-
On the Interplay of Clustering and Evolution in the Emergence of Epidemic Outbreaks
Authors:
Mansi Sood,
Hejin Gu,
Rashad Eletreby,
Swarun Kumar,
Chai Wah Wu,
Osman Yagan
Abstract:
In an increasingly interconnected world, a key scientific challenge is to examine mechanisms that lead to the widespread propagation of contagions, such as misinformation and pathogens, and identify risk factors that can trigger large-scale outbreaks. Underlying both the spread of disease and misinformation epidemics is the evolution of the contagion as it propagates, leading to the emergence of d…
▽ More
In an increasingly interconnected world, a key scientific challenge is to examine mechanisms that lead to the widespread propagation of contagions, such as misinformation and pathogens, and identify risk factors that can trigger large-scale outbreaks. Underlying both the spread of disease and misinformation epidemics is the evolution of the contagion as it propagates, leading to the emergence of different strains, e.g., through genetic mutations in pathogens and alterations in the information content. Recent studies have revealed that models that do not account for heterogeneity in transmission risks associated with different strains of the circulating contagion can lead to inaccurate predictions. However, existing results on multi-strain spreading assume that the network has a vanishingly small clustering coefficient, whereas clustering is widely known to be a fundamental property of real-world social networks. In this work, we investigate spreading processes that entail evolutionary adaptations on random graphs with tunable clustering and arbitrary degree distributions. We derive a mathematical framework to quantify the epidemic characteristics of a contagion that evolves as it spreads, with the structure of the underlying network as given via arbitrary {\em joint} degree distributions of single-edges and triangles. To the best of our knowledge, our work is the first to jointly analyze the impact of clustering and evolution on the emergence of epidemic outbreaks. We supplement our theoretical finding with numerical simulations and case studies, shedding light on the impact of clustering on contagion spread.
△ Less
Submitted 25 September, 2024;
originally announced September 2024.
-
On the Robustness, Connectivity and Giant Component Size of Random K-out Graphs
Authors:
Eray Can Elumar,
Mansi Sood,
Osman Yağan
Abstract:
Random K-out graphs are garnering interest in designing distributed systems including secure sensor networks, anonymous crypto-currency networks, and differentially-private decentralized learning. In these security-critical applications, it is important to model and analyze the resilience of the network to node failures and adversarial captures. Motivated by this, we analyze how the connectivity p…
▽ More
Random K-out graphs are garnering interest in designing distributed systems including secure sensor networks, anonymous crypto-currency networks, and differentially-private decentralized learning. In these security-critical applications, it is important to model and analyze the resilience of the network to node failures and adversarial captures. Motivated by this, we analyze how the connectivity properties of random K-out graphs vary with the network parameters $K$, the number of nodes ($n$), and the number of nodes that get failed or compromised ($γ_n$). In particular, we study the conditions for achieving \emph{connectivity} {with high probability} and for the existence of a \emph{giant component} with formal guarantees on the size of the largest connected component in terms of the parameters $n,~K$, and $γ_n$. Next, we analyze the property of \emph{$r$-robustness} which is a stronger property than connectivity and leads to resilient consensus in the presence of malicious nodes. We derive conditions on $K$ and $n$ under which the random K-out graph achieves r-robustness with high probability. We also provide extensive numerical simulations and compare our results on random K-out graphs with known results on Erdős-Rényi (ER) graphs.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
Composition dependence of electronic defects in CuGaS2
Authors:
Damilola Adeleye,
Mohit Sood,
Michele Melchiorre,
Alice Debot,
Susanne Siebentritt
Abstract:
CuGaS2 films grown by physical vapour deposition have been studied by photoluminescence (PL) spectroscopy, using excitation intensity and temperature dependent analyses. We observe free and bound exciton recombinations, three donor-to-acceptor (DA) transitions, and deep-level transitions. The DA transitions at ~ 2.41 eV, 2.398 eV and ~ 2.29 eV are attributed to a common donor level ~ 38+-5 meV and…
▽ More
CuGaS2 films grown by physical vapour deposition have been studied by photoluminescence (PL) spectroscopy, using excitation intensity and temperature dependent analyses. We observe free and bound exciton recombinations, three donor-to-acceptor (DA) transitions, and deep-level transitions. The DA transitions at ~ 2.41 eV, 2.398 eV and ~ 2.29 eV are attributed to a common donor level ~ 38+-5 meV and three shallow acceptors at ~ 76 meV, ~ 90 meV and 210 meV above the valence band. This electronic structure is very similar to other chalcopyrite materials. The donor-acceptor transitions are accompanied by phonon replicas. Cu-rich and near-stoichiometric material is dominated by the transitions due to the acceptor at 210 meV. All films show deep-level transitions at ~ 2.15 eV and 1.85 eV due to broad deep defect bands. Slightly Cu-deficient films are dominated by intense transitions at ~ 2.45 eV, attributed to excitonic transitions and the broad defect transition at 2.15 eV.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
CuIn(Se,Te)2 absorbers with bandgaps < 1 eV for bottom cells in tandem applications
Authors:
Thomas Paul Weiss,
Mohit Sood,
Aline Vanderhaegen,
Susanne Siebentritt
Abstract:
Thin-film solar cells reach high efficiencies and have a low carbon footprint in production. Tandem solar cells have the potential to significantly increase the efficiency of this technology, where the bottom-cell is generally composed of a Cu(In,Ga)Se2 absorber layer with bandgaps around 1 eV or higher. Here, we investigate CuIn(Se1-xTex)2 absorber layers and solar cells with bandgaps below 1 eV,…
▽ More
Thin-film solar cells reach high efficiencies and have a low carbon footprint in production. Tandem solar cells have the potential to significantly increase the efficiency of this technology, where the bottom-cell is generally composed of a Cu(In,Ga)Se2 absorber layer with bandgaps around 1 eV or higher. Here, we investigate CuIn(Se1-xTex)2 absorber layers and solar cells with bandgaps below 1 eV, which will bring the benefit of an additional degree of freedom for designing current-matched 2-terminal tandem devices. We report that CuIn(Se1-xTex)2 thin films can be grown single phase by co-evaporation and that the bandgap can be reduced to the optimum range for a bottom cell (0.92 - 0.95 eV). From photoluminescence spectroscopy it is found that no additional non-radiative losses are introduced to the absorber. However, Voc losses occur in the final solar cell due to non-optimised interfaces. Nevertheless, a record device with 9 % power conversion efficiency is demonstrated with a bandgap of 0.96 eV and x=0.15. Interface recombination is identified as a major recombination channel for larger Te contents. Thus, further efficiency improvements are anticipated for improved absorber/buffer interfaces.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Digital Image Forensics using Deep Learning
Authors:
Akash Nagaraj,
Mukund Sood,
Vivek Kapoor,
Yash Mathur,
Bishesh Sinha
Abstract:
During the investigation of criminal activity when evidence is available, the issue at hand is determining the credibility of the video and ascertaining that the video is real. Today, one way to authenticate the footage is to identify the camera that was used to capture the image or video in question. While a very common way to do this is by using image meta-data, this data can easily be falsified…
▽ More
During the investigation of criminal activity when evidence is available, the issue at hand is determining the credibility of the video and ascertaining that the video is real. Today, one way to authenticate the footage is to identify the camera that was used to capture the image or video in question. While a very common way to do this is by using image meta-data, this data can easily be falsified by changing the video content or even splicing together content from two different cameras. Given the multitude of solutions proposed to this problem, it is yet to be sufficiently solved. The aim of our project is to build an algorithm that identifies which camera was used to capture an image using traces of information left intrinsically in the image, using filters, followed by a deep neural network on these filters. Solving this problem would have a big impact on the verification of evidence used in criminal and civil trials and even news reporting.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Real-Time Automated Answer Scoring
Authors:
Akash Nagaraj,
Mukund Sood,
Gowri Srinivasa
Abstract:
In recent years, the role of big data analytics has exponentially grown and is now slowly making its way into the education industry. Several attempts are being made in this sphere in order to improve the quality of education being provided to students and while many collaborations have been carried out before, automated scoring of answers has been explored to a rather limited extent. One of the b…
▽ More
In recent years, the role of big data analytics has exponentially grown and is now slowly making its way into the education industry. Several attempts are being made in this sphere in order to improve the quality of education being provided to students and while many collaborations have been carried out before, automated scoring of answers has been explored to a rather limited extent. One of the biggest hurdles to choosing constructed-response assessments over multiple-choice assessments is the effort and large cost that comes with their evaluation and this is precisely the issue that this project aims to solve. The aim is to accept raw-input from the student in the form of their answer, preprocess the answer, and automatically score the answer. In addition, we have made this a real-time system that captures "snapshots" of the writer's progress with respect to the answer, allowing us to unearth trends with respect to the way a student thinks, and how the student has arrived at their final answer.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Learning Algorithms in Static Analysis of Web Applications
Authors:
Akash Nagaraj,
Bishesh Sinha,
Mukund Sood,
Yash Mathur,
Sanchika Gupta,
Dinkar Sitaram
Abstract:
Web applications are distributed applications, they are programs that run on more than one computer and communicate through a network or server. This very distributed nature of web applications, combined with the scale and sheer complexity of modern software systems complicate manual security auditing, while also creating a huge attack surface of potential hackers. These factors are making automat…
▽ More
Web applications are distributed applications, they are programs that run on more than one computer and communicate through a network or server. This very distributed nature of web applications, combined with the scale and sheer complexity of modern software systems complicate manual security auditing, while also creating a huge attack surface of potential hackers. These factors are making automated analysis a necessity. Static Application Security Testing (SAST) is a method devised to automatically analyze application source code of large code bases without compiling it, and design conditions that are indicative of security vulnerabilities. However, the problem lies in the fact that the most widely used Static Application Security Testing Tools often yield unreliable results, owing to the false positive classification of vulnerabilities grossly outnumbering the classification of true positive vulnerabilities. This is one of the biggest hindrances to the proliferation of SAST testing, which leaves the user to review hundreds, if not thousands, of potential warnings, and classify them as either actionable or spurious. We try to minimize the problem of false positives by introducing a technique to filter the output of SAST tools. The aim of the project is to apply learning algorithms to the output by analyzing the true and false positives classified by OWASP Benchmark, and eliminate, or reduce the number of false positives presented to the user of the SAST Tool.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Real-time Action Recognition for Fine-Grained Actions and The Hand Wash Dataset
Authors:
Akash Nagaraj,
Mukund Sood,
Chetna Sureka,
Gowri Srinivasa
Abstract:
In this paper we present a three-stream algorithm for real-time action recognition and a new dataset of handwash videos, with the intent of aligning action recognition with real-world constraints to yield effective conclusions. A three-stream fusion algorithm is proposed, which runs both accurately and efficiently, in real-time even on low-powered systems such as a Raspberry Pi. The cornerstone of…
▽ More
In this paper we present a three-stream algorithm for real-time action recognition and a new dataset of handwash videos, with the intent of aligning action recognition with real-world constraints to yield effective conclusions. A three-stream fusion algorithm is proposed, which runs both accurately and efficiently, in real-time even on low-powered systems such as a Raspberry Pi. The cornerstone of the proposed algorithm is the incorporation of both spatial and temporal information, as well as the information of the objects in a video while using an efficient architecture, and Optical Flow computation to achieve commendable results in real-time. The results achieved by this algorithm are benchmarked on the UCF-101 as well as the HMDB-51 datasets, achieving an accuracy of 92.7% and 64.9% respectively. An important point to note is that the algorithm is novel in the aspect that it is also able to learn the intricate differences between extremely similar actions, which would be difficult even for the human eye. Additionally, noticing a dearth in the number of datasets for the recognition of very similar or fine-grained actions, this paper also introduces a new dataset that is made publicly available, the Hand Wash Dataset with the intent of introducing a new benchmark for fine-grained action recognition tasks in the future.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
A Concise Introduction to Reinforcement Learning in Robotics
Authors:
Akash Nagaraj,
Mukund Sood,
Bhagya M Patil
Abstract:
One of the biggest hurdles robotics faces is the facet of sophisticated and hard-to-engineer behaviors. Reinforcement learning offers a set of tools, and a framework to address this problem. In parallel, the misgivings of robotics offer a solid testing ground and evaluation metric for advancements in reinforcement learning. The two disciplines go hand-in-hand, much like the fields of Mathematics a…
▽ More
One of the biggest hurdles robotics faces is the facet of sophisticated and hard-to-engineer behaviors. Reinforcement learning offers a set of tools, and a framework to address this problem. In parallel, the misgivings of robotics offer a solid testing ground and evaluation metric for advancements in reinforcement learning. The two disciplines go hand-in-hand, much like the fields of Mathematics and Physics. By means of this survey paper, we aim to invigorate links between the research communities of the two disciplines by focusing on the work done in reinforcement learning for locomotive and control aspects of robotics. Additionally, we aim to highlight not only the notable successes but also the key challenges of the application of Reinforcement Learning in Robotics. This paper aims to serve as a reference guide for researchers in reinforcement learning applied to the field of robotics. The literature survey is at a fairly introductory level, aimed at aspiring researchers. Appropriately, we have covered the most essential concepts required for research in the field of reinforcement learning, with robotics in mind. Through a thorough analysis of this problem, we are able to manifest how reinforcement learning could be applied profitably, and also focus on open-ended questions, as well as the potential for future research.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Spreading Processes with Mutations over Multi-layer Networks
Authors:
Mansi Sood,
Anirudh Sridhar,
Rashad Eletreby,
Chai Wah Wu,
Simon A. Levin,
H. Vincent Poor,
Osman Yagan
Abstract:
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environment…
▽ More
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environments, especially caused by the increase in population immunity to existing strains and the emergence of new pathogen strains poses a continued threat to public health. Further, in light of differing transmission risks in different congregate settings (e.g., schools and offices), different mitigation strategies may need to be adopted to control the spread of infection. We analyze a multi-layer multi-strain model by simultaneously accounting for i) pathways for mutations in the pathogen leading to the emergence of new pathogen strains, and ii) differing transmission risks in different congregate settings, modeled as network-layers. Assuming complete cross-immunity among strains, namely, recovery from any infection prevents infection with any other (an assumption that will need to be relaxed to deal with COVID-19 or influenza), we derive the key epidemiological parameters for the proposed multi-layer multi-strain framework. We demonstrate that reductions to existing network-based models that discount heterogeneity in either the strain or the network layers can lead to incorrect predictions for the course of the outbreak. In addition, our results highlight that the impact of imposing/lifting mitigation measures concerning different contact network layers (e.g., school closures or work-from-home policies) should be evaluated in connection with their effect on the likelihood of the emergence of new pathogen strains.
△ Less
Submitted 24 January, 2023; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Electrical barriers and their elimination by tuning (Zn,Mg)O composition in Cu(In,Ga)S2: Systematic approach to achieve over 14% power conversion efficiency
Authors:
Mohit Sood,
Poorani Gnanasambandan,
Damilola Adeleye,
Sudhanshu Shukla,
Noureddine Adjeroud,
Renaud Leturcq,
Susanne Siebentritt
Abstract:
Traditional CdS buffer layer in selenium-free Cu(In,Ga)S2 solar cells leads to reduced open-circuit voltage because of a negative conduction band offset at the Cu(In,Ga)S2/CdS interface. Reducing this loss necessitates the substitution of CdS by an alternative buffer layer. However, the substitute buffer layer may introduce electrical barriers in the device due to unfavorable band alignment at the…
▽ More
Traditional CdS buffer layer in selenium-free Cu(In,Ga)S2 solar cells leads to reduced open-circuit voltage because of a negative conduction band offset at the Cu(In,Ga)S2/CdS interface. Reducing this loss necessitates the substitution of CdS by an alternative buffer layer. However, the substitute buffer layer may introduce electrical barriers in the device due to unfavorable band alignment at the other interfaces such as between buffer/ZnO i-layer. This study aims to reduce interface recombinations and eliminate electrical barriers in Cu(In,Ga)S2 solar cells using a combination of Zn1-xMgxO and Al-doped Zn1-xMgxO buffer and i-layer combination deposited using atomic layer deposition and magnetron sputtering, respectively. The devices prepared with these layers are characterized by current-voltage and photoluminescence measurements. Numerical simulations are performed to comprehend the influence of electrical barriers on the device characteristics. An optimal composition of Zn1 xMgxO x = 0.27 is identified for a suitable conduction band alignment with Cu(In,Ga)S2 with a bandgap of ~1.6 eV, suppressing interface recombination and avoiding barriers. Optimized buffer composition together with a suitable i-layer led to a device with 14 % efficiency and an open-circuit voltage of 943 mV. A comparison of optoelectronic measurements for devices prepared with ZnO and Al:(Zn,Mg)O shows the necessity to replace the ZnO i-layer with Al:(Zn,Mg)O i-layer for a high-efficiency device.
△ Less
Submitted 22 February, 2022;
originally announced February 2022.
-
Origin of interface limitation in CuInS$_2$ based solar cells
Authors:
Mohit Sood,
Jakob Bombsch,
Alberto Lomuscio,
Sudhanshu Shukla,
Alberto Lomuscio,
Claudia Hartmann,
Johannes Frisch,
Wolfgang Bremsteller,
Shigenori Ueda,
Regan G. Wilks,
Marcus Bär,
Susanne Siebentritt
Abstract:
Copper indium disulfide (CuInS$_2$) grown under Cu-rich conditions exhibits high optical quality but suffers predominantly from charge carrier interface recombination resulting in poor solar cell performance. An unfavorable cliff like conduction band alignment at the buffer/CuInS$_2$ interface could be a possible cause of enhanced interface recombination in the device. In this work, we exploit dir…
▽ More
Copper indium disulfide (CuInS$_2$) grown under Cu-rich conditions exhibits high optical quality but suffers predominantly from charge carrier interface recombination resulting in poor solar cell performance. An unfavorable cliff like conduction band alignment at the buffer/CuInS$_2$ interface could be a possible cause of enhanced interface recombination in the device. In this work, we exploit direct and inverse photoelectron spectroscopy together with electrical characterization to investigate the cause of interface recombination in Zn(O,S)/CuInS$_2$ devices. Temperature-dependent current-voltage analysis indeed reveal an activation energy of the dominant charge carrier recombination path, considerably smaller than the absorber bandgap, confirming the dominant recombination channel to be present at the Zn(O,S)/CuInS2 interface. However, photoelectron spectroscopy measurements indicate a small spike like conduction band offset of 0.1 eV at the Zn(O,S) CuInS$_2$ interface, excluding an unfavorable energy level alignment to be the prominent cause for strong interface recombination. The observed band bending upon interface formation also rules out Fermi level pinning as the main reason, leaving near-interface defects (as recently observed in Cu-rich CuInSe2)1 as the likely reason for the performance limiting interface recombination.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Near surface defects: Cause of deficit between internal and external open-circuit voltage in solar cells
Authors:
Mohit Sood,
Aleksander Urbaniak,
Christian Kameni Boumenou,
Thomas Weiss,
Hossam Elanzeery,
Finn Babbe,
Florian Werner,
Michele Melchiorre,
Susanne Siebentritt
Abstract:
The presence of interface recombination in a complex multilayered thin-film solar structure causes a disparity between the internal open-circuit voltage (VOC,in), measured by photoluminescence, and the external open-circuit voltage (VOC,ex) i.e. an additional VOC deficit. Higher VOC,ex value aim require a comprehensive understanding of connection between VOC deficit and interface recombination. He…
▽ More
The presence of interface recombination in a complex multilayered thin-film solar structure causes a disparity between the internal open-circuit voltage (VOC,in), measured by photoluminescence, and the external open-circuit voltage (VOC,ex) i.e. an additional VOC deficit. Higher VOC,ex value aim require a comprehensive understanding of connection between VOC deficit and interface recombination. Here, a deep near-surface defect model at the absorber/buffer interface is developed for copper indium di-selenide solar cells grown under Cu excess conditions to explain the disparity between VOC,in and VOC,ex.. The model is based on experimental analysis of admittance spectroscopy and deep-level transient spectroscopy, which show the signature of deep acceptor defect. Further, temperature-dependent current-voltage measurements confirm the presence of near surface defects as the cause of interface recombination. The numerical simulations show strong decrease in the local VOC,in near the absorber/buffer interface leading to a VOC deficit in the device. This loss mechanism leads to interface recombination without a reduced interface bandgap or Fermi level pinning. Further, these findings demonstrate that the VOC,in measurements alone can be inconclusive and might conceal the information on interface recombination pathways, establishing the need for complementary techniques like temperature dependent current voltage measurements to identify the cause of interface recombination in the devices.
△ Less
Submitted 29 March, 2021;
originally announced March 2021.
-
On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes
Authors:
Eray Can Elumar,
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs, denoted $\mathbb{H}(n;K)$, are generated by each of the $n$ nodes drawing $K$ out-edges towards $K$ distinct nodes selected uniformly at random, and then ignoring the orientation of the arcs. Recently, random K-out graphs have been used in applications as diverse as random (pairwise) key predistribution in ad-hoc networks, anonymous message routing in crypto-currency networks,…
▽ More
Random K-out graphs, denoted $\mathbb{H}(n;K)$, are generated by each of the $n$ nodes drawing $K$ out-edges towards $K$ distinct nodes selected uniformly at random, and then ignoring the orientation of the arcs. Recently, random K-out graphs have been used in applications as diverse as random (pairwise) key predistribution in ad-hoc networks, anonymous message routing in crypto-currency networks, and differentially-private federated averaging. In many applications, connectivity of the random K-out graph when some of its nodes are dishonest, have failed, or have been captured is of practical interest. We provide a comprehensive set of results on the connectivity and giant component size of $\mathbb{H}(n;K_n,γ_n)$, i.e., random K-out graph when $γ_n$ of its nodes, selected uniformly at random, are deleted. First, we derive conditions for $K_n$ and $n$ that ensure, with high probability (whp), the connectivity of the remaining graph when the number of deleted nodes is $γ_n=Ω(n)$ and $γ_n=o(n)$, respectively. Next, we derive conditions for $\mathbb{H}(n;K_n,γ_n)$ to have a giant component, i.e., a connected subgraph with $Ω(n)$ nodes, whp. This is also done for different scalings of $γ_n$ and upper bounds are provided for the number of nodes outside the giant component. Simulation results are presented to validate the usefulness of the results in the finite node regime.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Passivating Surface Defects and Reducing Interface Recombination in CuInS2 Solar Cells by a Facile Solution Treatment
Authors:
Mohit Sood,
Alberto Lomuscio,
Florian Werner,
Aleksandra Nikolaeva,
Phillip J. Dale,
Michele Melchiorre,
Jerome Guillot,
Daniel Abou-Ras,
Susanne Siebentritt
Abstract:
Interface recombination at the absorber buffer interface impedes the efficiency of a solar cell with an otherwise excellent absorber. The internal voltage or the quasi-Fermi level splitting (qFLs) measures the quality of the absorber. Interface recombination reduces the open circuit voltage (VOC) with respect to the qFLs. The present work explores a facile sulfur-based post-deposition treatment (S…
▽ More
Interface recombination at the absorber buffer interface impedes the efficiency of a solar cell with an otherwise excellent absorber. The internal voltage or the quasi-Fermi level splitting (qFLs) measures the quality of the absorber. Interface recombination reduces the open circuit voltage (VOC) with respect to the qFLs. The present work explores a facile sulfur-based post-deposition treatment (S-PDT) to passivate the interface of CuInS2 thin films grown under Cu-rich conditions, which show excellent qFLs values, but much lower VOCs. The CuInS2 absorbers are treated in three different S-containing solutions at 80 oC. Absolute calibrated photoluminescence and current-voltage measurements demonstrate a reduction of the deficit between qFLs and VOC in the best S-PDT device by almost one third compared to the untreated device. Analysis of temperature dependence of the open-circuit voltage shows increased activation energy for the dominant recombination path, indicating less interface recombination. In addition, capacitance transient measurements reveal the presence of slow metastable defects in the untreated solar cell. The slow response is considerably reduced by the S-PDT, suggesting passivation of these slow metastable defects. The results demonstrate the effectiveness of solution based S-treatment in passivating defects, presenting a promising strategy to explore and reduce defect states near the interface of chalcogenide semiconductors.
△ Less
Submitted 29 January, 2021;
originally announced January 2021.
-
Existence and Size of the Giant Component in Inhomogeneous Random K-out Graphs
Authors:
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs are receiving attention as a model to construct sparse yet well-connected topologies in distributed systems including sensor networks, federated learning, and cryptocurrency networks. In response to the growing heterogeneity in emerging real-world networks, where nodes differ in resources and requirements, inhomogeneous random K-out graphs, denoted by $H(n;μ,K_n)$, were propose…
▽ More
Random K-out graphs are receiving attention as a model to construct sparse yet well-connected topologies in distributed systems including sensor networks, federated learning, and cryptocurrency networks. In response to the growing heterogeneity in emerging real-world networks, where nodes differ in resources and requirements, inhomogeneous random K-out graphs, denoted by $H(n;μ,K_n)$, were proposed recently. Motivated by practical settings where establishing links is costly and only a bounded choice of $K_n$ is feasible ($K_n = O(1)$), we study the size of the largest connected sub-network of $H(n;μ,K_n)$, We first show that the trivial condition of $K_n \geq 2$ for all $n$ is sufficient to ensure that $H(n;μ,K_n)$, contains a giant component of size $n-O(1)$ whp. Next, to model settings where nodes can fail or get compromised, we investigate the size of the largest connected sub-network in $H(n;μ,K_n)$, when $d_n$ nodes are selected uniformly at random and removed from the network. We show that if $d_n=O(1)$, a giant component of size $n- \OO(1)$ persists for all $K_n \geq 2$ whp. Further, when $d_n=o(n)$ nodes are removed from $H(n;μ,K_n)$, the remaining nodes contain a giant component of size $n(1-o(1))$ whp for all $K_n \geq 2$. We present numerical results to demonstrate the size of the largest connected component when the number of nodes is finite.
△ Less
Submitted 29 July, 2021; v1 submitted 1 September, 2020;
originally announced September 2020.
-
Tight Bounds for Connectivity of Random K-out Graphs
Authors:
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs are used in several applications including modeling by sensor networks secured by the random pairwise key predistribution scheme, and payment channel networks. The random K-out graph with $n$ nodes is constructed as follows. Each node draws an edge towards $K$ distinct nodes selected uniformly at random. The orientation of the edges is then ignored, yielding an undirected graph…
▽ More
Random K-out graphs are used in several applications including modeling by sensor networks secured by the random pairwise key predistribution scheme, and payment channel networks. The random K-out graph with $n$ nodes is constructed as follows. Each node draws an edge towards $K$ distinct nodes selected uniformly at random. The orientation of the edges is then ignored, yielding an undirected graph. An interesting property of random K-out graphs is that they are connected almost surely in the limit of large $n$ for any $K \geq2$. This means that they attain the property of being connected very easily, i.e., with far fewer edges ($O(n)$) as compared to classical random graph models including Erdős-Rényi graphs ($O(n \log n)$). This work aims to reveal to what extent the asymptotic behavior of random K-out graphs being connected easily extends to cases where the number $n$ of nodes is small. We establish upper and lower bounds on the probability of connectivity when $n$ is finite. Our lower bounds improve significantly upon the existing results, and indicate that random K-out graphs can attain a given probability of connectivity at much smaller network sizes than previously known. We also show that the established upper and lower bounds match order-wise; i.e., further improvement on the order of $n$ in the lower bound is not possible. In particular, we prove that the probability of connectivity is $1-Θ({1}/{n^{K^2-1}})$ for all $K \geq 2$. Through numerical simulations, we show that our bounds closely mirror the empirically observed probability of connectivity.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Duopolistic platform competition for revenue and throughput
Authors:
Mansi Sood,
Ankur A. Kulkarni,
Sharayu Moharir
Abstract:
We consider two competing platforms operating in a two-sided market and offering identical services to their customers at potentially different prices. The objective of each platform is to maximize its throughput or revenue by suitably pricing its services. We assume that customers have a preference or loyalty to the platforms while the workers freelance for the two platforms. Assuming that the re…
▽ More
We consider two competing platforms operating in a two-sided market and offering identical services to their customers at potentially different prices. The objective of each platform is to maximize its throughput or revenue by suitably pricing its services. We assume that customers have a preference or loyalty to the platforms while the workers freelance for the two platforms. Assuming that the resulting interaction between the users is such that their aggregate utility is maximized, we show that for each value of the loyalty, there exists a pure strategy Nash equilibrium for both the throughput and revenue competition game and characterize it.
△ Less
Submitted 30 January, 2020;
originally announced January 2020.
-
On the Strength of Connectivity of Inhomogeneous Random K-out Graphs
Authors:
Mansi Sood,
Osman Yağan
Abstract:
Random graphs are an important tool for modelling and analyzing the underlying properties of complex real-world networks. In this paper, we study a class of random graphs known as the inhomogeneous random K-out graphs which were recently introduced to analyze heterogeneous sensor networks secured by the pairwise scheme. In this model, first, each of the $n$ nodes is classified as type-1 (respectiv…
▽ More
Random graphs are an important tool for modelling and analyzing the underlying properties of complex real-world networks. In this paper, we study a class of random graphs known as the inhomogeneous random K-out graphs which were recently introduced to analyze heterogeneous sensor networks secured by the pairwise scheme. In this model, first, each of the $n$ nodes is classified as type-1 (respectively, type-2) with probability $0<μ<1$ (respectively, $1-μ)$ independently from each other. Next, each type-1 (respectively, type-2) node draws 1 arc towards a node (respectively, $K_n$ arcs towards $K_n$ distinct nodes) selected uniformly at random, and then the orientation of the arcs is ignored. From the literature on homogeneous K-out graphs wherein all nodes select $K_n$ neighbors (i.e., $μ=0$), it is known that when $K_n \geq2$, the graph is $K_n$-connected asymptotically almost surely (a.a.s.) as $n$ gets large. In the inhomogeneous case (i.e., $μ>0$), it was recently established that achieving even 1-connectivity a.a.s. requires $K_n=ω(1)$. Here, we provide a comprehensive set of results to complement these existing results. First, we establish a sharp zero-one law for $k$-connectivity, showing that for the network to be $k$-connected a.a.s., we need to set $K_n = \frac{1}{1-μ}(\log n +(k-2)\log\log n + ω(1))$ for all $k=2, 3, \ldots$. Despite such large scaling of $K_n$ being required for $k$-connectivity, we show that the trivial condition of $K_n \geq 2$ for all $n$ is sufficient to ensure that inhomogeneous K-out graph has a connected component of size $n-O(1)$ whp.
△ Less
Submitted 27 February, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution
Authors:
Mansi Sood,
Osman Yağan
Abstract:
We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we…
▽ More
We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we consider a heterogeneous network where each of the $n$ sensors is classified as type-1 (respectively, type-2) with probability $μ$ (respectively, $1-μ)$ where $0<μ<1$. Each type-1 (respectively, type-2) node selects 1 (respectively, $K_n$) other nodes uniformly at random to be paired with; according to the pairwise scheme each pair is then assigned a unique pairwise key so that they can securely communicate with each other. We establish critical conditions on $n, μ$, and $K_n$ such that the resulting network has minimum node degree of at least $k$ with high probability in the limit of large network size. Our result constitutes a zero-one law for the minimum node degree of the recently introduced inhomogeneous random K-out graph model. This constitutes a crucial step towards establishing a similar zero-one law for the $k$-connectivity of the graph; i.e., for the property that the network remains connected despite the failure of any $k-1$ nodes or links. We present numerical results that indicate the usefulness of our results in selecting the parameters of the scheme in practical settings with finite number of sensors.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.