-
Radiative tail of solitary waves in an extended Korteweg-de Vries equation
Authors:
Muneeb Mushtaq
Abstract:
We solve the fifth-order Korteweg-de Vries (fKdV) equation which is a modified KdV equation perturbed by a fifth-order derivative term multiplied by a small parameter $ε^2$, with $0< ε\ll 1$. Unlike the KdV equation, the stationary fKdV equation does not exhibit exactly localized 1-soliton solution, instead it allows a solution which has a well defined central core similar to that of the KdV 1-sol…
▽ More
We solve the fifth-order Korteweg-de Vries (fKdV) equation which is a modified KdV equation perturbed by a fifth-order derivative term multiplied by a small parameter $ε^2$, with $0< ε\ll 1$. Unlike the KdV equation, the stationary fKdV equation does not exhibit exactly localized 1-soliton solution, instead it allows a solution which has a well defined central core similar to that of the KdV 1-soliton solution, accompanied by extremely small oscillatory standing wave tails on both sides of the core. The amplitude of the standing wave tail oscillations is $\mathcal{O}(\exp(-1/ε))$, i.e. it is beyond all orders small in perturbation theory. The analytical computation of the amplitude of these transcendentally small tail oscillations has been carried out up to $\mathcal{O}(ε^5)$ order corrections by using the complex method of matched asymptotics. Also the long-standing discrepancy between the $\mathcal{O}(ε^2)$ perturbative result of Grimshaw and Joshi (1995) and the numerical results of Boyd (1995) has been resolved. In addition to the stationary symmetric weakly localized solitary wave-like solutions, we analyzed the stationary asymmetric solutions of the fKdV equation which decay exponentially to zero on one side of the (slightly asymmetric) core and blows up to large negative values on other side of the core. The asymmetry is quantified by computing the third derivative of the solution at the origin which also turns out to be beyond all orders small in perturbation theory. The analytical computation of the third derivative of a function at the origin has also been carried out up to $\mathcal{O}(ε^5)$ order corrections. We use the exponentially convergent pseudo-spectral method to solve the fKdV equation numerically. The analytical and the numerical results show remarkable agreement.
△ Less
Submitted 22 August, 2024;
originally announced August 2024.
-
A new derivation of the amplitude of asymptotic oscillatory tails of weakly delocalized solitons
Authors:
Gyula Fodor,
Péter Forgács,
Muneeb Mushtaq
Abstract:
The computation of the amplitude, $α$, of asymptotic standing wave tails of weakly delocalized, stationary solutions in a fifth-order Korteweg-de Vries equation is revisited. Assuming the coefficient of the fifth order derivative term, $ε^2\ll1$, a new derivation of the ``beyond all orders in $ε$'' amplitude, $α$, is presented. It is shown by asymptotic matching techniques, extended to higher orde…
▽ More
The computation of the amplitude, $α$, of asymptotic standing wave tails of weakly delocalized, stationary solutions in a fifth-order Korteweg-de Vries equation is revisited. Assuming the coefficient of the fifth order derivative term, $ε^2\ll1$, a new derivation of the ``beyond all orders in $ε$'' amplitude, $α$, is presented. It is shown by asymptotic matching techniques, extended to higher orders in $ε$, that the value of $α$ can be obtained from the asymmetry at the center of the unique solution exponentially decaying in one direction. This observation, complemented by some fundamental results of Hammersley and Mazzarino [Proc. R. Soc. Lond. A 424, 19 (1989)], not only sheds new light on the computation of $α$, but also greatly facilitates its numerical determination to a remarkable precision for so small values of $ε$, which are beyond the capabilities of standard numerical methods.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Dust attenuation in galaxies at cosmic dawn from the FirstLight simulations
Authors:
Muzammil Mushtaq,
Daniel Ceverino,
Ralf S. Klessen,
Stefan Reissl,
Prajwal Hassan Puttasiddappa
Abstract:
We study the behavior of dust in galaxies at cosmic dawn, z=6-8, by coupling the FirstLight simulations with the radiative transfer code POLARIS. The starburst nature of these galaxies and their complex distribution of dust lead to a large diversity of attenuation curves. These follow the Calzetti model only for relatively massive galaxies, Mstars=10^9Msun. Galaxies with lower masses have steeper…
▽ More
We study the behavior of dust in galaxies at cosmic dawn, z=6-8, by coupling the FirstLight simulations with the radiative transfer code POLARIS. The starburst nature of these galaxies and their complex distribution of dust lead to a large diversity of attenuation curves. These follow the Calzetti model only for relatively massive galaxies, Mstars=10^9Msun. Galaxies with lower masses have steeper curves, consistent with the model for the Small Magellanic Cloud (SMC). The ultraviolet and optical slopes of the attenuation curves are closer to the modified Calzetti model, with a slight preference for the power-law model for galaxies with the highest values of attenuation. We have also examined the relation between the slope in the far-ultraviolet, beta_UV , and the infrared excess, IRX. At z=6, it follows the Calzetti model with a shift to slightly lower beta_UV values due to lower metallicities at lower attenuation. The same relation at z=8 shows a shift to higher IRX values due to a stronger CMB radiation at high-z.
△ Less
Submitted 25 August, 2023; v1 submitted 20 April, 2023;
originally announced April 2023.
-
Higher order corrections to beyond-all-order effects in a fifth order Korteweg-de Vries equation
Authors:
Gyula Fodor,
Péter Forgács,
Muneeb Mushtaq
Abstract:
A perturbative scheme is applied to calculate corrections to the leading, exponentially small (beyond-all-orders) amplitude of the ``trailing'' wave asymptotics of weakly localized solitons. The model considered is a Korteweg-de Vries equation modified by a fifth order derivative term, $ε^2\partial_x^5$ with $ε\ll1$ (fKdV). The leading order corrections to the tail amplitude are calculated up to…
▽ More
A perturbative scheme is applied to calculate corrections to the leading, exponentially small (beyond-all-orders) amplitude of the ``trailing'' wave asymptotics of weakly localized solitons. The model considered is a Korteweg-de Vries equation modified by a fifth order derivative term, $ε^2\partial_x^5$ with $ε\ll1$ (fKdV). The leading order corrections to the tail amplitude are calculated up to ${\cal{O}}(ε^5)$. An arbitrary precision numerical code is implemented to solve the fKdV equation and to check the perturbative results. Excellent agreement is found between the numerical and analytical results. Our work also clarifies the origin of a long-standing disagreement between the ${\cal{O}}(ε^2)$ perturbative result of Grimshaw and Joshi [SIAM J. Appl. Math. 55, 124 (1995)] and the numerical results of Boyd [Comp. Phys. 9, 324 (1995)].
△ Less
Submitted 2 May, 2023; v1 submitted 3 March, 2023;
originally announced March 2023.
-
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
Authors:
Natasha Alkhatib,
Maria Mushtaq,
Hadi Ghauch,
Jean-Luc Danger
Abstract:
Due to the rising number of sophisticated customer functionalities, electronic control units (ECUs) are increasingly integrated into modern automotive systems. However, the high connectivity between the in-vehicle and the external networks paves the way for hackers who could exploit in-vehicle network protocols' vulnerabilities. Among these protocols, the Controller Area Network (CAN), known as th…
▽ More
Due to the rising number of sophisticated customer functionalities, electronic control units (ECUs) are increasingly integrated into modern automotive systems. However, the high connectivity between the in-vehicle and the external networks paves the way for hackers who could exploit in-vehicle network protocols' vulnerabilities. Among these protocols, the Controller Area Network (CAN), known as the most widely used in-vehicle networking technology, lacks encryption and authentication mechanisms, making the communications delivered by distributed ECUs insecure. Inspired by the outstanding performance of bidirectional encoder representations from transformers (BERT) for improving many natural language processing tasks, we propose in this paper ``CAN-BERT", a deep learning based network intrusion detection system, to detect cyber attacks on CAN bus protocol. We show that the BERT model can learn the sequence of arbitration identifiers (IDs) in the CAN bus for anomaly detection using the ``masked language model" unsupervised training objective. The experimental results on the ``Car Hacking: Attack \& Defense Challenge 2020" dataset show that ``CAN-BERT" outperforms state-of-the-art approaches. In addition to being able to identify in-vehicle intrusions in real-time within 0.8 ms to 3 ms w.r.t CAN ID sequence length, it can also detect a wide variety of cyberattacks with an F1-score of between 0.81 and 0.99.
△ Less
Submitted 17 October, 2022;
originally announced October 2022.
-
Dust Temperature and Emission of FirstLight Simulated Galaxies at Cosmic Dawn
Authors:
Muzammil Mushtaq,
Prajwal Hassan Puttasiddappa
Abstract:
We study the behavior of dust temperature and its infrared emission of FirstLight1 simulated galaxies at the redshift of 6 and 8, by using POLARIS2 as a Monte Carlo photon transport simulator. To calculate the dust temperature ($T_{dust}$) of the Interstellar medium (ISM) of galaxies, POLARIS requires three essential parameters as an input - (1) The physical characteristics of galaxies such as the…
▽ More
We study the behavior of dust temperature and its infrared emission of FirstLight1 simulated galaxies at the redshift of 6 and 8, by using POLARIS2 as a Monte Carlo photon transport simulator. To calculate the dust temperature ($T_{dust}$) of the Interstellar medium (ISM) of galaxies, POLARIS requires three essential parameters as an input - (1) The physical characteristics of galaxies such as the spatial distribution of stars and dust, which are taken from FirstLight galaxies. (2) The intrinsic properties of dust grains that are derived from theDiscrete Dipole Approximation Code (DDSCAT) model. (3) The optical properties of star-particles are in the form of their spectral energy distributions (SEDs) which are extracted from the Binary Population and Spectral Synthesis (BPASS) model. Our simulations produced the 3D maps of the equilibrium dust temperature along with the sight-line infrared emission maps of galaxies. Our results show the importance of excess heating of dust by the Cosmic Microwave Background (CMB) radiations at high redshifts that results in increased Mid and Far infrared (M-FIR) dust emission. The different evaluations of dust temperature models relate diversely to the optical and intrinsic properties of galaxies
△ Less
Submitted 17 October, 2022; v1 submitted 18 August, 2022;
originally announced August 2022.
-
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks
Authors:
Natasha Alkhatib,
Maria Mushtaq,
Hadi Ghauch,
Jean-Luc Danger
Abstract:
Network Intrusion Detection Systems (NIDSs) are widely regarded as efficient tools for securing in-vehicle networks against diverse cyberattacks. However, since cyberattacks are always evolving, signature-based intrusion detection systems are no longer adopted. An alternative solution can be the deployment of deep learning based intrusion detection system which play an important role in detecting…
▽ More
Network Intrusion Detection Systems (NIDSs) are widely regarded as efficient tools for securing in-vehicle networks against diverse cyberattacks. However, since cyberattacks are always evolving, signature-based intrusion detection systems are no longer adopted. An alternative solution can be the deployment of deep learning based intrusion detection system which play an important role in detecting unknown attack patterns in network traffic. Hence, in this paper, we compare the performance of different unsupervised deep and machine learning based anomaly detection algorithms, for real-time detection of anomalies on the Audio Video Transport Protocol (AVTP), an application layer protocol implemented in the recent Automotive Ethernet based in-vehicle network. The numerical results, conducted on the recently published "Automotive Ethernet Intrusion Dataset", show that deep learning models significantly outperfom other state-of-the art traditional anomaly detection models in machine learning under different experimental settings.
△ Less
Submitted 25 April, 2022; v1 submitted 31 January, 2022;
originally announced February 2022.
-
Digital Passport and Visa Asset Management Using Private and Permissioned Blockchain
Authors:
Keenu Chandra,
Maroof Mushtaq,
Nalini N
Abstract:
Blockchain is currently one of the fastest-growing technologies in the field of Computer Science. It has found a prevalent use in financial applications like cryptocurrency, for example, Bitcoin and Ethereum. They have been able to bring an unforeseen disruption in the field of finance. However, permissionless Blockchains like these have some downsides, namely the computation cost of the Proof of…
▽ More
Blockchain is currently one of the fastest-growing technologies in the field of Computer Science. It has found a prevalent use in financial applications like cryptocurrency, for example, Bitcoin and Ethereum. They have been able to bring an unforeseen disruption in the field of finance. However, permissionless Blockchains like these have some downsides, namely the computation cost of the Proof of Work algorithm, maximum allowed size for a block, decrease in intelligibility with the increase of the number of blocks in the chain, domination of nodes with higher computing power as miners and validators. These factors have restricted the adoption of permissionless blockchain technology outside the field of finance, such as in medical or legal fields. This paper proposes a solution to these problems using a permissioned blockchain. It does not require a computationally expensive consensus mechanism as permissioned chains call for trust between participating organizations which is achieved via exclusive invitations. We have utilized a third-party orderer to maintain the trust between organizations.
△ Less
Submitted 27 July, 2021; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Semantic Parsing to Manipulate Relational Database For a Management System
Authors:
Muhammad Hamzah Mushtaq
Abstract:
Chatbots and AI assistants have claimed their importance in today life. The main reason behind adopting this technology is to connect with the user, understand their requirements, and fulfill them. This has been achieved but at the cost of heavy training data and complex learning models. This work is carried out proposes a simple algorithm, a model which can be implemented in different fields each…
▽ More
Chatbots and AI assistants have claimed their importance in today life. The main reason behind adopting this technology is to connect with the user, understand their requirements, and fulfill them. This has been achieved but at the cost of heavy training data and complex learning models. This work is carried out proposes a simple algorithm, a model which can be implemented in different fields each with its own work scope. The proposed model converts human language text to computer-understandable SQL queries. The model requires data only related to the specific field, saving data space. This model performs linear computation hence solving the computational complexity. This work also defines the stages where a new methodology is implemented and what previous method was adopted to fulfill the requirement at that stage. Two datasets available online will be used in this work, the ATIS dataset, and WikiSQL. This work compares the computation time among the 2 datasets and also compares the accuracy of both. This paper works over basic Natural language processing tasks like semantic parsing, NER, parts of speech and tends to achieve results through these simple methods.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
An Efficient Framework for Information Security in Cloud Computing Using Auditing Algorithm Shell (AAS)
Authors:
M. Omer Mushtaq,
Furrakh Shahzad,
M. Owais Tariq,
Mahina Riaz,
Bushra Majeed
Abstract:
There is a dynamic escalation and extension in the new infrastructure, educating personnel and licensing new computer programs in the field of IT, due to the emergence of Cloud Computing (CC) paradigm. It has become a quick growing segment of IT business in last couple of years. However, due to the rapid growth of data, people and IT firms, the issue of information security is getting more complex…
▽ More
There is a dynamic escalation and extension in the new infrastructure, educating personnel and licensing new computer programs in the field of IT, due to the emergence of Cloud Computing (CC) paradigm. It has become a quick growing segment of IT business in last couple of years. However, due to the rapid growth of data, people and IT firms, the issue of information security is getting more complex. One of the major concerns of the user is, at what degree the data is safe on Cloud? In spite of all promotional material encompassing the cloud, consortium customers are not willing to shift their business on the cloud. Data security is the major problem which has limited the scope of cloud computing. In new cloud computing infrastructure, the techniques such as the Strong Secure Shell and Encryption are deployed to guarantee the authenticity of the user through logs systems. The vendors utilize these logs to analyze and view their data. Therefore, this implementation is not enough to ensure security, privacy and authoritative use of the data. This paper introduces quad layered framework for data security, data privacy, data breaches and process associated aspects. Using this layered architecture we have preserved the secrecy of confidential information and tried to build the trust of user on cloud computing. This layered framework prevents the confidential information by multiple means i.e. Secure Transmission of Data, Encrypted Data and its Processing, Database Secure Shell and Internal/external log Auditing.
△ Less
Submitted 23 February, 2017;
originally announced February 2017.
-
Age Estimates of Universe: from Globular Clusters to Cosmological Models and Probes
Authors:
Hira Fatima,
Muzammil Mushtaq,
Syed Faisal Ur Rahman
Abstract:
We performed the photometric analysis of M2 and M92 globular clusters in g and r bands of SLOAN photometric system. We transformed these g and r bands into BV bands of Johnson-Cousins photometric system and built the color magnitude diagram (CMD). We estimated the age, and metallicity of both the clusters, by fitting Padova isochrones of different age and metallicities onto the CMD. We studied Ein…
▽ More
We performed the photometric analysis of M2 and M92 globular clusters in g and r bands of SLOAN photometric system. We transformed these g and r bands into BV bands of Johnson-Cousins photometric system and built the color magnitude diagram (CMD). We estimated the age, and metallicity of both the clusters, by fitting Padova isochrones of different age and metallicities onto the CMD. We studied Einstein and de Sitter model, bench mark model, the cosmological parameters by WMAP and Planck surveys. Finally, we compared estimated age of globular clusters to the ages from the cosmological models and cosmological parameters values of WMAP and Planck surveys.
△ Less
Submitted 16 September, 2016; v1 submitted 8 September, 2016;
originally announced September 2016.