-
An Efficient QAM Detector via Nonlinear Post-distortion based on FDE Bank under PA Impairments
Authors:
Murat Babek Salman,
Gokhan Muzaffer Guvensen
Abstract:
In this paper, we propose a novel receiver structure for single-carrier transmission with frequency domain equalization (FDE) that is exposed to power amplifier (PA) nonlinearities. A two-stage approach is adopted, in which linear communication channel is equalized at the first stage, and it is followed by a post-distortion where nonlinear distortion is reduced. In literature, nonlinear processing…
▽ More
In this paper, we propose a novel receiver structure for single-carrier transmission with frequency domain equalization (FDE) that is exposed to power amplifier (PA) nonlinearities. A two-stage approach is adopted, in which linear communication channel is equalized at the first stage, and it is followed by a post-distortion where nonlinear distortion is reduced. In literature, nonlinear processing techniques are proposed, which performs memoryless compensation of nonlinear distortion together with FDE. However, in this study, we show that even if a memoryless nonlinearity exists, the received signal is impaired by nonlinear inter-symbol-interference. Therefore, we propose a class of symbol rate post-distortion techniques, which use neighboring received symbols to suppress the nonlinear interference. Two different post-distortion techniques, Gaussian process regression (GPR) and neural network (NN) based post-distorters, are considered. Also, a decision metric, combining outputs of fractional delayed bank of FDE's after post-distortion, is proposed to overcome performance degradation of FDE for frequency selective channels under nonlinear distortion. Performances of the proposed techniques are compared with that of the state-of-the-art techniques in terms of bit error rate and achievable information rate metrics via simulations. Simulation results demonstrate that GPR and NN based post-distortion methods together with bank of FDE outperform state-of-the-art techniques.
△ Less
Submitted 9 February, 2021; v1 submitted 29 October, 2020;
originally announced October 2020.
-
A Diffusion Problem with Neumann Boundary Control Utilizing Total Mass
Authors:
M. Salman
Abstract:
The author studies the diffusion problem $u_t=u_{xx},\ 0<x<1,\ t>0; \ u(x,0)=0,$ and $-u_x(0,t)=u_x(1,t)=φ(t),$ where $φ(t)$ is a control function that ensures that the total mass $\int_0^1 u(x,t_k)dx$ stays between two predetermined values. Mathematically, $φ(t)=1$ for $t_{2k} < t<t_{2k+1}$ and $φ(t)=-1$ for $t_{2k+1} <t<t_{2k+2},\ k=0,1,2,\ldots$ with $t_0=0$ and the sequence $t_{k}$ is determin…
▽ More
The author studies the diffusion problem $u_t=u_{xx},\ 0<x<1,\ t>0; \ u(x,0)=0,$ and $-u_x(0,t)=u_x(1,t)=φ(t),$ where $φ(t)$ is a control function that ensures that the total mass $\int_0^1 u(x,t_k)dx$ stays between two predetermined values. Mathematically, $φ(t)=1$ for $t_{2k} < t<t_{2k+1}$ and $φ(t)=-1$ for $t_{2k+1} <t<t_{2k+2},\ k=0,1,2,\ldots$ with $t_0=0$ and the sequence $t_{k}$ is determined by the equations $\int_0^1 u(x,t_k)dx = M,$ for $k=1,3,5,\dots,$ and $\int_0^1 u(x,t_k)dx = m,$ for $k=2,4,6,\dots$ and where $0<m<M<u_0$. Note that the switching times $t_k$ are unknowns. Determination of switching times $t_k$ and their differences $t_{k+1}-t_k$ are obtained. Numerical verifying examples are presented.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
Inconsistencies Between Local and Global Measures of CME Radial Expansion as Revealed by Spacecraft Conjunctions
Authors:
N. Lugaz,
T. M. Salman,
R. M. Winslow,
N. Al-Haddad,
C. J. Farrugia,
B. Zhuang,
A. B. Galvin
Abstract:
The radial expansion of coronal mass ejections (CMEs) is known to occur from remote observations; from the variation of their properties with radial distance; and from local in situ plasma measurements showing a decreasing speed profile throughout the magnetic ejecta (ME). However, little is known on how local measurements compare to global measurements of expansion. Here, we present results from…
▽ More
The radial expansion of coronal mass ejections (CMEs) is known to occur from remote observations; from the variation of their properties with radial distance; and from local in situ plasma measurements showing a decreasing speed profile throughout the magnetic ejecta (ME). However, little is known on how local measurements compare to global measurements of expansion. Here, we present results from the analysis of 42 CMEs measured in the inner heliosphere by two spacecraft in radial conjunction. The magnetic field decrease with distance provides a measure of their global expansion. Near 1 au, the decrease in their bulk speed provides a measure of their local expansion. We find that these two measures have little relation with each other. We also investigate the relation between characteristics of CME expansion and CME properties. We find that the expansion depends on the initial magnetic field strength inside the ME, but not significantly on the magnetic field inside the ME measured near 1 au. This is an indirect evidence that CME expansion in the innermost heliosphere is driven by the high magnetic pressure inside the ME, while by the time the MEs reach 1 au, they are expanding due to the decrease in the solar wind dynamic pressure with distance. We also determine the evolution of the ME tangential and normal magnetic field components with distance, revealing significant deviations as compared to the expectations from force-free field configurations as well as some evidence that the front half of MEs expand at a faster rate than the back half.
△ Less
Submitted 3 July, 2020;
originally announced July 2020.
-
A Comprehensive Performance Analysis for mm-Wave Massive MIMO Hybrid Beamforming under PA Nonlinearities
Authors:
Murat Babek Salman,
Gokhan Muzaffer Guvensen
Abstract:
In this paper, we develop a framework to investigate the performances of different hybrid beamforming architectures for massive multiple input multiple output (MIMO) systems impaired by power amplifier (PA) nonlinearities. Indirect learning architecture based on feedback after anti-beamforming is adopted in design of digital pre-distortion (DPD) in order to compensate the nonlinear distortion caus…
▽ More
In this paper, we develop a framework to investigate the performances of different hybrid beamforming architectures for massive multiple input multiple output (MIMO) systems impaired by power amplifier (PA) nonlinearities. Indirect learning architecture based on feedback after anti-beamforming is adopted in design of digital pre-distortion (DPD) in order to compensate the nonlinear distortion caused by PA. In addition, we propose a novel analog beamformer design for partially connected architecture based on generalized eigen-beamformer (GEB) approach. In literature, the effects of nonlinear PA's on the out-of-band (OOB) radiation and achieved signal-to-interfence-plus-noise ratio (SINR) are investigated. However, these studies are limitted to fully digital or partially connected hybrid beamforming architectures while deploying Bussgang decompostion on a PA basis without considering the array architecture type in performance analysis. In this study, we derived an analytical bit-error-rate (BER) expression based on spatio-temporal Bussgang decompostion in matrix form, and mismatched decoding capacity via Generalized Mutual Information (GMI) is obtained under PA nonlinearity for different hybrid Massive MIMO architectures. Analytical results show that the nonlinear distortion significantly affects the system performance, and DPD can reduce these effects to some extend. Finally, obtained analytical BER expression is verified via numerical results.
△ Less
Submitted 26 February, 2021; v1 submitted 29 June, 2020;
originally announced June 2020.
-
The utilization of total mass to determine the switching points in the symmetric boundary control of a diffusion problem
Authors:
Mohamed Salman
Abstract:
The authors study the problem $u_t=u_{xx},\ 0<x<1,\ t>0; \ u(x,0)=0,$ and $u(0,t)=u(1,t)=ψ(t),$ where $ψ(t)=u_0$ for $t_{2k} < t<t_{2k+1}$ and $ψ(t)=0$ for $t_{2k+1} <t<t_{2k+2},\ k=0,1,2,\ldots$ with $t_0=0$ and the sequence $t_{k}$ is determined by the equations $\int_0^1 u(x,t_k)dx = M,$ for $k=1,3,5,\dots,$ and $\int_0^1 u(x,t_k)dx = m,$ for $k=2,4,6,\dots$ and where $0<m<M<u_0$. Note that the…
▽ More
The authors study the problem $u_t=u_{xx},\ 0<x<1,\ t>0; \ u(x,0)=0,$ and $u(0,t)=u(1,t)=ψ(t),$ where $ψ(t)=u_0$ for $t_{2k} < t<t_{2k+1}$ and $ψ(t)=0$ for $t_{2k+1} <t<t_{2k+2},\ k=0,1,2,\ldots$ with $t_0=0$ and the sequence $t_{k}$ is determined by the equations $\int_0^1 u(x,t_k)dx = M,$ for $k=1,3,5,\dots,$ and $\int_0^1 u(x,t_k)dx = m,$ for $k=2,4,6,\dots$ and where $0<m<M<u_0$. Note that the switching points $t_k,\quad k=1,2,3,\ldots$ are unknown. Existence and uniqueness are demonstrated. Theoretical estimates of the $t_k$ and $t_{k+1}-t_k$ are obtained and numerical verifications of the estimates are presented.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
A New Software Framework for Traffic Engineering: Path Cardinality and the Effect of Multipath on Residual Capacity
Authors:
Mohammed Salman,
Bin Wang
Abstract:
In this paper, we present a new traffic engineering (TE) software framework to analyze, configure, and optimize (with the aid of a linear programming solver) a network for service provisioning. The developed software tool is based on our new data-driven traffic engineering approach that analyzes a large volume of network configuration data generated given the user input. By analyzing the data, one…
▽ More
In this paper, we present a new traffic engineering (TE) software framework to analyze, configure, and optimize (with the aid of a linear programming solver) a network for service provisioning. The developed software tool is based on our new data-driven traffic engineering approach that analyzes a large volume of network configuration data generated given the user input. By analyzing the data, one can then make efficient decisions later when designing a traffic engineering solution. We focus on three well-known traffic engineering objective functions: minimum cost routing (MCR), load balancing (LB), and average delay (AD). With this new tool, one can answer numerous traffic engineering questions. For example, what are the differences among the three objective functions? What is the impact of an objective function on link utilization? How many candidate paths are enough to achieve optimality or near-optimality with respect to a specific objective. This new software tool allows us to conveniently perform various experiments and visualize the results for performance analysis. As case studies, this paper presents examples that answer the questions for two traffic engineering problems: (1) how many paths are required to obtain a solution that is within a few percent from the optimal solution and whether that number is fixed for any network size? (2) how the choice of single-path/multi-path routing affects the load in the network? For the first problem, it turns out that the number of paths needed to achieve optimality increases as the number of links in the network increases.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Radial Evolution of Coronal Mass Ejections Between MESSENGER, Venus Express, STEREO, and L1: Catalog and Analysis
Authors:
T. M. Salman,
R. M. Winslow,
N. Lugaz
Abstract:
Our knowledge of the properties of Coronal Mass Ejections (CMEs) in the inner heliosphere is constrained by the relative lack of plasma observations between Sun and 1 AU. In this work, we present a comprehensive catalog of 47 CMEs measured in situ measurements by two or more radially aligned spacecraft (MESSENGER, Venus Express, STEREO or Wind/ACE). We estimate the CME impact speeds at Mercury and…
▽ More
Our knowledge of the properties of Coronal Mass Ejections (CMEs) in the inner heliosphere is constrained by the relative lack of plasma observations between Sun and 1 AU. In this work, we present a comprehensive catalog of 47 CMEs measured in situ measurements by two or more radially aligned spacecraft (MESSENGER, Venus Express, STEREO or Wind/ACE). We estimate the CME impact speeds at Mercury and Venus using a drag-based model and present an average propagation profile of CMEs (speed and deceleration/acceleration) in the inner heliosphere. We find that CME deceleration continues past Mercury's orbit but most of the deceleration occurs between the Sun and Mercury. We examine the exponential decrease of the maximum magnetic field strength in the CME with heliocentric distance using two approaches: a modified statistical method and analysis from individual conjunction events. Findings from both the approaches are on average consistent with previous studies but show significant event-to-event variability. We also find the expansion of the CME sheath to be well fit by a linear function. However, we observe the average sheath duration and its increase to be fairly independent of the initial CME speed, contradicting commonly held knowledge that slower CMEs drive larger sheaths. We also present an analysis of the 3 November 2011 CME observed in longitudinal conjunction between MESSENGER, Venus Express, and STEREO-B focusing on the expansion of the CME and its correlation with the exponential fall-off of the maximum magnetic field strength in the ejecta.
△ Less
Submitted 25 December, 2019;
originally announced December 2019.
-
ViTa-SLAM: A Bio-inspired Visuo-Tactile SLAM for Navigation while Interacting with Aliased Environments
Authors:
Oliver Struckmeier,
Kshitij Tiwari,
Mohammed Salman,
Martin J. Pearson,
Ville Kyrki
Abstract:
RatSLAM is a rat hippocampus-inspired visual Simultaneous Localization and Mapping (SLAM) framework capable of generating semi-metric topological representations of indoor and outdoor environments. Whisker-RatSLAM is a 6D extension of the RatSLAM and primarily focuses on object recognition by generating point clouds of objects based on whisking information. This paper introduces a novel extension…
▽ More
RatSLAM is a rat hippocampus-inspired visual Simultaneous Localization and Mapping (SLAM) framework capable of generating semi-metric topological representations of indoor and outdoor environments. Whisker-RatSLAM is a 6D extension of the RatSLAM and primarily focuses on object recognition by generating point clouds of objects based on whisking information. This paper introduces a novel extension to both former works that is referred to as ViTa-SLAM that harnesses both vision and tactile information for performing SLAM. This not only allows the robot to perform natural interaction with the environment whilst navigating, as is normally seen in nature, but also provides a mechanism to fuse non-unique tactile and unique visual data. Compared to the former works, our approach can handle ambiguous scenes in which one sensor alone is not capable of identifying false-positive loop-closures.
△ Less
Submitted 15 August, 2019; v1 submitted 14 June, 2019;
originally announced June 2019.
-
Electro-Oxidation of p-Silicon in Fluoride-Containing Electrolyte: A Physical Model for the Regime of Negative Differential Resistance
Authors:
Munir Salman,
Maximilian Patzauer,
Dominique Koster,
Fabio La Mantia,
Katharina Krischer
Abstract:
When Si is anodically oxidized in a fluoride containing electrolyte, an oxide layer is grown. Simultaneously, the layer is etched by the fluoride containing electrolyte. The resulting stationary state exhibits a negative slope of the current-voltage characteristics in a certain range of applied voltage. We propose a physical model that reproduces this negative slope. In particular, our model assum…
▽ More
When Si is anodically oxidized in a fluoride containing electrolyte, an oxide layer is grown. Simultaneously, the layer is etched by the fluoride containing electrolyte. The resulting stationary state exhibits a negative slope of the current-voltage characteristics in a certain range of applied voltage. We propose a physical model that reproduces this negative slope. In particular, our model assumes that the oxide layer consists of both partially and fully oxidized Si and that the etch rate depends on the effective degree of oxidation. Finally, we show that our simulations are in good agreement with measurements of the current-voltage characteristics, the oxide layer thickness, the dissolution valence, and the impedance spectra of the electrochemical system.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Quantitative analysis of the interaction between a dc SQUID and an integrated micromechanical doubly clamped cantilever
Authors:
Majdi Salman,
Georgina M Klemencic,
Soumen Mandal,
Scott Manifold,
Luqman Mustafa,
Oliver A Williams,
Sean R Giblin
Abstract:
Based on the superconducting quantum interference device (SQUID) equations described by the resistively- and capacitively-shunted junction model coupled to the equation of motion of a damped harmonic oscillator, we provide simulations to quantitatively describe the interaction between a dc SQUID and an integrated doubly clamped cantilever. We have chosen to investigate an existing experimental con…
▽ More
Based on the superconducting quantum interference device (SQUID) equations described by the resistively- and capacitively-shunted junction model coupled to the equation of motion of a damped harmonic oscillator, we provide simulations to quantitatively describe the interaction between a dc SQUID and an integrated doubly clamped cantilever. We have chosen to investigate an existing experimental configuration and have explored the motion of the cantilever and the reaction of the SQUID as a function of the voltage-flux $V(Φ)$ characteristics. We clearly observe the Lorentz force back-action interaction and demonstrate how a sharp transition state drives the system into a nonlinear-like regime, and modulates the cantilever displacement amplitude, simply by tuning the SQUID parameters.
△ Less
Submitted 8 February, 2019;
originally announced February 2019.
-
The K-User DM Broadcast Channel with Two Groupcast Messages: Achievable Rate Regions and the Combination Network as a Case Study
Authors:
Mohamed Salman,
Mahesh K. Varanasi
Abstract:
A novel class of achievable rate regions is obtained for the K-receiver broadcast channel with two groupcast messages. The associated achievability schemes are parameterized by an expansion of the message set which then determines how random coding techniques are employed, which include generalized versions of {\em up-set} message-splitting, the generation of possibly multiple auxiliary codebooks…
▽ More
A novel class of achievable rate regions is obtained for the K-receiver broadcast channel with two groupcast messages. The associated achievability schemes are parameterized by an expansion of the message set which then determines how random coding techniques are employed, which include generalized versions of {\em up-set} message-splitting, the generation of possibly multiple auxiliary codebooks for certain compositions of split messages using superposition coding, partial interference decoding at all receivers, and joint unique and non-unique decoding.
New capacity results are established for certain partially ordered classes of general broadcast channels for certain two non-nested messages. Moreover, when specialized to the combination network (CN), some of the inner bounds are shown, via converse results, to result in the capacity region for (a) the two messages intended for two sets of K-1 receivers each and (b) two nested messages in which one message is intended for one or (c) two (common) receivers. In the latter two cases, we hence recover previous results by Bidokhti et al obtained therein using network coding schemes based on rate-splitting and linear superposition coding. Furthermore, we show the achievability of rate pairs in two examples of CNs, with three and four common receivers each, used in the previous literature to show the sub-optimality of rate-splitting and linear superposition coding, and to motivate a pre-encoding technique and a block-Markov linear superposition coding for the CN, with the latter then lifted to the general broadcast channel. Our results suggest that the proposed framework here, when specialized to the CN, is strong enough to incorporate the enhancements afforded by those two latter techniques, thereby suggesting among other things, that perhaps block-Markov superposition coding is not necessary for the general broadcast channel.
△ Less
Submitted 27 January, 2020; v1 submitted 26 December, 2018;
originally announced December 2018.
-
Capacity Results for the K-User Broadcast Channel with Two Nested Multicast Messages
Authors:
Mohamed Salman,
Mahesh K. Varanasi
Abstract:
The K-user discrete memoryless (DM) broadcast channel (BC) with two nested multicast messages is studied in which one common message is to be multicast to all receivers and the second private message to a subset of receivers. The receivers that must decode both messages are referred to as private receivers and the others that must decode only the common message as common receivers. For two nested…
▽ More
The K-user discrete memoryless (DM) broadcast channel (BC) with two nested multicast messages is studied in which one common message is to be multicast to all receivers and the second private message to a subset of receivers. The receivers that must decode both messages are referred to as private receivers and the others that must decode only the common message as common receivers. For two nested multicast messages, we establish the capacity region for several classes of DM BCs characterized by the respective associated sets of pair-wise relationships between and among the common and private receivers, each described by the well-known more capable or less noisy conditions.
For three classes of DM BCs, the capacity region is simply achieved by superposition coding and the proofs of the converses rely on a recently found information inequality. The achievable rate region is then enhanced through the addition of a splitting of the private message into as many parts as there are common receivers and indirect decoding. A closed-form two-dimensional polyhedral description is obtained for it for a given coding distribution. Through a converse result that relies on the well-known Csiszar sum lemma and the information inequality, a specialization of this region that involves splitting the private message into just two sub-messages is proved to be the capacity region for several classes of DM BCs, beyond those for which superposition coding alone is capacity optimal, thereby underscoring the benefit of rate-splitting.
All previously known capacity results for DM BCs with two nested multicast messages for the two and three-receiver DM BCs as well as DM BCs with one private or one common receiver are included in the general framework presented in this work.
△ Less
Submitted 26 December, 2018;
originally announced December 2018.
-
Forecasting Periods of Strong Southward Magnetic Field Following Interplanetary Shocks
Authors:
T. M. Salman,
N. Lugaz,
C. J. Farrugia,
R. M. Winslow,
A. B. Galvin,
N. A. Schwadron
Abstract:
Long periods of strong southward magnetic fields are known to be the primary cause of intense geomagnetic storms. The majority of such events are caused by the passage over Earth of a magnetic ejecta. Irrespective of the interplanetary cause, fast-forward shocks often precede such strong southward B$_{z}$ periods. Here, we first look at all long periods of strong southward magnetic fields as well…
▽ More
Long periods of strong southward magnetic fields are known to be the primary cause of intense geomagnetic storms. The majority of such events are caused by the passage over Earth of a magnetic ejecta. Irrespective of the interplanetary cause, fast-forward shocks often precede such strong southward B$_{z}$ periods. Here, we first look at all long periods of strong southward magnetic fields as well as fast-forward shocks measured by the \textit{Wind} spacecraft in a 22.4-year span. We find that 76{\%} of strong southward B$_{z}$ periods are preceded within 48 hours by at least a fast-forward shock but only about 23{\%} of all shocks are followed within 48 hours by strong southward B$_{z}$ periods. Then, we devise a threshold-based probabilistic forecasting method based on the shock properties and the pre-shock near-Earth solar wind plasma and interplanetary magnetic field characteristics adopting a `superposed epoch analysis'-like approach. Our analysis shows that the solar wind conditions in the 30 minutes interval around the arrival of fast-forward shocks have a significant contribution to the prediction of long-duration southward B$_{z}$ periods. This probabilistic model may provide on average a 14-hour warning time for an intense and long-duration southward B$_{z}$ period. Evaluating the forecast capability of the model through a statistical and skill score-based approach reveals that it outperforms a coin-flipping forecast. By using the information provided by the arrival of a fast-forward shock at L1, this model represents a marked improvement over similar forecasting methods. We outline a number of future potential improvements.
△ Less
Submitted 13 December, 2018;
originally announced December 2018.
-
Dynamics of weakly mixing non-autonomous systems
Authors:
Mohammad Salman,
Ruchi Das
Abstract:
For a commutative non-autonomous dynamical system we show that topological transitivity of the non-autonomous system induced on probability measures (hyperspaces) is equivalent to the weak mixing of the induced systems. Several counter examples are given for the results which are true in autonomous but need not be true in non-autonomous systems. Wherever possible sufficient conditions are obtained…
▽ More
For a commutative non-autonomous dynamical system we show that topological transitivity of the non-autonomous system induced on probability measures (hyperspaces) is equivalent to the weak mixing of the induced systems. Several counter examples are given for the results which are true in autonomous but need not be true in non-autonomous systems. Wherever possible sufficient conditions are obtained for the results to hold true. For a commutative periodic non-autonomous system on intervals, it is proved that weakly mixing implies Devaney chaos. Given a periodic non-autonomous system, it is shown that sensitivity is equivalent to some stronger forms of sensitivity on a closed unit interval.
△ Less
Submitted 4 October, 2018;
originally announced October 2018.
-
Specification properties for non-autonomous discrete systems
Authors:
Mohammad Salman,
Ruchi Das
Abstract:
In this paper notions of strong specification property and quasi-weak specification property for non-autonomous discrete systems are introduced and studied. It is shown that these properties are dynamical properties and are preserved under finite product. It is proved that a k-periodic non-autonomous system on intervals having weak specification is Devaney chaotic whereas if the system has strong…
▽ More
In this paper notions of strong specification property and quasi-weak specification property for non-autonomous discrete systems are introduced and studied. It is shown that these properties are dynamical properties and are preserved under finite product. It is proved that a k-periodic non-autonomous system on intervals having weak specification is Devaney chaotic whereas if the system has strong specification then the result is true in general. Specification properties of induced systems on hyperspaces and probability measures spaces are also studied. Examples/counter examples are provided wherever necessary to support results obtained.
△ Less
Submitted 31 October, 2018; v1 submitted 23 August, 2018;
originally announced August 2018.
-
The General Solution for the Relativistic and Nonrelativistic Schrödinger Equation for the $δ^{(n)}$-Function Potential in 1-dimension Using Cutoff Regularization, and the Fate of Universality
Authors:
M. H. Al-Hashimi,
M. Salman,
A. M. Shalaby
Abstract:
A general method has been developed to solve the Schrödinger equation for an arbitrary derivative of the $δ$-function potential in 1-d using cutoff regularization. The work treats both the relativistic and nonrelativistic cases. A distinction in the treatment has been made between the case when the derivative $n$ is an even number from the one when $n$ is an odd number. A general gap equations for…
▽ More
A general method has been developed to solve the Schrödinger equation for an arbitrary derivative of the $δ$-function potential in 1-d using cutoff regularization. The work treats both the relativistic and nonrelativistic cases. A distinction in the treatment has been made between the case when the derivative $n$ is an even number from the one when $n$ is an odd number. A general gap equations for each case has been derived. The case of $δ^{(2)}$-function potential has been used as an example. The results from the relativistic case show that the $δ^{(2)}$-function system behaves exactly like the $δ$-function and the $δ'$-function potentials, which means it also shares the same features with quantum field theories, like being asymptotically free, in the massless limit, it undergoes dimensional transmutation and it possesses an infrared conformal fixed point. As a result the evidence of universality of contact interactions has been extended further to include the $δ^{(2)}$-function potential.
△ Less
Submitted 7 February, 2019; v1 submitted 28 July, 2016;
originally announced July 2016.
-
On fixing sets of composition and corona product of graphs
Authors:
I. Javaid,
M. S. Aasi,
I. Irshad,
M. Salman
Abstract:
A fixing set $\mathcal{F}$ of a graph $G$ is a set of those vertices of the graph $G$ which when assigned distinct labels removes all the automorphisms from the graph except the trivial one. The fixing number of a graph $G$, denoted by $fix(G)$, is the smallest cardinality of a fixing set of $G$. In this paper, we study the fixing number of composition product, $G_1[G_2]$ and corona product,…
▽ More
A fixing set $\mathcal{F}$ of a graph $G$ is a set of those vertices of the graph $G$ which when assigned distinct labels removes all the automorphisms from the graph except the trivial one. The fixing number of a graph $G$, denoted by $fix(G)$, is the smallest cardinality of a fixing set of $G$. In this paper, we study the fixing number of composition product, $G_1[G_2]$ and corona product, $G_1 \odot G_2$ of two graphs $G_1$ and $G_2$ with orders $m$ and $n$ respectively. We show that for a connected graph $G_1$ and an arbitrary graph $G_2$ having $l\geq 1$ components $G_2^1$, $G_2^2$, ... $G_2^l,$ $mn-1\geq fix(G_1[G_2])\geq m\left(\sum \limits_{i=1}^{l} fix(G_2^i )\right)$. For a connected graph $G_1$ and an arbitrary graph $G_2$, which are not asymmetric, we prove that $fix(G_1\odot G_2)=m fix( G_2)$. Further, for an arbitrary connected graph $G_{1}$ and an arbitrary graph $G_{2}$ we show that $fix(G_1\odot G_2)= max\{fix(G_1), m fix(G_2)\}$.
△ Less
Submitted 8 July, 2015;
originally announced July 2015.
-
Sensing/Decision-Based Cooperative Relaying Schemes With Multi-Access Transmission: Stability Region And Average Delay Characterization
Authors:
Mohamed Salman,
Amr El-Keyi,
Mohammed Nafie,
Mazen Omar Hasna
Abstract:
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay sense…
▽ More
We consider a cooperative relaying system which consists of a number of source terminals, one shared relay, and a common destination with multi-packet reception (MPR) capability. In this paper, we study the stability and delay analysis for two cooperative relaying schemes; the sensing-based cooperative (SBC) scheme and the decision-based cooperative (DBC) scheme. In the SBC scheme, the relay senses the channel at the beginning of each time slot. In the idle time slots, the relay transmits the packet at the head of its queue, while in the busy one, the relay decides either to transmit simultaneously with the source terminal or to listen to the source transmission. The SBC scheme is a novel paradigm that utilizes the spectrum more efficiently than the other cooperative schemes because the relay not only exploits the idle time slots, but also has the capability to mildly interfere with the source terminal. On the other hand, in the DBC scheme, the relay does not sense the channel and it decides either to transmit or to listen according to certain probabilities. Numerical results reveal that the two proposed schemes outperform existing cooperative schemes that restrict the relay to send only in the idle time slots. Moreover, we show how the MPR capability at the destination can compensate for the sensing need at the relay, i.e., the DBC scheme achieves almost the same stability region as that of the SBC scheme. Furthermore, we derive the condition under which the two proposed schemes achieve the same maximum stable throughput.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.
-
Minimum Fault-Tolerant, local and strong metric dimension of graphs
Authors:
Muhammad Salman,
Imran Javaid,
Muhammad Anwar Chaudhry
Abstract:
In this paper, we consider three similar optimization problems: the fault-tolerant metric dimension problem, the local metric dimension problem and the strong metric dimension problem. These problems have applications in many diverse areas, including network discovery and verification, robot navigation and chemistry, etc. We give integer linear programming formulations of the fault-tolerant metric…
▽ More
In this paper, we consider three similar optimization problems: the fault-tolerant metric dimension problem, the local metric dimension problem and the strong metric dimension problem. These problems have applications in many diverse areas, including network discovery and verification, robot navigation and chemistry, etc. We give integer linear programming formulations of the fault-tolerant metric dimension problem and the local metric dimension problem. Also, we study local metric dimension and strong metric dimension of two convex polytopes $S_n$ and $U_n$.
△ Less
Submitted 9 September, 2014;
originally announced September 2014.
-
Locating-Dominating sets in Hypergraphs
Authors:
Muhammad Fazil,
Imran Javaid,
Muhammad Salman,
Usman Ali
Abstract:
A hypergraph is a generalization of a graph where edges can connect any number of vertices. In this paper, we extend the study of locating-dominating sets to hypergraphs. Along with some basic results, sharp bounds for the location-domination number of hypergraphs in general and exact values with specified conditions are investigated. Moreover, locating-dominating sets in some specific hypergraphs…
▽ More
A hypergraph is a generalization of a graph where edges can connect any number of vertices. In this paper, we extend the study of locating-dominating sets to hypergraphs. Along with some basic results, sharp bounds for the location-domination number of hypergraphs in general and exact values with specified conditions are investigated. Moreover, locating-dominating sets in some specific hypergraphs are found.
△ Less
Submitted 2 September, 2014;
originally announced September 2014.
-
Resolvability in Hypergraphs
Authors:
Imran Javaid,
Azeem Haider,
Muhammad Salman,
Sadaf Mehtab
Abstract:
This article emphasizes an extension of the study of metric and par- tition dimension to hypergraphs. We give a sharp lower bounds for the metric and partition dimension of hypergraphs in general and give exact values under specified conditions.eral and give exact values with specified conditions.
This article emphasizes an extension of the study of metric and par- tition dimension to hypergraphs. We give a sharp lower bounds for the metric and partition dimension of hypergraphs in general and give exact values under specified conditions.eral and give exact values with specified conditions.
△ Less
Submitted 28 September, 2018; v1 submitted 23 August, 2014;
originally announced August 2014.
-
Weak total resolving sets in graphs
Authors:
Imran Javaid,
Muhammad Salman,
Mahr Murtaza,
Farheen Iftikhar,
Muhammad Imran
Abstract:
A set $W$ of vertices of $G$ is said to be a weak total resolving set for $G$ if $W$ is a resolving set for $G$ as well as for each $w\in W$, there is at least one element in $W-\{w\}$ that resolves $w$ and $v$ for every $v\in V(G)- W$. Weak total metric dimension of $G$ is the smallest order of a weak total resolving set for $G$. This paper includes the investigation of weak total metric dimensio…
▽ More
A set $W$ of vertices of $G$ is said to be a weak total resolving set for $G$ if $W$ is a resolving set for $G$ as well as for each $w\in W$, there is at least one element in $W-\{w\}$ that resolves $w$ and $v$ for every $v\in V(G)- W$. Weak total metric dimension of $G$ is the smallest order of a weak total resolving set for $G$. This paper includes the investigation of weak total metric dimension of trees. Also, weak total resolving number of a graph as well as randomly weak total $k$-dimensional graphs are defined and studied in this paper. Moreover, some characterizations and realizations regarding weak total resolving number and weak total metric dimension are given.
△ Less
Submitted 4 August, 2014;
originally announced August 2014.
-
Resolving Share and Topological Index
Authors:
Muhammad Salman,
Imran Javaid,
Muhammad Anwar Chaudhry
Abstract:
An atom $a$ of a molecular graph $G$ uniquely determines (resolves) a pair $(a_1,a_2)$ of atoms of $G$ if the distance between $a$ and $a_1$ is different from the distance between $a$ and $a_2$. In this paper, we quantify the involvement of each atom $a$ of $G$ in uniquely determining (resolving) a pair $(a_1,a_2)$ of atoms of $G$, which is called the resolving share of $a$ for the pair…
▽ More
An atom $a$ of a molecular graph $G$ uniquely determines (resolves) a pair $(a_1,a_2)$ of atoms of $G$ if the distance between $a$ and $a_1$ is different from the distance between $a$ and $a_2$. In this paper, we quantify the involvement of each atom $a$ of $G$ in uniquely determining (resolving) a pair $(a_1,a_2)$ of atoms of $G$, which is called the resolving share of $a$ for the pair $(a_1,a_2)$. Using this quantity, we define a distance-based topological index of a molecular graph, which reflects the topology of that molecular graph according to the resolvability behavior of each of its atom, and is called the resolving topological index. Then we compute the resolving topological index of several molecular graphs.
△ Less
Submitted 1 August, 2014;
originally announced August 2014.
-
Supersymmetric Descendants of Self-Adjointly Extended Quantum Mechanical Hamiltonians
Authors:
M. H. Al-Hashimi,
M. Salman,
A. Shalaby,
U. -J. Wiese
Abstract:
We consider the descendants of self-adjointly extended Hamiltonians in supersymmetric quantum mechanics on a half-line, on an interval, and on a punctured line or interval. While there is a 4-parameter family of self-adjointly extended Hamiltonians on a punctured line, only a 3-parameter sub-family has supersymmetric descendants that are themselves self-adjoint. We also address the self-adjointnes…
▽ More
We consider the descendants of self-adjointly extended Hamiltonians in supersymmetric quantum mechanics on a half-line, on an interval, and on a punctured line or interval. While there is a 4-parameter family of self-adjointly extended Hamiltonians on a punctured line, only a 3-parameter sub-family has supersymmetric descendants that are themselves self-adjoint. We also address the self-adjointness of an operator related to the supercharge, and point out that only a sub-class of its most general self-adjoint extensions is physical. Besides a general characterization of self-adjoint extensions and their supersymmetric descendants, we explicitly consider concrete examples, including a particle in a box with general boundary conditions, with and without an additional point interaction. We also discuss bulk-boundary resonances and their manifestation in the supersymmetric descendant.
△ Less
Submitted 10 March, 2013;
originally announced March 2013.
-
The Metric Dimension of Regular Bipartite Graphs
Authors:
S. W. Saputro,
E. T. Baskoro,
A. N. M. Salman,
D. Suprijanto,
And M. Baca
Abstract:
A set of vertices $W$ resolves a graph $G$ if every vertex is uniquely determined by its vector of distances to the vertices in $W$. A metric dimension of $G$ is the minimum cardinality of a resolving set of $G$. A bipartite graph G(n,n) is a graph whose vertex set $V$ can be partitioned into two subsets $V_1$ and $V_2,$ with $|V_1|=|V_2|=n,$ such that every edge of $G$ joins $V_1$ and $V_2$. The…
▽ More
A set of vertices $W$ resolves a graph $G$ if every vertex is uniquely determined by its vector of distances to the vertices in $W$. A metric dimension of $G$ is the minimum cardinality of a resolving set of $G$. A bipartite graph G(n,n) is a graph whose vertex set $V$ can be partitioned into two subsets $V_1$ and $V_2,$ with $|V_1|=|V_2|=n,$ such that every edge of $G$ joins $V_1$ and $V_2$. The graph $G$ is called $k$-regular if every vertex of $G$ is adjacent to $k$ other vertices. In this paper, we determine the metric dimension of $k$-regular bipartite graphs G(n,n) where $k=n-1$ or $k=n-2$.
△ Less
Submitted 19 January, 2011;
originally announced January 2011.