra-relativistic and strongly magnetized electron-positron pair plasma streaming along the open magnetic field lines of the pulsar. Traditional coherent radio emission models have relied on instabilities in this pair plasma. Recently alternative models have been suggested. These models appeal to direct coupling of the external electromagnetic field to the superluminal O-mode ($lt_2$ mode) during the time-dependent pair cascade process at the polar gap. The objective of this work is to provide generic constraints on plasma models based on $lt_2$ mode using realistic pulsar parameters. We find that the very short timescale associated with pair cascades does not allow $lt_{2}$ mode to be excited at radio frequencies and the impulsive energy transfer can only increase the kinetic spread ("temperature") of the pair plasma particles. Moreover, under homogeneous plasma conditions, plasma waves on both branches of O-mode (i.e. superluminal $lt_2$ and subluminal $lt_1$) cannot escape the plasma. In the strongly magnetized pair plasma, only the extraordinary mode ($t$ mode) can escape freely. We show that any generic fictitious mechanisms does not result in the wave electric field of $t$ mode to have predominant orientation either parallel or perpendicular to the magnetic field plane as observed. Such fictitious mechanisms will inevitably lead to depolarization of signals and cannot account for the highly polarized single pulses observed in pulsars. We suggest coherent curvature radiation as a promising candidate for pulsar radio emission mechanism.
△ Less
Submitted 15 August, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.
-
Machine learning approach to study quantum phases of a frustrated one dimensional spin-1/2 system
Authors:
Sk Saniur Rahaman,
Sumit Haldar,
Manoranjan Kumar
Abstract:
Frustration driven quantum fluctuation leads to many exotic phases in the ground state and study of these quantum phase transitions is one of the most challenging areas of research in condensed matter physics. Here, a frustrated Heisenberg $J_1-J_2$ model of spin-1/2 chain with nearest exchange interaction $J_1$ and next nearest exchange interaction $J_2$ is studied using the principal component a…
▽ More
Frustration driven quantum fluctuation leads to many exotic phases in the ground state and study of these quantum phase transitions is one of the most challenging areas of research in condensed matter physics. Here, a frustrated Heisenberg $J_1-J_2$ model of spin-1/2 chain with nearest exchange interaction $J_1$ and next nearest exchange interaction $J_2$ is studied using the principal component analysis (PCA) which is an unsupervised machine learning technique. In this method most probable spin configurations (MPSC) of ground-state (GS) and first excited state (FES) for different $J_2/J_1$ are used as the input in PCA to construct the co-variance matrix. The `quantified principal component' of the largest eigenvalue of co-variance matrix $p_1(J_2/J_1)$ is calculated and it is shown that the nature and variation of $p_1(J_2/J_1)$ can accurately predict the phase transitions and degeneracies in the GS. The $p_1(J_2/J_1)$ calculated from the MPSC of GS can only exhibit the signature of degeneracies in the GS, whereas, $p_1(J_2/J_1)$ calculated from MPSC of FES captures the gapless spin liquid (GSL)-dimer phase transition as well as all the degeneracies of the model system. We show that jump in $p_1(J_2/J_1)$ of FES at $J_2/J_1 \approx 0.241$, indicates the GSL-dimer phase transition, whereas its kinks give the signature of the GS degeneracies. The scatter plot of first two principal components of FES shows distinct band formation for different phases.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Individual and Group-wise Classroom Seating Experience: Effects on Student Engagement in Different Courses
Authors:
Nan Gao,
Mohammad Saiedur Rahaman,
Wei Shao,
Kaixin Ji,
Flora D. Salim
Abstract:
Seating location in the classroom can affect student engagement, attention and academic performance by providing better visibility, improved movement, and participation in discussions. Existing studies typically explore how traditional seating arrangements (e.g. grouped tables or traditional rows) influence students' perceived engagement, without considering group seating behaviours under more fle…
▽ More
Seating location in the classroom can affect student engagement, attention and academic performance by providing better visibility, improved movement, and participation in discussions. Existing studies typically explore how traditional seating arrangements (e.g. grouped tables or traditional rows) influence students' perceived engagement, without considering group seating behaviours under more flexible seating arrangements. Furthermore, survey-based measures of student engagement are prone to subjectivity and various response bias. Therefore, in this research, we investigate how individual and group-wise classroom seating experiences affect student engagement using wearable physiological sensors. We conducted a field study at a high school and collected survey and wearable data from 23 students in 10 courses over four weeks. We aim to answer the following research questions: 1. How does the seating proximity between students relate to their perceived learning engagement? 2. How do students' group seating behaviours relate to their physiologically-based measures of engagement (i.e. physiological arousal and physiological synchrony)? Experiment results indicate that the individual and group-wise classroom seating experience is associated with perceived student engagement and physiologically-based engagement measured from electrodermal activity. We also find that students who sit close together are more likely to have similar learning engagement and tend to have high physiological synchrony. This research opens up opportunities to explore the implications of flexible seating arrangements and has great potential to maximize student engagement by suggesting intelligent seating choices in the future.
△ Less
Submitted 23 July, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks
Authors:
Sharmin Afrose,
Ya Xiao,
Sazzadur Rahaman,
Barton P. Miller,
Danfeng,
Yao
Abstract:
Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced and commercial security tools that automatically screen Java programs to detect misuses. To compare their accuracy and security guarantees, we develop two comprehensive benchmarks named CryptoAPI-Bench and ApacheCryptoAPI-Bench. CryptoAP…
▽ More
Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced and commercial security tools that automatically screen Java programs to detect misuses. To compare their accuracy and security guarantees, we develop two comprehensive benchmarks named CryptoAPI-Bench and ApacheCryptoAPI-Bench. CryptoAPI-Bench consists of 181 unit test cases that cover basic cases, as well as complex cases, including interprocedural, field sensitive, multiple class test cases, and path sensitive data flow of misuse cases. The benchmark also includes correct cases for testing false-positive rates. The ApacheCryptoAPI-Bench consists of 121 cryptographic cases from 10 Apache projects. We evaluate four tools, namely, SpotBugs, CryptoGuard, CrySL, and Coverity using both benchmarks. We present their performance and comparative analysis. The ApacheCryptoAPI-Bench also examines the scalability of the tools. Our benchmarks are useful for advancing state-of-the-art solutions in the space of misuse detection.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages
Authors:
Cristian-Alexandru Staicu,
Sazzadur Rahaman,
Ágnes Kiss,
Michael Backes
Abstract:
Scripting languages are continuously gaining popularity due to their ease of use and the flourishing software ecosystems that surround them. These languages offer crash and memory safety by design, thus, developers do not need to understand and prevent low-level security issues like the ones plaguing the C code. However, scripting languages often allow native extensions, which are a way for custom…
▽ More
Scripting languages are continuously gaining popularity due to their ease of use and the flourishing software ecosystems that surround them. These languages offer crash and memory safety by design, thus, developers do not need to understand and prevent low-level security issues like the ones plaguing the C code. However, scripting languages often allow native extensions, which are a way for custom C/C++ code to be invoked directly from the high-level language. While this feature promises several benefits such as increased performance or the reuse of legacy code, it can also break the language's guarantees, e.g., crash-safety. In this work, we first provide a comparative analysis of the security risks of native extension APIs in three popular scripting languages. Additionally, we discuss a novel methodology for studying the misuse of the native extension API. We then perform an in-depth study of npm, an ecosystem which is most exposed to threats introduced by native extensions. We show that vulnerabilities in extensions can be exploited in their embedding library by producing reads of uninitialized memory, hard crashes or memory leaks in 33 npm packages, simply by invoking their API with well-crafted inputs. Moreover, we identify six open-source web applications in which such exploits can be deployed remotely by a weak adversary. Finally, we were assigned seven security advisories for the work presented in this paper, most labeled as high severity.
△ Less
Submitted 3 February, 2023; v1 submitted 22 November, 2021;
originally announced November 2021.
-
CoSEM: Contextual and Semantic Embedding for App Usage Prediction
Authors:
Yonchanok Khaokaew,
Mohammad Saiedur Rahaman,
Ryen W. White,
Flora D. Salim
Abstract:
App usage prediction is important for smartphone system optimization to enhance user experience. Existing modeling approaches utilize historical app usage logs along with a wide range of semantic information to predict the app usage; however, they are only effective in certain scenarios and cannot be generalized across different situations. This paper address this problem by develo** a model cal…
▽ More
App usage prediction is important for smartphone system optimization to enhance user experience. Existing modeling approaches utilize historical app usage logs along with a wide range of semantic information to predict the app usage; however, they are only effective in certain scenarios and cannot be generalized across different situations. This paper address this problem by develo** a model called Contextual and Semantic Embedding model for App Usage Prediction (CoSEM) for app usage prediction that leverages integration of 1) semantic information embedding and 2) contextual information embedding based on historical app usage of individuals. Extensive experiments show that the combination of semantic information and history app usage information enables our model to outperform the baselines on three real-world datasets, achieving an MRR score over 0.55,0.57,0.86 and Hit rate scores of more than 0.71, 0.75, and 0.95, respectively.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Investigating the Reliability of Self-report Data in the Wild: The Quest for Ground Truth
Authors:
Nan Gao,
Mohammad Saiedur Rahaman,
Wei Shao,
Flora D. Salim
Abstract:
Inferring human mental state (e.g., emotion, depression, engagement) with sensing technology is one of the most valuable challenges in the affective computing area, which has a profound impact in all industries interacting with humans. The self-report survey is the most common way to quantify how people think, but prone to subjectivity and various responses bias. It is usually used as the ground t…
▽ More
Inferring human mental state (e.g., emotion, depression, engagement) with sensing technology is one of the most valuable challenges in the affective computing area, which has a profound impact in all industries interacting with humans. The self-report survey is the most common way to quantify how people think, but prone to subjectivity and various responses bias. It is usually used as the ground truth for human mental state prediction. In recent years, many data-driven machine learning models are built based on self-report annotations as the target value. In this research, we investigate the reliability of self-report surveys in the wild by studying the confidence level of responses and survey completion time. We conduct a case study (i.e., student engagement inference) by recruiting 23 students in a high school setting over a period of 4 weeks. Our participants volunteered 488 self-reported responses and data from their wearable sensors. We also find the physiologically measured student engagement and perceived student engagement are not always consistent. The findings from this research have great potential to benefit future studies in predicting engagement, depression, stress, and other emotion-related states in the field of affective computing and sensing technologies.
△ Less
Submitted 29 November, 2021; v1 submitted 1 July, 2021;
originally announced July 2021.
-
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms
Authors:
Fahad Shaon,
Sazzadur Rahaman,
Murat Kantarcioglu
Abstract:
Distributed data analytics platforms (i.e., Apache Spark, Hadoop) provide high-level APIs to programmatically write analytics tasks that are run distributedly in multiple computing nodes. The design of these frameworks was primarily motivated by performance and usability. Thus, the security takes a back seat. Consequently, they do not inherently support fine-grained access control or offer any plu…
▽ More
Distributed data analytics platforms (i.e., Apache Spark, Hadoop) provide high-level APIs to programmatically write analytics tasks that are run distributedly in multiple computing nodes. The design of these frameworks was primarily motivated by performance and usability. Thus, the security takes a back seat. Consequently, they do not inherently support fine-grained access control or offer any plugin mechanism to enable it, making them risky to be used in multi-tier organizational settings.
There have been attempts to build "add-on" solutions to enable fine-grained access control for distributed data analytics platforms. In this paper, first, we show that straightforward enforcement of ``add-on'' access control is insecure under adversarial code execution. Specifically, we show that an attacker can abuse platform-provided APIs to evade access controls without leaving any traces. Second, we designed a two-layered (i.e., proactive and reactive) defense system to protect against API abuses. On submission of a user code, our proactive security layer statically screens it to find potential attack signatures prior to its execution. The reactive security layer employs code instrumentation-based runtime checks and sandboxed execution to throttle any exploits at runtime. Next, we propose a new fine-grained access control framework with an enhanced policy language that supports map and filter primitives. Finally, we build a system named SecureDL with our new access control framework and defense system on top of Apache Spark, which ensures secure access control policy enforcement under adversaries capable of executing code.
To the best of our knowledge, this is the first fine-grained attribute-based access control framework for distributed data analytics platforms that is secure against platform API abuse attacks. Performance evaluation showed that the overhead due to added security is low.
△ Less
Submitted 3 December, 2023; v1 submitted 24 June, 2021;
originally announced June 2021.
-
MoParkeR : Multi-objective Parking Recommendation
Authors:
Mohammad Saiedur Rahaman,
Wei Shao,
Flora D. Salim,
Ayad Turky,
Andy Song,
Jeffrey Chan,
Junliang Jiang,
Doug Bradbrook
Abstract:
Existing parking recommendation solutions mainly focus on finding and suggesting parking spaces based on the unoccupied options only. However, there are other factors associated with parking spaces that can influence someone's choice of parking such as fare, parking rule, walking distance to destination, travel time, likelihood to be unoccupied at a given time. More importantly, these factors may…
▽ More
Existing parking recommendation solutions mainly focus on finding and suggesting parking spaces based on the unoccupied options only. However, there are other factors associated with parking spaces that can influence someone's choice of parking such as fare, parking rule, walking distance to destination, travel time, likelihood to be unoccupied at a given time. More importantly, these factors may change over time and conflict with each other which makes the recommendations produced by current parking recommender systems ineffective. In this paper, we propose a novel problem called multi-objective parking recommendation. We present a solution by designing a multi-objective parking recommendation engine called MoParkeR that considers various conflicting factors together. Specifically, we utilise a non-dominated sorting technique to calculate a set of Pareto-optimal solutions, consisting of recommended trade-off parking spots. We conduct extensive experiments using two real-world datasets to show the applicability of our multi-objective recommendation methodology.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
EFT Diagrammatica: UV Roots of the CP-conserving SMEFT
Authors:
Supratim Das Bakshi,
Joydeep Chakrabortty,
Suraj Prakash,
Shakeel Ur Rahaman,
Michael Spannowsky
Abstract:
Effective Field Theories are an established framework to bridge the gap between UV and low energy theories. In the context of the Standard Model, the bottom-up approach extends its operator set and thus equips us to astutely probe its observables while encapsulating indirect evidence of unknown high scale theories. While the top-down approach, on the other hand, employs functional techniques to in…
▽ More
Effective Field Theories are an established framework to bridge the gap between UV and low energy theories. In the context of the Standard Model, the bottom-up approach extends its operator set and thus equips us to astutely probe its observables while encapsulating indirect evidence of unknown high scale theories. While the top-down approach, on the other hand, employs functional techniques to integrate out the heavy fields from a BSM Lagrangian leading to a set of SMEFT operators. An intricate interplay of the two approaches enhances the efficacy of the SMEFT in making meaningful predictions while providing a platform for conducting a coherent comparison of new physics scenarios. However, while the bottom-up approach fails to indicate the origin of the effective operators, the top-down approach is highly dependent on the specific model assumptions of the UV theory. We, for the first time, are proposing a diagrammatic approach to establish selection criteria for the allowed heavy field representations corresponding to each SMEFT operator. This, in turn, paves the way to construct observable driven new physics models. While we take a predominantly minimalistic approach, we also highlight the necessity for non-minimal interactions for certain operators.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Ground state properties and exact thermodynamics of a 2-leg anisotropic spin ladder system
Authors:
Sk Saniur Rahaman,
Shaon Sahoo,
Manoranjan Kumar
Abstract:
We study a frustrated two-leg spin ladder with alternate isotropic Heisenberg and Ising rung exchange interactions, whereas, interactions along legs and diagonals are Ising-type. All the interactions in the ladder are anti-ferromagnetic in nature and induce frustration in the system. This model shows four interesting quantum phases: (i) stripe rung ferromagnetic (SRFM), (ii) stripe rung ferromagne…
▽ More
We study a frustrated two-leg spin ladder with alternate isotropic Heisenberg and Ising rung exchange interactions, whereas, interactions along legs and diagonals are Ising-type. All the interactions in the ladder are anti-ferromagnetic in nature and induce frustration in the system. This model shows four interesting quantum phases: (i) stripe rung ferromagnetic (SRFM), (ii) stripe rung ferromagnetic with edge singlet (SRFM-E), (iii) anisotropic antiferromagnetic (AAFM), and (iv) stripe leg ferromagnetic (SLFM) phase. We construct a quantum phase diagram for this model and show that in stripe rung ferromagnet (SRFM), the same type of sublattice spins (either $S$ or $σ$-type spins) are aligned in the same direction. Whereas, in anisotropic antiferromagnetic phase, both $S$ and $σ$-type of spins are anti-ferromagnetically aligned with each other, two nearest $S$ spins along the rung form an anisotropic singlet bond whereas two nearest $σ$ spins form an Ising bond. In large Heisenberg rung exchange interaction limit, spins on each leg are ferromagnetically aligned, but spins on different legs are anti-ferromagnetically aligned. The thermodynamic quantities like $Cv(T)$, $χ(T)$ and $S(T)$ are also calculated using the transfer matrix method for different phase. The magnetic gap in the SRFM and the SLFM can be notice from $χ(T)$ and $Cv(T)$ curves.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Mode changing, subpulse drifting and nulling in four component conal pulsar PSR J2321+6024
Authors:
Sk. Minhajur Rahaman,
Rahul Basu,
Dipanjan Mitra,
George I. Melikidze
Abstract:
In this study, we report on a detailed single pulse polarimetric analysis of the radio emission from the pulsar J2321+6024 (B2319+60) observed with the Giant Metrewave Radio Telescope, over wide frequencies ranging between 300 to 500 MHz and widely separated observing sessions. The pulsar profile shows the presence of four distinct conal components and belongs to a small group of pulsars classifie…
▽ More
In this study, we report on a detailed single pulse polarimetric analysis of the radio emission from the pulsar J2321+6024 (B2319+60) observed with the Giant Metrewave Radio Telescope, over wide frequencies ranging between 300 to 500 MHz and widely separated observing sessions. The pulsar profile shows the presence of four distinct conal components and belongs to a small group of pulsars classified as a conal quadrupole profile type. The single pulse sequence reveals the presence of three distinct emission modes, A, B, and ABN showing subpulse drifting. Besides, there were sequences when the pulsar did not show any drifting behaviour suggesting the possibility of a new emission state, which we have termed as mode C. The evolution of the mode changing behavior was seen during the different observing sessions with different abundance as well as the average duration of the modes seen on each date. The drifting periodicities were 7.8$\pm$0.3 $P$, 4.3$\pm$0.4 $P$, and 3.1$\pm$0.2 $P$ in the modes A, B and ABN respectively, and showed large phase variations within the mode profile. The pulsar also showed the presence of orthogonal polarization modes, particularly in the leading and trailing components, which has different characteristics for the stronger and weaker pulses. However, no correlation was found between the emission modes and their polarization behavior, with the estimated emission heights remaining roughly constant throughout. We have used the Partially Screened Gap model to understand the connection between drifting, mode changing, and nulling.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
Uncovering the Root of LEFT in SMEFT
Authors:
Joydeep Chakrabortty,
Suraj Prakash,
Shakeel Ur Rahaman,
Michael Spannowsky
Abstract:
At energies below the electroweak scale, baryon number $B$ and lepton number $L$ violating processes are of significant importance in identifying the nature of UV extensions of the Standard Model. The imprint of UV theories on low-energy measurements can be calculated to a high accuracy using the theoretical framework of the Low Energy Effective Theory (LEFT). Using $B,\; L$ and the operators' dim…
▽ More
At energies below the electroweak scale, baryon number $B$ and lepton number $L$ violating processes are of significant importance in identifying the nature of UV extensions of the Standard Model. The imprint of UV theories on low-energy measurements can be calculated to a high accuracy using the theoretical framework of the Low Energy Effective Theory (LEFT). Using $B,\; L$ and the operators' dimensions as classifying characteristics, we construct a network connecting operator classes of the LEFT with the Standard Model Effective Theory (SMEFT). Following the links of this network, the contact interactions described by the effective operators of LEFT can be unambiguously embedded into those of SMEFT, which enables us to constrain the possible realisations of UV theories. In turn, this can help to prioritise low energy measurements with the aim of comprehensively testing all classes of LEFT and SMEFT operators.
△ Less
Submitted 14 October, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Effective Operator Bases for Beyond Standard Model Scenarios: An EFT compendium for discoveries
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Suraj Prakash,
Shakeel Ur Rahaman,
Michael Spannowsky
Abstract:
It is not only conceivable but likely that the spectrum of physics beyond the Standard Model (SM) is non-degenerate. The lightest non-SM particle may reside close enough to the electroweak scale that it can be kinematically probed at high-energy experiments and on account of this, it must be included as an infrared (IR) degree of freedom (DOF) along with the SM ones. The rest of the non-SM particl…
▽ More
It is not only conceivable but likely that the spectrum of physics beyond the Standard Model (SM) is non-degenerate. The lightest non-SM particle may reside close enough to the electroweak scale that it can be kinematically probed at high-energy experiments and on account of this, it must be included as an infrared (IR) degree of freedom (DOF) along with the SM ones. The rest of the non-SM particles are heavy enough to be directly experimentally inaccessible and can be integrated out. Now, to capture the effects of the complete theory, one must take into account the higher dimensional operators constituted of the SM DOFs and the minimal extension. This construction, BSMEFT, is in the same spirit as SMEFT but now with extra IR DOFs. Constructing a BSMEFT is in general the first step after establishing experimental evidence for a new particle. We have investigated three different scenarios where the SM is extended by additional (i) uncolored, (ii) colored particles, and (iii) abelian gauge symmetries. For each such scenario, we have included the most-anticipated and phenomenologically motivated models to demonstrate the concept of BSMEFT. In this paper, we have provided the full EFT Lagrangian for each such model up to mass dimension 6. We have also identified the $CP$, baryon ($B$), and lepton ($L$) number violating effective operators.
△ Less
Submitted 26 August, 2020;
originally announced August 2020.
-
Generative Adversarial Networks for Spatio-temporal Data: A Survey
Authors:
Nan Gao,
Hao Xue,
Wei Shao,
Sichen Zhao,
Kyle Kai Qin,
Arian Prabowo,
Mohammad Saiedur Rahaman,
Flora D. Salim
Abstract:
Generative Adversarial Networks (GANs) have shown remarkable success in producing realistic-looking images in the computer vision area. Recently, GAN-based techniques are shown to be promising for spatio-temporal-based applications such as trajectory prediction, events generation and time-series data imputation. While several reviews for GANs in computer vision have been presented, no one has cons…
▽ More
Generative Adversarial Networks (GANs) have shown remarkable success in producing realistic-looking images in the computer vision area. Recently, GAN-based techniques are shown to be promising for spatio-temporal-based applications such as trajectory prediction, events generation and time-series data imputation. While several reviews for GANs in computer vision have been presented, no one has considered addressing the practical applications and challenges relevant to spatio-temporal data. In this paper, we have conducted a comprehensive review of the recent developments of GANs for spatio-temporal data. We summarise the application of popular GAN architectures for spatio-temporal data and the common practices for evaluating the performance of spatio-temporal applications with GANs. Finally, we point out future research directions to benefit researchers in this area.
△ Less
Submitted 29 July, 2021; v1 submitted 18 August, 2020;
originally announced August 2020.
-
Seating preference analysis for hybrid workplaces
Authors:
Mohammad Saiedur Rahaman,
Shaw Kudo,
Tim Rawling,
Yongli Ren,
Flora D. Salim
Abstract:
Due to the increasing nature of flexible work and the recent requirements from COVID-19 restrictions, workplaces are becoming more hybrid (i.e. allowing workers to work between traditional office spaces and elsewhere including from home). Since workplaces are different in design, layout and available facilities, many workers find it difficult to adjust accordingly. Eventually, this impacts negativ…
▽ More
Due to the increasing nature of flexible work and the recent requirements from COVID-19 restrictions, workplaces are becoming more hybrid (i.e. allowing workers to work between traditional office spaces and elsewhere including from home). Since workplaces are different in design, layout and available facilities, many workers find it difficult to adjust accordingly. Eventually, this impacts negatively towards work productivity and other related parameters including concentration, stress, and mood while at work. One of the key factors that causes this negative work experience is directly linked to the available seating arrangements. In this paper, we conduct an analysis to understand various seating preferences of 37 workers with varying demographics, using the data collected pre-COVID-19, and analyse the findings in the context of hybrid workplace settings. We also discuss a list of implications illustrating how our findings can be adapted across wider hybrid work settings.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Pulsar radio emission mechanism I : On the amplification of Langmuir waves in the linear regime
Authors:
Sk. Minhajur Rahaman,
Dipanjan Mitra,
George I. Melikidze
Abstract:
Observations suggest that in normal period radio pulsars, coherent curvature radiation is excited within 10$\%$ of the light cylinder. The coherence is attributed to Langmuir mode instability in a relativistically streaming one-dimensional plasma flow along the open magnetic field lines. In this work, we use a hot plasma treatment to solve the hydrodynamic dispersion relation of Langmuir mode for…
▽ More
Observations suggest that in normal period radio pulsars, coherent curvature radiation is excited within 10$\%$ of the light cylinder. The coherence is attributed to Langmuir mode instability in a relativistically streaming one-dimensional plasma flow along the open magnetic field lines. In this work, we use a hot plasma treatment to solve the hydrodynamic dispersion relation of Langmuir mode for realistic pulsar parameters. The solution involves three scenarios of two-stream instability viz., driven by high energy beams, due to longitudinal drift that leads to a separation of electron-positron distribution functions in the secondary plasma and due to cloud-cloud interaction causing spatial overlap of two successive secondary plasma clouds. We find that sufficient amplification can be obtained only for the latter two scenarios. Our analysis shows that longitudinal drift is characterized by high growth rates only for certain multi-polar surface field geometry. For these configurations, very high growth rates are obtained starting from a few tens of km from the neutron star surface, which then falls monotonically with increasing distance. For cloud-cloud overlap, growth rates become high starting only after a few hundred km from the surface, which first increases and then decreases with increasing distance. A spatial window of up to around a 1000 km above the neutron star surface has been found where large amplitude Langmuir waves can be excited while the pair plasma is dense enough to account for high brightness temperature.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Coding Practices and Recommendations of Spring Security for Enterprise Applications
Authors:
Mazharul Islam,
Sazzadur Rahaman,
Na Meng,
Behnaz Hassanshahi,
Padmanabhan Krishnan,
Danfeng,
Yao
Abstract:
Spring security is tremendously popular among practitioners for its ease of use to secure enterprise applications. In this paper, we study the application framework misconfiguration vulnerabilities in the light of Spring security, which is relatively understudied in the existing literature. Towards that goal, we identify 6 types of security anti-patterns and 4 insecure vulnerable defaults by condu…
▽ More
Spring security is tremendously popular among practitioners for its ease of use to secure enterprise applications. In this paper, we study the application framework misconfiguration vulnerabilities in the light of Spring security, which is relatively understudied in the existing literature. Towards that goal, we identify 6 types of security anti-patterns and 4 insecure vulnerable defaults by conducting a measurement-based approach on 28 Spring applications. Our analysis shows that security risks associated with the identified security anti-patterns and insecure defaults can leave the enterprise application vulnerable to a wide range of high-risk attacks. To prevent these high-risk attacks, we also provide recommendations for practitioners. Consequently, our study has contributed one update to the official Spring security documentation while other security issues identified in this study are being considered for future major releases by Spring security community.
△ Less
Submitted 28 July, 2020;
originally announced July 2020.
-
FADACS: A Few-shot Adversarial Domain Adaptation Architecture for Context-Aware Parking Availability Sensing
Authors:
Wei Shao,
Sichen Zhao,
Zhen Zhang,
Shiyu Wang,
Mohammad Saiedur Rahaman,
Andy Song,
Flora Dilys Salim
Abstract:
Existing research on parking availability sensing mainly relies on extensive contextual and historical information. In practice, the availability of such information is a challenge as it requires continuous collection of sensory signals. In this study, we design an end-to-end transfer learning framework for parking availability sensing to predict parking occupancy in areas in which the parking dat…
▽ More
Existing research on parking availability sensing mainly relies on extensive contextual and historical information. In practice, the availability of such information is a challenge as it requires continuous collection of sensory signals. In this study, we design an end-to-end transfer learning framework for parking availability sensing to predict parking occupancy in areas in which the parking data is insufficient to feed into data-hungry models. This framework overcomes two main challenges: 1) many real-world cases cannot provide enough data for most existing data-driven models, and 2) it is difficult to merge sensor data and heterogeneous contextual information due to the differing urban fabric and spatial characteristics. Our work adopts a widely-used concept, adversarial domain adaptation, to predict the parking occupancy in an area without abundant sensor data by leveraging data from other areas with similar features. In this paper, we utilise more than 35 million parking data records from sensors placed in two different cities, one a city centre and the other a coastal tourist town. We also utilise heterogeneous spatio-temporal contextual information from external resources, including weather and points of interest. We quantify the strength of our proposed framework in different cases and compare it to the existing data-driven approaches. The results show that the proposed framework is comparable to existing state-of-the-art methods and also provide some valuable insights on parking availability prediction.
△ Less
Submitted 27 January, 2021; v1 submitted 13 July, 2020;
originally announced July 2020.
-
n-Gage: Predicting in-class Emotional, Behavioural and Cognitive Engagement in the Wild
Authors:
Nan Gao,
Wei Shao,
Mohammad Saiedur Rahaman,
Flora D. Salim
Abstract:
The study of student engagement has attracted growing interests to address problems such as low academic performance, disaffection, and high dropout rates. Existing approaches to measuring student engagement typically rely on survey-based instruments. While effective, those approaches are time-consuming and labour-intensive. Meanwhile, both the response rate and quality of the survey are usually p…
▽ More
The study of student engagement has attracted growing interests to address problems such as low academic performance, disaffection, and high dropout rates. Existing approaches to measuring student engagement typically rely on survey-based instruments. While effective, those approaches are time-consuming and labour-intensive. Meanwhile, both the response rate and quality of the survey are usually poor. As an alternative, in this paper, we investigate whether we can infer and predict engagement at multiple dimensions, just using sensors. We hypothesize that multidimensional student engagement can be translated into physiological responses and activity changes during the class, and also be affected by the environmental changes. Therefore, we aim to explore the following questions: Can we measure the multiple dimensions of high school student's learning engagement including emotional, behavioural and cognitive engagement with sensing data in the wild? Can we derive the activity, physiological, and environmental factors contributing to the different dimensions of student engagement? If yes, which sensors are the most useful in differentiating each dimension of the engagement? Then, we conduct an in-situ study in a high school from 23 students and 6 teachers in 144 classes over 11 courses for 4 weeks. We present the n-Gage, a student engagement sensing system using a combination of sensors from wearables and environments to automatically detect student in-class multidimensional learning engagement. Experiment results show that n-Gage can accurately predict multidimensional student engagement in real-world scenarios with an average MAE of 0.788 and RMSE of 0.975 using all the sensors. We also show a set of interesting findings of how different factors (e.g., combinations of sensors, school subjects, CO2 level) affect each dimension of the student learning engagement.
△ Less
Submitted 22 July, 2020; v1 submitted 9 July, 2020;
originally announced July 2020.
-
Mining Student Responses to Infer Student Satisfaction Predictors
Authors:
Farzana Afrin,
Mohammad Saiedur Rahaman,
Margaret Hamilton
Abstract:
The identification and analysis of student satisfaction is a challenging issue. This is becoming increasingly important since a measure of student satisfaction is taken as an indication of how well a course has been taught. However, it remains a challenging problem as student satisfaction has various aspects. In this paper, we formulate the student satisfaction estimation as a prediction problem w…
▽ More
The identification and analysis of student satisfaction is a challenging issue. This is becoming increasingly important since a measure of student satisfaction is taken as an indication of how well a course has been taught. However, it remains a challenging problem as student satisfaction has various aspects. In this paper, we formulate the student satisfaction estimation as a prediction problem where we predict different levels of student satisfaction and infer the influential predictors related to course and instructor. We present five different aspects of student satisfaction in terms of 1) course content, 2) class participation, 3) achievement of initial expectations about the course, 4) relevancy towards professional development, and 5) if the course connects them and helps to explore the real-world situations. We employ state-of-the-art machine learning techniques to predict each of these aspects of student satisfaction levels. For our experiment, we utilize a large student evaluation dataset which includes student perception using different attributes related to courses and the instructors. Our experimental results and comprehensive analysis reveal that student satisfaction is more influenced by course attributes in comparison to instructor related attributes.
△ Less
Submitted 14 June, 2020;
originally announced June 2020.
-
An Ambient-Physical System to Infer Concentration in Open-plan Workplace
Authors:
Mohammad Saiedur Rahaman,
Jonathan Liono,
Yongli Ren,
Jeffrey Chan,
Shaw Kudo,
Tim Rawling,
Flora D. Salim
Abstract:
One of the core challenges in open-plan workspaces is to ensure a good level of concentration for the workers while performing their tasks. Hence, being able to infer concentration levels of workers will allow building designers, managers, and workers to estimate what effect different open-plan layouts will have and to find an optimal one. In this research, we present an ambient-physical system to…
▽ More
One of the core challenges in open-plan workspaces is to ensure a good level of concentration for the workers while performing their tasks. Hence, being able to infer concentration levels of workers will allow building designers, managers, and workers to estimate what effect different open-plan layouts will have and to find an optimal one. In this research, we present an ambient-physical system to investigate the concentration inference problem. Specifically, we deploy a series of pervasive sensors to capture various ambient and physical signals related to perceived concentration at work. The practicality of our system has been tested on two large open-plan workplaces with different designs and layouts. The empirical results highlight promising applications of pervasive sensing in occupational concentration inference, which can be adopted to enhance the capabilities of modern workplaces.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Transfer Learning for Thermal Comfort Prediction in Multiple Cities
Authors:
Nan Gao,
Wei Shao,
Mohammad Saiedur Rahaman,
Jun Zhai,
Klaus David,
Flora D. Salim
Abstract:
HVAC (Heating, Ventilation and Air Conditioning) system is an important part of a building, which constitutes up to 40% of building energy usage. The main purpose of HVAC, maintaining appropriate thermal comfort, is crucial for the best utilisation of energy usage. Besides, thermal comfort is also crucial for well-being, health, and work productivity. Recently, data-driven thermal comfort models h…
▽ More
HVAC (Heating, Ventilation and Air Conditioning) system is an important part of a building, which constitutes up to 40% of building energy usage. The main purpose of HVAC, maintaining appropriate thermal comfort, is crucial for the best utilisation of energy usage. Besides, thermal comfort is also crucial for well-being, health, and work productivity. Recently, data-driven thermal comfort models have got better performance than traditional knowledge-based methods (e.g. Predicted Mean Vote Model). An accurate thermal comfort model requires a large amount of self-reported thermal comfort data from indoor occupants which undoubtedly remains a challenge for researchers. In this research, we aim to tackle this data-shortage problem and boost the performance of thermal comfort prediction. We utilise sensor data from multiple cities in the same climate zone to learn thermal comfort patterns. We present a transfer learning based multilayer perceptron model from the same climate zone (TL-MLP-C*) for accurate thermal comfort prediction. Extensive experimental results on ASHRAE RP-884, the Scales Project and Medium US Office datasets show that the performance of the proposed TL-MLP-C* exceeds the state-of-the-art methods in accuracy, precision and F1-score.
△ Less
Submitted 20 October, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Characters and Group Invariant Polynomials of (Super)fields: Road to "Lagrangian"
Authors:
Upalaparna Banerjee,
Joydeep Chakrabortty,
Suraj Prakash,
Shakeel Ur Rahaman
Abstract:
The dynamics of the subatomic fundamental particles, represented by quantum fields, and their interactions are determined uniquely by the assigned transformation properties, i.e., the quantum numbers associated with the underlying symmetry of the model. These fields constitute a finite number of group invariant operators which are assembled to build a polynomial, known as the Lagrangian. The order…
▽ More
The dynamics of the subatomic fundamental particles, represented by quantum fields, and their interactions are determined uniquely by the assigned transformation properties, i.e., the quantum numbers associated with the underlying symmetry of the model. These fields constitute a finite number of group invariant operators which are assembled to build a polynomial, known as the Lagrangian. The order of the polynomial is determined by the mass dimension. In this paper, we have introduced a Mathematica package, GrIP, that computes the complete set of operators that form a basis at each such order for a model containing any number of fields transforming under connected compact groups. The spacetime symmetry is restricted to the Lorentz group. The first part of the paper is dedicated to formulating the algorithm of GrIP. In this context, the detailed and explicit construction of the characters of different representations corresponding to connected compact groups and respective Haar measures have been discussed in terms of the coordinates of their respective maximal torus. In the second part, we have documented the user manual of GrIP that captures the generic features and guides to prepare the input file. This program works very efficiently to find out the higher mass (non-supersymmetric) and canonical (supersymmetric) dimensional operators relevant to the Effective Field Theory. We have demonstrated the working principles with two examples:- the SM and the MSSM. We have further highlighted important features of GrIP, e.g., identification of effective operators leading to specific rare processes linked with the violation of baryon and lepton numbers, using several BSM scenarios. We have also tabulated a complete set of dimension-6 operators for each such model. Some of the operators possess rich flavour structures which are discussed in detail. This work paves the way towards BSM-EFT.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
Authors:
Sazzadur Rahaman,
Gang Wang,
Danfeng,
Yao
Abstract:
The massive payment card industry (PCI) involves various entities such as merchants, issuer banks, acquirer banks, and card brands. Ensuring security for all entities that process payment card information is a challenging task. The PCI Security Standards Council requires all entities to be compliant with the PCI Data Security Standard (DSS), which specifies a series of security requirements. Howev…
▽ More
The massive payment card industry (PCI) involves various entities such as merchants, issuer banks, acquirer banks, and card brands. Ensuring security for all entities that process payment card information is a challenging task. The PCI Security Standards Council requires all entities to be compliant with the PCI Data Security Standard (DSS), which specifies a series of security requirements. However, little is known regarding how well PCI DSS is enforced in practice. In this paper, we take a measurement approach to systematically evaluate the PCI DSS certification process for e-commerce websites. We develop an e-commerce web application testbed, BuggyCart, which can flexibly add or remove 35 PCI DSS related vulnerabilities. Then we use the testbed to examine the capability and limitations of PCI scanners and the rigor of the certification process. We find that there is an alarming gap between the security standard and its real-world enforcement. None of the 6 PCI scanners we tested are fully compliant with the PCI scanning guidelines, issuing certificates to merchants that still have major vulnerabilities. To further examine the compliance status of real-world e-commerce websites, we build a new lightweight scanning tool named PciCheckerLite and scan 1,203 e-commerce websites across various business sectors. The results confirm that 86% of the websites have at least one PCI DSS violation that should have disqualified them as non-compliant. Our in-depth accuracy analysis also shows that PciCheckerLite's output is more precise than w3af. We reached out to the PCI Security Council to share our research results to improve the enforcement in practice.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Authors:
Sazzadur Rahaman,
Ya Xiao,
Sharmin Afrose,
Fahad Shaon,
Ke Tian,
Miles Frantz,
Danfeng,
Yao,
Murat Kantarcioglu
Abstract:
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and vulnerable certificate verification, seriously threaten software security. The vision of automatically screening cryptographic API calls in massive-sized (e.g., millions of LoC) Java programs is not new. However, hindered by the practical difficulty of reducing false positives without compromising analysis quality,…
▽ More
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and vulnerable certificate verification, seriously threaten software security. The vision of automatically screening cryptographic API calls in massive-sized (e.g., millions of LoC) Java programs is not new. However, hindered by the practical difficulty of reducing false positives without compromising analysis quality, this goal has not been accomplished. State-of-the-art crypto API screening solutions are not designed to operate on a large scale.
Our technical innovation is a set of fast and highly accurate slicing algorithms. Our algorithms refine program slices by identifying language-specific irrelevant elements. The refinements reduce false alerts by 76% to 80% in our experiments. Running our tool, CrytoGuard, on 46 high-impact large-scale Apache projects and 6,181 Android apps generate many security insights. Our findings helped multiple popular Apache projects to harden their code, including Spark, Ranger, and Ofbiz. We also have made substantial progress towards the science of analysis in this space, including: i) manually analyzing 1,295 Apache alerts and confirming 1,277 true positives (98.61% precision), ii) creating a benchmark with 38-unit basic cases and 74-unit advanced cases, iii) performing an in-depth comparison with leading solutions including CrySL, SpotBugs, and Coverity. We are in the process of integrating CryptoGuard with the Software Assurance Marketplace (SWAMP).
△ Less
Submitted 27 March, 2019; v1 submitted 18 June, 2018;
originally announced June 2018.
-
Student Satisfaction mining in a typical core course of Computer Science
Authors:
Farzana Afrin,
Mohammad Saiedur Rahaman,
Mohammad Saidur Rahman,
Mashiour Rahman
Abstract:
Students' satisfaction plays a vital role in success of an educational institute. Hence, many educational institutes continuously improve their service to produce a supportive learning environment to satisfy the student need. For this reason, educational institutions collect student satisfaction data to make decision about institutional quality, but till now it cannot be determined because student…
▽ More
Students' satisfaction plays a vital role in success of an educational institute. Hence, many educational institutes continuously improve their service to produce a supportive learning environment to satisfy the student need. For this reason, educational institutions collect student satisfaction data to make decision about institutional quality, but till now it cannot be determined because student satisfaction is a complex matter which is influenced by variety of characteristics of students and institutions. There are many studies have been performed to inspect student satisfaction in the form of college services, programs, student accommodation facility, student-faculty interaction, consulting hours etc. So, still we cannot have a standard method to know what is going on about satisfaction in the case of a core course. In this research we determined the attributes that heavily affect student satisfaction in a core course of computer science and the current status of other attributes as well.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
An adaptive quasi harmonic broadcasting scheme with optimal bandwidth requirement
Authors:
Farzana Afrin,
Mohammad Saiedur Rahaman
Abstract:
The aim of Harmonic Broadcasting protocol is to reduce the bandwidth usage in video-on-demand service where a video is divided into some equal sized segments and every segment is repeatedly transmitted over a number of channels that follows harmonic series for channel bandwidth assignment. As the bandwidth of channels differs from each other and users can join at any time to these multicast channe…
▽ More
The aim of Harmonic Broadcasting protocol is to reduce the bandwidth usage in video-on-demand service where a video is divided into some equal sized segments and every segment is repeatedly transmitted over a number of channels that follows harmonic series for channel bandwidth assignment. As the bandwidth of channels differs from each other and users can join at any time to these multicast channels, they may experience a synchronization problem between download and playback. To deal with this issue, some schemes have been proposed, however, at the cost of additional or wastage of bandwidth or sudden extreme bandwidth requirement. In this paper we present an adaptive quasi harmonic broadcasting scheme (AQHB) which delivers all data segment on time that is the download and playback synchronization problem is eliminated while kee** the bandwidth consumption as same as traditional harmonic broadcasting scheme without cost of any additional or wastage of bandwidth. It also ensures the video server not to increase the channel bandwidth suddenly that is, also eliminates the sudden buffer requirement at the client side. We present several analytical results to exhibit the efficiency of our proposed broadcasting scheme over the existing ones.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
MW-Optical Double Resonance in $^{171}{Yb}^+$ Trapped Single Ion and its Application for Precision Experiments
Authors:
S. Rahaman,
J. Danielson,
M. Schacht,
M. Schauer,
J. Zhang,
J. Torgerson
Abstract:
We have employed the 12.6 GHz microwave transition resonance of a single trapped$^{171}$Yb+ ion to accurately measure the size and relative orientation of the magnetic and optical electric fields at the position of the ion in the trap. Accurate knowledge of these fields is required for precision experiments such as single ion PNC. As a proof of the principle we have measured the polarization depen…
▽ More
We have employed the 12.6 GHz microwave transition resonance of a single trapped$^{171}$Yb+ ion to accurately measure the size and relative orientation of the magnetic and optical electric fields at the position of the ion in the trap. Accurate knowledge of these fields is required for precision experiments such as single ion PNC. As a proof of the principle we have measured the polarization dependent light-shift of the ground state hyperfine levels due to the 369 nm cooling laser to determine its electric field amplitude and polarization.
△ Less
Submitted 21 April, 2013;
originally announced April 2013.
-
A Coherent Distributed Grid Service for Assimilation and Unification of Heterogeneous Data Source
Authors:
Tanvir Ahmed,
Mohammad Saiedur Rahaman,
Mohammad Saidur Rahman,
Manzur H. Khan
Abstract:
Grid services are heavily used for handling large distributed computations. They are also very useful to handle heavy data intensive applications where data are distributed in different sites. Most of the data grid services used in such situations are meant for homogeneous data source. In case of Heterogeneous data sources, most of the grid services that are available are designed such a way that…
▽ More
Grid services are heavily used for handling large distributed computations. They are also very useful to handle heavy data intensive applications where data are distributed in different sites. Most of the data grid services used in such situations are meant for homogeneous data source. In case of Heterogeneous data sources, most of the grid services that are available are designed such a way that they must be identical in schema definition for their smooth operation. But there can be situations where the grid site databases are heterogeneous and their schema definition is different from the central schema definition. In this paper we propose a light weight coherent grid service for heterogeneous data sources that is very easily install. It can map and convert the central SQL schema into that of the grid members and send queries to get according results from heterogeneous data sources.
△ Less
Submitted 12 October, 2012; v1 submitted 24 September, 2012;
originally announced September 2012.
-
Mass measurements of very neutron-deficient Mo and Tc isotopes and their impact on rp process nucleosynthesis
Authors:
E. Haettner,
D. Ackermann,
G. Audi,
K. Blaum,
M. Block,
S. Eliseev,
T. Fleckenstein,
F. Herfurth,
F. P. Heßberger,
S. Hofmann,
J. Ketelaer,
J. Ketter,
H. -J. Kluge,
G. Marx,
M. Mazzocco,
Yu. N. Novikov,
W. R. Plaß,
S. Rahaman,
T. Rauscher,
D. Rodríguez,
H. Schatz,
C. Scheidenberger,
L. Schweikhard,
B. Sun,
P. G. Thirolf
, et al. (3 additional authors not shown)
Abstract:
The masses of ten proton-rich nuclides, including the N=Z+1 nuclides 85-Mo and 87-Tc, were measured with the Penning trap mass spectrometer SHIPTRAP. Compared to the Atomic Mass Evaluation 2003 a systematic shift of the mass surface by up to 1.6 MeV is observed causing significant abundance changes of the ashes of astrophysical X-ray bursts. Surprisingly low alpha-separation energies for neutron-d…
▽ More
The masses of ten proton-rich nuclides, including the N=Z+1 nuclides 85-Mo and 87-Tc, were measured with the Penning trap mass spectrometer SHIPTRAP. Compared to the Atomic Mass Evaluation 2003 a systematic shift of the mass surface by up to 1.6 MeV is observed causing significant abundance changes of the ashes of astrophysical X-ray bursts. Surprisingly low alpha-separation energies for neutron-deficient Mo and Tc are found, making the formation of a ZrNb cycle in the rp process possible. Such a cycle would impose an upper temperature limit for the synthesis of elements beyond Nb in the rp process.
△ Less
Submitted 28 March, 2011;
originally announced March 2011.