-
Energy-Efficient Deep Reinforcement Learning with Spiking Transformers
Authors:
Mohammad Irfan Uddin,
Nishad Tasnim,
Md Omor Faruk,
Zejian Zhou
Abstract:
Agent-based Transformers have been widely adopted in recent reinforcement learning advances due to their demonstrated ability to solve complex tasks. However, the high computational complexity of Transformers often results in significant energy consumption, limiting their deployment in real-world autonomous systems. Spiking neural networks (SNNs), with their biologically inspired structure, offer…
▽ More
Agent-based Transformers have been widely adopted in recent reinforcement learning advances due to their demonstrated ability to solve complex tasks. However, the high computational complexity of Transformers often results in significant energy consumption, limiting their deployment in real-world autonomous systems. Spiking neural networks (SNNs), with their biologically inspired structure, offer an energy-efficient alternative for machine learning. In this paper, a novel Spike-Transformer Reinforcement Learning (STRL) algorithm that combines the energy efficiency of SNNs with the powerful decision-making capabilities of reinforcement learning is developed. Specifically, an SNN using multi-step Leaky Integrate-and-Fire (LIF) neurons and attention mechanisms capable of processing spatio-temporal patterns over multiple time steps is designed. The architecture is further enhanced with state, action, and reward encodings to create a Transformer-like structure optimized for reinforcement learning tasks. Comprehensive numerical experiments conducted on state-of-the-art benchmarks demonstrate that the proposed SNN Transformer achieves significantly improved policy performance compared to conventional agent-based Transformers. With both enhanced energy efficiency and policy optimality, this work highlights a promising direction for deploying bio-inspired, low-cost machine learning models in complex real-world decision-making scenarios.
△ Less
Submitted 20 May, 2025;
originally announced May 2025.
-
A Closer Look on Gender Stereotypes in Movie Recommender Systems and Their Implications with Privacy
Authors:
Falguni Roy,
Yiduo Shen,
Na Zhao,
Xiaofeng Ding,
Md. Omar Faruk
Abstract:
The movie recommender system typically leverages user feedback to provide personalized recommendations that align with user preferences and increase business revenue. This study investigates the impact of gender stereotypes on such systems through a specific attack scenario. In this scenario, an attacker determines users' gender, a private attribute, by exploiting gender stereotypes about movie pr…
▽ More
The movie recommender system typically leverages user feedback to provide personalized recommendations that align with user preferences and increase business revenue. This study investigates the impact of gender stereotypes on such systems through a specific attack scenario. In this scenario, an attacker determines users' gender, a private attribute, by exploiting gender stereotypes about movie preferences and analyzing users' feedback data, which is either publicly available or observed within the system. The study consists of two phases. In the first phase, a user study involving 630 participants identified gender stereotypes associated with movie genres, which often influence viewing choices. In the second phase, four inference algorithms were applied to detect gender stereotypes by combining the findings from the first phase with users' feedback data. Results showed that these algorithms performed more effectively than relying solely on feedback data for gender inference. Additionally, we quantified the extent of gender stereotypes to evaluate their broader impact on digital computational science. The latter part of the study utilized two major movie recommender datasets: MovieLens 1M and Yahoo!Movie. Detailed experimental information is available on our GitHub repository: https://github.com/fr-iit/GSMRS
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Quasinormal Modes and the Switchback Effect in Schwarzschild-de Sitter
Authors:
Mir Mehedi Faruk,
Facundo Rost,
Jan Pieter van der Schaar
Abstract:
We study the causal structure of Schwarzschild-de Sitter (SdS), including shock wave perturbations, in $D>3$ using reflected null ray trajectories, either through the interior black hole or the exterior de Sitter region. Specifically, we compute the quasinormal mode frequencies in the eikonal, high-frequency, limit, by identifying the `critical time', for arbitrary values of the black hole mass. W…
▽ More
We study the causal structure of Schwarzschild-de Sitter (SdS), including shock wave perturbations, in $D>3$ using reflected null ray trajectories, either through the interior black hole or the exterior de Sitter region. Specifically, we compute the quasinormal mode frequencies in the eikonal, high-frequency, limit, by identifying the `critical time', for arbitrary values of the black hole mass. We emphasize the important role of the static sphere proper time normalization and related boundary conditions. The computed critical times indicate the presence of singularities in the late-time, large mass, scalar field correlator in SdS, which should be resolved by introducing complex geodesics consistent with interior black hole and exterior de Sitter effective thermofield double states. In addition we relate the critical time to a diverging holographic complexity observable and compute the `switchback' delay by adding a pair of shock wave perturbations for arbitrary values of the mass of the black hole.
△ Less
Submitted 19 May, 2025; v1 submitted 2 January, 2025;
originally announced January 2025.
-
SiGe BiCMOS Circuit Design using only PMOS and HBTs Approach for the Ocean Worlds Exploration
Authors:
Md Omar Faruk,
Steven Corum,
Zakaraya Hamdan,
Alex Seaver,
Travis Graham,
Benjamin J. Blalock
Abstract:
Space exploration to have the biosignatures of extraterrestrial life on different planets with oceans in our solar system and beyond requires the design and manufacturing of robust and reliable electronic systems that can be used for sensing, data processing, controlling motor/actuators, and communication while surviving an extreme environment. Commercial off the shelf (COTS) components cannot sur…
▽ More
Space exploration to have the biosignatures of extraterrestrial life on different planets with oceans in our solar system and beyond requires the design and manufacturing of robust and reliable electronic systems that can be used for sensing, data processing, controlling motor/actuators, and communication while surviving an extreme environment. Commercial off the shelf (COTS) components cannot survive a long time in such harsh environments after being housed in a Warm Electronics Box, and any electronic system designed for such extreme conditions must be tailored to suit such operation. The presence of extremely cold temperatures and high radiation adversely affects the device parameters over time, i.e. the operation of electronic systems.
△ Less
Submitted 24 November, 2024;
originally announced November 2024.
-
Deriving the Gibbons-Maldacena-Nunez no-go theorem from the Raychaudhuri equation
Authors:
Mir Mehedi Faruk
Abstract:
In this article, we point out that to solve the null Raychaudhuri equation for higher dimensional spacetime with accelerating FRW solution in external directions and static compact internal directions, it is necessary to violate the Strong Energy condition in higher dimensions. This constraint is well-known in obtaining accelerating cosmological solutions in string compactification, first describe…
▽ More
In this article, we point out that to solve the null Raychaudhuri equation for higher dimensional spacetime with accelerating FRW solution in external directions and static compact internal directions, it is necessary to violate the Strong Energy condition in higher dimensions. This constraint is well-known in obtaining accelerating cosmological solutions in string compactification, first described by Gibbons-Maldacena-Nunez. In deriving this constraint, we do not make any assumptions regarding the matter content.
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
Static sphere observers and geodesics in Schwarzschild-de Sitter spacetime
Authors:
Mir Mehedi Faruk,
Edward Morvan,
Jan Pieter van der Schaar
Abstract:
We analyze null- and spacelike radial geodesics in Schwarzschild-de Sitter spacetime connecting two conjugate static sphere observers, i.e. free-falling observers at a fixed radius in between the two horizons. We explicitly determine the changes in the causal structure with respect to these natural observers as a result of the inward bending of the black hole singularity, as well as the outward be…
▽ More
We analyze null- and spacelike radial geodesics in Schwarzschild-de Sitter spacetime connecting two conjugate static sphere observers, i.e. free-falling observers at a fixed radius in between the two horizons. We explicitly determine the changes in the causal structure with respect to these natural observers as a result of the inward bending of the black hole singularity, as well as the outward bending of asymptotic infinity. Notably, the inward and outward bending changes as a function of the black hole mass, first increasing towards a maximum and then decreasing to vanish in the extreme Nariai limit. For a generic mass of the black hole this implies the existence of finite size (temporal) windows for the presence of symmetric radial geodesics between the static sphere observers probing the interior region of the black hole, as well as the exterior de Sitter region. We determine the size of the interior (black hole) and exterior (de Sitter) temporal windows in $4$, $5$ and $6$ spacetime dimensions, finding that they are equal in $D=5$, and compute the proper lengths of the symmetric radial geodesics. We comment on the implications for information exchange and the potential role of the symmetric radial geodesics in a geodesic approximation of static sphere correlators in Schwarzschild-de Sitter spacetime.
△ Less
Submitted 30 April, 2024; v1 submitted 11 December, 2023;
originally announced December 2023.
-
A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data
Authors:
Md Jobair Hossain Faruk,
Bilash Saha,
Jim Basney
Abstract:
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authentic…
▽ More
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community. The increasing reliance on computing workflows and digital data transactions requires ensuring that sensitive information is protected from unauthorized access, tampering, or misuse. This research paper presents a comparative analysis of three novel approaches for authenticating and securing access to scientific data: SciTokens, Verifiable Credentials, and Smart Contracts. The aim of this study is to investigate the strengths and weaknesses of each approach from trust, revocation, privacy, and security perspectives. We examine the technical features and privacy and security mechanisms of each technology and provide a comparative synthesis with the proposed model. Through our analysis, we demonstrate that each technology offers unique advantages and limitations, and the integration of these technologies can lead to more secure and efficient solutions for authentication and access to scientific data.
△ Less
Submitted 28 August, 2023;
originally announced November 2023.
-
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms
Authors:
Mst Shapna Akter,
Md Jobair Hossain Faruk,
Nafisa Anjum,
Mohammad Masum,
Hossain Shahriar,
Akond Rahman,
Fan Wu,
Alfredo Cuzzocrea
Abstract:
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting…
▽ More
The software supply chain (SSC) attack has become one of the crucial issues that are being increased rapidly with the advancement of the software development domain. In general, SSC attacks execute during the software development processes lead to vulnerabilities in software products targeting downstream customers and even involved stakeholders. Machine Learning approaches are proven in detecting and preventing software security vulnerabilities. Besides, emerging quantum machine learning can be promising in addressing SSC attacks. Considering the distinction between traditional and quantum machine learning, performance could be varies based on the proportions of the experimenting dataset. In this paper, we conduct a comparative analysis between quantum neural networks (QNN) and conventional neural networks (NN) with a software supply chain attack dataset known as ClaMP. Our goal is to distinguish the performance between QNN and NN and to conduct the experiment, we develop two different models for QNN and NN by utilizing Pennylane for quantum and TensorFlow and Keras for traditional respectively. We evaluated the performance of both models with different proportions of the ClaMP dataset to identify the f1 score, recall, precision, and accuracy. We also measure the execution time to check the efficiency of both models. The demonstration result indicates that execution time for QNN is slower than NN with a higher percentage of datasets. Due to recent advancements in QNN, a large level of experiments shall be carried out to understand both models accurately in our future research.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Accelerated paths and Unruh effect II: finite time detector response in (Anti) de Sitter spacetime and Huygen's Principle
Authors:
Shahnewaz Ahmed,
Mir Mehedi Faruk,
Muktadir Rahman
Abstract:
We study the finite time response of an Unruh-DeWitt particle detector described by a qubit (two-level system) moving with uniform constant acceleration in maximally symmetric spacetimes. The $D$ dimensional massless fermionic response function in de Sitter (dS) background is found to be identical to that of a detector linearly coupled to a massless scalar field in $2D$ dimensional dS background.…
▽ More
We study the finite time response of an Unruh-DeWitt particle detector described by a qubit (two-level system) moving with uniform constant acceleration in maximally symmetric spacetimes. The $D$ dimensional massless fermionic response function in de Sitter (dS) background is found to be identical to that of a detector linearly coupled to a massless scalar field in $2D$ dimensional dS background. Furthermore, we visit the status of Huygen's principle in the Unruh radiation observed by the detector.
△ Less
Submitted 27 April, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Late-Time Correlators and Complex Geodesics in de Sitter Space
Authors:
Lars Aalsma,
Mir Mehedi Faruk,
Jan Pieter van der Schaar,
Manus Visser,
Job de Witte
Abstract:
We study two-point correlation functions of a massive free scalar field in de Sitter space using the heat kernel formalism. Focusing on two operators in conjugate static patches we derive a geodesic approximation to the two-point correlator valid for large mass and at late times. This expression involves a sum over two complex conjugate geodesics that correctly reproduces the large-mass, late-time…
▽ More
We study two-point correlation functions of a massive free scalar field in de Sitter space using the heat kernel formalism. Focusing on two operators in conjugate static patches we derive a geodesic approximation to the two-point correlator valid for large mass and at late times. This expression involves a sum over two complex conjugate geodesics that correctly reproduces the large-mass, late-time limit of the exact two-point function in the Bunch-Davies vacuum. The exponential decay of the late-time correlator is associated to the timelike part of the complex geodesics. We emphasize that the late-time exponential decay is in tension with the finite maximal entropy of empty de Sitter space, and we briefly discuss how non-perturbative corrections might resolve this paradox.
△ Less
Submitted 16 August, 2023; v1 submitted 2 December, 2022;
originally announced December 2022.
-
Resurgence of a de Sitter Glauber-Sudarshan State: Nodal Diagrams and Borel Resummation
Authors:
Suddhasattwa Brahma,
Keshav Dasgupta,
Mir-Mehedi Faruk,
Bohdan Kulinich,
Viraj Meruliya,
Brent Pym,
Radu Tatar
Abstract:
We show that an explicit construction of a four-dimensional de Sitter space may be performed using a diagrammatic approach via nodal diagrams emanating from the path integral representation of the Glauber-Sudarshan state. Sum of these diagrams typically leads to an asymptotic series of Gevrey kind which can then be Borel resummed, thus reproducing the non-perturbative structure of the system. Our…
▽ More
We show that an explicit construction of a four-dimensional de Sitter space may be performed using a diagrammatic approach via nodal diagrams emanating from the path integral representation of the Glauber-Sudarshan state. Sum of these diagrams typically leads to an asymptotic series of Gevrey kind which can then be Borel resummed, thus reproducing the non-perturbative structure of the system. Our analysis shows that four-dimensional de Sitter space is not only possible in string theory overcoming the no-go and the swampland criteria -- albeit as a Glauber-Sudarshan state -- but it may also be non-perturbatively stable within a controlled temporal domain. Somewhat consistently, the Borel resummation of the Gevrey series provides strong hint towards the positivity of the cosmological constant.
△ Less
Submitted 25 October, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
The inheritance of energy conditions: Revisiting no-go theorems in string compactifications
Authors:
Heliudson Bernardo,
Suddhasattwa Brahma,
Mir Mehedi Faruk
Abstract:
One of the fundamental challenges in string theory is to derive realistic four-dimensional cosmological backgrounds from it despite strict consistency conditions that constrain its possible low-energy backgrounds. In this work, we focus on energy conditions as covariant and background-independent consistency requirements in order to classify possible backgrounds coming from low-energy string theor…
▽ More
One of the fundamental challenges in string theory is to derive realistic four-dimensional cosmological backgrounds from it despite strict consistency conditions that constrain its possible low-energy backgrounds. In this work, we focus on energy conditions as covariant and background-independent consistency requirements in order to classify possible backgrounds coming from low-energy string theory in two steps. Firstly, we show how supergravity actions obey many relevant energy conditions under some reasonable assumptions. Remarkably, we find that the energy conditions are satisfied even in the presence of objects which individually violate them due to the tadpole cancellation condition. Thereafter, we list a set of conditions for a higher-dimensional energy condition to imply the corresponding lower-dimensional one, thereby categorizing the allowed low-energy solutions. As for any no-go theorem, our aim is to highlight the assumptions that must be circumvented for deriving four-dimensional spacetimes that necessarily violate these energy conditions, with emphasis on cosmological backgrounds.
△ Less
Submitted 12 December, 2023; v1 submitted 19 August, 2022;
originally announced August 2022.
-
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection
Authors:
Mohammad Masum,
Hossain Shahriar,
Hisham Haddad,
Md Jobair Hossain Faruk,
Maria Valero,
Md Abdullah Khan,
Mohammad A. Rahman,
Muhaiminul I. Adnan,
Alfredo Cuzzocrea
Abstract:
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, ti…
▽ More
Traditional network intrusion detection approaches encounter feasibility and sustainability issues to combat modern, sophisticated, and unpredictable security attacks. Deep neural networks (DNN) have been successfully applied for intrusion detection problems. The optimal use of DNN-based classifiers requires careful tuning of the hyper-parameters. Manually tuning the hyperparameters is tedious, time-consuming, and computationally expensive. Hence, there is a need for an automatic technique to find optimal hyperparameters for the best use of DNN in intrusion detection. This paper proposes a novel Bayesian optimization-based framework for the automatic optimization of hyperparameters, ensuring the best DNN architecture. We evaluated the performance of the proposed framework on NSL-KDD, a benchmark dataset for network intrusion detection. The experimental results show the framework's effectiveness as the resultant DNN architecture demonstrates significantly higher intrusion detection performance than the random search optimization-based approach in terms of accuracy, precision, recall, and f1-score.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness
Authors:
Md Jobair Hossain Faruk,
Maria Valero,
Hossain Shahriar
Abstract:
In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a recently presented visionary project to contr…
▽ More
In this study, we illustrate the progress of BCI research and present scores of unveiled contemporary approaches. First, we explore a decoding natural speech approach that is designed to decode human speech directly from the human brain onto a digital screen introduced by Facebook Reality Lab and University of California San Francisco. Then, we study a recently presented visionary project to control the human brain using Brain-Machine Interfaces (BMI) approach. We also investigate well-known electroencephalography (EEG) based Emotiv Epoc+ Neuroheadset to identify six emotional parameters including engagement, excitement, focus, stress, relaxation, and interest using brain signals by experimenting the neuroheadset among three human subjects where we utilize two supervised learning classifiers, Naive Bayes and Linear Regression to show the accuracy and competency of the Epoc+ device and its associated applications in neurotechnological research. We present experimental studies and the demonstration indicates 69% and 62% improved accuracy for the aforementioned classifiers respectively in reading the performance matrices of the participants. We envision that non-invasive, insertable, and low-cost BCI approaches shall be the focal point for not only an alternative for patients with physical paralysis but also understanding the brain that would pave us to access and control the memories and brain somewhere very near.
△ Less
Submitted 24 June, 2022;
originally announced July 2022.
-
Blockchain-based Medical Image Sharing and Automated Critical-results Notification: A Novel Framework
Authors:
Jiyoun Randolph,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Liang Zhao,
Nazmus Sakib,
Bilash Saha
Abstract:
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcom…
▽ More
In teleradiology, medical images are transmitted to offsite radiologists for interpretation and the dictation report is sent back to the original site to aid timely diagnosis and proper patient care. Although teleradiology offers great benefits including time and cost efficiency, after-hour coverages, and staffing shortage management, there are some technical and operational limitations to overcome in reaching its full potential. We analyzed the current teleradiology workflow to identify inefficiencies. Image unavailability and delayed critical result communication stemmed from lack of system integration between teleradiology practice and healthcare institutions are among the most substantial factors causing prolonged turnaround time. In this paper, we propose a blockchain-based medical image sharing and automated critical-results notification platform to address the current limitation. We believe the proposed platform will enhance efficiency in workflow by eliminating the need for intermediaries and will benefit patients by eliminating the need for storing medical images in hard copies. While considerable progress was achieved, further research on governance and HIPAA compliance is required to optimize the adoption of the new application. Towards an idea to a working paradigm, we will implement the prototype during the next phase of our study.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities
Authors:
Md Jobair Hossain Faruk,
Sharaban Tahora,
Masrura Tasnim,
Hossain Shahriar,
Nazmus Sakib
Abstract:
The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With the advent and development of quantum computers, cyberspace security can surely become the most critical problem for the Internet in near future. On contrary, prosaic quantum technology…
▽ More
The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With the advent and development of quantum computers, cyberspace security can surely become the most critical problem for the Internet in near future. On contrary, prosaic quantum technology can be promising to transform cybersecurity. This research aims to synthesize basic and fundamental studies concerning quantum cybersecurity that can be emerged both as a threat and solution to critical cybersecurity issues based on a systematic study. We provide a comprehensive, illustrative description of the current state-of-the-art quantum computing and cybersecurity and present the proposed approaches to date. Findings in quantum computing cybersecurity suggest that quantum computing can be adopted for the betterment of cybersecurity threats while it poses the most unexpected threats to cybersecurity. The focus and depth of this systematic survey not only provide quantum and cybersecurity practitioners and researchers with a consolidated body of knowledge about current trends in this area but also underpins a starting point for further research in this field.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques
Authors:
Md Jobair Hossain Faruk,
Shashank Trivedi,
Mohammad Masum,
Maria Valero,
Hossain Shahriar,
Sheikh Iqbal Ahamed
Abstract:
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary…
▽ More
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a disease but could also reduce the risk of spreading illness within the community. Given the current pandemic, daily habits such as washing hands or taking regular showers have taken primary importance among people, especially for the elderly population living alone at home or in an assisted living facility. This paper presents a novel and non-invasive framework for monitoring human hygiene using vibration sensors where we adopt Machine Learning techniques. The approach is based on a combination of a geophone sensor, a digitizer, and a cost-efficient computer board in a practical enclosure. Monitoring daily hygiene routines may help healthcare professionals be proactive rather than reactive in identifying and controlling the spread of potential outbreaks within the community. The experimental result indicates that applying a Support Vector Machine (SVM) for binary classification exhibits a promising accuracy of ~95% in the classification of different hygiene habits. Furthermore, both tree-based classifier (Random Forrest and Decision Tree) outperforms other models by achieving the highest accuracy (100%), which means that classifying hygiene events using vibration and non-invasive sensors is possible for monitoring hygiene activity.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform
Authors:
Ryan Shivers,
Mohammad Ashiqur Rahman,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Alfredo Cuzzocrea,
Victor Clincy
Abstract:
Ride-hailing and ride-sharing applications have recently gained popularity as a convenient alternative to traditional modes of travel. Current research into autonomous vehicles is accelerating rapidly and will soon become a critical component of a ride-hailing platforms architecture. Implementing an autonomous vehicle ride-hailing platform proves a difficult challenge due to the centralized nature…
▽ More
Ride-hailing and ride-sharing applications have recently gained popularity as a convenient alternative to traditional modes of travel. Current research into autonomous vehicles is accelerating rapidly and will soon become a critical component of a ride-hailing platforms architecture. Implementing an autonomous vehicle ride-hailing platform proves a difficult challenge due to the centralized nature of traditional ride-hailing architectures. In a traditional ride-hailing environment the drivers operate their own personal vehicles so it follows that a fleet of autonomous vehicles would be required for a centralized ride-hailing platform to succeed. Decentralization of the ride-hailing platform would remove a roadblock along the way to an autonomous vehicle ride-hailing platform by allowing owners of autonomous vehicles to add their vehicles to a community-driven fleet when not in use. Blockchain technology is an attractive choice for this decentralized architecture due to its immutability and fault tolerance. This thesis proposes a framework for developing a decentralized ride-hailing architecture that is verifiably secure. This framework is implemented on the Hyperledger Fabric blockchain platform. The evaluation of the implementation is done by applying known security models, utilizing a static analysis tool, and performing a performance analysis under heavy network load.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Ransomware Classification and Detection With Machine Learning Algorithms
Authors:
Mohammad Masum,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Kai Qian,
Dan Lo,
Muhaiminul Islam Adnan
Abstract:
Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional a…
▽ More
Malicious attacks, malware, and ransomware families pose critical security issues to cybersecurity, and it may cause catastrophic damages to computer systems, data centers, web, and mobile applications across various industries and businesses. Traditional anti-ransomware systems struggle to fight against newly created sophisticated attacks. Therefore, state-of-the-art techniques like traditional and neural network-based architectures can be immensely utilized in the development of innovative ransomware solutions. In this paper, we present a feature selection-based framework with adopting different machine learning algorithms including neural network-based architectures to classify the security level for ransomware detection and prevention. We applied multiple machine learning algorithms: Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), Logistic Regression (LR) as well as Neural Network (NN)-based classifiers on a selected number of features for ransomware classification. We performed all the experiments on one ransomware dataset to evaluate our proposed framework. The experimental results demonstrate that RF classifiers outperform other methods in terms of accuracy, F-beta, and precision scores.
△ Less
Submitted 2 July, 2022;
originally announced July 2022.
-
Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study
Authors:
Md Jobair Hossain Faruk,
Santhiya Subramanian,
Hossain Shahriar,
Maria Valero,
Xia Li,
Masrura Tasnim
Abstract:
Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models have long been adopted in the software development life cycle that pour stakeholders towards the completion of final software product development. Within the boundary of advanced techn…
▽ More
Software Engineering is the process of a systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models have long been adopted in the software development life cycle that pour stakeholders towards the completion of final software product development. Within the boundary of advanced technology, various emerging and futuristic technology is evolving that really need the attention of the software engineering community whether the conventional software process techniques are capable to inherit the core fundamental into futuristic software development. In this paper, we study the impact of existing software engineering processes and models including Agile, and DevOps in Blockchain-Oriented Software Engineering. We also examine the essentiality of adopting state-of-art concepts and evolving the current software engineering process for blockchain-oriented systems. We discuss the insight of software project management practices in BOS development. The findings of this study indicate that utilizing state-of-art techniques in software processes for futuristic technology would be challenging and promising research is needed extensively towards addressing and improving state-of-the-art software engineering processes and methodology for novel technologies.
△ Less
Submitted 2 July, 2022;
originally announced July 2022.
-
Malware Detection and Prevention using Artificial Intelligence Techniques
Authors:
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Farhat Lamia Barsha,
Shahriar Sobhan,
Md Abdullah Khan,
Michael Whitman,
Alfredo Cuzzocreak,
Dan Lo,
Akond Rahman,
Fan Wu
Abstract:
With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholders, particularly, end users security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts…
▽ More
With the rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the security and safety of both computer systems and stakeholders. To maintain stakeholders, particularly, end users security, protecting the data from fraudulent efforts is one of the most pressing concerns. A set of malicious programming code, scripts, active content, or intrusive software that is designed to destroy intended computer systems and programs or mobile and web applications is referred to as malware. According to a study, naive users are unable to distinguish between malicious and benign applications. Thus, computer systems and mobile applications should be designed to detect malicious activities towards protecting the stakeholders. A number of algorithms are available to detect malware activities by utilizing novel concepts including Artificial Intelligence, Machine Learning, and Deep Learning. In this study, we emphasize Artificial Intelligence (AI) based techniques for detecting and preventing malware activity. We present a detailed review of current malware detection technologies, their shortcomings, and ways to improve efficiency. Our study shows that adopting futuristic approaches for the development of malware detection applications shall provide significant advantages. The comprehension of this synthesis shall help researchers for further research on malware detection and prevention using AI.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Authors:
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Sweta Sneha,
Sheikh I. Ahamed Mohammad Rahman
Abstract:
Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Blockchain is an emerging distributed technology that can solve these issues due to its immutability and ar…
▽ More
Traditional data collection, storage and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Blockchain is an emerging distributed technology that can solve these issues due to its immutability and architectural nature that prevent records manipulation or alterations. In this paper, we discuss the progress and opportunities of remote patient monitoring using futuristic blockchain technologies and its two primary frameworks: Ethereum and Hyperledger Fabric. We also discuss the possible blockchain use cases in software engineering for systematic, disciplined, and quantifiable application development. The study extends by introducing a system architecture for EHR data management using Ethereum as a model. We discuss the challenges and limitations along with the initial evaluation results of the proposed system and draw future research directions in this promising area.
△ Less
Submitted 25 June, 2022;
originally announced June 2022.
-
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
Authors:
Mohammad Masum,
Mohammad Nazim,
Md Jobair Hossain Faruk,
Hossain Shahriar,
Maria Valero,
Md Abdullah Hafiz Khan,
Gias Uddin,
Shabir Barzanjeh,
Erhan Saglamyurek,
Akond Rahman,
Sheikh Iqbal Ahamed
Abstract:
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This pap…
▽ More
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC promises quadratic or exponential increases in computational time with quantum parallelism and thus offer a huge leap forward in the computation of Machine Learning algorithms. This paper analyzes speed up performance of QC when applied to machine learning algorithms, known as Quantum Machine Learning (QML). We applied QML methods such as Quantum Support Vector Machine (QSVM), and Quantum Neural Network (QNN) to detect Software Supply Chain (SSC) attacks. Due to the access limitations of real quantum computers, the QML methods were implemented on open-source quantum simulators such as IBM Qiskit and TensorFlow Quantum. We evaluated the performance of QML in terms of processing speed and accuracy and finally, compared with its classical counterparts. Interestingly, the experimental results differ to the speed up promises of QC by demonstrating higher computational time and lower accuracy in comparison to the classical approaches for SSC attacks.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools
Authors:
Paramita Basak Upama,
Md Jobair Hossain Faruk,
Mohammad Nazim,
Mohammad Masum,
Hossain Shahriar,
Gias Uddin,
Shabir Barzanjeh,
Sheikh Iqbal Ahamed,
Akond Rahman
Abstract:
Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts and phenomena of Quantum Mechanic (QM) with the significant potential to unlock a remarkable opportunity to solve complex and computationally intractable problems that scientists could not tackle previously. In recent years, tremendous efforts and progress in QC mark a significant milestone in solving…
▽ More
Quantum Computing (QC) refers to an emerging paradigm that inherits and builds with the concepts and phenomena of Quantum Mechanic (QM) with the significant potential to unlock a remarkable opportunity to solve complex and computationally intractable problems that scientists could not tackle previously. In recent years, tremendous efforts and progress in QC mark a significant milestone in solving real-world problems much more efficiently than classical computing technology. While considerable progress is being made to move quantum computing in recent years, significant research efforts need to be devoted to move this domain from an idea to a working paradigm. In this paper, we conduct a systematic survey and categorize papers, tools, frameworks, platforms that facilitate quantum computing and analyze them from an application and Quantum Computing perspective. We present quantum Computing Layers, Characteristics of Quantum Computer platforms, Circuit Simulator, Open-source Tools Cirq, TensorFlow Quantum, ProjectQ that allow implementing quantum programs in Python using a powerful and intuitive syntax. Following that, we discuss the current essence, identify open challenges and provide future research direction. We conclude that scores of frameworks, tools and platforms are emerged in the past few years, improvement of currently available facilities would exploit the research activities in the quantum research community.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Memristor Compact Model with Oxygen-Vacancy Concentration as State Variable
Authors:
Andre Zeumault,
Shamiul Alam,
Md Omar Faruk,
Ahmedullah Aziz
Abstract:
We present a unique compact model for oxide memristors, based upon the concentration of oxygen vacancies as state variables. In this model, the increase (decrease) in oxygen vacancy concentration is similar in effect to the reduction (expansion) of the tunnel gap used as a state variable in existing compact models, providing a mechanism for the electronic current to increase (decrease) based upon…
▽ More
We present a unique compact model for oxide memristors, based upon the concentration of oxygen vacancies as state variables. In this model, the increase (decrease) in oxygen vacancy concentration is similar in effect to the reduction (expansion) of the tunnel gap used as a state variable in existing compact models, providing a mechanism for the electronic current to increase (decrease) based upon the polarity of the applied voltage. Rate equations defining the dynamics of state variables are obtained from simplifications of a recent manuscript in which electronic processes (i.e., electron capture/emission) were combined with atomic processes (i.e., Frenkel pair generation/recombination, diffusion) stemming from the thermochemical model of dielectric breakdown. Central to the proposed model is the effect of the electron occupancy of oxygen vacancy traps on resistive switching dynamics. The electronic current is calculated considering Ohmic, band-to-band, and bound-to-band contributions. The model includes uniform self-heating with Joule-heating and conductive loss terms. The model is calibrated using experimental current-voltage characteristics for HfO2 memristors with different electrode materials. Though a general model is presented, a delta-shaped density of states profile for oxygen vacancies is found capable of accurately representing experimental data while providing a minimal description of bound to band transitions. The model is implemented in Verilog-A and tested using read/write operations in a 4x4 1T1R nonvolatile memory array to evaluate its ability to perform circuit simulations of practical interest. A particular benefit is that the model does not make strong assumptions regarding filament geometry of which scant experimental-evidence exists to support.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
de Sitter Space as a Glauber-Sudarshan State: II
Authors:
Heliudson Bernardo,
Suddhasattwa Brahma,
Keshav Dasgupta,
Mir-Mehedi Faruk,
Radu Tatar
Abstract:
We provide further evidence to support the fact that a four-dimensional effective field theory description with de Sitter isometries in IIB string theory, overcoming the no-go and the swampland criteria, can only exist if de Sitter space is realized as a Glauber-Sudarshan state. We show here that this result is independent of the choice of de Sitter slicings. The Glauber-Sudarshan state, construct…
▽ More
We provide further evidence to support the fact that a four-dimensional effective field theory description with de Sitter isometries in IIB string theory, overcoming the no-go and the swampland criteria, can only exist if de Sitter space is realized as a Glauber-Sudarshan state. We show here that this result is independent of the choice of de Sitter slicings. The Glauber-Sudarshan state, constructed by shifting the interacting vacuum in the M-theory uplift of the scenario, differs from a standard coherent state in QFT in the sense that the shape and size of the state changes with respect to time, implying changes in the graviton and the flux quanta. Despite this, the expectation values of the graviton and flux operators in such a state reproduce the exact de Sitter background, as long as we are within the temporal bound set by the onset of the strong coupling in the dual type IIA side, and satisfy the corresponding Schwinger-Dyson's equations in the presence of hierarchically controlled perturbative and non-perturbative quantum corrections.
Additionally, we provide a detailed study of the fluxes supporting the Glauber-Sudarshan state in the M-theory uplift of the IIB scenario. We show explicitly how the Bianchi identities, anomaly cancellation and flux quantization conditions, along-with the constraints from the Schwinger-Dyson's equations, conspire together to provide the necessary temporal dependences to support such a state in full M-theory. We also discuss how our analysis points towards a surprising connection to the four-dimensional null energy condition, for a Friedman-Lemaitre-Robertson-Walker state in the IIB side, as a consistency condition for the existence of an effective field theory description in M-theory.
△ Less
Submitted 16 September, 2021; v1 submitted 18 August, 2021;
originally announced August 2021.
-
The four-dimensional null energy condition as a swampland conjecture
Authors:
Heliudson Bernardo,
Suddhasattwa Brahma,
Keshav Dasgupta,
Mir Mehedi Faruk,
Radu Tatar
Abstract:
We analyze four-dimensional Friedmann-Lemaitre-Robertson-Walker cosmologies in type IIB, arising from a M-theory dual, and find that the null energy condition (NEC) has to be obeyed by them (except for the negatively curved case) in order for the M-theory action to have a Wilsonian effective description. However, this does not imply that the M-theory metric has to obey the 11d NEC. Thus, we propos…
▽ More
We analyze four-dimensional Friedmann-Lemaitre-Robertson-Walker cosmologies in type IIB, arising from a M-theory dual, and find that the null energy condition (NEC) has to be obeyed by them (except for the negatively curved case) in order for the M-theory action to have a Wilsonian effective description. However, this does not imply that the M-theory metric has to obey the 11d NEC. Thus, we propose a new swampland conjecture -- the 4d NEC is a consistency condition for any theory to have a completion within M-theory -- with an explicit derivation of it for cosmological backgrounds from a top-down perspective. We briefly discuss the cosmological consequences of such a condition derived from M-theory.
△ Less
Submitted 30 October, 2021; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Image to Bengali Caption Generation Using Deep CNN and Bidirectional Gated Recurrent Unit
Authors:
Al Momin Faruk,
Hasan Al Faraby,
Md. Muzahidul Azad,
Md. Riduyan Fedous,
Md. Kishor Morol
Abstract:
There is very little notable research on generating descriptions of the Bengali language. About 243 million people speak in Bengali, and it is the 7th most spoken language on the planet. The purpose of this research is to propose a CNN and Bidirectional GRU based architecture model that generates natural language captions in the Bengali language from an image. Bengali people can use this research…
▽ More
There is very little notable research on generating descriptions of the Bengali language. About 243 million people speak in Bengali, and it is the 7th most spoken language on the planet. The purpose of this research is to propose a CNN and Bidirectional GRU based architecture model that generates natural language captions in the Bengali language from an image. Bengali people can use this research to break the language barrier and better understand each other's perspectives. It will also help many blind people with their everyday lives. This paper used an encoder-decoder approach to generate captions. We used a pre-trained Deep convolutional neural network (DCNN) called InceptonV3image embedding model as the encoder for analysis, classification, and annotation of the dataset's images Bidirectional Gated Recurrent unit (BGRU) layer as the decoder to generate captions. Argmax and Beam search is used to produce the highest possible quality of the captions. A new dataset called BNATURE is used, which comprises 8000 images with five captions per image. It is used for training and testing the proposed model. We obtained BLEU-1, BLEU-2, BLEU-3, BLEU-4 and Meteor is 42.6, 27.95, 23, 66, 16.41, 28.7 respectively.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Accelerated paths and Unruh effect I: scalars and fermions in Anti De Sitter spacetime
Authors:
Shahnewaz Ahmed,
Mir Mehedi Faruk
Abstract:
We have investigated the Unruh effect in Anti de-Sitter (AdS) spacetime by examining the response function of an Unruh-DeWitt particle detector with uniform constant acceleration. An exact expression of the detector response function for the scalar field has been obtained with different levels of non-linearity in even dimensional AdS spacetime. We also showed how the response of the accelerated Un…
▽ More
We have investigated the Unruh effect in Anti de-Sitter (AdS) spacetime by examining the response function of an Unruh-DeWitt particle detector with uniform constant acceleration. An exact expression of the detector response function for the scalar field has been obtained with different levels of non-linearity in even dimensional AdS spacetime. We also showed how the response of the accelerated Unruh detector coupled quadratically to massless Dirac field in $D$ dimensional $(D \geq 2)$ AdS spacetime is proportional to that of a detector linearly coupled to a massless scalar field in $2D$ dimensional AdS spacetime. Here, the fermionic and scalar matter field is coupled minimally and conformally to the background AdS metric, respectively. Finally, we discuss about the extension of the results for more general stationary motion.
△ Less
Submitted 17 August, 2021; v1 submitted 17 September, 2020;
originally announced September 2020.
-
de Sitter Vacua in the String landscape: La Petite Version
Authors:
Keshav Dasgupta,
Maxim Emelin,
Mir Mehedi Faruk,
Radu Tatar
Abstract:
In this review we argue that four-dimensional effective field theory descriptions with de Sitter isometries are allowed in the presence of time-dependent internal degrees of freedom in type IIB string landscape. Both moduli stabilizations and time-independent Newton constants are possible in such backgrounds. However once the time-dependences are switched off, there appear no possibilities of effe…
▽ More
In this review we argue that four-dimensional effective field theory descriptions with de Sitter isometries are allowed in the presence of time-dependent internal degrees of freedom in type IIB string landscape. Both moduli stabilizations and time-independent Newton constants are possible in such backgrounds. However once the time-dependences are switched off, there appear no possibilities of effective field theory descriptions and these backgrounds are in the swampland.
△ Less
Submitted 4 December, 2019; v1 submitted 27 November, 2019;
originally announced November 2019.
-
How a four-dimensional de Sitter solution remains outside the swampland
Authors:
Keshav Dasgupta,
Maxim Emelin,
Mir Mehedi Faruk,
Radu Tatar
Abstract:
We argue that, in the presence of time-dependent fluxes and quantum corrections, four-dimensional de Sitter solutions should appear in the type IIB string landscape and not in the swampland. Our construction considers generic choices of local and non-local quantum terms and satisfies the no-go and the swampland criteria, the latter being recently upgraded using the trans-Planckian cosmic censorshi…
▽ More
We argue that, in the presence of time-dependent fluxes and quantum corrections, four-dimensional de Sitter solutions should appear in the type IIB string landscape and not in the swampland. Our construction considers generic choices of local and non-local quantum terms and satisfies the no-go and the swampland criteria, the latter being recently upgraded using the trans-Planckian cosmic censorship. Interestingly, both time-independent Newton constant and moduli stabilization may be achieved in such backgrounds even in the presence of time-dependent fluxes and internal spaces. However, once the time-dependence is switched off, any four-dimensional solution with de Sitter isometries appears to have no simple effective field theory descriptions and is back in the swampland.
△ Less
Submitted 4 December, 2019; v1 submitted 6 November, 2019;
originally announced November 2019.
-
de Sitter Vacua in the String Landscape
Authors:
Keshav Dasgupta,
Maxim Emelin,
Mir Mehedi Faruk,
Radu Tatar
Abstract:
The late-time behavior of our universe is one of accelerated expansion, or that of a de Sitter space, and therefore motivates us to look for time-dependent backgrounds. Finding such backgrounds in string theory has always been a challenging problem. An even harder problem is to find time-dependent backgrounds that allow positive dark energies. As a first step to handle such scenarios, we study a t…
▽ More
The late-time behavior of our universe is one of accelerated expansion, or that of a de Sitter space, and therefore motivates us to look for time-dependent backgrounds. Finding such backgrounds in string theory has always been a challenging problem. An even harder problem is to find time-dependent backgrounds that allow positive dark energies. As a first step to handle such scenarios, we study a time-dependent background in type IIB theory, with four-dimensional de Sitter isometries, by uplifting it to M-theory and then realizing it as a coherent, or squeezed-coherent, state over an appropriate solitonic configuration. While classically such a background does not solve the equations of motion, the corresponding Schwinger-Dyson equations reveal that there are deeper issues that may even prohibit a solution to exist at the quantum level, as long as the internal space remains time-independent. A more generic analysis is then called for, where both the effective four-dimensional space-time, the internal space, and the background fluxes are all time-dependent. We study in details such a background by including perturbative and non-perturbative as well as local and non-local quantum terms. Our analysis reveals a distinct possibility of the emergence of a four-dimensional positive curvature space-time with de Sitter isometries and time-independent Newton's constant in the landscape of type IIB string theory. We argue how the no-go and the swampland criteria are avoided in generating such a background, and compare it with other possibilities involving backgrounds with time-dependent Newton constants. These time-varying Newton constant backgrounds typically lead to unavoidable late time singularities, amongst other issues.
△ Less
Submitted 14 July, 2021; v1 submitted 14 August, 2019;
originally announced August 2019.
-
Duality between the massive sine-Gordon and the massive Schwinger models at finite temperature
Authors:
Mir Mehedi Faruk
Abstract:
The massive Schwinger and the massive sine-Gordon models are proved to be equivalent at finite temperature, using the path-integral framework. The well known relations among the parameters of these models to establish the duality at $T=0$, also remain valid at non zero temperature.
The massive Schwinger and the massive sine-Gordon models are proved to be equivalent at finite temperature, using the path-integral framework. The well known relations among the parameters of these models to establish the duality at $T=0$, also remain valid at non zero temperature.
△ Less
Submitted 10 September, 2018;
originally announced September 2018.
-
Repulsive Casimir force in Bose-Einstein Condensate
Authors:
Mir Mehedi Faruk,
Shovon Biswas
Abstract:
We study the Casimir effect for a three dimensional system of ideal free massive Bose gas in a slab geometry with Zaremba and anti-periodic boundary conditions. It is found that for these type of boundary conditions the resulting Casimir force is repulsive in nature, in contrast with usual periodic, Dirichlet or Neumann boundary condition where the Casimir force is attractive (Martin P. A. and Zag…
▽ More
We study the Casimir effect for a three dimensional system of ideal free massive Bose gas in a slab geometry with Zaremba and anti-periodic boundary conditions. It is found that for these type of boundary conditions the resulting Casimir force is repulsive in nature, in contrast with usual periodic, Dirichlet or Neumann boundary condition where the Casimir force is attractive (Martin P. A. and Zagrebnov V. A., Europhys. Lett., 73 (2006) 15.). Casimir forces in these boundary conditions also maintain a power law decay function below condensation temperature and exponential decay function above the condensation temperature albeit with a positive sign, identifying the repulsive nature of the force.
△ Less
Submitted 21 December, 2017;
originally announced December 2017.
-
Noncommutative scalar fields in compact spaces: quantisation and implications
Authors:
Mir Mehedi Faruk,
Mishkat Al Alvi,
Wasif Ahmed,
Md Muktadir Rahman,
Arup Barua Apu
Abstract:
In this paper we consider a two component scalar field theory, with noncommutativity in its conjugate momentum space. We quantize such a theory in a compact space with the help of dressing transformations and we reveal a significant effect of introducing such noncommutativity as the splitting of the energy levels of each individual mode that constitutes the whole system. We further compute the the…
▽ More
In this paper we consider a two component scalar field theory, with noncommutativity in its conjugate momentum space. We quantize such a theory in a compact space with the help of dressing transformations and we reveal a significant effect of introducing such noncommutativity as the splitting of the energy levels of each individual mode that constitutes the whole system. We further compute the thermal partition function exactly with predicted deformed dispersion relations from noncommutative theories and compare the results with usual results. It is found that thermodynamic quantities in noncommutative models, irrespective of whether the model is more deformed in infrared/UV region, show deviation from standard results in high temperature region.
△ Less
Submitted 30 August, 2017; v1 submitted 6 July, 2017;
originally announced July 2017.
-
Quantum gravity effects in statistical mechanics with modified dispersion relation
Authors:
Shovon Biswas,
Mir Mehedi Faruk
Abstract:
Planck scale inspired theories which are also often accompanied with maximum energy and/or momentum scale predict deformed dispersion relations compared to ordinary special relativity and quantum mechanics. In this paper we resort to the methods of statistical mechanics in order to determine the effects of a deformed dispersion relation along with upper bound in partition function as maximum energ…
▽ More
Planck scale inspired theories which are also often accompanied with maximum energy and/or momentum scale predict deformed dispersion relations compared to ordinary special relativity and quantum mechanics. In this paper we resort to the methods of statistical mechanics in order to determine the effects of a deformed dispersion relation along with upper bound in partition function as maximum energy and/or momentum scale can have on the thermodynamics of photon gas. We have analyzed two distinct quantum gravity models in this paper
△ Less
Submitted 18 September, 2017; v1 submitted 13 June, 2017;
originally announced June 2017.
-
Planck scale effect on the thermodynamics of photon gas
Authors:
Mir Mehedi Faruk,
Md. Muktadir Rahman
Abstract:
A particular framework for quantum gravity is the doubly special relativity (DSR) formalism that introduces a new observer independent scale (the Planck scale). We resort to the methods of statistical mechanics in this framework to determine how the deformed dispersion relation affects the thermodynamics of a photon gas. The ensuing modifications to the density of states, partition function, press…
▽ More
A particular framework for quantum gravity is the doubly special relativity (DSR) formalism that introduces a new observer independent scale (the Planck scale). We resort to the methods of statistical mechanics in this framework to determine how the deformed dispersion relation affects the thermodynamics of a photon gas. The ensuing modifications to the density of states, partition function, pressure, internal energy, entropy, free energy and specific heat are calculated. These results are compared with the outcome obtained in the Lorentz violating model of Camacho and Marcias (Gen. Relativ. Gravit. 39: 1175-1183, 2007). The two types of models predict different results due to different spacetime structure near the Planck scale. The resulting modifications can be interpreted as a consequence of the deformed Lorentz symmetry present in the particular model we have considered. In the low energy limit, our calculation coincides with usual results of photon thermodynamics in special relativity (SR) theory, in contrast to the study presented in (Phys. Rev. D81, 085039 (2010)).
△ Less
Submitted 13 July, 2017; v1 submitted 22 May, 2016;
originally announced May 2016.
-
Virial coefficients from unified statistical thermodynamics of quantum gases trapped under generic power law potential in $d$ dimension and the equivalence of trapped quantum gases
Authors:
Mir Mehedi Faruk,
Shah Mohammad Bahauddin
Abstract:
From the unified statistical thermodynamics of quantum gases, the virial coefficients of ideal Bose and Fermi gases which are trapped under generic power law potential are derived systematically. From the general result of virial coefficients, one can produce the known results in $d=3$ and $d=2$. But more importantly we found that, the virial coefficients of bosons and fermions become equal (excep…
▽ More
From the unified statistical thermodynamics of quantum gases, the virial coefficients of ideal Bose and Fermi gases which are trapped under generic power law potential are derived systematically. From the general result of virial coefficients, one can produce the known results in $d=3$ and $d=2$. But more importantly we found that, the virial coefficients of bosons and fermions become equal (except the the second virial coefficient, where the sign is different) when we trap the gases under harmonic potential in $d=1$. This result suggests the equivalence between Bose and Fermi gases which is already established for $d=1$ by M M Faruk (J Stat Phys, DOI 10.1007/s10955-015-1344-4). Surprisingly our investigation also shows that the virial coefficients of two dimensional free quantum gases are identical to the virial coefficients of one dimensional harmonically trapped quantum gases.
△ Less
Submitted 4 August, 2016; v1 submitted 28 January, 2016;
originally announced January 2016.
-
Energy fluctuation of ideal Fermi gas trapped under generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ in d dimension
Authors:
Mir Mehedi Faruk,
Md. Muktadir Rahman,
Dwaipayan Debnath,
Sakhawat Himel
Abstract:
Energy fluctuation of ideal Fermi gas trapped under generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ have been calculated in arbitrary dimension. Energy fluctuation is scrutinized further in the degenerate limit $μ>> K_BT$ with the help of Sommerfeld expansion. The dependence of energy fluctuation on dimensionality and power law potential is studied in detail. Most importa…
▽ More
Energy fluctuation of ideal Fermi gas trapped under generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ have been calculated in arbitrary dimension. Energy fluctuation is scrutinized further in the degenerate limit $μ>> K_BT$ with the help of Sommerfeld expansion. The dependence of energy fluctuation on dimensionality and power law potential is studied in detail. Most importantly our general result can exactly reproduce the recently published result regarding free and harmonically trapped ideal Fermi gas in d=3 (S Biswas, J Mitra, S Bhattacharyya, J. Stat. Mech. P03013, 2015.)
△ Less
Submitted 13 December, 2015;
originally announced December 2015.
-
Investigation of Bose condensation in ideal Bose gas trapped under generic power law potential in $d$ dimension
Authors:
Mir Mehedi Faruk,
Md. Sazzad Hossain,
Md. Muktadir Rahman
Abstract:
The changes in characteristics of Bose condensation of ideal Bose gas due to an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ are studied carefully. Detailed calculation of Kim $et$ $al.$ (S. H. Kim, C. K. Kim and K. Nahm, J Phys. Condens. Matter 11 10269 (1999).) yielded the hierarchy of condensation transitions with changing fractional dimensionality. In this…
▽ More
The changes in characteristics of Bose condensation of ideal Bose gas due to an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ are studied carefully. Detailed calculation of Kim $et$ $al.$ (S. H. Kim, C. K. Kim and K. Nahm, J Phys. Condens. Matter 11 10269 (1999).) yielded the hierarchy of condensation transitions with changing fractional dimensionality. In this manuscript, some theorems regarding specific heat at constant volume $C_V$ are presented. Careful examination of these theorems reveal the existence of hidden hierarchy of the condensation transition in trapped systems as well.
△ Less
Submitted 3 December, 2015;
originally announced December 2015.
-
A proof to Biswas-Mitra-Bhattacharyya conjecture for ideal quantum gas trapped under generic power law potential $U=\sum_{i=1} ^d c_i |\frac {x_i}{a_i}|^{n_i}$ in $d$ dimension
Authors:
Mir Mehedi Faruk,
Md. Muktadir Rahman
Abstract:
The well known relation for ideal classical gas $Δε^2=kT^2 C_V$ which does not remain valid for quantum system is revisited. A new connection is established between energy fluctuation and specific heat for quantum gases, valid in the classical limit and the degenerate quantum regime as well. Most importantly the proposed Biswas-Mitra-Bhattacharyya (BMB) conjecture (Biswas $et.$ $al.$, J. Stat. Mec…
▽ More
The well known relation for ideal classical gas $Δε^2=kT^2 C_V$ which does not remain valid for quantum system is revisited. A new connection is established between energy fluctuation and specific heat for quantum gases, valid in the classical limit and the degenerate quantum regime as well. Most importantly the proposed Biswas-Mitra-Bhattacharyya (BMB) conjecture (Biswas $et.$ $al.$, J. Stat. Mech. P03013, 2015.) relating hump in energy fluctuation and discontinuity of specific heat is proved and precised in this manuscript.
△ Less
Submitted 6 December, 2015; v1 submitted 16 September, 2015;
originally announced September 2015.
-
Unified statistical thermodynamics of quantum gases trapped under generic power law potential in $d$ dimension and equivalence in $d=1$
Authors:
Mir Mehedi Faruk
Abstract:
A unified description for the Bose and Fermi gases trapped in an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ is presented using the grandpotential of the system in $d$ dimensional space. The thermodynamic quantities of the quantum gases are derived from the grand potential. An equivalence between the trapped Bose and Fermi gases is constructed in one dimensio…
▽ More
A unified description for the Bose and Fermi gases trapped in an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ is presented using the grandpotential of the system in $d$ dimensional space. The thermodynamic quantities of the quantum gases are derived from the grand potential. An equivalence between the trapped Bose and Fermi gases is constructed in one dimension ($d=1$) using the Landen relation. It is also found that the established equivalence between the ideal free Bose and Fermi gases in $d=2$ (M. H. Lee, Phys. Rev. E 55, 1518 (1997)) is lost when external potential is applied.
△ Less
Submitted 17 June, 2015;
originally announced June 2015.
-
Thermodynamics of ideal Fermi gas under generic power law potential in $d$-dimension
Authors:
Mir Mehedi Faruk,
G. M. Bhuiyan
Abstract:
Thermodynamics of ideal Fermi gas trapped in an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ are investigated systematically from the grand thermodynamic potential in $d$ dimensional space. These properties are explored deeply in the degenerate limit ($μ>> K_BT$), where the thermodynamic properties are greatly dominated by Pauli exclusion principle. Pressure a…
▽ More
Thermodynamics of ideal Fermi gas trapped in an external generic power law potential $U=\sum_{i=1} ^d c_i |\frac{x_i}{a_i}|^{n_i}$ are investigated systematically from the grand thermodynamic potential in $d$ dimensional space. These properties are explored deeply in the degenerate limit ($μ>> K_BT$), where the thermodynamic properties are greatly dominated by Pauli exclusion principle. Pressure and energy along with the isothermal compressibilty is non zero at $T=0K$, denoting trapped Fermi system is quite live even at absolute zero temperature. The nonzero value of compressibilty denotes zero point pressure is not just a constant but depends on volume.
△ Less
Submitted 23 April, 2015;
originally announced April 2015.
-
A note on Fermi energy of Fermi gas trapped under generic power law potential in $d$-dimension
Authors:
Mir Mehedi Faruk
Abstract:
Average energy per fermion in case of Fermi gas with any kinematic characteristic, trapped under most general power law potential in $d$ dimension has been calculated at zero temperature. In a previous paper (M. Acharyya, Eur. J Phys. 31 L89 (2010)) it was shown, in case of free ideal Fermi gas as dimension increases average energy approaches to Fermi energy and in infinite dimension average energ…
▽ More
Average energy per fermion in case of Fermi gas with any kinematic characteristic, trapped under most general power law potential in $d$ dimension has been calculated at zero temperature. In a previous paper (M. Acharyya, Eur. J Phys. 31 L89 (2010)) it was shown, in case of free ideal Fermi gas as dimension increases average energy approaches to Fermi energy and in infinite dimension average energy becomes equal to Fermi energy at $T=0$. In this letter it is shown that, for trapped system at finite dimension the average energy depends on power law exponent, but as dimension tends to infinity average energy coincides with Fermi energy for any power law exponent. The result obtained in this manuscript is more general as we can describe free system as well as any trapped system with appropriate choice of power law exponent and true for any kinematic parameter.
△ Less
Submitted 9 March, 2015;
originally announced March 2015.
-
Thermodynamics of ideal Bose gas under generic power law potential in $d$-dimension
Authors:
Mir Mehedi Faruk
Abstract:
Thermodynamic properties of ideal Bose gas trapped in an external generic power law potential are investigated systematically from the grand thermodynamic potential in $d$ dimensional space. The most general conditions for Bose-Einstein condensate and the discontinuous conditions of heat capacity at the critical temperature in presence of generic power law potential are presented in this manuscrip…
▽ More
Thermodynamic properties of ideal Bose gas trapped in an external generic power law potential are investigated systematically from the grand thermodynamic potential in $d$ dimensional space. The most general conditions for Bose-Einstein condensate and the discontinuous conditions of heat capacity at the critical temperature in presence of generic power law potential are presented in this manuscript. The dependence of the physical quantities on external potential, particle characteristics and space dimensionality are discussed. The more general results obtained in this paper presents an unified illustration of Bose-Einstein condensation of ideal Bose systems as they reduces to the expressions and conclusions available in the literature with appropiate choice of power law exponent.
△ Less
Submitted 25 February, 2015;
originally announced February 2015.
-
Two-dimensional quantum-dot helium in a magnetic field: Variational theory
Authors:
Orion Ciftja,
M. Golam Faruk
Abstract:
A trial wave function for two-dimensional quantum dot helium in an arbitrary perpendicular magnetic field (a system of two interacting electrons in a two-dimensional parabolic confinement potential) is introduced. A key ingredient of this trial wave function is a Jastrow pair correlation factor that has a displaced Gaussian form. The above choice of the pair correlation factor is instrumental on…
▽ More
A trial wave function for two-dimensional quantum dot helium in an arbitrary perpendicular magnetic field (a system of two interacting electrons in a two-dimensional parabolic confinement potential) is introduced. A key ingredient of this trial wave function is a Jastrow pair correlation factor that has a displaced Gaussian form. The above choice of the pair correlation factor is instrumental on assuring the overall quality of the wave function at all values of the magnetic field.Exact numerical diagonalization results are used to gauge the quality of the proposed trial wave function.We find out that this trial wave function is an excellent representation of the true ground state at all values of the magnetic field including weak (or zero) and strong magnetic fields.
△ Less
Submitted 27 August, 2007;
originally announced August 2007.