-
Overcoming Barriers: Kramers' Escape Rate Analysis of Metastable Dynamics in First-Order Multi-Phase Transitions
Authors:
Mohammad Ali S. Afshar,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Jafar Sadeghi
Abstract:
The expanding application of classical thermodynamic methods to black hole physics has yielded significant advances in characterizing phase transition behavior. Among these approaches, thermodynamic analysis -- particularly kinetic formulations like the Kramers' escape rate -- provides a robust framework for probing black hole phase transitions with minimal relativistic constraints. This study inv…
▽ More
The expanding application of classical thermodynamic methods to black hole physics has yielded significant advances in characterizing phase transition behavior. Among these approaches, thermodynamic analysis -- particularly kinetic formulations like the Kramers' escape rate -- provides a robust framework for probing black hole phase transitions with minimal relativistic constraints. This study investigates the kinetics and dynamic evolution of first-order phase transitions in black holes exhibiting multiple critical points, employing a particle-based escape rate model. The distinct free energy landscapes inherent to multi-critical systems, which can simultaneously support multiple local minima under specific thermodynamic conditions (temperature and pressure) within a given reference frame, raise fundamental questions regarding transition pathways. We rigorously assess whether the Kramers' escape rate retains its predictive validity in these complex multi-minima systems, as established for conventional single-minimum configurations. Furthermore, we examine whether transitions proceed via a sequential, stepwise mechanism between adjacent minima, or if pathways exist that bypass intermediate states through direct descent to the global minimum. Our analysis of black holes undergoing multiphase transitions reveals both parallels and significant deviations from single-transition models. Crucially, we demonstrate that the Kramers' escape rate remains a quantitatively reliable indicator of first-order phase transitions in black holes, even within multi-critical frameworks. This approach offers deeper insights into the governing energetic landscapes and kinetic processes underlying these phenomena.
△ Less
Submitted 8 June, 2025;
originally announced June 2025.
-
UAV-Based Remote Sensing of Soil Moisture Across Diverse Land Covers: Validation and Bayesian Uncertainty Characterization
Authors:
Runze Zhang,
Ishfaq Aziz,
Derek Houtz,
Yuxiang Zhao,
Trent W. Ford,
Adam C. Watts,
Mohamad Alipour
Abstract:
High-resolution soil moisture (SM) observations are critical for agricultural monitoring, forestry management, and hazard prediction, yet current satellite passive microwave missions cannot directly provide retrievals at tens-of-meter spatial scales. Unmanned aerial vehicle (UAV) mounted microwave radiometry presents a promising alternative, but most evaluations to date have focused on agricultura…
▽ More
High-resolution soil moisture (SM) observations are critical for agricultural monitoring, forestry management, and hazard prediction, yet current satellite passive microwave missions cannot directly provide retrievals at tens-of-meter spatial scales. Unmanned aerial vehicle (UAV) mounted microwave radiometry presents a promising alternative, but most evaluations to date have focused on agricultural settings, with limited exploration across other land covers and few efforts to quantify retrieval uncertainty. This study addresses both gaps by evaluating SM retrievals from a drone-based Portable L-band Radiometer (PoLRa) across shrubland, bare soil, and forest strips in Central Illinois, U.S., using a 10-day field campaign in 2024. Controlled UAV flights at altitudes of 10 m, 20 m, and 30 m were performed to generate brightness temperatures (TB) at spatial resolutions of 7 m, 14 m, and 21 m. SM retrievals were carried out using multiple tau-omega-based algorithms, including the single channel algorithm (SCA), dual channel algorithm (DCA), and multi-temporal dual channel algorithm (MTDCA). A Bayesian inference framework was then applied to provide probabilistic uncertainty characterization for both SM and vegetation optical depth (VOD). Results show that the gridded TB distributions consistently capture dry-wet gradients associated with vegetation density variations, and spatial correlations between polarized observations are largely maintained across scales. Validation against in situ measurements indicates that PoLRa derived SM retrievals from the SCAV and MTDCA algorithms achieve unbiased root-mean-square errors (ubRMSE) generally below 0.04 m3/m3 across different land covers. Bayesian posterior analyses confirm that reference SM values largely fall within the derived uncertainty intervals, with mean uncertainty ranges around 0.02 m3/m3 and 0.11 m3/m3 for SCA and DCA related retrievals.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
A Deep Dive into classical and Topological CFT Thermodynamics in Lifshitz and Hyperscaling Violating Black Holes
Authors:
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Saeed Noori Gashti,
Jafar Sadeghi
Abstract:
To effectively utilize the AdS/CFT correspondence, a precise set of rules must be established to guide the translation of computed quantities in the gravitational sector into their CFT counterparts, and vice versa. This framework is commonly referred to as the holographic dictionary. The formulation of such dictionaries opens a two-way gateway, allowing researchers to extend theoretical principles…
▽ More
To effectively utilize the AdS/CFT correspondence, a precise set of rules must be established to guide the translation of computed quantities in the gravitational sector into their CFT counterparts, and vice versa. This framework is commonly referred to as the holographic dictionary. The formulation of such dictionaries opens a two-way gateway, allowing researchers to extend theoretical principles and findings from one domain into the other for further exploration and study. The development of a holographic dictionary for Lifshitz black holes and hyperscaling violation (HSV) models \cite{6} has provided an essential foundation for studying CFT thermodynamics and phase behavior of these black holes. Based on this framework, we will investigate their thermodynamic properties using two distinct approaches. In the first step, we adopt the classical and traditional method, identifying critical points to examine the behavior of the free energy function as a function of temperature near the critical boundary. By analyzing its behavior, we will study phase transitions and then proceed to evaluate the stability of the models. In the next step, to compare both methodologies and highlight their equivalence, particularly demonstrating the accessibility of the topological method compared to the classical approach, we will analyze phase behavior through the lens of topological charges.
△ Less
Submitted 21 May, 2025;
originally announced May 2025.
-
Capturing the Effects of Quantization on Trojans in Code LLMs
Authors:
Aftab Hussain,
Sadegh AlMahdi Kazemi Zarkouei,
Md Rafiqul Islam Rabin,
Mohammad Amin Alipour,
Sen Lin,
Bowen Xu
Abstract:
Large language models of code exhibit high capability in performing diverse software engineering tasks, such as code translation, defect detection, text-to-code generation, and code summarization. While their ability to enhance developer productivity has spurred widespread use, these models have also seen substantial growth in size, often reaching billions of parameters. This scale demands efficie…
▽ More
Large language models of code exhibit high capability in performing diverse software engineering tasks, such as code translation, defect detection, text-to-code generation, and code summarization. While their ability to enhance developer productivity has spurred widespread use, these models have also seen substantial growth in size, often reaching billions of parameters. This scale demands efficient memory resource usage, prompting practitioners to use optimization techniques such as model quantization. Quantization uses smaller bit representations for the model parameters, reducing the precision of the weights. In this work, we investigate the impact of quantization on the risk of data poisoning attacks on these models, specifically examining whether it mitigates or exacerbates such vulnerabilities. We focus on two large language models, Meta's Llama-2-7b and CodeLlama-7b, applied to an SQL code generation task. Additionally, we introduce a new metric for measuring trojan signals in compromised models. We find that quantization has differing effects on code-generating LLMs: while reducing precision does not significantly alter Llama-2's behavior, it boosts performance and reduces attack success rates in CodeLlama, particularly at 4-bit precision.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
From Prompts to Propositions: A Logic-Based Lens on Student-LLM Interactions
Authors:
Ali Alfageeh,
Sadegh AlMahdi Kazemi Zarkouei,
Daye Nam,
Daniel Prol,
Matin Amoozadeh,
Souti Chattopadhyay,
James Prather,
Paul Denny,
Juho Leinonen,
Michael Hilton,
Sruti Srinivasa Ragavan,
Mohammad Amin Alipour
Abstract:
Background and Context. The increasing integration of large language models (LLMs) in computing education presents an emerging challenge in understanding how students use LLMs and craft prompts to solve computational tasks. Prior research has used both qualitative and quantitative methods to analyze prompting behavior, but these approaches lack scalability or fail to effectively capture the semant…
▽ More
Background and Context. The increasing integration of large language models (LLMs) in computing education presents an emerging challenge in understanding how students use LLMs and craft prompts to solve computational tasks. Prior research has used both qualitative and quantitative methods to analyze prompting behavior, but these approaches lack scalability or fail to effectively capture the semantic evolution of prompts. Objective. In this paper, we investigate whether students prompts can be systematically analyzed using propositional logic constraints. We examine whether this approach can identify patterns in prompt evolution, detect struggling students, and provide insights into effective and ineffective strategies. Method. We introduce Prompt2Constraints, a novel method that translates students prompts into logical constraints. The constraints are able to represent the intent of the prompts in succinct and quantifiable ways. We used this approach to analyze a dataset of 1,872 prompts from 203 students solving introductory programming tasks. Findings. We find that while successful and unsuccessful attempts tend to use a similar number of constraints overall, when students fail, they often modify their prompts more significantly, shifting problem-solving strategies midway. We also identify points where specific interventions could be most helpful to students for refining their prompts. Implications. This work offers a new and scalable way to detect students who struggle in solving natural language programming tasks. This work could be extended to investigate more complex tasks and integrated into programming tools to provide real-time support.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Assessing WGC Compatibility in ModMax Black Holes via Photon Spheres Analysis and WCCC Validation
Authors:
Saeed Noori Gashti,
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Izzet Sakallı,
Behnam Pourhassan,
Jafar Sadeghi
Abstract:
It seems that the regime of Hawking radiation and evaporation ultimately drives charged black holes toward super-extremality of the charge parameter and the dominance of extremal conditions. This progression, in turn, lays the groundwork for satisfying the necessary conditions for the Weak Gravity Conjecture (WGC). Preliminary studies indicate that black holes such as the Reissner-Nordstr$ö$m (RN)…
▽ More
It seems that the regime of Hawking radiation and evaporation ultimately drives charged black holes toward super-extremality of the charge parameter and the dominance of extremal conditions. This progression, in turn, lays the groundwork for satisfying the necessary conditions for the Weak Gravity Conjecture (WGC). Preliminary studies indicate that black holes such as the Reissner-Nordstr$ö$m (RN) model, in their initial form, lack the capacity to sustain super-extremality of the charge parameter. If such conditions arise, these black holes transition into naked singularities-a scenario that is highly undesirable due to the loss of causality and the breakdown of space-time geometry. This raises whether the inability to sustain super-extremality is an inherent property of the model or a consequence of the approximations and precision limitations employed in its construction. To address this, we turned to the ModMax model, which represents an extension of the RN model. Our analysis revealed that the ModMax model not only accommodates super-extremality of the charge parameter but also, under certain conditions, emerges as a promising candidate for investigating the WGC. Furthermore, we independently observed how the inclusion of the de Sitter radius ($\ell$) in the AdS model and $f(R)$ gravitational corrections-both of which enhance and complicate the model-can have a direct impact on the range of super-extremal charge tolerance which, in turn, provides the realization of the conditions necessary for the WGC.
△ Less
Submitted 16 April, 2025;
originally announced April 2025.
-
Reconciling the Weak Gravity and Weak Cosmic Censorship Conjectures in Einstein-Euler-Heisenberg-AdS Black Holes
Authors:
Mohammad Reza Alipour,
Saeed Noori Gashti,
Behnam Pourhassan,
İzzet Sakallı
Abstract:
The potential conflict between the Weak Gravity Conjecture (WGC) and the Weak Cosmic Censorship Conjecture (WCCC) poses a significant challenge in general relativity. The WCCC serves as a fundamental assumption ensuring the coherence of gravitational theory. This study investigates the reconciliation of the WGC and the WCCC by examining Einstein-Euler-Heisenberg-AdS black holes in four-dimensional…
▽ More
The potential conflict between the Weak Gravity Conjecture (WGC) and the Weak Cosmic Censorship Conjecture (WCCC) poses a significant challenge in general relativity. The WCCC serves as a fundamental assumption ensuring the coherence of gravitational theory. This study investigates the reconciliation of the WGC and the WCCC by examining Einstein-Euler-Heisenberg-AdS black holes in four-dimensional spacetime. By imposing specific constraints on the metric parameters, we demonstrate that the WGC and the WCCC can coexist harmoniously. Detailed analyses of Einstein-Euler-Heisenberg-AdS black holes for \( Q > M \) validate the simultaneous fulfillment of the two conjectures, particularly in scenarios where \( q^2/m^2 \geq \left(Q^2 / M^2\right)_{\text{e}} \). The electromagnetic self-interaction parameter \( μ\) plays a crucial role in achieving this compatibility. Our findings establish that Einstein-Euler-Heisenberg-AdS black holes provide a robust framework for harmonizing the WGC and the WCCC. In particular, for exceedingly small values of ($μ$)-or, equivalently, when the condition ($μ\ll \ell$) is satisfied-the structure of our black hole transitions in a way that distinctly reveals its compatibility with the WGC. This study also explores the compatibility of the WGC and the WCCC with photon spheres. It examines parameter spaces that satisfy both conjectures, ensuring event horizons and photon spheres while maintaining black hole properties. Key results demonstrate that small \( μ\) values preserve WCCC adherence and validate WGC through photon sphere characteristics.
△ Less
Submitted 4 April, 2025;
originally announced April 2025.
-
Topological Insights into Black Hole Thermodynamics: Non-Extensive Entropy in CFT framework
Authors:
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Saeed Noori Gashti,
Jafar Sadeghi
Abstract:
In this paper, We conducted an in-depth investigation into the thermodynamic topology of Einstein-Gauss-Bonnet black holes within the framework of Conformal Field Theory (CFT), considering the implications of non-extensive entropy formulations. Our study reveals that the parameter $λ$ (Rényi entropy) plays a crucial role in the phase behavior of black holes. Specifically, when $λ$ is below the cri…
▽ More
In this paper, We conducted an in-depth investigation into the thermodynamic topology of Einstein-Gauss-Bonnet black holes within the framework of Conformal Field Theory (CFT), considering the implications of non-extensive entropy formulations. Our study reveals that the parameter $λ$ (Rényi entropy) plays a crucial role in the phase behavior of black holes. Specifically, when $λ$ is below the critical value (C), it has a negligible impact on the phase behavior. However, when $λ$ exceeds the critical value, it significantly alters the phase transition outcomes. Determining the most physically representative values of $λ$ will require experimental validation, but this parameter flexibility allows researchers to better explain black hole phase transitions under varying physical conditions. Furthermore, the parameters $α$ and $β$ affect the phase structure and topological charge for the Sharma-Mittal entropy. Only in the case of $C>C_c$ and in the condition of $α\approxβ$ will we have a first-order phase transition with topological charge + 1. Additionally, for the loop quantum gravity non-extensive entropy as the parameter $q$ approaches 1, the classification of topological charges changes. We observe configurations with one and three topological charges with respect to critical value $C$, resulting in a total topological charge $W = +1$, and configurations with two topological charges $(ω= +1, -1)$, leading to a total topological charge $W = 0$. These findings provide new insights into the complex phase behavior and topological characteristics of black holes in the context of CFT and non-extensive entropy formulations.
△ Less
Submitted 1 January, 2025;
originally announced January 2025.
-
Diffusiophoretic transport of colloids in porous media
Authors:
Mobin Alipour,
Yiran Li,
Haoyu Liu,
Amir A. Pahlavan
Abstract:
Understanding how colloids move in crowded environments is key for gaining control over their transport in applications such as drug delivery, filtration, contaminant/microplastic remediation and agriculture. The classical models of colloid transport in porous media rely on geometric characteristics of the medium, and hydrodynamic/non-hydrodynamic equilibrium interactions to predict their behavior…
▽ More
Understanding how colloids move in crowded environments is key for gaining control over their transport in applications such as drug delivery, filtration, contaminant/microplastic remediation and agriculture. The classical models of colloid transport in porous media rely on geometric characteristics of the medium, and hydrodynamic/non-hydrodynamic equilibrium interactions to predict their behavior. However, chemical gradients are ubiquitous in these environments and can lead to the non-equilibrium diffusiophoretic migration of colloids. Here, combining microfluidic experiments, numerical simulations, and theoretical modeling we demonstrate that diffusiophoresis leads to significant macroscopic changes in the dispersion of colloids in porous media. We displace a suspension of colloids dispersed in a background salt solution with a higher/lower salinity solution and monitor the removal of the colloids from the medium. While mixing weakens the solute gradients, leading to the diffusiophoretic velocities that are orders of magnitude weaker than the background fluid flow, we show that the cross-streamline migration of colloids changes their macroscopic transit time and dispersion through the medium by an order of magnitude compared to the control case with no salinity gradients. Our observations demonstrate that solute gradients modulate the influence of geometric disorder on the transport, pointing to the need for revisiting the classical models of colloid transport in porous media to obtain predictive models for technological, medical, and environmental applications.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Analyzing WGC and WCCC through Charged Scalar Fields Fluxes with Charged AdS Black Holes Surrounded by Perfect Fluid Dark Matter in the CFT Thermodynamics
Authors:
Ankit Anand,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
In this paper, we conduct a comprehensive investigation into the weak cosmic censorship conjecture (WCCC) for Reissner-Nordström (R-N) AdS black holes that are influenced by Perfect Fluid Dark Matter (PFDM). Our study is framed within the context of Conformal Field Theory (CFT) thermodynamics. We delve into the principles of energy flux and mass-energy equivalence to explore the interplay between…
▽ More
In this paper, we conduct a comprehensive investigation into the weak cosmic censorship conjecture (WCCC) for Reissner-Nordström (R-N) AdS black holes that are influenced by Perfect Fluid Dark Matter (PFDM). Our study is framed within the context of Conformal Field Theory (CFT) thermodynamics. We delve into the principles of energy flux and mass-energy equivalence to explore the interplay between the weak gravity conjecture (WGC) and the WCCC. Our analysis begins by examining the interaction between incoming and outgoing energy fluxes, which induces changes in the black hole's properties. By applying the first law of thermodynamics, we assess the validity of the second law in these dynamic scenarios. We also consider equilibrium conditions that involve both absorption and superradiance processes. Utilizing the framework of black hole thermodynamics within CFT, we demonstrate that the WCCC is upheld if the black hole is in or near an extremal state, particularly when it is subjected to radiation and particle absorption. This finding is significant as it reinforces the robustness of the WCCC under these specific conditions. Furthermore, we uncover additional insights by employing mass-energy equivalence principles and conducting second-order approximations near the extremality state. Specifically, we find that when a black hole radiates and its central charge surpasses the scaled electric charge, the emitted superradiant particles adhere to the WGC. This adherence results in the black hole moving away from its extremal state, thereby maintaining the WCCC.
△ Less
Submitted 24 October, 2024;
originally announced November 2024.
-
Weak Gravity Conjecture Validation with Photon Spheres of Quantum Corrected AdS-Reissner-Nordstrom Black Holes in Kiselev Spacetime
Authors:
Mohammad Reza Alipour,
Mohammad Ali S. Afshar,
Saeed Noori Gashti,
Jafar Sadeghi
Abstract:
In this study, we investigate the Weak Gravity Conjecture (WGC) in the context of quantum-corrected AdS-Reissner-Nordstrom (AdS-RN) black holes within Kiselev spacetime. Our focus is on photon spheres, which serve as markers for stable and unstable photon spheres. We confirm the validity of the WGC by demonstrating that quantum corrections do not alter the essential charge-to-mass ratio, thereby s…
▽ More
In this study, we investigate the Weak Gravity Conjecture (WGC) in the context of quantum-corrected AdS-Reissner-Nordstrom (AdS-RN) black holes within Kiselev spacetime. Our focus is on photon spheres, which serve as markers for stable and unstable photon spheres. We confirm the validity of the WGC by demonstrating that quantum corrections do not alter the essential charge-to-mass ratio, thereby supporting the conjecture's universality. Our analysis reveals that black holes with a charge greater than their mass ($Q > M$) possess photon spheres or exhibit a total topological charge of the photon sphere (PS = -1), which upholds the WGC. This finding is significant as it reinforces the conjecture's applicability even in the presence of quantum corrections. Furthermore, we examine various parameter configurations to understand their impact on the WGC. Specifically, we find that configurations with $ω= -\frac{1}{3}$ and $ω= -1$ maintain the conjecture, indicating that these values do not disrupt the charge-to-mass ratio required by the WGC. However, for $ω= -\frac{4}{3}$, the conjecture does not hold, suggesting that this particular parameter value leads to deviations from the expected behavior. These results open new directions for research in quantum gravity, as they highlight the importance of specific parameter values in maintaining the WGC. The findings suggest that while the WGC is robust under certain conditions, there are scenarios where it may be challenged, prompting further investigation into the underlying principles of quantum gravity
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
Thermodynamic Topology of Kiselev-AdS Black Holes within f (R, T) gravity
Authors:
Saeed Noori Gashti,
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Yassine Sekhmani,
Jafar Sadeghi,
Javlon Rayimbaev
Abstract:
In this paper, we investigate the topological charge and the conditions for the existence of the photon sphere (PS) in Kiselev-AdS black holes within \(f(R, T)\) gravity. We employ two different methods based on Duan's topological current \(φ\)-mapping theory viz analize of temperature and the generalized Helmholtz free energy methods to study the topological classes of our black hole. By consider…
▽ More
In this paper, we investigate the topological charge and the conditions for the existence of the photon sphere (PS) in Kiselev-AdS black holes within \(f(R, T)\) gravity. We employ two different methods based on Duan's topological current \(φ\)-mapping theory viz analize of temperature and the generalized Helmholtz free energy methods to study the topological classes of our black hole. By considering the mentioned black hole, we discuss the critical and zero points (topological charges and topological numbers) for different parameters. Our findings reveal that the Kiselev parameter \(ω\) and the \(f(R, T)\) gravity parameter \(γ\) influence the number of topological charges of black holes, leading to novel insights into topological classifications. We observe that for given values of the free parameters, there exist total topological charges (\(Q_{total} = -1\)) for T-method and total topological numbers (\(W = +1\)) for the generalized Helmholtz free energy method. Our research findings elucidate that, in contrast to the scenario where \(ω= 1/3\), in other cases, increasing the parameter \(γ\) increases the number of total topological charges for the black hole. Interestingly, for the phantom field (\(ω= -4/3\)), we observed that decreasing the parameter \(γ\) increases the number of topological charges. Additionally, we study the results for the photon sphere. The studied models clearly reveal that the simultaneous presence of \(γ\) and \(ω\) effectively expands the permissible range for \(γ\). In other words, the model can exhibit black hole behavior over a larger domain. Additionally, it is evident that with the stepwise reduction of \(ω\), the region covered by singularity also diminishes and becomes more restricted. However, An interesting point about all three ranges is the elimination of the forbidden region in this model.
△ Less
Submitted 10 February, 2025; v1 submitted 3 October, 2024;
originally announced October 2024.
-
Sub-Meter Remote Sensing of Soil Moisture Using Portable L-band Microwave Radiometer
Authors:
Runze Zhang,
Abhi Nayak,
Derek Houtz,
Adam Watts,
Elahe Soltanaghai,
Mohamad Alipour
Abstract:
Spaceborne microwave passive soil moisture products are known for their accuracy but are often limited by coarse spatial resolutions. This limits their ability to capture finer soil moisture gradients and hinders their applications. The Portable L band radiometer (PoLRa) offers soil moisture measurements from submeter to tens of meters depending on the altitude of measurement. Given that the asses…
▽ More
Spaceborne microwave passive soil moisture products are known for their accuracy but are often limited by coarse spatial resolutions. This limits their ability to capture finer soil moisture gradients and hinders their applications. The Portable L band radiometer (PoLRa) offers soil moisture measurements from submeter to tens of meters depending on the altitude of measurement. Given that the assessments of soil moisture derived from this sensor are notably lacking, this study aims to evaluate the performance of submeter soil moisture retrieved from PoLRa mounted on poles at four different locations in central Illinois, USA. The evaluation focuses on the consistency of PoLRa measured brightness temperatures from different directions relative to the same area, and the accuracy of PoLRa derived soil moisture. As PoLRa shares many aspects of the L band radiometer onboard the NASA Soil Moisture Active Passive (SMAP) mission, two SMAP operational algorithms and the conventional dual channel algorithm were applied to calculate soil moisture from the measured brightness temperatures. The vertically polarized brightness temperatures from the PoLRa are typically more stable than their horizontally polarized counterparts. In each test period, the standard deviations of observed dual polarization brightness temperatures are generally less than 5 K. By comparing PoLRa based soil moisture retrievals against the moisture values obtained by handheld time domain reflectometry, the unbiased root mean square error and the Pearson correlation coefficient are mostly below 0.04 and above 0.75, confirming the high accuracy of PoLRa derived soil moisture retrievals and the feasibility of utilizing SMAP algorithms for PoLRa data. These findings highlight the significant potential of ground or drone based PoLRa measurements as a standalone reference for future spaceborne L band sensors.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
Exploring the Parameter Space of Inflation Model on the Brane and its Compatibility with the Swampland Conjectures
Authors:
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
In recent years, inflationary models have been studied from different perspectives using different conditions. Now, in this paper, we want to investigate the inverse monomial Inflation $(IMI)$ on the brane. We limit our results to the potentials of the form $\frac{M^{4+σ}}{φ^σ}$. We calculate some cosmological parameters and then we investigate the satisfaction of the model with some conjectures o…
▽ More
In recent years, inflationary models have been studied from different perspectives using different conditions. Now, in this paper, we want to investigate the inverse monomial Inflation $(IMI)$ on the brane. We limit our results to the potentials of the form $\frac{M^{4+σ}}{φ^σ}$. We calculate some cosmological parameters and then we investigate the satisfaction of the model with some conjectures of the swampland program. We will check the model's compatibility with the refined dS swampland conjecture(RDSSC), further refining the de Sitter swampland conjecture (FRSDC), scalar weak gravity (SWGC), and strong scalar weak gravity conjecture (SSWGC). Despite the incompatibility with (DSSC), We find a specific region of compatibility with other ones which means it satisfied the (FRDSSC) for example with (a=0.982873, b=0.017127, q=2.2). Also, the model is compatible with the (SWGC) with the ($φ\leq σ+2$) condition and consistent with the (SSWGC) with the ($φ\leq \sqrt{(σ+2)(σ+1)}$) condition. Since inverse monomial Inflation(IMI) on the brane could satisfy some swampland conjecture simultaneously, it has the potential to be a "real" inflation model of the universe.
△ Less
Submitted 10 September, 2024;
originally announced September 2024.
-
Thermodynamic topology of Black Holes in $F(R)$-Euler-Heisenberg gravity's Rainbow
Authors:
Yassine Sekhmani,
Saeed Noori Gashti,
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Jafar Sadeghi,
Behnam Pourhassan,
Javlon Rayimbaev
Abstract:
The topology of black hole thermodynamics is a fascinating area of study that explores the connections between thermodynamic properties and topological features of black holes. We successfully derive the field equations for $F(R)$-Euler-Heisenberg theory, providing a framework for studying the interplay between modified gravity and non-linear electromagnetic effects. We obtain an analytical soluti…
▽ More
The topology of black hole thermodynamics is a fascinating area of study that explores the connections between thermodynamic properties and topological features of black holes. We successfully derive the field equations for $F(R)$-Euler-Heisenberg theory, providing a framework for studying the interplay between modified gravity and non-linear electromagnetic effects. We obtain an analytical solution for a static, spherically symmetric, energy-dependent black hole with constant scalar curvature. Also, our analysis of black holes in F(R)-Euler-Heisenberg gravity's Rainbow reveals significant insights into their topological properties. We identified the total topological charges by examining the normalized field lines along various free parameters. Our findings indicate that the parameters $( R_0 )$ and $( f_ε = g_ε )$ influence the topological charges. These results are comprehensively summarized in Table I. In examining the photon sphere within this model, the sign of the parameter \( R_0 \) plays a crucial role in determining whether the model adopts a dS or AdS configuration. An interesting characteristic of this model is that, in its AdS form, it avoids the formation of naked singularity regions, which sets it apart from many other models. Typically, varying parameter values in other models can result in the division of space into regions of black holes and naked singularities. However, this model consistently retains its black hole behavior by featuring an unstable photon sphere, regardless of parameter values within the acceptable range. In its dS form, the behavior of the model's photon sphere remains consistent with other dS models and does not exhibit unique differences.
△ Less
Submitted 24 February, 2025; v1 submitted 8 September, 2024;
originally announced September 2024.
-
Unlearning Trojans in Large Language Models: A Comparison Between Natural Language and Source Code
Authors:
Mahdi Kazemi,
Aftab Hussain,
Md Rafiqul Islam Rabin,
Mohammad Amin Alipour,
Sen Lin
Abstract:
This work investigates the application of Machine Unlearning (MU) for mitigating the impact of trojans embedded in conventional large language models of natural language (Text-LLMs) and large language models of code (Code-LLMs) We propose a novel unlearning approach, LYA, that leverages both gradient ascent and elastic weight consolidation, a Fisher Information Matrix (FIM) based regularization te…
▽ More
This work investigates the application of Machine Unlearning (MU) for mitigating the impact of trojans embedded in conventional large language models of natural language (Text-LLMs) and large language models of code (Code-LLMs) We propose a novel unlearning approach, LYA, that leverages both gradient ascent and elastic weight consolidation, a Fisher Information Matrix (FIM) based regularization technique, to unlearn trojans from poisoned models. We compare the effectiveness of LYA against conventional techniques like fine-tuning, retraining, and vanilla gradient ascent. The subject models we investigate are BERT and CodeBERT, for sentiment analysis and code defect detection tasks, respectively. Our findings demonstrate that the combination of gradient ascent and FIM-based regularization, as done in LYA, outperforms existing methods in removing the trojan's influence from the poisoned model, while preserving its original functionality. To the best of our knowledge, this is the first work that compares and contrasts MU of trojans in LLMs, in the NL and Coding domain.
△ Less
Submitted 22 August, 2024;
originally announced August 2024.
-
Thermodynamic Topology of Quantum Corrected AdS-Reissner-Nordstrom Black Holes in Kiselev Spacetime
Authors:
Jafar Sadeghi,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
In this paper, we delve into the intricate thermodynamic topology of quantum-corrected Anti-de Sitter-Reissner-Nordstrm (AdS-RN) black hole within the framework of Kiselev spacetime. By employing the generalized off-shell Helmholtz free energy approach, we meticulously compute the thermodynamic topology of these selected black holes. Furthermore, we establish their topological classifications. Our…
▽ More
In this paper, we delve into the intricate thermodynamic topology of quantum-corrected Anti-de Sitter-Reissner-Nordstrm (AdS-RN) black hole within the framework of Kiselev spacetime. By employing the generalized off-shell Helmholtz free energy approach, we meticulously compute the thermodynamic topology of these selected black holes. Furthermore, we establish their topological classifications. Our findings reveal that quantum correction terms influence the topological charges of black holes in Kiselev spacetime, leading to novel insights into topological classifications. Our research findings elucidate that, in contrast to the scenario in which $ω=0$ and $a=0.7$ with total topological charge $W=0$ and $ω=-4/3$ with total topological charge $W=-1$, in other cases, the total topological charge for the black hole under consideration predominantly stabilizes at +1. This stabilization occurs with the significant influence of the parameters a, c, and $ω$ on the number of topological charges. Specifically, when $ω$ assumes the values of $ω=-1/3$, $ω=-2/3$ , $ω=-1$, the total topological charge consistently be to W = +1.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Exploring the Phase Transition in Charged Gauss-Bonnet Black Holes: A Holographic Thermodynamics Perspectives
Authors:
Jafar Sadeghi,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar,
Saeed Noori Gashti
Abstract:
In this paper, we delve into the study of thermodynamics and phase transition of charged Gauss-Bonnet black holes within the context of anti-de Sitter (AdS) space, with particular emphasis on the central charge's role within the dual conformal field theory (CFT). We employ a holographic methodology that interprets the cosmological constant and the Newton constant as thermodynamic variables, leadin…
▽ More
In this paper, we delve into the study of thermodynamics and phase transition of charged Gauss-Bonnet black holes within the context of anti-de Sitter (AdS) space, with particular emphasis on the central charge's role within the dual conformal field theory (CFT). We employ a holographic methodology that interprets the cosmological constant and the Newton constant as thermodynamic variables, leading to the derivation of a modified first law of thermodynamics that incorporates the thermodynamic volume and pressure. Our findings reveal that the central charge of the CFT is intrinsically linked to the variation of these constants, and its stability can be ensured by simultaneous adjustment of these constants. We further explore the phase structures of the black holes, utilizing the free energy. Our research uncovers the existence of a critical value of the central charge, beyond which the phase diagram displays a first-order phase transition between small and large black holes. We also delve into the implications of our findings on the complexity of the CFT. Our conclusions underscore the significant role of the central charge in the holographic thermodynamics and phase transition of charged Gauss-Bonnet black holes. Furthermore, we conclude that while the central charge considered provides suitable and satisfactory solutions for this black hole in 4 and 5 dimensions, it becomes necessary to introduce a unique central charge for this structure of modified gravity. In essence, the central charge in holographic thermodynamics is not a universal value and requires modification in accordance with different modified gravities. Consequently, the physics of the problem will significantly deviate from the one discussed in this article, indicating a rich and complex landscape for future work.
△ Less
Submitted 6 August, 2024;
originally announced August 2024.
-
Phase Transition Dynamics of Black Holes Influenced by Kaniadakis and Barrow Statistics
Authors:
Jafar Sadeghi,
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Saeed Noori Gashti
Abstract:
In this study, we investigate the dynamics and frame-by-frame phase transition of the first order in black hole thermodynamics. For our analysis, we will utilize the Kramers escape rate. Our focus is on charged anti-de Sitter (AdS) black holes influenced by Kaniadakis and Barrow statistics. The selection of these black holes aims to examine the effects of entropy variation on the dynamics of phase…
▽ More
In this study, we investigate the dynamics and frame-by-frame phase transition of the first order in black hole thermodynamics. For our analysis, we will utilize the Kramers escape rate. Our focus is on charged anti-de Sitter (AdS) black holes influenced by Kaniadakis and Barrow statistics. The selection of these black holes aims to examine the effects of entropy variation on the dynamics of phase transition and to demonstrate that the Kramers escape rate, as an efficient tool, can effectively represent the dynamic transition from a small to a large black hole within the domain of first-order phase transitions. It is noteworthy that while the transition from small to large black holes should ostensibly dominate the entire process, our results indicate that the escape rate undergoes changes as it passes through the midpoint of the phase transition, leading to a reverse escape phenomenon. The findings suggest that the dynamic phase transition in charged AdS black holes affected by entropy change bears a significant resemblance to the outcomes of models influenced by Bekenstein-Hawking entropy\cite{23}. This similarity in results could serve as an additional motivation to further explore the potential capabilities of Kaniadakis and Barrow statistics in related cosmological fields. These capabilities could enhance our understanding of other cosmological properties
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Harnessing the Power of LLMs: Automating Unit Test Generation for High-Performance Computing
Authors:
Rabimba Karanjai,
Aftab Hussain,
Md Rafiqul Islam Rabin,
Lei Xu,
Weidong Shi,
Mohammad Amin Alipour
Abstract:
Unit testing is crucial in software engineering for ensuring quality. However, it's not widely used in parallel and high-performance computing software, particularly scientific applications, due to their smaller, diverse user base and complex logic. These factors make unit testing challenging and expensive, as it requires specialized knowledge and existing automated tools are often ineffective.…
▽ More
Unit testing is crucial in software engineering for ensuring quality. However, it's not widely used in parallel and high-performance computing software, particularly scientific applications, due to their smaller, diverse user base and complex logic. These factors make unit testing challenging and expensive, as it requires specialized knowledge and existing automated tools are often ineffective.
To address this, we propose an automated method for generating unit tests for such software, considering their unique features like complex logic and parallel processing. Recently, large language models (LLMs) have shown promise in coding and testing. We explored the capabilities of Davinci (text-davinci-002) and ChatGPT (gpt-3.5-turbo) in creating unit tests for C++ parallel programs. Our results show that LLMs can generate mostly correct and comprehensive unit tests, although they have some limitations, such as repetitive assertions and blank test cases.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
Student-AI Interaction: A Case Study of CS1 students
Authors:
Matin Amoozadeh,
Daye Nam,
Daniel Prol,
Ali Alfageeh,
James Prather,
Michael Hilton,
Sruti Srinivasa Ragavan,
Mohammad Amin Alipour
Abstract:
The new capabilities of generative artificial intelligence tools Generative AI, such as ChatGPT, allow users to interact with the system in intuitive ways, such as simple conversations, and receive (mostly) good-quality answers. These systems can support students' learning objectives by providing accessible explanations and examples even with vague queries. At the same time, they can encourage und…
▽ More
The new capabilities of generative artificial intelligence tools Generative AI, such as ChatGPT, allow users to interact with the system in intuitive ways, such as simple conversations, and receive (mostly) good-quality answers. These systems can support students' learning objectives by providing accessible explanations and examples even with vague queries. At the same time, they can encourage undesired help-seeking behaviors by providing solutions to the students' homework. Therefore, it is important to better understand how students approach such tools and the potential issues such approaches might present for the learners. In this paper, we present a case study for understanding student-AI collaboration to solve programming tasks in the CS1 introductory programming course. To this end, we recruited a gender-balanced majority non-white set of 15 CS1 students at a large public university in the US. We observed them solving programming tasks. We used a mixed-method approach to study their interactions as they tackled Python programming tasks, focusing on when and why they used ChatGPT for problem-solving. We analyze and classify the questions submitted by the 15 participants to ChatGPT. Additionally, we analyzed user interaction patterns, their reactions to ChatGPT's responses, and the potential impacts of Generative AI on their perception of self-efficacy. Our results suggest that in about a third of the cases, the student attempted to complete the task by submitting the full description of the tasks to ChatGPT without making any effort on their own. We also observed that few students verified their solutions. We discuss the results and their potential implications.
△ Less
Submitted 10 October, 2024; v1 submitted 29 June, 2024;
originally announced July 2024.
-
The interplay of WGC and WCCC via charged scalar field fluxes in the RPST framework
Authors:
Mohammad Reza Alipour,
Jafar Sadeghi,
Saeed Noori Gashti,
Mohammad Ali S. Afshar
Abstract:
In this paper, we investigate the weak cosmic censorship conjecture (WCCC) for the Reissner-Nordstrom (R-N) AdS black hole in a restricted phase space thermodynamics (RPST). Also here, we consider energy flux and equivalence mass-energy principle and examine the weak gravity conjecture (WGC) and the weak cosmic censorship conjecture. The incoming and outgoing energy flux leads to changes in the bl…
▽ More
In this paper, we investigate the weak cosmic censorship conjecture (WCCC) for the Reissner-Nordstrom (R-N) AdS black hole in a restricted phase space thermodynamics (RPST). Also here, we consider energy flux and equivalence mass-energy principle and examine the weak gravity conjecture (WGC) and the weak cosmic censorship conjecture. The incoming and outgoing energy flux leads to changes in the black hole. In that case, by applying the first law, we examined whether the second law of thermodynamics is valid. And also one can say that, in the case where absorption and superradiance are in the saturated to an equilibrium. Also, by using the thermodynamics of black holes in the restricted phase space, we show that if the black hole is in an extreme or close to an extreme state with radiation and particle absorption, the weak cosmic censorship conjecture is established. In addition, with the help of equivalence mass and energy principle and second-order approximation, in the near extremity, we find that when the black hole radiates and its central charge is greater than the scaled electric charge, the superradiance particles obey the weak gravity conjecture, and this causes the black hole to move further away from its extreme state. But when the particles that obey the weak gravity conjecture are attracted to the black hole when the black hole is very small. Then, in this case, we note that the black hole becomes closer to its extreme state.
△ Less
Submitted 13 October, 2024; v1 submitted 19 June, 2024;
originally announced June 2024.
-
Revisiting Human Information Foraging: Adaptations for LLM-based Chatbots
Authors:
Sruti Srinivasa Ragavan,
Mohammad Amin Alipour
Abstract:
Information Foraging Theory's (IFT) framing of human information seeking choices as decision-theoretic cost-value judgments has successfully explained how people seek information among linked patches of information (e.g., linked webpages). However, the theory has to be adopted and validated in non-patchy LLM-based chatbot environments, before its postulates can be reliably applied to the design of…
▽ More
Information Foraging Theory's (IFT) framing of human information seeking choices as decision-theoretic cost-value judgments has successfully explained how people seek information among linked patches of information (e.g., linked webpages). However, the theory has to be adopted and validated in non-patchy LLM-based chatbot environments, before its postulates can be reliably applied to the design of such chat-based information seeking environments. This paper is a thought experiment that applies the IFT cost-value proposition to LLM-based chatbots and presents a set of preliminary hypotheses to guide future theory-building efforts for how people seek information in such environments.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Measuring Impacts of Poisoning on Model Parameters and Embeddings for Large Language Models of Code
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Mohammad Amin Alipour
Abstract:
Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential…
▽ More
Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential backdoor signals in code models. Specifically, we examine attention weights and biases, and context embeddings of the clean and poisoned CodeBERT and CodeT5 models. Our results suggest noticeable patterns in context embeddings of poisoned samples for both the poisoned models; however, attention weights and biases do not show any significant differences. This work contributes to ongoing efforts in white-box detection of backdoor signals in LLMs of code through the analysis of parameters and embeddings.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
Trojans in Large Language Models of Code: A Critical Review through a Trigger-Based Taxonomy
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Toufique Ahmed,
Bowen Xu,
Premkumar Devanbu,
Mohammad Amin Alipour
Abstract:
Large language models (LLMs) have provided a lot of exciting new capabilities in software development. However, the opaque nature of these models makes them difficult to reason about and inspect. Their opacity gives rise to potential security risks, as adversaries can train and deploy compromised models to disrupt the software development process in the victims' organization.
This work presents…
▽ More
Large language models (LLMs) have provided a lot of exciting new capabilities in software development. However, the opaque nature of these models makes them difficult to reason about and inspect. Their opacity gives rise to potential security risks, as adversaries can train and deploy compromised models to disrupt the software development process in the victims' organization.
This work presents an overview of the current state-of-the-art trojan attacks on large language models of code, with a focus on triggers -- the main design point of trojans -- with the aid of a novel unifying trigger taxonomy framework. We also aim to provide a uniform definition of the fundamental concepts in the area of trojans in Code LLMs. Finally, we draw implications of findings on how code models learn on trigger design.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Kramer's Escape Rate and Phase Transition Dynamics in AdS Black Holes
Authors:
Mohammad Ali S. Afshar,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Jafar Sadeghi
Abstract:
Traditional static methods in phase transition studies, provide good insights into the thermodynamics of black holes. However, they practically lose sight of the dynamic aspects and temporal sequence of events. The Kramer's escape rate, central to our research, offers a somewhat dynamic approach to phase transition. We examine the free energy landscapes for black holes under the influence of 'dark…
▽ More
Traditional static methods in phase transition studies, provide good insights into the thermodynamics of black holes. However, they practically lose sight of the dynamic aspects and temporal sequence of events. The Kramer's escape rate, central to our research, offers a somewhat dynamic approach to phase transition. We examine the free energy landscapes for black holes under the influence of 'dark' and 'stringy dark' structures, assessing how additional parameters affect the escape rates and dynamics of the transition during the first-order phase transition from small to large black holes. In our analysis, we consider the escape rate as a function of the black hole radius and study its variations. We will observe that, on one hand, the escape rate well represents our assumption based on the movement from zero, increasing to a maximum point, and then decreasing back to zero as reactive structures become active during the phase transition interval. However, the critical point in this method is the encounter with a specific and distinct point. This is where the diagram of the direct process (escape rate from small to large black holes) intersects with the reverse process (large to small black holes), becoming equally probable (contact point). The point, which seems improbable at the onset of the phase transition or very negligible, gains more significance as the process progresses. This increase indicates the dominance of a region where the escape rate from larger black holes to smaller ones prevails. The predominance of the reverse process, which increases as we approach the end of the process and is necessarily accompanied by a variation in radius, may be considered as a natural reaction of the black hole against the 'phase change' action. A reaction which attempting to prevent any uncontrolled radial growth that could jeopardize the stability of the black hole.
△ Less
Submitted 6 February, 2025; v1 submitted 27 April, 2024;
originally announced April 2024.
-
Weak Cosmic Censorship and Weak Gravity Conjectures in CFT Thermodynamics
Authors:
Jafar Sadeghi,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
In this paper, we explore the intriguing interplay between fundamental theoretical physics concepts within the context of charged black holes. Specifically, we focus on the consistency of the weak gravity conjecture (WGC) and weak cosmic censorship conjecture (WCCC) in the thermodynamics of conformal field theory (CFT), and restricted phase space thermodynamics (RPST) for AdS Reissner-Nordstrom bl…
▽ More
In this paper, we explore the intriguing interplay between fundamental theoretical physics concepts within the context of charged black holes. Specifically, we focus on the consistency of the weak gravity conjecture (WGC) and weak cosmic censorship conjecture (WCCC) in the thermodynamics of conformal field theory (CFT), and restricted phase space thermodynamics (RPST) for AdS Reissner-Nordstrom black holes with a perfect fluid dark matter (RN-PFDM). The WGC ensures that gravity remains the weakest force in the system. Meanwhile, the WCCC addresses the cosmic censorship problem by preventing the violation of fundamental physical laws near the black hole singularity. First, we analyze the RN black hole's free energy in both spaces, revealing a distinctive swallowtail pattern indicative of a first-order phase transition when certain free parameter conditions are met. We explore the WGC across different phase spaces, emphasizing the need for certain conditions in extended phase space thermodynamics (EPST), RPST, and CFT. We demonstrate that PFDM parameter \( γ\) and the radius of AdS \( l \) have a vital role in proving the satisfaction of the WGC. Also, these values have a linear relation with the range compatibility of WGC. The range of compatibility for WGC in RPST and EPST is the same while for CFT, this range is larger than EPST, and RPST. It means somehow the WGC and CFT are more consistent. The WCCC was examined at the critical juncture, confirming its validity in critical points. We conclude that the WGC is supported at the critical point of black holes, and the WCCC is also maintained, demonstrating the robustness of these conjectures within the critical ranges of black hole parameters
△ Less
Submitted 5 November, 2024; v1 submitted 24 April, 2024;
originally announced April 2024.
-
Joint Soil and Above-Ground Biomass Characterization Using Radars
Authors:
Luke Jacobs,
Mohamad Alipour,
Adam Watts,
Elahe Soltanaghai
Abstract:
Soil moisture sensing through biomass or vegetation canopy has challenged researchers, even those who use SAR sensors with penetration capabilities. This is mainly due to the imposed extra time and phase offsets on Radio Frequency (RF) signals as they travel through the canopy. These offsets depend on the vegetation canopy moisture and height, both of which are typically unknown in agricultural an…
▽ More
Soil moisture sensing through biomass or vegetation canopy has challenged researchers, even those who use SAR sensors with penetration capabilities. This is mainly due to the imposed extra time and phase offsets on Radio Frequency (RF) signals as they travel through the canopy. These offsets depend on the vegetation canopy moisture and height, both of which are typically unknown in agricultural and forest fields. In this paper, we leverage the mobility of an unmanned aerial system (UAS) to collect spatially-diverse radar measurements, enabling the joint estimation of soil moisture, above-ground biomass moisture, and biomass height, all without assuming any calibration steps. We leverage the changes in time-of-flight (ToF) and angle-of-arrival (AoA) measurements of reflected radar signals as the UAS flies above a reflector buried under the soil. We demonstrate the effectiveness of our algorithm by simulating its performance under realistic measurement noises as well as conducting lab experiments with different types of above-ground biomass. Our simulation results conclude that our algorithm is capable of estimating volumetric soil moisture to less than 1% median absolute error (MAE), vegetation height to 11.1cm MAE, and vegetation relative permittivity to 0.32 MAE. Our experimental results demonstrate the effectiveness of the proposed method in practical scenarios for varying biomass moistures and heights.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Dual-Frequency Radar Wave-Inversion for Sub-Surface Material Characterization
Authors:
Ishfaq Aziz,
Elahe Soltanaghai,
Adam Watts,
Mohamad Alipour
Abstract:
Moisture estimation of sub-surface soil and the overlaying biomass layer is pivotal in precision agriculture and wildfire risk assessment. However, the characterization of layered material is nontrivial due to the radar penetration-resolution tradeoff. Here, a waveform inversion-based method was proposed for predicting the dielectric permittivity (as a moisture proxy) of the bottom soil layer and…
▽ More
Moisture estimation of sub-surface soil and the overlaying biomass layer is pivotal in precision agriculture and wildfire risk assessment. However, the characterization of layered material is nontrivial due to the radar penetration-resolution tradeoff. Here, a waveform inversion-based method was proposed for predicting the dielectric permittivity (as a moisture proxy) of the bottom soil layer and the top biomass layer from radar signals. Specifically, the use of a combination of a higher and a lower frequency radar compared to a single frequency in predicting the permittivity of both the soil and the overlaying layer was investigated in this study. The results show that each layer was best characterized via one of the frequencies. However, for the simultaneous prediction of both layers permittivity, the most consistent results were achieved by inversion of data from a combination of both frequencies, showing better correlation with in situ permittivity and reduced prediction errors.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
FUELVISION: A Multimodal Data Fusion and Multimodel Ensemble Algorithm for Wildfire Fuels Mapping
Authors:
Riyaaz Uddien Shaik,
Mohamad Alipour,
Eric Rowell,
Bharathan Balaji,
Adam Watts,
Ertugrul Taciroglu
Abstract:
Accurate assessment of fuel conditions is a prerequisite for fire ignition and behavior prediction, and risk management. The method proposed herein leverages diverse data sources including Landsat-8 optical imagery, Sentinel-1 (C-band) Synthetic Aperture Radar (SAR) imagery, PALSAR (L-band) SAR imagery, and terrain features to capture comprehensive information about fuel types and distributions. A…
▽ More
Accurate assessment of fuel conditions is a prerequisite for fire ignition and behavior prediction, and risk management. The method proposed herein leverages diverse data sources including Landsat-8 optical imagery, Sentinel-1 (C-band) Synthetic Aperture Radar (SAR) imagery, PALSAR (L-band) SAR imagery, and terrain features to capture comprehensive information about fuel types and distributions. An ensemble model was trained to predict landscape-scale fuels such as the 'Scott and Burgan 40' using the as-received Forest Inventory and Analysis (FIA) field survey plot data obtained from the USDA Forest Service. However, this basic approach yielded relatively poor results due to the inadequate amount of training data. Pseudo-labeled and fully synthetic datasets were developed using generative AI approaches to address the limitations of ground truth data availability. These synthetic datasets were used for augmenting the FIA data from California to enhance the robustness and coverage of model training. The use of an ensemble of methods including deep learning neural networks, decision trees, and gradient boosting offered a fuel mapping accuracy of nearly 80\%. Through extensive experimentation and evaluation, the effectiveness of the proposed approach was validated for regions of the 2021 Dixie and Caldor fires. Comparative analyses against high-resolution data from the National Agriculture Imagery Program (NAIP) and timber harvest maps affirmed the robustness and reliability of the proposed approach, which is capable of near-real-time fuel mapping.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
Enhancing IoT Security Against DDoS Attacks through Federated Learning
Authors:
Ghazaleh Shirvani,
Saeid Ghasemshirazi,
Mohammad Ali Alipour
Abstract:
The rapid proliferation of the Internet of Things (IoT) has ushered in transformative connectivity between physical devices and the digital realm. Nonetheless, the escalating threat of Distributed Denial of Service (DDoS) attacks jeopardizes the integrity and reliability of IoT networks. Conventional DDoS mitigation approaches are ill-equipped to handle the intricacies of IoT ecosystems, potential…
▽ More
The rapid proliferation of the Internet of Things (IoT) has ushered in transformative connectivity between physical devices and the digital realm. Nonetheless, the escalating threat of Distributed Denial of Service (DDoS) attacks jeopardizes the integrity and reliability of IoT networks. Conventional DDoS mitigation approaches are ill-equipped to handle the intricacies of IoT ecosystems, potentially compromising data privacy. This paper introduces an innovative strategy to bolster the security of IoT networks against DDoS attacks by harnessing the power of Federated Learning that allows multiple IoT devices or edge nodes to collaboratively build a global model while preserving data privacy and minimizing communication overhead. The research aims to investigate Federated Learning's effectiveness in detecting and mitigating DDoS attacks in IoT. Our proposed framework leverages IoT devices' collective intelligence for real-time attack detection without compromising sensitive data. This study proposes innovative deep autoencoder approaches for data dimensionality reduction, retraining, and partial selection to enhance the performance and stability of the proposed model. Additionally, two renowned aggregation algorithms, FedAvg and FedAvgM, are employed in this research. Various metrics, including true positive rate, false positive rate, and F1-score, are employed to evaluate the model. The dataset utilized in this research, N-BaIoT, exhibits non-IID data distribution, where data categories are distributed quite differently. The negative impact of these distribution disparities is managed by employing retraining and partial selection techniques, enhancing the final model's stability. Furthermore, evaluation results demonstrate that the FedAvgM aggregation algorithm outperforms FedAvg, indicating that in non-IID datasets, FedAvgM provides better stability and performance.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
On Trojan Signatures in Large Language Models of Code
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Mohammad Amin Alipour
Abstract:
Trojan signatures, as described by Fields et al. (2021), are noticeable differences in the distribution of the trojaned class parameters (weights) and the non-trojaned class parameters of the trojaned model, that can be used to detect the trojaned model. Fields et al. (2021) found trojan signatures in computer vision classification tasks with image models, such as, Resnet, WideResnet, Densenet, an…
▽ More
Trojan signatures, as described by Fields et al. (2021), are noticeable differences in the distribution of the trojaned class parameters (weights) and the non-trojaned class parameters of the trojaned model, that can be used to detect the trojaned model. Fields et al. (2021) found trojan signatures in computer vision classification tasks with image models, such as, Resnet, WideResnet, Densenet, and VGG. In this paper, we investigate such signatures in the classifier layer parameters of large language models of source code.
Our results suggest that trojan signatures could not generalize to LLMs of code. We found that trojaned code models are stubborn, even when the models were poisoned under more explicit settings (finetuned with pre-trained weights frozen). We analyzed nine trojaned models for two binary classification tasks: clone and defect detection. To the best of our knowledge, this is the first work to examine weight-based trojan signature revelation techniques for large-language models of code and furthermore to demonstrate that detecting trojans only from the weights in such models is a hard problem.
△ Less
Submitted 7 March, 2024; v1 submitted 23 February, 2024;
originally announced February 2024.
-
Measuring Impacts of Poisoning on Model Parameters and Neuron Activations: A Case Study of Poisoning CodeBERT
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Navid Ayoobi,
Mohammad Amin Alipour
Abstract:
Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential…
▽ More
Large language models (LLMs) have revolutionized software development practices, yet concerns about their safety have arisen, particularly regarding hidden backdoors, aka trojans. Backdoor attacks involve the insertion of triggers into training data, allowing attackers to manipulate the behavior of the model maliciously. In this paper, we focus on analyzing the model parameters to detect potential backdoor signals in code models. Specifically, we examine attention weights and biases, activation values, and context embeddings of the clean and poisoned CodeBERT models. Our results suggest noticeable patterns in activation values and context embeddings of poisoned samples for the poisoned CodeBERT model; however, attention weights and biases do not show any significant differences. This work contributes to ongoing efforts in white-box detection of backdoor signals in LLMs of code through the analysis of parameters and activations.
△ Less
Submitted 5 March, 2024; v1 submitted 20 February, 2024;
originally announced February 2024.
-
Cooling and heating regions of Joule-Thomson expansion for AdS black holes: Einstein-Maxwell-Power-Yang-Mills and Kerr Sen black holes
Authors:
Mohammad Reza Alipour,
Saeed Noori Gashti,
Mohammad Ali S. Afshar,
Jafar Sadeghi
Abstract:
In this paper, we study the Joule-Thomson Expansion (JTE) process for two types of black holes: AdS-Einstein-Maxwell-Power-Yang-Mills (AEMPYM) and AdS-Kerr-Sen (AKS). Our study focuses on understanding how various parameters influence the Joule-Thomson Coefficient (JTC), the inversion curve, and the ratio of minimum inversion temperature to critical temperature. For the AKS black hole, we observe…
▽ More
In this paper, we study the Joule-Thomson Expansion (JTE) process for two types of black holes: AdS-Einstein-Maxwell-Power-Yang-Mills (AEMPYM) and AdS-Kerr-Sen (AKS). Our study focuses on understanding how various parameters influence the Joule-Thomson Coefficient (JTC), the inversion curve, and the ratio of minimum inversion temperature to critical temperature. For the AKS black hole, we observe that the isenthalpic curves can exhibit either cooling or heating behavior. This behavior is determined by the inversion curve, which is affected by the black hole's mass and specific parameters such as $b$ (parameter signifies the ionic charge of the black hole) and $a$ (rotation parameter). In the case of the AEMPYM black hole, our findings reveal that the ratio of minimum inversion temperature to critical temperature approaches a specific value as Maxwell's charge increases. This ratio remains constant for certain parameter values, while it varies for others. Specifically, when the parameter $q$ (real positive parameter of AEMPYM black hole) is greater than 1, the ratio is almost equal to 1/2 as Maxwell's charge (C) increases. When q equals 1/2, the ratio is exactly 1/2 for all values of (C). For values of (q) between 1/2 and 1, the ratio is close to 1/2, and for values of (q) between 0 and 1/2, the ratio decreases, moving away from 1/2. For the AKS black hole, we find that specific parameter values, such as (a = 0.00951) and (b = 0.00475 ), yield a ratio of minimum inversion temperature to a critical temperature that is approximately 1/2. This consistency across different parameter values highlights the robustness of our findings. Finally, we compare our results with those reported in the existing literature, providing a comprehensive summary in detailed tables.
△ Less
Submitted 4 March, 2025; v1 submitted 3 February, 2024;
originally announced February 2024.
-
Investigation of hidden symmetry in $AdS_{5}$ black hole with Heun equation
Authors:
Jafar Sadeghi,
Mohammad Ali S. Afshar,
Mohammad Reza Alipour,
Saeed Noori Gashti
Abstract:
Investigating the existence of algebra and finding hidden symmetries in physical systems is one of the most important aspects for understanding their behavior and predicting their future. Expanding this unique method of study to cosmic structures and combining past knowledge with new data can be very interesting and lead to discovering new ways to analyze these systems. However, studying black hol…
▽ More
Investigating the existence of algebra and finding hidden symmetries in physical systems is one of the most important aspects for understanding their behavior and predicting their future. Expanding this unique method of study to cosmic structures and combining past knowledge with new data can be very interesting and lead to discovering new ways to analyze these systems. However, studying black hole symmetries always presents many complications and sometimes requires computational approximations. For example, checking the existence of Killing vectors and then calculating them is not always an easy task. It becomes much more difficult as the structure and geometry of the system become more complex. In this work, we will show that if the wave equations with a black hole background can be converted in the form of general Heun equation, based on its structure and coefficients, the algebra of the system can be easily studied, and computational and geometrical complications can be omitted. For this purpose, we selected two $AdS_5$ black holes: Reissner-Nordstrom (R-N) and Kerr, and analyzed the Klein-Gordon equation with the background of these black holes. Based on this concept, we observed that the radial part of the R-N black hole and both the radial and angular parts of the Kerr black hole could be transformed into the general form of the Heun equation. As a result, according to the algebraic structure that governs the Heun equation and its coefficients, one can easily achieve generalized $sl(2)$ algebra.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
UAS-based Automated Structural Inspection Path Planning via Visual Data Analytics and Optimization
Authors:
Yuxiang Zhao,
Benhao Lu,
Mohamad Alipour
Abstract:
Unmanned Aerial Systems (UAS) have gained significant traction for their application in infrastructure inspections. However, considering the enormous scale and complex nature of infrastructure, automation is essential for improving the efficiency and quality of inspection operations. One of the core problems in this regard is electing an optimal automated flight path that can achieve the mission o…
▽ More
Unmanned Aerial Systems (UAS) have gained significant traction for their application in infrastructure inspections. However, considering the enormous scale and complex nature of infrastructure, automation is essential for improving the efficiency and quality of inspection operations. One of the core problems in this regard is electing an optimal automated flight path that can achieve the mission objectives while minimizing flight time. This paper presents an effective formulation for the path planning problem in the context of structural inspections. Coverage is guaranteed as a constraint to ensure damage detectability and path length is minimized as an objective, thus maximizing efficiency while ensuring inspection quality. A two-stage algorithm is then devised to solve the path planning problem, composed of a genetic algorithm for determining the positions of viewpoints and a greedy algorithm for calculating the poses. A comprehensive sensitivity analysis is conducted to demonstrate the proposed algorithm's effectiveness and range of applicability. Applied examples of the algorithm, including partial space inspection with no-fly zones and focused inspection, are also presented, demonstrating the flexibility of the proposed method to meet real-world structural inspection requirements. In conclusion, the results of this study highlight the feasibility of the proposed approach and establish the groundwork for incorporating automation into UAS-based structural inspection mission planning.
△ Less
Submitted 22 December, 2023;
originally announced December 2023.
-
Bayesian inversion of GPR waveforms for sub-surface material characterization: an uncertainty-aware retrieval of soil moisture and overlaying biomass properties
Authors:
Ishfaq Aziz,
Elahe Soltanaghai,
Adam Watts,
Mohamad Alipour
Abstract:
Accurate estimation of sub-surface properties such as moisture content and depth of soil and vegetation layers is crucial for applications spanning sub-surface condition monitoring, precision agriculture, and effective wildfire risk assessment. Soil in nature is often covered by overlaying vegetation and surface organic material, making its characterization challenging. In addition, the estimation…
▽ More
Accurate estimation of sub-surface properties such as moisture content and depth of soil and vegetation layers is crucial for applications spanning sub-surface condition monitoring, precision agriculture, and effective wildfire risk assessment. Soil in nature is often covered by overlaying vegetation and surface organic material, making its characterization challenging. In addition, the estimation of the properties of the overlaying layer is crucial for applications like wildfire risk assessment. This study thus proposes a Bayesian model-updating-based approach for ground penetrating radar (GPR) waveform inversion to predict moisture contents and depths of soil and overlaying material layer. Due to its high correlation with moisture contents, the dielectric permittivity of both layers were predicted with the proposed method, along with other parameters, including depth and electrical conductivity of layers. The proposed Bayesian model updating approach yields probabilistic estimates of these parameters that can provide information about the confidence and uncertainty related to the estimates. The methodology was evaluated for a diverse range of experimental data collected through laboratory and field investigations. Laboratory investigations included variations in soil moisture values, depth of the overlaying surface layer, and coarseness of its material. The field investigation included measurement of field soil moisture for sixteen days. The results demonstrated predictions consistent with time-domain reflectometry (TDR) measurements and conventional gravimetric tests. The depth of the surface layer could also be predicted with reasonable accuracy. The proposed method provides a promising approach for uncertainty-aware sub-surface parameter estimation that can enable decision-making for risk assessment across a wide range of applications.
△ Less
Submitted 28 June, 2024; v1 submitted 13 December, 2023;
originally announced December 2023.
-
Thermodynamic topology of black holes from bulk-boundary, extended, and restricted phase space perspectives
Authors:
Jafar Sadeghi,
Mohmmad Ali S. Afshar,
Saeed Noori Gashti,
Mohammad Reza Alipour
Abstract:
In this article, we investigate the thermodynamic topology of some black holes, namely AdS Reissner Nordstrom (R-N), AdS Einstein-Gauss-Bonnet (EGB), and AdS Einstein-power-Yang-Mills (EPYM), from different frameworks: bulk-boundary (BB) and restricted phase space (RPS). Using the generalized off-shell Helmholtz free energy method, we calculate the thermodynamic topology of the selected black hole…
▽ More
In this article, we investigate the thermodynamic topology of some black holes, namely AdS Reissner Nordstrom (R-N), AdS Einstein-Gauss-Bonnet (EGB), and AdS Einstein-power-Yang-Mills (EPYM), from different frameworks: bulk-boundary (BB) and restricted phase space (RPS). Using the generalized off-shell Helmholtz free energy method, we calculate the thermodynamic topology of the selected black holes in each space separately and determine their topological classifications. We show that the addition of GB terms, dimensions, and other factors do not affect the topological classes of black holes in both spaces. The calculations and plots indicate that the AdS R-N and AdS EGB black holes show similar behavior and their topological numbers sets in both spaces, i.e., BB and RPS, are similar and equal to ($W=+1$). However, AdS EPYM black holes show an interesting behavior. In addition to BBT and RPS, we also consider the extended phase space thermodynamics (EPST) and evaluate the thermodynamic topology for AdS EPYM black hole. The changing ($r-τ$) in both spaces shows similar behavior. Also, the topological number and the total topological numbers for this black hole in the BB, RPS and EPS thermodynamics are completely same, i,e., $(ω_{BBT}=ω_{RPS}=ω_{EPST}=+1, -1)$ or $W_{BBT}=W_{RPS}=W_{EPST}=0$. An important point is that the Einstein-Yang-Mills black hole has thermodynamic topology equivalence in three spaces. The present result may be due to the non-linear YM charge parameter and the difference between the gauge and gravity corrections in the above black holes
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Occlusion-based Detection of Trojan-triggering Inputs in Large Language Models of Code
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Toufique Ahmed,
Mohammad Amin Alipour,
Bowen Xu
Abstract:
Large language models (LLMs) are becoming an integrated part of software development. These models are trained on large datasets for code, where it is hard to verify each data point. Therefore, a potential attack surface can be to inject poisonous data into the training data to make models vulnerable, aka trojaned. It can pose a significant threat by hiding manipulative behaviors inside models, le…
▽ More
Large language models (LLMs) are becoming an integrated part of software development. These models are trained on large datasets for code, where it is hard to verify each data point. Therefore, a potential attack surface can be to inject poisonous data into the training data to make models vulnerable, aka trojaned. It can pose a significant threat by hiding manipulative behaviors inside models, leading to compromising the integrity of the models in downstream tasks.
In this paper, we propose an occlusion-based human-in-the-loop technique, OSeql, to distinguish trojan-triggering inputs of code. The technique is based on the observation that trojaned neural models of code rely heavily on the triggering part of input; hence, its removal would change the confidence of the models in their prediction substantially. Our results suggest that OSeql can detect the triggering inputs with almost 100% recall. We discuss the problem of false positives and how to address them. These results provide a baseline for future studies in this field.
△ Less
Submitted 10 December, 2023; v1 submitted 6 December, 2023;
originally announced December 2023.
-
TrojanedCM: A Repository of Trojaned Large Language Models of Code
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Mohammad Amin Alipour
Abstract:
With the rapid growth of research in trojaning deep neural models of source code, we observe that there is a need of developing a benchmark trojaned models for testing various trojan detection and unlearning techniques. In this work, we aim to provide the scientific community with diverse trojaned code models, that cover a variety of state-of-the-art architectures, on which they can examine such t…
▽ More
With the rapid growth of research in trojaning deep neural models of source code, we observe that there is a need of developing a benchmark trojaned models for testing various trojan detection and unlearning techniques. In this work, we aim to provide the scientific community with diverse trojaned code models, that cover a variety of state-of-the-art architectures, on which they can examine such techniques. We thus present TrojanedCM, a publicly available repository of clean and poisoned models of source code. We provide poisoned models for two code classification tasks (defect detection and clone detection) and a code generation task (text-to-code generation). We finetuned popular pretrained code models such as CodeBERT, PLBART, CodeT5, CodeT5+, on poisoned datasets that we generated from benchmark datasets (Devign, BigCloneBench, CONCODE) for the above mentioned tasks. The repository also provides full access to the architecture and parameters of the models, allowing practitioners to investigate different white-box analysis techniques. In addition to the poisoned models, we also provide a poisoning framework using which practitioners can deploy various poisoning strategies for the different tasks and models of source code. All the material are accessible via this link: https://github.com/UH-SERG/TrojanedCM.
△ Less
Submitted 11 December, 2023; v1 submitted 24 November, 2023;
originally announced November 2023.
-
Trust in Generative AI among students: An Exploratory Study
Authors:
Matin Amoozadeh,
David Daniels,
Daye Nam,
Aayush Kumar,
Stella Chen,
Michael Hilton,
Sruti Srinivasa Ragavan,
Mohammad Amin Alipour
Abstract:
Generative artificial systems (GenAI) have experienced exponential growth in the past couple of years. These systems offer exciting capabilities, such as generating programs, that students can well utilize for their learning. Among many dimensions that might affect the effective adoption of GenAI, in this paper, we investigate students' \textit{trust}. Trust in GenAI influences the extent to which…
▽ More
Generative artificial systems (GenAI) have experienced exponential growth in the past couple of years. These systems offer exciting capabilities, such as generating programs, that students can well utilize for their learning. Among many dimensions that might affect the effective adoption of GenAI, in this paper, we investigate students' \textit{trust}. Trust in GenAI influences the extent to which students adopt GenAI, in turn affecting their learning. In this study, we surveyed 253 students at two large universities to understand how much they trust \genai tools and their feedback on how GenAI impacts their performance in CS courses. Our results show that students have different levels of trust in GenAI. We also observe different levels of confidence and motivation, highlighting the need for further understanding of factors impacting trust.
△ Less
Submitted 1 February, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Zero Trust: Applications, Challenges, and Opportunities
Authors:
Saeid Ghasemshirazi,
Ghazaleh Shirvani,
Mohammad Ali Alipour
Abstract:
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementation…
▽ More
The escalating complexity of cybersecurity threats necessitates innovative approaches to safeguard digital assets and sensitive information. The Zero Trust paradigm offers a transformative solution by challenging conventional security models and emphasizing continuous verification and least privilege access. This survey comprehensively explores the theoretical foundations, practical implementations, applications, challenges, and future trends of Zero Trust. Through meticulous analysis, we highlight the relevance of Zero Trust in securing cloud environments, facilitating remote work, and protecting the Internet of Things (IoT) ecosystem. While cultural barriers and technical complexities present challenges, their mitigation unlocks Zero Trust's potential. Integrating Zero Trust with emerging technologies like AI and machine learning augments its efficacy, promising a dynamic and responsive security landscape. Embracing Zero Trust empowers organizations to navigate the ever-evolving cybersecurity realm with resilience and adaptability, redefining trust in the digital age.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Thermodynamic Topology and Photon Spheres in the Hyperscaling violating black holes
Authors:
Jafar Sadeghi,
Mohammad Ali S. Afshar,
Saeed Noori Gashti,
Mohammad Reza Alipour
Abstract:
It was shown that a standard ring of light can be imagined outside the event horizon for stationary rotating four-dimensional black holes with axial symmetry using the topological method\cite{001,002}. Based on this concept, in this paper, we investigate the topological charge and the conditions of existence of the photon sphere (PS) for a hyperscaling violation (HSV) black hole with various value…
▽ More
It was shown that a standard ring of light can be imagined outside the event horizon for stationary rotating four-dimensional black holes with axial symmetry using the topological method\cite{001,002}. Based on this concept, in this paper, we investigate the topological charge and the conditions of existence of the photon sphere (PS) for a hyperscaling violation (HSV) black hole with various values of the parameters of this model. Then, after carrying out a detailed analysis, we show the conventional topological classes viz $Q=-1$ for the mentioned black hole and $Q=0$ for the naked singularities. \textit{Also, we propose a new topological class for naked singularities (Q=+1) with respect to $z\geq1$. We also determined that $z\geq2$, it either shows a naked singularity form with total topological charge $+1$ or has no solution. Therefore, we have the black hole solution only in $1\leq z<2$}. Then, we will use two different methods, namely the temperature (Duan's topological current $Φ$-mapping theory) and the generalized Helmholtz free energy method, to study the topological classes of our black hole. We discuss the critical and zero points (topological charges and topological numbers) for different parameters of hyperscaling violating black holes, such as ($z, \overlineθ$) and other free parameters, and study their thermodynamic topology. We observe that for a given value of the parameters $1\leq z<2$, $\overlineθ$, and other free parameters, there exist two total topological charges $(Q_{total}=-1, 0)$ with the same phase structure for the $T$ method and total topological numbers $(W=+1)$ for the generalized Helmholtz free energy method. Additionally, we summarize the results for each study as photon sphere, temperature, and generalized Helmholtz free energy in some figures and tables. Finally, we compare our findings with other related studies in the literature.
△ Less
Submitted 20 December, 2023; v1 submitted 24 July, 2023;
originally announced July 2023.
-
WGC and WCC for charged black holes with quintessence and cloud of strings
Authors:
Mohammad Reza Alipour,
Jafar Sadeghi,
Mehdi Shokri
Abstract:
One of the important problems with the existence of weak gravity conjecture ($WGC$) is the violation of the cosmic censorship. Such a cosmic phenomena is important and consistent in general relativity. It means that for a charged black hole in four dimensions and in the normal state, the $WGC$ cannot hold due to the violation of the weak cosmic censorship conjecture ($WCCC$). But in this paper, in…
▽ More
One of the important problems with the existence of weak gravity conjecture ($WGC$) is the violation of the cosmic censorship. Such a cosmic phenomena is important and consistent in general relativity. It means that for a charged black hole in four dimensions and in the normal state, the $WGC$ cannot hold due to the violation of the weak cosmic censorship conjecture ($WCCC$). But in this paper, in order to eliminate such a violation, we try to consider RN black hole at two cases, with quintessence, quintessence and cloud of strings in asymptotically flat and non-asymptotically flat. By using such metric background and applying restrictions on its parameters, we show that there will be a good compatibility between $WGC$ and $WCCC.$ Here, we can also see that quintessence case has less freedom in establishing compatibility than quintessence and cloud of strings. Because in the second case, the number of parameters is more and there is a degree of freedom to better establish the compatibility of two theories. Also, here we explain charged black hole in \emph{presence of quintessence and cloud of string} for $Q>M$ and use some interesting figures we show the corresponding the black hole has an event horizon.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
Bulk-boundary and RPS Thermodynamics from Topology perspective
Authors:
Jafar Sadeghi,
Mohammad Reza Alipour,
Saeed Noori Gashti,
Mohammad Ali S. Afshar
Abstract:
In this article, we investigate the bulk-boundary and restricted phase space (RPS) thermodynamics of Rissner-Nordström (R-N) AdS and 6-dimensional charged Gauss-Bonnet AdS black holes. Also, we examine the topological characteristics of the considered black holes and compare them with the extended thermodynamics results. In fact, we have found that the topological behavior of the bulk-boundary the…
▽ More
In this article, we investigate the bulk-boundary and restricted phase space (RPS) thermodynamics of Rissner-Nordström (R-N) AdS and 6-dimensional charged Gauss-Bonnet AdS black holes. Also, we examine the topological characteristics of the considered black holes and compare them with the extended thermodynamics results. In fact, we have found that the topological behavior of the bulk-boundary thermodynamics is the same as that of the extended thermodynamics, whereas the RPS thermodynamics exhibits a distinct behavior. We also demonstrate that within the RPS formalism, there is only one critical point with a topological charge of +1 $(Q_t=+1)$. Additionally, for RPS formalism, the inclusion of higher derivative curvature terms in the form of Gauss-Bonnet gravity does not alter the topological classification of critical points in charged AdS black holes.
△ Less
Submitted 4 June, 2024; v1 submitted 28 June, 2023;
originally announced June 2023.
-
Bardeen Black Hole Thermodynamics from Topological Perspective
Authors:
Jafar Sadeghi,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
In this paper, we use the generalized off-shell Helmholtz free energy method to explore the thermodynamic properties of Bardeen black holes (BD BHs) from a topological perspective based on Duan's topological current $φ$-mapping. We consider various structures of BD BHs, including regular BD-AdS BHs, BD-AdS BHs in Kiselev's model of quintessence, BD BHs in massive gravity (MG), and BD BHs in 4D Ein…
▽ More
In this paper, we use the generalized off-shell Helmholtz free energy method to explore the thermodynamic properties of Bardeen black holes (BD BHs) from a topological perspective based on Duan's topological current $φ$-mapping. We consider various structures of BD BHs, including regular BD-AdS BHs, BD-AdS BHs in Kiselev's model of quintessence, BD BHs in massive gravity (MG), and BD BHs in 4D Einstein-Gauss-Bonnet (EGB) gravity. We demonstrate that these BHs have one topological classification (TC), i.e., TC is +1 for all BHs considered, and the addition of MG or GB terms, etc., does not change the topological numbers.
△ Less
Submitted 9 June, 2023;
originally announced June 2023.
-
Can black holes cause cosmic expansion?
Authors:
Jafar Sadeghi,
Saeed Noori Gashti,
Mohammad Reza Alipour,
Mohammad Ali S. Afshar
Abstract:
Recently, it was shown in [1] that black holes are the source of dark energy. In [2-5], the truth or falsity of this concept has been discussed. We briefly state the arguments raised in each of these papers, but our main goal is not to accept or reject these debates. Rather, in this note, we show that black holes in specific structures, such as the Reissner-Nordstrom (R-N) black hole in the presen…
▽ More
Recently, it was shown in [1] that black holes are the source of dark energy. In [2-5], the truth or falsity of this concept has been discussed. We briefly state the arguments raised in each of these papers, but our main goal is not to accept or reject these debates. Rather, in this note, we show that black holes in specific structures, such as the Reissner-Nordstrom (R-N) black hole in the presence of quintessence, string cloud, and perfect fluid, can produce a repulsive force with respect to the weak gravity conjecture mechanism that overcomes the gravitational force.\textit{ We discuss these repulsions forces in a population of black holes of the same family can be considered as an auxiliary factor (albeit a weak factor) for the expansion of the universe}.
△ Less
Submitted 21 May, 2023;
originally announced May 2023.
-
Topological classification and black hole thermodynamics
Authors:
Mohammad Reza Alipour,
Mohammad Ali S. Afshar,
Saeed Noori Gashti,
Jafar Sadeghi
Abstract:
One of the new methods that can be used to study the thermodynamics critical points of a system based on a topological approach is the study of topological charges using Duan's $φ$-mapping method. In this article, we will attempt to use this method to study three different black holes, each with different coefficients in their metric function, in order to determine the class of critical points the…
▽ More
One of the new methods that can be used to study the thermodynamics critical points of a system based on a topological approach is the study of topological charges using Duan's $φ$-mapping method. In this article, we will attempt to use this method to study three different black holes, each with different coefficients in their metric function, in order to determine the class of critical points these black holes have in terms of phase transition. Through this analysis, we found that the Euler-Heisenberg black hole has two different topological classes, and the parameter $"a"$ added to the metric function by QED plays an important role in this classification. While a black hole with a non-linear electrodynamic field, despite having an electromagnetic parameter, which is added to its metric function, has only one topological class, and its $"α"$ parameter has no effect on the number of critical points and topological class. Finally, the Young Mills black hole in massive gravity will have a different number of critical points depending on the coefficient $"c_i"$, which is related to massive gravity and leads to different topological classes. However, this black hole exhibits the same phase structure in all cases.
△ Less
Submitted 17 October, 2023; v1 submitted 9 May, 2023;
originally announced May 2023.
-
A Survey of Trojans in Neural Models of Source Code: Taxonomy and Techniques
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Toufique Ahmed,
Navid Ayoobi,
Bowen Xu,
Prem Devanbu,
Mohammad Amin Alipour
Abstract:
In this work, we study literature in Explainable AI and Safe AI to understand poisoning of neural models of code. In order to do so, we first establish a novel taxonomy for Trojan AI for code, and present a new aspect-based classification of triggers in neural models of code. Next, we highlight recent works that help us deepen our conception of how these models understand software code. Then we pi…
▽ More
In this work, we study literature in Explainable AI and Safe AI to understand poisoning of neural models of code. In order to do so, we first establish a novel taxonomy for Trojan AI for code, and present a new aspect-based classification of triggers in neural models of code. Next, we highlight recent works that help us deepen our conception of how these models understand software code. Then we pick some of the recent, state-of-art poisoning strategies that can be used to manipulate such models. The insights we draw can potentially help to foster future research in the area of Trojan AI for code.
△ Less
Submitted 18 April, 2024; v1 submitted 5 May, 2023;
originally announced May 2023.
-
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Authors:
Aftab Hussain,
Md Rafiqul Islam Rabin,
Bowen Xu,
David Lo,
Mohammad Amin Alipour
Abstract:
Although deep neural models substantially reduce the overhead of feature engineering, the features readily available in the inputs might significantly impact training cost and the performance of the models. In this paper, we explore the impact of an unsuperivsed feature enrichment approach based on variable roles on the performance of neural models of code. The notion of variable roles (as introdu…
▽ More
Although deep neural models substantially reduce the overhead of feature engineering, the features readily available in the inputs might significantly impact training cost and the performance of the models. In this paper, we explore the impact of an unsuperivsed feature enrichment approach based on variable roles on the performance of neural models of code. The notion of variable roles (as introduced in the works of Sajaniemi et al. [Refs. 1,2]) has been found to help students' abilities in programming. In this paper, we investigate if this notion would improve the performance of neural models of code. To the best of our knowledge, this is the first work to investigate how Sajaniemi et al.'s concept of variable roles can affect neural models of code. In particular, we enrich a source code dataset by adding the role of individual variables in the dataset programs, and thereby conduct a study on the impact of variable role enrichment in training the Code2Seq model. In addition, we shed light on some challenges and opportunities in feature enrichment for neural code intelligence models.
△ Less
Submitted 12 March, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.