-
Data-Centric Learning Framework for Real-Time Detection of Aiming Beam in Fluorescence Lifetime Imaging Guided Surgery
Authors:
Mohamed Abul Hassan,
Pu Sun,
Xiangnan Zhou,
Lisanne Kraft,
Kelsey T Hadfield,
Katjana Ehrlich,
Jinyi Qi,
Andrew Birkeland,
Laura Marcu
Abstract:
This study introduces a novel data-centric approach to improve real-time surgical guidance using fiber-based fluorescence lifetime imaging (FLIm). A key aspect of the methodology is the accurate detection of the aiming beam, which is essential for localizing points used to map FLIm measurements onto the tissue region within the surgical field. The primary challenge arises from the complex and vari…
▽ More
This study introduces a novel data-centric approach to improve real-time surgical guidance using fiber-based fluorescence lifetime imaging (FLIm). A key aspect of the methodology is the accurate detection of the aiming beam, which is essential for localizing points used to map FLIm measurements onto the tissue region within the surgical field. The primary challenge arises from the complex and variable conditions encountered in the surgical environment, particularly in Transoral Robotic Surgery (TORS). Uneven illumination in the surgical field can cause reflections, reduce contrast, and results in inconsistent color representation, further complicating aiming beam detection. To overcome these challenges, an instance segmentation model was developed using a data-centric training strategy that improves accuracy by minimizing label noise and enhancing detection robustness. The model was evaluated on a dataset comprising 40 in vivo surgical videos, demonstrating a median detection rate of 85%. This performance was maintained when the model was integrated in a clinical system, achieving a similar detection rate of 85% during TORS procedures conducted in patients. The system's computational efficiency, measured at approximately 24 frames per second (FPS), was sufficient for real-time surgical guidance. This study enhances the reliability of FLIm-based aiming beam detection in complex surgical environments, advancing the feasibility of real-time, image-guided interventions for improved surgical precision
△ Less
Submitted 11 November, 2024;
originally announced November 2024.
-
Modeling flux-quantizing Josephson junction circuits in Keysight ADS
Authors:
Ofer Naaman,
Ted White,
Mohamed Awida Hassan,
Derek Slater,
Sean Mcilvane,
Edwin Yeung,
Philip Krantz
Abstract:
We introduce Josephson junction and inductor models in Keysight ADS that feature an auxiliary flux port, and facilitate the expression of flux quantization conditions in simulation of superconducting microwave circuits. We present several examples that illustrate our methodology for constructing flux-quantizing circuits, including dc- and rf-SQUIDs, tunable couplers, and parametric amplifiers usin…
▽ More
We introduce Josephson junction and inductor models in Keysight ADS that feature an auxiliary flux port, and facilitate the expression of flux quantization conditions in simulation of superconducting microwave circuits. We present several examples that illustrate our methodology for constructing flux-quantizing circuits, including dc- and rf-SQUIDs, tunable couplers, and parametric amplifiers using SNAIL and rf-SQUID arrays. We perform DC, S-parameter, and harmonic balance simulations to validate our models and methods against theory and published experimental results.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Hamiltonian Lattice Formulation of Compact Maxwell-Chern-Simons Theory
Authors:
Changnan Peng,
Maria Cristina Diamantini,
Lena Funcke,
Syed Muhammad Ali Hassan,
Karl Jansen,
Stefan Kühn,
Di Luo,
Pranay Naredi
Abstract:
In this paper, a Hamiltonian lattice formulation for 2+1D compact Maxwell-Chern-Simons theory is derived. We analytically solve this theory and demonstrate that the mass gap in the continuum limit matches the well-known continuum formula. Our formulation preserves topological features such as the quantization of the Chern-Simons level, the degeneracy of energy eigenstates, the non-trivial properti…
▽ More
In this paper, a Hamiltonian lattice formulation for 2+1D compact Maxwell-Chern-Simons theory is derived. We analytically solve this theory and demonstrate that the mass gap in the continuum limit matches the well-known continuum formula. Our formulation preserves topological features such as the quantization of the Chern-Simons level, the degeneracy of energy eigenstates, the non-trivial properties of Wilson loops, and the mutual and self statistics of anyons. This work lays the groundwork for future Hamiltonian-based simulations of Maxwell-Chern-Simons theory on classical and quantum computers.
△ Less
Submitted 10 September, 2024; v1 submitted 29 July, 2024;
originally announced July 2024.
-
Review on the Role of Virtual Reality in Reducing Mental Health Diseases Specifically Stress, Anxiety, and Depression
Authors:
Sadia Saeed,
Khan Bahadar Khan,
Muhammad Abul Hassan,
Abdul Qayyum,
Saba Salahuddin
Abstract:
Objective: Virtual Reality (VR) is a technological interface that allows users to interact with a simulated environment. VR has been used extensively for mental health and clinical research. Mental health disorders are globally burdening health problems in the world. According to the Psychological Interventions Implementation Manual published by WHO on 6th March 2024, around one in eight people in…
▽ More
Objective: Virtual Reality (VR) is a technological interface that allows users to interact with a simulated environment. VR has been used extensively for mental health and clinical research. Mental health disorders are globally burdening health problems in the world. According to the Psychological Interventions Implementation Manual published by WHO on 6th March 2024, around one in eight people in the world lived with a mental disorder. This literature review is synthesized to find out the effects of VR therapy on stress, anxiety and depression. Method: We used Google Scholar database using keywords of VR, stress, anxiety and depression. Publication from last ten years (2014 to 1024) are considered. Researches only in the English language are included. All the papers and articles with the keyword VR missing were rejected. Result: Google Scholar yielded 17,700 results from our keywords. Nine studies met our search criteria that are included in this review. Out of nine, five studies encountered mental stress and gave effective results in reducing it by VR therapy. The other four targeted mood disorders, Social anxiety disorders, depression, loss of happiness and sleep deprivation. They also showed immense potential in reducing mental illness while using VR. Conclusion: Findings are in favor of the effectiveness of VR in reducing stress, anxiety and depression. Still, it is insufficient evidence to consider VR as solely independent treatment over the traditional medication. In future, the limitations can be overcome to relying on VR and using it in hospitals as a reliable source of cure for mental illness.
△ Less
Submitted 4 October, 2024; v1 submitted 8 July, 2024;
originally announced July 2024.
-
Automatic Recognition of Food Ingestion Environment from the AIM-2 Wearable Sensor
Authors:
Yuning Huang,
Mohamed Abul Hassan,
Jiangpeng He,
Janine Higgins,
Megan McCrory,
Heather Eicher-Miller,
Graham Thomas,
Edward O Sazonov,
Fengqing Maggie Zhu
Abstract:
Detecting an ingestion environment is an important aspect of monitoring dietary intake. It provides insightful information for dietary assessment. However, it is a challenging problem where human-based reviewing can be tedious, and algorithm-based review suffers from data imbalance and perceptual aliasing problems. To address these issues, we propose a neural network-based method with a two-stage…
▽ More
Detecting an ingestion environment is an important aspect of monitoring dietary intake. It provides insightful information for dietary assessment. However, it is a challenging problem where human-based reviewing can be tedious, and algorithm-based review suffers from data imbalance and perceptual aliasing problems. To address these issues, we propose a neural network-based method with a two-stage training framework that tactfully combines fine-tuning and transfer learning techniques. Our method is evaluated on a newly collected dataset called ``UA Free Living Study", which uses an egocentric wearable camera, AIM-2 sensor, to simulate food consumption in free-living conditions. The proposed training framework is applied to common neural network backbones, combined with approaches in the general imbalanced classification field. Experimental results on the collected dataset show that our proposed method for automatic ingestion environment recognition successfully addresses the challenging data imbalance problem in the dataset and achieves a promising overall classification accuracy of 96.63%.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
A Novel Blockchain Based Information Management Framework for Web 3.0
Authors:
Md Arif Hassan,
Cong T. Nguyen,
Chi-Hieu Nguyen,
Dinh Thai Hoang,
Diep N. Nguyen,
Eryk Dutkiewicz
Abstract:
Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as o…
▽ More
Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as one of the core technologies for the future development of Web 3.0. In this paper, we propose a novel blockchain-based information management framework, namely Smart Blockchain-based Web, to manage information in Web 3.0 effectively, enhance the security and privacy of users data, bring additional profits, and incentivize users to contribute information to the websites. Particularly, SBW utilizes blockchain technology and smart contracts to manage the decentralized data collection process for Web 3.0 effectively. Moreover, in this framework, we develop an effective consensus mechanism based on Proof-of-Stake to reward the user's information contribution and conduct game theoretical analysis to analyze the users behavior in the considered system. Additionally, we conduct simulations to assess the performance of SBW and investigate the impact of critical parameters on information contribution. The findings confirm our theoretical analysis and demonstrate that our proposed consensus mechanism can incentivize the nodes and users to contribute more information to our systems.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Enabling Technologies for Web 3.0: A Comprehensive Survey
Authors:
Md Arif Hassan,
Mohammad Behdad Jamshidi,
Bui Duc Manh,
Nam H. Chu,
Chi-Hieu Nguyen,
Nguyen Quang Hieu,
Cong T. Nguyen,
Dinh Thai Hoang,
Diep N. Nguyen,
Nguyen Van Huynh,
Mohammad Abu Alsheikh,
Eryk Dutkiewicz
Abstract:
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web…
▽ More
Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web, 3D interactive web, Metaverse, Virtual reality/Augmented reality, Internet of Things technology, and their roles in shaping Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic architecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and 3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0, such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system's scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions and providing insights into future research directions in this field.
△ Less
Submitted 29 December, 2023;
originally announced January 2024.
-
Multi-parameter study for a new Ground-Based telescope in Egypt
Authors:
Mohamed S. Darwish,
Hazem Badreldin,
Nasser M. Ahmed,
Mostafa Morsy,
E. E. Kohil,
Hany M. Hassan,
I. Helmy,
Ahmed shokry,
M. A. Hassan,
S. M. Saad,
G. M. Hamed,
Z. F. Ghatass,
S. A. Ata
Abstract:
A multi-parameter analysis was conducted to evaluate the impact of meteorological parameters, night sky brightness and seismic hazard on proposed sites for the new optical/infrared Egyptian astronomical telescope. The ERA5 reanalysis data set is used to get the following meteorological parameters: Total cloud coverage fraction, precipitable water vapor, relative humidity, wind speed & direction an…
▽ More
A multi-parameter analysis was conducted to evaluate the impact of meteorological parameters, night sky brightness and seismic hazard on proposed sites for the new optical/infrared Egyptian astronomical telescope. The ERA5 reanalysis data set is used to get the following meteorological parameters: Total cloud coverage fraction, precipitable water vapor, relative humidity, wind speed & direction and Air temperature. To estimate the aerosol optical depth we used the Modern-Era Retrospective analysis for Research and Applications version 2 (MERRA-2). Light pollution over the candidate sites was measured from Visible Infrared Imaging Radiometer Suite (VIIRS) Day Night Band (DNB). The seismic input in terms of maximum acceleration and response spectra were computed using a physics-based ground motion approach to assess the seismic hazards and consequently the designation of seismic resistant structure for the proposed sites to be able to assess the seismic hazards for the candidate sites. Of the seven nominated sites, two sites are found to have the best measurements and might be considered future sites for the new Egyptian Astronomical telescope. The first site is located in the south of the Sinai peninsula, while the second one is located in the Red Sea mountains region.
△ Less
Submitted 7 October, 2023;
originally announced October 2023.
-
Energy Balancing Algorithm for Wireless Sensor Network
Authors:
Ghassan Samara,
Mohammad A. Hassan,
Munir Al-Okour
Abstract:
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result,…
▽ More
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result, developing a routing protocol that decreases energy consumption in sensor nodes to extend the lifetime of the WSN using an intelligence algorithm has become difficult. LEACH is the first hierarchical routing protocol that divides the WSN into clusters to reduce energy usage. However, it has reached its limit in selecting a suitable cluster head and the sensor nodes to be joined, as well as their quantity. Thus, this research proposes an algorithm called Wireless Energy Balancing algorithm (WEB) that works on energy balancing distribution by identifying a suitable cluster head with minimum distance and high energy. Then it uses the knapsack-problem as a novel algorithm to design the cluster members. The simulation results demonstrate that the WEB algorithm outperforms LEACH by 31% in terms of energy conservation and WSN lifetime extension.
△ Less
Submitted 17 March, 2022;
originally announced March 2022.
-
IoT Forensic Frameworks (DFIF, IoTDOTS,FSAIoT): A Comprehensive Study
Authors:
Mohammad A. Hassan,
Ghassan Samara,
Mohammad Abu Fadda
Abstract:
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of pr…
▽ More
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of privacy and security in this connection, especially given the rapid increase in the number of existing and new IoT devices. Concerns, threats, and assaults related to IoT security have been regarded as a potential and problematic area of research. This necessitates the quick development or creation of suitable technologies with the nature of crimes in the IoT environment. On the other hand, criminal investigation specialists encounter difficulties and hurdles due to various locations, data types, instruments used, and device recognition. This paper provides an in-depth explanation of the criminal content of the Internet of Things. It compares its stages to the detailed stages of traditional digital forensics in terms of similarities and differences, the frameworks used in dealing with electronic crimes, and the techniques used in both types. This paper presents previous discussions of researchers in the field of digital forensics. For the IoT, which brings us to the most important parts of this paper, which is a comprehensive study of the IoT criminal frameworks that are used to protect communication in the field of IoT, such as Digital Forensic Investigation Framework (DFIF), Digital Forensic Framework for Smart Environments (IoTDOTS), Forensic State Acquisition from the Internet of Things (FSAIoT), and discusses the challenges in their general frameworks and provides solutions and strategies.
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
An Intelligent Vice Cluster Head Election Protocol in WSN
Authors:
Ghassan Samara,
Mohammad A. Hassan,
Yahya Zayed
Abstract:
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide r…
▽ More
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide range of fields. This includes maintaining network stability and extending network life. In a wireless network, sensors are the most essential component. Sensors are powered by a battery that has a finite amount of power. The battery is prone to power loss, and the sensor is therefore rendered inoperative as a result. In addition, the growing number of sensor nodes off-site affects the network's stability. The transmission and reception of information between the sensors and the base consumes the most energy in the sensor. An Intelligent Vice Cluster Head Selection Protocol is proposed in this study (IVC LEACH). In order to achieve the best performance with the least amount of energy consumption, the proposed hierarchical protocol relies on a fuzzy logic algorithm using four parameters to calculate the value of each node in the network and divides them into three hierarchical levels based on their value. This improves network efficiency and reliability while extending network life by 50 percent more than the original Low Energy Adaptive Clustering Hierarchy protocol
△ Less
Submitted 26 November, 2021;
originally announced December 2021.
-
PI Controller for Active Twin-Accumulator Suspension with Optimized Parameters Based on a Quarter Model
Authors:
Mohamed A. Hassan,
Ali M. Abd-El-Tawwab,
k. A. Abd El-gwwad,
M. M. M. Salem
Abstract:
This paper is primarily studying the behaver of the twin-accumulator suspension over the conventional passive system focusing on ride quality behavior and road holding. Therefore, a dynamic modeling of passive and twin-accumulator suspension for a quarter model is constructed. MATLAB Simulink environment is used to develop the suspension models. The simulation is applied with two different road di…
▽ More
This paper is primarily studying the behaver of the twin-accumulator suspension over the conventional passive system focusing on ride quality behavior and road holding. Therefore, a dynamic modeling of passive and twin-accumulator suspension for a quarter model is constructed. MATLAB Simulink environment is used to develop the suspension models. The simulation is applied with two different road disturbances, namely, step input and random input to disturb the suspension system. The optimum solution is obtained numerically by utilizing a multi-objective evolutionary strategy algorithm and employing a cost function that seeks to minimize the RMS value of the body acceleration, the suspension displacement as well as the dynamic tire load. Moreover, in this work, an active suspension system with PI controller is presented in order to improve the suspension performance criteria. The simulation results of passive, optimized twin accumulator suspension and active suspension consist of body displacement, wheel deflection, vehicle body acceleration, suspension travel and dynamic tire load are compared and analyzed. Results show that the twin-accumulator suspension system gives worthwhile improvements in ride behavior compared with the passive suspension. Finally, it can be observed that the performance of body displacement and wheel displacement can be improved by using the proposed PI controller.
△ Less
Submitted 4 June, 2017;
originally announced June 2017.
-
X-Ray Spectral Study of AGN Sources Content in Some Deep Extragalactic XMM-Newton Fields
Authors:
M. A. Hassan,
B. A. Korany,
R. Misra,
I. A. M. Issa,
M. K. Ahmed,
F. A. Abdel-Salam
Abstract:
We undertake a spectral study of a sample of bright X-ray sources taken from six XMM-Newton fields at high galactic latitudes, where AGN are the most populous class. These six fields were chosen such that the observation had an exposure time more than 60 ksec, had data from the EPIC-pn detector in the full-Frame mode and lying at high galactic latitude $|b| > 25^o$ . The analysis started by fittin…
▽ More
We undertake a spectral study of a sample of bright X-ray sources taken from six XMM-Newton fields at high galactic latitudes, where AGN are the most populous class. These six fields were chosen such that the observation had an exposure time more than 60 ksec, had data from the EPIC-pn detector in the full-Frame mode and lying at high galactic latitude $|b| > 25^o$ . The analysis started by fitting the spectra of all sources with an absorbed power-law model, and then we fitted all the spectra with an absorbed power-law with a low energy black-body component model.The sources for which we added a black body gave an F-test probability of 0.01 or less (i.e. at 99% confidence level), were recognized as sources that display soft excess. We perform a comparative analysis of soft excess spectral parameters with respect to the underlying power-law one for sources that satisfy this criterion. Those sources, that do not show evidence for a soft excess, based on the F-test probability at a 99% confidence level, were also fitted with the absorbed power-law with a low energy black-body component model with the black-body temperature fixed at 0.1 and 0.2 keV. We establish upper limits on the soft excess flux for those sources at these two temperatures. Finally we have made use of Aladdin interactive sky atlas and matching with NASA/IPAC Extragalactic Database (NED) to identify the X-ray sources in our sample. For those sources which are identified in the NED catalogue, we make a comparative study of the soft excess phenomenon for different types of systems.
△ Less
Submitted 12 September, 2011;
originally announced September 2011.
-
A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods
Authors:
Maaly Awad Hassan,
Andrew Chickadel
Abstract:
The interference imposes a significant negative impact on the performance of wireless networks. With the continuous deployment of larger and more sophisticated wireless networks, reducing interference in such networks is quickly being focused upon as a problem in today's world. In this paper we analyze the interference reduction problem from a graph theoretical viewpoint. A graph coloring methods…
▽ More
The interference imposes a significant negative impact on the performance of wireless networks. With the continuous deployment of larger and more sophisticated wireless networks, reducing interference in such networks is quickly being focused upon as a problem in today's world. In this paper we analyze the interference reduction problem from a graph theoretical viewpoint. A graph coloring methods are exploited to model the interference reduction problem. However, additional constraints to graph coloring scenarios that account for various networking conditions result in additional complexity to standard graph coloring. This paper reviews a variety of algorithmic solutions for specific network topologies.
△ Less
Submitted 29 March, 2011;
originally announced March 2011.
-
Image Encryption Using Differential Evolution Approach in Frequency Domain
Authors:
Maaly Awad S Hassan,
Ibrahim Soliman I Abuhaiba
Abstract:
This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two dime…
▽ More
This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two dimensional (2-D) keyed discrete Fourier transform is carried out on the original image to be encrypted. Secondly crossover is performed between two components of the encrypted image, which are selected based on Linear Feedback Shift Register (LFSR) index generator. Similarly, keyed mutation is performed on the real parts of a certain components selected based on LFSR index generator. The LFSR index generator initializes it seed with the shared secret key to ensure the security of the resulting indices. The process shuffles the positions of image pixels. A new image encryption scheme based on the DE approach is developed which is composed with a simple diffusion mechanism. The deciphering process is an invertible process using the same key. The resulting encrypted image is found to be fully distorted, resulting in increasing the robustness of the proposed work. The simulation results validate the proposed image encryption scheme.
△ Less
Submitted 29 March, 2011;
originally announced March 2011.
-
On Description of Isomorphism Classes of filiform Leibniz algebras in dimensions 7 and 8
Authors:
Isamiddin S. Rakhimov,
Munther A. Hassan
Abstract:
The paper concerns the classification problem of a subclass of complex filiform Leibniz algebras in dimensions 7 and 8. This subclass arises from naturally graded filiform Lie algebras. We give a complete list of isomorphism classes of algebras including Lie case. In parametric families cases, the corresponding orbit functions (invariants) are given. In discrete orbits case, we show representative…
▽ More
The paper concerns the classification problem of a subclass of complex filiform Leibniz algebras in dimensions 7 and 8. This subclass arises from naturally graded filiform Lie algebras. We give a complete list of isomorphism classes of algebras including Lie case. In parametric families cases, the corresponding orbit functions (invariants) are given. In discrete orbits case, we show representatives of the orbits.
△ Less
Submitted 16 April, 2010;
originally announced April 2010.
-
On one dimensional Leibniz central extensions of a naturally graded filiform Lie algebra
Authors:
I. S. Rakhimov,
Munther A. Hassan
Abstract:
This paper deals with the classification of Leibniz central extensions of a naturally graded filiform Lie algebra. We choose a basis with respect to that the table of multiplication has a simple form. In low dimensional cases isomorphism classes of the central extensions are given. In parametric family orbits cases invariant functions (orbit functions) are provided.
This paper deals with the classification of Leibniz central extensions of a naturally graded filiform Lie algebra. We choose a basis with respect to that the table of multiplication has a simple form. In low dimensional cases isomorphism classes of the central extensions are given. In parametric family orbits cases invariant functions (orbit functions) are provided.
△ Less
Submitted 11 January, 2010;
originally announced January 2010.
-
On low-dimensional filiform Leibniz algebras and their invariants
Authors:
I. S. Rakhimov,
Munther A. Hassan
Abstract:
The paper deals with the complete classification of a subclass of complex filiform Leibniz algebras in dimensions 5 and 6. This subclass arises from the naturally graded filiform Lie algebras. We give a complete list of algebras. In parametric families cases, the corresponding orbit functions (invariants) are given. In discrete orbits case, we show a representative of the orbits.
The paper deals with the complete classification of a subclass of complex filiform Leibniz algebras in dimensions 5 and 6. This subclass arises from the naturally graded filiform Lie algebras. We give a complete list of algebras. In parametric families cases, the corresponding orbit functions (invariants) are given. In discrete orbits case, we show a representative of the orbits.
△ Less
Submitted 5 January, 2010;
originally announced January 2010.
-
RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in SystemC
Authors:
M. Abdelsalam Hassan,
Keishi Sakanushi,
Yoshinori Takeuchi,
Masaharu Imai
Abstract:
This paper presents the methodology and the modeling constructs we have developed to capture the real time aspects of RTOS simulation models in a System Level Design Language (SLDL) like SystemC. We describe these constructs and show how they are used to build a simulation model of an RTOS kernel targeting the $μ$-ITRON OS specification standard.
This paper presents the methodology and the modeling constructs we have developed to capture the real time aspects of RTOS simulation models in a System Level Design Language (SLDL) like SystemC. We describe these constructs and show how they are used to build a simulation model of an RTOS kernel targeting the $μ$-ITRON OS specification standard.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.