-
RadFusion: Benchmarking Performance and Fairness for Multimodal Pulmonary Embolism Detection from CT and EHR
Authors:
Yuyin Zhou,
Shih-Cheng Huang,
Jason Alan Fries,
Alaa Youssef,
Timothy J. Amrhein,
Marcello Chang,
Imon Banerjee,
Daniel Rubin,
Lei Xing,
Nigam Shah,
Matthew P. Lungren
Abstract:
Despite the routine use of electronic health record (EHR) data by radiologists to contextualize clinical history and inform image interpretation, the majority of deep learning architectures for medical imaging are unimodal, i.e., they only learn features from pixel-level information. Recent research revealing how race can be recovered from pixel data alone highlights the potential for serious bias…
▽ More
Despite the routine use of electronic health record (EHR) data by radiologists to contextualize clinical history and inform image interpretation, the majority of deep learning architectures for medical imaging are unimodal, i.e., they only learn features from pixel-level information. Recent research revealing how race can be recovered from pixel data alone highlights the potential for serious biases in models which fail to account for demographics and other key patient attributes. Yet the lack of imaging datasets which capture clinical context, inclusive of demographics and longitudinal medical history, has left multimodal medical imaging underexplored. To better assess these challenges, we present RadFusion, a multimodal, benchmark dataset of 1794 patients with corresponding EHR data and high-resolution computed tomography (CT) scans labeled for pulmonary embolism. We evaluate several representative multimodal fusion models and benchmark their fairness properties across protected subgroups, e.g., gender, race/ethnicity, age. Our results suggest that integrating imaging and EHR data can improve classification performance and robustness without introducing large disparities in the true positive rate between population groups.
△ Less
Submitted 26 November, 2021; v1 submitted 23 November, 2021;
originally announced November 2021.
-
LSTM-based approach to detect cyber attacks on market-based congestion management methods
Authors:
Omniyah Gul M Khan,
Amr Youssef,
Ehab El-Saadany,
Magdy Salama
Abstract:
Market-based congestion management methods adopt Demand Side Management (DSM) techniques to alleviate congestion in the day-ahead market. Reliance of these methods on the communication layer makes it prone to cyber attacks affecting the security, reliability, and economic operation of the distribution network. In this paper, we focus on Load Altering Attacks that would compromise the operation of…
▽ More
Market-based congestion management methods adopt Demand Side Management (DSM) techniques to alleviate congestion in the day-ahead market. Reliance of these methods on the communication layer makes it prone to cyber attacks affecting the security, reliability, and economic operation of the distribution network. In this paper, we focus on Load Altering Attacks that would compromise the operation of market-based congestion management methods. A detection technique is proposed using Long Short-term Memory (LSTM) Recurrent Neural Networks (RNN). IEEE 33 bus system is used as a case study to demonstrate the effectiveness of the proposed technique. An accuracy of 97% was obtained proving the capability of using LSTM-RNN to detect a load altering cyber attack compromising aggregators in the network.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Semantic Preserving Bijective Mappings of Mathematical Formulae between Document Preparation Systems and Computer Algebra Systems
Authors:
Howard S. Cohl,
Moritz Schubotz,
Abdou Youssef,
André Greiner-Petter,
Jürgen Gerhard,
Bonita V. Saunders,
Marjorie A. ~McClain
Abstract:
Document preparation systems like LaTeX offer the ability to render mathematical expressions as one would write these on paper. Using LaTeX, LaTeXML, and tools generated for use in the National Institute of Standards (NIST) Digital Library of Mathematical Functions, semantically enhanced mathematical LaTeX markup (semantic LaTeX) is achieved by using a semantic macro set. Computer algebra systems…
▽ More
Document preparation systems like LaTeX offer the ability to render mathematical expressions as one would write these on paper. Using LaTeX, LaTeXML, and tools generated for use in the National Institute of Standards (NIST) Digital Library of Mathematical Functions, semantically enhanced mathematical LaTeX markup (semantic LaTeX) is achieved by using a semantic macro set. Computer algebra systems (CAS) such as Maple and Mathematica use alternative markup to represent mathematical expressions. By taking advantage of Youssef's Part-of-Math tagger and CAS internal representations, we develop algorithms to translate mathematical expressions represented in semantic LaTeX to corresponding CAS representations and vice versa. We have also developed tools for translating the entire Wolfram Encoding Continued Fraction Knowledge and University of Antwerp Continued Fractions for Special Functions datasets, for use in the NIST Digital Repository of Mathematical Formulae. The overall goal of these efforts is to provide semantically enriched standard conforming MathML representations to the public for formulae in digital mathematics libraries. These representations include presentation MathML, content MathML, generic LaTeX, semantic LaTeX, and now CAS representations as well.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Wyner wiretap-like encoding scheme for cyber-physical systems
Authors:
Walter Lucia,
Amr Youssef
Abstract:
In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop…
▽ More
In this study, the authors consider the problem of exchanging secrete messages in cyber-physical systems (CPSs) without resorting to cryptographic solutions. In particular, they consider a CPS where the networked controller wants to send a secrete message to the plant. They show that such a problem can be solved by exploiting a Wyner wiretap-like encoding scheme taking advantage of the closed-loop operations typical of feedback control systems. Specifically, by resorting to the control concept of one-step reachable sets, they first show that a wiretap-like encoding scheme exists whenever there is an asymmetry in the plant model knowledge available to control system (the defender) and to the eavesdropper. The effectiveness of the proposed scheme is confirmed by means of a numerical example. Finally, they conclude the study by presenting open design challenges that can be addressed by the research community to improve, in different directions, the secrete message exchange problem in CPSs
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments
Authors:
Amir Mohammad Naseri,
Walter Lucia,
Mohammad Mannan,
Amr Youssef
Abstract:
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their li…
▽ More
Recently, cloud control systems have gained increasing attention from the research community as a solution to implement networked cyber-physical systems (CPSs). Such an architecture can reduce deployment and maintenance costs albeit at the expense of additional security and privacy concerns. In this paper, first, we discuss state-of-the-art security solutions for cloud control systems and their limitations. Then, we propose a novel control architecture based on Trusted Execution Environments (TEE). We show that such an approach can potentially address major security and privacy issues for cloud-hosted control systems. Finally, we present an implementation setup based on Intel Software Guard Extensions (SGX) and validate its effectiveness on a testbed system.
△ Less
Submitted 31 March, 2021;
originally announced April 2021.
-
Impact of Electric Vehicles Botnets on the Power Grid
Authors:
Omniyah Gul M Khan,
Ehab El-Saadany,
Amr Youssef,
Mostafa Shaaban
Abstract:
The increased penetration of Electric Vehicles (EVs) in the transportation sector has increased the requirement of Fast Charging Direct Current (FCDC) stations to meet customer's speedy charging requirements. However, both charging stations and EVs connection to the communication infrastructure as well as the power grid makes it vulnerable to cyber attacks. In this paper, the vulnerability of the…
▽ More
The increased penetration of Electric Vehicles (EVs) in the transportation sector has increased the requirement of Fast Charging Direct Current (FCDC) stations to meet customer's speedy charging requirements. However, both charging stations and EVs connection to the communication infrastructure as well as the power grid makes it vulnerable to cyber attacks. In this paper, the vulnerability of the EV charging process is initially studied. We then show how a botnet of compromised EVs and FCDC stations can be utilized to launch cyber attacks on the power grid resulting in an increase in the load at a specific time. The effect of such attacks on the distribution network in terms of line congestion and voltage limit violations is investigated. Moreover, the effect of the botnet of the transmission network is also studied.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions
Authors:
S. Ali,
M. Elgharabawy,
Q. Duchaussoy,
M. Mannan,
A. Youssef
Abstract:
For parents of young children and adolescents, the digital age has introduced many new challenges, including excessive screen time, inappropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on numerous parental control solutions on different platforms, including parental control network devices (e.g., WiFi routers) and software applications on…
▽ More
For parents of young children and adolescents, the digital age has introduced many new challenges, including excessive screen time, inappropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on numerous parental control solutions on different platforms, including parental control network devices (e.g., WiFi routers) and software applications on mobile devices and laptops. While these parental control solutions may help digital parenting, they may also introduce serious security and privacy risks to children and parents, due to their elevated privileges and having access to a significant amount of privacy-sensitive data. In this paper, we present an experimental framework for systematically evaluating security and privacy issues in parental control software and hardware solutions. Using the developed framework, we provide the first comprehensive study of parental control tools on multiple platforms including network devices, Windows applications, Chrome extensions and Android apps. Our analysis uncovers pervasive security and privacy issues that can lead to leakage of private information, and/or allow an adversary to fully control the parental control solution, and thereby may directly aid cyberbullying and cyber predators.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks
Authors:
Mohammed Elbayoumi,
Walaa Hamouda,
Amr Youssef
Abstract:
Coexistence of Human-Type Communications (HTCs) and Machine-Type Communications (MTCs) is inevitable. Ultra-Dense Networks (UDNs) will be efficacious in supporting both types of communications. In a UDN, a massive number of low-power and low-cost Small Cells (SCs) are deployed with density higher than that of the HTC users. In such a scenario, the backhaul capacities constitute an intrinsic bottle…
▽ More
Coexistence of Human-Type Communications (HTCs) and Machine-Type Communications (MTCs) is inevitable. Ultra-Dense Networks (UDNs) will be efficacious in supporting both types of communications. In a UDN, a massive number of low-power and low-cost Small Cells (SCs) are deployed with density higher than that of the HTC users. In such a scenario, the backhaul capacities constitute an intrinsic bottleneck for the system. Hence, we propose a multiple association scheme where each HTC user associates to and activates multiple SCs to overcome the backhaul capacity constraints. In addition, having more active cells allows for more MTC devices to be supported by the network. Using tools from stochastic geometry, we formulate a novel mathematical framework investigating the performance of the limited-backhaul capacity UDN in terms of Area Spectral Efficiency (ASE) for both HTC and MTC and the density of supported MTC devices. Extensive simulations were conducted to verify the accuracy of the mathematical analysis under different system parameters. Results show the existence of an optimum number of SCs to which an HTC user may connect under backhaul capacity constraints. Besides, the proposed multiple association scheme significantly improves the performance of MTC in terms of both ASE and density of supported devices.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Further study on the conformable fractional Gauss hypergeometric function
Authors:
Mahmoud Abul-Ez,
Mohra Zayed,
Ali Youssef
Abstract:
This paper presents a somewhat exhaustive study on the conformable fractional Gauss hypergeometric function (CFGHF). We start by solving the conformable fractional Gauss hypergeometric equation (CFGHE) about the fractional regular singular points $x=1$ and $x=\infty$. Next, various generating functions of the CFGHF are established. We also develop some differential forms for the CFGHF. Subsequentl…
▽ More
This paper presents a somewhat exhaustive study on the conformable fractional Gauss hypergeometric function (CFGHF). We start by solving the conformable fractional Gauss hypergeometric equation (CFGHE) about the fractional regular singular points $x=1$ and $x=\infty$. Next, various generating functions of the CFGHF are established. We also develop some differential forms for the CFGHF. Subsequently, differential operators and the contiguous relations are reported. Furthermore, we introduce the conformable fractional integral representation and the fractional Laplace transform of CFGHF. As an application, and after making a suitable change of the independent variable, we provide general solutions of some known conformable fractional differential equations, which could be written by means of the CFGHF.
△ Less
Submitted 25 September, 2020;
originally announced September 2020.
-
On conformable fractional Legendre polynomials and their convergence properties with applications
Authors:
Mhmoud Abul-Ez,
Ali Youssef,
Mohra Zayed,
Manuel De la Sen
Abstract:
The main objective of this paper is to give a wide study on the conformable fractional Legendre polynomials (CFLPs). This study is assumed to be a generalization and refinement, in an easy way, of the scalar case into the context of the conformable fractional differentiation. We introduce the CFLPs via different generating functions and provide some of their main properties and convergence results…
▽ More
The main objective of this paper is to give a wide study on the conformable fractional Legendre polynomials (CFLPs). This study is assumed to be a generalization and refinement, in an easy way, of the scalar case into the context of the conformable fractional differentiation. We introduce the CFLPs via different generating functions and provide some of their main properties and convergence results. Subsequently, some pure recurrence and differential recurrence relations, Laplace's first integral formula and orthogonal properties are then developed for CFLPs. We append our study with presenting shifted CFLPs and describing applicable scheme using the collocation method to solve some fractional differential equations (FDEs) in the sense of conformable derivative. Some useful examples of FDEs are treated to support our theoretical results and examining their exact solutions. To the best of our knowledge, the obtained results are newly presented and could enrich the fractional theory of special functions.
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
Classification and Clustering of arXiv Documents, Sections, and Abstracts, Comparing Encodings of Natural and Mathematical Language
Authors:
Philipp Scharpf,
Moritz Schubotz,
Abdou Youssef,
Felix Hamborg,
Norman Meuschke,
Bela Gipp
Abstract:
In this paper, we show how selecting and combining encodings of natural and mathematical language affect classification and clustering of documents with mathematical content. We demonstrate this by using sets of documents, sections, and abstracts from the arXiv preprint server that are labeled by their subject class (mathematics, computer science, physics, etc.) to compare different encodings of t…
▽ More
In this paper, we show how selecting and combining encodings of natural and mathematical language affect classification and clustering of documents with mathematical content. We demonstrate this by using sets of documents, sections, and abstracts from the arXiv preprint server that are labeled by their subject class (mathematics, computer science, physics, etc.) to compare different encodings of text and formulae and evaluate the performance and runtimes of selected classification and clustering algorithms. Our encodings achieve classification accuracies up to $82.8\%$ and cluster purities up to $69.4\%$ (number of clusters equals number of classes), and $99.9\%$ (unspecified number of clusters) respectively. We observe a relatively low correlation between text and math similarity, which indicates the independence of text and formulae and motivates treating them as separate features of a document. The classification and clustering can be employed, e.g., for document search and recommendation. Furthermore, we show that the computer outperforms a human expert when classifying documents. Finally, we evaluate and discuss multi-label classification and formula semantification.
△ Less
Submitted 22 May, 2020;
originally announced May 2020.
-
On-the-fly Detection of User Engagement Decrease in Spontaneous Human-Robot Interaction, International Journal of Social Robotics, 2019
Authors:
Atef Ben Youssef,
Giovanna Varni,
Slim Essid,
Chloé Clavel
Abstract:
In this paper, we consider the detection of a decrease of engagement by users spontaneously interacting with a socially assistive robot in a public space. We first describe the UE-HRI dataset that collects spontaneous Human-Robot Interactions following the guidelines provided by the Affective Computing research community to collect data "in-the-wild". We then analyze the users' behaviors, focusing…
▽ More
In this paper, we consider the detection of a decrease of engagement by users spontaneously interacting with a socially assistive robot in a public space. We first describe the UE-HRI dataset that collects spontaneous Human-Robot Interactions following the guidelines provided by the Affective Computing research community to collect data "in-the-wild". We then analyze the users' behaviors, focusing on proxemics, gaze, head motion, facial expressions and speech during interactions with the robot. Finally, we investigate the use of deep learning techniques (Recurrent and Deep Neural Networks) to detect user engagement decrease in realtime. The results of this work highlight, in particular, the relevance of taking into account the temporal dynamics of a user's behavior. Allowing 1 to 2 seconds as buffer delay improves the performance of taking a decision on user engagement.
△ Less
Submitted 20 April, 2020;
originally announced April 2020.
-
A Framework for Cloud Security Risk Management Based on the Business Objectives of Organizations
Authors:
Ahmed E. Youssef
Abstract:
Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed. Hence, no matter how strongly the cloud model is secured, organizations continue suffering from lack of trust on CC and r…
▽ More
Security is considered one of the top ranked risks of Cloud Computing (CC) due to the outsourcing of sensitive data onto a third party. In addition, the complexity of the cloud model results in a large number of heterogeneous security controls that must be consistently managed. Hence, no matter how strongly the cloud model is secured, organizations continue suffering from lack of trust on CC and remain uncertain about its security risk consequences. Traditional risk management frameworks do not consider the impact of CC security risks on the business objectives of the organizations. In this paper, we propose a novel Cloud Security Risk Management Framework (CSRMF) that helps organizations adopting CC identify, analyze, evaluate, and mitigate security risks in their Cloud platforms. Unlike traditional risk management frameworks, CSRMF is driven by the business objectives of the organizations. It allows any organization adopting CC to be aware of cloud security risks and align their low-level management decisions according to high-level business objectives. In essence, it is designed to address impacts of cloud-specific security risks into business objectives in a given organization. Consequently, organizations are able to conduct a cost-value analysis regarding the adoption of CC technology and gain an adequate level of confidence in Cloud technology. On the other hand, Cloud Service Providers (CSP) are able to improve productivity and profitability by managing cloud-related risks. The proposed framework has been validated and evaluated through a use-case scenario.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Query Expansion for Patent Searching using Word Embedding and Professional Crowdsourcing
Authors:
Arthi Krishna,
Ye Jin,
Christine Foster,
Greg Gabel,
Britt Hanley,
Abdou Youssef
Abstract:
The patent examination process includes a search of previous work to verify that a patent application describes a novel invention. Patent examiners primarily use keyword-based searches to uncover prior art. A critical part of keyword searching is query expansion, which is the process of including alternate terms such as synonyms and other related words, since the same concepts are often described…
▽ More
The patent examination process includes a search of previous work to verify that a patent application describes a novel invention. Patent examiners primarily use keyword-based searches to uncover prior art. A critical part of keyword searching is query expansion, which is the process of including alternate terms such as synonyms and other related words, since the same concepts are often described differently in the literature. Patent terminology is often domain specific. By curating technology-specific corpora and training word embedding models based on these corpora, we are able to automatically identify the most relevant expansions of a given word or phrase. We compare the performance of several automated query expansion techniques against expert specified expansions. Furthermore, we explore a novel mechanism to extract related terms not just based on one input term but several terms in conjunction by computing their centroid and identifying the nearest neighbors to this centroid. Highly skilled patent examiners are often the best and most reliable source of identifying related terms. By designing a user interface that allows examiners to interact with the word embedding suggestions, we are able to use these interactions to power crowdsourced modes of related terms. Learning from users allows us to overcome several challenges such as identifying words that are bleeding edge and have not been published in the corpus yet. This paper studies the effectiveness of word embedding and crowdsourced models across 11 disparate technical areas.
△ Less
Submitted 14 November, 2019;
originally announced November 2019.
-
On Privacy Risks of Public WiFi Captive Portals
Authors:
Suzan Ali,
Tousif Osman,
Mohammad Mannan,
Amr Youssef
Abstract:
Open access WiFi hotspots are widely deployed in many public places, including restaurants, parks, coffee shops, shopping malls, trains, airports, hotels, and libraries. While these hotspots provide an attractive option to stay connected, they may also track user activities and share user/device information with third-parties, through the use of trackers in their captive portal and landing website…
▽ More
Open access WiFi hotspots are widely deployed in many public places, including restaurants, parks, coffee shops, shopping malls, trains, airports, hotels, and libraries. While these hotspots provide an attractive option to stay connected, they may also track user activities and share user/device information with third-parties, through the use of trackers in their captive portal and landing websites. In this paper, we present a comprehensive privacy analysis of 67 unique public WiFi hotspots located in Montreal, Canada, and shed some light on the web tracking and data collection behaviors of these hotspots. Our study reveals the collection of a significant amount of privacy-sensitive personal data through the use of social login (e.g., Facebook and Google) and registration forms, and many instances of tracking activities, sometimes even before the user accepts the hotspot's privacy and terms of service policies. Most hotspots use persistent third-party tracking cookies within their captive portal site; these cookies can be used to follow the user's browsing behavior long after the user leaves the hotspots, e.g., up to 20 years. Additionally, several hotspots explicitly share (sometimes via HTTP) the collected personal and unique device information with many third-party tracking domains.
△ Less
Submitted 3 July, 2019;
originally announced July 2019.
-
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Authors:
Hisham S. Galal,
Amr M. Youssef
Abstract:
The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bidders are motivated to submit their own monetary valuations without leaking their information to the competitors. Recent constructions have utilized various cryptographic protocols such as ZKP and MPC,…
▽ More
The wide deployment of tokens for digital assets on top of Ethereum implies the need for powerful trading platforms. Vickrey auctions have been known to determine the real market price of items as bidders are motivated to submit their own monetary valuations without leaking their information to the competitors. Recent constructions have utilized various cryptographic protocols such as ZKP and MPC, however, these approaches either are partially privacy-preserving or require complex computations with several rounds. In this paper, we overcome these limits by presenting Trustee as a Vickrey auction on Ethereum which fully preserves bids' privacy at relatively much lower fees. Trustee consists of three components: a front-end smart contract deployed on Ethereum, an Intel SGX enclave, and a relay to redirect messages between them. Initially, the enclave generates an Ethereum account and ECDH key-pair. Subsequently, the relay publishes the account's address and ECDH public key on the smart contract. As a prerequisite, bidders are encouraged to verify the authenticity and security of Trustee by using the SGX remote attestation service. To participate in the auction, bidders utilize the ECDH public key to encrypt their bids and submit them to the smart contract. Once the bidding interval is closed, the relay retrieves the encrypted bids and feeds them to the enclave that autonomously generates a signed transaction indicating the auction winner. Finally, the relay submits the transaction to the smart contract which verifies the transaction's authenticity and the parameters' consistency before accepting the claimed auction winner. As part of our contributions, we have made a prototype for Trustee available on Github for the community to review and inspect it. Additionally, we analyze the security features of Trustee and report on the transactions' gas cost incurred on Trustee smart contract.
△ Less
Submitted 15 May, 2019;
originally announced May 2019.
-
The Sorry State of TLS Security in Enterprise Interception Appliances
Authors:
Louis Waked,
Mohammad Mannan,
Amr Youssef
Abstract:
Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. Reasons for doing so are primarily related to improving enterprise security (e.g., malware detection) and meeting legal requirements. To analyze TLS-encrypted data, network appliances implement a Man-in-the-Middle TLS proxy, by acting as the intended web server to a requesting client (e.g., a browser…
▽ More
Network traffic inspection, including TLS traffic, in enterprise environments is widely practiced. Reasons for doing so are primarily related to improving enterprise security (e.g., malware detection) and meeting legal requirements. To analyze TLS-encrypted data, network appliances implement a Man-in-the-Middle TLS proxy, by acting as the intended web server to a requesting client (e.g., a browser), and acting as the client to the outside web server. As such, the TLS proxy must implement both a TLS client and a server, and handle a large amount of traffic, preferably, in real-time. However, as protocol and implementation layer vulnerabilities in TLS/HTTPS are quite frequent, these proxies must be, at least, as secure as a modern, up-to-date web browser, and a properly configured web server. As opposed to client-end TLS proxies (e.g., as in several anti-virus products), the proxies in network appliances may serve hundreds to thousands of clients, and any vulnerability in their TLS implementations can significantly downgrade enterprise security.
To analyze TLS security of network appliances, we develop a comprehensive framework, by combining and extending tests from existing work on client-end and network-based interception studies. We analyze thirteen representative network appliances over a period of more than a year (including versions before and after notifying affected vendors, a total of 17 versions), and uncover several security issues. For instance, we found that four appliances perform no certificate validation at all, three use pre-generated certificates, and eleven accept certificates signed using MD5, exposing their clients to MITM attacks. Our goal is to highlight the risks introduced by widely-used TLS proxies in enterprise and government environments, potentially affecting many systems hosting security, privacy, and financially sensitive data.
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys
Authors:
Sharon Shasha,
Moustafa Mahmoud,
Mohammad Mannan,
Amr Youssef
Abstract:
Smart toys have captured an increasing share of the toy market, and are growing ubiquitous in households with children. Smart toys are a subset of Internet of Things (IoT) devices, containing sensors, actuators, and/or artificial intelligence capabilities. They frequently have internet connectivity, directly or indirectly through companion apps, and collect information about their users and enviro…
▽ More
Smart toys have captured an increasing share of the toy market, and are growing ubiquitous in households with children. Smart toys are a subset of Internet of Things (IoT) devices, containing sensors, actuators, and/or artificial intelligence capabilities. They frequently have internet connectivity, directly or indirectly through companion apps, and collect information about their users and environments. Recent studies have found security flaws in many smart toys that have led to serious privacy leaks, or allowed tracking a child's physical location. Some well-publicized discoveries of this nature have prompted actions from governments around the world to ban some of these toys. Compared to other IoT devices, smart toys pose unique risks because of their easily-vulnerable user base, and our work is intended to define these risks and assess a subset of toys against them. We provide a classification of threats specific to smart toys in order to unite and complement existing adhoc analyses, and help comprehensive evaluation of other smart toys. Our threat classification framework addresses the potential security and privacy flaws that can lead to leakage of private information or allow an adversary to control the toy to lure, harm, or distress a child. Using this framework, we perform a thorough experimental analysis of eleven smart toys and their companion apps. Our systematic analysis has uncovered that several current toys still expose children to multiple threats for attackers with physical, nearby, or remote access to the toy.
△ Less
Submitted 25 October, 2018; v1 submitted 14 September, 2018;
originally announced September 2018.
-
A novel recommendation system to match college events and groups to students
Authors:
Kazem Qazanfari,
Abdou Youssef,
Kai Keane,
Joseph Nelson
Abstract:
With the recent increase in data online, discovering meaningful opportunities can be time-consuming and complicated for many individuals. To overcome this data overload challenge, we present a novel text-content-based recommender system as a valuable tool to predict user interests. To that end, we develop a specific procedure to create user models and item feature-vectors, where items are describe…
▽ More
With the recent increase in data online, discovering meaningful opportunities can be time-consuming and complicated for many individuals. To overcome this data overload challenge, we present a novel text-content-based recommender system as a valuable tool to predict user interests. To that end, we develop a specific procedure to create user models and item feature-vectors, where items are described in free text. The user model is generated by soliciting from a user a few keywords and expanding those keywords into a list of weighted near-synonyms. The item feature-vectors are generated from the textual descriptions of the items, using modified tf-idf values of the users' keywords and their near-synonyms. Once the users are modeled and the items are abstracted into feature vectors, the system returns the maximum-similarity items as recommendations to that user. Our experimental evaluation shows that our method of creating the user models and item feature-vectors resulted in higher precision and accuracy in comparison to well-known feature-vector-generating methods like Glove and Word2Vec. It also shows that stemming and the use of a modified version of tf-idf increase the accuracy and precision by 2% and 3%, respectively, compared to non-stemming and the standard tf-idf definition. Moreover, the evaluation results show that updating the user model from usage histories improves the precision and accuracy of the system. This recommender system has been developed as part of the Agnes application, which runs on iOS and Android platforms and is accessible through the Agnes website.
△ Less
Submitted 26 September, 2017; v1 submitted 24 September, 2017;
originally announced September 2017.
-
The EUSO@TurLab Project
Authors:
H. Miyamoto,
M. Bertaina,
G. Cotto,
R. Forza,
M. Manfrin,
M. Mignone,
G. Suino,
A. Youssef,
R. Caruso,
G. Contino,
S. Bacholle,
P. Gorodetzky,
A. Jung,
E. Parizot,
G. Prevôt,
P. Barrillon,
S. Dagoret-Campagne,
J. Rabanal Reina,
S. Blin
Abstract:
The TurLab facility is a laboratory, equipped with a 5 m diameter and 1 m depth rotating tank, located in the Physics Department of the University of Turin. The tank has been built mainly to study problems where system rotation plays a key role in the fluid behaviour such as in atmospheric and oceanic flows at different scales. The tank can be filled with different fluids of variable density, whic…
▽ More
The TurLab facility is a laboratory, equipped with a 5 m diameter and 1 m depth rotating tank, located in the Physics Department of the University of Turin. The tank has been built mainly to study problems where system rotation plays a key role in the fluid behaviour such as in atmospheric and oceanic flows at different scales. The tank can be filled with different fluids of variable density, which enables studies in layered conditions such as sea waves. The tank can be also used to simulate the terrestrial surface with the optical characteristics of different environments such as snow, grass, ocean, land with soil, stones etc., fogs and clouds. As it is located in an extremely dark place, the light intensity can be controlled artificially. Such capabilities of the TurLab facility are applied to perform experiments related to the observation of Extreme Energy Cosmic Rays (EECRs) from space using the fluorescence technique, as in the case of the JEM-EUSO mission, where the diffuse night brightness and artificial light sources can vary significantly in time and space inside the Field of View (FoV) of the telescope. Here we will report the currently ongoing activity at the TurLab facility in the framework of the JEM-EUSO mission (EUSO@TurLab).
△ Less
Submitted 26 January, 2017;
originally announced January 2017.
-
Universal statistics of selected values
Authors:
Matteo Smerlak,
Ahmed Youssef
Abstract:
Selection, the tendency of some traits to become more frequent than others in a population under the influence of some (natural or artificial) agency, is a key component of Darwinian evolution and countless other natural and social phenomena. Yet a general theory of selection, analogous to the Fisher-Tippett-Gnedenko theory of extreme events, is lacking. Here we introduce a probabilistic definitio…
▽ More
Selection, the tendency of some traits to become more frequent than others in a population under the influence of some (natural or artificial) agency, is a key component of Darwinian evolution and countless other natural and social phenomena. Yet a general theory of selection, analogous to the Fisher-Tippett-Gnedenko theory of extreme events, is lacking. Here we introduce a probabilistic definition of selection and show that selected values are attracted to a universal family of limiting distributions. The universality classes and scaling exponents are determined by the tail thickness of the random variable under selection. Our results are supported by data from molecular biology, agriculture and sport.
△ Less
Submitted 2 December, 2016;
originally announced December 2016.
-
Limiting fitness distributions in evolutionary dynamics
Authors:
Matteo Smerlak,
Ahmed Youssef
Abstract:
Darwinian evolution can be modeled in general terms as a flow in the space of fitness (i.e. reproductive rate) distributions. In the diffusion approximation, Tsimring et al. have showed that this flow admits "fitness wave" solutions: Gaussian-shape fitness distributions moving towards higher fitness values at constant speed. Here we show more generally that evolving fitness distributions are attra…
▽ More
Darwinian evolution can be modeled in general terms as a flow in the space of fitness (i.e. reproductive rate) distributions. In the diffusion approximation, Tsimring et al. have showed that this flow admits "fitness wave" solutions: Gaussian-shape fitness distributions moving towards higher fitness values at constant speed. Here we show more generally that evolving fitness distributions are attracted to a one-parameter family of distributions with a fixed parabolic relationship between skewness and kurtosis. Unlike fitness waves, this statistical pattern encompasses both positive and negative (a.k.a. purifying) selection and is not restricted to rapidly adapting populations. Moreover we find that the mean fitness of a population under the selection of pre-existing variation is a power-law function of time, as observed in microbiological evolution experiments but at variance with fitness wave theory. At the conceptual level, our results can be viewed as the resolution of the "dynamic insufficiency" of Fisher's fundamental theorem of natural selection. Our predictions are in good agreement with numerical simulations.
△ Less
Submitted 16 February, 2016; v1 submitted 1 November, 2015;
originally announced November 2015.
-
Using atom probe tomography to understand Schottky barrier height pinning at the ZnO:Al / SiO2 / Si interface
Authors:
R. Jaramillo,
Amanda Youssef,
Austin Akey,
Frank Schoofs,
Shriram Ramanathan,
Tonio Buonassisi
Abstract:
We use electronic transport and atom probe tomography to study ZnO:Al / SiO2 / Si Schottky junctions on lightly-doped n- and p-type Si. We vary the carrier concentration in the the ZnO:Al films by two orders of magnitude but the Schottky barrier height remains constant, consistent with Fermi level pinning seen in metal / Si junctions. Atom probe tomography shows that Al segregates to the interface…
▽ More
We use electronic transport and atom probe tomography to study ZnO:Al / SiO2 / Si Schottky junctions on lightly-doped n- and p-type Si. We vary the carrier concentration in the the ZnO:Al films by two orders of magnitude but the Schottky barrier height remains constant, consistent with Fermi level pinning seen in metal / Si junctions. Atom probe tomography shows that Al segregates to the interface, so that the ZnO:Al at the junction is likely to be metallic even when the bulk of the ZnO:Al film is semiconducting. We hypothesize that Fermi level pinning is connected to the insulator-metal transition in doped ZnO, and that controlling this transition may be key to un-pinning the Fermi level in oxide / Si Schottky junctions.
△ Less
Submitted 29 October, 2015;
originally announced October 2015.
-
Performance Evaluation and Optimization of Math-Similarity Search
Authors:
Qun Zhang,
Abdou Youssef
Abstract:
Similarity search in math is to find mathematical expressions that are similar to a user's query. We conceptualized the similarity factors between mathematical expressions, and proposed an approach to math similarity search (MSS) by defining metrics based on those similarity factors [11]. Our preliminary implementation indicated the advantage of MSS compared to non-similarity based search. In orde…
▽ More
Similarity search in math is to find mathematical expressions that are similar to a user's query. We conceptualized the similarity factors between mathematical expressions, and proposed an approach to math similarity search (MSS) by defining metrics based on those similarity factors [11]. Our preliminary implementation indicated the advantage of MSS compared to non-similarity based search. In order to more effectively and efficiently search similar math expressions, MSS is further optimized. This paper focuses on performance evaluation and optimization of MSS. Our results show that the proposed optimization process significantly improved the performance of MSS with respect to both relevance ranking and recall.
△ Less
Submitted 29 May, 2015;
originally announced May 2015.
-
Coding theory applied to KU-algebras
Authors:
Samy M. Mostafa,
Bayumy A. Youssef,
Hussein A. Jad
Abstract:
The notion of a KU-valued function on a set is introduced and related properties are investigated. Codes generated by KU-valued functions are established. Moreover, we will provide an algorithm which allows us to find a KU-algebra starting from a given binary block code.
The notion of a KU-valued function on a set is introduced and related properties are investigated. Codes generated by KU-valued functions are established. Moreover, we will provide an algorithm which allows us to find a KU-algebra starting from a given binary block code.
△ Less
Submitted 17 May, 2015;
originally announced May 2015.
-
A Framework for a Smart Social Blood Donation System Based on Mobile Cloud Computing
Authors:
Almetwally M. Mostafa,
Ahmed E. Youssef,
Gamal Alshorbagy
Abstract:
Blood Donation and Blood Transfusion Services (BTS) are crucial for saving people lives. Recently, worldwide efforts have been undertaken to utilize social media and smartphone applications to make the blood donation process more convenient, offer additional services, and create communities around blood donation centers. Blood banks suffer frequent shortage of blood; hence, advertisements are freq…
▽ More
Blood Donation and Blood Transfusion Services (BTS) are crucial for saving people lives. Recently, worldwide efforts have been undertaken to utilize social media and smartphone applications to make the blood donation process more convenient, offer additional services, and create communities around blood donation centers. Blood banks suffer frequent shortage of blood; hence, advertisements are frequently seen on social networks urging healthy individuals to donate blood for patients who urgently require blood transfusion. The blood donation process usually consumes a lot of time and effort from both donors and medical staff since there is no concrete information system that allows donors and blood donation centers communicate efficiently and coordinate with each other to minimize time and effort required for blood donation process. Moreover, most blood banks work in isolation and are not integrated with other blood donation centers and health organizations which affect the blood donation and blood transfusion services quality. This work aims at developing a Blood Donation System (BDS) based on the cutting-edge information technologies of cloud computing and mobile computing.
△ Less
Submitted 8 April, 2019; v1 submitted 23 December, 2014;
originally announced December 2014.
-
Resummation of infrared logarithms in de Sitter space via Dyson-Schwinger equations: the ladder-rainbow approximation
Authors:
Ahmed Youssef,
Dirk Kreimer
Abstract:
We study the infrared (large separation) behavior of a massless minimally coupled scalar quantum field theory with a quartic self interaction in de Sitter spacetime. We show that the perturbation series in the interaction strength is singular and secular, i.e. it does not lead to a uniform approximation of the solution in the infrared region. Only a nonperturbative resummation can capture the corr…
▽ More
We study the infrared (large separation) behavior of a massless minimally coupled scalar quantum field theory with a quartic self interaction in de Sitter spacetime. We show that the perturbation series in the interaction strength is singular and secular, i.e. it does not lead to a uniform approximation of the solution in the infrared region. Only a nonperturbative resummation can capture the correct infrared behavior. We seek to justify this picture using the Dyson-Schwinger equations in the ladder-rainbow approximation. We are able to write down an ordinary differential equation obeyed by the two-point function and perform its asymptotic analysis. Indeed, while the perturbative series-truncated at any finite order-is growing in the infrared, the full nonperturbative sum can be decaying.
△ Less
Submitted 7 August, 2014; v1 submitted 14 January, 2013;
originally announced January 2013.
-
Anomaly Detection in Time Series of Graphs using Fusion of Graph Invariants
Authors:
Youngser Park,
Carey E. Priebe,
Abdou Youssef
Abstract:
Given a time series of graphs G(t) = (V, E(t)), t = 1, 2, ..., where the fixed vertex set V represents "actors" and an edge between vertex u and vertex v at time t (uv \in E(t)) represents the existence of a communications event between actors u and v during the tth time period, we wish to detect anomalies and/or change points. We consider a collection of graph features, or invariants, and demonst…
▽ More
Given a time series of graphs G(t) = (V, E(t)), t = 1, 2, ..., where the fixed vertex set V represents "actors" and an edge between vertex u and vertex v at time t (uv \in E(t)) represents the existence of a communications event between actors u and v during the tth time period, we wish to detect anomalies and/or change points. We consider a collection of graph features, or invariants, and demonstrate that adaptive fusion provides superior inferential efficacy compared to naive equal weighting for a certain class of anomaly detection problems. Simulation results using a latent process model for time series of graphs, as well as illustrative experimental results for a time series of graphs derived from the Enron email data, show that a fusion statistic can provide superior inference compared to individual invariants alone. These results also demonstrate that an adaptive weighting scheme for fusion of invariants performs better than naive equal weighting.
△ Less
Submitted 31 October, 2012;
originally announced October 2012.
-
Self-organization without heat: the geometric ratchet effect
Authors:
Matteo Smerlak,
Ahmed Youssef
Abstract:
We point out a surprising feature of diffusion in inhomogeneous media: under suitable conditions, the rectification of the Brownian paths by a diffusivity gradient can result in initially spread tracers spontaneously concentrating. This "geometric ratchet effect" demonstrates that, in violation of the classical statements of the second law of (non-equilibrium) thermodynamics, self-organization can…
▽ More
We point out a surprising feature of diffusion in inhomogeneous media: under suitable conditions, the rectification of the Brownian paths by a diffusivity gradient can result in initially spread tracers spontaneously concentrating. This "geometric ratchet effect" demonstrates that, in violation of the classical statements of the second law of (non-equilibrium) thermodynamics, self-organization can take place in thermodynamic systems at local equilibrium without heat being produced or exchanged with the environment. We stress the role of Bayesian priors in a suitable reformulation of the second law accommodating this geometric ratchet effect.
△ Less
Submitted 15 June, 2012;
originally announced June 2012.
-
Do scale-invariant fluctuations imply the breaking of de Sitter invariance?
Authors:
Ahmed Youssef
Abstract:
The quantization of the massless minimally coupled (mmc) scalar field in de Sitter spacetime is known to be a non-trivial problem due to the appearance of strong infrared (IR) effects. In particular, the scale-invariance of the CMB power-spectrum - certainly one of the most successful predictions of modern cosmology - is widely believed to be inconsistent with a de Sitter invariant mmc two-point f…
▽ More
The quantization of the massless minimally coupled (mmc) scalar field in de Sitter spacetime is known to be a non-trivial problem due to the appearance of strong infrared (IR) effects. In particular, the scale-invariance of the CMB power-spectrum - certainly one of the most successful predictions of modern cosmology - is widely believed to be inconsistent with a de Sitter invariant mmc two-point function.
Using a Cesaro-summability technique to properly define an otherwise divergent Fourier transform, we show in this Letter that de Sitter symmetry breaking is \emph{not} a necessary consequence of the scale-invariant fluctuation spectrum. We also generalize our result to the tachyonic scalar fields, i.e the discrete series of representations of the de Sitter group, that suffer from similar strong IR effects.
△ Less
Submitted 14 March, 2012;
originally announced March 2012.
-
Lorentz-violating vs ghost gravitons: the example of Weyl gravity
Authors:
Nathalie Deruelle,
Misao Sasaki,
Yuuiti Sendouda,
Ahmed Youssef
Abstract:
We show that the ghost degrees of freedom of Einstein gravity with a Weyl term can be eliminated by a simple mechanism that invokes local Lorentz symmetry breaking. We demonstrate how the mechanism works in a cosmological setting. The presence of the Weyl term forces a redefinition of the quantum vacuum state of the tensor perturbations. As a consequence the amplitude of their spectrum blows up wh…
▽ More
We show that the ghost degrees of freedom of Einstein gravity with a Weyl term can be eliminated by a simple mechanism that invokes local Lorentz symmetry breaking. We demonstrate how the mechanism works in a cosmological setting. The presence of the Weyl term forces a redefinition of the quantum vacuum state of the tensor perturbations. As a consequence the amplitude of their spectrum blows up when the Lorentz-violating scale becomes comparable to the Hubble radius. Such a behaviour is in sharp contrast to what happens in standard Weyl gravity where the gravitational ghosts smoothly damp out the spectrum of primordial gravitational waves.
△ Less
Submitted 14 February, 2012;
originally announced February 2012.
-
New SUSYQM coherent states for Poschl-Teller potentials: a detailed mathematical analysis
Authors:
H. Bergeron,
P. Siegl,
A. Youssef
Abstract:
In a recent short note [Bergeron H, Gazeau J P, Siegl P and Youssef A 2010 EPL 92 60003], we have presented the nice properties of a new family of semi-classical states for Pöschl-Teller potentials. These states are built from a supersymmetric quantum mechanics approach and the parameters of these "coherent" states are points in the classical phase space. In this article we develop all the mathema…
▽ More
In a recent short note [Bergeron H, Gazeau J P, Siegl P and Youssef A 2010 EPL 92 60003], we have presented the nice properties of a new family of semi-classical states for Pöschl-Teller potentials. These states are built from a supersymmetric quantum mechanics approach and the parameters of these "coherent" states are points in the classical phase space. In this article we develop all the mathematical aspects that have been left apart in the previous article (proof of the resolution of unity, detailed calculations of quantized version of classical observables and mathematical study of the resulting operators: problems of domains, self- adjointness or self-adjoint extensions). Some additional questions as asymptotic behavior are also studied. Moreover, the framework is extended to a larger class of Pöschl-Teller potentials.
△ Less
Submitted 2 February, 2012; v1 submitted 5 December, 2011;
originally announced December 2011.
-
To what extent are canonical and coherent state quantizations physically equivalent?
Authors:
Hervé Bergeron,
Jean-Pierre Gazeau,
Ahmed Youssef
Abstract:
We investigate the consistency of coherent state (or Berezin-Klauder-Toeplitz, or anti-Wick) quantization in regard to physical observations in the non- relativistic (or Galilean) regime. We compare this procedure with the canonical quantization (on both mathematical and physical levels) and examine whether they are or not equivalent in their predictions: is it possible to dif- ferentiate them on…
▽ More
We investigate the consistency of coherent state (or Berezin-Klauder-Toeplitz, or anti-Wick) quantization in regard to physical observations in the non- relativistic (or Galilean) regime. We compare this procedure with the canonical quantization (on both mathematical and physical levels) and examine whether they are or not equivalent in their predictions: is it possible to dif- ferentiate them on a strictly physical level? As far as only usual dynamical observables (position, momentum, energy, ...) are concerned, the quantization through coherent states is proved to be a perfectly valid alternative. We successfully put to the test the validity of CS quantization in the case of data obtained from vibrational spectroscopy (data that allowed to validate canonical quantization in the early period of Quantum Mechanics).
△ Less
Submitted 14 November, 2012; v1 submitted 17 February, 2011;
originally announced February 2011.
-
Inflation with a Weyl term, or ghosts at work
Authors:
Nathalie Deruelle,
Misao Sasaki,
Yuuiti Sendouda,
Ahmed Youssef
Abstract:
In order to assess the role of ghosts in cosmology, we study the evolution of linear cosmological perturbations during inflation when a Weyl term is added to the action. Our main result is that vector perturbations can no longer be ignored and that scalar modes diverge in the newtonian gauge but remain bounded in the comoving slicing.
In order to assess the role of ghosts in cosmology, we study the evolution of linear cosmological perturbations during inflation when a Weyl term is added to the action. Our main result is that vector perturbations can no longer be ignored and that scalar modes diverge in the newtonian gauge but remain bounded in the comoving slicing.
△ Less
Submitted 23 December, 2010;
originally announced December 2010.
-
Infrared behavior and gauge artifacts in de Sitter spacetime: The photon field
Authors:
Ahmed Youssef
Abstract:
We study the infrared (long distance) behavior of the free photon field in de Sitter spacetime. Using a two-parameter family of gauge fixing terms, we show that the infrared (IR) behavior of the two-point function is highly gauge-dependent and ranges from vanishing to growing. This situation is in disagreement with its counterpart in flat spacetime, where the two-point function vanishes in the IR…
▽ More
We study the infrared (long distance) behavior of the free photon field in de Sitter spacetime. Using a two-parameter family of gauge fixing terms, we show that the infrared (IR) behavior of the two-point function is highly gauge-dependent and ranges from vanishing to growing. This situation is in disagreement with its counterpart in flat spacetime, where the two-point function vanishes in the IR for any choice of the gauge fixing parameters. A criterion to isolate the "physical" part of the two-point function is given and is shown to lead to a well-behaved two-point function in the IR.
△ Less
Submitted 14 July, 2011; v1 submitted 16 November, 2010;
originally announced November 2010.
-
Contactless estimation of critical current density in thin superconducting films and its temperature dependence using ac magnetic measurements
Authors:
Ahmed Youssef,
Lucia Banicova,
Zdenek Svindrych,
Zdenek Janu
Abstract:
We have measured magnetic response of second-generation high temperature superconductor YBa2Cu3Ox wire and Nb thin film in perpendicular ac field as a function of temperature. We compare experimental complex ac susceptibility to the calculated susceptibility based on the model of Bean's critical-state response in two-dimensional (2D) disk in perpendicular field. The harmonic analysis is needed for…
▽ More
We have measured magnetic response of second-generation high temperature superconductor YBa2Cu3Ox wire and Nb thin film in perpendicular ac field as a function of temperature. We compare experimental complex ac susceptibility to the calculated susceptibility based on the model of Bean's critical-state response in two-dimensional (2D) disk in perpendicular field. The harmonic analysis is needed for comparison between the model and the experimental data. We present a method of linking model and experimental susceptibility. Good agreement of experimental susceptibility with model susceptibility of 2D disk allows contactless estimation of critical depinning current density and its temperature dependence.
△ Less
Submitted 6 September, 2010;
originally announced September 2010.
-
Semi-classical behavior of Pöschl-Teller coherent states
Authors:
H. Bergeron,
J. -P. Gazeau,
P. Siegl,
A. Youssef
Abstract:
We present a construction of semi-classical states for Pöschl-Teller potentials based on a supersymmetric quantum mechanics approach. The parameters of these "coherent" states are points in the classical phase space of these systems. They minimize a special uncertainty relation. Like standard coherent states they resolve the identity with a uniform measure. They permit to establish the corresponde…
▽ More
We present a construction of semi-classical states for Pöschl-Teller potentials based on a supersymmetric quantum mechanics approach. The parameters of these "coherent" states are points in the classical phase space of these systems. They minimize a special uncertainty relation. Like standard coherent states they resolve the identity with a uniform measure. They permit to establish the correspondence (quantization) between classical and quantum quantities. Finally, their time evolution is localized on the classical phase space trajectory.
△ Less
Submitted 22 July, 2010;
originally announced July 2010.
-
Krein Spaces in de Sitter Quantum Theories
Authors:
Jean-Pierre Gazeau,
Petr Siegl,
Ahmed Youssef
Abstract:
Experimental evidences and theoretical motivations lead to consider the curved space-time relativity based on the de Sitter group $SO_0(1,4)$ or $Sp(2,2)$ as an appealing substitute to the flat space-time Poincare relativity. Quantum elementary systems are then associated to unitary irreducible representations of that simple Lie group. At the lowest limit of the discrete series lies a remarkable…
▽ More
Experimental evidences and theoretical motivations lead to consider the curved space-time relativity based on the de Sitter group $SO_0(1,4)$ or $Sp(2,2)$ as an appealing substitute to the flat space-time Poincare relativity. Quantum elementary systems are then associated to unitary irreducible representations of that simple Lie group. At the lowest limit of the discrete series lies a remarkable family of scalar representations involving Krein structures and related undecomposable representation cohomology which deserves to be thoroughly studied in view of quantization of the corresponding carrier fields. The purpose of this note is to present the mathematical material needed to examine the problem and to indicate possible extensions of an exemplary case, namely the so-called de Sitterian massless minimally coupled field, i.e. a scalar field in de Sitter space-time which does not couple to the Ricci curvature.
△ Less
Submitted 27 January, 2010;
originally announced January 2010.
-
Overlapping Multi-hop Clustering for Wireless Sensor Networks
Authors:
Moustafa Youssef,
Adel Youssef,
Mohamed Younis
Abstract:
Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Traditionally, clustering algorithms aim at generating a number of disjoint clusters that satisfy some criteria. In this paper, we formulate a novel clustering problem that aims at generating overlapping multi-hop clusters. Overlapping clusters are useful in many sensor network applica…
▽ More
Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Traditionally, clustering algorithms aim at generating a number of disjoint clusters that satisfy some criteria. In this paper, we formulate a novel clustering problem that aims at generating overlapping multi-hop clusters. Overlapping clusters are useful in many sensor network applications, including inter-cluster routing, node localization, and time synchronization protocols. We also propose a randomized, distributed multi-hop clustering algorithm (KOCA) for solving the overlapping clustering problem. KOCA aims at generating connected overlapping clusters that cover the entire sensor network with a specific average overlapping degree. Through analysis and simulation experiments we show how to select the different values of the parameters to achieve the clustering process objectives. Moreover, the results show that KOCA produces approximately equal-sized clusters, which allows distributing the load evenly over different clusters. In addition, KOCA is scalable; the clustering formation terminates in a constant time regardless of the network size.
△ Less
Submitted 25 August, 2009;
originally announced August 2009.
-
Various Hamiltonian formulations of f(R) gravity and their canonical relationships
Authors:
Nathalie Deruelle,
Yuuiti Sendouda,
Ahmed Youssef
Abstract:
Various Hamiltonian formulations of f(R) gravity can be found in the literature. Some authors follow the Ostrogradsky treatment of higher derivative theories and introduce as extra variables first order time derivatives of the metric (typically the extrinsic curvature). Some others take advantage of the conformal equivalence of f(R) theory with Einstein's gravity coupled to a scalar field and in…
▽ More
Various Hamiltonian formulations of f(R) gravity can be found in the literature. Some authors follow the Ostrogradsky treatment of higher derivative theories and introduce as extra variables first order time derivatives of the metric (typically the extrinsic curvature). Some others take advantage of the conformal equivalence of f(R) theory with Einstein's gravity coupled to a scalar field and introduce as an extra variable the scalar curvature R itself, which includes second time derivatives of the metric. We show that, contrarily to some claims, these formulations are related by canonical transformations.
△ Less
Submitted 26 June, 2009;
originally announced June 2009.
-
A discrete nonetheless remarkable brick in de Sitter: the "massless minimally coupled field"
Authors:
Jean-Pierre Gazeau,
Ahmed Youssef
Abstract:
Over the last ten years interest in the physics of de Sitter spacetime has been growing very fast. Besides the supposed existence of a "de sitterian period" in inflation theories, the observational evidence of an acceleration of the universe expansion (interpreted as a positive cosmological constant or a "dark energy" or some form of "quintessence") has triggered a lot of attention in the physic…
▽ More
Over the last ten years interest in the physics of de Sitter spacetime has been growing very fast. Besides the supposed existence of a "de sitterian period" in inflation theories, the observational evidence of an acceleration of the universe expansion (interpreted as a positive cosmological constant or a "dark energy" or some form of "quintessence") has triggered a lot of attention in the physics community. A specific de sitterian field called "massless minimally coupled field" (mmc) plays a fundamental role in inflation models and in the construction of the de sitterian gravitational field. A covariant quantization of the mmc field, `a la Krein-Gupta-Bleuler was proposed in [1]. In this talk, we will review this construction and explain the relevance of such a field in the construction of a massless spin 2 field in de Sitter space-time.
△ Less
Submitted 14 January, 2009;
originally announced January 2009.
-
Coherent state quantization of angle, time, and more irregular functions and distributions
Authors:
Biswajit Chakraborty,
Jean Pierre Gazeau,
Ahmed Youssef
Abstract:
The domain of application of quantization methods is traditionally restricted to smooth classical observables. We show that the coherent states or "anti-Wick" quantization enables us to construct fairly reasonable quantum versions of irregular observables living on the classical phase space, such as the angle function, the time function of a free particle and even a large set of distributions co…
▽ More
The domain of application of quantization methods is traditionally restricted to smooth classical observables. We show that the coherent states or "anti-Wick" quantization enables us to construct fairly reasonable quantum versions of irregular observables living on the classical phase space, such as the angle function, the time function of a free particle and even a large set of distributions comprising the tempered distributions.
△ Less
Submitted 3 December, 2008; v1 submitted 13 May, 2008;
originally announced May 2008.
-
Analysis of Critical State Response in Thin Films by ac Susceptibility Measurements
Authors:
A. Youssef,
Z. Svindrych,
J. Hadac,
Z. Janu
Abstract:
Harmonic analysis of the temperature dependence of the nonlinear ac susceptibility of Nb thin film gives excellent agreement with the susceptibility calculated on basis of model of the hysteretic critical state in 2D disk.
Harmonic analysis of the temperature dependence of the nonlinear ac susceptibility of Nb thin film gives excellent agreement with the susceptibility calculated on basis of model of the hysteretic critical state in 2D disk.
△ Less
Submitted 22 October, 2007;
originally announced October 2007.
-
Phase transitions in some epidemic models defined on small-world networks
Authors:
H. N. Agiza,
A. S. Elgazzar,
S. A. Youssef
Abstract:
Some modified versions of susceptible-infected-recovered-susceptible (SIRS) model are defined on small-world networks. Latency, incubation and variable susceptibility are included, separately. Phase transitions in these models are studied. Then inhomogeneous models are introduced. In some cases, the application of the models to small-world networks is shown to increase the epidemic region.
Some modified versions of susceptible-infected-recovered-susceptible (SIRS) model are defined on small-world networks. Latency, incubation and variable susceptibility are included, separately. Phase transitions in these models are studied. Then inhomogeneous models are introduced. In some cases, the application of the models to small-world networks is shown to increase the epidemic region.
△ Less
Submitted 1 January, 2003;
originally announced January 2003.
-
On the Levi problem with singularities
Authors:
Alaoui Youssef
Abstract:
In section 1, we show that if $X$ is a Stein normal complex space of dimension n and $D\subset \subset X$ an open subset which is the union of an increasing sequence $D_{1}\subset D_{2}\subset ...\subset D_{n}\subset >...$ of domains of holomorphy in $X$. Then $D$ is a domain of holomorphy.
In section 2, we prove that a domain of holomorphy $D$ which is relatively compact in a 2-dimensional no…
▽ More
In section 1, we show that if $X$ is a Stein normal complex space of dimension n and $D\subset \subset X$ an open subset which is the union of an increasing sequence $D_{1}\subset D_{2}\subset ...\subset D_{n}\subset >...$ of domains of holomorphy in $X$. Then $D$ is a domain of holomorphy.
In section 2, we prove that a domain of holomorphy $D$ which is relatively compact in a 2-dimensional normal Stein space $X$ itself is Stein.
In section 3, we show that if $X$ is a Stein space of dimension n and $D\subset X$ an open subspace which is the union of an increasing sequence $D_{1}\subset D_{2}\subset ...\subset D_{n}\subset ...$ of open Stein subsets of $X$. then $D$ itself is Stein, if $X$ has isolated singularities.
△ Less
Submitted 11 January, 2001;
originally announced January 2001.