Skip to main content

Showing 51–95 of 95 results for author: Youssef, A

.
  1. arXiv:2111.11665  [pdf, other

    eess.IV cs.CV

    RadFusion: Benchmarking Performance and Fairness for Multimodal Pulmonary Embolism Detection from CT and EHR

    Authors: Yuyin Zhou, Shih-Cheng Huang, Jason Alan Fries, Alaa Youssef, Timothy J. Amrhein, Marcello Chang, Imon Banerjee, Daniel Rubin, Lei Xing, Nigam Shah, Matthew P. Lungren

    Abstract: Despite the routine use of electronic health record (EHR) data by radiologists to contextualize clinical history and inform image interpretation, the majority of deep learning architectures for medical imaging are unimodal, i.e., they only learn features from pixel-level information. Recent research revealing how race can be recovered from pixel data alone highlights the potential for serious bias… ▽ More

    Submitted 26 November, 2021; v1 submitted 23 November, 2021; originally announced November 2021.

    Comments: RadFusion dataset: https://stanfordaimi.azurewebsites.net/datasets/3a7548a4-8f65-4ab7-85fa-3d68c9efc1bd

  2. arXiv:2109.13312  [pdf, other

    eess.SY

    LSTM-based approach to detect cyber attacks on market-based congestion management methods

    Authors: Omniyah Gul M Khan, Amr Youssef, Ehab El-Saadany, Magdy Salama

    Abstract: Market-based congestion management methods adopt Demand Side Management (DSM) techniques to alleviate congestion in the day-ahead market. Reliance of these methods on the communication layer makes it prone to cyber attacks affecting the security, reliability, and economic operation of the distribution network. In this paper, we focus on Load Altering Attacks that would compromise the operation of… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

  3. Semantic Preserving Bijective Mappings of Mathematical Formulae between Document Preparation Systems and Computer Algebra Systems

    Authors: Howard S. Cohl, Moritz Schubotz, Abdou Youssef, André Greiner-Petter, Jürgen Gerhard, Bonita V. Saunders, Marjorie A. ~McClain

    Abstract: Document preparation systems like LaTeX offer the ability to render mathematical expressions as one would write these on paper. Using LaTeX, LaTeXML, and tools generated for use in the National Institute of Standards (NIST) Digital Library of Mathematical Functions, semantically enhanced mathematical LaTeX markup (semantic LaTeX) is achieved by using a semantic macro set. Computer algebra systems… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: Proceedings of the 10th International Conference on Intelligent Computer Mathematics (CICM)

  4. Wyner wiretap-like encoding scheme for cyber-physical systems

    Authors: Walter Lucia, Amr Youssef

    Abstract: In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Journal ref: IET Cyber-Physical Systems: Theory & Applications, Vol. 5, No. 4, pp. 359-365, 2020

  5. arXiv:2104.01011  [pdf, ps, other

    cs.CR eess.SY

    On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments

    Authors: Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr Youssef

    Abstract: Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  6. Impact of Electric Vehicles Botnets on the Power Grid

    Authors: Omniyah Gul M Khan, Ehab El-Saadany, Amr Youssef, Mostafa Shaaban

    Abstract: The increased penetration of Electric Vehicles (EVs) in the transportation sector has increased the requirement of Fast Charging Direct Current (FCDC) stations to meet customer's speedy charging requirements. However, both charging stations and EVs connection to the communication infrastructure as well as the power grid makes it vulnerable to cyber attacks. In this paper, the vulnerability of the… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: 5 pages, conference

  7. Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions

    Authors: S. Ali, M. Elgharabawy, Q. Duchaussoy, M. Mannan, A. Youssef

    Abstract: For parents of young children and adolescents, the digital age has introduced many new challenges, including excessive screen time, inappropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on numerous parental control solutions on different platforms, including parental control network devices (e.g., WiFi routers) and software applications on… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

    Journal ref: Published at ACSAC 2020

  8. Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks

    Authors: Mohammed Elbayoumi, Walaa Hamouda, Amr Youssef

    Abstract: Coexistence of Human-Type Communications (HTCs) and Machine-Type Communications (MTCs) is inevitable. Ultra-Dense Networks (UDNs) will be efficacious in supporting both types of communications. In a UDN, a massive number of low-power and low-cost Small Cells (SCs) are deployed with density higher than that of the HTC users. In such a scenario, the backhaul capacities constitute an intrinsic bottle… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

  9. arXiv:2009.12242  [pdf, ps, other

    math.CA

    Further study on the conformable fractional Gauss hypergeometric function

    Authors: Mahmoud Abul-Ez, Mohra Zayed, Ali Youssef

    Abstract: This paper presents a somewhat exhaustive study on the conformable fractional Gauss hypergeometric function (CFGHF). We start by solving the conformable fractional Gauss hypergeometric equation (CFGHE) about the fractional regular singular points $x=1$ and $x=\infty$. Next, various generating functions of the CFGHF are established. We also develop some differential forms for the CFGHF. Subsequentl… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: 34 pages

  10. arXiv:2006.09556  [pdf, ps, other

    math.CA

    On conformable fractional Legendre polynomials and their convergence properties with applications

    Authors: Mhmoud Abul-Ez, Ali Youssef, Mohra Zayed, Manuel De la Sen

    Abstract: The main objective of this paper is to give a wide study on the conformable fractional Legendre polynomials (CFLPs). This study is assumed to be a generalization and refinement, in an easy way, of the scalar case into the context of the conformable fractional differentiation. We introduce the CFLPs via different generating functions and provide some of their main properties and convergence results… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  11. arXiv:2005.11021  [pdf, other

    cs.DL cs.CL cs.IR cs.LG

    Classification and Clustering of arXiv Documents, Sections, and Abstracts, Comparing Encodings of Natural and Mathematical Language

    Authors: Philipp Scharpf, Moritz Schubotz, Abdou Youssef, Felix Hamborg, Norman Meuschke, Bela Gipp

    Abstract: In this paper, we show how selecting and combining encodings of natural and mathematical language affect classification and clustering of documents with mathematical content. We demonstrate this by using sets of documents, sections, and abstracts from the arXiv preprint server that are labeled by their subject class (mathematics, computer science, physics, etc.) to compare different encodings of t… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Journal ref: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries JCDL 2020

  12. On-the-fly Detection of User Engagement Decrease in Spontaneous Human-Robot Interaction, International Journal of Social Robotics, 2019

    Authors: Atef Ben Youssef, Giovanna Varni, Slim Essid, Chloé Clavel

    Abstract: In this paper, we consider the detection of a decrease of engagement by users spontaneously interacting with a socially assistive robot in a public space. We first describe the UE-HRI dataset that collects spontaneous Human-Robot Interactions following the guidelines provided by the Affective Computing research community to collect data "in-the-wild". We then analyze the users' behaviors, focusing… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Journal ref: International Journal of Social Robotics December 2019

  13. arXiv:2001.08993  [pdf

    cs.CR cs.NI

    A Framework for Cloud Security Risk Management Based on the Business Objectives of Organizations

    Authors: Ahmed E. Youssef

    Abstract: Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed. Hence, no matter how strongly the cloud model is secured, organizations continue suffering from lack of trust on CC and r… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Journal ref: International Journal of Advanced Computer Science and Applications(IJACSA), Vol.10, No.12, pp. 186-194,2019

  14. arXiv:1911.11069  [pdf

    cs.IR cs.CL cs.LG

    Query Expansion for Patent Searching using Word Embedding and Professional Crowdsourcing

    Authors: Arthi Krishna, Ye Jin, Christine Foster, Greg Gabel, Britt Hanley, Abdou Youssef

    Abstract: The patent examination process includes a search of previous work to verify that a patent application describes a novel invention. Patent examiners primarily use keyword-based searches to uncover prior art. A critical part of keyword searching is query expansion, which is the process of including alternate terms such as synonyms and other related words, since the same concepts are often described… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: Presented at AAAI FSS-19: Artificial Intelligence in Government and Public Sector, Arlington, Virginia, USA

  15. arXiv:1907.02142  [pdf, other

    cs.CR cs.CY

    On Privacy Risks of Public WiFi Captive Portals

    Authors: Suzan Ali, Tousif Osman, Mohammad Mannan, Amr Youssef

    Abstract: Open access WiFi hotspots are widely deployed in many public places, including restaurants, parks, coffee shops, shopping malls, trains, airports, hotels, and libraries. While these hotspots provide an attractive option to stay connected, they may also track user activities and share user/device information with third-parties, through the use of trackers in their captive portal and landing website… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

  16. arXiv:1905.06280  [pdf, other

    cs.CR

    Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum

    Authors: Hisham S. Galal, Amr M. Youssef

    Abstract: The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bidders are motivated to submit their own monetary valuations without leaking their information to the competitors. Recent constructions have utilized various cryptographic protocols such as ZKP and MPC,… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Presented at Financial Cryptography and Data Security 2019, 3rd Workshop on Trusted Smart Contracts

  17. arXiv:1809.08729  [pdf, other

    cs.CR

    The Sorry State of TLS Security in Enterprise Interception Appliances

    Authors: Louis Waked, Mohammad Mannan, Amr Youssef

    Abstract: Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. Reasons for doing so are primarily related to improving enterprise security (e.g., malware detection) and meeting legal requirements. To analyze TLS-encrypted data, network appliances implement a Man-in-the-Middle TLS proxy, by acting as the intended web server to a requesting client (e.g., a browser… ▽ More

    Submitted 23 September, 2018; originally announced September 2018.

  18. Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys

    Authors: Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr Youssef

    Abstract: Smart toys have captured an increasing share of the toy market, and are growing ubiquitous in households with children. Smart toys are a subset of Internet of Things (IoT) devices, containing sensors, actuators, and/or artificial intelligence capabilities. They frequently have internet connectivity, directly or indirectly through companion apps, and collect information about their users and enviro… ▽ More

    Submitted 25 October, 2018; v1 submitted 14 September, 2018; originally announced September 2018.

    Comments: IEEE Internet of Things Journal, accepted Oct 2018 (early access URL: https://ieeexplore.ieee.org/document/8502818)

  19. A novel recommendation system to match college events and groups to students

    Authors: Kazem Qazanfari, Abdou Youssef, Kai Keane, Joseph Nelson

    Abstract: With the recent increase in data online, discovering meaningful opportunities can be time-consuming and complicated for many individuals. To overcome this data overload challenge, we present a novel text-content-based recommender system as a valuable tool to predict user interests. To that end, we develop a specific procedure to create user models and item feature-vectors, where items are describe… ▽ More

    Submitted 26 September, 2017; v1 submitted 24 September, 2017; originally announced September 2017.

    Comments: 10 pages, AIAAT 2017, Hawaii, USA

  20. arXiv:1701.07708  [pdf, other

    astro-ph.IM astro-ph.HE

    The EUSO@TurLab Project

    Authors: H. Miyamoto, M. Bertaina, G. Cotto, R. Forza, M. Manfrin, M. Mignone, G. Suino, A. Youssef, R. Caruso, G. Contino, S. Bacholle, P. Gorodetzky, A. Jung, E. Parizot, G. Prevôt, P. Barrillon, S. Dagoret-Campagne, J. Rabanal Reina, S. Blin

    Abstract: The TurLab facility is a laboratory, equipped with a 5 m diameter and 1 m depth rotating tank, located in the Physics Department of the University of Turin. The tank has been built mainly to study problems where system rotation plays a key role in the fluid behaviour such as in atmospheric and oceanic flows at different scales. The tank can be filled with different fluids of variable density, whic… ▽ More

    Submitted 26 January, 2017; originally announced January 2017.

    Comments: 4 pages, 5 figures, "XXV ECRS 2016 Proceedings - eConf C16-09-04.3"

  21. arXiv:1612.00843  [pdf, other

    q-bio.PE cond-mat.stat-mech math.ST

    Universal statistics of selected values

    Authors: Matteo Smerlak, Ahmed Youssef

    Abstract: Selection, the tendency of some traits to become more frequent than others in a population under the influence of some (natural or artificial) agency, is a key component of Darwinian evolution and countless other natural and social phenomena. Yet a general theory of selection, analogous to the Fisher-Tippett-Gnedenko theory of extreme events, is lacking. Here we introduce a probabilistic definitio… ▽ More

    Submitted 2 December, 2016; originally announced December 2016.

    Comments: 6 pages, 4 figures

  22. arXiv:1511.00296  [pdf, other

    q-bio.PE cond-mat.stat-mech cs.NE

    Limiting fitness distributions in evolutionary dynamics

    Authors: Matteo Smerlak, Ahmed Youssef

    Abstract: Darwinian evolution can be modeled in general terms as a flow in the space of fitness (i.e. reproductive rate) distributions. In the diffusion approximation, Tsimring et al. have showed that this flow admits "fitness wave" solutions: Gaussian-shape fitness distributions moving towards higher fitness values at constant speed. Here we show more generally that evolving fitness distributions are attra… ▽ More

    Submitted 16 February, 2016; v1 submitted 1 November, 2015; originally announced November 2015.

    Comments: 15 pages + appendices

    Journal ref: J. Theor. Biol. 416, 68-80 (2017)

  23. Using atom probe tomography to understand Schottky barrier height pinning at the ZnO:Al / SiO2 / Si interface

    Authors: R. Jaramillo, Amanda Youssef, Austin Akey, Frank Schoofs, Shriram Ramanathan, Tonio Buonassisi

    Abstract: We use electronic transport and atom probe tomography to study ZnO:Al / SiO2 / Si Schottky junctions on lightly-doped n- and p-type Si. We vary the carrier concentration in the the ZnO:Al films by two orders of magnitude but the Schottky barrier height remains constant, consistent with Fermi level pinning seen in metal / Si junctions. Atom probe tomography shows that Al segregates to the interface… ▽ More

    Submitted 29 October, 2015; originally announced October 2015.

    Journal ref: Phys. Rev. Applied 6, 034016 (2016)

  24. arXiv:1505.08155  [pdf

    cs.IR

    Performance Evaluation and Optimization of Math-Similarity Search

    Authors: Qun Zhang, Abdou Youssef

    Abstract: Similarity search in math is to find mathematical expressions that are similar to a user's query. We conceptualized the similarity factors between mathematical expressions, and proposed an approach to math similarity search (MSS) by defining metrics based on those similarity factors [11]. Our preliminary implementation indicated the advantage of MSS compared to non-similarity based search. In orde… ▽ More

    Submitted 29 May, 2015; originally announced May 2015.

    Comments: 15 pages, 8 figures

  25. arXiv:1505.04396  [pdf

    math.RA

    Coding theory applied to KU-algebras

    Authors: Samy M. Mostafa, Bayumy A. Youssef, Hussein A. Jad

    Abstract: The notion of a KU-valued function on a set is introduced and related properties are investigated. Codes generated by KU-valued functions are established. Moreover, we will provide an algorithm which allows us to find a KU-algebra starting from a given binary block code.

    Submitted 17 May, 2015; originally announced May 2015.

  26. arXiv:1412.7276  [pdf

    cs.CY

    A Framework for a Smart Social Blood Donation System Based on Mobile Cloud Computing

    Authors: Almetwally M. Mostafa, Ahmed E. Youssef, Gamal Alshorbagy

    Abstract: Blood Donation and Blood Transfusion Services (BTS) are crucial for saving people lives. Recently, worldwide efforts have been undertaken to utilize social media and smartphone applications to make the blood donation process more convenient, offer additional services, and create communities around blood donation centers. Blood banks suffer frequent shortage of blood; hence, advertisements are freq… ▽ More

    Submitted 8 April, 2019; v1 submitted 23 December, 2014; originally announced December 2014.

    Journal ref: Health Informatics -- An International Journal (HIIJ), vol. 3, no. 4, pp:1-10,2014

  27. arXiv:1301.3205  [pdf, other

    gr-qc hep-th math-ph

    Resummation of infrared logarithms in de Sitter space via Dyson-Schwinger equations: the ladder-rainbow approximation

    Authors: Ahmed Youssef, Dirk Kreimer

    Abstract: We study the infrared (large separation) behavior of a massless minimally coupled scalar quantum field theory with a quartic self interaction in de Sitter spacetime. We show that the perturbation series in the interaction strength is singular and secular, i.e. it does not lead to a uniform approximation of the solution in the infrared region. Only a nonperturbative resummation can capture the corr… ▽ More

    Submitted 7 August, 2014; v1 submitted 14 January, 2013; originally announced January 2013.

    Comments: 4 figures

    Report number: MaPhy-AvH/2013-01

    Journal ref: Phys. Rev. D 89, 124021 (2014)

  28. Anomaly Detection in Time Series of Graphs using Fusion of Graph Invariants

    Authors: Youngser Park, Carey E. Priebe, Abdou Youssef

    Abstract: Given a time series of graphs G(t) = (V, E(t)), t = 1, 2, ..., where the fixed vertex set V represents "actors" and an edge between vertex u and vertex v at time t (uv \in E(t)) represents the existence of a communications event between actors u and v during the tth time period, we wish to detect anomalies and/or change points. We consider a collection of graph features, or invariants, and demonst… ▽ More

    Submitted 31 October, 2012; originally announced October 2012.

  29. arXiv:1206.3441  [pdf, ps, other

    physics.gen-ph cond-mat.stat-mech

    Self-organization without heat: the geometric ratchet effect

    Authors: Matteo Smerlak, Ahmed Youssef

    Abstract: We point out a surprising feature of diffusion in inhomogeneous media: under suitable conditions, the rectification of the Brownian paths by a diffusivity gradient can result in initially spread tracers spontaneously concentrating. This "geometric ratchet effect" demonstrates that, in violation of the classical statements of the second law of (non-equilibrium) thermodynamics, self-organization can… ▽ More

    Submitted 15 June, 2012; originally announced June 2012.

    Comments: 8 pages, 4 figures

  30. Do scale-invariant fluctuations imply the breaking of de Sitter invariance?

    Authors: Ahmed Youssef

    Abstract: The quantization of the massless minimally coupled (mmc) scalar field in de Sitter spacetime is known to be a non-trivial problem due to the appearance of strong infrared (IR) effects. In particular, the scale-invariance of the CMB power-spectrum - certainly one of the most successful predictions of modern cosmology - is widely believed to be inconsistent with a de Sitter invariant mmc two-point f… ▽ More

    Submitted 14 March, 2012; originally announced March 2012.

    Comments: 4 pages

    Report number: MaPhy-AvH/2012-05

  31. arXiv:1202.3131  [pdf, ps, other

    gr-qc astro-ph.CO hep-th

    Lorentz-violating vs ghost gravitons: the example of Weyl gravity

    Authors: Nathalie Deruelle, Misao Sasaki, Yuuiti Sendouda, Ahmed Youssef

    Abstract: We show that the ghost degrees of freedom of Einstein gravity with a Weyl term can be eliminated by a simple mechanism that invokes local Lorentz symmetry breaking. We demonstrate how the mechanism works in a cosmological setting. The presence of the Weyl term forces a redefinition of the quantum vacuum state of the tensor perturbations. As a consequence the amplitude of their spectrum blows up wh… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Comments: 14 pages, 3 figures, REVTeX 4.1

    Report number: YITP-12-3

  32. New SUSYQM coherent states for Poschl-Teller potentials: a detailed mathematical analysis

    Authors: H. Bergeron, P. Siegl, A. Youssef

    Abstract: In a recent short note [Bergeron H, Gazeau J P, Siegl P and Youssef A 2010 EPL 92 60003], we have presented the nice properties of a new family of semi-classical states for Pöschl-Teller potentials. These states are built from a supersymmetric quantum mechanics approach and the parameters of these "coherent" states are points in the classical phase space. In this article we develop all the mathema… ▽ More

    Submitted 2 February, 2012; v1 submitted 5 December, 2011; originally announced December 2011.

    Report number: MaPhy-AvH/2012-02

    Journal ref: J. Phys. A: Math. Theor. 45(2012)244028

  33. arXiv:1102.3556  [pdf, other

    quant-ph math-ph

    To what extent are canonical and coherent state quantizations physically equivalent?

    Authors: Hervé Bergeron, Jean-Pierre Gazeau, Ahmed Youssef

    Abstract: We investigate the consistency of coherent state (or Berezin-Klauder-Toeplitz, or anti-Wick) quantization in regard to physical observations in the non- relativistic (or Galilean) regime. We compare this procedure with the canonical quantization (on both mathematical and physical levels) and examine whether they are or not equivalent in their predictions: is it possible to dif- ferentiate them on… ▽ More

    Submitted 14 November, 2012; v1 submitted 17 February, 2011; originally announced February 2011.

    Comments: 31 pages, 1 figure

  34. arXiv:1012.5202  [pdf, ps, other

    gr-qc astro-ph.CO hep-ph hep-th

    Inflation with a Weyl term, or ghosts at work

    Authors: Nathalie Deruelle, Misao Sasaki, Yuuiti Sendouda, Ahmed Youssef

    Abstract: In order to assess the role of ghosts in cosmology, we study the evolution of linear cosmological perturbations during inflation when a Weyl term is added to the action. Our main result is that vector perturbations can no longer be ignored and that scalar modes diverge in the newtonian gauge but remain bounded in the comoving slicing.

    Submitted 23 December, 2010; originally announced December 2010.

    Comments: 14 pages, 4 figures

    Report number: YITP-10-105

    Journal ref: JCAP 1103:040,2011

  35. arXiv:1011.3755  [pdf, ps, other

    gr-qc hep-th math-ph

    Infrared behavior and gauge artifacts in de Sitter spacetime: The photon field

    Authors: Ahmed Youssef

    Abstract: We study the infrared (long distance) behavior of the free photon field in de Sitter spacetime. Using a two-parameter family of gauge fixing terms, we show that the infrared (IR) behavior of the two-point function is highly gauge-dependent and ranges from vanishing to growing. This situation is in disagreement with its counterpart in flat spacetime, where the two-point function vanishes in the IR… ▽ More

    Submitted 14 July, 2011; v1 submitted 16 November, 2010; originally announced November 2010.

    Comments: 4 pages, published version

    Journal ref: Phys.Rev.Lett.107:021101,2011

  36. arXiv:1009.1074  [pdf, ps, other

    cond-mat.supr-con

    Contactless estimation of critical current density in thin superconducting films and its temperature dependence using ac magnetic measurements

    Authors: Ahmed Youssef, Lucia Banicova, Zdenek Svindrych, Zdenek Janu

    Abstract: We have measured magnetic response of second-generation high temperature superconductor YBa2Cu3Ox wire and Nb thin film in perpendicular ac field as a function of temperature. We compare experimental complex ac susceptibility to the calculated susceptibility based on the model of Bean's critical-state response in two-dimensional (2D) disk in perpendicular field. The harmonic analysis is needed for… ▽ More

    Submitted 6 September, 2010; originally announced September 2010.

  37. arXiv:1007.3876  [pdf, other

    quant-ph cond-mat.mes-hall math-ph

    Semi-classical behavior of Pöschl-Teller coherent states

    Authors: H. Bergeron, J. -P. Gazeau, P. Siegl, A. Youssef

    Abstract: We present a construction of semi-classical states for Pöschl-Teller potentials based on a supersymmetric quantum mechanics approach. The parameters of these "coherent" states are points in the classical phase space of these systems. They minimize a special uncertainty relation. Like standard coherent states they resolve the identity with a uniform measure. They permit to establish the corresponde… ▽ More

    Submitted 22 July, 2010; originally announced July 2010.

    Comments: 7 pages, 2 figures, 1 animation

  38. arXiv:1001.4810  [pdf, ps, other

    hep-th gr-qc math-ph

    Krein Spaces in de Sitter Quantum Theories

    Authors: Jean-Pierre Gazeau, Petr Siegl, Ahmed Youssef

    Abstract: Experimental evidences and theoretical motivations lead to consider the curved space-time relativity based on the de Sitter group $SO_0(1,4)$ or $Sp(2,2)$ as an appealing substitute to the flat space-time Poincare relativity. Quantum elementary systems are then associated to unitary irreducible representations of that simple Lie group. At the lowest limit of the discrete series lies a remarkable… ▽ More

    Submitted 27 January, 2010; originally announced January 2010.

    Journal ref: SIGMA 6 (2010), 011, 23 pages

  39. Overlapping Multi-hop Clustering for Wireless Sensor Networks

    Authors: Moustafa Youssef, Adel Youssef, Mohamed Younis

    Abstract: Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Traditionally, clustering algorithms aim at generating a number of disjoint clusters that satisfy some criteria. In this paper, we formulate a novel clustering problem that aims at generating overlapping multi-hop clusters. Overlapping clusters are useful in many sensor network applica… ▽ More

    Submitted 25 August, 2009; originally announced August 2009.

    Report number: WINC-TR-1001

    Journal ref: IEEE TPDS 2009

  40. Various Hamiltonian formulations of f(R) gravity and their canonical relationships

    Authors: Nathalie Deruelle, Yuuiti Sendouda, Ahmed Youssef

    Abstract: Various Hamiltonian formulations of f(R) gravity can be found in the literature. Some authors follow the Ostrogradsky treatment of higher derivative theories and introduce as extra variables first order time derivatives of the metric (typically the extrinsic curvature). Some others take advantage of the conformal equivalence of f(R) theory with Einstein's gravity coupled to a scalar field and in… ▽ More

    Submitted 26 June, 2009; originally announced June 2009.

    Comments: 15 pages, REVTeX 4

    Journal ref: Phys.Rev.D80:084032,2009

  41. A discrete nonetheless remarkable brick in de Sitter: the "massless minimally coupled field"

    Authors: Jean-Pierre Gazeau, Ahmed Youssef

    Abstract: Over the last ten years interest in the physics of de Sitter spacetime has been growing very fast. Besides the supposed existence of a "de sitterian period" in inflation theories, the observational evidence of an acceleration of the universe expansion (interpreted as a positive cosmological constant or a "dark energy" or some form of "quintessence") has triggered a lot of attention in the physic… ▽ More

    Submitted 14 January, 2009; originally announced January 2009.

    Comments: Proceedings of the XXVII Colloquium on Group Theoretical Methods in Physics, Yerevan, August 2008

    Journal ref: Phys.Atom.Nucl.73:222-229,2010

  42. arXiv:0805.1847  [pdf, ps, other

    quant-ph hep-th

    Coherent state quantization of angle, time, and more irregular functions and distributions

    Authors: Biswajit Chakraborty, Jean Pierre Gazeau, Ahmed Youssef

    Abstract: The domain of application of quantization methods is traditionally restricted to smooth classical observables. We show that the coherent states or "anti-Wick" quantization enables us to construct fairly reasonable quantum versions of irregular observables living on the classical phase space, such as the angle function, the time function of a free particle and even a large set of distributions co… ▽ More

    Submitted 3 December, 2008; v1 submitted 13 May, 2008; originally announced May 2008.

    Comments: 22 pages, 5 figures

  43. arXiv:0710.3891  [pdf

    cond-mat.supr-con

    Analysis of Critical State Response in Thin Films by ac Susceptibility Measurements

    Authors: A. Youssef, Z. Svindrych, J. Hadac, Z. Janu

    Abstract: Harmonic analysis of the temperature dependence of the nonlinear ac susceptibility of Nb thin film gives excellent agreement with the susceptibility calculated on basis of model of the hysteretic critical state in 2D disk.

    Submitted 22 October, 2007; originally announced October 2007.

    Comments: 4 pages, 4 figures, MT20 conference, accepted for IEEE Trans. Appl. Supercond

  44. arXiv:cond-mat/0301004  [pdf, ps, other

    cond-mat.stat-mech q-bio

    Phase transitions in some epidemic models defined on small-world networks

    Authors: H. N. Agiza, A. S. Elgazzar, S. A. Youssef

    Abstract: Some modified versions of susceptible-infected-recovered-susceptible (SIRS) model are defined on small-world networks. Latency, incubation and variable susceptibility are included, separately. Phase transitions in these models are studied. Then inhomogeneous models are introduced. In some cases, the application of the models to small-world networks is shown to increase the epidemic region.

    Submitted 1 January, 2003; originally announced January 2003.

    Comments: accepted for publication in Int. J. Mod. Phys. C

  45. arXiv:math/0101104  [pdf, ps, other

    math.CV

    On the Levi problem with singularities

    Authors: Alaoui Youssef

    Abstract: In section 1, we show that if $X$ is a Stein normal complex space of dimension n and $D\subset \subset X$ an open subset which is the union of an increasing sequence $D_{1}\subset D_{2}\subset ...\subset D_{n}\subset >...$ of domains of holomorphy in $X$. Then $D$ is a domain of holomorphy. In section 2, we prove that a domain of holomorphy $D$ which is relatively compact in a 2-dimensional no… ▽ More

    Submitted 11 January, 2001; originally announced January 2001.

    Comments: 8 pages, no figures, latex

    MSC Class: 32E40; 32E10