-
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks
Authors:
Shweta Shinde,
Zheng Leong Chua,
Viswesh Narayanan,
Prateek Saxena
Abstract:
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel. In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptograph…
▽ More
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel. In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptographic routines in OpenSSL and Libgcrypt --- leaking 27% on average and up to 100% of the secret bits in many case-studies. To mitigate this, we propose a software-only defense that masks page fault patterns by determinising the program's memory access behavior. We show that such a technique can be built into a compiler, and implement it for a subset of C which is sufficient to handle the cryptographic routines we study. This defense when implemented generically can have significant overhead of up to 4000X, but with help of developer-assisted compiler optimizations, the overhead reduces to at most 29.22% in our case studies. Finally, we discuss scope for hardware-assisted defenses, and show one solution that can reduce overheads to 6.77% with support from hardware changes.
△ Less
Submitted 12 January, 2016; v1 submitted 16 June, 2015;
originally announced June 2015.
-
Normalization based K means Clustering Algorithm
Authors:
Deepali Virmani,
Shweta Taneja,
Geetika Malhotra
Abstract:
K-means is an effective clustering technique used to separate similar data into groups based on initial centroids of clusters. In this paper, Normalization based K-means clustering algorithm(N-K means) is proposed. Proposed N-K means clustering algorithm applies normalization prior to clustering on the available data as well as the proposed approach calculates initial centroids based on weights. E…
▽ More
K-means is an effective clustering technique used to separate similar data into groups based on initial centroids of clusters. In this paper, Normalization based K-means clustering algorithm(N-K means) is proposed. Proposed N-K means clustering algorithm applies normalization prior to clustering on the available data as well as the proposed approach calculates initial centroids based on weights. Experimental results prove the betterment of proposed N-K means clustering algorithm over existing K-means clustering algorithm in terms of complexity and overall performance.
△ Less
Submitted 3 March, 2015;
originally announced March 2015.
-
An Optimal Bidimensional Multi-Armed Bandit Auction for Multi-unit Procurement
Authors:
Satyanath Bhat,
Shweta Jain,
Sujit Gujar,
Y. Narahari
Abstract:
We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent)…
▽ More
We study the problem of a buyer (aka auctioneer) who gains stochastic rewards by procuring multiple units of a service or item from a pool of heterogeneous strategic agents. The reward obtained for a single unit from an allocated agent depends on the inherent quality of the agent; the agent's quality is fixed but unknown. Each agent can only supply a limited number of units (capacity of the agent). The costs incurred per unit and capacities are private information of the agents. The auctioneer is required to elicit costs as well as capacities (making the mechanism design bidimensional) and further, learn the qualities of the agents as well, with a view to maximize her utility. Motivated by this, we design a bidimensional multi-armed bandit procurement auction that seeks to maximize the expected utility of the auctioneer subject to incentive compatibility and individual rationality while simultaneously learning the unknown qualities of the agents. We first assume that the qualities are known and propose an optimal, truthful mechanism 2D-OPT for the auctioneer to elicit costs and capacities. Next, in order to learn the qualities of the agents in addition, we provide sufficient conditions for a learning algorithm to be Bayesian incentive compatible and individually rational. We finally design a novel learning mechanism, 2D-UCB that is stochastic Bayesian incentive compatible and individually rational.
△ Less
Submitted 28 April, 2015; v1 submitted 24 February, 2015;
originally announced February 2015.
-
Probing the Physics of Narrow Line Regions in Active Galaxies III: Accretion and Cocoon Shocks in the LINER NGC1052
Authors:
Michael A. Dopita,
I-Ting Ho,
Linda L. Dressell,
Ralph Sutherland,
Lisa Kewley,
Rebecca Davies,
Elise Hampton,
Prajval Shastri,
Preeti Kharb,
Jessy Jose,
Harish Bhatt,
S. Ramya,
Julia Scharwächter,
Chichuan **,
Julie Banfield,
Ingyin Zaw,
Bethan James,
Stéphanie Juneau,
Shweta Srivastava
Abstract:
We present Wide Field Spectrograph (WiFeS) integral field spectroscopy and HST FOS spectroscopy for the LINER galaxy NGC 1052. We infer the presence of a turbulent accretion flow forming a small-scale accretion disk. We find a large-scale outflow and ionisation cone along the minor axis of the galaxy. Part of this outflow region is photoionised by the AGN, and shares properties with the ENLR of Se…
▽ More
We present Wide Field Spectrograph (WiFeS) integral field spectroscopy and HST FOS spectroscopy for the LINER galaxy NGC 1052. We infer the presence of a turbulent accretion flow forming a small-scale accretion disk. We find a large-scale outflow and ionisation cone along the minor axis of the galaxy. Part of this outflow region is photoionised by the AGN, and shares properties with the ENLR of Seyfert galaxies, but the inner ($R \lesssim 1.0$~arcsec) accretion disk and the region around the radio jet appear shock excited. The emission line properties can be modelled by a "double shock" model in which the accretion flow first passes through an accretion shock in the presence of a hard X-ray radiation, and the accretion disk is then processed through a cocoon shock driven by the overpressure of the radio jets. This model explains the observation of two distinct densities ($\sim10^4$ and $\sim10^6$ cm$^{-3}$), and provides a good fit to the observed emission line spectrum. We derive estimates for the velocities of the two shock components and their mixing fractions, the black hole mass, the accretion rate needed to sustain the LINER emission and derive an estimate for the jet power. Our emission line model is remarkably robust against variation of input parameters, and so offers a generic explanation for the excitation of LINER galaxies, including those of spiral type such as NGC 3031 (M81).
△ Less
Submitted 11 January, 2015;
originally announced January 2015.
-
Probing the Physics of Narrow Line Regions in Active Galaxies II: The Siding Spring Southern Seyfert Spectroscopic Snapshot Survey (S7)
Authors:
Michael A. Dopita,
Prajval Shastri,
Rebecca Davies,
Lisa Kewley,
Elise Hampton,
Julia Scharwächter,
Ralph Sutherland,
Preeti Kharb,
Jessy Jose,
Harish Bhatt,
S. Ramya,
Chichuan **,
Julie Banfield,
Ingyin Zaw,
Stéphanie Juneau,
Bethan James,
Shweta Srivastava
Abstract:
Here we describe the \emph{Siding Spring Southern Seyfert Spectroscopic Snapshot Survey} (S7) and present results on 64 galaxies drawn from the first data release. The S7 uses the Wide Field Spectrograph (WiFeS) mounted on the ANU 2.3m telescope located at the Siding Spring Observatory to deliver an integral field of $38\times25$~ arcsec at a spectral resolution of $R=7000$ in the red ($530-710$nm…
▽ More
Here we describe the \emph{Siding Spring Southern Seyfert Spectroscopic Snapshot Survey} (S7) and present results on 64 galaxies drawn from the first data release. The S7 uses the Wide Field Spectrograph (WiFeS) mounted on the ANU 2.3m telescope located at the Siding Spring Observatory to deliver an integral field of $38\times25$~ arcsec at a spectral resolution of $R=7000$ in the red ($530-710$nm), and $R=3000$ in the blue ($340-560$nm). {From these data cubes we have extracted the Narrow Line Region (NLR) spectra from a 4 arc sec aperture centred on the nucleus. We also determine the H$β$ and [OIII]~$λ$5007 fluxes in the narrow lines, the nuclear reddening, the reddening-corrected relative intensities of the observed emission lines, and the H$β$ and \lOIII\ luminosities {determined from spectra for which the stellar continuum has been removed.} We present a set of images of the galaxies in [OIII]~$λ$5007, [NII]~$λ$6584 and H$α$ which serve to delineate the spatial extent of the extended narrow line region (ENLR) and {\bf also to} reveal the structure and morphology of the surrounding \HII\ regions. Finally, we provide a preliminary discussion of those Seyfert~1 and Seyfert~2 galaxies which display coronal emission lines in order to explore the origin of these lines.
△ Less
Submitted 8 January, 2015;
originally announced January 2015.
-
Polarity detection movie reviews in hindi language
Authors:
Richa Sharma,
Shweta Nigam,
Rekha Jain
Abstract:
Nowadays peoples are actively involved in giving comments and reviews on social networking websites and other websites like shop** websites, news websites etc. large number of people everyday share their opinion on the web, results is a large number of user data is collected .users also find it trivial task to read all the reviews and then reached into the decision. It would be better if these r…
▽ More
Nowadays peoples are actively involved in giving comments and reviews on social networking websites and other websites like shop** websites, news websites etc. large number of people everyday share their opinion on the web, results is a large number of user data is collected .users also find it trivial task to read all the reviews and then reached into the decision. It would be better if these reviews are classified into some category so that the user finds it easier to read. Opinion Mining or Sentiment Analysis is a natural language processing task that mines information from various text forms such as reviews, news, and blogs and classify them on the basis of their polarity as positive, negative or neutral. But, from the last few years, user content in Hindi language is also increasing at a rapid rate on the Web. So it is very important to perform opinion mining in Hindi language as well. In this paper a Hindi language opinion mining system is proposed. The system classifies the reviews as positive, negative and neutral for Hindi language. Negation is also handled in the proposed system. Experimental results using reviews of movies show the effectiveness of the system
△ Less
Submitted 13 September, 2014;
originally announced September 2014.
-
S7 : Probing the physics of Seyfert Galaxies through their ENLR & HII Regions
Authors:
Michael A. Dopita,
Prajval Shastri,
Julia Scharwachter,
Lisa J. Kewley,
Rebecca Davies,
Ralph Sutherland,
Preeti Kharb,
Jessy Jose,
Harish Bhatt,
S. Ramya,
Elise Hampton,
Chichuan **,
Julie Banfield,
Ingyin Zaw,
Shweta Srivastava,
Bethan James
Abstract:
Here we present the first results from the Siding Spring Southern Seyfert Spectroscopic Snapshot Survey (S7) which aims to investigate the physics of ~140 radio-detected southern active Galaxies with z<0.02 through Integral Field Spectroscopy using the Wide Field Spectrograph (WiFeS). This instrument provides data cubes of the central 38 x 25 arc sec. of the target galaxies in the waveband 340-710…
▽ More
Here we present the first results from the Siding Spring Southern Seyfert Spectroscopic Snapshot Survey (S7) which aims to investigate the physics of ~140 radio-detected southern active Galaxies with z<0.02 through Integral Field Spectroscopy using the Wide Field Spectrograph (WiFeS). This instrument provides data cubes of the central 38 x 25 arc sec. of the target galaxies in the waveband 340-710nm with the unusually high resolution of R=7000 in the red (530-710nm), and R=3000 in the blue (340-560nm). These data provide the morphology, kinematics and the excitation structure of the extended narrow-line region, probe relationships with the black hole characteristics and the host galaxy, measures host galaxy abundance gradients and the determination of nuclear abundances from the HII regions. From photoionisation modelling, we may determine the shape of the ionising spectrum of the AGN, discover whether AGN metallicities differ from nuclear abundances determined from HII regions, and probe grain destruction in the vicinity of the AGN. Here we present some preliminary results and modelling of both Seyfert galaxies observed as part of the survey.
△ Less
Submitted 20 August, 2014;
originally announced August 2014.
-
Opinion mining of movie reviews at document level
Authors:
Richa Sharma,
Shweta Nigam,
Rekha Jain
Abstract:
The whole world is changed rapidly and using the current technologies Internet becomes an essential need for everyone. Web is used in every field. Most of the people use web for a common purpose like online shop**, chatting etc. During an online shop** large number of reviews/opinions are given by the users that reflect whether the product is good or bad. These reviews need to be explored, ana…
▽ More
The whole world is changed rapidly and using the current technologies Internet becomes an essential need for everyone. Web is used in every field. Most of the people use web for a common purpose like online shop**, chatting etc. During an online shop** large number of reviews/opinions are given by the users that reflect whether the product is good or bad. These reviews need to be explored, analyse and organized for better decision making. Opinion Mining is a natural language processing task that deals with finding orientation of opinion in a piece of text with respect to a topic. In this paper a document based opinion mining system is proposed that classify the documents as positive, negative and neutral. Negation is also handled in the proposed system. Experimental results using reviews of movies show the effectiveness of the system.
△ Less
Submitted 17 August, 2014;
originally announced August 2014.
-
Study of Computer Network Issues and Improvising Drop Rate of TCP Packet Using NS-2
Authors:
Shweta Gambhir,
Kuldeep Tomar
Abstract:
As the enormous use of internet increases day by day so as security concern is also raise day by day over the internet. In this paper we discuss the network security and its related threats and also study the types of protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node wired network scenario, its packet drop rate analysis through TCP protocol u…
▽ More
As the enormous use of internet increases day by day so as security concern is also raise day by day over the internet. In this paper we discuss the network security and its related threats and also study the types of protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator. Analyzed the performance of 5-node network when the packet is drop down by graphical method also called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by changing the value of rate parameter at same time so no packets would drop down at same time and also analyzed the performance by Xgraph method.
△ Less
Submitted 13 August, 2014;
originally announced August 2014.
-
Chemical Stability of Laponite in Aqueous Media
Authors:
Shweta Jatav,
Yogesh M Joshi
Abstract:
In this work stability of Laponite against dissolution in its aqueous dispersions is investigated as a function of initial pH of water before mixing Laponite, and concentration of Laponite. Dissolution of Laponite is quantified in terms of concentration of leached magnesium in the dispersions. Interestingly the solvent pH is observed to play no role in dissolution of Laponite in dispersion over th…
▽ More
In this work stability of Laponite against dissolution in its aqueous dispersions is investigated as a function of initial pH of water before mixing Laponite, and concentration of Laponite. Dissolution of Laponite is quantified in terms of concentration of leached magnesium in the dispersions. Interestingly the solvent pH is observed to play no role in dissolution of Laponite in dispersion over the explored range of 3 to 10. Furthermore, contrary to the usual belief that Laponite dissolves when pH of aqueous dispersion decreases below 9, dissolution of the same is observed even though dispersion pH is above 10 for low concentrations of Laponite (1 and 1.7 mass%). On the other hand, for dispersions having high concentration of Laponite (2.8 mass%) and pH in the similar range (>10) no dissolution is observed. Measurement of ionic conductivity of dispersion shows that concentration of sodium ions in dispersion increases with concentration of Laponite, which appears to have a role in preventing the dissolution of Laponite.
△ Less
Submitted 6 July, 2014;
originally announced July 2014.
-
An Incentive Compatible Multi-Armed-Bandit Crowdsourcing Mechanism with Quality Assurance
Authors:
Shweta Jain,
Sujit Gujar,
Satyanath Bhat,
Onno Zoeter,
Y. Narahari
Abstract:
Consider a requester who wishes to crowdsource a series of identical binary labeling tasks to a pool of workers so as to achieve an assured accuracy for each task, in a cost optimal way. The workers are heterogeneous with unknown but fixed qualities and their costs are private. The problem is to select for each task an optimal subset of workers so that the outcome obtained from the selected worker…
▽ More
Consider a requester who wishes to crowdsource a series of identical binary labeling tasks to a pool of workers so as to achieve an assured accuracy for each task, in a cost optimal way. The workers are heterogeneous with unknown but fixed qualities and their costs are private. The problem is to select for each task an optimal subset of workers so that the outcome obtained from the selected workers guarantees a target accuracy level. The problem is a challenging one even in a non strategic setting since the accuracy of aggregated label depends on unknown qualities. We develop a novel multi-armed bandit (MAB) mechanism for solving this problem. First, we propose a framework, Assured Accuracy Bandit (AAB), which leads to an MAB algorithm, Constrained Confidence Bound for a Non Strategic setting (CCB-NS). We derive an upper bound on the number of time steps the algorithm chooses a sub-optimal set that depends on the target accuracy level and true qualities. A more challenging situation arises when the requester not only has to learn the qualities of the workers but also elicit their true costs. We modify the CCB-NS algorithm to obtain an adaptive exploration separated algorithm which we call { \em Constrained Confidence Bound for a Strategic setting (CCB-S)}. CCB-S algorithm produces an ex-post monotone allocation rule and thus can be transformed into an ex-post incentive compatible and ex-post individually rational mechanism that learns the qualities of the workers and guarantees a given target accuracy level in a cost optimal way. We provide a lower bound on the number of times any algorithm should select a sub-optimal set and we see that the lower bound matches our upper bound upto a constant factor. We provide insights on the practical implementation of this framework through an illustrative example and we show the efficacy of our algorithms through simulations.
△ Less
Submitted 17 June, 2015; v1 submitted 27 June, 2014;
originally announced June 2014.
-
Mining of product reviews at aspect level
Authors:
Richa Sharma,
Shweta Nigam,
Rekha Jain
Abstract:
Todays world is a world of Internet, almost all work can be done with the help of it, from simple mobile phone recharge to biggest business deals can be done with the help of this technology. People spent their most of the times on surfing on the Web it becomes a new source of entertainment, education, communication, shop** etc. Users not only use these websites but also give their feedback and…
▽ More
Todays world is a world of Internet, almost all work can be done with the help of it, from simple mobile phone recharge to biggest business deals can be done with the help of this technology. People spent their most of the times on surfing on the Web it becomes a new source of entertainment, education, communication, shop** etc. Users not only use these websites but also give their feedback and suggestions that will be useful for other users. In this way a large amount of reviews of users are collected on the Web that needs to be explored, analyse and organized for better decision making. Opinion Mining or Sentiment Analysis is a Natural Language Processing and Information Extraction task that identifies the users views or opinions explained in the form of positive, negative or neutral comments and quotes underlying the text. Aspect based opinion mining is one of the level of Opinion mining that determines the aspect of the given reviews and classify the review for each feature. In this paper an aspect based opinion mining system is proposed to classify the reviews as positive, negative and neutral for each feature. Negation is also handled in the proposed system. Experimental results using reviews of products show the effectiveness of the system.
△ Less
Submitted 14 June, 2014;
originally announced June 2014.
-
GMRT radio continuum study of Wolf Rayet galaxies I: NGC 4214 and NGC 4449
Authors:
Shweta Srivastava,
Nimisha Kantharia,
Aritra Basu,
D. C. Srivastava,
S. Ananthakrishnan
Abstract:
We report low frequency observations of Wolf-Rayet galaxies, NGC 4214 and NGC 4449 at 610, 325 and 150 MHz, using the Giant Meterwave Radio Telescope (GMRT). We detect diffuse extended emission from NGC 4214 at and NGC 4449. NGC 4449 is observed to be five times more radio luminous than NGC 4214, indicating vigorous star formation. We estimate synchrotron spectral index after separating the therma…
▽ More
We report low frequency observations of Wolf-Rayet galaxies, NGC 4214 and NGC 4449 at 610, 325 and 150 MHz, using the Giant Meterwave Radio Telescope (GMRT). We detect diffuse extended emission from NGC 4214 at and NGC 4449. NGC 4449 is observed to be five times more radio luminous than NGC 4214, indicating vigorous star formation. We estimate synchrotron spectral index after separating the thermal free-free emission and obtain $α_{nt}=-0.63\pm0.04$ (S$\proptoν^{α_{nt}}$) for NGC 4214 and $-0.49\pm0.02$ for NGC 4449. About $22\%$ of the total radio emission from NGC 4214 and $\sim 9\%$ from NGC 4449 at 610 MHz is thermal in origin. We also study the spectra of two compact star-forming regions in NGC 4214 from 325 MHz to 15 GHz and obtain $α_{nt}=-0.32\pm0.02$ for NGC 4214-I and $α_{nt}=-0.94\pm0.12$ for NGC 4214-II. The luminosities of these star-forming regions ($\sim 10^{19}\rm W~ Hz^{-1}$) appear to be similar to those in circumnuclear rings in normal disk galaxies observed with similar linear resolution. We detect the supernova remnant SNR J1228+441 in NGC 4449 and estimate the spectral index of the emission between 325 and 610 MHz to be $-1.8$ in the epoch 2008-2009. The galaxies follow the radio-FIR correlation slopes suggesting that star formation in Wolf - Rayet galaxies, which are low-metallicity systems, are similar to that of normal disk galaxies.
△ Less
Submitted 27 May, 2014;
originally announced May 2014.
-
Opinion Mining In Hindi Language: A Survey
Authors:
Richa Sharma,
Shweta Nigam,
Rekha Jain
Abstract:
Opinions are very important in the life of human beings. These Opinions helped the humans to carry out the decisions. As the impact of the Web is increasing day by day, Web documents can be seen as a new source of opinion for human beings. Web contains a huge amount of information generated by the users through blogs, forum entries, and social networking websites and so on To analyze this large am…
▽ More
Opinions are very important in the life of human beings. These Opinions helped the humans to carry out the decisions. As the impact of the Web is increasing day by day, Web documents can be seen as a new source of opinion for human beings. Web contains a huge amount of information generated by the users through blogs, forum entries, and social networking websites and so on To analyze this large amount of information it is required to develop a method that automatically classifies the information available on the Web. This domain is called Sentiment Analysis and Opinion Mining. Opinion Mining or Sentiment Analysis is a natural language processing task that mine information from various text forms such as reviews, news, and blogs and classify them on the basis of their polarity as positive, negative or neutral. But, from the last few years, enormous increase has been seen in Hindi language on the Web. Research in opinion mining mostly carried out in English language but it is very important to perform the opinion mining in Hindi language also as large amount of information in Hindi is also available on the Web. This paper gives an overview of the work that has been done Hindi language.
△ Less
Submitted 19 April, 2014;
originally announced April 2014.
-
ALE-SUPG finite element method for convection-diffusion problems in time-dependent domains: Conservative form
Authors:
Sashikumaar Ganesan,
Shweta Srivastava
Abstract:
A Streamline Upwind Petrov-Galerkin (SUPG) finite element method for transient convection-diffusion-reaction equation in time-dependent domains is proposed. In particular, a convection dominated transient scalar problem is considered. The time-dependent domain is handled by the arbitrary Lagrangian-Eulerian (ALE) approach, whereas the SUPG finite element method is used for the spatial discretizati…
▽ More
A Streamline Upwind Petrov-Galerkin (SUPG) finite element method for transient convection-diffusion-reaction equation in time-dependent domains is proposed. In particular, a convection dominated transient scalar problem is considered. The time-dependent domain is handled by the arbitrary Lagrangian-Eulerian (ALE) approach, whereas the SUPG finite element method is used for the spatial discretization. Further, the first order backward Euler and the second order Crank-Nicolson methods are used for the temporal discretization. It is shown that the stability of the semidiscrete (continuous in time) conservative ALE-SUPG equation is independent of the mesh velocity, whereas the stability of the fully discrete problem is unconditionally stable for implicit Euler method and is only conditionally stable for Crank-Nicolson time discretization. Numerical results are presented to show the influence of the SUPG stabilization parameter in a time-dependent domain. Further, the proposed numerical scheme is applied to a boundary/layer problem in a time-dependent domain.
△ Less
Submitted 4 September, 2015; v1 submitted 14 April, 2014;
originally announced April 2014.
-
Rheological Signatures of Gelation and Effect of Shear Melting on Aging Colloidal Suspension
Authors:
Shweta Jatav,
Yogesh M Joshi
Abstract:
Colloidal suspensions that are out of thermodynamic equilibrium undergo physical aging wherein their structure evolves to lower the free energy. In aqueous suspension of Laponite, physical aging accompanies increases of elastic and viscous moduli as a function of time. In this work we study temporal evolution of elastic and viscous moduli at different frequencies and observe that freshly prepared…
▽ More
Colloidal suspensions that are out of thermodynamic equilibrium undergo physical aging wherein their structure evolves to lower the free energy. In aqueous suspension of Laponite, physical aging accompanies increases of elastic and viscous moduli as a function of time. In this work we study temporal evolution of elastic and viscous moduli at different frequencies and observe that freshly prepared aqueous suspension of Laponite demonstrates identical rheological behavior reported for the crosslinking polymeric materials undergoing chemical gelation. Consequently at a certain time tanδ is observed to be independent of frequency. However, for samples preserved under rest condition for longer duration before applying the shear melting, the liquid to solid transition subsequent to shear melting shows greater deviation from classical gelation. We also obtain continuous relaxation time spectra from the frequency dependence of viscous modulus. We observe that, with increase in the rest time, continuous relaxation time spectrum shows gradual variation from negative slope, describing dominance of fast relaxation modes to positive slope representing dominance of slow relaxation modes. We propose that the deviation from gelation behavior for the shear melted suspensions originates from inability of shear melting to completely break the percolated structure thereby creating unbroken aggregates. The volume fraction of such unbroken aggregates increases with the rest time. For small rest times presence of fewer number of unbroken aggregates cause deviation from the classical gelation. On the other hand, at high rest times presence of greater fraction of unbroken aggregates subsequent to shear melting demonstrate dynamic arrest leading to inversion of relaxation time spectra.
△ Less
Submitted 6 July, 2014; v1 submitted 5 March, 2014;
originally announced March 2014.
-
Adaptive Protocols for Interactive Communication
Authors:
Shweta Agrawal,
Ran Gelles,
Amit Sahai
Abstract:
How much adversarial noise can protocols for interactive communication tolerate? This question was examined by Braverman and Rao (IEEE Trans. Inf. Theory, 2014) for the case of "robust" protocols, where each party sends messages only in fixed and predetermined rounds. We consider a new class of non-robust protocols for Interactive Communication, which we call adaptive protocols. Such protocols ada…
▽ More
How much adversarial noise can protocols for interactive communication tolerate? This question was examined by Braverman and Rao (IEEE Trans. Inf. Theory, 2014) for the case of "robust" protocols, where each party sends messages only in fixed and predetermined rounds. We consider a new class of non-robust protocols for Interactive Communication, which we call adaptive protocols. Such protocols adapt structurally to the noise induced by the channel in the sense that both the order of speaking, and the length of the protocol may vary depending on observed noise.
We define models that capture adaptive protocols and study upper and lower bounds on the permissible noise rate in these models. When the length of the protocol may adaptively change according to the noise, we demonstrate a protocol that tolerates noise rates up to $1/3$. When the order of speaking may adaptively change as well, we demonstrate a protocol that tolerates noise rates up to $2/3$. Hence, adaptivity circumvents an impossibility result of $1/4$ on the fraction of tolerable noise (Braverman and Rao, 2014).
△ Less
Submitted 7 August, 2015; v1 submitted 15 December, 2013;
originally announced December 2013.
-
Cable Fault Monitoring and Indication: A Review
Authors:
Shweta Gajbhiye,
S. P. Karmore
Abstract:
Underground cable power transmission and distribution system are susceptible to faults. Accurate fault location for transmission lines is of vital importance. A quick detection and analysis of faults is necessity of power retailers and distributors. This paper reviews various fault locating methods and highly computational methods proposed by research community that are currently in use. The paper…
▽ More
Underground cable power transmission and distribution system are susceptible to faults. Accurate fault location for transmission lines is of vital importance. A quick detection and analysis of faults is necessity of power retailers and distributors. This paper reviews various fault locating methods and highly computational methods proposed by research community that are currently in use. The paper also presents some guidelines for design of fault location and remote indication, for reducing power outages and reducing heavy loss of revenue.
△ Less
Submitted 21 September, 2013;
originally announced September 2013.
-
Increasing Herd Immunity with Influenza Revaccination
Authors:
Eric Mooring,
Shweta Bansal
Abstract:
Seasonal influenza is a significant public health concern in the United States and globally. While influenza vaccines are the single most effective intervention to reduce influenza morbidity and mortality, there is considerable debate surrounding the merits and consequences of repeated seasonal vaccination. Here, we describe a two-season influenza epidemic contact network model and use it to demon…
▽ More
Seasonal influenza is a significant public health concern in the United States and globally. While influenza vaccines are the single most effective intervention to reduce influenza morbidity and mortality, there is considerable debate surrounding the merits and consequences of repeated seasonal vaccination. Here, we describe a two-season influenza epidemic contact network model and use it to demonstrate that increasing the level of continuity in vaccination across seasons reduces the burden on public health. We show that revaccination reduces the influenza attack rate not only because it reduces the overall number of susceptible individuals, but also because it better protects highly-connected individuals, who would otherwise make a disproportionately large contribution to influenza transmission. Our work thus contributes a population-level perspective to debates about the merits of repeated influenza vaccination and advocates for public health policy to incorporate individual vaccine histories.
△ Less
Submitted 5 January, 2015; v1 submitted 24 August, 2013;
originally announced August 2013.
-
Thermally Activated Asymmetric Structural Recovery in a Soft Glassy Nano-Clay Suspension
Authors:
Tanmay P. Dhavale,
Shweta Jatav,
Yogesh M Joshi
Abstract:
In this work we study structural recovery of a soft glassy Laponite suspension by monitoring temporal evolution of elastic modulus under isothermal conditions as well as following step temperature jumps. Interestingly, evolution behavior under isothermal conditions indicates the rate, and not the path of structural recovery, to be dependent on temperature. The experiments carried out under tempera…
▽ More
In this work we study structural recovery of a soft glassy Laponite suspension by monitoring temporal evolution of elastic modulus under isothermal conditions as well as following step temperature jumps. Interestingly, evolution behavior under isothermal conditions indicates the rate, and not the path of structural recovery, to be dependent on temperature. The experiments carried out under temperature jump conditions however trace a different path of structural recovery, which shows strong dependence on temperature and the direction of change. Further investigation of the system suggests that this behavior can be attributed to restricted mobility of counterions associated with Laponite particle at the time of temperature change, which do not allow counterion concentration to reach equilibrium value associated with the changed temperature. Interestingly this effect is observed to be comparable with other glassy molecular and soft materials, which while evolve in a self-similar fashion under isothermal conditions, show asymmetric behavior upon temperature change.
△ Less
Submitted 24 June, 2013;
originally announced June 2013.
-
Image Optimization and Prediction
Authors:
Shweta Jain,
Urmila Shrawankar
Abstract:
Image Processing, Optimization and Prediction of an Image play a key role in Computer Science. Image processing provides a way to analyze and identify an image .Many areas like medical image processing, Satellite images, natural images and artificial images requires lots of analysis and research on optimization. In Image Optimization and Prediction we are combining the features of Query Optimizati…
▽ More
Image Processing, Optimization and Prediction of an Image play a key role in Computer Science. Image processing provides a way to analyze and identify an image .Many areas like medical image processing, Satellite images, natural images and artificial images requires lots of analysis and research on optimization. In Image Optimization and Prediction we are combining the features of Query Optimization, Image Processing and Prediction . Image optimization is used in Pattern analysis, object recognition, in medical Image processing to predict the type of diseases, in satellite images for predicting weather forecast, availability of water or mineral etc. Image Processing, Optimization and analysis is a wide open area for research .Lots of research has been conducted in the area of Image analysis and many techniques are available for image analysis but, a single technique is not yet identified for image analysis and prediction .our research is focused on identifying a global technique for image analysis and Prediction.
△ Less
Submitted 10 May, 2013;
originally announced May 2013.
-
Using data mining techniques for diagnosis and prognosis of cancer disease
Authors:
Shweta Kharya
Abstract:
Breast cancer is one of the leading cancers for women in developed countries including India. It is the second most common cause of cancer death in women. The high incidence of breast cancer in women has increased significantly in the last years. In this paper we have discussed various data mining approaches that have been utilized for breast cancer diagnosis and prognosis. Breast Cancer Diagnosis…
▽ More
Breast cancer is one of the leading cancers for women in developed countries including India. It is the second most common cause of cancer death in women. The high incidence of breast cancer in women has increased significantly in the last years. In this paper we have discussed various data mining approaches that have been utilized for breast cancer diagnosis and prognosis. Breast Cancer Diagnosis is distinguishing of benign from malignant breast lumps and Breast Cancer Prognosis predicts when Breast Cancer is to recur in patients that have had their cancers excised. This study paper summarizes various review and technical articles on breast cancer diagnosis and prognosis also we focus on current research being carried out using the data mining techniques to enhance the breast cancer diagnosis and prognosis.
△ Less
Submitted 9 May, 2012;
originally announced May 2012.
-
Adjacency Matrix Based Energy Efficient Scheduling using S-MAC Protocol in Wireless Sensor Networks
Authors:
Shweta Singh,
Ravindara Bhatt
Abstract:
Communication is the main motive in any Networks whether it is Wireless Sensor Network, Ad-Hoc networks, Mobile Networks, Wired Networks, Local Area Network, Metropolitan Area Network, Wireless Area Network etc, hence it must be energy efficient. The main parameters for energy efficient communication are maximizing network lifetime, saving energy at the different nodes, sending the packets in mini…
▽ More
Communication is the main motive in any Networks whether it is Wireless Sensor Network, Ad-Hoc networks, Mobile Networks, Wired Networks, Local Area Network, Metropolitan Area Network, Wireless Area Network etc, hence it must be energy efficient. The main parameters for energy efficient communication are maximizing network lifetime, saving energy at the different nodes, sending the packets in minimum time delay, higher throughput etc. This paper focuses mainly on the energy efficient communication with the help of Adjacency Matrix in the Wireless Sensor Networks. The energy efficient scheduling can be done by putting the idle node in to sleep node so energy at the idle node can be saved. The proposed model in this paper first forms the adjacency matrix and broadcasts the information about the total number of existing nodes with depths to the other nodes in the same cluster from controller node. When every node receives the node information about the other nodes for same cluster they communicate based on the shortest depths and schedules the idle node in to sleep mode for a specific time threshold so energy at the idle nodes can be saved.
△ Less
Submitted 4 April, 2012;
originally announced April 2012.
-
Power series with Taylor coefficients of sum-product type and algebraic differential equations /SP-series and the interplay between their resurgence and differential properties
Authors:
Shweta Sharma
Abstract:
The article is based on the differential properties of the inner generators (singularities) that occur while handling SP series (sum product series), power series whose Taylor coefficients can be written as sum-product combinations. It is an elaboration with numerical details and some explicit calculations of the chapter 6 of the joint article with Ecalle on these series. For all polynomial inputs…
▽ More
The article is based on the differential properties of the inner generators (singularities) that occur while handling SP series (sum product series), power series whose Taylor coefficients can be written as sum-product combinations. It is an elaboration with numerical details and some explicit calculations of the chapter 6 of the joint article with Ecalle on these series. For all polynomial inputs $f$ and all monomial inputs $F$, the inner generators corresponding to them verify ordinary differential equations of linear homogeneous type with polynomial coefficients. Numerical results strongly suggest the non-existence of ODEs for functions $F$ that are rational but not monomial, i.e. not of the form ${(1-ax)}^p$, for $p \in \mathbb{Z}$.
△ Less
Submitted 25 January, 2012;
originally announced January 2012.
-
Incorporating Agile with MDA Case Study: Online Polling System
Authors:
Pritha Guha,
Kinjal Shah,
Shiv Shankar Prasad Shukla,
Shweta Singh
Abstract:
Nowadays agile software development is used in greater extend but for small organizations only, whereas MDA is suitable for large organizations but yet not standardized. In this paper the pros and cons of Model Driven Architecture (MDA) and Extreme programming have been discussed. As both of them have some limitations and cannot be used in both large scale and small scale organizations a new archi…
▽ More
Nowadays agile software development is used in greater extend but for small organizations only, whereas MDA is suitable for large organizations but yet not standardized. In this paper the pros and cons of Model Driven Architecture (MDA) and Extreme programming have been discussed. As both of them have some limitations and cannot be used in both large scale and small scale organizations a new architecture has been proposed. In this model it is tried to opt the advantages and important values to overcome the limitations of both the software development procedures. In support to the proposed architecture the implementation of it on Online Polling System has been discussed and all the phases of software development have been explained.
△ Less
Submitted 31 October, 2011;
originally announced October 2011.
-
Intrinsic Reliability improvement in Biaxially Strained SiGe p-MOSFETs
Authors:
Shweta Deora,
Abhijeet Paul,
R. Bijesh,
Jeff Huang,
Gerhard Klimeck,
Gennadi Bersuker,
P. D. Krisch,
Raj Jammy
Abstract:
In this letter we not only show improvement in the performance but also in the reliability of 30nm thick biaxially strained SiGe (20%Ge) channel on Si p-MOSFETs. Compared to Si channel, strained SiGe channel allows larger hole mobility (μh) in the transport direction and alleviates charge flow towards the gate oxide. μh enhancement by 40% in SiGe and 100% in Si-cap SiGe is observed compared to the…
▽ More
In this letter we not only show improvement in the performance but also in the reliability of 30nm thick biaxially strained SiGe (20%Ge) channel on Si p-MOSFETs. Compared to Si channel, strained SiGe channel allows larger hole mobility (μh) in the transport direction and alleviates charge flow towards the gate oxide. μh enhancement by 40% in SiGe and 100% in Si-cap SiGe is observed compared to the Si hole universal mobility. A ~40% reduction in NBTI degradation, gate leakage and flicker noise (1/f) is observed which is attributed to a 4% increase in the hole-oxide barrier height (φ) in SiGe. Similar field acceleration factor (Γ) for threshold voltage shift (ΔVT) and increase in noise (ΔSVG) in Si and SiGe suggests identical degradation mechanisms.
△ Less
Submitted 13 December, 2010; v1 submitted 7 December, 2010;
originally announced December 2010.
-
Rectangular and Circular Antenna Design on Thick Substrate
Authors:
Harsh kumar,
Shweta Srivastava
Abstract:
Millimeter wave technology being an emerging area is still very undeveloped. A substantial research needs to be done in this area as its applications are numerous. In the present endeavor, a rectangular patch antenna is designed on thick substrate and simulated using SONNET software, also a novel analysis technique is developed for circular patch antenna for millimeter wave frequency. The antenna…
▽ More
Millimeter wave technology being an emerging area is still very undeveloped. A substantial research needs to be done in this area as its applications are numerous. In the present endeavor, a rectangular patch antenna is designed on thick substrate and simulated using SONNET software, also a novel analysis technique is developed for circular patch antenna for millimeter wave frequency. The antenna is designed at 39 GHz on thick substrate and has been analyzed and simulated.The results of the theoretical analysis are in good agreement with the simulated results.
△ Less
Submitted 4 June, 2010;
originally announced June 2010.
-
Optimum Design of a 4x4 Planar Butler Matrix Array for WLAN Application
Authors:
Wriddhi Bhowmik,
Shweta Srivastava
Abstract:
In recent years, high-speed wireless communication is in vogue. In wireless communication systems, multipath fading, delay and interference occurres by reflection or diffraction. In a high-speed wireless communication, it becomes a necessary to separate desired signal from delay or interference signal. Thus to overcome these problems Smart antenna systems have been developed. Basically there are t…
▽ More
In recent years, high-speed wireless communication is in vogue. In wireless communication systems, multipath fading, delay and interference occurres by reflection or diffraction. In a high-speed wireless communication, it becomes a necessary to separate desired signal from delay or interference signal. Thus to overcome these problems Smart antenna systems have been developed. Basically there are two types of smart antenna systems, one is Switched beam system and another Adaptive array system.This paper presents the optimum design of a 4x4 plannar Butler matrix array as a key component of a switched beam smart antenna system, operating at 5.2 GHz for WLAN with a dielectric substrate, FR4 of er =4.9 and h=1.6mm. Conception details, simulation results and measurements are also given for the components (microstrip antenna, hybrid couplers, cross-coupler, phase shifter) used to implement the matrix. In this dissertation, mathematical calculations for all the components using MATLAB is done and then every individual component is designed using the commercial software SONNET. Then these entire components have been combined on a single substrate and simulated using SONNET.
△ Less
Submitted 26 April, 2010;
originally announced April 2010.
-
Power series with sum-product Taylor coefficients and their resurgence algebra
Authors:
Jean Ecalle,
Shweta Sharma
Abstract:
The present paper is devoted to power series of SP type, i.e. with coefficients that are syntactically sum-product combinations. Apart from their applications to analytic knot theory and the so-called "Volume Conjecture", SP-series are interesting in their own right, on at least four counts: (i) they generate quite distinctive resurgence algebras (ii) they are one of those relatively rare instan…
▽ More
The present paper is devoted to power series of SP type, i.e. with coefficients that are syntactically sum-product combinations. Apart from their applications to analytic knot theory and the so-called "Volume Conjecture", SP-series are interesting in their own right, on at least four counts: (i) they generate quite distinctive resurgence algebras (ii) they are one of those relatively rare instances when the resurgence properties have to be derived directly from the Taylor coefficients (iii) some of them produce singularities that unexpectedly verify finite-order differential equations (iv) all of them are best handled with the help of two remarkable, infinite-order integral-differential transforms, "mir" and "nir".
△ Less
Submitted 1 March, 2010; v1 submitted 18 December, 2009;
originally announced December 2009.
-
The Impact of Past Epidemics on Future Disease Dynamics
Authors:
Shweta Bansal,
Lauren Ancel Meyers
Abstract:
Many pathogens spread primarily via direct contact between infected and susceptible hosts. Thus, the patterns of contacts or contact network of a population fundamentally shapes the course of epidemics. While there is a robust and growing theory for the dynamics of single epidemics in networks, we know little about the impacts of network structure on long term epidemic or endemic transmission. F…
▽ More
Many pathogens spread primarily via direct contact between infected and susceptible hosts. Thus, the patterns of contacts or contact network of a population fundamentally shapes the course of epidemics. While there is a robust and growing theory for the dynamics of single epidemics in networks, we know little about the impacts of network structure on long term epidemic or endemic transmission. For seasonal diseases like influenza, pathogens repeatedly return to populations with complex and changing patterns of susceptibility and immunity acquired through prior infection. Here, we develop two mathematical approaches for modeling consecutive seasonal outbreaks of a partially-immunizing infection in a population with contact heterogeneity. Using methods from percolation theory we consider both leaky immunity, where all previously infected individuals gain partial immunity, and perfect immunity, where a fraction of previously infected individuals are fully immune. By restructuring the epidemiologically active portion of their host population, such diseases limit the potential of future outbreaks. We speculate that these dynamics can result in evolutionary pressure to increase infectiousness.
△ Less
Submitted 12 October, 2009;
originally announced October 2009.
-
On Algebraic Traceback in Dynamic Networks
Authors:
Abhik Das,
Shweta Agarwal,
Sriram Vishwanath
Abstract:
This paper introduces the concept of incremental traceback for determining changes in the trace of a network as it evolves with time. A distributed algorithm, based on the methodology of algebraic traceback developed by Dean et al, is proposed which can completely determine a path of d nodes/routers using O(d) marked packets, and subsequently determine the changes in its topology using O(log d)…
▽ More
This paper introduces the concept of incremental traceback for determining changes in the trace of a network as it evolves with time. A distributed algorithm, based on the methodology of algebraic traceback developed by Dean et al, is proposed which can completely determine a path of d nodes/routers using O(d) marked packets, and subsequently determine the changes in its topology using O(log d) marked packets with high probability. The algorithm is established to be order-wise optimal i.e., no other distributed algorithm can determine changes in the path topology using lesser order of bits (i.e., marked packets). The algorithm is shown to have a computational complexity of O(d log d), which is significantly less than that of any existing non-incremental algorithm of algebraic traceback. Extensions of this algorithm to settings with node identity spoofing and network coding are also presented.
△ Less
Submitted 19 January, 2010; v1 submitted 1 August, 2009;
originally announced August 2009.
-
Dirac oscillator in an external magnetic field
Authors:
Bhabani Prasad Mandal,
Shweta Verma
Abstract:
We show that 2+1 dimensional Dirac oscillators in an external magnetic field is mapped onto the same with reduced angular frequency in absence of magnetic field. This can be used to study the atomic transitions in a radiation field. Relativistic Landau levels are constructed explicitly. Several interesting features of this system are discussed.
We show that 2+1 dimensional Dirac oscillators in an external magnetic field is mapped onto the same with reduced angular frequency in absence of magnetic field. This can be used to study the atomic transitions in a radiation field. Relativistic Landau levels are constructed explicitly. Several interesting features of this system are discussed.
△ Less
Submitted 19 December, 2009; v1 submitted 27 July, 2009;
originally announced July 2009.
-
On the Secrecy Rate of Interference Networks using structured codes
Authors:
Shweta Agrawal,
Sriram Vishwanath
Abstract:
This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. For a class of interference channels, we show that an equivocation sumrate that is within two bits of the maxim…
▽ More
This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. For a class of interference channels, we show that an equivocation sumrate that is within two bits of the maximum possible legitimate communication sum-rate is achievable using lattice codes.
△ Less
Submitted 13 May, 2009;
originally announced May 2009.
-
Quantification of Biological Robustness at the Systemic Level
Authors:
Aniket Magarkar,
Anirban Banerji,
Shweta Kolhi
Abstract:
Biological systems possess negative entropy. In them, one form of order produces another, more organized form of order. We propose a formal scheme to calculate robustness of an entire biological system by quantifying the negative entropy present in it. Our Methodology is based upon a computational implementation of two-person non-cooperative finite zero-sum game between positive (physico-chemical)…
▽ More
Biological systems possess negative entropy. In them, one form of order produces another, more organized form of order. We propose a formal scheme to calculate robustness of an entire biological system by quantifying the negative entropy present in it. Our Methodology is based upon a computational implementation of two-person non-cooperative finite zero-sum game between positive (physico-chemical) and negative (biological) entropy, present in the system(TCA cycle, for this work). Biochemical analogue of Nash equilibrium, proposed here, could measure the robustness in TCA cycle in exact numeric terms, whereas the mixed strategy game between these entropies could quantitate the progression of stages of biological adaptation. Synchronization profile amongst macromolecular concentrations (even under environmental perturbations) is found to account for negative entropy and biological robustness. Emergence of synchronization profile was investigated with dynamically varying metabolite concentrations. Obtained results were verified with that from the deterministic simulation methods. Categorical plans to apply this algorithm in Cancer studies and anti-viral therapies are proposed alongside. From theoretical perspective, this work proposes a general, rigorous and alternative view of immunology.
△ Less
Submitted 20 December, 2011; v1 submitted 27 March, 2009;
originally announced March 2009.
-
Evolving Clustered Random Networks
Authors:
Shweta Bansal,
Shashank Khandelwal,
Lauren Ancel Meyers
Abstract:
We propose a Markov chain simulation method to generate simple connected random graphs with a specified degree sequence and level of clustering. The networks generated by our algorithm are random in all other respects and can thus serve as generic models for studying the impacts of degree distributions and clustering on dynamical processes as well as null models for detecting other structural pr…
▽ More
We propose a Markov chain simulation method to generate simple connected random graphs with a specified degree sequence and level of clustering. The networks generated by our algorithm are random in all other respects and can thus serve as generic models for studying the impacts of degree distributions and clustering on dynamical processes as well as null models for detecting other structural properties in empirical networks.
△ Less
Submitted 4 August, 2008;
originally announced August 2008.
-
On a new unified integral
Authors:
Mridula Garg,
Shweta Mittal
Abstract:
In the present paper we derive a unified new integral whose integrand contains products of Fox $H$-function and a general class of polynomials having general arguments. A large number of integrals involving various simpler functions follow as special cases of this integral.
In the present paper we derive a unified new integral whose integrand contains products of Fox $H$-function and a general class of polynomials having general arguments. A large number of integrals involving various simpler functions follow as special cases of this integral.
△ Less
Submitted 26 July, 2006;
originally announced July 2006.
-
A Comparative Analysis of Influenza Vaccination Programs
Authors:
Shweta Bansal,
Babak Pourbohloul,
Lauren Ancel Meyers
Abstract:
The threat of avian influenza and the 2004-2005 influenza vaccine supply shortage in the United States has sparked a debate about optimal vaccination strategies to reduce the burden of morbidity and mortality caused by the influenza virus. We present a comparative analysis of two classes of suggested vaccination strategies: mortality-based strategies that target high risk populations and morbidi…
▽ More
The threat of avian influenza and the 2004-2005 influenza vaccine supply shortage in the United States has sparked a debate about optimal vaccination strategies to reduce the burden of morbidity and mortality caused by the influenza virus. We present a comparative analysis of two classes of suggested vaccination strategies: mortality-based strategies that target high risk populations and morbidity-based that target high prevalence populations. Applying the methods of contact network epidemiology to a model of disease transmission in a large urban population, we evaluate the efficacy of these strategies across a wide range of viral transmission rates and for two different age-specific mortality distributions. We find that the optimal strategy depends critically on the viral transmission level (reproductive rate) of the virus: morbidity-based strategies outperform mortality-based strategies for moderately transmissible strains, while the reverse is true for highly transmissible strains. These results hold for a range of mortality rates reported for prior influenza epidemics and pandemics. Furthermore, we show that vaccination delays and multiple introductions of disease into the community have a more detrimental impact on morbidity-based strategies than mortality-based strategies. If public health officials have reasonable estimates of the viral transmission rate and the frequency of new introductions into the community prior to an outbreak, then these methods can guide the design of optimal vaccination priorities. When such information is unreliable or not available, as is often the case, this study recommends mortality-based vaccination priorities.
△ Less
Submitted 3 October, 2006; v1 submitted 22 January, 2006;
originally announced January 2006.
-
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
Authors:
Derek Messie,
Mina Jung,
Jae C. Oh,
Shweta Shetty,
Steven Nordstrom,
Michael Haney
Abstract:
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight self-optimizing agents embedded within Level 1 of the prototype are responsible for proactive and reactive monitoring and mitigation based on specified layers of competence. The agents are self-protecting, detecting ca…
▽ More
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight self-optimizing agents embedded within Level 1 of the prototype are responsible for proactive and reactive monitoring and mitigation based on specified layers of competence. The agents are self-protecting, detecting cascading failures using a distributed approach. Adaptive, reconfigurable, and mobile objects for reliablility are designed to be self-configuring to adapt automatically to dynamically changing environments. These objects provide a self-healing layer with the ability to discover, diagnose, and react to discontinuities in real-time processing. A generic modeling environment was developed to facilitate design and implementation of hardware resource specifications, application data flow, and failure mitigation strategies. Level 1 of the planned BTeV trigger system alone will consist of 2500 DSPs, so the number of components and intractable fault scenarios involved make it impossible to design an `expert system' that applies traditional centralized mitigative strategies based on rules capturing every possible system state. Instead, a distributed reactive approach is implemented using the tools and methodologies developed by the Real-Time Embedded Systems group.
△ Less
Submitted 29 April, 2005;
originally announced April 2005.