Skip to main content

Showing 1–18 of 18 results for author: Raju, D

.
  1. arXiv:2505.22268  [pdf, ps, other

    physics.chem-ph

    Thermophysical Properties and Phase Behavior of CO2 with Impurities: Insight from Molecular Simulations

    Authors: Darshan Raju, Mahinder Ramdin, Thijs J. H. Vlugt

    Abstract: Experimentally determining thermophysical properties for various compositions commonly found in CO2 transportation systems is extremely challenging. To overcome this challenge, we performed Monte Carlo (MC) and molecular dynamics (MD) simulations of CO2 rich mixtures to compute thermophysical properties such as densities, thermal expansion coefficients, isothermal compressibilities, heat capacitie… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  2. arXiv:2505.22239  [pdf, ps, other

    cond-mat.stat-mech physics.chem-ph

    Finite-size effects of the excess entropy computed from integrating the radial distribution function

    Authors: Darshan Raju, Mahinder Ramdin, Jean-Marc Simon, Peter Kruger, Thijs J. H. Vlugt

    Abstract: Computation of the excess entropy from the second-order density expansion of the entropy holds strictly for infinite systems in the limit of small densities. For the reliable and efficient computation of excess entropy, it is important to understand finite-size effects. Here, expressions to compute excess entropy and Kirkwood-Buff (KB) integrals by integrating the Radial Distribution Function (RDF… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

  3. arXiv:2407.16301  [pdf

    physics.plasm-ph

    MHD activity induced coherent mode excitation in the edge plasma region of ADITYA-U Tokamak

    Authors: Kaushlender Singh, Suman Dolui, Bharat Hegde, Lavkesh Lachhvani, Sharvil Patel, Injamul Hoque, Ashok K. Kumawat, Ankit Kumar, Tanmay Macwan, Harshita Raj, Soumitra Banerjee, Komal Yadav, Abha Kanik, Pramila Gautam, Rohit Kumar, Suman Aich, Laxmikanta Pradhan, Ankit Patel, Kalpesh Galodiya, Daniel Raju, S. K. Jha, K. A. Jadeja, K. M. Patel, S. N. Pandya, M. B. Chaudhary , et al. (6 additional authors not shown)

    Abstract: In this paper, we report the excitation of coherent density and potential fluctuations induced by magnetohydrodynamic (MHD) activity in the edge plasma region of ADITYA-U Tokamak. When the amplitude of the MHD mode, mainly the m/n = 2/1, increases beyond a threshold value of 0.3-0.4 %, coherent oscillations in the density and potential fluctuations are observed having the same frequency as that of… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  4. arXiv:2312.13132  [pdf, other

    cs.CC cs.CR

    On the complexity of sabotage games for network security

    Authors: Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu

    Abstract: Securing dynamic networks against adversarial actions is challenging because of the need to anticipate and counter strategic disruptions by adversarial entities within complex network structures. Traditional game-theoretic models, while insightful, often fail to model the unpredictability and constraints of real-world threat assessment scenarios. We refine sabotage games to reflect the realistic l… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  5. arXiv:2310.03914  [pdf

    cs.SE

    Introducing High School Students to Version Control, Continuous Integration, and Quality Assurance

    Authors: Joseph Latessa, Aadi Huria, Deepak Raju

    Abstract: Software Engineering concepts such as version control, continuous integration, and unit testing are often not presented in college computer science curriculums until the third year of study, after completing several semesters of programming courses. Throughout the summer of 2023, two high school students volunteered in our lab at Wayne State University where I'm a graduate research assistant and P… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: 6 pages, 3 figures

  6. A Survey on Cross-Architectural IoT Malware Threat Hunting

    Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang

    Abstract: In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integrated into human life have become a hackers highway… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: https://ieeexplore.ieee.org/abstract/document/9462110

    Journal ref: IEEE Access 2021

  7. arXiv:2306.07118  [pdf

    cs.CR cs.LG

    On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

    Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang

    Abstract: As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible, leading to an influ… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: file:///C:/Users/ibrahim_abualhaol/Downloads/s42400-022-00119-8.pdf

    Journal ref: SpringerOpen Cybersecurity 2022

  8. arXiv:2211.11741  [pdf, other

    eess.SY cs.LO

    Sensor Placement for Online Fault Diagnosis

    Authors: Dhananjay Raju, Georgios Bakirtzis, Ufuk Topcu

    Abstract: Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior. Due to the intrinsic relation between observations and sensors placed on a system, sensors' fault diagnosis and placement are mutually dependent. Consequently, it is imperative to solve the fault diagnosis and sensor placement problems jointly. One appr… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  9. Adapting to the Behavior of Environments with Bounded Memory

    Authors: Dhananjay Raju, RĂ¼diger Ehlers, Ufuk Topcu

    Abstract: We study the problem of synthesizing implementations from temporal logic specifications that need to work correctly in all environments that can be represented as transducers with a limited number of states. This problem was originally defined and studied by Kupferman, Lustig, Vardi, and Yannakakis. They provide NP and 2-EXPTIME lower and upper bounds (respectively) for the complexity of this prob… ▽ More

    Submitted 16 September, 2021; originally announced September 2021.

    Comments: In Proceedings GandALF 2021, arXiv:2109.07798

    ACM Class: D.2.3; B.1.2;

    Journal ref: EPTCS 346, 2021, pp. 52-66

  10. arXiv:2101.01015  [pdf, other

    cs.CR cs.LG

    Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms

    Authors: Anandharaju Durai Raju, Ke Wang

    Abstract: Existing malware detection approaches suffer from a simplistic trade-off between false positive rate (FPR) and true positive rate (TPR) due to a single tier classification approach, where the two measures adversely affect one another. The practical implication for malware detection is that FPR must be kept at an acceptably low level while TPR remains high. To this end, we propose a two-tiered lear… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: 12 pages, 8 figures, 5 tables

  11. arXiv:2004.02498  [pdf, other

    cs.CV q-bio.PE

    Image-based phenotyping of diverse Rice (Oryza Sativa L.) Genotypes

    Authors: Mukesh Kumar Vishal, Dipesh Tamboli, Abhijeet Patil, Rohit Saluja, Biplab Banerjee, Amit Sethi, Dhandapani Raju, Sudhir Kumar, R N Sahoo, Viswanathan Chinnusamy, J Adinarayana

    Abstract: Development of either drought-resistant or drought-tolerant varieties in rice (Oryza sativa L.), especially for high yield in the context of climate change, is a crucial task across the world. The need for high yielding rice varieties is a prime concern for developing nations like India, China, and other Asian-African countries where rice is a primary staple food. The present investigation is carr… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

    Comments: Paper presented at the ICLR 2020 Workshop on Computer Vision for Agriculture (CV4A)

  12. arXiv:2002.07274  [pdf, ps, other

    cs.FL

    Playing Against Opponents With Limited Memory

    Authors: Dhananjay Raju, RĂ¼diger Ehlers, Ufuk Topcu

    Abstract: We study \emph{partial-information} two-player turn-based games on graphs with omega-regular objectives, when the partial-information player has \emph{limited memory}. Such games are a natural formalization for reactive synthesis when the environment player is not genuinely adversarial to the system player. The environment player has goals of its own, but the exact goal of the environment player i… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

  13. arXiv:1911.02355  [pdf

    physics.gen-ph

    Kaluza-Klein FRW type dark energy model with a massive scalar field

    Authors: D. R. K. Reddy, K. Deniel Raju

    Abstract: In this investigation we discuss the dynamical aspects of Kaluza-Klein FRW type cosmological model in the presence of dark energy fluid and an attractive massive scalar field. The field equations are solved using a power law between the average scale factor and the scalar field to reduce the mathematical complexity. We have presented the corresponding dark energy model. Important cosmological para… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

    Comments: 10 pages

  14. arXiv:1910.10380  [pdf, other

    eess.SY cs.AI cs.MA

    Online Synthesis for Runtime Enforcement of Safety in Multi-Agent Systems

    Authors: Dhananjay Raju, Suda Bharadwaj, Ufuk Topcu

    Abstract: A shield is attached to a system to guarantee safety by correcting the system's behavior at runtime. Existing methods that employ design-time synthesis of shields do not scale to multi-agent systems. Moreover, such shields are typically implemented in a centralized manner, requiring global information on the state of all agents in the system. We address these limitations through a new approach whe… ▽ More

    Submitted 27 February, 2020; v1 submitted 23 October, 2019; originally announced October 2019.

  15. arXiv:1712.03685  [pdf

    physics.plasm-ph

    Modeling of eddy current distribution in the SST-1 tokamak

    Authors: Amit K. Singh, Santanu Banerjee, I. Bandyopadhyay, Deepti Sharma, S. K. Jha, R. Srinivasan, D. Raju, M. V. Gopalakrishna, the SST-1 team

    Abstract: The time varying currents in the Ohmic transformer in the SST-1 tokamak induce voltages that drive large eddy currents in the passive structures like the vacuum vessel and cryostat. Since the vacuum vessel and the cryostat are toroidally continuous without electrical breaks in SST- 1, this leads to a shielding effect on the flux penetrating the vacuum vessel. This reduces the magnitude of the loop… ▽ More

    Submitted 11 December, 2017; originally announced December 2017.

    Comments: 21 pages, 16 figures

  16. arXiv:1707.05848  [pdf, ps, other

    cs.LO

    Program Completionin the Input Language of GRINGO

    Authors: Amelia Harrison, Vladimir Lifschitz, Dhananjay Raju

    Abstract: We argue that turning a logic program into a set of completed definitions can be sometimes thought of as the "reverse engineering" process of generating a set of conditions that could serve as a specification for it. Accordingly, it may be useful to define completion for a large class of ASP programs and to automate the process of generating and simplifying completion formulas. Examining the outpu… ▽ More

    Submitted 2 November, 2017; v1 submitted 18 July, 2017; originally announced July 2017.

    Comments: Paper presented at the 33nd International Conference on Logic Programming (ICLP 2017), Melbourne, Australia, August 28 to September 1, 2017 16 pages, LaTeX, 3 PDF figures (arXiv:YYMM.NNNNN)

  17. arXiv:1208.4809  [pdf, other

    cs.DB

    Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study

    Authors: H. Venkateswara Reddy, Dr. S. Viswanadha Raju, B. Ramasubba Reddy

    Abstract: The proportionate increase in the size of the data with increase in space implies that clustering a very large data set becomes difficult and is a time consuming process.Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling allocating unlabeled objects into proper clusters is impossible in the categorical domain.To address… ▽ More

    Submitted 23 August, 2012; originally announced August 2012.

    Comments: 16 pages, 4 figures, 3 equations

  18. arXiv:physics/0411131  [pdf

    physics.plasm-ph

    Exploring Core-to-edge Transport in Aditya Tokamak by Oscillations Observed in the edge Radiation

    Authors: M. B. Chowdhuri, D. Raju, R. Manchanda, Vinay Kumar, Shankar Joisa, P. K. Atrey, C. V. S. Rao, R. Jha, R. Singh, P. Vasu, the Aditya Collaboration

    Abstract: Understanding of the transport in a Tokamak plasma is an important issue. Various mechanisms have been reported in the literature to relate the core phenomenon to edge phenomenon. Sawtooth and Mirnov oscillations caused by MHD instabilities are generally observed in Tokamak discharges. Observation of these effects in the visible radiation from outer edge may offer a possible means to understand… ▽ More

    Submitted 15 November, 2004; originally announced November 2004.

    Comments: 12th International Congress on Plasma Physics, 25-29 October 2004, Nice (France)