-
Wireless Spectrum in Rural Farmlands: Status, Challenges and Opportunities
Authors:
Mukaram Shahid,
Kunal Das,
Taimoor Ul Islam,
Christ Somiah,
Daji Qiao,
Arsalan Ahmad,
Jimming Song,
Zhengyuan Zhu,
Sarath Babu,
Yong Guan,
Tusher Chakraborty,
Suraj Jog,
Ranveer Chandra,
Hongwei Zhang
Abstract:
Due to factors such as low population density and expansive geographical distances, network deployment falls behind in rural regions, leading to a broadband divide. Wireless spectrum serves as the blood and flesh of wireless communications. Shared white spaces such as those in the TVWS and CBRS spectrum bands offer opportunities to expand connectivity, innovate, and provide affordable access to hi…
▽ More
Due to factors such as low population density and expansive geographical distances, network deployment falls behind in rural regions, leading to a broadband divide. Wireless spectrum serves as the blood and flesh of wireless communications. Shared white spaces such as those in the TVWS and CBRS spectrum bands offer opportunities to expand connectivity, innovate, and provide affordable access to high-speed Internet in under-served areas without additional cost to expensive licensed spectrum. However, the current methods to utilize these white spaces are inefficient due to very conservative models and spectrum policies, causing under-utilization of valuable spectrum resources. This hampers the full potential of innovative wireless technologies that could benefit farmers, small Internet Service Providers (ISPs) or Mobile Network Operators (MNOs) operating in rural regions. This study explores the challenges faced by farmers and service providers when using shared spectrum bands to deploy their networks while ensuring maximum system performance and minimizing interference with other users. Additionally, we discuss how spatiotemporal spectrum models, in conjunction with database-driven spectrum-sharing solutions, can enhance the allocation and management of spectrum resources, ultimately improving the efficiency and reliability of wireless networks operating in shared spectrum bands.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Generalized Deepfake Attribution
Authors:
Sowdagar Mahammad Shahid,
Sudev Kumar Padhi,
Umesh Kashyap,
Sk. Subidh Ali
Abstract:
The landscape of fake media creation changed with the introduction of Generative Adversarial Networks (GAN s). Fake media creation has been on the rise with the rapid advances in generation technology, leading to new challenges in Detecting fake media. A fundamental characteristic of GAN s is their sensitivity to parameter initialization, known as seeds. Each distinct seed utilized during training…
▽ More
The landscape of fake media creation changed with the introduction of Generative Adversarial Networks (GAN s). Fake media creation has been on the rise with the rapid advances in generation technology, leading to new challenges in Detecting fake media. A fundamental characteristic of GAN s is their sensitivity to parameter initialization, known as seeds. Each distinct seed utilized during training leads to the creation of unique model instances, resulting in divergent image outputs despite employing the same architecture. This means that even if we have one GAN architecture, it can produce countless variations of GAN models depending on the seed used. Existing methods for attributing deepfakes work well only if they have seen the specific GAN model during training. If the GAN architectures are retrained with a different seed, these methods struggle to attribute the fakes. This seed dependency issue made it difficult to attribute deepfakes with existing methods. We proposed a generalized deepfake attribution network (GDA-N et) to attribute fake images to their respective GAN architectures, even if they are generated from a retrained version of the GAN architecture with a different seed (cross-seed) or from the fine-tuned version of the existing GAN model. Extensive experiments on cross-seed and fine-tuned data of GAN models show that our method is highly effective compared to existing methods. We have provided the source code to validate our results.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Using graph neural networks to reconstruct charged pion showers in the CMS High Granularity Calorimeter
Authors:
M. Aamir,
B. Acar,
G. Adamov,
T. Adams,
C. Adloff,
S. Afanasiev,
C. Agrawal,
C. Agrawal,
A. Ahmad,
H. A. Ahmed,
S. Akbar,
N. Akchurin,
B. Akgul,
B. Akgun,
R. O. Akpinar,
E. Aktas,
A. AlKadhim,
V. Alexakhin,
J. Alimena,
J. Alison,
A. Alpana,
W. Alshehri,
P. Alvarez Dominguez,
M. Alyari,
C. Amendola
, et al. (550 additional authors not shown)
Abstract:
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadr…
▽ More
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadronic section. The shower reconstruction method is based on graph neural networks and it makes use of a dynamic reduction network architecture. It is shown that the algorithm is able to capture and mitigate the main effects that normally hinder the reconstruction of hadronic showers using classical reconstruction methods, by compensating for fluctuations in the multiplicity, energy, and spatial distributions of the shower's constituents. The performance of the algorithm is evaluated using test beam data collected in 2018 prototype of the CMS HGCAL accompanied by a section of the CALICE AHCAL prototype. The capability of the method to mitigate the impact of energy leakage from the calorimeter is also demonstrated.
△ Less
Submitted 30 June, 2024; v1 submitted 17 June, 2024;
originally announced June 2024.
-
Particle Multi-Axis Transformer for Jet Tagging
Authors:
Muhammad Usman,
M Husnain Shahid,
Maheen Ejaz,
Ummay Hani,
Nayab Fatima,
Abdul Rehman Khan,
Asifullah Khan,
Nasir Majid Mirza
Abstract:
Jet tagging is an essential categorization problem in high energy physics. In recent times, Deep Learning has not only risen to the challenge of jet tagging but also significantly improved its performance. In this article, we propose an idea of a new architecture, Particle Multi-Axis transformer (ParMAT) which is a modified version of Particle transformer (ParT). ParMAT contains local and global s…
▽ More
Jet tagging is an essential categorization problem in high energy physics. In recent times, Deep Learning has not only risen to the challenge of jet tagging but also significantly improved its performance. In this article, we propose an idea of a new architecture, Particle Multi-Axis transformer (ParMAT) which is a modified version of Particle transformer (ParT). ParMAT contains local and global spatial interactions within a single unit which improves its ability to handle various input lengths. We trained our model on JETCLASS, a publicly available large dataset that contains 100M jets of 10 different classes of particles. By integrating a parallel attention mechanism and pairwise interactions of particles in the attention mechanism,ParMAT achieves robustness and higher accuracy over the ParT and ParticleNet. The scalability of the model to huge datasets and its ability to automatically extract essential features demonstrate its potential for enhancing jet tagging.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
PREDIS-MHI Thermal Data
Authors:
Seun Osonuga,
Ali Chouman,
Muhammad-Salman Shahid,
Benoit Delinchant,
Frederic Wurtz
Abstract:
Tertiary buildings could be an important lever to meet the goals necessitated by the energy transition. The availability of high-quality datasets from this sector will be a crucial enabler in meeting these goals by develo** and testing new energy management approaches in the buildings. In this paper, we present the thermal energy datasets available and published online for the PREDIS-MHI zone of…
▽ More
Tertiary buildings could be an important lever to meet the goals necessitated by the energy transition. The availability of high-quality datasets from this sector will be a crucial enabler in meeting these goals by develo** and testing new energy management approaches in the buildings. In this paper, we present the thermal energy datasets available and published online for the PREDIS-MHI zone of the GreEn-ER building, a tertiary building with more than a thousand sensors used for research, teaching, and administrative activities in Grenoble. PREDIS-MHI platform is a net-zero sub-section that is energetically isolated from the rest of the building. Its data has been used in a wide range of applications from indoor temperature forecasting, thermal simulation calibration, and even occupant comfort experiments
△ Less
Submitted 23 May, 2024; v1 submitted 5 April, 2024;
originally announced April 2024.
-
Methane and oxygen from energy-efficient, low temperature in situ resource utilization enables missions to Mars
Authors:
M. Shahid,
B. Chambers,
S. Sankarasubramanian
Abstract:
NASA mandate is a human mission to Mars in the 2030s and sustained exploration of Mars requires in-situ resource utilization (ISRU). Exploiting the Martian water cycle (alongside perchlorate salts that depress the freezing point of water to less than 213K) and the available 95 volume percent atmospheric CO2, we detail an ultra-low temperature (255K) CO2-H2O electrolyzer to produce methane fuel and…
▽ More
NASA mandate is a human mission to Mars in the 2030s and sustained exploration of Mars requires in-situ resource utilization (ISRU). Exploiting the Martian water cycle (alongside perchlorate salts that depress the freezing point of water to less than 213K) and the available 95 volume percent atmospheric CO2, we detail an ultra-low temperature (255K) CO2-H2O electrolyzer to produce methane fuel and life-supporting oxygen on Mars. Methane production is thermodynamically favored across a range of operational pressures and temperatures and our electrolyzer polarization model concurred with reported experimental performance. A hypothetical 10-cell, 100 square cm electrode-area-per-cell electrolyzer produced 0.31g per W per day of CH4 and 3.54g per W per day of O2 at 2V per cell (operating voltage) versus 0.8g per W per day of O2 produced by the Mars Oxygen in-situ Resource Utilization Experiment (MOXIE) from the Mars 2020 mission (MOXIE produces no fuel). Material performance requirements are presented to show that this technology is an energy-efficient complement to the MOXIE high temperature approach.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Hybridized Convolutional Neural Networks and Long Short-Term Memory for Improved Alzheimer's Disease Diagnosis from MRI Scans
Authors:
Maleka Khatun,
Md Manowarul Islam,
Habibur Rahman Rifat,
Md. Shamim Bin Shahid,
Md. Alamin Talukder,
Md Ashraf Uddin
Abstract:
Brain-related diseases are more sensitive than other diseases due to several factors, including the complexity of surgical procedures, high costs, and other challenges. Alzheimer's disease is a common brain disorder that causes memory loss and the shrinking of brain cells. Early detection is critical for providing proper treatment to patients. However, identifying Alzheimer's at an early stage usi…
▽ More
Brain-related diseases are more sensitive than other diseases due to several factors, including the complexity of surgical procedures, high costs, and other challenges. Alzheimer's disease is a common brain disorder that causes memory loss and the shrinking of brain cells. Early detection is critical for providing proper treatment to patients. However, identifying Alzheimer's at an early stage using manual scanning of CT or MRI scans is challenging. Therefore, researchers have delved into the exploration of computer-aided systems, employing Machine Learning and Deep Learning methodologies, which entail the training of datasets to detect Alzheimer's disease. This study aims to present a hybrid model that combines a CNN model's feature extraction capabilities with an LSTM model's detection capabilities. This study has applied the transfer learning called VGG16 in the hybrid model to extract features from MRI images. The LSTM detects features between the convolution layer and the fully connected layer. The output layer of the fully connected layer uses the softmax function. The training of the hybrid model involved utilizing the ADNI dataset. The trial findings revealed that the model achieved a level of accuracy of 98.8%, a sensitivity rate of 100%, and a specificity rate of 76%. The proposed hybrid model outperforms its contemporary CNN counterparts, showcasing a superior performance.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Towards Robust Car Following Dynamics Modeling via Blackbox Models: Methodology, Analysis, and Recommendations
Authors:
Muhammad Bilal Shahid,
Cody Fleming
Abstract:
The selection of the target variable is important while learning parameters of the classical car following models like GIPPS, IDM, etc. There is a vast body of literature on which target variable is optimal for classical car following models, but there is no study that empirically evaluates the selection of optimal target variables for black-box models, such as LSTM, etc. The black-box models, lik…
▽ More
The selection of the target variable is important while learning parameters of the classical car following models like GIPPS, IDM, etc. There is a vast body of literature on which target variable is optimal for classical car following models, but there is no study that empirically evaluates the selection of optimal target variables for black-box models, such as LSTM, etc. The black-box models, like LSTM and Gaussian Process (GP) are increasingly being used to model car following behavior without wise selection of target variables. The current work tests different target variables, like acceleration, velocity, and headway, for three black-box models, i.e., GP, LSTM, and Kernel Ridge Regression. These models have different objective functions and work in different vector spaces, e.g., GP works in function space, and LSTM works in parameter space. The experiments show that the optimal target variable recommendations for black-box models differ from classical car following models depending on the objective function and the vector space. It is worth mentioning that models and datasets used during evaluation are diverse in nature: the datasets contained both automated and human-driven vehicle trajectories; the black-box models belong to both parametric and non-parametric classes of models. This diversity is important during the analysis of variance, wherein we try to find the interaction between datasets, models, and target variables. It is shown that the models and target variables interact and recommended target variables don't depend on the dataset under consideration.
△ Less
Submitted 11 February, 2024;
originally announced February 2024.
-
VADIS -- a VAriable Detection, Interlinking and Summarization system
Authors:
Yavuz Selim Kartal,
Muhammad Ahsan Shahid,
Sotaro Takeshita,
Tornike Tsereteli,
Andrea Zielinski,
Benjamin Zapilko,
Philipp Mayr
Abstract:
The VADIS system addresses the demand of providing enhanced information access in the domain of the social sciences. This is achieved by allowing users to search and use survey variables in context of their underlying research data and scholarly publications which have been interlinked with each other.
The VADIS system addresses the demand of providing enhanced information access in the domain of the social sciences. This is achieved by allowing users to search and use survey variables in context of their underlying research data and scholarly publications which have been interlinked with each other.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Passive Mechanical Vibration Processor for Wireless Vibration Sensing
Authors:
Dajun Zhang,
Akhil Polamarasetty,
Muhammad Osama Shahid,
Bhuvana Krishnaswamy,
Chu Ma
Abstract:
Real-time, low-cost, and wireless mechanical vibration monitoring is necessary for industrial applications to track the operation status of equipment, environmental applications to proactively predict natural disasters, as well as day-to-day applications such as vital sign monitoring. Despite this urgent need, existing solutions, such as laser vibrometers, commercial Wi-Fi devices, and cameras, la…
▽ More
Real-time, low-cost, and wireless mechanical vibration monitoring is necessary for industrial applications to track the operation status of equipment, environmental applications to proactively predict natural disasters, as well as day-to-day applications such as vital sign monitoring. Despite this urgent need, existing solutions, such as laser vibrometers, commercial Wi-Fi devices, and cameras, lack wide practical deployment due to their limited sensitivity and functionality. In this work, we propose and verify that a fully passive, resonance-based vibration processing device attached to the vibrating surface can improve the sensitivity of wireless vibration measurement methods by more than 10 times at designated frequencies. Additionally, the device realizes an analog real-time vibration filtering/labeling effect, and the device also provides a platform for surface editing, which adds more functionalities to the current non-contact sensing systems. Finally, the working frequency of the device is widely adjustable over orders of magnitudes, broadening its applicability to different applications.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Multigrid preconditioning of singularly perturbed convection-diffusion equations
Authors:
M. Shahid,
S. P. MacLachlan,
H. bin Zubair Syed
Abstract:
Boundary value problems based on the convection-diffusion equation arise naturally in models of fluid flow across a variety of engineering applications and design feasibility studies. Naturally, their efficient numerical solution has continued to be an interesting and active topic of research for decades. In the context of finite-element discretization of these boundary value problems, the Streaml…
▽ More
Boundary value problems based on the convection-diffusion equation arise naturally in models of fluid flow across a variety of engineering applications and design feasibility studies. Naturally, their efficient numerical solution has continued to be an interesting and active topic of research for decades. In the context of finite-element discretization of these boundary value problems, the Streamline Upwind Petrov-Galerkin (SUPG) technique yields accurate discretization in the singularly perturbed regime. In this paper, we propose efficient multigrid iterative solution methods for the resulting linear systems. In particular, we show that techniques from standard multigrid for anisotropic problems can be adapted to these discretizations on both tensor-product as well as semi-structured meshes. The resulting methods are demonstrated to be robust preconditioners for several standard flow benchmarks.
△ Less
Submitted 25 June, 2024; v1 submitted 11 May, 2023;
originally announced May 2023.
-
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks
Authors:
Mahnoor Shahid
Abstract:
Detection and mitigation of critical web vulnerabilities and attacks like cross-site scripting (XSS), and cross-site request forgery (CSRF) have been a great concern in the field of web security. Such web attacks are evolving and becoming more challenging to detect. Several ideas from different perspectives have been put forth that can be used to improve the performance of detecting these web vuln…
▽ More
Detection and mitigation of critical web vulnerabilities and attacks like cross-site scripting (XSS), and cross-site request forgery (CSRF) have been a great concern in the field of web security. Such web attacks are evolving and becoming more challenging to detect. Several ideas from different perspectives have been put forth that can be used to improve the performance of detecting these web vulnerabilities and preventing the attacks from happening. Machine learning techniques have lately been used by researchers to defend against XSS and CSRF, and given the positive findings, it can be concluded that it is a promising research direction. The objective of this paper is to briefly report on the research works that have been published in this direction of applying classical and advanced machine learning to identify and prevent XSS and CSRF. The purpose of providing this survey is to address different machine learning approaches that have been implemented, understand the key takeaway of every research, discuss their positive impact and the downsides that persists, so that it can help the researchers to determine the best direction to develop new approaches for their own research and to encourage researchers to focus towards the intersection between web security and machine learning.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Paint it Black: Generating paintings from text descriptions
Authors:
Mahnoor Shahid,
Mark Koch,
Niklas Schneider
Abstract:
Two distinct tasks - generating photorealistic pictures from given text prompts and transferring the style of a painting to a real image to make it appear as though it were done by an artist, have been addressed many times, and several approaches have been proposed to accomplish them. However, the intersection of these two, i.e., generating paintings from a given caption, is a relatively unexplore…
▽ More
Two distinct tasks - generating photorealistic pictures from given text prompts and transferring the style of a painting to a real image to make it appear as though it were done by an artist, have been addressed many times, and several approaches have been proposed to accomplish them. However, the intersection of these two, i.e., generating paintings from a given caption, is a relatively unexplored area with little data available. In this paper, we have explored two distinct strategies and have integrated them together. First strategy is to generate photorealistic images and then apply style transfer and the second strategy is to train an image generation model on real images with captions and then fine-tune it on captioned paintings later. These two models are evaluated using different metrics as well as a user study is conducted to get human feedback on the produced results.
△ Less
Submitted 17 February, 2023;
originally announced February 2023.
-
Multi-feature Dataset for Windows PE Malware Classification
Authors:
Muhammad Irfan Yousuf,
Izza Anwer,
Tanzeela Shakir,
Minahil Siddiqui,
Maysoon Shahid
Abstract:
This paper describes a multi-feature dataset for training machine learning classifiers for detecting malicious Windows Portable Executable (PE) files. The dataset includes four feature sets from 18,551 binary samples belonging to five malware families including Spyware, Ransomware, Downloader, Backdoor and Generic Malware. The feature sets include the list of DLLs and their functions, values of di…
▽ More
This paper describes a multi-feature dataset for training machine learning classifiers for detecting malicious Windows Portable Executable (PE) files. The dataset includes four feature sets from 18,551 binary samples belonging to five malware families including Spyware, Ransomware, Downloader, Backdoor and Generic Malware. The feature sets include the list of DLLs and their functions, values of different fields of PE Header and Sections. First, we explain the data collection and creation phase and then we explain how did we label the samples in it using VirusTotal's services. Finally, we explore the dataset to describe how this dataset can benefit the researchers for static malware analysis. The dataset is made public in the hope that it will help inspire machine learning research for malware detection.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
White-Box Attacks on Hate-speech BERT Classifiers in German with Explicit and Implicit Character Level Defense
Authors:
Shahrukh Khan,
Mahnoor Shahid,
Navdeeppal Singh
Abstract:
In this work, we evaluate the adversarial robustness of BERT models trained on German Hate Speech datasets. We also complement our evaluation with two novel white-box character and word level attacks thereby contributing to the range of attacks available. Furthermore, we also perform a comparison of two novel character-level defense strategies and evaluate their robustness with one another.
In this work, we evaluate the adversarial robustness of BERT models trained on German Hate Speech datasets. We also complement our evaluation with two novel white-box character and word level attacks thereby contributing to the range of attacks available. Furthermore, we also perform a comparison of two novel character-level defense strategies and evaluate their robustness with one another.
△ Less
Submitted 14 February, 2022; v1 submitted 11 February, 2022;
originally announced February 2022.
-
Hindi/Bengali Sentiment Analysis Using Transfer Learning and Joint Dual Input Learning with Self Attention
Authors:
Shahrukh Khan,
Mahnoor Shahid
Abstract:
Sentiment Analysis typically refers to using natural language processing, text analysis and computational linguistics to extract affect and emotion based information from text data. Our work explores how we can effectively use deep neural networks in transfer learning and joint dual input learning settings to effectively classify sentiments and detect hate speech in Hindi and Bengali data. We star…
▽ More
Sentiment Analysis typically refers to using natural language processing, text analysis and computational linguistics to extract affect and emotion based information from text data. Our work explores how we can effectively use deep neural networks in transfer learning and joint dual input learning settings to effectively classify sentiments and detect hate speech in Hindi and Bengali data. We start by training Word2Vec word embeddings for Hindi \textbf{HASOC dataset} and Bengali hate speech and then train LSTM and subsequently, employ parameter sharing based transfer learning to Bengali sentiment classifiers by reusing and fine-tuning the trained weights of Hindi classifiers with both classifier being used as baseline in our study. Finally, we use BiLSTM with self attention in joint dual input learning setting where we train a single neural network on Hindi and Bengali dataset simultaneously using their respective embeddings.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.
-
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description
Authors:
Mustafizur Shahid,
Hervé Debar
Abstract:
When a new computer security vulnerability is publicly disclosed, only a textual description of it is available. Cybersecurity experts later provide an analysis of the severity of the vulnerability using the Common Vulnerability Scoring System (CVSS). Specifically, the different characteristics of the vulnerability are summarized into a vector (consisting of a set of metrics), from which a severit…
▽ More
When a new computer security vulnerability is publicly disclosed, only a textual description of it is available. Cybersecurity experts later provide an analysis of the severity of the vulnerability using the Common Vulnerability Scoring System (CVSS). Specifically, the different characteristics of the vulnerability are summarized into a vector (consisting of a set of metrics), from which a severity score is computed. However, because of the high number of vulnerabilities disclosed everyday this process requires lot of manpower, and several days may pass before a vulnerability is analyzed. We propose to leverage recent advances in the field of Natural Language Processing (NLP) to determine the CVSS vector and the associated severity score of a vulnerability from its textual description in an explainable manner. To this purpose, we trained multiple BERT classifiers, one for each metric composing the CVSS vector. Experimental results show that our trained classifiers are able to determine the value of the metrics of the CVSS vector with high accuracy. The severity score computed from the predicted CVSS vector is also very close to the real severity score attributed by a human expert. For explainability purpose, gradient-based input saliency method was used to determine the most relevant input words for a given prediction made by our classifiers. Often, the top relevant words include terms in agreement with the rationales of a human cybersecurity expert, making the explanation comprehensible for end-users.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Quantum walk on a ladder
Authors:
Hira Ali,
M. Naeem Shahid
Abstract:
We study quantum walk on a ladder with combination of conventional and split-step protocols. The two components of the walk resulting from periodic boundary conditions can be made to have three kinds of probability distributions. Two of these are the one-sided and alternative ones. Using the differences between coin states of the individual component, we can simulate the third case in which both c…
▽ More
We study quantum walk on a ladder with combination of conventional and split-step protocols. The two components of the walk resulting from periodic boundary conditions can be made to have three kinds of probability distributions. Two of these are the one-sided and alternative ones. Using the differences between coin states of the individual component, we can simulate the third case in which both components have identical probability profiles. We also observe that the mutual information transfer between two components of the walk is minimized when this difference across the two sides of the ladder is maximized.
△ Less
Submitted 27 December, 2020;
originally announced December 2020.
-
On CR-statistical submanifolds of holomorphic statistical manifolds
Authors:
Aliya Naaz Siddiqui,
Falleh R. Al-Solamy,
Mohammad Hasan Shahid,
Ion Mihai
Abstract:
In the present paper, we investigate some properties of the distributions involved in the definition of a CR-statistical submanifold. The characterization of a CR-product in holomorphic statistical manifolds is given. By using an optimization technique, we establish a relationship between the Ricci curvature and the squared norm of the mean curvature of any submanifold in the same ambient space. T…
▽ More
In the present paper, we investigate some properties of the distributions involved in the definition of a CR-statistical submanifold. The characterization of a CR-product in holomorphic statistical manifolds is given. By using an optimization technique, we establish a relationship between the Ricci curvature and the squared norm of the mean curvature of any submanifold in the same ambient space. The equality case is also discussed here. This paper finishes with some related examples.
△ Less
Submitted 25 September, 2020;
originally announced September 2020.
-
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders
Authors:
Mustafizur Rahman Shahid,
Gregory Blanc,
Zonghua Zhang,
Hervé Debar
Abstract:
Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware are constantly evolving and getting more sophisticated. IoT devices are intended to perform very specific tasks, so their networking behavior is expected to be re…
▽ More
Nowadays, IoT devices have been widely deployed for enabling various smart services, such as, smart home or e-healthcare. However, security remains as one of the paramount concern as many IoT devices are vulnerable. Moreover, IoT malware are constantly evolving and getting more sophisticated. IoT devices are intended to perform very specific tasks, so their networking behavior is expected to be reasonably stable and predictable. Any significant behavioral deviation from the normal patterns would indicate anomalous events. In this paper, we present a method to detect anomalous network communications in IoT networks using a set of sparse autoencoders. The proposed approach allows us to differentiate malicious communications from legitimate ones. So that, if a device is compromised only malicious communications can be dropped while the service provided by the device is not totally interrupted. To characterize network behavior, bidirectional TCP flows are extracted and described using statistics on the size of the first N packets sent and received, along with statistics on the corresponding inter-arrival times between packets. A set of sparse autoencoders is then trained to learn the profile of the legitimate communications generated by an experimental smart home network. Depending on the value of N, the developed model achieves attack detection rates ranging from 86.9% to 91.2%, and false positive rates ranging from 0.1% to 0.5%.
△ Less
Submitted 26 December, 2019;
originally announced December 2019.
-
Water Preservation in Soan River Basin using Deep Learning Techniques
Authors:
Sadaqat ur Rehman,
Zhongliang Yang,
Muhammad Shahid,
Nan Wei,
Yongfeng Huang,
Muhammad Waqas,
Shanshan Tu,
Obaid ur Rehman
Abstract:
Water supplies are crucial for the development of living beings. However, change in the hydrological process i.e. climate and land usage are the key issues. Sustaining water level and accurate estimating for dynamic conditions is a critical job for hydrologists, but predicting hydrological extremes is an open issue. In this paper, we proposed two deep learning techniques and three machine learning…
▽ More
Water supplies are crucial for the development of living beings. However, change in the hydrological process i.e. climate and land usage are the key issues. Sustaining water level and accurate estimating for dynamic conditions is a critical job for hydrologists, but predicting hydrological extremes is an open issue. In this paper, we proposed two deep learning techniques and three machine learning algorithms to predict stream flow, given the present climate conditions. The results showed that the Recurrent Neural Network (RNN) or Long Short-term Memory (LSTM), an artificial neural network based method, outperform other conventional and machine-learning algorithms for predicting stream flow. Furthermore, we analyzed that stream flow is directly affected by precipitation, land usage, and temperature. These indexes are critical, which can be used by hydrologists to identify the potential for stream flow. We make the dataset publicly available (https://github.com/sadaqat007/Dataset) so that others should be able to replicate and build upon the results published.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.
-
Merger delay time distribution of extended emission short GRBs
Authors:
Nikhil Anand,
Mustafa Shahid,
Lekshmi Resmi
Abstract:
The most popular progenitor model for short duration Gamma-Ray bursts (sGRBs) is the merger of two compact objects. However, the short GRB population exhibit a certain diversity: some bursts display an extended emission (EE), continuing in soft $γ$-rays for a few hundreds of seconds post the initial short pulse. It is currently unclear whether the origin of such bursts is linked to compact object…
▽ More
The most popular progenitor model for short duration Gamma-Ray bursts (sGRBs) is the merger of two compact objects. However, the short GRB population exhibit a certain diversity: some bursts display an extended emission (EE), continuing in soft $γ$-rays for a few hundreds of seconds post the initial short pulse. It is currently unclear whether the origin of such bursts is linked to compact object mergers.
Within the merger hypothesis, the redshift ($z$) distribution of short GRBs is influenced by the merger delay time, i.e., time elapsed between the merger and the formation of the binary star system, which is dominated by the time-scale for gravitational wave losses during the compact binary phase. We examine redshift distributions of short GRBs with extended emission to see whether their formation channel requires considerable delay post the star formation episode. Our results show that the $z$ distribution of EE bursts is consistent with the merger model. We attempted to compare the delay time distribution of the EE and the non-EE short bursts. However, no statistically significant difference could be seen within the limited sample size.
△ Less
Submitted 13 October, 2017;
originally announced October 2017.
-
Effects of quantum statistical pressure and exchange correlation on the low frequency electromagnetic waves in degenerate Fermi-Dirac pair-ion plasma
Authors:
Zahida Ehsan,
M. Shahid,
Muhammad Ali Rana,
Mushtaq Ahmad,
Alireza Abdikian,
Atif Shahbaz
Abstract:
The low frequency, long wavelength electromagnetic waves, viz, shear Alfven wave in quantum electron-positron-ion magneto plasmas, have been examined using quantum magneto hydrodynamic model. In this model, we have considered electrons and positrons are to be magnetized as well as degenerate whereas ions are magnetized but classical. We have also included the effects of exchange correlation terms…
▽ More
The low frequency, long wavelength electromagnetic waves, viz, shear Alfven wave in quantum electron-positron-ion magneto plasmas, have been examined using quantum magneto hydrodynamic model. In this model, we have considered electrons and positrons are to be magnetized as well as degenerate whereas ions are magnetized but classical. We have also included the effects of exchange correlation terms which appear entirely the dynamic equations of electrons and positrons. The whole treatment is done using multi-fluid model. Our object is to study the shear Alfvén waves propagating in above said system of plasma. For that we have derived the modified dispersion relation of the shear Alfvén waves. Results are relevant to the terrestrial laboratory astrophysics.
△ Less
Submitted 23 September, 2017;
originally announced September 2017.
-
Simons' type formula for slant submanifolds of complex space form
Authors:
Aliya Naaz Siddiqui,
Mohammad Jamali,
Mohammad Hasan Shahid
Abstract:
In this paper, we study a slant submanifold of a complex space form. We also obtain an integral formula of Simons' type for a Kaehlerian slant submanifold in a complex space form and apply it to prove our main result.
In this paper, we study a slant submanifold of a complex space form. We also obtain an integral formula of Simons' type for a Kaehlerian slant submanifold in a complex space form and apply it to prove our main result.
△ Less
Submitted 8 June, 2020; v1 submitted 1 February, 2017;
originally announced February 2017.
-
Hemi-slant submanifolds of nearly Kaehler manifolds
Authors:
Mehraj Ahmad Lone,
Mohammad Hassan Shahid
Abstract:
In the present paper, we study the hemi-slant submanifolds of nearly Kaehler manifolds. We study the integrability of distributions involved in the definition of hemi-slant submanifolds. some results are worked out on totally umbilical hemi-slant submanifolds. we study the cohomology class for hemi-slant submanifolds of nearly Kaehler manifolds.
In the present paper, we study the hemi-slant submanifolds of nearly Kaehler manifolds. We study the integrability of distributions involved in the definition of hemi-slant submanifolds. some results are worked out on totally umbilical hemi-slant submanifolds. we study the cohomology class for hemi-slant submanifolds of nearly Kaehler manifolds.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
Transversal intersection of Hypersurfaces in R^5
Authors:
Mohamd Saleem Lone,
O. Aleessio,
Mohammad Jamali,
Mohammad Hasan Shahid
Abstract:
In this paper we present the algorithms for calculating the differential geometric properties {t,n,b1,b2,b3,k1,k2,k3,k4} along-with geodesic curvature and geodesic torsion of the transversal intersection curve of four hypersurfaces (given by parametric representation) in Euclidean space R^5. In transversal intersection the normals of the surfaces at the intersection point are linearly independent,…
▽ More
In this paper we present the algorithms for calculating the differential geometric properties {t,n,b1,b2,b3,k1,k2,k3,k4} along-with geodesic curvature and geodesic torsion of the transversal intersection curve of four hypersurfaces (given by parametric representation) in Euclidean space R^5. In transversal intersection the normals of the surfaces at the intersection point are linearly independent, while as in nontransversal intersection the normals of the surfaces at the intersection point are linearly dependent.
△ Less
Submitted 17 January, 2016;
originally announced January 2016.
-
Hemi-slant submanifolds of cosymplectic manifolds
Authors:
Mehraj Ahmad Lone,
Mohamd Saleem Lone,
Mohammad Hasan Shahid
Abstract:
In this paper we study the hemi-slant submanifolds of cosymplectic manifolds. Necessary and sufficient conditions for distributions to be integrable are worked out. Some important results are obtained in this direction.
In this paper we study the hemi-slant submanifolds of cosymplectic manifolds. Necessary and sufficient conditions for distributions to be integrable are worked out. Some important results are obtained in this direction.
△ Less
Submitted 4 March, 2016; v1 submitted 16 January, 2016;
originally announced January 2016.
-
On some inequalities for submanifolds of Bochner Kaehler manifolds
Authors:
Mehraj Ahmad Lone,
Mohammad Jamali,
Mohammad Hasan Shahid
Abstract:
B. Y. Chen established sharp inequalities between certain Riemannian invariants and the squared mean curvature for submanifolds in real space form as well as in complex space form. In this paper we generalize Chen inequalities for submanifolds of Bochner Kaehler manifolds. Moreover, we consider CR-warped product submanifolds of Bochner Kaehler manifold and establish an inequality for scalar curvat…
▽ More
B. Y. Chen established sharp inequalities between certain Riemannian invariants and the squared mean curvature for submanifolds in real space form as well as in complex space form. In this paper we generalize Chen inequalities for submanifolds of Bochner Kaehler manifolds. Moreover, we consider CR-warped product submanifolds of Bochner Kaehler manifold and establish an inequality for scalar curvature.
△ Less
Submitted 26 April, 2016; v1 submitted 16 January, 2016;
originally announced January 2016.
-
Ricci curvature for submanifolds of Bochner Kahler manifold
Authors:
Mehraj Ahmad Lone,
Mohammad Jamali,
Mohammad Hasan Shahid
Abstract:
B. Y. Chen establish the relationship between the Ricci curvature and the squared mean curvature for submanifolds of Riemannian space form with arbitrary codimension. In this paper, we generalize the relationship between the Ricci curvature and the squared norm of mean curvature vector for submanifolds of Bochner Kahler manifolds.
B. Y. Chen establish the relationship between the Ricci curvature and the squared mean curvature for submanifolds of Riemannian space form with arbitrary codimension. In this paper, we generalize the relationship between the Ricci curvature and the squared norm of mean curvature vector for submanifolds of Bochner Kahler manifolds.
△ Less
Submitted 16 January, 2016;
originally announced January 2016.
-
Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes
Authors:
Jeril Kuriakose,
Amruth V.,
Sandesh A. G.,
Jampu Venkata Naveenbabu,
Mohammed Shahid,
Ashish Shetty
Abstract:
Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nod…
▽ More
Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, its a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE), and Mahalanobis distance to obtain maximum accuracy in identifying malicious or cheating anchor nodes during localization. We were able to attain a considerable reduction in the error achieved during localization. For implementation purpose we simulated our scheme using ns-3 network simulator.
△ Less
Submitted 9 December, 2014;
originally announced December 2014.
-
Probing scalar mesons in semi-leptonic decays of $D_s^+$, $D^+$ and $D^0$
Authors:
Amir H. Fariborz,
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
With the primary motivation of probing the quark substructure of scalar mesons, a generalized linear sigma model for the lowest and the next-to-lowest scalar and pseudoscalar mesons is employed to investigate several semi-leptonic decays of $D$ mesons. The free parameters of the model (in its leading approximation) have been previously determined from fits to mass spectra and various low-energy pa…
▽ More
With the primary motivation of probing the quark substructure of scalar mesons, a generalized linear sigma model for the lowest and the next-to-lowest scalar and pseudoscalar mesons is employed to investigate several semi-leptonic decays of $D$ mesons. The free parameters of the model (in its leading approximation) have been previously determined from fits to mass spectra and various low-energy parameters. With these fixed parameters, the model has already given encouraging predictions for different low-energy decays and scattering, as well as for semileptonic decay channels of $D_s^+$ that include a scalar meson in the final state. In the present work, we apply the same model (in its leading order with the same fixed parameters) to different semi-leptonic decay channels of $D_s^+$, $D^+$ and $D^0$ and thereby further test the model and its predictions for the quark substructure of scalar mesons. We find that these predictions are in reasonable agreement with experiment.
△ Less
Submitted 26 July, 2014;
originally announced July 2014.
-
Note about lepton masses and mixings in two Ansatze
Authors:
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We consider two Ansatze for the neutrino masses and mixings in which the permutation symmetry is implemented in various orders. We discuss the possible see-saw mechanisms and the charged lepton masses for the two cases in the presence of a Higgs triplet and three Higgs doublets.
We consider two Ansatze for the neutrino masses and mixings in which the permutation symmetry is implemented in various orders. We discuss the possible see-saw mechanisms and the charged lepton masses for the two cases in the presence of a Higgs triplet and three Higgs doublets.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
An analytical treatment of the neutrino masses and mixings
Authors:
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We obtain analytical formulas which connect the neutrino masses and the leptonic mixing matrix with the entries in the mass matrix for the approximation in which the charged lepton mixing matrix is the unit matrix. We also extract the CP violation phase and determine the conditions in which this is present.
We obtain analytical formulas which connect the neutrino masses and the leptonic mixing matrix with the entries in the mass matrix for the approximation in which the charged lepton mixing matrix is the unit matrix. We also extract the CP violation phase and determine the conditions in which this is present.
△ Less
Submitted 9 December, 2013; v1 submitted 30 April, 2013;
originally announced April 2013.
-
Note about the implementation of finite symmetries in the lepton sector
Authors:
Renata Jora,
M. Naeem Shahid
Abstract:
Assuming that the leptonic mixing matrix is given in first approximation by the tribimaximal form we deduce some consequences with regard to the finite symmetries that may be applied in the minimal lepton sector of the electroweak theory.
Assuming that the leptonic mixing matrix is given in first approximation by the tribimaximal form we deduce some consequences with regard to the finite symmetries that may be applied in the minimal lepton sector of the electroweak theory.
△ Less
Submitted 9 December, 2013; v1 submitted 15 March, 2013;
originally announced March 2013.
-
Naturally perturbed S$_3$ neutrinos
Authors:
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We simplify and extend our previous model for the masses and mixing matrix of three Majorana neutrinos based on permutation symmetry $S_3$ and the perturbations which violate this symmetry. The perturbations are arranged such that we get the smaller solar neutrinos mass difference at second order. We work out the corrections to the tribimaximal mixing matrix with the non-zero value for $s_{13}$ an…
▽ More
We simplify and extend our previous model for the masses and mixing matrix of three Majorana neutrinos based on permutation symmetry $S_3$ and the perturbations which violate this symmetry. The perturbations are arranged such that we get the smaller solar neutrinos mass difference at second order. We work out the corrections to the tribimaximal mixing matrix with the non-zero value for $s_{13}$ and the conventional CP-violating phase. It is shown that the results of the model are comparable with the global analysis of neutrino oscillation data.
△ Less
Submitted 7 April, 2013; v1 submitted 25 October, 2012;
originally announced October 2012.
-
Absolute neutrino masses
Authors:
Joseph Schechter,
M. Naeem Shahid
Abstract:
We discuss the possibility of using experiments timing the propagation of neutrino beams over large distances to help determine the absolute masses of the three neutrinos.
We discuss the possibility of using experiments timing the propagation of neutrino beams over large distances to help determine the absolute masses of the three neutrinos.
△ Less
Submitted 20 July, 2012; v1 submitted 2 April, 2012;
originally announced April 2012.
-
Neutrinos with velocities greater than c ?
Authors:
Joseph Schechter,
M. Naeem Shahid
Abstract:
A possible explanation of the results of the OPERA experiment is presented. Assuming that the usual value of c should be interpreted as the velocity of light in dark matter, we call the "true" velocity of light in vacuum, $c_t$. Then the OPERA neutrinos can be faster than c but slower than $c_t$. We also discuss the relationship between $c_t$ and neutrino masses.
A possible explanation of the results of the OPERA experiment is presented. Assuming that the usual value of c should be interpreted as the velocity of light in dark matter, we call the "true" velocity of light in vacuum, $c_t$. Then the OPERA neutrinos can be faster than c but slower than $c_t$. We also discuss the relationship between $c_t$ and neutrino masses.
△ Less
Submitted 27 February, 2012; v1 submitted 20 January, 2012;
originally announced January 2012.
-
Semi-leptonic $D_s^+$(1968) decays as a scalar meson probe
Authors:
Amir H. Fariborz,
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
The unusual multiplet structures associated with the light spin zero mesons have recently attracted a good deal of theoretical attention. Here we discuss some aspects associated with the possibility of getting new experimental information on this topic from semi-leptonic decays of heavy charged mesons into an isosinglet scalar or pseudoscalar plus leptons.
The unusual multiplet structures associated with the light spin zero mesons have recently attracted a good deal of theoretical attention. Here we discuss some aspects associated with the possibility of getting new experimental information on this topic from semi-leptonic decays of heavy charged mesons into an isosinglet scalar or pseudoscalar plus leptons.
△ Less
Submitted 17 August, 2011;
originally announced August 2011.
-
Chiral Nonet Mixing in pi pi Scattering
Authors:
Amir H. Fariborz,
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
Pion pion scattering is studied in a generalized linear sigma model which contains two scalar nonets (one of quark-antiquark type and the other of diquark-antidiquark type) and two corresponding pseudoscalar nonets. An interesting feature concerns the mixing of the four isosinglet scalar mesons which yield poles in the scattering amplitude. Some realism is introduced by enforcing exact unitarity v…
▽ More
Pion pion scattering is studied in a generalized linear sigma model which contains two scalar nonets (one of quark-antiquark type and the other of diquark-antidiquark type) and two corresponding pseudoscalar nonets. An interesting feature concerns the mixing of the four isosinglet scalar mesons which yield poles in the scattering amplitude. Some realism is introduced by enforcing exact unitarity via the K-matrix method.
It is shown that a reasonable agreement with experimental data is obtained up to about 1 GeV. The poles in the unitarized scattering amplitude are studied in some detail. The lowest pole clearly represents the sigma meson (or f0(600)) with a mass and decay width around 500 MeV. The second pole invites comparison with the f0(980) which has a mass around 1 GeV and decay width around 100 MeV. The third and fourth poles, resemble some of the isosinglet state in the complicated 1-2 GeV region. Some comparison is made to the situation in the usual SU(3) linear sigma model with a single scalar nonet.
△ Less
Submitted 22 June, 2011;
originally announced June 2011.
-
Are three flavors special?
Authors:
Amir H. Fariborz,
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
It has become clearer recently that the regular pattern of three flavor nonets describing the low spin meson multiplets seems to require some modification for the case of the spin 0 scalar mesons. One picture which has had some success, treats the scalars in a chiral Lagrangian framework and considers them to populate two nonets. These are, in turn, taken to result from the mixing of two "bare" no…
▽ More
It has become clearer recently that the regular pattern of three flavor nonets describing the low spin meson multiplets seems to require some modification for the case of the spin 0 scalar mesons. One picture which has had some success, treats the scalars in a chiral Lagrangian framework and considers them to populate two nonets. These are, in turn, taken to result from the mixing of two "bare" nonets, one of which is of quark- antiquark type and the other of two quark- two antiquark type. Here we show that such a mixing is, before chiral symmetry breaking terms are included, only possible for three flavors. In other cases, the two types of structure can not have the same chiral symmetry transformation property. Specifically, our criterion would lead one to believe that scalar and pseudoscalar states containing charm would not have "four quark" admixtures.
This work is of potential interest for constructing chiral Lagrangians based on exact chiral symmetry which is then broken by well known specific terms. It may also be of interest in studying some kinds of technicolor theories.
△ Less
Submitted 21 December, 2010;
originally announced December 2010.
-
Doubly perturbed $S_3$ neutrinos and the $s_{13}$ mixing parameter
Authors:
Renata Jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We further study a predictive model for the masses and mixing matrix of three Majorana neutrinos. At zeroth order the model yielded degenerate neutrinos and a generalized ``tribimaximal" mixing matrix. At first order the mass
splitting was incorporated and the tribimaximal mixing matrix emerged with very small corrections but with a zero value for the parameter $s_{13}$. In the present paper a d…
▽ More
We further study a predictive model for the masses and mixing matrix of three Majorana neutrinos. At zeroth order the model yielded degenerate neutrinos and a generalized ``tribimaximal" mixing matrix. At first order the mass
splitting was incorporated and the tribimaximal mixing matrix emerged with very small corrections but with a zero value for the parameter $s_{13}$. In the present paper a different, assumed weaker, perturbation is included which gives a non zero value for $s_{13}$ and further corrections to other quantities. These corrections are worked out and their consequences discussed under the simplifying assumption that the conventional CP violation phase vanishes. It is shown that the existing measurements of the parameter $s_{23}$ provide strong bounds on $s_{13}$ in this model.
△ Less
Submitted 16 June, 2010;
originally announced June 2010.
-
Weighted Soft Decision for Cooperative Sensing in Cognitive Radio Networks
Authors:
Mohammad Iqbal Bin Shahid,
Joarder Kamruzzaman
Abstract:
Enhancing the current services or deploying new services operating in RF spectrum requires more licensed spectrum which may not be provided by the regulatory bodies because of spectrum scarcity. On the contrary, recent studies suggest that many portions of the licensed spectrum remains unused or underused for significant period of time raising the issue of spectru…
▽ More
Enhancing the current services or deploying new services operating in RF spectrum requires more licensed spectrum which may not be provided by the regulatory bodies because of spectrum scarcity. On the contrary, recent studies suggest that many portions of the licensed spectrum remains unused or underused for significant period of time raising the issue of spectrum access without license in an opportunistic manner. Among all the spectrum accessing techniques, sensing based methods are considered optimal for their simplicity and cost effectiveness. In this paper, we introduce a new cooperative spectrum sensing technique which considers the spatial variation of secondary (unlicensed) users and each user's contribution is weighted by a factor that depends on received power and path loss. Compared to existing techniques, the proposed one increases the sensing ability and spectrum utilization, and offers greater robustness to noise uncertainty. Moreover, this cooperative technique uses very simple energy detector as its building block thereby reduces the cost and operational complexity.
△ Less
Submitted 5 May, 2010;
originally announced May 2010.
-
Perturbed S3 neutrinos
Authors:
Renata jora,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We study the effects of the perturbation which violates the permutation symmetry of three Majorana neutrinos but preserves the well known (23) interchange symmetry. This is done in the presence of an arbitrary Majorana phase which serves to insure the degeneracy of the three neutrinos at the unperturbed level.
We study the effects of the perturbation which violates the permutation symmetry of three Majorana neutrinos but preserves the well known (23) interchange symmetry. This is done in the presence of an arbitrary Majorana phase which serves to insure the degeneracy of the three neutrinos at the unperturbed level.
△ Less
Submitted 16 December, 2010; v1 submitted 24 September, 2009;
originally announced September 2009.
-
Gauged linear sigma model and pion-pion scattering
Authors:
Amir H. Fariborz,
N. W. Park,
Joseph Schechter,
M. Naeem Shahid
Abstract:
A simple gauged linear sigma model with several parameters to take the symmetry breaking and the mass differences between the vector meson and the axial vector meson into account is considered here as a possibly useful template for the role of a light scalar in QCD as well as for (at a different scale) an effective Higgs sector for some recently proposed walking technicolor models. An analytic p…
▽ More
A simple gauged linear sigma model with several parameters to take the symmetry breaking and the mass differences between the vector meson and the axial vector meson into account is considered here as a possibly useful template for the role of a light scalar in QCD as well as for (at a different scale) an effective Higgs sector for some recently proposed walking technicolor models. An analytic procedure is first developed for relating the Lagrangian parameters to four well established (in the QCD application) experimental inputs. One simple equation distinguishes three different cases:1. QCD with axial vector particle heavier than vector particle, 2. possible technicolor model with vector particle heavier than the axial vector one, 3. the unphysical QCD case where both the KSRF and Weinberg relations hold. The model is applied to the s-wave pion-pion scattering in QCD. Both the near threshold region and (with an assumed unitarization) theglobal region up to about 800 MeV are considered. It is noted that there is a little tension between the choice of bare sigma mass parameter for describing these two regions. If a reasonable globa fit is made, there is some loss of precision in the near threshold region.
△ Less
Submitted 2 July, 2009;
originally announced July 2009.
-
Remark on pion scattering lengths
Authors:
Deirdre Black,
Amir H. Fariborz,
Renata Jora,
Nae Woong Park,
Joseph Schechter,
M. Naeem Shahid
Abstract:
First it is shown that the tree amplitude for pion pion scattering in the minimal linear sigma model has an exact expression which is proportional to a geometric series in the quantity (s-$m_π^2$)/($m_B^2-m_π^2$), where $m_B$ is the sigma mass which appears in the Lagrangian and is the only a priori unknown parameter in the model. This induces an infinite series for every predicted scattering le…
▽ More
First it is shown that the tree amplitude for pion pion scattering in the minimal linear sigma model has an exact expression which is proportional to a geometric series in the quantity (s-$m_π^2$)/($m_B^2-m_π^2$), where $m_B$ is the sigma mass which appears in the Lagrangian and is the only a priori unknown parameter in the model. This induces an infinite series for every predicted scattering length in which each term corresponds to a given order in the chiral perturbation theory counting.
It is noted that, perhaps surprisingly, the pattern, though not the exact values, of chiral perturbation theory predictions for both the isotopic spin 0 and isotopic spin 2 s-wave pion-pion scattering lengths to orders $p^2$, $p^4$ and $p^6$ seems to agree with this induced pattern. The values of the $p^8$ terms are also given for comparison with a possible future chiral perturation theory calculation. Further aspects of this approach and future directions are briefly discussed.
△ Less
Submitted 29 July, 2009; v1 submitted 14 April, 2009;
originally announced April 2009.
-
Simple two Higgs doublet model
Authors:
Renata Jora,
Sherif Moussa,
Salah Nasri,
Joseph Schechter,
M. Naeem Shahid
Abstract:
We study a simple two Higgs doublet model which reflects, in a phenomenological way, the idea of compositeness for the Higgs sector. It is relatively predictive. In one scenario, it allows for a "hidden" usual Higgs particle in the 100 GeV region and a possible dark matter candidate.
We study a simple two Higgs doublet model which reflects, in a phenomenological way, the idea of compositeness for the Higgs sector. It is relatively predictive. In one scenario, it allows for a "hidden" usual Higgs particle in the 100 GeV region and a possible dark matter candidate.
△ Less
Submitted 23 July, 2009; v1 submitted 2 May, 2008;
originally announced May 2008.