-
Thermophysical Properties and Phase Behavior of CO2 with Impurities: Insight from Molecular Simulations
Authors:
Darshan Raju,
Mahinder Ramdin,
Thijs J. H. Vlugt
Abstract:
Experimentally determining thermophysical properties for various compositions commonly found in CO2 transportation systems is extremely challenging. To overcome this challenge, we performed Monte Carlo (MC) and molecular dynamics (MD) simulations of CO2 rich mixtures to compute thermophysical properties such as densities, thermal expansion coefficients, isothermal compressibilities, heat capacitie…
▽ More
Experimentally determining thermophysical properties for various compositions commonly found in CO2 transportation systems is extremely challenging. To overcome this challenge, we performed Monte Carlo (MC) and molecular dynamics (MD) simulations of CO2 rich mixtures to compute thermophysical properties such as densities, thermal expansion coefficients, isothermal compressibilities, heat capacities, Joule-Thomson coefficients, speed of sound, and viscosities at temperatures (235-313) K and pressures (20-200) bar. We computed thermophysical properties of pure CO2 and CO2 rich mixtures with N2, Ar, H2, and CH4 as impurities (1-10) mol% and showed good agreement with available equations of state (EoS). We showed that impurities decrease the values of thermal expansion coefficients, isothermal compressibilities, heat capacities, and Joule-Thomson coefficients in the gas phase, while these values increase in the liquid and supercritical phases. In contrast, impurities increase the value of speed of sound in the gas phase and decrease it in the liquid and supercritical phases. We present an extensive data set of thermophysical properties for CO2 rich mixtures with various impurities, which will help to design the safe and efficient operation of CO2 transportation systems.
△ Less
Submitted 28 May, 2025;
originally announced May 2025.
-
Finite-size effects of the excess entropy computed from integrating the radial distribution function
Authors:
Darshan Raju,
Mahinder Ramdin,
Jean-Marc Simon,
Peter Kruger,
Thijs J. H. Vlugt
Abstract:
Computation of the excess entropy from the second-order density expansion of the entropy holds strictly for infinite systems in the limit of small densities. For the reliable and efficient computation of excess entropy, it is important to understand finite-size effects. Here, expressions to compute excess entropy and Kirkwood-Buff (KB) integrals by integrating the Radial Distribution Function (RDF…
▽ More
Computation of the excess entropy from the second-order density expansion of the entropy holds strictly for infinite systems in the limit of small densities. For the reliable and efficient computation of excess entropy, it is important to understand finite-size effects. Here, expressions to compute excess entropy and Kirkwood-Buff (KB) integrals by integrating the Radial Distribution Function (RDF) in a finite volume are derived, from which Sex and KB integrals in the thermodynamic limit are obtained. The scaling of these integrals with system size is studied. We show that the integrals of excess entropy converge faster than KB integrals. We compute excess entropy from Monte Carlo simulations using the Wang-Ramirez-Dobnikar-Frenkel pair interaction potential by thermodynamic integration and by integration of the RDF. We show that excess entropy computed by integrating the RDF is identical to that of excess entropy computed from thermodynamic integration at low densities, provided the RDF is extrapolated to the thermodynamic limit. At higher densities, differences up to 20% are observed.
△ Less
Submitted 28 May, 2025;
originally announced May 2025.
-
MHD activity induced coherent mode excitation in the edge plasma region of ADITYA-U Tokamak
Authors:
Kaushlender Singh,
Suman Dolui,
Bharat Hegde,
Lavkesh Lachhvani,
Sharvil Patel,
Injamul Hoque,
Ashok K. Kumawat,
Ankit Kumar,
Tanmay Macwan,
Harshita Raj,
Soumitra Banerjee,
Komal Yadav,
Abha Kanik,
Pramila Gautam,
Rohit Kumar,
Suman Aich,
Laxmikanta Pradhan,
Ankit Patel,
Kalpesh Galodiya,
Daniel Raju,
S. K. Jha,
K. A. Jadeja,
K. M. Patel,
S. N. Pandya,
M. B. Chaudhary
, et al. (6 additional authors not shown)
Abstract:
In this paper, we report the excitation of coherent density and potential fluctuations induced by magnetohydrodynamic (MHD) activity in the edge plasma region of ADITYA-U Tokamak. When the amplitude of the MHD mode, mainly the m/n = 2/1, increases beyond a threshold value of 0.3-0.4 %, coherent oscillations in the density and potential fluctuations are observed having the same frequency as that of…
▽ More
In this paper, we report the excitation of coherent density and potential fluctuations induced by magnetohydrodynamic (MHD) activity in the edge plasma region of ADITYA-U Tokamak. When the amplitude of the MHD mode, mainly the m/n = 2/1, increases beyond a threshold value of 0.3-0.4 %, coherent oscillations in the density and potential fluctuations are observed having the same frequency as that of the MHD mode. The mode numbers of these MHD induced density and potential fluctuations are obtained by Langmuir probes placed at different radial, poloidal, and toroidal locations in the edge plasma region. Detailed analyses of these Langmuir probe measurements reveal that the coherent mode in edge potential fluctuation has a mode structure of m/n = 2/1 whereas the edge density fluctuation has an m/n = 1/1 structure. It is further observed that beyond the threshold, the coupled power fraction scales almost linearly with the magnitude of magnetic fluctuations. Furthermore, the rise rates of the coupled power fraction for coherent modes in density and potential fluctuations are also found to be dependent on the growth rate of magnetic fluctuations. The disparate mode structures of the excited modes in density and plasma potential fluctuations suggest that the underlying mechanism for their existence is most likely due to the excitation of the global high-frequency branch of zonal flows occurring through the coupling of even harmonics of potential to the odd harmonics of pressure due to 1/R dependence of the toroidal magnetic field.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
On the complexity of sabotage games for network security
Authors:
Dhananjay Raju,
Georgios Bakirtzis,
Ufuk Topcu
Abstract:
Securing dynamic networks against adversarial actions is challenging because of the need to anticipate and counter strategic disruptions by adversarial entities within complex network structures. Traditional game-theoretic models, while insightful, often fail to model the unpredictability and constraints of real-world threat assessment scenarios. We refine sabotage games to reflect the realistic l…
▽ More
Securing dynamic networks against adversarial actions is challenging because of the need to anticipate and counter strategic disruptions by adversarial entities within complex network structures. Traditional game-theoretic models, while insightful, often fail to model the unpredictability and constraints of real-world threat assessment scenarios. We refine sabotage games to reflect the realistic limitations of the saboteur and the network operator. By transforming sabotage games into reachability problems, our approach allows applying existing computational solutions to model realistic restrictions on attackers and defenders within the game. Modifying sabotage games into dynamic network security problems successfully captures the nuanced interplay of strategy and uncertainty in dynamic network security. Theoretically, we extend sabotage games to model network security contexts and thoroughly explore if the additional restrictions raise their computational complexity, often the bottleneck of game theory in practical contexts. Practically, this research sets the stage for actionable insights for developing robust defense mechanisms by understanding what risks to mitigate in dynamically changing networks under threat.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Introducing High School Students to Version Control, Continuous Integration, and Quality Assurance
Authors:
Joseph Latessa,
Aadi Huria,
Deepak Raju
Abstract:
Software Engineering concepts such as version control, continuous integration, and unit testing are often not presented in college computer science curriculums until the third year of study, after completing several semesters of programming courses. Throughout the summer of 2023, two high school students volunteered in our lab at Wayne State University where I'm a graduate research assistant and P…
▽ More
Software Engineering concepts such as version control, continuous integration, and unit testing are often not presented in college computer science curriculums until the third year of study, after completing several semesters of programming courses. Throughout the summer of 2023, two high school students volunteered in our lab at Wayne State University where I'm a graduate research assistant and Ph.D. student in computer science. The students had taken AP Computer Science but had no prior experience with software engineering or software testing. This paper documents our experience devising a group project to teach the requisite software engineering skills to implement automated tests that meaningfully contribute to open-source scientific computing projects developed in connection with our lab. We describe the concepts covered, tools used, and software tests written in this early introduction to software engineering while maintaining shared emphases on education and the deployment of our work.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
A Survey on Cross-Architectural IoT Malware Threat Hunting
Authors:
Anandharaju Durai Raju,
Ibrahim Abualhaol,
Ronnie Salvador Giagone,
Yang Zhou,
Shengqiang Huang
Abstract:
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integrated into human life have become a hackers highway…
▽ More
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integrated into human life have become a hackers highway for their malicious activities. The IoT devices employ various Unix-based architectures that follow ELF (Executable and Linkable Format) as their standard binary file specification. This study aims at providing a comprehensive survey on the latest developments in cross-architectural IoT malware detection and classification approaches. Aided by a modern taxonomy, we discuss the feature representations, feature extraction techniques, and machine learning models employed in the surveyed works. We further provide more insights on the practical challenges involved in cross-architectural IoT malware threat hunting and discuss various avenues to instill potential future research.
△ Less
Submitted 9 June, 2023;
originally announced June 2023.
-
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities
Authors:
Masoud Mehrabi Koushki,
Ibrahim AbuAlhaol,
Anandharaju Durai Raju,
Yang Zhou,
Ronnie Salvador Giagone,
Huang Shengqiang
Abstract:
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible, leading to an influ…
▽ More
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible, leading to an influx of research that investigate Machine Learning (ML) approaches to automate this process. However, while some of the proposed approaches achieve high performance, rapidly evolving Android malware has made them unable to maintain their accuracy over time. This has created a need in the community to conduct further research, and build more flexible ML pipelines. Doing so, however, is currently hindered by a lack of systematic overview of the existing literature, to learn from and improve upon the existing solutions. Existing survey papers often focus only on parts of the ML process (e.g., data collection or model deployment), while omitting other important stages, such as model evaluation and explanation. In this paper, we address this problem with a review of 42 highly-cited papers, spanning a decade of research (from 2011 to 2021). We introduce a novel procedural taxonomy of the published literature, covering how they have used ML algorithms, what features they have engineered, which dimensionality reduction techniques they have employed, what datasets they have employed for training, and what their evaluation and explanation strategies are. Drawing from this taxonomy, we also identify gaps in knowledge and provide ideas for improvement and future work.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
Sensor Placement for Online Fault Diagnosis
Authors:
Dhananjay Raju,
Georgios Bakirtzis,
Ufuk Topcu
Abstract:
Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior. Due to the intrinsic relation between observations and sensors placed on a system, sensors' fault diagnosis and placement are mutually dependent. Consequently, it is imperative to solve the fault diagnosis and sensor placement problems jointly. One appr…
▽ More
Fault diagnosis is the problem of determining a set of faulty system components that explain discrepancies between observed and expected behavior. Due to the intrinsic relation between observations and sensors placed on a system, sensors' fault diagnosis and placement are mutually dependent. Consequently, it is imperative to solve the fault diagnosis and sensor placement problems jointly. One approach to modeling systems for fault diagnosis uses answer set programming (ASP). We present a model-based approach to sensor placement for active diagnosis using ASP, where the secondary objective is to reduce the number of sensors used. The proposed method finds locations for system sensors with around 500 components in a few minutes. To address larger systems, we propose a notion of modularity such that it is possible to treat each module as a separate system and solve the sensor placement problem for each module independently. Additionally, we provide a fixpoint algorithm for determining the modules of a system.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Adapting to the Behavior of Environments with Bounded Memory
Authors:
Dhananjay Raju,
RĂ¼diger Ehlers,
Ufuk Topcu
Abstract:
We study the problem of synthesizing implementations from temporal logic specifications that need to work correctly in all environments that can be represented as transducers with a limited number of states. This problem was originally defined and studied by Kupferman, Lustig, Vardi, and Yannakakis. They provide NP and 2-EXPTIME lower and upper bounds (respectively) for the complexity of this prob…
▽ More
We study the problem of synthesizing implementations from temporal logic specifications that need to work correctly in all environments that can be represented as transducers with a limited number of states. This problem was originally defined and studied by Kupferman, Lustig, Vardi, and Yannakakis. They provide NP and 2-EXPTIME lower and upper bounds (respectively) for the complexity of this problem, in the size of the transducer. We tighten the gap by providing a PSPACE lower bound, thereby showing that algorithms for solving this problem are unlikely to scale to large environment sizes. This result is somewhat unfortunate as solving this problem enables tackling some high-level control problems in which an agent has to infer the environment behavior from observations. To address this observation, we study a modified synthesis problem in which the synthesized controller must gather information about the environment's behavior safely. We show that the problem of determining whether the behavior of such an environment can be safely learned is only co-NP-complete. Furthermore, in such scenarios, the behavior of the environment can be learned using a Turing machine that requires at most polynomial space in the size of the environment's transducer.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms
Authors:
Anandharaju Durai Raju,
Ke Wang
Abstract:
Existing malware detection approaches suffer from a simplistic trade-off between false positive rate (FPR) and true positive rate (TPR) due to a single tier classification approach, where the two measures adversely affect one another. The practical implication for malware detection is that FPR must be kept at an acceptably low level while TPR remains high. To this end, we propose a two-tiered lear…
▽ More
Existing malware detection approaches suffer from a simplistic trade-off between false positive rate (FPR) and true positive rate (TPR) due to a single tier classification approach, where the two measures adversely affect one another. The practical implication for malware detection is that FPR must be kept at an acceptably low level while TPR remains high. To this end, we propose a two-tiered learning, called ``Echelon", from raw byte data with no need for hand-crafted features. The first tier locks FPR at a specified target level, whereas the second tier improves TPR while maintaining the locked FPR. The core of Echelon lies at extracting activation information of the hidden layers of first tier model for constructing a stronger second tier model. Echelon is a framework in that it allows any existing CNN based model to be adapted in both tiers. We present experimental results of evaluating Echelon by adapting the state-of-the-art malware detection model ``Malconv" in the first and second tiers.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Image-based phenotyping of diverse Rice (Oryza Sativa L.) Genotypes
Authors:
Mukesh Kumar Vishal,
Dipesh Tamboli,
Abhijeet Patil,
Rohit Saluja,
Biplab Banerjee,
Amit Sethi,
Dhandapani Raju,
Sudhir Kumar,
R N Sahoo,
Viswanathan Chinnusamy,
J Adinarayana
Abstract:
Development of either drought-resistant or drought-tolerant varieties in rice (Oryza sativa L.), especially for high yield in the context of climate change, is a crucial task across the world. The need for high yielding rice varieties is a prime concern for developing nations like India, China, and other Asian-African countries where rice is a primary staple food. The present investigation is carr…
▽ More
Development of either drought-resistant or drought-tolerant varieties in rice (Oryza sativa L.), especially for high yield in the context of climate change, is a crucial task across the world. The need for high yielding rice varieties is a prime concern for developing nations like India, China, and other Asian-African countries where rice is a primary staple food. The present investigation is carried out for discriminating drought tolerant, and susceptible genotypes. A total of 150 genotypes were grown under controlled conditions to evaluate at High Throughput Plant Phenomics facility, Nanaji Deshmukh Plant Phenomics Centre, Indian Council of Agricultural Research-Indian Agricultural Research Institute, New Delhi. A subset of 10 genotypes is taken out of 150 for the current investigation. To discriminate against the genotypes, we considered features such as the number of leaves per plant, the convex hull and convex hull area of a plant-convex hull formed by joining the tips of the leaves, the number of leaves per unit convex hull of a plant, canopy spread - vertical spread, and horizontal spread of a plant. We trained You Only Look Once (YOLO) deep learning algorithm for leaves tips detection and to estimate the number of leaves in a rice plant. With this proposed framework, we screened the genotypes based on selected traits. These genotypes were further grouped among different groupings of drought-tolerant and drought susceptible genotypes using the Ward method of clustering.
△ Less
Submitted 6 April, 2020;
originally announced April 2020.
-
Playing Against Opponents With Limited Memory
Authors:
Dhananjay Raju,
RĂ¼diger Ehlers,
Ufuk Topcu
Abstract:
We study \emph{partial-information} two-player turn-based games on graphs with omega-regular objectives, when the partial-information player has \emph{limited memory}. Such games are a natural formalization for reactive synthesis when the environment player is not genuinely adversarial to the system player. The environment player has goals of its own, but the exact goal of the environment player i…
▽ More
We study \emph{partial-information} two-player turn-based games on graphs with omega-regular objectives, when the partial-information player has \emph{limited memory}. Such games are a natural formalization for reactive synthesis when the environment player is not genuinely adversarial to the system player. The environment player has goals of its own, but the exact goal of the environment player is unknown to the system player. We prove that the problem of determining the existence of a winning strategy for the system player is PSPACE-hard for reachability, safety, and parity objectives. Moreover, when the environment player is memoryless, the problem is PSPACE-complete. However, it is simpler to decide if the environment player has a winning strategy; it is only NP-complete. Additionally, we construct a game where the the partial-information player needs at least $\mathcal{O}(\sqrt{n})$ bits of memory to retain winning strategies in a game of size $\mathcal{O}(n)$.
△ Less
Submitted 17 February, 2020;
originally announced February 2020.
-
Kaluza-Klein FRW type dark energy model with a massive scalar field
Authors:
D. R. K. Reddy,
K. Deniel Raju
Abstract:
In this investigation we discuss the dynamical aspects of Kaluza-Klein FRW type cosmological model in the presence of dark energy fluid and an attractive massive scalar field. The field equations are solved using a power law between the average scale factor and the scalar field to reduce the mathematical complexity. We have presented the corresponding dark energy model. Important cosmological para…
▽ More
In this investigation we discuss the dynamical aspects of Kaluza-Klein FRW type cosmological model in the presence of dark energy fluid and an attractive massive scalar field. The field equations are solved using a power law between the average scale factor and the scalar field to reduce the mathematical complexity. We have presented the corresponding dark energy model. Important cosmological parameters like equation of state (EoS) parameter, the deceleration parameter, the density parameter and the jerk parameter are evaluated. The physical behavior of the parameters is also discussed.
△ Less
Submitted 31 October, 2019;
originally announced November 2019.
-
Online Synthesis for Runtime Enforcement of Safety in Multi-Agent Systems
Authors:
Dhananjay Raju,
Suda Bharadwaj,
Ufuk Topcu
Abstract:
A shield is attached to a system to guarantee safety by correcting the system's behavior at runtime. Existing methods that employ design-time synthesis of shields do not scale to multi-agent systems. Moreover, such shields are typically implemented in a centralized manner, requiring global information on the state of all agents in the system. We address these limitations through a new approach whe…
▽ More
A shield is attached to a system to guarantee safety by correcting the system's behavior at runtime. Existing methods that employ design-time synthesis of shields do not scale to multi-agent systems. Moreover, such shields are typically implemented in a centralized manner, requiring global information on the state of all agents in the system. We address these limitations through a new approach where the shields are synthesized at runtime and do not require global information. There is a shield onboard every agent, which can only modify the behavior of the corresponding agent. In this approach, which is fundamentally decentralized, the shield on every agent has two components: a pathfinder that corrects the behavior of the agent and an ordering mechanism that dynamically modifies the priority of the agent. The current priority determines if the shield uses the pathfinder to modify behavior of the agent. We derive an upper bound on the maximum deviation for any agent from its original behavior. We prove that the worst-case synthesis time is quadratic in the number of agents at runtime as opposed to exponential at design-time for existing methods. We test the performance of the decentralized, runtime shield synthesis approach on a collision-avoidance problem. For 50 agents in a 50x50 grid, the synthesis at runtime requires a few seconds per agent whenever a potential collision is detected. In contrast, the centralized design-time synthesis of shields for a similar setting is intractable beyond 4 agents in a 5x5 grid.
△ Less
Submitted 27 February, 2020; v1 submitted 23 October, 2019;
originally announced October 2019.
-
Modeling of eddy current distribution in the SST-1 tokamak
Authors:
Amit K. Singh,
Santanu Banerjee,
I. Bandyopadhyay,
Deepti Sharma,
S. K. Jha,
R. Srinivasan,
D. Raju,
M. V. Gopalakrishna,
the SST-1 team
Abstract:
The time varying currents in the Ohmic transformer in the SST-1 tokamak induce voltages that drive large eddy currents in the passive structures like the vacuum vessel and cryostat. Since the vacuum vessel and the cryostat are toroidally continuous without electrical breaks in SST- 1, this leads to a shielding effect on the flux penetrating the vacuum vessel. This reduces the magnitude of the loop…
▽ More
The time varying currents in the Ohmic transformer in the SST-1 tokamak induce voltages that drive large eddy currents in the passive structures like the vacuum vessel and cryostat. Since the vacuum vessel and the cryostat are toroidally continuous without electrical breaks in SST- 1, this leads to a shielding effect on the flux penetrating the vacuum vessel. This reduces the magnitude of the loop voltage seen by the plasma as also delays its buildup. Also the induced currents alter the null location of magnetic field. This will have serious implications on the plasma breakdown and startup and corrective measures may be required in case of an insufficient loop voltage or an improper null. Further, the eddy currents distribution will be vital for the plasma equilibrium and need to be considered while reconstructing the equilibrium. Evolution of the toroidal eddy currents in SST-1 passive structures has been studied using a toroidal-filament model. The model calculations are compared with the measured signals in the magnetic diagnostics like the toroidal flux loops and magnetic pick-up coils installed on the SST-1.
△ Less
Submitted 11 December, 2017;
originally announced December 2017.
-
Program Completionin the Input Language of GRINGO
Authors:
Amelia Harrison,
Vladimir Lifschitz,
Dhananjay Raju
Abstract:
We argue that turning a logic program into a set of completed definitions can be sometimes thought of as the "reverse engineering" process of generating a set of conditions that could serve as a specification for it. Accordingly, it may be useful to define completion for a large class of ASP programs and to automate the process of generating and simplifying completion formulas. Examining the outpu…
▽ More
We argue that turning a logic program into a set of completed definitions can be sometimes thought of as the "reverse engineering" process of generating a set of conditions that could serve as a specification for it. Accordingly, it may be useful to define completion for a large class of ASP programs and to automate the process of generating and simplifying completion formulas. Examining the output produced by this kind of software may help programmers to see more clearly what their program does, and to what degree its behavior conforms with their expectations. As a step toward this goal, we propose here a definition of program completion for a large class of programs in the input language of the ASP grounder GRINGO, and study its properties. This note is under consideration for publication in Theory and Practice of Logic Programming.
△ Less
Submitted 2 November, 2017; v1 submitted 18 July, 2017;
originally announced July 2017.
-
Comparing N-Node Set Importance Representative results with Node Importance Representative results for Categorical Clustering: An exploratory study
Authors:
H. Venkateswara Reddy,
Dr. S. Viswanadha Raju,
B. Ramasubba Reddy
Abstract:
The proportionate increase in the size of the data with increase in space implies that clustering a very large data set becomes difficult and is a time consuming process.Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling allocating unlabeled objects into proper clusters is impossible in the categorical domain.To address…
▽ More
The proportionate increase in the size of the data with increase in space implies that clustering a very large data set becomes difficult and is a time consuming process.Sampling is one important technique to scale down the size of dataset and to improve the efficiency of clustering. After sampling allocating unlabeled objects into proper clusters is impossible in the categorical domain.To address the problem, Chen employed a method called MAximal Representative Data Labeling to allocate each unlabeled data point to the appropriate cluster based on Node Importance Representative and N-Node Importance Representative algorithms. This paper took off from Chen s investigation and analyzed and compared the results of NIR and NNIR leading to the conclusion that the two processes contradict each other when it comes to finding the resemblance between an unlabeled data point and a cluster.A new and better way of solving the problem was arrived at that finds resemblance between unlabeled data point within all clusters, while also providing maximal resemblance for allocation of data in the required cluster.
△ Less
Submitted 23 August, 2012;
originally announced August 2012.
-
Exploring Core-to-edge Transport in Aditya Tokamak by Oscillations Observed in the edge Radiation
Authors:
M. B. Chowdhuri,
D. Raju,
R. Manchanda,
Vinay Kumar,
Shankar Joisa,
P. K. Atrey,
C. V. S. Rao,
R. Jha,
R. Singh,
P. Vasu,
the Aditya Collaboration
Abstract:
Understanding of the transport in a Tokamak plasma is an important issue. Various mechanisms have been reported in the literature to relate the core phenomenon to edge phenomenon. Sawtooth and Mirnov oscillations caused by MHD instabilities are generally observed in Tokamak discharges. Observation of these effects in the visible radiation from outer edge may offer a possible means to understand…
▽ More
Understanding of the transport in a Tokamak plasma is an important issue. Various mechanisms have been reported in the literature to relate the core phenomenon to edge phenomenon. Sawtooth and Mirnov oscillations caused by MHD instabilities are generally observed in Tokamak discharges. Observation of these effects in the visible radiation from outer edge may offer a possible means to understand the transport.Oscillations in the visible radiation from outer region of the plasma have been observed during recent Aditya discharges. Percentage modulation of these oscillations vary with the Lines of Sight (LOS) of the chords and surfaces on which they terminate. This has been found in both the low frequency (~1 kHz) oscillations that seem to correlate with sawteething in SXR signals and the higher frequency (~10 kHz) oscillations that correlate well with Mirnov signals indicative of m/n=2/1 mode rotation. This suggests that the extent to which the MHD instabilities in the central region of the plasma column are reflected in the edge radiation depends on the interaction of the plasma with the surface at the extremity of the LOS. The release of particle/ energy accompanying the MHD instabilities leads to a large influx of particles from such surfaces. Cross-bispectral analysis suggests that a mode (having frequency of ~20 kHz) is also generated due to the interaction of m/n=1/1 (~10 kHz, seen in SXR) and m/n=2/1 (~10 kHz, seen in Mirnov, Visible & Microwave Interferometer signals). By possible selection rules, this mode seems to be a m/n=3/2 mode. This mode is seen in Mirnov, Visible & Interferometer signals. Behaviour of these oscillations on various LOS and their relation to SXR&Mirnov signals can lead to an understanding of the transport phenomenon. These observations and our interpretations will be presented.
△ Less
Submitted 15 November, 2004;
originally announced November 2004.