-
Optimization of 3-D flight trajectory of variable trim kites for airborne wind energy production
Authors:
Rafal Noga,
Xaver Paulig,
Lukas Schmidt,
Benjamin Karg,
Manfred Quack,
Mahmoud Soliman
Abstract:
Skysails Power GmbH is the leading manufacturer of light and efficient power kites that harness the wind's untapped supplies at high altitudes, aiming at profoundly altering wind energy's impact in achieving the global energy transition. Novel, variable trim kites have been developed that allow to modulate the aerodynamic coefficients of the airborne system, significantly improving the overall sys…
▽ More
Skysails Power GmbH is the leading manufacturer of light and efficient power kites that harness the wind's untapped supplies at high altitudes, aiming at profoundly altering wind energy's impact in achieving the global energy transition. Novel, variable trim kites have been developed that allow to modulate the aerodynamic coefficients of the airborne system, significantly improving the overall system efficiency. The flight control of variable trim kites is much more complex than that of previous kite generations and its mastering is a challenge and one of the keys to a successful operation. Numerical optimization is applied to find a set of flight trajectories in order to maximize the energy production while satisfying several constraints on the system operating in a wide range of conditions. This industry abstract provides a general introduction of the trajectory optimization problem with variable trim kites. We also briefly introduce the state-of-the-art optimization setup. This is followed by demonstration of high-quality example results of the optimization. Finally, we discuss the results and their applications.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Reconfigurable Multifunctional van der Waals Ferroelectric Devices and Logic Circuits
Authors:
Ankita Ram,
Krishna Maity,
Cédric Marchand,
Aymen Mahmoudi,
Aseem Rajan Kshirsagar,
Mohamed Soliman,
Takashi Taniguchi,
Kenji Watanabe,
Bernard Doudin,
Abdelkarim Ouerghi,
Sven Reichardt,
Ian O'Connor,
Jean-Francois Dayen
Abstract:
In this work, we demonstrate the suitability of Reconfigurable Ferroelectric Field-Effect- Transistors (Re-FeFET) for designing non-volatile reconfigurable logic-in-memory circuits with multifunctional capabilities. Modulation of the energy landscape within a homojunction of a 2D tungsten diselenide (WSe$_2$) layer is achieved by independently controlling two split-gate electrodes made of a ferroe…
▽ More
In this work, we demonstrate the suitability of Reconfigurable Ferroelectric Field-Effect- Transistors (Re-FeFET) for designing non-volatile reconfigurable logic-in-memory circuits with multifunctional capabilities. Modulation of the energy landscape within a homojunction of a 2D tungsten diselenide (WSe$_2$) layer is achieved by independently controlling two split-gate electrodes made of a ferroelectric 2D copper indium thiophosphate (CuInP$_2$S$_6$) layer. Controlling the state encoded in the Program Gate enables switching between p, n and ambipolar FeFET operating modes. The transistors exhibit on-off ratios exceeding 10$^6$ and hysteresis windows of up to 10 V width. The homojunction can change from ohmic-like to diode behavior, with a large rectification ratio of 10$^4$. When programmed in the diode mode, the large built-in p-n junction electric field enables efficient separation of photogenerated carriers, making the device attractive for energy harvesting applications. The implementation of the Re-FeFET for reconfigurable logic functions shows how a circuit can be reconfigured to emulate either polymorphic ferroelectric NAND/AND logic-in-memory or electronic XNOR logic with long retention time exceeding 10$^4$ seconds. We also illustrate how a circuit design made of just two Re-FeFETs exhibits high logic expressivity with reconfigurability at runtime to implement several key non-volatile 2-input logic functions. Moreover, the Re-FeFET circuit demonstrates remarkable compactness, with an up to 80% reduction in transistor count compared to standard CMOS design. The 2D van de Waals Re-FeFET devices therefore exhibit groundbreaking potential for both More-than-Moore and beyond-Moore future of electronics, in particular for an energy-efficient implementation of in-memory computing and machine learning hardware, due to their multifunctionality and design compactness.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Automatically Estimating the Effort Required to Repay Self-Admitted Technical Debt
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Technical debt refers to the consequences of sub-optimal decisions made during software development that prioritize short-term benefits over long-term maintainability. Self-Admitted Technical Debt (SATD) is a specific form of technical debt, explicitly documented by developers within software artifacts such as source code comments and commit messages. As SATD can hinder software development and ma…
▽ More
Technical debt refers to the consequences of sub-optimal decisions made during software development that prioritize short-term benefits over long-term maintainability. Self-Admitted Technical Debt (SATD) is a specific form of technical debt, explicitly documented by developers within software artifacts such as source code comments and commit messages. As SATD can hinder software development and maintenance, it is crucial to address and prioritize it effectively. However, current methodologies lack the ability to automatically estimate the repayment effort of SATD based on its textual descriptions. To address this limitation, we propose a novel approach for automatically estimating SATD repayment effort, utilizing a comprehensive dataset comprising 341,740 SATD items from 2,568,728 commits across 1,060 Apache repositories. Our findings show that different types of SATD require varying levels of repayment effort, with code/design, requirement, and test debt demanding greater effort compared to non-SATD items, while documentation debt requires less. We introduce and evaluate machine learning methodologies, particularly BERT and TextCNN, which outperforms classic machine learning methods and the naive baseline in estimating repayment effort. Additionally, we summarize keywords associated with varying levels of repayment effort that occur during SATD repayment. Our contributions aim to enhance the prioritization of SATD repayment effort and resource allocation efficiency, ultimately benefiting software development and maintainability.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
DebtViz: A Tool for Identifying, Measuring, Visualizing, and Monitoring Self-Admitted Technical Debt
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou,
Maarten van Ittersum
Abstract:
Technical debt, specifically Self-Admitted Technical Debt (SATD), remains a significant challenge for software developers and managers due to its potential to adversely affect long-term software maintainability. Although various approaches exist to identify SATD, tools for its comprehensive management are notably lacking. This paper presents DebtViz, an innovative SATD tool designed to automatical…
▽ More
Technical debt, specifically Self-Admitted Technical Debt (SATD), remains a significant challenge for software developers and managers due to its potential to adversely affect long-term software maintainability. Although various approaches exist to identify SATD, tools for its comprehensive management are notably lacking. This paper presents DebtViz, an innovative SATD tool designed to automatically detect, classify, visualize and monitor various types of SATD in source code comments and issue tracking systems. DebtViz employs a Convolutional Neural Network-based approach for detection and a deconvolution technique for keyword extraction. The tool is structured into a back-end service for data collection and pre-processing, a SATD classifier for data categorization, and a front-end module for user interaction. DebtViz not only makes the management of SATD more efficient but also provides in-depth insights into the state of SATD within software systems, fostering informed decision-making on managing it. The scalability and deployability of DebtViz also make it a practical tool for both developers and managers in diverse software development environments. The source code of DebtViz is available at https://github.com/yikun-li/visdom-satd-management-system and the demo of DebtViz is at https://youtu.be/QXH6Bj0HQew.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
Where and What do Software Architects blog? An Exploratory Study on Architectural Knowledge in Blogs, and their Relevance to Design Steps
Authors:
Mohamed Soliman,
Kirsten Gericke,
Paris Avgeriou
Abstract:
Software engineers share their architectural knowledge (AK) in different places on the Web. Recent studies show that architectural blogs contain the most relevant AK, which can help software engineers to make design steps. Nevertheless, we know little about blogs, and specifically architectural blogs, where software engineers share their AK. In this paper, we conduct an exploratory study on archit…
▽ More
Software engineers share their architectural knowledge (AK) in different places on the Web. Recent studies show that architectural blogs contain the most relevant AK, which can help software engineers to make design steps. Nevertheless, we know little about blogs, and specifically architectural blogs, where software engineers share their AK. In this paper, we conduct an exploratory study on architectural blogs to explore their types, topics, and their AK. Moreover, we determine the relevance of architectural blogs to make design steps. Our results support researchers and practitioners to find and re-use AK from blogs.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Automatically Identifying Relations Between Self-Admitted Technical Debt Across Different Sources
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Self-Admitted Technical Debt or SATD can be found in various sources, such as source code comments, commit messages, issue tracking systems, and pull requests. Previous research has established the existence of relations between SATD items in different sources; such relations can be useful for investigating and improving SATD management. However, there is currently a lack of approaches for automat…
▽ More
Self-Admitted Technical Debt or SATD can be found in various sources, such as source code comments, commit messages, issue tracking systems, and pull requests. Previous research has established the existence of relations between SATD items in different sources; such relations can be useful for investigating and improving SATD management. However, there is currently a lack of approaches for automatically detecting these SATD relations. To address this, we proposed and evaluated approaches for automatically identifying SATD relations across different sources. Our findings show that our approach outperforms baseline approaches by a large margin, achieving an average F1-score of 0.829 in identifying relations between SATD items. Moreover, we explored the characteristics of SATD relations in 103 open-source projects and describe nine major cases in which related SATD is documented in a second source, and give a quantitative overview of 26 kinds of relations.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
GRANDMA and HXMT Observations of GRB 221009A -- the Standard-Luminosity Afterglow of a Hyper-Luminous Gamma-Ray Burst
Authors:
D. A. Kann,
S. Agayeva,
V. Aivazyan,
S. Alishov,
C. M. Andrade,
S. Antier,
A. Baransky,
P. Bendjoya,
Z. Benkhaldoun,
S. Beradze,
D. Berezin,
M. Boër,
E. Broens,
S. Brunier,
M. Bulla,
O. Burkhonov,
E. Burns,
Y. Chen,
Y. P. Chen,
M. Conti,
M. W. Coughlin,
W. W. Cui,
F. Daigne,
B. Delaveau,
H. A. R. Devillepoix
, et al. (91 additional authors not shown)
Abstract:
GRB 221009A is the brightest Gamma-Ray Burst (GRB) detected in more than 50 years of study. In this paper, we present observations in the X-ray and optical domains after the GRB obtained by the GRANDMA Collaboration (which includes observations from more than 30 professional and amateur telescopes) and the Insight-HXMT Collaboration. We study the optical afterglow with empirical fitting from GRAND…
▽ More
GRB 221009A is the brightest Gamma-Ray Burst (GRB) detected in more than 50 years of study. In this paper, we present observations in the X-ray and optical domains after the GRB obtained by the GRANDMA Collaboration (which includes observations from more than 30 professional and amateur telescopes) and the Insight-HXMT Collaboration. We study the optical afterglow with empirical fitting from GRANDMA+HXMT data, augmented with data from the literature up to 60 days. We then model numerically, using a Bayesian approach, the GRANDMA and HXMT-LE afterglow observations, that we augment with Swift-XRT and additional optical/NIR observations reported in the literature. We find that the GRB afterglow, extinguished by a large dust column, is most likely behind a combination of a large Milky-Way dust column combined with moderate low-metallicity dust in the host galaxy. Using the GRANDMA+HXMT-LE+XRT dataset, we find that the simplest model, where the observed afterglow is produced by synchrotron radiation at the forward external shock during the deceleration of a top-hat relativistic jet by a uniform medium, fits the multi-wavelength observations only moderately well, with a tension between the observed temporal and spectral evolution. This tension is confirmed when using the extended dataset. We find that the consideration of a jet structure (Gaussian or power-law), the inclusion of synchrotron self-Compton emission, or the presence of an underlying supernova do not improve the predictions, showing that the modelling of GRB22109A will require going beyond the most standard GRB afterglow model. Placed in the global context of GRB optical afterglows, we find the afterglow of GRB 221009A is luminous but not extraordinarily so, highlighting that some aspects of this GRB do not deviate from the global known sample despite its extreme energetics and the peculiar afterglow evolution.
△ Less
Submitted 27 March, 2023; v1 submitted 13 February, 2023;
originally announced February 2023.
-
Self-Admitted Technical Debt in the Embedded Systems Industry: An Exploratory Case Study
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou,
Lou Somers
Abstract:
Technical debt denotes shortcuts taken during software development, mostly for the sake of expedience. When such shortcuts are admitted explicitly by developers (e.g., writing a TODO/Fixme comment), they are termed as Self-Admitted Technical Debt or SATD. There has been a fair amount of work studying SATD management in Open Source projects, but SATD in industry is relatively unexplored. At the sam…
▽ More
Technical debt denotes shortcuts taken during software development, mostly for the sake of expedience. When such shortcuts are admitted explicitly by developers (e.g., writing a TODO/Fixme comment), they are termed as Self-Admitted Technical Debt or SATD. There has been a fair amount of work studying SATD management in Open Source projects, but SATD in industry is relatively unexplored. At the same time, there is no work focusing on developers' perspectives towards SATD and its management. To address this, we conducted an exploratory case study in cooperation with an industrial partner to study how they think of SATD and how they manage it. Specifically, we collected data by identifying and characterizing SATD in different sources (issues, source code comments, and commits) and carried out a series of interviews with 12 software practitioners. The results show: 1) the core characteristics of SATD in industrial projects; 2) developers' attitudes towards identified SATD and statistics; 3) triggers for practitioners to introduce and repay SATD; 4) relations between SATD in different sources; 5) practices used to manage SATD; 6) challenges and tooling ideas for SATD management.
△ Less
Submitted 21 November, 2022; v1 submitted 27 May, 2022;
originally announced May 2022.
-
Saga: A Platform for Continuous Construction and Serving of Knowledge At Scale
Authors:
Ihab F. Ilyas,
Theodoros Rekatsinas,
Vishnu Konda,
Jeffrey Pound,
Xiaoguang Qi,
Mohamed Soliman
Abstract:
We introduce Saga, a next-generation knowledge construction and serving platform for powering knowledge-based applications at industrial scale. Saga follows a hybrid batch-incremental design to continuously integrate billions of facts about real-world entities and construct a central knowledge graph that supports multiple production use cases with diverse requirements around data freshness, accura…
▽ More
We introduce Saga, a next-generation knowledge construction and serving platform for powering knowledge-based applications at industrial scale. Saga follows a hybrid batch-incremental design to continuously integrate billions of facts about real-world entities and construct a central knowledge graph that supports multiple production use cases with diverse requirements around data freshness, accuracy, and availability. In this paper, we discuss the unique challenges associated with knowledge graph construction at industrial scale, and review the main components of Saga and how they address these challenges. Finally, we share lessons-learned from a wide array of production use cases powered by Saga.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Automatic Identification of Self-Admitted Technical Debt from Four Different Sources
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Technical debt refers to taking shortcuts to achieve short-term goals while sacrificing the long-term maintainability and evolvability of software systems. A large part of technical debt is explicitly reported by the developers themselves; this is commonly referred to as Self-Admitted Technical Debt or SATD. Previous work has focused on identifying SATD from source code comments and issue trackers…
▽ More
Technical debt refers to taking shortcuts to achieve short-term goals while sacrificing the long-term maintainability and evolvability of software systems. A large part of technical debt is explicitly reported by the developers themselves; this is commonly referred to as Self-Admitted Technical Debt or SATD. Previous work has focused on identifying SATD from source code comments and issue trackers. However, there are no approaches available for automatically identifying SATD from other sources such as commit messages and pull requests, or by combining multiple sources. Therefore, we propose and evaluate an approach for automated SATD identification that integrates four sources: source code comments, commit messages, pull requests, and issue tracking systems. Our findings show that our approach outperforms baseline approaches and achieves an average F1-score of 0.611 when detecting four types of SATD (i.e., code/design debt, requirement debt, documentation debt, and test debt) from the four aforementioned sources. Thereafter, we analyze 23.6M code comments, 1.3M commit messages, 3.7M issue sections, and 1.7M pull request sections to characterize SATD in 103 open-source projects. Furthermore, we investigate the SATD keywords and relations between SATD in different sources. The findings indicate, among others, that: 1) SATD is evenly spread among all sources; 2) issues and pull requests are the two most similar sources regarding the number of shared SATD keywords, followed by commit messages, and then followed by code comments; 3) there are four kinds of relations between SATD items in the different sources.
△ Less
Submitted 21 April, 2023; v1 submitted 4 February, 2022;
originally announced February 2022.
-
Identifying Self-Admitted Technical Debt in Issue Tracking Systems using Machine Learning
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Technical debt is a metaphor indicating sub-optimal solutions implemented for short-term benefits by sacrificing the long-term maintainability and evolvability of software. A special type of technical debt is explicitly admitted by software engineers (e.g. using a TODO comment); this is called Self-Admitted Technical Debt or SATD. Most work on automatically identifying SATD focuses on source code…
▽ More
Technical debt is a metaphor indicating sub-optimal solutions implemented for short-term benefits by sacrificing the long-term maintainability and evolvability of software. A special type of technical debt is explicitly admitted by software engineers (e.g. using a TODO comment); this is called Self-Admitted Technical Debt or SATD. Most work on automatically identifying SATD focuses on source code comments. In addition to source code comments, issue tracking systems have shown to be another rich source of SATD, but there are no approaches specifically for automatically identifying SATD in issues. In this paper, we first create a training dataset by collecting and manually analyzing 4,200 issues (that break down to 23,180 sections of issues) from seven open-source projects (i.e., Camel, Chromium, Gerrit, Hadoop, HBase, Impala, and Thrift) using two popular issue tracking systems (i.e., Jira and Google Monorail). We then propose and optimize an approach for automatically identifying SATD in issue tracking systems using machine learning. Our findings indicate that: 1) our approach outperforms baseline approaches by a wide margin with regard to the F1-score; 2) transferring knowledge from suitable datasets can improve the predictive performance of our approach; 3) extracted SATD keywords are intuitive and potentially indicating types and indicators of SATD; 4) projects using different issue tracking systems have less common SATD keywords compared to projects using the same issue tracking system; 5) a small amount of training data is needed to achieve good accuracy.
△ Less
Submitted 4 February, 2022;
originally announced February 2022.
-
Symptoms of Architecture Erosion in Code Reviews: A Study of Two OpenStack Projects
Authors:
Ruiyin Li,
Mohamed Soliman,
Peng Liang,
Paris Avgeriou
Abstract:
The phenomenon of architecture erosion can negatively impact the maintenance and evolution of software systems, and manifest in a variety of symptoms during software development. While erosion is often considered rather late, its symptoms can act as early warnings to software developers, if detected in time. In addition to static source code analysis, code reviews can be a source of detecting eros…
▽ More
The phenomenon of architecture erosion can negatively impact the maintenance and evolution of software systems, and manifest in a variety of symptoms during software development. While erosion is often considered rather late, its symptoms can act as early warnings to software developers, if detected in time. In addition to static source code analysis, code reviews can be a source of detecting erosion symptoms and subsequently taking action. In this study, we investigate the erosion symptoms discussed in code reviews, as well as their trends, and the actions taken by developers. Specifically, we conducted an empirical study with the two most active Open Source Software (OSS) projects in the OpenStack community (i.e., Nova and Neutron). We manually checked 21,274 code review comments retrieved by keyword search and random selection, and identified 502 code review comments (from 472 discussion threads) that discuss erosion. Our findings show that (1) the proportion of erosion symptoms is rather low, yet notable in code reviews and the most frequently identified erosion symptoms are architectural violation, duplicate functionality, and cyclic dependency; (2) the declining trend of the identified erosion symptoms in the two OSS projects indicates that the architecture tends to stabilize over time; and (3) most code reviews that identify erosion symptoms have a positive impact on removing erosion symptoms, but a few symptoms still remain and are ignored by developers. The results suggest that (1) code review provides a practical way to reduce erosion symptoms; and (2) analyzing the trend of erosion symptoms can help get an insight about the erosion status of software systems, and subsequently avoid the potential risk of architecture erosion.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
Understanding Software Architecture Erosion: A Systematic Map** Study
Authors:
Ruiyin Li,
Peng Liang,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Architecture erosion (AEr) can adversely affect software development and has received significant attention in the last decade. However, there is an absence of a comprehensive understanding of the state of research about the reasons and consequences of AEr, and the countermeasures to address AEr. This work aims at systematically investigating, identifying, and analyzing the reasons, consequences,…
▽ More
Architecture erosion (AEr) can adversely affect software development and has received significant attention in the last decade. However, there is an absence of a comprehensive understanding of the state of research about the reasons and consequences of AEr, and the countermeasures to address AEr. This work aims at systematically investigating, identifying, and analyzing the reasons, consequences, and ways of detecting and handling AEr. With 73 studies included, the main results are as follows: (1) AEr manifests not only through architectural violations and structural issues but also causing problems in software quality and during software evolution; (2) non-technical reasons that cause AEr should receive the same attention as technical reasons, and practitioners should raise awareness of the grave consequences of AEr, thereby taking actions to tackle AEr-related issues; (3) a spectrum of approaches, tools, and measures has been proposed and employed to detect and tackle AEr; and (4) three categories of difficulties and five categories of lessons learned on tackling AEr were identified. The results can provide researchers a comprehensive understanding of AEr and help practitioners handle AEr and improve the sustainability of their architecture. More empirical studies are required to investigate the practices of detecting and addressing AEr in industrial settings.
△ Less
Submitted 11 February, 2022; v1 submitted 20 December, 2021;
originally announced December 2021.
-
An Exploratory Study on Architectural Knowledge in Issue Tracking Systems
Authors:
Mohamed Soliman,
Matthias Galster,
Paris Avgeriou
Abstract:
Software developers use issue trackers (e.g. Jira) to manage defects, bugs, tasks, change requests, etc. In this paper we explore (a) how architectural knowledge concepts (e.g. architectural component behavior, contextual constraints) are textually represented in issues (e.g. as adjectives), (b) which architectural knowledge concepts commonly occur in issues, and (c) which architectural knowledge…
▽ More
Software developers use issue trackers (e.g. Jira) to manage defects, bugs, tasks, change requests, etc. In this paper we explore (a) how architectural knowledge concepts (e.g. architectural component behavior, contextual constraints) are textually represented in issues (e.g. as adjectives), (b) which architectural knowledge concepts commonly occur in issues, and (c) which architectural knowledge concepts appear together. We analyzed issues in the Jira issue trackers of three large Apache projects. To identify ``architecturally relevant'' issues, we linked issues to architecturally relevant source code changes in the studied systems. We then developed a code book by manually labeling a subset of issues. After reaching conceptual saturation, we coded remaining issues. Our findings support empirically-grounded search tools to identify architectural knowledge concepts in issues for future reuse.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Exploring Web Search Engines to Find Architectural Knowledge
Authors:
Mohamed Soliman,
Marion Wiese,
Yikun Li,
Matthias Riebisch,
Paris Avgeriou
Abstract:
Software engineers need relevant and up-to-date architectural knowledge (AK), in order to make well-founded design decisions. However, finding such AK is quite challenging. One pragmatic approach is to search for AK on the web using traditional search engines (e.g. Google); this is common practice among software engineers. Still, we know very little about what AK is retrieved, from where, and how…
▽ More
Software engineers need relevant and up-to-date architectural knowledge (AK), in order to make well-founded design decisions. However, finding such AK is quite challenging. One pragmatic approach is to search for AK on the web using traditional search engines (e.g. Google); this is common practice among software engineers. Still, we know very little about what AK is retrieved, from where, and how useful it is. In this paper, we conduct an empirical study with 53 software engineers, who used Google to make design decisions using the Attribute-Driven-Design method. Based on how the subjects assessed the nature and relevance of the retrieved results, we determined how effective web search engines are to find relevant architectural information. Moreover, we identified the different sources of AK on the web and their associated AK concepts.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Understanding Architecture Erosion: The Practitioners' Perceptive
Authors:
Ruiyin Li,
Peng Liang,
Mohamed Soliman,
Paris Avgeriou
Abstract:
As software systems evolve, their architecture is meant to adapt accordingly by following the changes in requirements, the environment, and the implementation. However, in practice, the evolving system often deviates from the architecture, causing severe consequences to system maintenance and evolution. This phenomenon of architecture erosion has been studied extensively in research, but not yet b…
▽ More
As software systems evolve, their architecture is meant to adapt accordingly by following the changes in requirements, the environment, and the implementation. However, in practice, the evolving system often deviates from the architecture, causing severe consequences to system maintenance and evolution. This phenomenon of architecture erosion has been studied extensively in research, but not yet been examined from the point of view of developers. In this exploratory study, we look into how developers perceive the notion of architecture erosion, its causes and consequences, as well as tools and practices to identify and control architecture erosion. To this end, we searched through several popular online developer communities for collecting data of discussions related to architecture erosion. Besides, we identified developers involved in these discussions and conducted a survey with 10 participants and held interviews with 4 participants. Our findings show that: (1) developers either focus on the structural manifestation of architecture erosion or on its effect on run-time qualities, maintenance and evolution; (2) alongside technical factors, architecture erosion is caused to a large extent by non-technical factors; (3) despite the lack of dedicated tools for detecting architecture erosion, developers usually identify erosion through a number of symptoms; and (4) there are effective measures that can help to alleviate the impact of architecture erosion.
△ Less
Submitted 21 March, 2021;
originally announced March 2021.
-
RANK: AI-assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks
Authors:
Hazem M. Soliman,
Geoff Salmon,
Dušan Sovilj,
Mohan Rao
Abstract:
Advanced Persistent Threats (APTs) are sophisticated multi-step attacks, planned and executed by skilled adversaries targeting modern government and enterprise networks. Intrusion Detection Systems (IDSs) and User and Entity Behavior Analytics (UEBA) are commonly employed to aid a security analyst in the detection of APTs. The prolonged nature of APTs, combined with the granular focus of UEBA and…
▽ More
Advanced Persistent Threats (APTs) are sophisticated multi-step attacks, planned and executed by skilled adversaries targeting modern government and enterprise networks. Intrusion Detection Systems (IDSs) and User and Entity Behavior Analytics (UEBA) are commonly employed to aid a security analyst in the detection of APTs. The prolonged nature of APTs, combined with the granular focus of UEBA and IDS, results in overwhelming the analyst with an increasingly impractical number of alerts. Consequent to this abundance of data, and together with the crucial importance of the problem as well as the high cost of the skilled personnel involved, the problem of APT detection becomes a perfect candidate for automation through Artificial Intelligence (AI). In this paper, we provide, up to our knowledge, the first study and implementation of an end-to-end AI-assisted architecture for detecting APTs -- RANK. The goal of the system is not to replace the analyst, rather, it is to automate the complete pipeline from data sources to a final set of incidents for analyst review. The architecture is composed of four consecutive steps: 1) alert templating and merging, 2) alert graph construction, 3) alert graph partitioning into incidents, and 4) incident scoring and ordering. We evaluate our architecture against the 2000 DARPA Intrusion Detection dataset, as well as a read-world private dataset from a medium-scale enterprise. Extensive results are provided showing a three order of magnitude reduction in the amount of data to be reviewed by the analyst, innovative extraction of incidents and security-wise scoring of extracted incidents.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks
Authors:
Hazem M. Soliman,
Geoff Salmon,
Dusan Sovilij,
Mohan Rao
Abstract:
Measuring similarity between IP addresses is an important task in the daily operations of any enterprise network. Applications that depend on an IP similarity measure include measuring correlation between security alerts, building baselines for behavioral modelling, debugging network failures and tracking persistent attacks. However, IPs do not have a natural similarity measure by definition. Deep…
▽ More
Measuring similarity between IP addresses is an important task in the daily operations of any enterprise network. Applications that depend on an IP similarity measure include measuring correlation between security alerts, building baselines for behavioral modelling, debugging network failures and tracking persistent attacks. However, IPs do not have a natural similarity measure by definition. Deep Learning architectures are a promising solution here since they are able to learn numerical representations for IPs directly from data, allowing various distance measures to be applied on the calculated representations. Current works have utilized Natural Language Processing (NLP) techniques for learning IP embeddings. However, these approaches have no proper way to handle out-of-vocabulary (OOV) IPs not seen during training. In this paper, we propose a novel approach for IP embedding using an adapted graph neural network (GNN) architecture. This approach has the advantages of working on the raw data, scalability and, most importantly, induction, i.e. the ability to measure similarity between previously unseen IPs. Using data from an enterprise network, our approach is able to identify similarities between local DNS servers and root DNS servers even though some of these machines are never encountered during the training phase.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
Ensemble Forecasting of the Zika Space-TimeSpread with Topological Data Analysis
Authors:
Marwah Soliman,
Vyacheslav Lyubchich,
Yulia R. Gel
Abstract:
As per the records of theWorld Health Organization, the first formally reported incidence of Zika virus occurred in Brazil in May 2015. The disease then rapidly spread to other countries in Americas and East Asia, affecting more than 1,000,000 people. Zika virus is primarily transmitted through bites of infected mosquitoes of the species Aedes (Aedes aegypti and Aedes albopictus). The abundance of…
▽ More
As per the records of theWorld Health Organization, the first formally reported incidence of Zika virus occurred in Brazil in May 2015. The disease then rapidly spread to other countries in Americas and East Asia, affecting more than 1,000,000 people. Zika virus is primarily transmitted through bites of infected mosquitoes of the species Aedes (Aedes aegypti and Aedes albopictus). The abundance of mosquitoes and, as a result, the prevalence of Zika virus infections are common in areas which have high precipitation, high temperature, and high population density.Nonlinear spatio-temporal dependency of such data and lack of historical public health records make prediction of the virus spread particularly challenging. In this article, we enhance Zika forecasting by introducing the concepts of topological data analysis and, specifically, persistent homology of atmospheric variables, into the virus spread modeling. The topological summaries allow for capturing higher order dependencies among atmospheric variables that otherwise might be unassessable via conventional spatio-temporal modeling approaches based on geographical proximity assessed via Euclidean distance. We introduce a new concept of cumulative Betti numbers and then integrate the cumulative Betti numbers as topological descriptors into three predictive machine learning models: random forest, generalized boosted regression, and deep neural network. Furthermore, to better quantify for various sources of uncertainties, we combine the resulting individual model forecasts into an ensemble of the Zika spread predictions using Bayesian model averaging. The proposed methodology is illustrated in application to forecasting of the Zika space-time spread in Brazil in the year 2018.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Sympathetic quantisation -- a new approach to hologram quantisation
Authors:
Peter J. Christopher,
Ralf Mouthaan,
A. Mohamed Soliman,
Timothy D. Wilkinson
Abstract:
Spatial light modulators can typically only modulate the phase or the amplitude of an incident wavefront, with only a limited number of discrete values available. This is often accounted for in computer-generated holography algorithms by setting hologram pixel values to the nearest achievable value during what is known as quantisation. Sympathetic quantisation is an alternative to this nearest-nei…
▽ More
Spatial light modulators can typically only modulate the phase or the amplitude of an incident wavefront, with only a limited number of discrete values available. This is often accounted for in computer-generated holography algorithms by setting hologram pixel values to the nearest achievable value during what is known as quantisation. Sympathetic quantisation is an alternative to this nearest-neighbour approach that takes into account the underlying diffraction relationships in order to obtain a significantly improved post-quantisation performance. The concept of sympathetic quantisation is introduced in this paper and a simple implementation, soft sympathetic quantisation, is presented which is shown to improve mean squared error and structural similarity index error metrics by 50% for the considered case of single-transform algorithms.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
Identification and Remediation of Self-Admitted Technical Debt in Issue Trackers
Authors:
Yikun Li,
Mohamed Soliman,
Paris Avgeriou
Abstract:
Technical debt refers to taking shortcuts to achieve short-term goals, which might negatively influence software maintenance in the long-term. There is increasing attention on technical debt that is admitted by developers in source code comments (termed as self-admitted technical debt or SATD). But SATD in issue trackers is relatively unexplored. We performed a case study, where we manually examin…
▽ More
Technical debt refers to taking shortcuts to achieve short-term goals, which might negatively influence software maintenance in the long-term. There is increasing attention on technical debt that is admitted by developers in source code comments (termed as self-admitted technical debt or SATD). But SATD in issue trackers is relatively unexplored. We performed a case study, where we manually examined 500 issues from two open source projects (i.e. Hadoop and Camel), which contained 152 SATD items. We found that: 1) eight types of technical debt are identified in issues, namely architecture, build, code, defect, design, documentation, requirement, and test debt; 2) developers identify technical debt in issues in three different points in time, and a small part is identified by its creators; 3) the majority of technical debt is paid off, 4) mostly by those who identified it or created it; 5) the median time and average time to repay technical debt are 872.3 and 25.0 hours respectively.
△ Less
Submitted 29 August, 2020; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Compressed Intersection Annihilator Graph
Authors:
Mayssa Soliman,
Nefertiti Megahed
Abstract:
Let R be a commutative ring with a non-zero identity. In this paper, we define a new graph, the compressed intersection annihilator graph, denoted by $IA(R)$, and investigate some of its theoretical properties and its relation with the structure of the ring. It is a generalization of the torsion graph $Γ_{R}(R)$. We study classes of rings for which the equivalence between the set of zero-divisors…
▽ More
Let R be a commutative ring with a non-zero identity. In this paper, we define a new graph, the compressed intersection annihilator graph, denoted by $IA(R)$, and investigate some of its theoretical properties and its relation with the structure of the ring. It is a generalization of the torsion graph $Γ_{R}(R)$. We study classes of rings for which the equivalence between the set of zero-divisors of $R$ being an ideal and the completeness of $IA(R)$ holds. We also study the relation between $Γ_{R}(R)$ and $IA(R)$. In addition, we show that if the compressed intersection annihilator graph of a ring $R$ is finite, then there exists a subring $S$ of $R$ such that $IA(S)\cong IA(R)$. Also, we show that the compressed intersection annihilator graph will never be a complete bipartite graph. Besides, we show that the graph $IA(R)$ with at least three vertices is connected and its diameter is less than or equal to three. Finally, we determine the properties of the graph in the cases when $R$ is the ring of integers modulo $n$, the direct product of integral domains, the direct product of Artinine local rings and the direct product of two rings such that one of them is not an integral domain.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
A Proposed Artificial intelligence Model for Real-Time Human Action Localization and Tracking
Authors:
Ahmed Ali Hammam,
Mona Soliman,
Aboul Ella Hassanien
Abstract:
In recent years, artificial intelligence (AI) based on deep learning (DL) has sparked tremendous global interest. DL is widely used today and has expanded into various interesting areas. It is becoming more popular in cross-subject research, such as studies of smart city systems, which combine computer science with engineering applications. Human action detection is one of these areas. Human actio…
▽ More
In recent years, artificial intelligence (AI) based on deep learning (DL) has sparked tremendous global interest. DL is widely used today and has expanded into various interesting areas. It is becoming more popular in cross-subject research, such as studies of smart city systems, which combine computer science with engineering applications. Human action detection is one of these areas. Human action detection is an interesting challenge due to its stringent requirements in terms of computing speed and accuracy. High-accuracy real-time object tracking is also considered a significant challenge. This paper integrates the YOLO detection network, which is considered a state-of-the-art tool for real-time object detection, with motion vectors and the Coyote Optimization Algorithm (COA) to construct a real-time human action localization and tracking system. The proposed system starts with the extraction of motion information from a compressed video stream and the extraction of appearance information from RGB frames using an object detector. Then, a fusion step between the two streams is performed, and the results are fed into the proposed action tracking model. The COA is used in object tracking due to its accuracy and fast convergence. The basic foundation of the proposed model is the utilization of motion vectors, which already exist in a compressed video bit stream and provide sufficient information to improve the localization of the target action without requiring high consumption of computational resources compared with other popular methods of extracting motion information, such as optical flows. This advantage allows the proposed approach to be implemented in challenging environments where the computational resources are limited, such as Internet of Things (IoT) systems.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Application of the Fast Multipole Fully Coupled Poroelastic Displacement Discontinuity Method to Hydraulic Fracturing Problems
Authors:
Ali Rezaei,
Fahd Siddiqui,
Giorgio Bornia,
Mohamed Y. Soliman
Abstract:
In this study, a fast multipole method (FMM) is used to decrease the computational time of a fully-coupled poroelastic hydraulic fracture model with a controllable effect on its accuracy. The hydraulic fracture model is based on the poroelastic formulation of the displacement discontinuity method (DDM) which is a special formulation of the boundary element method (BEM). DDM is a powerful and effic…
▽ More
In this study, a fast multipole method (FMM) is used to decrease the computational time of a fully-coupled poroelastic hydraulic fracture model with a controllable effect on its accuracy. The hydraulic fracture model is based on the poroelastic formulation of the displacement discontinuity method (DDM) which is a special formulation of the boundary element method (BEM). DDM is a powerful and efficient method for problems involving fractures. However, this method becomes slow as the number of temporal, or spatial elements increases, or necessary details such as poroelasticity, that makes the solution history-dependent, are added to the model. FMM is a technique to expedite matrix-vector multiplications within a controllable error without forming the matrix explicitly. Fully-coupled poroelastic formulation of DDM involves the multiplication of a dense matrix with a vector in several places. A crucial modification to DDM is suggested in two places in the algorithm to leverage the speed efficiency of FMM for carrying out these multiplications. The first modification is in the time-marching scheme, which accounts for the solution of previous time steps to compute the current time step. The second modification is in the generalized minimal residual method (GMRES) to iteratively solve for the problem unknowns. Several examples are provided to show the efficiency of the proposed approach in problems with large degrees of freedom (in time and space). Examples include hydraulic fracturing of a horizontal well and randomly distributed pressurized fractures at different orientations with respect to horizontal stresses. The results are compared to the conventional DDM in terms of computational processing time and accuracy. Accordingly, the proposed algorithm may be used for fracture propagation studies while substantially reducing the processing time with a controllable error.
△ Less
Submitted 19 March, 2019; v1 submitted 12 December, 2018;
originally announced December 2018.
-
A global sensitivity analysis and reduced order models for hydraulically-fractured horizontal wells
Authors:
A. Rezaei,
K. B. Nakshatrala,
F. Siddiqui,
B. Dindoruk,
M. Soliman
Abstract:
We present a systematic global sensitivity analysis using the Sobol method which can be utilized to rank the variables that affect two quantity of interests -- pore pressure depletion and stress change -- around a hydraulically-fractured horizontal well based on their degree of importance. These variables include rock properties and stimulation design variables. A fully-coupled poroelastic hydraul…
▽ More
We present a systematic global sensitivity analysis using the Sobol method which can be utilized to rank the variables that affect two quantity of interests -- pore pressure depletion and stress change -- around a hydraulically-fractured horizontal well based on their degree of importance. These variables include rock properties and stimulation design variables. A fully-coupled poroelastic hydraulic fracture model is used to account for pore pressure and stress changes due to production. To ease the computational cost of a simulator, we also provide reduced order models (ROMs), which can be used to replace the complex numerical model with a rather simple analytical model, for calculating the pore pressure and stresses at different locations around hydraulic fractures. The main findings of this research are: (i) mobility, production pressure, and fracture half-length are the main contributors to the changes in the quantities of interest. The percentage of the contribution of each parameter depends on the location with respect to pre-existing hydraulic fractures and the quantity of interest. (ii) As the time progresses, the effect of mobility decreases and the effect of production pressure increases. (iii) These two variables are also dominant for horizontal stresses at large distances from hydraulic fractures. (iv) At zones close to hydraulic fracture tips or inside the spacing area, other parameters such as fracture spacing and half-length are the dominant factors that affect the minimum horizontal stress. The results of this study will provide useful guidelines for the stimulation design of legacy wells and secondary operations such as refracturing and infill drilling.
△ Less
Submitted 8 December, 2018;
originally announced December 2018.
-
Design of a Highly Reliable Wireless Module for Ultra-Low-Latency Short Range Applications
Authors:
Raja Sattiraju,
Jasper Siemons,
Mohammad Soliman,
Wasim Alshrafi,
Fabian Rein,
Hans D. Schotten
Abstract:
Current radio systems are currently optimized for capacity and range. However, certain applications of wireless systems require fast and reliable communication over short distances. The challenge of these systems is to communicate with a minimum time delay (latency) while at the same time being very reliable and resilient to interference. This paper describes the concept and the proposed abstract…
▽ More
Current radio systems are currently optimized for capacity and range. However, certain applications of wireless systems require fast and reliable communication over short distances. The challenge of these systems is to communicate with a minimum time delay (latency) while at the same time being very reliable and resilient to interference. This paper describes the concept and the proposed abstract architecture of a wireless technology that allows highly reliable and ultra low latency transmission of data between moving units over a few meters, the applications of which can be found in multitude of domains such as Train Communicaion Networks (TCNs), Truck/Tractor - Trailer Communication, Platooning, and in smart industry in the form of co-ordinating machines. The paper also describes the set of novelties that were planned to be realized as part of the final demo hardware
△ Less
Submitted 29 November, 2018;
originally announced November 2018.
-
Semiclassical Hartree-Fock theory of a rotating Bose-Einstein condensation
Authors:
Ahmed S. Hassan,
Azza M. El-Badry,
Shemi S. M. Soliman
Abstract:
In this paper, we investigate the thermodynamic behavior of a rotating Bose-Einstein condensation with non-zero interatomic interactions theoretically. The analysis relies on a semiclassical Hartree-Fock approximation where an integral is performed over the phase space and function of the grand canonical ensemble is derived. Subsequently, we use this result to derive several thermodynamic quantiti…
▽ More
In this paper, we investigate the thermodynamic behavior of a rotating Bose-Einstein condensation with non-zero interatomic interactions theoretically. The analysis relies on a semiclassical Hartree-Fock approximation where an integral is performed over the phase space and function of the grand canonical ensemble is derived. Subsequently, we use this result to derive several thermodynamic quantities including the condensate fraction, critical temperature, entropy and heat capacity. Thereby, we investigate the effect of the rotation rate and interactions parameter on the thermodynamic behavior. The role of finite size is discussed. Our approach can be extended to consider the rotating condensate in optical potential.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Temperature and interaction dependence of the moment of inertia of a rotating condensate boson gas
Authors:
Ahmed S. Hassan,
Azza M. El-Badry,
Shemi S. M. Soliman
Abstract:
In this paper, a developed Hartree-Fock semiclassical approximation is used to calculate the temperature and interaction dependence of the moment of inertia of a rotating condensate Boson gas. A fully classical and quantum mechanical treatment for the moment of inertia are given in terms of the normalized temperature. We found that the moment of inertia is considerably affected by the interaction.…
▽ More
In this paper, a developed Hartree-Fock semiclassical approximation is used to calculate the temperature and interaction dependence of the moment of inertia of a rotating condensate Boson gas. A fully classical and quantum mechanical treatment for the moment of inertia are given in terms of the normalized temperature. We found that the moment of inertia is considerably affected by the interaction. The present analysis, shows that the superfluid effects in the moment of inertia of a condensate Boson gas can be observed at temperatures $T > .25 T_0 $ and not dramatically smaller than $T_0$.
△ Less
Submitted 7 August, 2016;
originally announced August 2016.
-
Productivity Index for Darcy and pre-/post-Darcy Flow (Analytical Approach)
Authors:
Lidia Bloshanskaya,
Akif Ibragimov,
Fahd Siddiqui,
Mohamed Y. Soliman
Abstract:
We investigate the impact of nonlinearity of high and low velocity flows on the well productivity index (PI). Experimental data shows the departure from the linear Darcy relation for high and low velocities. High-velocity (post-Darcy) flow occurring near wells and fractures is described by Forchheimer equations and is relatively well-studied. While low velocity flow receives much less attention, t…
▽ More
We investigate the impact of nonlinearity of high and low velocity flows on the well productivity index (PI). Experimental data shows the departure from the linear Darcy relation for high and low velocities. High-velocity (post-Darcy) flow occurring near wells and fractures is described by Forchheimer equations and is relatively well-studied. While low velocity flow receives much less attention, there is multiple evidence suggesting the existence of pre-Darcy effects for slow flows far away from the well. This flow is modeled via pre-Darcy equation. We combine all three flow regimes, pre-Darcy, Darcy and post-Darcy, under one mathematical formulation dependent on the critical transitional velocities. This allows to use our previously developed framework to obtain the analytical formulas for the PI for the cylindrical reservoir. We study the impact of pre-Darcy effect on the PI of steady-state flow depending on the well-flux and the parameters of the equations.
△ Less
Submitted 22 December, 2015;
originally announced December 2015.
-
Personalized Medical Treatments Using Novel Reinforcement Learning Algorithms
Authors:
Yousuf M. Soliman
Abstract:
In both the fields of computer science and medicine there is very strong interest in develo** personalized treatment policies for patients who have variable responses to treatments. In particular, I aim to find an optimal personalized treatment policy which is a non-deterministic function of the patient specific covariate data that maximizes the expected survival time or clinical outcome. I deve…
▽ More
In both the fields of computer science and medicine there is very strong interest in develo** personalized treatment policies for patients who have variable responses to treatments. In particular, I aim to find an optimal personalized treatment policy which is a non-deterministic function of the patient specific covariate data that maximizes the expected survival time or clinical outcome. I developed an algorithmic framework to solve multistage decision problem with a varying number of stages that are subject to censoring in which the "rewards" are expected survival times. In specific, I developed a novel Q-learning algorithm that dynamically adjusts for these parameters. Furthermore, I found finite upper bounds on the generalized error of the treatment paths constructed by this algorithm. I have also shown that when the optimal Q-function is an element of the approximation space, the anticipated survival times for the treatment regime constructed by the algorithm will converge to the optimal treatment path. I demonstrated the performance of the proposed algorithmic framework via simulation studies and through the analysis of chronic depression data and a hypothetical clinical trial. The censored Q-learning algorithm I developed is more effective than the state of the art clinical decision support systems and is able to operate in environments when many covariate parameters may be unobtainable or censored.
△ Less
Submitted 30 June, 2014; v1 submitted 16 June, 2014;
originally announced June 2014.
-
Designing a WISHBONE Protocol Network Adapter for an Asynchronous Network-on-Chip
Authors:
Ahmed H. M. Soliman,
E. M. Saad,
M. El-Bably,
Hesham M. A. M. Keshk
Abstract:
The Scaling of microchip technologies, from micron to submicron and now to deep sub-micron (DSM) range, has enabled large scale systems-on-chip (SoC). In future deep submicron (DSM) designs, the interconnect effect will definitely dominate performance. Network-on-Chip (NoC) has become a promising solution to bus-based communication infrastructure limitations. NoC designs usually targets Applicatio…
▽ More
The Scaling of microchip technologies, from micron to submicron and now to deep sub-micron (DSM) range, has enabled large scale systems-on-chip (SoC). In future deep submicron (DSM) designs, the interconnect effect will definitely dominate performance. Network-on-Chip (NoC) has become a promising solution to bus-based communication infrastructure limitations. NoC designs usually targets Application Specific Integrated Circuits (ASICs), however, the fabrication process costs a lot. Implementing a NoC on an FPGA does not only reduce the cost but also decreases programming and verification cycles. In this paper, an Asynchronous NoC has been implemented on a SPARTAN-3E\textregistered device. The NoC supports basic transactions of both widely used on-chip interconnection standards, the Open Core Protocol (OCP) and the WISHBONE Protocol. Although, FPGA devices are synchronous in nature, it has been shown that they can be used to prototype a Global Asynchronous Local Synchronous (GALS) systems, comprising an Asynchronous NoC connecting IP cores operating in different clock domains.
△ Less
Submitted 19 March, 2012;
originally announced March 2012.
-
Fair Allocation of Backhaul Resources in Multi-Cell MIMO Co-operative Networks
Authors:
Hazem M. Soliman,
Omar A. Nasr,
Mohamed M. Khairy
Abstract:
In this paper the problem of allocating the limited backhaul bandwidth among users in Multi-cell MIMO cooperative networks is considered. We approach the problem from both the sum-rate and fairness perspectives. First, we show that there are many allocations that can provide near maximum sumrate while varying significantly in fairness, which is assessed through the mean versus variance criteria. S…
▽ More
In this paper the problem of allocating the limited backhaul bandwidth among users in Multi-cell MIMO cooperative networks is considered. We approach the problem from both the sum-rate and fairness perspectives. First, we show that there are many allocations that can provide near maximum sumrate while varying significantly in fairness, which is assessed through the mean versus variance criteria. Second, Two novel schemes that achieve near maximum sum-rate while offering fair allocation of the backhaul bandwidth among users are proposed: the Equal Signal-to-Interference ratio (SIR) and the Equal Interference schemes. Simulation results show that, for the same mean rate among users, the proposed schemes can achieve more fairness when compared to the conventional scheme, which gives all users the same share of bandwidth. Moreover, we show that the Equal SIR scheme can achieve zero variance among users in a wide range of backhaul bandwidths while kee** very close to maximum sum rate. This is the most fair solution that can be used in Multi-cell MIMO in that range of backhaul bandwidths.
△ Less
Submitted 12 June, 2011;
originally announced June 2011.
-
Automatic Wrappers for Large Scale Web Extraction
Authors:
Nilesh Dalvi,
Ravi Kumar,
Mohamed Soliman
Abstract:
We present a generic framework to make wrapper induction algorithms tolerant to noise in the training data. This enables us to learn wrappers in a completely unsupervised manner from automatically and cheaply obtained noisy training data, e.g., using dictionaries and regular expressions. By removing the site-level supervision that wrapper-based techniques require, we are able to perform informatio…
▽ More
We present a generic framework to make wrapper induction algorithms tolerant to noise in the training data. This enables us to learn wrappers in a completely unsupervised manner from automatically and cheaply obtained noisy training data, e.g., using dictionaries and regular expressions. By removing the site-level supervision that wrapper-based techniques require, we are able to perform information extraction at web-scale, with accuracy unattained with existing unsupervised extraction techniques. Our system is used in production at Yahoo! and powers live applications.
△ Less
Submitted 11 March, 2011;
originally announced March 2011.
-
Interaction Dependence Thermodynamical parameters of Harmonically Trapped Bose gas
Authors:
Ahmed S. Hassan,
Shemi S. M. Soliman,
Emad H. Soliman
Abstract:
In this paper the thermodynamical parameters of a condensed Boson gas are calculated from the partial derivative of the grand potential. In particular, the analytical expressions for some important parameters, such as the condensed fraction, specific heat, critical temperature, effective size, and release energy are investigated. The mean effects which can be altered the ideal Bose gas, such as…
▽ More
In this paper the thermodynamical parameters of a condensed Boson gas are calculated from the partial derivative of the grand potential. In particular, the analytical expressions for some important parameters, such as the condensed fraction, specific heat, critical temperature, effective size, and release energy are investigated. The mean effects which can be altered the ideal Bose gas, such as finite size, highly anisotropic of the external potential and interatomic interaction effects are considered simultaneously. Some new characteristics of the trapped interacting Bose gases in a highly anisotropic trap are revealed. The calculated result for the condensed fraction is compared with the ongoing Stuttgart experiment for 52Cr (Griesmaier et al., Phys. Rev. Lett. 94, 160401(2005)) directly. Good agreement between both the theoretical and experimental data are obtained.
△ Less
Submitted 25 September, 2009;
originally announced September 2009.