-
Enhancing Software-Related Information Extraction via Single-Choice Question Answering with Large Language Models
Authors:
Wolfgang Otto,
Sharmila Upadhyaya,
Stefan Dietze
Abstract:
This paper describes our participation in the Shared Task on Software Mentions Disambiguation (SOMD), with a focus on improving relation extraction in scholarly texts through generative Large Language Models (LLMs) using single-choice question-answering. The methodology prioritises the use of in-context learning capabilities of GLMs to extract software-related entities and their descriptive attrib…
▽ More
This paper describes our participation in the Shared Task on Software Mentions Disambiguation (SOMD), with a focus on improving relation extraction in scholarly texts through generative Large Language Models (LLMs) using single-choice question-answering. The methodology prioritises the use of in-context learning capabilities of GLMs to extract software-related entities and their descriptive attributes, such as distributive information. Our approach uses Retrieval-Augmented Generation (RAG) techniques and GLMs for Named Entity Recognition (NER) and Attributive NER to identify relationships between extracted software entities, providing a structured solution for analysing software citations in academic literature. The paper provides a detailed description of our approach, demonstrating how using GLMs in a single-choice QA paradigm can greatly enhance IE methodologies. Our participation in the SOMD shared task highlights the importance of precise software citation practices and showcases our system's ability to overcome the challenges of disambiguating and extracting relationships between software mentions. This sets the groundwork for future research and development in this field.
△ Less
Submitted 19 April, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Hawking radiation from a hot NUT-Kerr-Newman-Kasuya-Anti-de Sitter black hole
Authors:
Heisnam Shanjit Singh,
Chiranjeeb Singha,
Sraban Kumar Upadhyaya
Abstract:
In this work, we investigate the tunneling phenomenon of a charged Dirac particle emerging from a thermal horizon of a hot NUT-Kerr-Newman-Kasuya-Anti-de Sitter (HNKNK-AdS) black hole. Considering the tunneling formalism, we report the Hawking temperature of the charged Dirac particle through the horizon and the heat capacity of the HNKNK-AdS black hole. It is found that the effective Hawking temp…
▽ More
In this work, we investigate the tunneling phenomenon of a charged Dirac particle emerging from a thermal horizon of a hot NUT-Kerr-Newman-Kasuya-Anti-de Sitter (HNKNK-AdS) black hole. Considering the tunneling formalism, we report the Hawking temperature of the charged Dirac particle through the horizon and the heat capacity of the HNKNK-AdS black hole. It is found that the effective Hawking temperature for the black hole depends on the black hole's parameters, such as electric and magnetic charges, magnetic mass, the cosmological constant, and the angular momentum of the black hole. The Hawking radiation for the Kerr-Newman black hole is reduced. It is shown that there is a small correction to the Hawking thermal spectrum. The heat capacity for the HNKNK-AdS black hole is found different from the previous work, and for the Kerr-Newman black hole is also reduced.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Ciphertext-Only Attack on a Secure $k$-NN Computation on Cloud
Authors:
Shyam Murthy,
Santosh Kumar Upadhyaya,
Srinivas Vivek
Abstract:
The rise of cloud computing has spurred a trend of transferring data storage and computational tasks to the cloud. To protect confidential information such as customer data and business details, it is essential to encrypt this sensitive data before cloud storage. Implementing encryption can prevent unauthorized access, data breaches, and the resultant financial loss, reputation damage, and legal i…
▽ More
The rise of cloud computing has spurred a trend of transferring data storage and computational tasks to the cloud. To protect confidential information such as customer data and business details, it is essential to encrypt this sensitive data before cloud storage. Implementing encryption can prevent unauthorized access, data breaches, and the resultant financial loss, reputation damage, and legal issues. Moreover, to facilitate the execution of data mining algorithms on the cloud-stored data, the encryption needs to be compatible with domain computation. The $k$-nearest neighbor ($k$-NN) computation for a specific query vector is widely used in fields like location-based services. Sanyashi et al. (ICISS 2023) proposed an encryption scheme to facilitate privacy-preserving $k$-NN computation on the cloud by utilizing Asymmetric Scalar-Product-Preserving Encryption (ASPE).
In this work, we identify a significant vulnerability in the aforementioned encryption scheme of Sanyashi et al. Specifically, we give an efficient algorithm and also empirically demonstrate that their encryption scheme is vulnerable to the ciphertext-only attack (COA).
△ Less
Submitted 17 April, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
Study of quasi-projectile properties at Fermi energies in 48Ca projectile systems
Authors:
S. Upadhyaya,
K. Mazurek,
T. Kozik,
D. Gruyer,
G. Casini,
S. Piantelli,
L. Baldesi,
S. Barlini,
B. Borderie,
R. Bougault,
A. Camaiani,
C. Ciampi,
M. Cicerchia,
M. Ciemala,
D. Dell Aquila,
J. A. Duenas,
Q. Fable,
J. D. Frankland,
F. Gramegna,
M. Henri,
B. Hong,
A. Kordyasz,
M. J. Kweon,
N. Le Neindre,
I. Lombardo
, et al. (10 additional authors not shown)
Abstract:
The emission of the pre-equilibrium particles during nuclear collisions at moderate beam energies is still an open question. This influences the properties of the compound nucleus but also changes the interpretation of the quasi-fission process. A systematic analysis of the data obtained by the FAZIA collaboration during a recent experiment with a neutron rich projectile is presented. The full ran…
▽ More
The emission of the pre-equilibrium particles during nuclear collisions at moderate beam energies is still an open question. This influences the properties of the compound nucleus but also changes the interpretation of the quasi-fission process. A systematic analysis of the data obtained by the FAZIA collaboration during a recent experiment with a neutron rich projectile is presented. The full range of charged particles detected in the experiment is within the limit of isotopic resolution of the FAZIA detector. Quasi-projectile (QP) fragments were detected in majority thanks to the forward angular acceptance of the experimental setup which was confirmed by introducing cuts based on the HIPSE event generator calculations. The main goal was to compare the experimental results with the HIPSE simulations after introducing these cuts to investigate the influence of the n-rich entrance channel on the QP fragment properties. More specifically, the lowering of N/Z of QP fragments with beam energy was found to be present since the initial phase of the reaction. Thus, pre-equilibrium emissions might be a possible candidate to explain such an effect.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Quasiprojectile breakup and isospin equilibration at Fermi energies: an indication of longer projectile-target contact times?
Authors:
C. Ciampi,
S. Piantelli,
G. Casini,
A. Ono,
J. D. Frankland,
L. Baldesi,
S. Barlini,
B. Borderie,
R. Bougault,
A. Camaiani,
A. Chbihi,
J. A. Dueñas,
Q. Fable,
D. Fabris,
C. Frosin,
T. Génard,
F. Gramegna,
D. Gruyer,
M. Henri,
B. Hong,
S. Kim,
A. Kordyasz,
T. Kozik,
M. J. Kweon,
N. Le Neindre
, et al. (16 additional authors not shown)
Abstract:
An investigation of the quasiprojectile breakup channel in semiperipheral and peripheral collisions of $^{58,64}$Ni+$^{58,64}$Ni at 32 and 52 MeV/nucleon is presented. Data have been acquired in the first experimental campaign of the INDRA-FAZIA apparatus in GANIL. The effect of isospin diffusion between projectile and target in the two asymmetric reactions has been highlighted by means of the iso…
▽ More
An investigation of the quasiprojectile breakup channel in semiperipheral and peripheral collisions of $^{58,64}$Ni+$^{58,64}$Ni at 32 and 52 MeV/nucleon is presented. Data have been acquired in the first experimental campaign of the INDRA-FAZIA apparatus in GANIL. The effect of isospin diffusion between projectile and target in the two asymmetric reactions has been highlighted by means of the isospin transport ratio technique, exploiting the neutron-to-proton ratio of the quasiprojectile reconstructed from the two breakup fragments. We found evidence that, for the same reaction centrality, a higher degree of relaxation of the initial isospin imbalance is achieved in the breakup channel with respect to the more populated binary output, possibly indicating the indirect selection of specific dynamical features. We have proposed an interpretation based on different average projectile-target contact times related to the two exit channels under investigation, with a longer interaction for the breakup channel. The time information has been extracted from AMD simulations of the studied systems coupled to GEMINI++: the model calculations support the hypothesis hereby presented.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Examination of cluster production in excited light systems at Fermi energies from new experimental data and comparison with transport model calculations
Authors:
C. Frosin,
S. Piantelli,
G. Casini,
A. Ono,
A. Camaiani,
L. Baldesi,
S. Barlini,
B. Borderie,
R. Bougault,
C. Ciampi,
M. Cicerchia,
A. Chbihi,
D. Dell'Aquila,
J. A. Dueñas,
D. Fabris,
Q. Fable,
J. D. Frankland,
T. Génard,
F. Gramegna,
D. Gruyer,
M. Henri,
B. Hong,
M. J. Kweon,
S. Kim,
A. Kordyasz
, et al. (22 additional authors not shown)
Abstract:
Four different reactions, $^{32}$S+$^{12}$C and $^{20}$Ne+$^{12}$C at 25 and 50 MeV/nucleon, have been measured with the FAZIA detector capable of full isotopic identification of most forward emitted reaction products. Fragment multiplicities, angular distributions and energy spectra have been measured and compared with Monte Carlo simulations, i.e. the antisymmetrized molecular dynamics (AMD) and…
▽ More
Four different reactions, $^{32}$S+$^{12}$C and $^{20}$Ne+$^{12}$C at 25 and 50 MeV/nucleon, have been measured with the FAZIA detector capable of full isotopic identification of most forward emitted reaction products. Fragment multiplicities, angular distributions and energy spectra have been measured and compared with Monte Carlo simulations, i.e. the antisymmetrized molecular dynamics (AMD) and the heavy-ion phase space exploration (HIPSE) models. These models are combined with two different afterburner codes (HF$l$ and SIMON) to describe the decay of the excited primary fragments. In the case of AMD, the effect of including the clustering and inter-clustering processes to form bound particles and fragments is discussed. A clear confirmation of the role of cluster aggregation in the reaction dynamics and particle production for these light systems, for which the importance of the clustering process increases with bombarding energy, is obtained.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Characterization of the breakup channel in the asymmetric systems $^{40,48}$Ca+$^{12}$C at 25 and 40 MeV/nucleon
Authors:
S. Piantelli,
G. Casini,
P. Ottanelli,
L. Baldesi,
S. Barlini,
B. Borderie,
R. Bougault,
A. Camaiani,
A. Chbihi,
C. Ciampi,
J. A. Duenas,
D. Fabris,
Q. Fable,
J. D. Frankland,
C. Frosin,
F. Gramegna,
D. Gruyer,
B. Hong,
A. Kordyasz,
T. Kozik,
M. J. Kweon,
J. Lemarie',
N. LeNeindre,
I. Lombardo,
O. Lopez
, et al. (14 additional authors not shown)
Abstract:
An analysis of the asymmetric reactions $^{40,48}$Ca+$^{12}$C at 25 and 40 MeV/nucleon is presented. Data have been collected with six modules of the FAZIA array. The analysis is focused on the breakup channel of sources produced in dissipative collisions, partially corresponding to incomplete fusion processes. The study has been performed both on detected fragments and on some resonances reconstr…
▽ More
An analysis of the asymmetric reactions $^{40,48}$Ca+$^{12}$C at 25 and 40 MeV/nucleon is presented. Data have been collected with six modules of the FAZIA array. The analysis is focused on the breakup channel of sources produced in dissipative collisions, partially corresponding to incomplete fusion processes. The study has been performed both on detected fragments and on some resonances reconstructed by means of particle-fragment correlations, with a focus on the evolution of the breakup channel with the beam energy and the neutron content of the system, looking in particular at the relative velocity between the breakup fragments. Results show that also
Carbon fragments reconstructed by means of particle correlations can be in large part interpreted as the light partner of a scission.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing
Authors:
Santosh Kumar Upadhyaya,
Srinivas Vivek
Abstract:
Location-based services are getting more popular day by day. Finding nearby stores, proximity-based marketing, on-road service assistance, etc., are some of the services that use location-based services. In location-based services, user information like user identity, user query, and location must be protected. Ma et al. (INFOCOM-BigSecurity 2019) proposed a privacy-preserving location-based servi…
▽ More
Location-based services are getting more popular day by day. Finding nearby stores, proximity-based marketing, on-road service assistance, etc., are some of the services that use location-based services. In location-based services, user information like user identity, user query, and location must be protected. Ma et al. (INFOCOM-BigSecurity 2019) proposed a privacy-preserving location-based service using Somewhat Homomorphic Encryption (SHE). Their protocol uses edge nodes that compute on SHE encrypted location data and determines the $k$-nearest points of interest contained in the Location-based Server (LBS) without revealing the original user coordinates to LBS, hence, ensuring privacy of users locations. In this work, we show that the above protocol by Ma et al. has a critical flaw. In particular, we show that their secure comparison protocol has a correctness issue in that it will not lead to correct comparison. A major consequence of this flaw is that straightforward approaches to fix this issue will make their protocol insecure. Namely, the LBS will be able to recover the actual locations of the users in each and every query.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
A cost effective eye movement tracker based wheel chair control algorithm for people with paraplegia
Authors:
Skanda Upadhyaya,
Shravan Bhat,
Siddhanth P. Rao,
V Ashwin,
Krishnan Chemmangat
Abstract:
Spinal cord injuries can often lead to quadriplegia in patients limiting their mobility. Wheelchairs could be a good proposition for patients, but most of them operate either manually or with the help of electric motors operated with a joystick. This, however, requires the use of hands, making it unsuitable for quadriplegic patients. Controlling eye movement, on the other hand, is retained even by…
▽ More
Spinal cord injuries can often lead to quadriplegia in patients limiting their mobility. Wheelchairs could be a good proposition for patients, but most of them operate either manually or with the help of electric motors operated with a joystick. This, however, requires the use of hands, making it unsuitable for quadriplegic patients. Controlling eye movement, on the other hand, is retained even by people who undergo brain injury. Monitoring the movements in the eye can be a helpful tool in generating control signals for the wheelchair. This paper is an approach to converting obtained signals from the eye into meaningful signals by trying to control a bot that imitates a wheelchair. The overall system is cost-effective and uses simple image processing and pattern recognition to control the bot. An android application is developed, which could be used by the patients' aid for more refined control of the wheelchair in the actual scenario.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Prototy** Next-Generation O-RAN Research Testbeds with SDRs
Authors:
Pratheek S. Upadhyaya,
Aly S. Abdalla,
Vuk Marojevic,
Jeffrey H. Reed,
Vijay K. Shah
Abstract:
Open RAN (O-RAN) defines an emerging cellular radio access network (RAN) architecture for future 6G wireless networks, emphasizing openness and intelligence which are considered the foundations of future 6G wireless networks. While the inherent complexity and flexibility of the RAN give rise to many new research problems, progress in develo** solutions is hampered due to the lack of end-to-end,…
▽ More
Open RAN (O-RAN) defines an emerging cellular radio access network (RAN) architecture for future 6G wireless networks, emphasizing openness and intelligence which are considered the foundations of future 6G wireless networks. While the inherent complexity and flexibility of the RAN give rise to many new research problems, progress in develo** solutions is hampered due to the lack of end-to-end, fully developed platforms that can help in pursuing use cases in realistic environments. This has motivated the formation of open-source frameworks available to the wireless community. However, the rapid evolution of dedicated platforms and solutions utilizing various software-based technologies often leaves questions regarding the interoperability and interactions between the components in the framework. This article shows how to build a software-defined radio testbed featuring an open-source 5G system that can interact with the near-real-time (near-RT) RAN intelligent controller (RIC) of the O-RAN architecture through standard interfaces. We focus on the O-RAN E2 interface interactions and outline the procedure to enable a RAN system with E2 capabilities. We demonstrate the working of two xApps on the testbed with detailed E2 message exchange procedures and their role in controlling next-generation RANs.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
First results from the INDRA-FAZIA apparatus on isospin diffusion in $^{58,64}$Ni+$^{58,64}$Ni systems at Fermi energies
Authors:
C. Ciampi,
S. Piantelli,
G. Casini,
G. Pasquali,
J. Quicray,
L. Baldesi,
S. Barlini,
B. Borderie,
R. Bougault,
A. Camaiani,
A. Chbihi,
D. Dell'Aquila,
M. Cicerchia,
J. A. Dueñas,
Q. Fable,
D. Fabris,
J. D. Frankland,
C. Frosin,
T. Génard,
F. Gramegna,
D. Gruyer,
K. I. Hahn,
M. Henri,
B. Hong,
S. Kim
, et al. (21 additional authors not shown)
Abstract:
An investigation of the isospin equilibration process in the reactions $^{58,64}$Ni+$^{58,64}$Ni at two bombarding energies in the Fermi regime ($32\,$MeV/nucleon and $52\,$MeV/nucleon) is presented. Data have been acquired during the first experimental campaign of the coupled INDRA-FAZIA apparatus in GANIL. Selecting from peripheral to semi-central collisions, both the neutron content of the quas…
▽ More
An investigation of the isospin equilibration process in the reactions $^{58,64}$Ni+$^{58,64}$Ni at two bombarding energies in the Fermi regime ($32\,$MeV/nucleon and $52\,$MeV/nucleon) is presented. Data have been acquired during the first experimental campaign of the coupled INDRA-FAZIA apparatus in GANIL. Selecting from peripheral to semi-central collisions, both the neutron content of the quasiprojectile residue and that of the light ejectiles coming from the quasiprojectile evaporation have been used as probes of the dynamical process of isospin diffusion between projectile and target for the asymmetric systems. The isospin transport ratio technique has been employed. The relaxation of the initial isospin imbalance with increasing centrality has been clearly evidenced. The isospin equilibration appears stronger for the reactions at $32\,$MeV/nucleon, as expected due to the longer projectile-target interaction time than at $52\,$MeV/nucleon. Coherent indications of isospin equilibration come from the quasiprojectile residue characteristics and from particles ascribed to the quasiprojectile decay.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Automatic detection of glaucoma via fundus imaging and artificial intelligence: A review
Authors:
Lauren Coan,
Bryan Williams,
Krishna Adithya Venkatesh,
Swati Upadhyaya,
Silvester Czanner,
Rengaraj Venkatesh,
Colin E. Willoughby,
Srinivasan Kavitha,
Gabriela Czanner
Abstract:
Glaucoma is a leading cause of irreversible vision impairment globally and cases are continuously rising worldwide. Early detection is crucial, allowing timely intervention which can prevent further visual field loss. To detect glaucoma, examination of the optic nerve head via fundus imaging can be performed, at the centre of which is the assessment of the optic cup and disc boundaries. Fundus ima…
▽ More
Glaucoma is a leading cause of irreversible vision impairment globally and cases are continuously rising worldwide. Early detection is crucial, allowing timely intervention which can prevent further visual field loss. To detect glaucoma, examination of the optic nerve head via fundus imaging can be performed, at the centre of which is the assessment of the optic cup and disc boundaries. Fundus imaging is non-invasive and low-cost; however, the image examination relies on subjective, time-consuming, and costly expert assessments. A timely question to ask is can artificial intelligence mimic glaucoma assessments made by experts. Namely, can artificial intelligence automatically find the boundaries of the optic cup and disc (providing a so-called segmented fundus image) and then use the segmented image to identify glaucoma with high accuracy. We conducted a comprehensive review on artificial intelligence-enabled glaucoma detection frameworks that produce and use segmented fundus images. We found 28 papers and identified two main approaches: 1) logical rule-based frameworks, based on a set of simplistic decision rules; and 2) machine learning/statistical modelling based frameworks. We summarise the state-of-art of the two approaches and highlight the key hurdles to overcome for artificial intelligence-enabled glaucoma detection frameworks to be translated into clinical practice.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
Toward Next Generation Open Radio Access Network--What O-RAN Can and Cannot Do!
Authors:
Aly S. Abdalla,
Pratheek S. Upadhyaya,
Vijay K. Shah,
Vuk Marojevic
Abstract:
The open radio access network (O-RAN) describes an industry-driven open architecture and interfaces for building next generation RANs with artificial intelligence (AI) controllers. We circulated a survey among researchers, developers, and practitioners to gather their perspectives on O-RAN as a framework for 6G wireless research and development (R&D). The majority responded in favor of O-RAN and i…
▽ More
The open radio access network (O-RAN) describes an industry-driven open architecture and interfaces for building next generation RANs with artificial intelligence (AI) controllers. We circulated a survey among researchers, developers, and practitioners to gather their perspectives on O-RAN as a framework for 6G wireless research and development (R&D). The majority responded in favor of O-RAN and identified R&D of interest to them. Motivated by these responses, this paper identifies the limitations of the current O-RAN specifications and the technologies for overcoming them. We recognize end-to-end security, deterministic latency, physical layer real-time control, and testing of AI-based RAN control applications as the critical features to enable and discuss R&D opportunities for extending the architectural capabilities of O-RAN as a platform for 6G wireless.
△ Less
Submitted 25 March, 2022; v1 submitted 26 November, 2021;
originally announced November 2021.
-
Isospin diffusion measurement from the direct detection of a Quasi-Projectile remnant
Authors:
A. Camaiani,
G. Casini,
S. Piantelli,
A. Ono,
E. Bonnet,
R. Alba,
S. Barlini,
B. Borderie,
R. Bougault,
C. Ciampi,
A. Chbihi,
M. Cicerchia,
M. Cinausero,
J. A. Dueñas,
D. DellAquila,
Q. Fable,
D. Fabris,
C. Frosin,
J. D. Frankland,
F. Gramegna,
D. Gruyer,
K. I. Hahn,
M. Henri,
B. Hong,
S. Kim
, et al. (18 additional authors not shown)
Abstract:
The neutron-proton equilibration process in 48 Ca+ 40 Ca at 35 MeV/nucleon bombarding energy has been experimentally estimated by means of the isospin transport ratio. Experimental data have been collected with a subset of the FAZIA telescope array, which permitted to determine Z and N of detected fragments. For the first time, the QP evaporative channel has been compared with the QP break-up one…
▽ More
The neutron-proton equilibration process in 48 Ca+ 40 Ca at 35 MeV/nucleon bombarding energy has been experimentally estimated by means of the isospin transport ratio. Experimental data have been collected with a subset of the FAZIA telescope array, which permitted to determine Z and N of detected fragments. For the first time, the QP evaporative channel has been compared with the QP break-up one in a homogeneous and consistent way, pointing out to a comparable n-p equilibration which suggests close interaction time between projectile and target independently of the exit channel. Moreover, in the QP evaporative channel n-p equilibration has been compared with the prediction of the Antisymmetrized Molecular Dynamics (AMD) model coupled to the GEMINI statistical model as an afterburner, showing a larger probability of proton and neutron transfers in the simulation with respect to the experimental data.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
Dynamical fission of the quasiprojectile and isospin equilibration for the system 80Kr+ 48 Ca at 35 MeV/nucleon
Authors:
S. Piantelli,
G. Casini,
A. Ono,
G. Poggi,
G. Pastore,
S. Barlini,
A. Boiano,
E. Bonnet,
B. Borderie,
R. Bougault,
M. Bruno,
A. Buccola,
A. Camaiani,
A. Chbihi,
M. Cicerchia,
M. Cinausero,
M. DAgostino,
M. Degerlier,
J. Duenas,
Q. Fable,
D. Fabris,
J. D. Frankland,
C. Frosin,
F. Gramegna,
D. Gruyer
, et al. (22 additional authors not shown)
Abstract:
Experimental results concerning the dynamical fission of quasiprojectiles in semiperipheral collisions for the system 80 Kr+ 48 Ca at 35 MeV/nucleon are presented. Data have been collected with four blocks of the FAZIA setup in the first physics experiment of the FAZIA Collaboration. The degree of isospin equilibration between the two fission fragments and its dependence on their charge asymmetry…
▽ More
Experimental results concerning the dynamical fission of quasiprojectiles in semiperipheral collisions for the system 80 Kr+ 48 Ca at 35 MeV/nucleon are presented. Data have been collected with four blocks of the FAZIA setup in the first physics experiment of the FAZIA Collaboration. The degree of isospin equilibration between the two fission fragments and its dependence on their charge asymmetry is investigated. The data are compared with the results of the AMD model coupled to GEMINI as an afterburner, in order to get hints about the timescale of the process.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Influence of fast emissions and statistical de-excitation on the isospin transport ratio
Authors:
A. Camaiani,
S. Piantelli,
A. Ono,
G. Casini,
B. Borderie,
R. Bougault,
C. Ciampi,
J. A. Duenas,
C. Frosin,
J. D. Frankland,
D. Gruyer,
N. LeNeindre,
I. Lombardo,
G. Mantovani,
P. Ottanelli,
M. Parlog,
G. Pasquali,
S. Upadhyaya,
S. Valdré,
G. Verde,
E. Vient
Abstract:
Isospin transport ratio is a powerful method to estimate the neutron-proton (n-p) equilibration in heavy-ion collisions, and extensively used to obtain information on the asy-stiffness of the nuclear Equation of State. In fact such a ratio is expected to bypass any perturbations introducing a linear transformation of the chosen observable. In particular, it is supposed to overcome contributions du…
▽ More
Isospin transport ratio is a powerful method to estimate the neutron-proton (n-p) equilibration in heavy-ion collisions, and extensively used to obtain information on the asy-stiffness of the nuclear Equation of State. In fact such a ratio is expected to bypass any perturbations introducing a linear transformation of the chosen observable. In particular, it is supposed to overcome contributions due to emission, either of dynamical or statistical nature, from the primary fragments formed during the collisions. In this paper we explore the validity of this assumption, looking at the quasi-projectile n-p ratio ($N/Z$) in peripheral and semi-peripheral events for Ca+Ca reactions at 35\amev{}, simulated via the Antisymmetrized Molecular Dynamics transport model, coupled to different statistical decay codes. The statistical de-excitation of the primary fragments introduces a linear transformation at relatively high excitation energies (above 2\amev{}) when the residue approaches the Evaporation Attractor Line, while some effect is produced at lower excitation energies due to the occurrence of some non-linearities. As for fast emissions after the end of the projectile-target interaction it is shown that they introduce a non-linear transformation too.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Cross-layer Band Selection and Routing Design for Diverse Band-aware DSA Networks
Authors:
Pratheek S. Upadhyaya,
Vijay K. Shah,
Jeffrey H. Reed
Abstract:
As several new spectrum bands are opening up for shared use, a new paradigm of \textit{Diverse Band-aware Dynamic Spectrum Access} (d-DSA) has emerged. d-DSA equips a secondary device with software defined radios (SDRs) and utilize whitespaces (or idle channels) in \textit{multiple bands}, including but not limited to TV, LTE, Citizen Broadband Radio Service (CBRS), unlicensed ISM. In this paper,…
▽ More
As several new spectrum bands are opening up for shared use, a new paradigm of \textit{Diverse Band-aware Dynamic Spectrum Access} (d-DSA) has emerged. d-DSA equips a secondary device with software defined radios (SDRs) and utilize whitespaces (or idle channels) in \textit{multiple bands}, including but not limited to TV, LTE, Citizen Broadband Radio Service (CBRS), unlicensed ISM. In this paper, we propose a decentralized, online multi-agent reinforcement learning based cross-layer BAnd selection and Routing Design (BARD) for such d-DSA networks. BARD not only harnesses whitespaces in multiple spectrum bands, but also accounts for unique electro-magnetic characteristics of those bands to maximize the desired quality of service (QoS) requirements of heterogeneous message packets; while also ensuring no harmful interference to the primary users in the utilized band. Our extensive experiments demonstrate that BARD outperforms the baseline dDSAaR algorithm in terms of message delivery ratio, however, at a relatively higher network latency, for varying number of primary and secondary users. Furthermore, BARD greatly outperforms its single-band DSA variants in terms of both the metrics in all considered scenarios.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
The FAZIA setup: a review on the electronics and the mechanical mounting
Authors:
S. Valdré,
G. Casini,
N. Le Neindre,
M. Bini,
A. Boiano,
B. Borderie,
P. Edelbruck,
G. Poggi,
F. Salomon,
G. Tortone,
R. Alba,
S. Barlini,
E. Bonnet,
R. Bougault,
A. Bougard,
G. Brulin,
M. Bruno,
A. Buccola,
A. Camaiani,
A. Chbihi,
C. Ciampi,
M. Cicerchia,
M. Cinausero,
D. Dell'Aquila,
P. Desrues
, et al. (56 additional authors not shown)
Abstract:
In this paper the technological aspects of the FAZIA array will be explored. After a productive commissioning phase, FAZIA blocks started to measure and give very useful data to explore the physics of Fermi energy heavy-ion reactions. This was possible thanks to many technical measures and innovations developed in the commissioning phase and tuned during the first experimental campaigns. This pape…
▽ More
In this paper the technological aspects of the FAZIA array will be explored. After a productive commissioning phase, FAZIA blocks started to measure and give very useful data to explore the physics of Fermi energy heavy-ion reactions. This was possible thanks to many technical measures and innovations developed in the commissioning phase and tuned during the first experimental campaigns. This paper gives a detailed description of the present status of the FAZIA setup from the electronic and mechanical point of view, trying also to trace a path for new improvements and refinements of the apparatus.
△ Less
Submitted 5 April, 2019; v1 submitted 24 September, 2018;
originally announced September 2018.
-
Detecting Data Leakage from Databases on Android Apps with Concept Drift
Authors:
Gokhan Kul,
Shambhu Upadhyaya,
Varun Chandola
Abstract:
Mobile databases are the statutory backbones of many applications on smartphones, and they store a lot of sensitive information. However, vulnerabilities in the operating system or the app logic can lead to sensitive data leakage by giving the adversaries unauthorized access to the app's database. In this paper, we study such vulnerabilities to define a threat model, and we propose an OS-version i…
▽ More
Mobile databases are the statutory backbones of many applications on smartphones, and they store a lot of sensitive information. However, vulnerabilities in the operating system or the app logic can lead to sensitive data leakage by giving the adversaries unauthorized access to the app's database. In this paper, we study such vulnerabilities to define a threat model, and we propose an OS-version independent protection mechanism that app developers can utilize to detect such attacks. To do so, we model the user behavior with the database query workload created by the original apps. Here, we model the drift in behavior by comparing probability distributions of the query workload features over time. We then use this model to determine if the app behavior drift is anomalous. We evaluate our framework on real-world workloads of three different popular Android apps, and we show that our system was able to detect more than 90% of such attacks.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
Investigation of complete and incomplete fusion in $^{7}$Li+$^{124}$Sn reaction around Coulomb barrier energies
Authors:
V. V. Parkar,
Sushil K. Sharma,
R. Palit,
S. Upadhyaya,
A. Shrivastava,
S. K. Pandit,
K. Mahata,
V. Jha,
S. Santra,
K. Ramachandran,
T. N. Nag,
P. K. Rath,
Bhushan Kanagalekar,
T. Trivedi
Abstract:
The complete and incomplete fusion cross sections for $^{7}$Li+$^{124}$Sn reaction were measured using online and offline characteristic $γ$-ray detection techniques. The complete fusion (CF) cross sections at energies above the Coulomb barrier were found to be suppressed by $\sim$ 26 \% compared to the coupled channel calculations. This suppression observed in complete fusion cross sections is fo…
▽ More
The complete and incomplete fusion cross sections for $^{7}$Li+$^{124}$Sn reaction were measured using online and offline characteristic $γ$-ray detection techniques. The complete fusion (CF) cross sections at energies above the Coulomb barrier were found to be suppressed by $\sim$ 26 \% compared to the coupled channel calculations. This suppression observed in complete fusion cross sections is found to be commensurate with the measured total incomplete fusion (ICF) cross sections. There is a distinct feature observed in the ICF cross sections, i.e., $\textit{t}$-capture is found to be dominant than $α$-capture at all the measured energies. A simultaneous explanation of complete, incomplete and total fusion (TF) data was also obtained from the calculations based on Continuum Discretized Coupled Channel method with short range imaginary potentials. The cross section ratios of CF/TF and ICF/TF obtained from the data as well as the calculations showed the dominance of ICF at below barrier energies and CF at above barrier energies.
△ Less
Submitted 22 January, 2018;
originally announced January 2018.
-
Kidemonas: The Silent Guardian
Authors:
Rudra Prasad Baksi,
Shambhu J. Upadhyaya
Abstract:
Advanced Persistent Threats or APTs are big challenges to the security of government organizations or industry systems. These threats may result in stealth attacks, but if the attack is confronted before the attacker end goal has been achieved, the attackers could become aggressive by changing the mode of attack or by resorting to some form of contingency plan, which might cause unexpected damage.…
▽ More
Advanced Persistent Threats or APTs are big challenges to the security of government organizations or industry systems. These threats may result in stealth attacks, but if the attack is confronted before the attacker end goal has been achieved, the attackers could become aggressive by changing the mode of attack or by resorting to some form of contingency plan, which might cause unexpected damage. Therefore, the attack detection and the notification to the system administrator should be done surreptitiously. This paper presents an architecture, called Kidemonas, to silently detect the threat and secretly report it to the user or the system administrator. This way the attacker is deceived into carrying out the attack, without sending any clear signal so that the defender can buy time to develop countermeasures to deal with the attack. We consider several attack scenarios and perform a security analysis to demonstrate the features of Kidemonas.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
Summarizing Large Query Logs in Ettu
Authors:
Gokhan Kul,
Duc Luong,
Ting Xie,
Patrick Coonan,
Varun Chandola,
Oliver Kennedy,
Shambhu Upadhyaya
Abstract:
Database access logs are large, unwieldy, and hard for humans to inspect and summarize. In spite of this, they remain the canonical go-to resource for tasks ranging from performance tuning to security auditing. In this paper, we address the challenge of compactly encoding large sequences of SQL queries for presentation to a human user. Our approach is based on the Weisfeiler-Lehman (WL) approximat…
▽ More
Database access logs are large, unwieldy, and hard for humans to inspect and summarize. In spite of this, they remain the canonical go-to resource for tasks ranging from performance tuning to security auditing. In this paper, we address the challenge of compactly encoding large sequences of SQL queries for presentation to a human user. Our approach is based on the Weisfeiler-Lehman (WL) approximate graph isomorphism algorithm, which identifies salient features of a graph or in our case of an abstract syntax tree. Our generalization of WL allows us to define a distance metric for SQL queries, which in turn permits automated clustering of queries. We also present two techniques for visualizing query clusters, and an algorithm that allows these visualizations to be constructed at interactive speeds. Finally, we evaluate our algorithms in the context of a motivating example: insider threat detection at a large US bank. We show experimentally on real world query logs that (a) our distance metric captures a meaningful notion of similarity, and (b) the log summarization process is scalable and performant.
△ Less
Submitted 2 August, 2016;
originally announced August 2016.
-
The Landscape of Domain Name Typosquatting: Techniques and Countermeasures
Authors:
Jeffrey Spaulding,
Shambhu Upadhyaya,
Aziz Mohaisen
Abstract:
With more than 294 million registered domain names as of late 2015, the domain name ecosystem has evolved to become a cornerstone for the operation of the Internet. Domain names today serve everyone, from individuals for their online presence to big brands for their business operations. Such ecosystem that facilitated legitimate business and personal uses has also fostered "creative" cases of misu…
▽ More
With more than 294 million registered domain names as of late 2015, the domain name ecosystem has evolved to become a cornerstone for the operation of the Internet. Domain names today serve everyone, from individuals for their online presence to big brands for their business operations. Such ecosystem that facilitated legitimate business and personal uses has also fostered "creative" cases of misuse, including phishing, spam, hit and traffic stealing, online scams, among others. As a first step towards this misuse, the registration of a legitimately-looking domain is often required. For that, domain typosquatting provides a great avenue to cybercriminals to conduct their crimes.
In this paper, we review the landscape of domain name typosquatting, highlighting models and advanced techniques for typosquatted domain names generation, models for their monetization, and the existing literature on countermeasures. We further highlight potential fruitful directions on technical countermeasures that are lacking in the literature.
△ Less
Submitted 8 March, 2016;
originally announced March 2016.
-
Distributed Data Acquisition System for Pachmarhi Array of Cerenkov Telescopes
Authors:
P. N. Bhat,
B. S. Acharya,
V. R. Chitnis,
A. I. D'Souza,
P. J. Francis,
K. S. Gothe,
S. R. Joshi,
P. Majumdar,
B. K. Nagesh,
M. S. Pose,
P. N. Purohit,
M. A. Rahman,
K. K. Rao,
S. K. Rao,
S. K. Sharma,
B. B. Singh,
A. J. Stanislaus,
P. V. Sudershanan,
S. S. Upadhyaya,
B. L. V. Murthy,
P. R. Vishwanath
Abstract:
Pachmarhi Array of \v Cerenkov Telescopes (PACT) consists of a 5$\times$5 array of \v Cerenkov telescopes deployed over an area of 100 $m$ $\times$ 80 $m$, in the form of a rectangular matrix. The experiment is based on atmospheric \v Cerenkov technique using wavefront sampling technique. Each telescope consists of 7 parabolic mirrors mounted para-axially on an equatorial mount. At the focus of…
▽ More
Pachmarhi Array of \v Cerenkov Telescopes (PACT) consists of a 5$\times$5 array of \v Cerenkov telescopes deployed over an area of 100 $m$ $\times$ 80 $m$, in the form of a rectangular matrix. The experiment is based on atmospheric \v Cerenkov technique using wavefront sampling technique. Each telescope consists of 7 parabolic mirrors mounted para-axially on an equatorial mount. At the focus of each mirror a fast phototube is mounted. In this experiment a large number of parameters have to be measured and recorded from each of the 175 phototubes in the shortest possible time. Further, the counting rates from each phototube as well as the analog sum of the 7 phototubes from each telescope (royal sum) need to be monitored at regular intervals during the run. In view of the complexity of the system, the entire array is divided into four smaller sectors each of which is handled by an independent field signal processing centre (FSPC) housed in a control room that collects, processes and records information from nearby six telescopes that belong to that sector. The distributed data acquisition system (DDAS) developed for the purpose consists of stand-alone sector data acquisition system (SDAS) in each of the four FSPC's and a master data acquisition system (MDAS). MDAS running in the master signal processing centre (MSPC) records data from each of the 25 telescopes. The data acquisition and monitoring PCs (SDAS and MDAS) are networked through LAN. The entire real time software for DDAS is developed in C under $linux$ environment. Most of the hardware in DDAS are designed and fabricated in-house. The design features and the performance of the entire system along with some other auxiliary systems to facilitate the entire observations will be presented.
△ Less
Submitted 1 September, 2001;
originally announced September 2001.
-
Pachmarhi Array of Čerenkov Telescopes and its Sensitivity
Authors:
V. R. Chitnis,
B. S. Acharya,
P. N. Bhat,
K. S. Gothe,
A. V. John,
P. Majumdar,
B. K. Nagesh,
M. A. Rahman,
B. B. Singh,
S. S. Upadhyaya,
B. L. V. Murthy,
P. R. Vishwanath
Abstract:
Pachmarhi Array of Čerenkov Telescopes (PACT) has been designed to search for celestial TeV $γ-$rays using the wavefront sampling technique. PACT, located at Pachmarhi, (latitude 22$^\circ$ 28$^\prime$ N, longitude 76$^\circ$ 26$^\prime$ E, altitude 1075 m) consists of 25 telescopes deployed over an area of 80 m $\times$ 100m. Each telescopes consists of 7 parabolic reflectors, each viewed by a…
▽ More
Pachmarhi Array of Čerenkov Telescopes (PACT) has been designed to search for celestial TeV $γ-$rays using the wavefront sampling technique. PACT, located at Pachmarhi, (latitude 22$^\circ$ 28$^\prime$ N, longitude 76$^\circ$ 26$^\prime$ E, altitude 1075 m) consists of 25 telescopes deployed over an area of 80 m $\times$ 100m. Each telescopes consists of 7 parabolic reflectors, each viewed by a fast phototube behind a 3$^\circ$ mask at the focus. The density and the arrival time of the photons at the PMT are recorded for each shower. The energy threshold and collection area of the array are estimated, from Monte Carlo simulations, to be $\sim$ 900 GeV and 10$^5$ m$^2$ respectively. The accuracy in determination of arrival angle of a shower is estimated to be about 0.1$^\circ$ in the near vertical direction. About 99% of the off-axis hadronic events could be rejected from directional information alone. Further, at least 75% of the on-axis hadronic events could be rejected using species sensitive parameters derived from timing and density measurements. These cuts on data to reject background would retain $\sim$ 44% of the $γ-$ray signal. The sensitivity of the array for a 5$σ$ detection of $γ-$ray signal at a threshold energy of 1 TeV has been estimated to be $\sim$ 4.1 $\times$ 10$^{-12}$ photons cm$^{-2}$ s$^{-1}$ for an on source exposure of 50 hours. The PACT set-up has been fully commissioned and is collecting data. The details of the system parameters and sensitivity will be presented.
△ Less
Submitted 28 August, 2001;
originally announced August 2001.