-
How Good is ChatGPT at Audiovisual Deepfake Detection: A Comparative Study of ChatGPT, AI Models and Human Perception
Authors:
Sahibzada Adil Shahzad,
Ammarah Hashmi,
Yan-Tsung Peng,
Yu Tsao,
Hsin-Min Wang
Abstract:
Multimodal deepfakes involving audiovisual manipulations are a growing threat because they are difficult to detect with the naked eye or using unimodal deep learningbased forgery detection methods. Audiovisual forensic models, while more capable than unimodal models, require large training datasets and are computationally expensive for training and inference. Furthermore, these models lack interpr…
▽ More
Multimodal deepfakes involving audiovisual manipulations are a growing threat because they are difficult to detect with the naked eye or using unimodal deep learningbased forgery detection methods. Audiovisual forensic models, while more capable than unimodal models, require large training datasets and are computationally expensive for training and inference. Furthermore, these models lack interpretability and often do not generalize well to unseen manipulations. In this study, we examine the detection capabilities of a large language model (LLM) (i.e., ChatGPT) to identify and account for any possible visual and auditory artifacts and manipulations in audiovisual deepfake content. Extensive experiments are conducted on videos from a benchmark multimodal deepfake dataset to evaluate the detection performance of ChatGPT and compare it with the detection capabilities of state-of-the-art multimodal forensic models and humans. Experimental results demonstrate the importance of domain knowledge and prompt engineering for video forgery detection tasks using LLMs. Unlike approaches based on end-to-end learning, ChatGPT can account for spatial and spatiotemporal artifacts and inconsistencies that may exist within or across modalities. Additionally, we discuss the limitations of ChatGPT for multimedia forensic tasks.
△ Less
Submitted 14 November, 2024;
originally announced November 2024.
-
Understanding Audiovisual Deepfake Detection: Techniques, Challenges, Human Factors and Perceptual Insights
Authors:
Ammarah Hashmi,
Sahibzada Adil Shahzad,
Chia-Wen Lin,
Yu Tsao,
Hsin-Min Wang
Abstract:
Deep Learning has been successfully applied in diverse fields, and its impact on deepfake detection is no exception. Deepfakes are fake yet realistic synthetic content that can be used deceitfully for political impersonation, phishing, slandering, or spreading misinformation. Despite extensive research on unimodal deepfake detection, identifying complex deepfakes through joint analysis of audio an…
▽ More
Deep Learning has been successfully applied in diverse fields, and its impact on deepfake detection is no exception. Deepfakes are fake yet realistic synthetic content that can be used deceitfully for political impersonation, phishing, slandering, or spreading misinformation. Despite extensive research on unimodal deepfake detection, identifying complex deepfakes through joint analysis of audio and visual streams remains relatively unexplored. To fill this gap, this survey first provides an overview of audiovisual deepfake generation techniques, applications, and their consequences, and then provides a comprehensive review of state-of-the-art methods that combine audio and visual modalities to enhance detection accuracy, summarizing and critically analyzing their strengths and limitations. Furthermore, we discuss existing open source datasets for a deeper understanding, which can contribute to the research community and provide necessary information to beginners who want to analyze deep learning-based audiovisual methods for video forensics. By bridging the gap between unimodal and multimodal approaches, this paper aims to improve the effectiveness of deepfake detection strategies and guide future research in cybersecurity and media integrity.
△ Less
Submitted 12 November, 2024;
originally announced November 2024.
-
Unmasking Illusions: Understanding Human Perception of Audiovisual Deepfakes
Authors:
Ammarah Hashmi,
Sahibzada Adil Shahzad,
Chia-Wen Lin,
Yu Tsao,
Hsin-Min Wang
Abstract:
The emergence of contemporary deepfakes has attracted significant attention in machine learning research, as artificial intelligence (AI) generated synthetic media increases the incidence of misinterpretation and is difficult to distinguish from genuine content. Currently, machine learning techniques have been extensively studied for automatically detecting deepfakes. However, human perception has…
▽ More
The emergence of contemporary deepfakes has attracted significant attention in machine learning research, as artificial intelligence (AI) generated synthetic media increases the incidence of misinterpretation and is difficult to distinguish from genuine content. Currently, machine learning techniques have been extensively studied for automatically detecting deepfakes. However, human perception has been less explored. Malicious deepfakes could ultimately cause public and social problems. Can we humans correctly perceive the authenticity of the content of the videos we watch? The answer is obviously uncertain; therefore, this paper aims to evaluate the human ability to discern deepfake videos through a subjective study. We present our findings by comparing human observers to five state-ofthe-art audiovisual deepfake detection models. To this end, we used gamification concepts to provide 110 participants (55 native English speakers and 55 non-native English speakers) with a webbased platform where they could access a series of 40 videos (20 real and 20 fake) to determine their authenticity. Each participant performed the experiment twice with the same 40 videos in different random orders. The videos are manually selected from the FakeAVCeleb dataset. We found that all AI models performed better than humans when evaluated on the same 40 videos. The study also reveals that while deception is not impossible, humans tend to overestimate their detection capabilities. Our experimental results may help benchmark human versus machine performance, advance forensics analysis, and enable adaptive countermeasures.
△ Less
Submitted 11 November, 2024; v1 submitted 7 May, 2024;
originally announced May 2024.
-
AV-Lip-Sync+: Leveraging AV-HuBERT to Exploit Multimodal Inconsistency for Video Deepfake Detection
Authors:
Sahibzada Adil Shahzad,
Ammarah Hashmi,
Yan-Tsung Peng,
Yu Tsao,
Hsin-Min Wang
Abstract:
Multimodal manipulations (also known as audio-visual deepfakes) make it difficult for unimodal deepfake detectors to detect forgeries in multimedia content. To avoid the spread of false propaganda and fake news, timely detection is crucial. The damage to either modality (i.e., visual or audio) can only be discovered through multi-modal models that can exploit both pieces of information simultaneou…
▽ More
Multimodal manipulations (also known as audio-visual deepfakes) make it difficult for unimodal deepfake detectors to detect forgeries in multimedia content. To avoid the spread of false propaganda and fake news, timely detection is crucial. The damage to either modality (i.e., visual or audio) can only be discovered through multi-modal models that can exploit both pieces of information simultaneously. Previous methods mainly adopt uni-modal video forensics and use supervised pre-training for forgery detection. This study proposes a new method based on a multi-modal self-supervised-learning (SSL) feature extractor to exploit inconsistency between audio and visual modalities for multi-modal video forgery detection. We use the transformer-based SSL pre-trained Audio-Visual HuBERT (AV-HuBERT) model as a visual and acoustic feature extractor and a multi-scale temporal convolutional neural network to capture the temporal correlation between the audio and visual modalities. Since AV-HuBERT only extracts visual features from the lip region, we also adopt another transformer-based video model to exploit facial features and capture spatial and temporal artifacts caused during the deepfake generation process. Experimental results show that our model outperforms all existing models and achieves new state-of-the-art performance on the FakeAVCeleb and DeepfakeTIMIT datasets.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
AVTENet: Audio-Visual Transformer-based Ensemble Network Exploiting Multiple Experts for Video Deepfake Detection
Authors:
Ammarah Hashmi,
Sahibzada Adil Shahzad,
Chia-Wen Lin,
Yu Tsao,
Hsin-Min Wang
Abstract:
Forged content shared widely on social media platforms is a major social problem that requires increased regulation and poses new challenges to the research community. The recent proliferation of hyper-realistic deepfake videos has drawn attention to the threat of audio and visual forgeries. Most previous work on detecting AI-generated fake videos only utilizes visual modality or audio modality. W…
▽ More
Forged content shared widely on social media platforms is a major social problem that requires increased regulation and poses new challenges to the research community. The recent proliferation of hyper-realistic deepfake videos has drawn attention to the threat of audio and visual forgeries. Most previous work on detecting AI-generated fake videos only utilizes visual modality or audio modality. While there are some methods in the literature that exploit audio and visual modalities to detect forged videos, they have not been comprehensively evaluated on multi-modal datasets of deepfake videos involving acoustic and visual manipulations. Moreover, these existing methods are mostly based on CNN and suffer from low detection accuracy. Inspired by the recent success of Transformer in various fields, to address the challenges posed by deepfake technology, in this paper, we propose an Audio-Visual Transformer-based Ensemble Network (AVTENet) framework that considers both acoustic manipulation and visual manipulation to achieve effective video forgery detection. Specifically, the proposed model integrates several purely transformer-based variants that capture video, audio, and audio-visual salient cues to reach a consensus in prediction. For evaluation, we use the recently released benchmark multi-modal audio-video FakeAVCeleb dataset. For a detailed analysis, we evaluate AVTENet, its variants, and several existing methods on multiple test sets of the FakeAVCeleb dataset. Experimental results show that our best model outperforms all existing methods and achieves state-of-the-art performance on Testset-I and Testset-II of the FakeAVCeleb dataset.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
Controllable Fano-type optical response and four-wave mixing via magnetoelastic coupling in a opto-magnomechanical system
Authors:
Amjad Sohail,
Rizwan Ahmed,
Jia-Xin Peng,
Aamir Shahzad,
Tariq Munir,
S. K. Singh,
Marcos Cesar de Oliveira
Abstract:
We analytically investigate the Fano-type optical response and four-wave mixing (FWM) process by exploiting the magnetoelasticity of a ferromagnetic material. The deformation of the ferromagnetic material plays the role of mechanical displacement, which is simultaneously coupled to both optical and magnon modes. We report that the magnetostrictively induced displacement demonstrates Fano profiles,…
▽ More
We analytically investigate the Fano-type optical response and four-wave mixing (FWM) process by exploiting the magnetoelasticity of a ferromagnetic material. The deformation of the ferromagnetic material plays the role of mechanical displacement, which is simultaneously coupled to both optical and magnon modes. We report that the magnetostrictively induced displacement demonstrates Fano profiles, in the output field, which is well-tuned by adjusting the system parameters, like effective magnomechanical coupling, magnon detuning, and cavity detuning. It is found that the magnetoelastic interaction also gives rise to the FWM phenomenon. The number of the FWM signals mainly depends upon the effective magnomechanical coupling and the magnon detuning. Moreover, the FWM spectrum exhibits suppressive behavior upon increasing (decreasing) the magnon (cavity) decay rate. The present scheme will open new perspectives in highly sensitive detection and quantum information processing.
△ Less
Submitted 1 April, 2023;
originally announced April 2023.
-
Enhanced entanglement and controlling quantum steering in a Laguerre-Gaussian cavity optomechanical system with two rotating mirrors
Authors:
Amjad Sohail,
Zaheer Abbas,
Rizwan Ahmed,
Aamir Shahzad,
Naeem Akhtar,
Jia-Xing Peng
Abstract:
Gaussian quantum steering is a type of quantum correlation in which two entangled states exhibit asymmetry. We present an efficient theoretical scheme for controlling quantum steering and enhancing entanglement in a Laguerre-Gaussian (LG) rotating cavity optomechanical system with an optical parametric amplifier (OPA) driven by coherent light. The numerical simulation results show that manipulatin…
▽ More
Gaussian quantum steering is a type of quantum correlation in which two entangled states exhibit asymmetry. We present an efficient theoretical scheme for controlling quantum steering and enhancing entanglement in a Laguerre-Gaussian (LG) rotating cavity optomechanical system with an optical parametric amplifier (OPA) driven by coherent light. The numerical simulation results show that manipulating system parameters such as parametric gain $χ$, parametric phase $θ$, and rotating mirror frequency, among others, significantly improves mirror-mirror and mirror-cavity entanglement. In addition to bipartite entanglement, we achieve mirror-cavity-mirror tripartite entanglement. Another intriguing discovery is the control of quantum steering, for which we obtained several results by investigating it for various system parameters. We show that the steering directivity is primarily determined by the frequency of two rotating mirrors. Furthermore, for two rotating mirrors, quantum steering is found to be asymmetric both one-way and two-way. As a result, we can assert that the current proposal may help in the understanding of non-local correlations and entanglement verification tasks.
△ Less
Submitted 12 March, 2023;
originally announced March 2023.
-
Review on Classification Techniques used in Biophysiological Stress Monitoring
Authors:
Talha Iqbal,
Adnan Elahi,
Atif Shahzad,
William Wijns
Abstract:
Cardiovascular activities are directly related to the response of a body in a stressed condition. Stress, based on its intensity, can be divided into two types i.e. Acute stress (short-term stress) and Chronic stress (long-term stress). Repeated acute stress and continuous chronic stress may play a vital role in inflammation in the circulatory system and thus leads to a heart attack or to a stroke…
▽ More
Cardiovascular activities are directly related to the response of a body in a stressed condition. Stress, based on its intensity, can be divided into two types i.e. Acute stress (short-term stress) and Chronic stress (long-term stress). Repeated acute stress and continuous chronic stress may play a vital role in inflammation in the circulatory system and thus leads to a heart attack or to a stroke. In this study, we have reviewed commonly used machine learning classification techniques applied to different stress-indicating parameters used in stress monitoring devices. These parameters include Photoplethysmograph (PPG), Electrocardiographs (ECG), Electromyograph (EMG), Galvanic Skin Response (GSR), Heart Rate Variation (HRV), skin temperature, respiratory rate, Electroencephalograph (EEG) and salivary cortisol, used in stress monitoring devices. This study also provides a discussion on choosing a classifier, which depends upon a number of factors other than accuracy, like the number of subjects involved in an experiment, type of signals processing and computational limitations.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Implementation of a Modified U-Net for Medical Image Segmentation on Edge Devices
Authors:
Owais Ali,
Hazrat Ali,
Syed Ayaz Ali Shah,
Aamir Shahzad
Abstract:
Deep learning techniques, particularly convolutional neural networks, have shown great potential in computer vision and medical imaging applications. However, deep learning models are computationally demanding as they require enormous computational power and specialized processing hardware for model training. To make these models portable and compatible for prototyping, their implementation on low…
▽ More
Deep learning techniques, particularly convolutional neural networks, have shown great potential in computer vision and medical imaging applications. However, deep learning models are computationally demanding as they require enormous computational power and specialized processing hardware for model training. To make these models portable and compatible for prototyping, their implementation on low-power devices is imperative. In this work, we present the implementation of Modified U-Net on Intel Movidius Neural Compute Stick 2 (NCS-2) for the segmentation of medical images. We selected U-Net because, in medical image segmentation, U-Net is a prominent model that provides improved performance for medical image segmentation even if the dataset size is small. The modified U-Net model is evaluated for performance in terms of dice score. Experiments are reported for segmentation task on three medical imaging datasets: BraTs dataset of brain MRI, heart MRI dataset, and Ziehl-Neelsen sputum smear microscopy image (ZNSDB) dataset. For the proposed model, we reduced the number of parameters from 30 million in the U-Net model to 0.49 million in the proposed architecture. Experimental results show that the modified U-Net provides comparable performance while requiring significantly lower resources and provides inference on the NCS-2. The maximum dice scores recorded are 0.96 for the BraTs dataset, 0.94 for the heart MRI dataset, and 0.74 for the ZNSDB dataset.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Search for a lighter neutral custodial fiveplet scalar in the Georgi-Machacek model
Authors:
Chu Wang,
Jun-Quan Tao,
M. Aamir Shahzad,
Guo-Ming Chen,
S. Gascon-Shotkin
Abstract:
Many researches from both the theoretical and experimental sides have been performed to search for a new Higgs Boson lighter than the 125 $GeV$ Higgs boson which was discovered at the LHC in 2012. In this paper we explore the possibility of constraining a lighter neutral custodial fiveplet scalar $H_{5}^{0}$ in the Georgi-Machacek (GM) model by the latest results of the search for a lighter Higgs…
▽ More
Many researches from both the theoretical and experimental sides have been performed to search for a new Higgs Boson lighter than the 125 $GeV$ Higgs boson which was discovered at the LHC in 2012. In this paper we explore the possibility of constraining a lighter neutral custodial fiveplet scalar $H_{5}^{0}$ in the Georgi-Machacek (GM) model by the latest results of the search for a lighter Higgs boson decaying into two photons from LHC data. The custodial-singlet mass eigenstate $h$ or $H$ is considered to be the LHC observed 125 $GeV$ Higgs boson. A new set of constrained parameters that is favoured by low-mass $H_{5}^{0}$, is proposed to generate events efficiently. The production of $H_{5}^{0}$ from the scan based on the constrained parameters is compared to the latest results of the search for a lighter Higgs boson decaying into two photons by CMS Collaboration, after the theoretical constraints from GM model and the constraints from all existing relevant experimental measurements including the recent results of the Higgs boson searches from the LHC. The numerical analyses of the surviving GM parameter space are performed. The tendencies and correlations of the GM input parameters from the phenomenological studies are summarized. In addition the discovery potential of other interesting decay channels of this low-mass neutral custodial fiveplet scalar are discussed.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
Table Structure Extraction with Bi-directional Gated Recurrent Unit Networks
Authors:
Saqib Ali Khan,
Syed Muhammad Daniyal Khalid,
Muhammad Ali Shahzad,
Faisal Shafait
Abstract:
Tables present summarized and structured information to the reader, which makes table structure extraction an important part of document understanding applications. However, table structure identification is a hard problem not only because of the large variation in the table layouts and styles, but also owing to the variations in the page layouts and the noise contamination levels. A lot of resear…
▽ More
Tables present summarized and structured information to the reader, which makes table structure extraction an important part of document understanding applications. However, table structure identification is a hard problem not only because of the large variation in the table layouts and styles, but also owing to the variations in the page layouts and the noise contamination levels. A lot of research has been done to identify table structure, most of which is based on applying heuristics with the aid of optical character recognition (OCR) to hand pick layout features of the tables. These methods fail to generalize well because of the variations in the table layouts and the errors generated by OCR. In this paper, we have proposed a robust deep learning based approach to extract rows and columns from a detected table in document images with a high precision. In the proposed solution, the table images are first pre-processed and then fed to a bi-directional Recurrent Neural Network with Gated Recurrent Units (GRU) followed by a fully-connected layer with soft max activation. The network scans the images from top-to-bottom as well as left-to-right and classifies each input as either a row-separator or a column-separator. We have benchmarked our system on publicly available UNLV as well as ICDAR 2013 datasets on which it outperformed the state-of-the-art table structure extraction systems by a significant margin.
△ Less
Submitted 8 January, 2020;
originally announced January 2020.
-
Hamilton's Dynamics in Complex Phase Space
Authors:
Muhammad Adnan Shahzad
Abstract:
We present the basic formulation of Hamilton dynamics in complex phase space. We extend the Hamilton's function by including the imaginary part and find out the corresponding Hamilton's canonical equation of motion. Example of simple harmonic motion are considered and the corresponding trajectory are plotted on real and complex phase space.
We present the basic formulation of Hamilton dynamics in complex phase space. We extend the Hamilton's function by including the imaginary part and find out the corresponding Hamilton's canonical equation of motion. Example of simple harmonic motion are considered and the corresponding trajectory are plotted on real and complex phase space.
△ Less
Submitted 15 June, 2019;
originally announced June 2019.
-
Two quantum particles trapped in three dimensions harmonic oscillator and interacting via finite range soft-core interaction
Authors:
Muhammad Adnan Shahzad
Abstract:
We study the exactly solvable quantum system of two particles confined in a three-dimensional harmonic trap and interacting via finite-range soft-core interaction by means of the separation of variables and ansatz method. Supposing the solution in the form of ansatz $Ψ(r)=r^{a}e^{-λr^2} ψ(r)$ we transform the time independent Schrödinger equation into Kummer's differential equation whose solution…
▽ More
We study the exactly solvable quantum system of two particles confined in a three-dimensional harmonic trap and interacting via finite-range soft-core interaction by means of the separation of variables and ansatz method. Supposing the solution in the form of ansatz $Ψ(r)=r^{a}e^{-λr^2} ψ(r)$ we transform the time independent Schrödinger equation into Kummer's differential equation whose solution are given in the form of confluent hypergeometric function. We also discuss that in the absence of central force potential, the quantum system map into the problem of two quantum particle trapped in one-dimension harmonic oscillator and interacting through finite distance soft-core potential. In such special case the eigen value equation become the Weber's differential equation and its solution are also given in the form of confluent hypergeometric function.
△ Less
Submitted 9 June, 2019;
originally announced June 2019.
-
Search for a lighter Higgs Boson in the Next-to-Minimal Supersymmetric Standard Model
Authors:
Junquan Tao,
M. Aamir Shahzad,
Sijing Zhang,
Chu Wang,
Yuqiao Shen,
Guoming Chen,
Hesheng Chen,
S. Gascon-Shotkin,
M. Lethuillier,
L. Finco,
C. Camen
Abstract:
After the discovery of the Higgs boson with mass at approximately 125 $GeV$ at the LHC, many studies both from the theoretical and experimental sides have been performed to search for a new Higgs Boson lighter than the 125 $GeV$ Higgs boson. We explore the possibility of constraining a lighter neutral scalar Higgs boson $h_{1}$ and a lighter pseudo-scalar Higgs boson $a_{1}$ in the Next-to-Minimal…
▽ More
After the discovery of the Higgs boson with mass at approximately 125 $GeV$ at the LHC, many studies both from the theoretical and experimental sides have been performed to search for a new Higgs Boson lighter than the 125 $GeV$ Higgs boson. We explore the possibility of constraining a lighter neutral scalar Higgs boson $h_{1}$ and a lighter pseudo-scalar Higgs boson $a_{1}$ in the Next-to-Minimal Supersymmetric Standard Model by restricting the next-to-lightest scalar Higgs boson $h_{2}$ to be the LHC observed Higgs boson after the phenomenological constraints and the constraints from experimental measurements. Such lighter particles are not yet completely excluded by the latest results of the search for a lighter Higgs boson with the diphoton decay channel from LHC data. Our results show that for a lighter scalar Higgs boson some new constraints on the Next-to-Minimal Supersymmetric Standard Model could be obtained at the LHC if such a search is performed by the experimental collaborations with more data. The discovery potential of other interesting decay channels of such a lighter neutral scalar and a pseudo-scalar particle are also discussed.
△ Less
Submitted 29 September, 2018; v1 submitted 27 May, 2018;
originally announced May 2018.
-
Frequency-control of protein translocation across an oscillating nanopore
Authors:
Fabio Cecconi,
Muhammad Adnan Shahzad,
Umberto Marini Bettolo Marconi,
Angelo Vulpiani
Abstract:
The translocation of a Lipid Binding Protein (LBP) is studied using a phenomenological coarse-grained computational model that simplifies both chain and pore geometry. We investigated via molecular dynamics the interplay between transport and unfolding in the presence of a nanopore whose section oscillates periodically in time with a frequency omega, a motion often referred to as radial breathing…
▽ More
The translocation of a Lipid Binding Protein (LBP) is studied using a phenomenological coarse-grained computational model that simplifies both chain and pore geometry. We investigated via molecular dynamics the interplay between transport and unfolding in the presence of a nanopore whose section oscillates periodically in time with a frequency omega, a motion often referred to as radial breathing mode (RBM). We found that the LPB when mechanically pulled into the vibrating nanopore exhibits a translocation dynamics that in some frequency range is accelerated and shows a frequency locking to the pore dynamics. The main effect of pore vibrations is the suppression of stalling events of the translocation dynamics, hence, a proper frequency tuning allows both regularization and control of the overall transport process. Finally, the interpretation of the simulation results is easily achieved by resorting to a first passage theory of elementary driven-diffusion processes.
△ Less
Submitted 17 April, 2018;
originally announced April 2018.
-
Virtualization Technology: Cross-VM Cache Side Channel Attacks make it Vulnerable
Authors:
Alan Litchfield,
Abid Shahzad
Abstract:
Cloud computing provides an effective business model for the deployment of IT infrastructure, platform, and software services. Often, facilities are outsourced to cloud providers and this offers the service consumer virtualization technologies without the added cost burden of development. However, virtualization introduces serious threats to service delivery such as Denial of Service (DoS) attacks…
▽ More
Cloud computing provides an effective business model for the deployment of IT infrastructure, platform, and software services. Often, facilities are outsourced to cloud providers and this offers the service consumer virtualization technologies without the added cost burden of development. However, virtualization introduces serious threats to service delivery such as Denial of Service (DoS) attacks, Cross-VM Cache Side Channel attacks, Hypervisor Escape and Hyper-jacking. One of the most sophisticated forms of attack is the cross-VM cache side channel attack that exploits shared cache memory between VMs. A cache side channel attack results in side channel data leakage, such as cryptographic keys. Various techniques used by the attackers to launch cache side channel attack are presented, as is a critical analysis of countermeasures against cache side channel attacks.
△ Less
Submitted 4 June, 2016;
originally announced June 2016.
-
Convective flow of sisko fluid over a bidirectional stretching sheet
Authors:
Asif Munir,
Azeem Shahzad,
Masood Khan
Abstract:
The present investigation discusses the flow and heat transfer characteristics of a steady three dimensional Sisko fluid. The flow is induced due to bidirectional stretching sheet. The influence of power-law index and stretching ratio on flow and heat transfer is studied thoroughly. Governing partial differential equations are reduced to coupled ordinary differential equations by suitable similari…
▽ More
The present investigation discusses the flow and heat transfer characteristics of a steady three dimensional Sisko fluid. The flow is induced due to bidirectional stretching sheet. The influence of power-law index and stretching ratio on flow and heat transfer is studied thoroughly. Governing partial differential equations are reduced to coupled ordinary differential equations by suitable similarity variable. The resulting equations are then solved numerically by shooting method using adaptive Runge Kutta algorithm in combination with Broyden's method in the domain . The numerical results for the velocity and temperature fields are graphically presented and effects of the relevant parameters are discussed in detail. Moreover, the skin-friction coefficient and local Nusselt number for different values of the power-law index and stretching ratio are presented through tabulated data. The numerical results are verified with the results obtained by HAM. Additionally, the results are also validated with previously published pertinent literature as a special case of the problem.
△ Less
Submitted 30 May, 2014;
originally announced June 2014.
-
Analytical investigation of revival phenomena in periodically driven system
Authors:
Muhammad A. Shahzad
Abstract:
We present theoretical study of revival phenomena for a wave packet initially well localized in a one-dimensional potential in the presence of an external periodic modulating field. The classical motion, revival, and super-revival time scale are derived exactly for wave packet excited in the one dimension box potential.
We present theoretical study of revival phenomena for a wave packet initially well localized in a one-dimensional potential in the presence of an external periodic modulating field. The classical motion, revival, and super-revival time scale are derived exactly for wave packet excited in the one dimension box potential.
△ Less
Submitted 30 September, 2010;
originally announced September 2010.
-
Diffraction of Electromagnetic Wave by Circular Disk and Circular Hole
Authors:
Muhammad Adnan Shahzad
Abstract:
The problem of diffraction of an electromagnetic plane wave by a perfectly conducting circular disk and its complementary problem, diffraction by a circular hole in an infinite conducting plate, are rigorously solved using the method of the Kobayashi potential. The mathematical formulation involved dual integral equation derived from the potential integral and boundary condition on the plane where…
▽ More
The problem of diffraction of an electromagnetic plane wave by a perfectly conducting circular disk and its complementary problem, diffraction by a circular hole in an infinite conducting plate, are rigorously solved using the method of the Kobayashi potential. The mathematical formulation involved dual integral equation derived from the potential integral and boundary condition on the plane where a disk or hole is located. The weighting function in the potential integral are determined by applying the properties of the Weber-Schafheitlin's discontinuous integral and the solution are obtained in the form of a matrix equation. The matrix elements of the equations for the expansion coefficients are given by three kinds of infinite integral and the series solution for these infinite integral are derived. For the verification of these series solution, the numerical integral are derived and the results are computed numerically using the method of Gaussian quadrature for conformation. The numerical results are given for the far-field pattern diffraction by a perfectly conducting disk and the results are compared with those obtained from physical optics method (PO), which is fairly good.
△ Less
Submitted 29 April, 2010;
originally announced April 2010.