-
Decentralized Federated Learning: A Survey on Security and Privacy
Authors:
Ehsan Hallaji,
Roozbeh Razavi-Far,
Mehrdad Saif,
Boyu Wang,
Qiang Yang
Abstract:
Federated learning has been rapidly evolving and gaining popularity in recent years due to its privacy-preserving features, among other advantages. Nevertheless, the exchange of model updates and gradients in this architecture provides new attack surfaces for malicious users of the network which may jeopardize the model performance and user and data privacy. For this reason, one of the main motiva…
▽ More
Federated learning has been rapidly evolving and gaining popularity in recent years due to its privacy-preserving features, among other advantages. Nevertheless, the exchange of model updates and gradients in this architecture provides new attack surfaces for malicious users of the network which may jeopardize the model performance and user and data privacy. For this reason, one of the main motivations for decentralized federated learning is to eliminate server-related threats by removing the server from the network and compensating for it through technologies such as blockchain. However, this advantage comes at the cost of challenging the system with new privacy threats. Thus, performing a thorough security analysis in this new paradigm is necessary. This survey studies possible variations of threats and adversaries in decentralized federated learning and overviews the potential defense mechanisms. Trustability and verifiability of decentralized federated learning are also considered in this study.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Joint Unsupervised and Supervised Training for Automatic Speech Recognition via Bilevel Optimization
Authors:
A F M Saif,
Xiaodong Cui,
Han Shen,
Songtao Lu,
Brian Kingsbury,
Tianyi Chen
Abstract:
In this paper, we present a novel bilevel optimization-based training approach to training acoustic models for automatic speech recognition (ASR) tasks that we term {bi-level joint unsupervised and supervised training (BL-JUST)}. {BL-JUST employs a lower and upper level optimization with an unsupervised loss and a supervised loss respectively, leveraging recent advances in penalty-based bilevel op…
▽ More
In this paper, we present a novel bilevel optimization-based training approach to training acoustic models for automatic speech recognition (ASR) tasks that we term {bi-level joint unsupervised and supervised training (BL-JUST)}. {BL-JUST employs a lower and upper level optimization with an unsupervised loss and a supervised loss respectively, leveraging recent advances in penalty-based bilevel optimization to solve this challenging ASR problem with affordable complexity and rigorous convergence guarantees.} To evaluate BL-JUST, extensive experiments on the LibriSpeech and TED-LIUM v2 datasets have been conducted. BL-JUST achieves superior performance over the commonly used pre-training followed by fine-tuning strategy.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Crossover from dynamical percolation class to directed percolation class on a two dimensional lattice
Authors:
M. Ali Saif
Abstract:
We study the crossover phenomena from the dynamical percolation class (DyP) to the directed percolation class (DP) in the model of diseases spreading, Susceptible-Infected-Refractory-Susceptible (SIRS) on a two-dimensional lattice. In this model, agents of three species S, I, and R on a lattice react as follows: $S+I\rightarrow I+I$ with probability $λ$, $I\rightarrow R$ after infection time…
▽ More
We study the crossover phenomena from the dynamical percolation class (DyP) to the directed percolation class (DP) in the model of diseases spreading, Susceptible-Infected-Refractory-Susceptible (SIRS) on a two-dimensional lattice. In this model, agents of three species S, I, and R on a lattice react as follows: $S+I\rightarrow I+I$ with probability $λ$, $I\rightarrow R$ after infection time $τ_I$ and $R\rightarrow I$ after recovery time $τ_R$. Depending on the value of the parameter $τ_R$, the SIRS model can be reduced to the following two well-known special cases. On the one hand, when $τ_R \rightarrow 0$, the SIRS model reduces to the SIS model. On the other hand, when $τ_R \rightarrow \infty$ the model reduces to SIR model. It is known that, whereas the SIS model belongs to the DP universality class, the SIR model belongs to the DyP universality class. We can deduce from the model dynamics that, SIRS will behave as an SIS model for any finite values of $τ_R$. SIRS will behave as SIR only when $τ_R=\infty$. Using Monte Carlo simulations we show that as far as the $τ_R$ is finite the SIRS belongs to the DP university class. We also study the phase diagram and analyze the scaling behavior of this model along the critical line. By numerical simulation and analytical argument, we find that the crossover from DyP to DP is described by the crossover exponent $1/φ=0.67(2)$.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Nonequilibrium phase transition of a one dimensional system reaches the absorbing state by two different ways
Authors:
M. Ali Saif
Abstract:
We study the nonequilibrium phase transitions from the absorbing phase to the active phase for the model of disease spreading (Susceptible-Infected-Refractory-Susceptible (SIRS)) on a regular one dimensional lattice. In this model, particles of three species (S, I and R) on a lattice react as follows: $S+I\rightarrow 2I$ with probability $λ$, $I\rightarrow R$ after infection time $τ_I$ and…
▽ More
We study the nonequilibrium phase transitions from the absorbing phase to the active phase for the model of disease spreading (Susceptible-Infected-Refractory-Susceptible (SIRS)) on a regular one dimensional lattice. In this model, particles of three species (S, I and R) on a lattice react as follows: $S+I\rightarrow 2I$ with probability $λ$, $I\rightarrow R$ after infection time $τ_I$ and $R\rightarrow I$ after recovery time $τ_R$. In the case of $τ_R>τ_I$, this model has been found to has two critical thresholds separate the active phase from absorbing phases \cite{ali1}. The first critical threshold $λ_{c1}$ is corresponding to a low infection probability and second critical threshold $λ_{c2}$ is corresponding to a high infection probability. At the first critical threshold $λ_{c1}$, our Monte Carlo simulations of this model suggest the phase transition to be of directed percolation class (DP). However, at the second critical threshold $λ_{c2}$ we observe that, the system becomes so sensitive to initial values conditions which suggests the phase transition to be discontinuous transition. We confirm this result using order parameter quasistationary probability distribution and finite-size analysis for this model at $λ_{c2}$. Additionally, the typical space-time evolution of this model at $λ_{c2}$ shows that, the spreading of active particles are compact in a behavior which remind us the spreading behavior in the compact directed percolation.14
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Determination of the critical points for systems of directed percolation class using machine learning
Authors:
M. Ali Saif,
Bassam M. Mughalles
Abstract:
Recently, machine learning algorithms have been used remarkably to study the equilibrium phase transitions, however there are only a few works have been done using this technique in the nonequilibrium phase transitions. In this work, we use the supervised learning with the convolutional neural network (CNN) algorithm and unsupervised learning with the density-based spatial clustering of applicatio…
▽ More
Recently, machine learning algorithms have been used remarkably to study the equilibrium phase transitions, however there are only a few works have been done using this technique in the nonequilibrium phase transitions. In this work, we use the supervised learning with the convolutional neural network (CNN) algorithm and unsupervised learning with the density-based spatial clustering of applications with noise (DBSCAN) algorithm to study the nonequilibrium phase transition in two models. We use CNN and DBSCAN in order to determine the critical points for directed bond percolation (bond DP) model and Domany-Kinzel cellular automaton (DK) model. Both models have been proven to have a nonequilibrium phase transition belongs to the directed percolation (DP) universality class. In the case of supervised learning we train CNN using the images which are generated from Monte Carlo simulations of directed bond percolation. We use that trained CNN in studding the phase transition for the two models. In the case of unsupervised learning, we train DBSCAN using the raw data of Monte Carlo simulations. In this case, we retrain DBSCAN at each time we change the model or lattice size. Our results from both algorithms show that, even for a very small values of lattice size, machine can predict the critical points accurately for both models. Finally, we mention to that, the value of the critical point we find here for bond DP model using CNN or DBSCAN is exactly the same value that has been found using transfer learning with a domain adversarial neural network (DANN) algorithm.
△ Less
Submitted 19 July, 2023;
originally announced July 2023.
-
Learning From High-Dimensional Cyber-Physical Data Streams for Diagnosing Faults in Smart Grids
Authors:
Hossein Hassani,
Ehsan Hallaji,
Roozbeh Razavi-Far,
Mehrdad Saif
Abstract:
The performance of fault diagnosis systems is highly affected by data quality in cyber-physical power systems. These systems generate massive amounts of data that overburden the system with excessive computational costs. Another issue is the presence of noise in recorded measurements, which prevents building a precise decision model. Furthermore, the diagnostic model is often provided with a mixtu…
▽ More
The performance of fault diagnosis systems is highly affected by data quality in cyber-physical power systems. These systems generate massive amounts of data that overburden the system with excessive computational costs. Another issue is the presence of noise in recorded measurements, which prevents building a precise decision model. Furthermore, the diagnostic model is often provided with a mixture of redundant measurements that may deviate it from learning normal and fault distributions. This paper presents the effect of feature engineering on mitigating the aforementioned challenges in cyber-physical systems. Feature selection and dimensionality reduction methods are combined with decision models to simulate data-driven fault diagnosis in a 118-bus power system. A comparative study is enabled accordingly to compare several advanced techniques in both domains. Dimensionality reduction and feature selection methods are compared both jointly and separately. Finally, experiments are concluded, and a setting is suggested that enhances data quality for fault diagnosis.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
SIR model on one dimensional small world networks
Authors:
M. Ali Saif,
M. A. Shukri,
F. H. Al-makhedhi
Abstract:
We study the absorbing phase transition for the model of epidemic spreading, Susceptible- Infected- Refractory (SIR), on one dimensional small world networks. This model has been found to be in the universality class of the dynamical percolation class, the mean field class corresponding to this model is d = 6. The one dimensional case is special case of this class in which the percolation threshol…
▽ More
We study the absorbing phase transition for the model of epidemic spreading, Susceptible- Infected- Refractory (SIR), on one dimensional small world networks. This model has been found to be in the universality class of the dynamical percolation class, the mean field class corresponding to this model is d = 6. The one dimensional case is special case of this class in which the percolation threshold goes to one (boundary value) in the thermodynamic limit. This behavior resembles slightly the behavior of one dimensional Ising and XY models where the critical thresholds for both models go to zero temperature (boundary value) in the thermodynamic limit. By analytical arguments and numerical simulations we demonstrate that, increasing the connectivity (2k) of this model on regular one dimensional lattice does not alter the criticality of this model. Whereas we find that, this model crosses from a one dimensional structure to mean field type for any finite value of the rewiring probability (p), in manner is similarly to what happened in the Ising and XY models on small world networks. In additional to that, we calculate the critical exponents and the full critical phase space of this model on small world network. We also introduce the crossover scaling function of this model from one dimensional behavior to mean field behavior. Furthermore we reveal the similarity between this model, and the Ising and XY models on the small world networks.
△ Less
Submitted 3 January, 2023;
originally announced January 2023.
-
An in vitro living system for flow rectification
Authors:
Zhi Dou,
Liu Hong,
Zhengwei Li,
Fan Kiat Chan,
Yashraj Bhosale,
Onur Aydin,
Gabriel Juarez,
M. Taher A. Saif,
Leonardo P. Chamorro,
Mattia Gazzola
Abstract:
Small - but finite - fluid inertia can be leveraged to generate steady flows out of liquid vibrations around an immersed interface. In engineering, external high-frequency drivers (10$^2$-10$^5$ Hz) allow this inertial rectification phenomenon, known as viscous streaming, to be employed in micron-scale devices for precise flow control, particle manipulation and spatially controlled chemistry. Howe…
▽ More
Small - but finite - fluid inertia can be leveraged to generate steady flows out of liquid vibrations around an immersed interface. In engineering, external high-frequency drivers (10$^2$-10$^5$ Hz) allow this inertial rectification phenomenon, known as viscous streaming, to be employed in micron-scale devices for precise flow control, particle manipulation and spatially controlled chemistry. However, beyond artificial settings, streaming may also be accessed by larger-scale biological systems pertaining to lower frequencies. Then, millimeter-size bacteria or larvae that oscillate cilia and appendages in the 1-10Hz range may be able to endogenously rectify surrounding flows, for feeding or locomotion, removing the need for external actuators, tethers or tubings. In support of this hypothesis, here we demonstrate an in vitro living system able to produce streaming flows, endogenously, autonomously and unassisted. Computationally informed, our biological device generates oscillatory flows through the cyclic contractions of an engineered muscle tissue, shaped in the form of a ring and suspended in fluid within a Micro-Particle Image Velocimetry setup, for analysis. Flow patterns consistent with streaming simulations are observed for low-frequency muscle contractions (2-4Hz), either spontaneous or light-induced, illustrating system autonomy and controllability, respectively. Thus, this work provides experimental evidence of biologically powered streaming in untethered millimeter-scale living systems, showcasing the utility of bio-hybrid technology for fundamental and applied fluid mechanics.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems
Authors:
Ehsan Hallaji,
Roozbeh Razavi-Far,
Meng Wang,
Mehrdad Saif,
Bruce Fardanesh
Abstract:
This paper presents a novel data-driven framework to aid in system state estimation when the power system is under unobservable false data injection attacks. The proposed framework dynamically detects and classifies false data injection attacks. Then, it retrieves the control signal using the acquired information. This process is accomplished in three main modules, with novel designs, for detectio…
▽ More
This paper presents a novel data-driven framework to aid in system state estimation when the power system is under unobservable false data injection attacks. The proposed framework dynamically detects and classifies false data injection attacks. Then, it retrieves the control signal using the acquired information. This process is accomplished in three main modules, with novel designs, for detection, classification, and control signal retrieval. The detection module monitors historical changes in phasor measurements and captures any deviation pattern caused by an attack on a complex plane. This approach can help to reveal characteristics of the attacks including the direction, magnitude, and ratio of the injected false data. Using this information, the signal retrieval module can easily recover the original control signal and remove the injected false data. Further information regarding the attack type can be obtained through the classifier module. The proposed ensemble learner is compatible with harsh learning conditions including the lack of labeled data, concept drift, concept evolution, recurring classes, and independence from external updates. The proposed novel classifier can dynamically learn from data and classify attacks under all these harsh learning conditions. The introduced framework is evaluated w.r.t. real-world data captured from the Central New York Power System. The obtained results indicate the efficacy and stability of the proposed framework.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms
Authors:
Ehsan Hallaji,
Roozbeh Razavi-Far,
Mehrdad Saif
Abstract:
The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. Despite its brief history, federated learning is rapidly evolving to make wider use more practical. One of the most significant advancements in this domain is the incorporation of transfer learning into federated learning, which overcomes fundamental constraints of…
▽ More
The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. Despite its brief history, federated learning is rapidly evolving to make wider use more practical. One of the most significant advancements in this domain is the incorporation of transfer learning into federated learning, which overcomes fundamental constraints of primary federated learning, particularly in terms of security. This chapter performs a comprehensive survey on the intersection of federated and transfer learning from a security point of view. The main goal of this study is to uncover potential vulnerabilities and defense mechanisms that might compromise the privacy and performance of systems that use federated and transfer learning.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Food Recipe Recommendation Based on Ingredients Detection Using Deep Learning
Authors:
Md. Shafaat Jamil Rokon,
Md Kishor Morol,
Ishra Binte Hasan,
A. M. Saif,
Rafid Hussain Khan
Abstract:
Food is essential for human survival, and people always try to taste different types of delicious recipes. Frequently, people choose food ingredients without even knowing their names or pick up some food ingredients that are not obvious to them from a grocery store. Knowing which ingredients can be mixed to make a delicious food recipe is essential. Selecting the right recipe by choosing a list of…
▽ More
Food is essential for human survival, and people always try to taste different types of delicious recipes. Frequently, people choose food ingredients without even knowing their names or pick up some food ingredients that are not obvious to them from a grocery store. Knowing which ingredients can be mixed to make a delicious food recipe is essential. Selecting the right recipe by choosing a list of ingredients is very difficult for a beginner cook. However, it can be a problem even for experts. One such example is recognising objects through image processing. Although this process is complex due to different food ingredients, traditional approaches will lead to an inaccuracy rate. These problems can be solved by machine learning and deep learning approaches. In this paper, we implemented a model for food ingredients recognition and designed an algorithm for recommending recipes based on recognised ingredients. We made a custom dataset consisting of 9856 images belonging to 32 different food ingredients classes. Convolution Neural Network (CNN) model was used to identify food ingredients, and for recipe recommendations, we have used machine learning. We achieved an accuracy of 94 percent, which is quite impressive.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
A Survey of Deep Learning Techniques for the Analysis of COVID-19 and their usability for Detecting Omicron
Authors:
Asifullah Khan,
Saddam Hussain Khan,
Mahrukh Saif,
Asiya Batool,
Anabia Sohail,
Muhammad Waleed Khan
Abstract:
The Coronavirus (COVID-19) outbreak in December 2019 has become an ongoing threat to humans worldwide, creating a health crisis that infected millions of lives, as well as devastating the global economy. Deep learning (DL) techniques have proved helpful in analysis and delineation of infectious regions in radiological images in a timely manner. This paper makes an in-depth survey of DL techniques…
▽ More
The Coronavirus (COVID-19) outbreak in December 2019 has become an ongoing threat to humans worldwide, creating a health crisis that infected millions of lives, as well as devastating the global economy. Deep learning (DL) techniques have proved helpful in analysis and delineation of infectious regions in radiological images in a timely manner. This paper makes an in-depth survey of DL techniques and draws a taxonomy based on diagnostic strategies and learning approaches. DL techniques are systematically categorized into classification, segmentation, and multi-stage approaches for COVID-19 diagnosis at image and region level analysis. Each category includes pre-trained and custom-made Convolutional Neural Network architectures for detecting COVID-19 infection in radiographic imaging modalities; X-Ray, and Computer Tomography (CT). Furthermore, a discussion is made on challenges in develo** diagnostic techniques such as cross-platform interoperability and examining imaging modality. Similarly, a review of the various methodologies and performance measures used in these techniques is also presented. This survey provides an insight into the promising areas of research in DL for analyzing radiographic images, and further accelerates the research in designing customized DL based diagnostic tools for effectively dealing with new variants of COVID-19 and emerging challenges.
△ Less
Submitted 4 April, 2022; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Structural Identifiability of Impedance Spectroscopy Fractional-Order Equivalent Circuit Models With Two Constant Phase Elements
Authors:
Tohid Soleymani Aghdam,
Seyed Mohammad Mahdi Alavi,
Mehrdad Saif
Abstract:
Structural identifiability analysis of fractional-order equivalent circuit models (FO-ECMs), obtained through electrochemical impedance spectroscopy (EIS) is still a challenging problem. No peer-reviewed analytical or numerical proof does exist showing that whether impedance spectroscopy FO-ECMs are structurally identifiable or not, regardless of practical issues such as measurement noises and the…
▽ More
Structural identifiability analysis of fractional-order equivalent circuit models (FO-ECMs), obtained through electrochemical impedance spectroscopy (EIS) is still a challenging problem. No peer-reviewed analytical or numerical proof does exist showing that whether impedance spectroscopy FO-ECMs are structurally identifiable or not, regardless of practical issues such as measurement noises and the selection of excitation signals. By using the coefficient map** technique, this paper proposes novel computationally-efficient algebraic equations for the numerical structural identifiability analysis of a widely used FO-ECM with Grünwald-Letnikov fractional derivative approximation and two constant phase elements (CPEs) including the Warburg term. The proposed numerical structural identifiability analysis method is applied to an example from batteries, and the results are discussed. Matlab codes are available on github.
△ Less
Submitted 27 February, 2021;
originally announced March 2021.
-
Universal Power Law Scaling Near the Turning Points
Authors:
M. Ali Saif
Abstract:
We show analytically and numerically that, the velocity $v_\pm$ of a particle near the turning points $x_0$ vanishes, i. e. $v_\pm\rightarrow 0$ as $x\rightarrow x_0$, according to the power law scaling $\left|v_\pm\right| \propto \left|x_0-x\right|^β$, where the exponent $β=1/2$ is independent of the particle mass and the force acting on it. We also show that, the time spends it any particle at e…
▽ More
We show analytically and numerically that, the velocity $v_\pm$ of a particle near the turning points $x_0$ vanishes, i. e. $v_\pm\rightarrow 0$ as $x\rightarrow x_0$, according to the power law scaling $\left|v_\pm\right| \propto \left|x_0-x\right|^β$, where the exponent $β=1/2$ is independent of the particle mass and the force acting on it. We also show that, the time spends it any particle at each small interval $dx$ near the turning points diverges as $τ\propto \left|x_0-x\right|^ν$, with the exponent $ν=-1/2$. Behavior we find here is very similar to power law scaling that had been found near the critical points for systems which undergo a phase transition.
△ Less
Submitted 10 June, 2020;
originally announced June 2020.
-
Alpha-N: Shortest Path Finder Automated Delivery Robot with Obstacle Detection and Avoiding System
Authors:
A. A. Neloy,
R. A. Bindu,
S. Alam,
R. Haque,
M. Saif,
A. Khan,
N. M. Mishu,
S. Siddique
Abstract:
Alpha N A self-powered, wheel driven Automated Delivery Robot is presented in this paper. The ADR is capable of navigating autonomously by detecting and avoiding objects or obstacles in its path. It uses a vector map of the path and calculates the shortest path by Grid Count Method of Dijkstra Algorithm. Landmark determination with Radio Frequency Identification tags are placed in the path for ide…
▽ More
Alpha N A self-powered, wheel driven Automated Delivery Robot is presented in this paper. The ADR is capable of navigating autonomously by detecting and avoiding objects or obstacles in its path. It uses a vector map of the path and calculates the shortest path by Grid Count Method of Dijkstra Algorithm. Landmark determination with Radio Frequency Identification tags are placed in the path for identification and verification of source and destination, and also for the recalibration of the current position. On the other hand, an Object Detection Module is built by Faster RCNN with VGGNet16 architecture for supporting path planning by detecting and recognizing obstacles. The Path Planning System is combined with the output of the GCM, the RFID Reading System and also by the binary results of ODM. This PPS requires a minimum speed of 200 RPM and 75 seconds duration for the robot to successfully relocate its position by reading an RFID tag. In the result analysis phase, the ODM exhibits an accuracy of 83.75 percent, RRS shows 92.3 percent accuracy and the PPS maintains an accuracy of 85.3 percent. Stacking all these 3 modules, the ADR is built, tested and validated which shows significant improvement in terms of performance and usability comparing with other service robots.
△ Less
Submitted 28 April, 2020; v1 submitted 26 February, 2020;
originally announced February 2020.
-
Phase Imaging with Computational Specificity (PICS) for measuring dry mass changes in sub-cellular compartments
Authors:
Mikhail E. Kandel,
Yuchen R. He,
Young Jae Lee,
Taylor Hsuan-Yu Chen,
Kathryn Michele Sullivan,
Onur Aydin,
M Taher A. Saif,
Hyunjoon Kong,
Nahil Sobh,
Gabriel Popescu
Abstract:
Due to its specificity, fluorescence microscopy (FM) has become a quintessential imaging tool in cell biology. However, photobleaching, phototoxicity, and related artifacts continue to limit FM's utility. Recently, it has been shown that artificial intelligence (AI) can transform one form of contrast into another. We present PICS, a combination of quantitative phase imaging and AI, which provides…
▽ More
Due to its specificity, fluorescence microscopy (FM) has become a quintessential imaging tool in cell biology. However, photobleaching, phototoxicity, and related artifacts continue to limit FM's utility. Recently, it has been shown that artificial intelligence (AI) can transform one form of contrast into another. We present PICS, a combination of quantitative phase imaging and AI, which provides information about unlabeled live cells with high specificity. Our imaging system allows for automatic training, while inference is built into the acquisition software and runs in real-time. Applying the computed fluorescence maps back to the QPI data, we measured the growth of both nuclei and cytoplasm independently, over many days, without loss of viability. Using a QPI method that suppresses multiple scattering, we measured the dry mass content of individual cell nuclei within spheroids. In its current implementation, PICS offers a versatile quantitative technique for continuous simultaneous monitoring of individual cellular components in biological applications where long-term label-free imaging is desirable.
△ Less
Submitted 13 March, 2020; v1 submitted 19 February, 2020;
originally announced February 2020.
-
A Dual Approach for Positive T-S Fuzzy Controller Design and Its Application to Cancer Treatment Under Immunotherapy and Chemotherapy
Authors:
Elham Ahmadi,
Jafar Zarei,
Roozbeh Razavi-Far,
Mehrdad Saif
Abstract:
This study proposes an effective positive control design strategy for cancer treatment by resorting to the combination of immunotherapy and chemotherapy. The treatment objective is to transfer the initial number of tumor cells and immune-competent cells from the malignant region into the region of benign growth where the immune system can inhibit tumor growth. In order to achieve this goal, a new…
▽ More
This study proposes an effective positive control design strategy for cancer treatment by resorting to the combination of immunotherapy and chemotherapy. The treatment objective is to transfer the initial number of tumor cells and immune-competent cells from the malignant region into the region of benign growth where the immune system can inhibit tumor growth. In order to achieve this goal, a new modeling strategy is used that is based on Takagi-Sugen. A Takagi-Sugeno fuzzy model is derived based on the Stepanova nonlinear model that enables a systematic design of the controller. Then, a positive Parallel Distributed Compensation controller is proposed based on a linear copositive Lyapunov Function so that the tumor volume and administration of the chemotherapeutic and immunotherapeutic drugs is reduced, while the density of the immune-competent cells is reached to an acceptable level. Thanks to the proposed strategy, the entire control design is formulated as a Linear Programming problem, which can be solved very efficiently. Finally, the simulation results show the effectiveness of the proposed control approach for the cancer treatment. Keywords: Co-positive linear Lyapunov function, Cancer, Chemotherapy, Immunotherapy, Positive system, Takagi-Sugeno fuzzy system.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
Critical Threshold For SIRS Model on Small World Networks
Authors:
Mohammed Ali Saif
Abstract:
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on small world network. We show the effects of all the parameters associated with this model on small world network and we create the full phase space. The results we obtained are consistent with those obtained in Ref.[7] in term…
▽ More
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on small world network. We show the effects of all the parameters associated with this model on small world network and we create the full phase space. The results we obtained are consistent with those obtained in Ref.[7] in terms of the existence of a phase transition from a fluctuating endemic state to self-sustained oscillations in the size of the infected subpopulation at a finite value of the disorder of the network. And also our results assert that, that transition specifically occurs where the average clusterization shifts from high to low. The effect of clustering coefficient on SIRS model on the networks can be understood from the results obtained in Ref. [9], which indicates the importance of existing the loops in the network, in order to the disease to spread frequently throughout the nodes of network. where, clusters tend to spread infection among close-knit neighborhoods. Hence, when the loops are high inside the network, the reinfection occurs in the network at many places and at different times, which looks like as a kind of randomness in occurring the second period of infection. Whereas when the number of loops are low, reinfection occurs at specific places and times on the network, which looks like as a kind of regularity in occurring the second period of infection.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
Emergence of Self-Sustained Oscillations for SIRS Model on Random Networks
Authors:
Mohammed Ali Saif
Abstract:
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on random networks. By studying temporal evolution and synchronization parameter of this model on random networks, we find that, this model on random networks, shows a synchronization phase in a narrow range of very small values…
▽ More
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on random networks. By studying temporal evolution and synchronization parameter of this model on random networks, we find that, this model on random networks, shows a synchronization phase in a narrow range of very small values of clustering coefficient. This finding corroborates the conclusion reached in Ref. [4] that, the clustering coefficient is responsible for the emergence of the synchronization phase in the small world networks.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
New approach to generalized Mittag-Leffler function via quantum calculus
Authors:
Raghib Nadeem,
Mohd. Saif,
Talha Usman,
Abdul Hakim Khan
Abstract:
We aim to introduce a new extension of Mittag-Leffler function via q-analogue and obtained their significant properties including integral representation, q-differentiation, q-Laplace transform, image formula under q-derivative operators. We also consider some particular cases to give the applications of our main results.
We aim to introduce a new extension of Mittag-Leffler function via q-analogue and obtained their significant properties including integral representation, q-differentiation, q-Laplace transform, image formula under q-derivative operators. We also consider some particular cases to give the applications of our main results.
△ Less
Submitted 15 January, 2019;
originally announced January 2019.
-
Epidemic Threshold for the SIRS Model on Networks
Authors:
M. Ali Saif
Abstract:
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on the networks. We derive an analytical expression of the probability for the descendants nodes to re-infect their ancestors nodes. We find that, in the case of the recovery time $τ_R$ is larger than the infection time $τ_I$, th…
▽ More
We study the phase transition from the persistence phase to the extinction phase for the SIRS (susceptible/ infected/ refractory/ susceptible) model of diseases spreading on the networks. We derive an analytical expression of the probability for the descendants nodes to re-infect their ancestors nodes. We find that, in the case of the recovery time $τ_R$ is larger than the infection time $τ_I$, the infection will flow directionally from the ancestors to the descendants however, the descendants will not able to reinfect their ancestors during their infection time. This behavior leads us to deduce that, for this case and when the infection rate $λ$ is high enough in such that, any infected node on the network infects all of its neighbors during its infection time, SIRS model on the network evolves to extinction state, where all the nodes on the network become susceptible. Moreover, we assert that, in order to the infection occurs repeatedly inside the network, the loops on the network are necessary, which means the clustering coefficient will play an important role for this model. Hence, unlike the other models such as SIS model and SIR model, SIRS model has a two critical threshold which separate the persistence phase from the extinction phase when $τ_I<τ_R$. That means, for fixed values of $τ_I$ and $τ_R$ there are a two critical points for infection rate $λ_1$ and $λ_2$, where epidemic persists in between of those two points. We confirm those results numerically by the simulation of regular one dimensional SIRS system.
△ Less
Submitted 9 March, 2019; v1 submitted 17 November, 2017;
originally announced November 2017.
-
Augmented Zagreb Index of Polyhex Nanotubes
Authors:
Nazeran Idrees,
Afshan Sadiq,
Muhammad Jawwad Saif,
Asia Rauf
Abstract:
Augmented Zagreb Index is a newly defined degree based topological invariant which has been well established for its better correlation properties and is defined as $AZI(G)= \sum_{uv\in E(G)}(\frac{d_G (u)d_G (v)}{d_G (u)+ d_G (v)-2})^3 $, where $E(G)$ is the edge set of graph $G$ and $d(u),\,\,d(v)$ are the degrees of the end vertices $u$ and $v$ of edge $uv$, respectively. It has outperformed ma…
▽ More
Augmented Zagreb Index is a newly defined degree based topological invariant which has been well established for its better correlation properties and is defined as $AZI(G)= \sum_{uv\in E(G)}(\frac{d_G (u)d_G (v)}{d_G (u)+ d_G (v)-2})^3 $, where $E(G)$ is the edge set of graph $G$ and $d(u),\,\,d(v)$ are the degrees of the end vertices $u$ and $v$ of edge $uv$, respectively. It has outperformed many well known degree based topological indices. In this article we give closed formulae for the augmented Zagreb index of arm-chair polyhex and zigzag edge polyhex nanotubes.
△ Less
Submitted 1 June, 2016; v1 submitted 9 March, 2016;
originally announced March 2016.
-
Chapman-Jouguet deflagrations and their transition to detonation
Authors:
Mohamed Saif,
Wentian Wang,
Andrzej Pekalski,
Marc Levin,
Matei I. Radulescu
Abstract:
We study experimentally fast flames and their transition to detonation in mixtures of methane, ethane, ethylene, acetylene, and propane mixtures with oxygen. Following the interaction of a detonation wave with a column of cylinders of varying blockage ratio, the experiments demonstrate that the fast flames established are Chapman-Jouguet deflagrations, in excellent agreement with the self-similar…
▽ More
We study experimentally fast flames and their transition to detonation in mixtures of methane, ethane, ethylene, acetylene, and propane mixtures with oxygen. Following the interaction of a detonation wave with a column of cylinders of varying blockage ratio, the experiments demonstrate that the fast flames established are Chapman-Jouguet deflagrations, in excellent agreement with the self-similar model of Radulescu et al. (2015). The experiments indicate that these Chapman-Jouguet deflagrations dynamically restructure and amplify into fewer stronger modes until the eventual transition to detonation. The transition length to a self-sustained detonation was found to correlate very well with the mixtures' sensitivity to temperature fluctuations, reflected by the $χ$ parameter introduced by Radulescu, which is the product of the non-dimensional activation energy $E_a/RT$ and the ratio of chemical induction to reaction time $t_i/t_r$. Correlation of the measured DDT lengths determined that the relevant characteristic time scale from chemical kinetics controlling DDT is the energy release or excitation time $t_r$. Correlations with the cell size also capture the dependence of the DDT length on $χ$ for fixed blockage ratios.
△ Less
Submitted 7 December, 2015;
originally announced December 2015.
-
On stability analysis by using Nyquist and Nichols Charts
Authors:
S. M. Mahdi Alavi,
Mehrdad Saif
Abstract:
This paper reviews stability analysis techniques by using the Nyquist and Nichols charts. The relationship between the Nyquist and Nichols stability criteria is fully described by using the crossing concept. The results are demonstrated through several numerical examples. This tutorial provides useful insights into the loop-sha** based control systems design such as Quantitative Feedback Theory.
This paper reviews stability analysis techniques by using the Nyquist and Nichols charts. The relationship between the Nyquist and Nichols stability criteria is fully described by using the crossing concept. The results are demonstrated through several numerical examples. This tutorial provides useful insights into the loop-sha** based control systems design such as Quantitative Feedback Theory.
△ Less
Submitted 15 November, 2015;
originally announced November 2015.
-
Prisoner's Dilemma with Semi-synchronous Updates: Evidence for a First Order Phase Transition
Authors:
M Ali Saif,
P. M. Gade
Abstract:
Emergence of cooperation in self-centered individuals has been a major puzzle in the study of evolutionary ethics. Reciprocal altruism is one of explanations put forward and prisoner's dilemma has been a paradigm in this context. Emergence of cooperation was demonstrated for prisoner's dilemma on a lattice with synchronous update [Nature, 359, 826 (1992)]. However, the cooperation disappeared fo…
▽ More
Emergence of cooperation in self-centered individuals has been a major puzzle in the study of evolutionary ethics. Reciprocal altruism is one of explanations put forward and prisoner's dilemma has been a paradigm in this context. Emergence of cooperation was demonstrated for prisoner's dilemma on a lattice with synchronous update [Nature, 359, 826 (1992)]. However, the cooperation disappeared for asynchronous update and the general validity of the conclusions was questioned [PNAS, 90, 7716 (1993)]. Neither synchronous nor asynchronous updates are realistic for natural systems. In this paper, we make a detailed study of more realistic system of semi-synchronous updates where pN agents are updated at every time instant. We observe a transition from all-defector state to a mixed state as a function of p. Despite being transition from absorbing state, our studies indicate that it is a first order transition. Furthermore, we used damage spreading technique to demonstrate that, the transition in this system could be classified as a frozen-chaotic transition.
△ Less
Submitted 6 October, 2009;
originally announced October 2009.
-
Dynamic Phase Transition in Prisoner's Dilemma on a Lattice with Stochastic Modifications
Authors:
M. Ali Saif,
Prashant M. Gade
Abstract:
We present a detailed study of prisoner's dilemma game with stochastic modifications on a two-dimensional lattice, in presence of evolutionary dynamics. By very nature of the rules, the cooperators have incentive to cheat and the fear to being cheated in prisoner's dilemma and may cheat even when not dictated by evolutionary dynamics. We consider two variants. In either case, the agents mimic th…
▽ More
We present a detailed study of prisoner's dilemma game with stochastic modifications on a two-dimensional lattice, in presence of evolutionary dynamics. By very nature of the rules, the cooperators have incentive to cheat and the fear to being cheated in prisoner's dilemma and may cheat even when not dictated by evolutionary dynamics. We consider two variants. In either case, the agents mimic the action (cooperation or defection) in the previous timestep of the most successful agent in the neighborhood. Over and above this, the fraction p of cooperators spontaneously change their strategy to pure defector at every time step in the first variant. In the second variant, there are no pure cooperators. All cooperators keep defecting with probability p at every time-step. In both cases, the system switches from coexistence state to an all-defector state for higher values of p. We show that the transition between these states unambiguously belongs to directed percolation universality class in 2 + 1 dimension. We also study the local persistence and the persistence exponents are higher than ones obtained in previous studies underlining their dependence on details of dynamics
△ Less
Submitted 11 February, 2010; v1 submitted 6 October, 2009;
originally announced October 2009.
-
Effects of introduction of new resources and fragmentation of existing resources on limiting wealth distribution in asset exchange models
Authors:
M. Ali Saif,
Prashant M. Gade
Abstract:
Pareto law, which states that wealth distribution in societies have a power-law tail, has been a subject of intensive investigations in statistical physics community. Several models have been employed to explain this behavior. However, most of the agent based models assume the conservation of number of agents and wealth. Both these assumptions are unrealistic. In this paper, we study the limitin…
▽ More
Pareto law, which states that wealth distribution in societies have a power-law tail, has been a subject of intensive investigations in statistical physics community. Several models have been employed to explain this behavior. However, most of the agent based models assume the conservation of number of agents and wealth. Both these assumptions are unrealistic. In this paper, we study the limiting wealth distribution when one or both of these assumptions are not valid. Given the universality of the law, we have tried to study the wealth distribution from the asset exchange models point of view. We consider models in which a) new agents enter the market at constant rate b) richer agents fragment with higher probability introducing newer agents in the system c) both fragmentation and entry of new agents is taking place. While models a) and c) do not conserve total wealth or number of agents, model b) conserves total wealth. All these models lead to a power-law tail in the wealth distribution pointing to the possibility that more generalized asset exchange models could help us to explain emergence of power-law tail in wealth distribution.
△ Less
Submitted 12 February, 2009;
originally announced February 2009.
-
Emergence of Power Law in a Market with Mixed Models
Authors:
M. Ali Saif,
Prashant M. Gade
Abstract:
We investigate the problem of wealth distribution from the viewpoint of asset exchange. Robust nature of Pareto's law across economies, ideologies and nations suggests that this could be an outcome of trading strategies. However, the simple asset exchange models fail to reproduce this feature. A yardsale(YS) model in which amount put on the bet is a fraction of minimum of the two players leads t…
▽ More
We investigate the problem of wealth distribution from the viewpoint of asset exchange. Robust nature of Pareto's law across economies, ideologies and nations suggests that this could be an outcome of trading strategies. However, the simple asset exchange models fail to reproduce this feature. A yardsale(YS) model in which amount put on the bet is a fraction of minimum of the two players leads to condensation of wealth in hands of some agent while theft and fraud(TF) model in which the amount to be exchanged is a fraction of loser's wealth leads to an exponential distribution of wealth. We show that if we allow few agents to follow a different model than others, {\it i.e.} there are some agents following TF model while rest follow YS model, it leads to distribution with power law tails. Similar effect is observed when one carries out transactions for a fraction of one's wealth using TF model and for the rest YS model is used. We also observe a power law tail in wealth distribution if we allow the agents to follow either of the models with some probability.
△ Less
Submitted 12 February, 2009;
originally announced February 2009.