-
Probing of magnetic dimensional crossover in CrSiTe$_{3}$ through picosecond strain pulses
Authors:
Anjan Kumar N M,
Soumya Mukherjee,
Abhirup Mukherjee,
A**kya Punjal,
Shubham Purwar,
Thirupathaiah Setti,
Shriganesh Prabhu S,
Siddhartha Lal,
N. Kamaraju
Abstract:
Elucidating the emergence of long-range magnetic ordering from its precursor short-range magnetic ordering (SRMO) in two-dimensional van der Waals materials holds profound implications for fundamental research and technological advancements. However, directly observing the intricate stages of this magnetic dimensional crossover (MDC) remains a significant experimental challenge. While magneto-elas…
▽ More
Elucidating the emergence of long-range magnetic ordering from its precursor short-range magnetic ordering (SRMO) in two-dimensional van der Waals materials holds profound implications for fundamental research and technological advancements. However, directly observing the intricate stages of this magnetic dimensional crossover (MDC) remains a significant experimental challenge. While magneto-elastic coupling offers a promising avenue, detecting the minute lattice response to SRMO proves challenging. Recent investigations utilizing second harmonic generation have unveiled a two-step MDC in a van der Waals ferromagnetic insulator. However, an unambiguous detection of MDC through the time-resolved techniques remains elusive. To meet this goal, we have executed an alternative approach by employing picosecond acoustic strain pulses generated by femtosecond lasers to probe the various stages of MDC through the magneto-elastic coupling for the first time. By analyzing the shape of the strain pulse in both the time and frequency domains as a function of temperature, we clearly demonstrate the detection of the subtle influence of spin fluctuations on the lattice. Additionally, the ultrafast carrier dynamics also show signatures of MDC. Our measurements pave the way towards characterizing magnetic materials in time-resolved experiments that are crucial in designing a new generation of spin-based optoelectronic devices.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
A Framework for Securing Health Information Using Blockchain in Cloud Hosted Cyber Physical Systems
Authors:
Aisha Banu,
Sharon Priya S,
Poojitha K,
Kiruthiga R,
Ruby Annette,
Subash Chandran
Abstract:
Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal opera…
▽ More
Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal operational costs, high flexibility, security, and EHR accessibility. If patient health information is stored in the hospital database, there will always be a risk of intrusion, i.e., unauthorized file access and information modification by attackers. To address this concern, we propose a decentralized EHR system based on Blockchain technology. To facilitate secure EHR exchange across various patients and medical providers, we develop a reliable access control method based on smart contracts. We incorporate Cryptocurrency, specifically Ethereum, in the suggested system to protect sensitive health information from potential attackers. In our suggested approach, both physicians and patients are required to be authenticated. Patients can register, and a block with a unique hash value will be generated. Once the patient discusses the disease with the physician, the physician can check the patient's condition and offer drugs. For experimental findings, we employ the public Block chain Ganache and solidity remix-based smart contracts to protect privacy. Ethers are used as the crypto currencies.
△ Less
Submitted 25 June, 2023;
originally announced June 2023.
-
Truncated Turbo Equalizer with SIC for OTFS
Authors:
Sanoopkumar P. S.,
Stephen McWade,
Arman Farhang
Abstract:
Orthogonal time frequency space (OTFS) is a promising candidate waveform for the next generation wireless communication systems. OTFS places data in the delay-Doppler (DD) domain, which simplifies channel estimation in highmobility scenarios. However, due to the 2-D convolution effect of the time-varying channel in the DD domain, equalization is still a challenge for OTFS. Existing equalizers for…
▽ More
Orthogonal time frequency space (OTFS) is a promising candidate waveform for the next generation wireless communication systems. OTFS places data in the delay-Doppler (DD) domain, which simplifies channel estimation in highmobility scenarios. However, due to the 2-D convolution effect of the time-varying channel in the DD domain, equalization is still a challenge for OTFS. Existing equalizers for OTFS are either highly complex or they do not consider intercarrier interference present in high-mobility scenarios. Hence, in this paper, we propose a novel two-stage detection technique for coded OTFS systems. Our proposed detector brings orders of magnitude computational complexity reduction compared to existing methods. At the first stage, it truncates the channel by considering only the significant coefficients along the Doppler dimension and performs turbo equalization. To reduce the computational load of the turbo equalizer, our proposed method deploys the modified LSQR (mLSQR) algorithm. At the second stage, with only two successive interference cancellation (SIC) iterations, our proposed detector removes the residual interference caused by channel truncation. To evaluate the performance of our proposed truncated turbo equalizer with SIC (TTE-SIC), we set the minimum mean squared error (MMSE) equalizer without channel truncation as a benchmark. Our simulation results show that the proposed TTE-SIC technique achieves about the same bit error rate (BER) performance as the benchmark.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Taxonomy of AISecOps Threat Modeling for Cloud Based Medical Chatbots
Authors:
Ruby Annette J,
Aisha Banu,
Sharon Priya S,
Subash Chandran
Abstract:
Artificial Intelligence (AI) is playing a vital role in all aspects of technology including cyber security. Application of Conversational AI like the chatbots are also becoming very popular in the medical field to provide timely and immediate medical assistance to patients in need. As medical chatbots deal with a lot of sensitive information, the security of these chatbots is crucial. To secure th…
▽ More
Artificial Intelligence (AI) is playing a vital role in all aspects of technology including cyber security. Application of Conversational AI like the chatbots are also becoming very popular in the medical field to provide timely and immediate medical assistance to patients in need. As medical chatbots deal with a lot of sensitive information, the security of these chatbots is crucial. To secure the confidentiality, integrity, and availability of cloud-hosted assets like these, medical chatbots can be monitored using AISecOps (Artificial Intelligence for Secure IT Operations). AISecOPs is an emerging field that integrates three different but interrelated domains like the IT operation, AI, and security as one domain, where the expertise from all these three domains are used cohesively to secure the cyber assets. It considers cloud operations and security in a holistic framework to collect the metrics required to assess the security threats and train the AI models to take immediate actions. This work is focused on applying the STRIDE threat modeling framework to model the possible threats involved in each component of the chatbot to enable the automatic threat detection using the AISecOps techniques. This threat modeling framework is tailored to the medical chatbots that involves sensitive data sharing but could also be applied for chatbots used in other sectors like the financial services, public sector, and government sectors that are concerned with security and compliance.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Practical Synchronization for OTFS
Authors:
Mohsen Bayat,
Sanoopkumar P. S.,
Arman Farhang
Abstract:
In the existing literature on joint timing and frequency synchronization of orthogonal time frequency space modulation (OTFS), practically infeasible impulse pilot with large peak-to-average power ratio (PAPR) is deployed. Hence, in this paper, we propose a timing offset (TO) and carrier frequency offset (CFO) estimation for OTFS over a linear time-varying (LTV) channel, using a low PAPR pilot str…
▽ More
In the existing literature on joint timing and frequency synchronization of orthogonal time frequency space modulation (OTFS), practically infeasible impulse pilot with large peak-to-average power ratio (PAPR) is deployed. Hence, in this paper, we propose a timing offset (TO) and carrier frequency offset (CFO) estimation for OTFS over a linear time-varying (LTV) channel, using a low PAPR pilot structure. The proposed technique utilizes the recently proposed practically feasible pilot structure with a cyclic prefix (PCP). We exploit the periodic properties of PCP in both delay and time domains to find the starting point of each OTFS block. Furthermore, we propose a two-stage CFO estimation technique with over an order of magnitude higher estimation accuracy than the existing estimator using the impulse pilot. In the first stage, a coarse CFO estimate is obtained which is refined in the second stage, through our proposed maximum likelihood (ML) based approach. The proposed ML-based approach deploys the generalized complex exponential basis expansion model (GCE-BEM) to capture the time variations of the channel, absorb them into the pilot and provide an accurate CFO estimate. Since our proposed synchronization technique utilizes the same pilot deployed for channel estimation, it does not require any additional overhead. Finally, we evaluate the performance of our proposed synchronization technique through simulations. We also compare and show the superior performance of our proposed technique to the only other existing joint TO and CFO estimation method in OTFS literature.
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
Hawking radiation from acoustic black holes in hydrodynamic flow of electrons
Authors:
Shreyansh S. Dave,
Oindrila Ganguly,
Saumia P. S.,
Ajit M. Srivastava
Abstract:
Acoustic black holes are formed when a fluid flowing with subsonic velocities, accelerates and becomes supersonic. When the flow is directed from the subsonic to supersonic region, the surface on which the normal component of fluid velocity equals the local speed of sound acts as an acoustic horizon. This is because no acoustic perturbation from the supersonic region can cross it to reach the subs…
▽ More
Acoustic black holes are formed when a fluid flowing with subsonic velocities, accelerates and becomes supersonic. When the flow is directed from the subsonic to supersonic region, the surface on which the normal component of fluid velocity equals the local speed of sound acts as an acoustic horizon. This is because no acoustic perturbation from the supersonic region can cross it to reach the subsonic part of the fluid. One can show that if the fluid velocity is locally irrotational, the field equations for acoustic perturbations of the velocity potential are identical to that of a massless scalar field propagating in a black hole background. One, therefore, expects Hawking radiation in the form of a thermal spectrum of phonons. There have been numerous investigations of this possibility, theoretically, as well as experimentally, in systems ranging from cold atom systems to quark-gluon plasma formed in relativistic heavy-ion collisions. Here we investigate this possibility in the hydrodynamic flow of electrons. Resulting Hawking radiation in this case should be observable in terms of current fluctuations. Further, current fluctuations on both sides of the acoustic horizon should show correlations expected for pairs of Hawking particles.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
Nanofluid Heat Transfer in Parallel Plates with Variable Magnetic Field
Authors:
Sangeetha P S,
Sukanta Nayak
Abstract:
Uncertainties plays an important character in almost every problem which generally not considered and ideal cases are studied. As such, the consequences cost more and need model prediction. In view of these, this paper investigates nanofluid heat transfer problem under a variable magnetic field with uncertain bounded parameters and analyzed effect of uncertainness over the field variables of the s…
▽ More
Uncertainties plays an important character in almost every problem which generally not considered and ideal cases are studied. As such, the consequences cost more and need model prediction. In view of these, this paper investigates nanofluid heat transfer problem under a variable magnetic field with uncertain bounded parameters and analyzed effect of uncertainness over the field variables of the system. The variations of velocity, temperature and concentration profiles with the uncertainness for the said problem are reported here. The main challenge one face is the presence of uncertainties make the system complicated to study. So, alternate idea should be developed such that one can overcome the same. Hence, the involved uncertain parameters are considered as intervals and one parametric map** technique is used for the same. For detail analysis of the said problem a semi analytical method viz. homotopy perturbation method is adapted with the transformation technique. Here, the suction parameter, squeeze number and Hartmann numbers are considered as intervals. Then considering different combinations of these parameters the problem is solved and sensitiveness of the same for the said problem is analysed. Finally, based on the sensitiveness, a relation of between the uncertain parameters with the mentioned system has been established.
△ Less
Submitted 30 June, 2022;
originally announced July 2022.
-
Initial fluctuations and power spectrum of flow anisotropies in relativistic heavy-ion collisions
Authors:
Shreyansh S. Dave,
Saumia P. S.,
Ajit M. Srivastava
Abstract:
Flow has emerged as a crucial probe for the properties of the thermalized medium produced in relativistic heavy-ion collisions. The evolution of initial state fluctuations leaves imprints on the power spectrum of flow coefficients. Therefore flow coefficients are a crucial probe of initial state fluctuations arising from the parton distributions of the colliding nuclei. This has a very strong corr…
▽ More
Flow has emerged as a crucial probe for the properties of the thermalized medium produced in relativistic heavy-ion collisions. The evolution of initial state fluctuations leaves imprints on the power spectrum of flow coefficients. Therefore flow coefficients are a crucial probe of initial state fluctuations arising from the parton distributions of the colliding nuclei. This has a very strong correspondence with the physics of power spectrum of cosmic microwave background radiation (CMBR) anisotropies which directly probes initial inflationary fluctuations. Much work has been done to probe these interesting interconnections, in particular, in develo** techniques for the measurements of higher flow coefficients. We present a short review of these developments. The effect of initial magnetic field on these features will also be reviewed. All this acquires special importance in view of upcoming electron-ion collider which will directly probe initial parton distribution of the colliding nucleus.
△ Less
Submitted 23 August, 2020; v1 submitted 26 June, 2020;
originally announced June 2020.
-
Identification of Indian Languages using Ghost-VLAD pooling
Authors:
Krishna D N,
Ankita Patil,
M. S. P Raj,
Sai Prasad H S,
Prabhu Aashish Garapati
Abstract:
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The genera…
▽ More
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The generated feature vector is shown to have very good language discriminative features and helps in getting state of the art results for language identification task. We conduct our experiments on 635Hrs of audio data for 7 Indian languages. Our method outperforms the previous state of the art x-vector [11] method by an absolute improvement of 1.88% in F1-score and achieves 98.43% F1-score on the held-out test data. We compare our system with various pooling approaches and show that GhostVLAD is the best pooling approach for this task. We also provide visualization of the utterance level embeddings generated using Ghost-VLAD pooling and show that this method creates embeddings which has very good language discriminative features.
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
A Study of Revenue Cost Dynamics in Large Data Centers: A Factorial Design Approach
Authors:
Gambhire Swati Sampatrao,
Sudeepa Roy Dey,
Bidisha Goswami,
Sai Prasanna M. S,
Snehanshu Saha
Abstract:
Revenue optimization of large data centers is an open and challenging problem. The intricacy of the problem is due to the presence of too many parameters posing as costs or investment. This paper proposes a model to optimize the revenue in cloud data center and analyzes the model, revenue and different investment or cost commitments of organizations investing in data centers. The model uses the Co…
▽ More
Revenue optimization of large data centers is an open and challenging problem. The intricacy of the problem is due to the presence of too many parameters posing as costs or investment. This paper proposes a model to optimize the revenue in cloud data center and analyzes the model, revenue and different investment or cost commitments of organizations investing in data centers. The model uses the Cobb-Douglas production function to quantify the boundaries and the most significant factors to generate the revenue. The dynamics between revenue and cost is explored by designing an experiment (DoE) which is an interpretation of revenue as function of cost/investment as factors with different levels/fluctuations. Optimal elasticities associated with these factors of the model for maximum revenue are computed and verified . The model response is interpreted in light of the business scenario of data centers.
△ Less
Submitted 30 September, 2016;
originally announced October 2016.
-
A Survey on Deadline Constrained Workflow Scheduling Algorithms in Cloud Environment
Authors:
Nallakumar R.,
Sruthi Priya K. S
Abstract:
Cloud Computing is the latest blooming technology in the era of Computer Science and Information Technology domain. There is an enormous pool of data centres, which are termed as Clouds where the services and associated data are being deployed and users need a constant Internet connection to access them. One of the highlights in Cloud is the delivering of applications or services in an on-demand e…
▽ More
Cloud Computing is the latest blooming technology in the era of Computer Science and Information Technology domain. There is an enormous pool of data centres, which are termed as Clouds where the services and associated data are being deployed and users need a constant Internet connection to access them. One of the highlights in Cloud is the delivering of applications or services in an on-demand environment. One of the most promising areas in Cloud scheduling is Scheduling of workflows which is intended to match the request of the user to the appropriate resources. There are several algorithms to automate the workflows in a way to satisfy the Quality of service (QoS) of the user among which deadline is considered as a major criterion, i.e. Satisfying the needs of the user with minimized cost and within the minimum stipulated time. This paper surveys various workflow scheduling algorithms that have a deadline as its criterion.
△ Less
Submitted 28 September, 2014;
originally announced September 2014.
-
An Intelligent Call Admission Control Decision Mechanism for Wireless Networks
Authors:
Ramesh Babu H. S.,
Gowrishankar,
Satyanarayana P. S
Abstract:
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications which have diversified nature of QoS requirements. This paper proposes a fuzzy neural approach for call admission control in a multi class traffic based Next Generation Wireless Networks (NG…
▽ More
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications which have diversified nature of QoS requirements. This paper proposes a fuzzy neural approach for call admission control in a multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural Call Admission Control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks .The model is based on Recurrent Radial Basis Function Networks (RRBFN) which have better learning and adaptability that can be used to develop the intelligent system to handle the incoming traffic in the heterogeneous network environment. The proposed FNCAC can achieve reduced call blocking probability kee** the resource utilisation at an optimal level. In the proposed algorithm we have considered three classes of traffic having different QoS requirements. We have considered the heterogeneous network environment which can effectively handle this traffic. The traffic classes taken for the study are Conversational traffic, Interactive traffic and back ground traffic which are with varied QoS parameters. The paper also presents the analytical model for the CAC .The paper compares the call blocking probabilities for all the three types of traffic in both the models. The simulation results indicate that compared to Fuzzy logic based CAC, Conventional CAC, The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better where the call blocking probability is minimal when compared to other two methods.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
Authors:
Ramesh Babu H. S.,
Gowrishankar,
Satyanarayana P. S
Abstract:
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN). The proposed…
▽ More
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural call admission control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks. The model is based on recurrent radial basis function networks which have better learning and adaptability that can be used to develop intelligent system to handle the incoming traffic in an heterogeneous network environment. The simulation results are optimistic and indicates that the proposed FNCAC algorithm performs better than the other two methods and the call blocking probability is minimal when compared to other two methods.
△ Less
Submitted 20 April, 2010;
originally announced April 2010.