Results for "Mizanur Rahman"

total 979took 0.13s
A Longitudinal Study of Google PlayFeb 08 2018The difficulty of large scale monitoring of app markets affects our understanding of their dynamics. This is particularly true for dimensions such as app update frequency, control and pricing, the impact of developer actions on app popularity, as well ... More
Real-time Traffic Data Prediction with Basic Safety Messages using Kalman-Filter based Noise Reduction Model and Long Short-term Memory Neural NetworkNov 08 2018With the development of Connected Vehicle (CV) technology, temporal variation of roadway traffic can be captured by sharing Basic Safety Messages (BSMs) from each vehicle using the communication between vehicles as well as with transportation roadside ... More
FairPlay: Fraud and Malware Detection in Google PlayMar 06 2017Fraudulent behaviors in Google Android app market fuel search rank abuse and malware proliferation. We present FairPlay, a novel system that uncovers both malware and search rank fraud apps, by picking out trails that fraudsters leave behind. To identify ... More
Stateless Puzzles for Real Time Online Fraud PreemptionJun 05 2017The profitability of fraud in online systems such as app markets and social networks marks the failure of existing defense mechanisms. In this paper, we propose FraudSys, a real-time fraud preemption approach that imposes Bitcoin-inspired computational ... More
Real-time Pedestrian Detection Approach with an Efficient Data Communication Bandwidth StrategyAug 27 2018Nov 18 2018Vehicle-to-Pedestrian (V2P) communication can significantly improve pedestrian safety at a signalized intersection. It is unlikely that pedestrians will carry a low latency communication enabled device and activate a pedestrian safety application in their ... More
Feasibility of 5G mm-wave communication for connected autonomous vehiclesAug 14 2018The internet-of-things (IoT) environment holds different intelligent components networked together and will enable seamless data communication between the connected components. Connected autonomous vehicles or CAVs are major components of the IoT, and ... More
Search Rank Fraud De-Anonymization in Online SystemsJun 23 2018We introduce the fraud de-anonymization problem, that goes beyond fraud detection, to unmask the human masterminds responsible for posting search rank fraud in online systems. We collect and study search rank fraud data from Upwork, and survey the capabilities ... More
Adaptive Queue Prediction Algorithm for an Edge Centric Cyber Physical System Platform in a Connected Vehicle EnvironmentNov 29 2017In the early days of connected vehicles (CVs), data will be collected only from a limited number of CVs (i.e., low CV penetration rate) and not from other vehicles (i.e., non-connected vehicles). Moreover, the data loss rate in the wireless CV environment ... More
Change Point Models for Real-time V2I Cyber Attack Detection in a Connected Vehicle EnvironmentNov 30 2018Connected vehicle (CV) systems are cognizant of potential cyber attacks because of increasing connectivity between its different components such as vehicles, roadside infrastructure and traffic management centers. However, it is a challenge to detect ... More
Real-time Pedestrian Detection Approach with an Efficient Data Communication Bandwidth StrategyAug 27 2018Mar 17 2019Vehicle-to-Pedestrian (V2P) communication can significantly improve pedestrian safety at a signalized intersection. It is unlikely that pedestrians will carry a low latency communication enabled device and activate a pedestrian safety application in their ... More
An Efficient Approach towards Mitigating Soft Errors RisksOct 17 2011Smaller feature size, higher clock frequency and lower power consumption are of core concerns of today's nano-technology, which has been resulted by continuous downscaling of CMOS technologies. The resultant 'device shrinking' reduces the soft error tolerance ... More
Connected Vehicle Application Development Platform (CVDeP) for Edge-centric Cyber-Physical SystemsDec 02 2018Connected vehicle (CV) application developers need a development platform to build, test and debug CV applications, such as safety, mobility, and environmental applications, in an edge-centric Cyber-Physical Systems. Our study objective is to develop ... More
Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication SystemNov 19 2012The emergence of WIMAX has attracted significant interests from all fields of wireless communications including students, researchers, system engineers and operators. The WIMAX can also be considered to be the main technology in the implementation of ... More
Towards Secure Infrastructure-based Cooperative Adaptive Cruise ControlSep 13 2018Nov 18 2018Cooperative Adaptive Cruise Control (CACC) is a pivotal vehicular application that would allow transportation field to achieve its goals of increased traffic throughput and roadway capacity. This application is of paramount interest to the vehicular technology ... More
Navigation of C. elegans in three-dimensional media: roll maneuvers and planar turnsSep 12 2016Free-living nematode Caenorhabditis elegans is a powerful genetic model, essential for investigations ranging from behavior to neuroscience to aging, and locomotion is a key observable used in these studies. However, despite the fact that in its natural ... More
Lessons Learned from the Real-world Deployment of a Connected Vehicle TestbedDec 06 2017The connected vehicle (CV) system promises unprecedented safety, mobility, environmental, economic and social benefits, which can be unlocked using the enormous amount of data shared between vehicles and infrastructure (e.g., traffic signals, centers). ... More
An Improved GEF Fast Addition AlgorithmApr 08 2013In this paper, an improved GEF fast addition algorithm is proposed. The proposed algorithm reduces time and memory space. In this algorithm, carry is calculated on the basis of arrival timing of the operand's bits without overhead of sorting. Intermediate ... More
Entanglement Breaking RankMay 11 2018We introduce and study the entanglement breaking rank of an entanglement breaking channel. We show that the problem of computing the entanglement breaking rank of the channel \begin{align*} \mathfrak Z(X) = \frac{1}{d+1}(X+\text{Tr}(X)\mathbb I_d) \end{align*} ... More
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated VehiclesMar 20 2019Information-aware connected and automated vehicles (CAVs) have drawn great attention in recent years due to its potentially significant positive impacts on roadway safety and operational efficiency. In this paper, we conduct an in-depth review of three ... More
String Vertices and Inner DerivationsJun 18 1997We show that it is algebraically consistent to express some string field theory operators as inner derivations of the B-V algebra of string vertices. In this approach, the recursion relations for the string vertices are found to take the form of a `geometrical' ... More
Mathematical Properties of Polynomial Dimensional DecompositionApr 05 2018Many high-dimensional uncertainty quantification problems are solved by polynomial dimensional decomposition (PDD), which represents Fourier-like series expansion in terms of random orthonormal polynomials with increasing dimensions. This study constructs ... More
Consistency of Quantum Background IndependenceApr 19 1997We analyse higher order background independence conditions arising from multiple commutators of background deformations in quantum closed string field theory. The conditions are shown to amount to a vanishing theorem for $\Delta_S$ cohomology classes. ... More
On the validity of Strong Cosmic Censorship Conjecture in presence of Dirac fieldsMay 16 2019A well posed theory of nature is expected to determine the future of an observer uniquely from a given set of appropriate initial data. In the context of general relativity, this is ensured by Penrose's strong cosmic censorship conjecture. But in recent ... More
Higher Spin Theory - Part IJul 11 2013Jul 18 2013These notes comprise a part of the introductory lectures on Higher Spin Theory presented in the Eighth Modave Summer School in Mathematical Physics. We construct free higher-spin theories and turn on interactions to find that inconsistencies show up in ... More
Helicity-1/2 Mode as a Probe of Interactions of Massive Rarita-Schwinger FieldNov 14 2011Mar 17 2013We consider the electromagnetic and gravitational interactions of a massive Rarita-Schwinger field. Stueckelberg analysis of the system, when coupled to electromagnetism in flat space or to gravity, reveals in either case that the effective field theory ... More
Earth matter effect on atmospheric neutrino oscillation in (3+3) modelOct 06 2015In a recent combined analysis of short baseline neutrino oscillation data by Conrad et al it is shown that (3+3) neutrino model, defined by three active and three sterile neutrinos, results in an overall goodness of $67\%$ and a compatibility of $90\%$ ... More
Nitrogen-induced Ferromagnetism in BaOMar 22 2015May 02 2015Density functional theory with local spin density approximation has been used to propose possible room temperature ferromagnetism in N-doped NaCl-type BaO. Pristine BaO is a wide bandgap semiconductor, however, N induces a large density of states at the ... More
Classical electrodynamics from the motion of a relativistic fluidAug 31 2004Jun 10 2006We show that there exists a choice of gauge in which the electromagnetic 4-potential may be written as the difference of two 4-velocity vector fields describing the motion of a two-component space-filling relativistic fluid. Maxwell's equations are satisfied ... More
A Perverse Sheaf Approach Toward a Cohomology Theory for String TheoryApr 25 2007May 20 2009We present the construction and properties of a self-dual perverse sheaf S_0 whose cohomology fulfills some of the requirements of String theory as outlined by T. Hubsch in hep-th/9612075. The construction of this S_0 utilizes techniques that follow from ... More
The Uniqueness of HypergravityMay 08 2019We show that consistent interactions of a spin-2 and a higher-spin Majorana fermion gauge fields in 3D flat space lead uniquely to Aragone-Deser hypergravity or its generalization. Our analysis employs the BRST-cohomological techniques, and works in the ... More
Uncertainty Quantification by Alternative Decompositions of Multivariate FunctionsOct 24 2013This article advocates factorized and hybrid dimensional decompositions (FDD/HDD), as alternatives to analysis-of-variance dimensional decomposition (ADD), for second-moment statistical analysis of multivariate functions. New formulae revealing the relationships ... More
The $f$-Sensitivity IndexDec 08 2015This article presents a general multivariate $f$-sensitivity index, rooted in the $f$-divergence between the unconditional and conditional probability measures of a stochastic response, for global sensitivity analysis. Unlike the variance-based Sobol ... More
A Polynomial Chaos Expansion in Dependent Random VariablesApr 12 2018This paper introduces a new generalized polynomial chaos expansion (PCE) comprising measure-consistent multivariate orthonormal polynomials in dependent random variables. Unlike existing PCEs, whether classical or generalized, no tensor-product structure ... More
A Combinatorial interpretation of Hofstadter's G-sequenceMay 09 2011Jun 16 2013We give a combinatorial interpretation of a classical meta-Fibonacci sequence defined by G(n) = n - G(G(n-1)) with the initial condition G(1) = 1, which appears in Hofstadter's 'Godel, Escher, Bach: An Eternal Golden Braid'. The interpretation is in terms ... More
Peixoto's Structural Stability Theorem: The One-dimensional VersionJun 03 2013Peixoto's structural stability and density theorems represent milestones in the modern theory of dynamical systems and their applications. Despite the importance of these theorems, they are often treated rather superficially, if at all, in upper level ... More
Effects of density fluctuations on Supernova Neutrinos: 2$ν$ CaseNov 30 2005Apr 15 2006This paper has been withdrawn due to the use of some incorrect neutrino parameter space ranges.
Consequences of Gravity-Induced Couplings in Theories with Many Particle SpeciesJan 14 2009Mar 09 2010In theories with many copies of the Standard Model virtual black hole exchange may produce effective higher dimensional operators that can be treated below the cutoff scale as fundamental vertices of interspecies non-gravitational interaction. We consider ... More
Distortion and electric field control of band structure of siliceneOct 30 2013Jan 24 2014Density functional theory with local density approximation for exchange and correlation functional is used to tune the electronic band structure of silicene monolayer. The cohesive energy of free standing monolayer is increasing (decreasing) with external ... More
Strain-induced half-metallic ferromagnetism in zinc blende CrP/MnP superlattice: First-principles studyMar 24 2010Apr 07 2010Using first-principles calculations within generalized gradient approximation, the electronic and magnetic properties of zinc blende (zb) CrP/MnP superlattice are investigated. The equilibrium lattice constant is calculated to be $5.33\,$\AA. The stability ... More
A Galerkin Isogeometric Method for Karhunen-Loeve Approximation of Random FieldsApr 17 2018This paper marks the debut of a Galerkin isogeometric method for solving a Fredholm integral eigenvalue problem, enabling random field discretization by means of the Karhunen-Loeve expansion. The method involves a Galerkin projection onto a finite-dimensional ... More
Approximation Errors in Truncated Dimensional DecompositionsOct 24 2013The main theme of this paper is error analysis for approximations derived from two variants of dimensional decomposition of a multivariate function: the referential dimensional decomposition (RDD) and analysis-of-variance dimensional decomposition (ADD). ... More
A lower bound on the spectrum of unimodular networksSep 07 2016Unimodular networks are stochastic generalizations of finite graphs. We prove a lower bound on the spectral radius of both the adjacency and random walk operator of a unimodular network in terms of its average degree. Using this we prove an Alon-Boppana ... More
Earth matter effect on atmospheric neutrino oscillation in (3+3) modelOct 06 2015Mar 18 2017In a recent combined analysis of short baseline neutrino oscillation data by Conrad et al it is shown that (3+3) neutrino model, defined by three active and three sterile neutrinos, results in an overall goodness of $67\%$ and a compatibility of $90\%$ ... More
Percolation with small clusters on random graphsFeb 28 2014Dec 09 2015Consider the problem of determining the maximal induced subgraph in a random $d$-regular graph such that its components remain bounded as the size of the graph becomes arbitrarily large. We show, for asymptotically large $d$, that any such induced subgraph ... More
Modified Newtonian dynamics as a prediction of general relativityJul 12 2006Mar 23 2009We consider a simple model of the physical vacuum as a self-gravitating relativistic fluid. Proceeding in a step-by-step manner, we are able to show that the equations of classical electrodynamics follow if the electromagnetic four-potential is associated ... More
The path towards manifest background independenceSep 30 1997The set of string vertices is extended to include moduli spaces with genus and numbers of ordinary and special punctures ranging over all integral values $g,n,\bar n\geq0$. It is argued that both the string background and the B-V delta operator should ... More
Geometrising the closed string field theory actionSep 17 1997We complete the set of string vertices of non-negative dimension by introducing in a consistent manner those moduli spaces which had previously been excluded. As a consequence we obtain a `geometrised' string action taking the simple form $S=f(\B)$ where ... More
Topology change in spherical gravitational collapseJun 02 2015We argue that the formation of a Schwarzschild black hole via Datt-Oppenheimer-Snyder type gravitational collapse must be accompanied by a change in topology upon formation of the event horizon which physically separates matter in the interior from that ... More
Wiener-Hermite Polynomial Expansion for Multivariate Gaussian Probability MeasuresApr 25 2017This paper introduces a new generalized polynomial chaos expansion (PCE) comprising multivariate Hermite orthogonal polynomials in dependent Gaussian random variables. The second-moment properties of Hermite polynomials reveal a weakly orthogonal system ... More
A Generalized ANOVA Dimensional Decomposition for Dependent Probability MeasuresAug 04 2014This article explores the generalized analysis-of-variance or ANOVA dimensional decomposition (ADD) for multivariate functions of dependent random variables. Two notable properties, stemming from weakened annihilating conditions, reveal that the component ... More
Dimension-wise Multivariate Orthogonal Polynomials in General Probability SpacesOct 26 2018This paper puts forward a new generalized polynomial dimensional decomposition (PDD), referred to as GPDD, comprising hierarchically ordered measure-consistent multivariate orthogonal polynomials in dependent random variables. Unlike the existing PDD, ... More
On the existence of exotic matter in classical Newtonian mechanicsApr 16 2019According to Newton's law of gravitation the force between two particles depends upon their inertial, as well as their active and passive gravitational masses. For ordinary matter all three of these are equal and positive. We consider here the more general ... More
Designing an interface to optimize reading with small display windowsNov 16 1998Sep 08 1999The electronic presentation of text in small display windows is mushrooming. In the present paper, four ways of presenting text in a small display window were examined and compared to a Normal Page condition: rapid serial visual presentation (RSVP), RSVP ... More
Theoretical Estimates of Integrated Sachs-Wolfe Effect Detection through EMU-ASKAP Survey with Confusion, Position Uncertainty, Shot Noise and SNR analysisSep 18 2014The paper discusses ISW estimates through EMU-ASKAP survey. The main ideas this paper covers include: 1- Discussion on source distribution, confusion, position accuracy and shotnoise (with discussion focusing on SN ratios). 2- Selection of maximum redshift ... More
Brownian motion as limit of the interchange processSep 25 2016We prove that the random empirical measure of appropriately rescaled particle trajectories of the interchange process on paths converges weakly to the deterministic measure of stationary Brownian motion on the unit interval. Our approach provides a direct ... More
Intrinsic Cutoff and Acausality for Massive Spin 2 Fields Coupled to ElectromagnetismJan 16 2008May 26 2008We couple a massive spin 2 particle to electromagnetism. By introducing new, redundant degrees of freedom using the Stueckelberg formalism, we extract an intrinsic, model independent UV cutoff of the effective field theory describing this system. The ... More
Spacetime Dimensionality from de Sitter EntropyJun 22 2011Dec 12 2014We argue that de Sitter universes with a small cosmological constant are entropically favored to have three spatial dimensions. The conclusion relies on the causal-patch description of de Sitter space, where fiducial observers experience local thermal ... More
The Impact of Photon Entanglement on Local and Nonlocal Dispersion CancellationFeb 22 2017Recently the engineering of the entanglement for photon pairs generated during the spontaneous parametric down conversion process (SPDC) can be achieved via manipulation of pump wavelength behind a \c{hi}(2)-based type II SPDC process [1]. Such effect ... More
Source Code Properties of Defective Infrastructure as Code ScriptsOct 21 2018Context: In continuous deployment, software and services are rapidly deployed to end-users using an automated deployment pipeline. Defects in infrastructure as code (IaC) scripts can hinder the reliability of the automated deployment pipeline. We hypothesize ... More
Higher-Spin Modes in a Domain-Wall UniverseSep 05 2014Oct 03 2014We find a consistent set of equations of motion and constraints for massive higher-spin fluctuations in a gravitational background, required of certain characteristic properties but more general than constant curvature space. Of particular interest among ... More
Theoretical Estimates of Integrated Sachs-Wolfe Effect Detection through EMU-ASKAP Survey with Confusion, Position Uncertainty, Shot Noise and SNR analysisSep 18 2014Nov 22 2018The paper discusses ISW estimates through EMU-ASKAP survey. The main ideas this paper covers include: 1- Discussion on source distribution, confusion, position accuracy and shotnoise (with discussion focusing on SN ratios). 2- Selection of maximum redshift ... More
Vacuum vertices and the ghost-dilatonJul 06 1995We complete the proof of the ghost-dilaton theorem in string theory by showing that the coupling constant dependence of the vacuum vertices appearing in the closed string action is given correctly by one-point functions of the ghost-dilaton. To prove ... More
Complete Network Security Protection for SME's within Limited ResourcesNov 30 2015The purpose of this paper is to present a comprehensive budget conscious security plan for smaller enterprises that lack security guidelines.The authors believe this paper will assist users to write an individualized security plan. In addition to providing ... More
Enhancing Infrastructure Security in Real EstateNov 30 2015As a result of the increased dependency on obtaining information and connecting each computer together for ease of access or communication, organizations risk being attacked and losing private information through breaches or insecure business activities. ... More
Cloud Computing Avoids Downfall of Application Service ProvidersNov 30 2015Businesses have become dependent on ever increasing amounts of electronic information and rapid transaction speeds. Experts such as Diffie speculate that the end of isolated computing is at hand, and that within the next decade most businesses will have ... More
Novel Computational Methods for High-Dimensional Stochastic Sensitivity AnalysisFeb 13 2014This paper presents three new computational methods for calculating design sensitivities of statistical moments and reliability of high-dimensional complex systems subject to random input. The first method represents a novel integration of polynomial ... More
Ensemble Classifiers and Their Applications: A ReviewApr 15 2014Ensemble classifier refers to a group of individual classifiers that are cooperatively trained on data set in a supervised classification problem. In this paper we present a review of commonly used ensemble classifiers in the literature. Some ensemble ... More
Neimark--Sacker bifurcation and evidence of chaos in a discrete dynamical model of walkersJul 29 2015Jun 21 2016Bouncing droplets on a vibrating fluid bath can exhibit wave-particle behavior, such as being propelled by interacting with its own wave field. These droplets seem to walk across the bath, and thus are dubbed walkers. Experiments have shown that walkers ... More
Quantum Eraser Using A Modified Stern-Gerlach SetupJan 03 2005Apr 16 2012We propose a new setup to demonstrate quantum eraser, using spin-1/2 particles in a modified Stern-Gerlach setup, with a double slit. The "which-way" information can be erased simply by applying a transverse magnetic field with an additional magnet, resulting ... More
Molecular Dynamics Simulation of Cross-linked Graphene-Epoxy NanocompositesAug 13 2011Jul 10 2012This paper focuses on molecular dynamics (MD) modeling of graphene reinforced cross-linked epoxy (Gr-Ep) nanocomposite. The goal is to study the influence of geometry, and concentration of reinforcing nanographene sheet (NGS) on interfacial properties ... More
Perturbations of SNe Ia lightcurves, colors and spectral features by circumstellar dustMar 10 2011May 12 2011It has been suggested that multiple scattering on circumstellar dust could explain the non-standard reddening observed in the line-of-sight to Type Ia supernovae. In this work we use Monte Carlo simulations to examine how the scattered light would affect ... More
Predicting Metamorphic Relation for Matrix Calculation ProgramsFeb 19 2018Matrices often represent important information in scientific applications and are involved in performing complex calculations. But systematically testing these applications is hard due to the oracle problem. Metamorphic testing is an effective approach ... More
On the Geometry and Homology of Certain Simple Stratified VarietiesOct 24 2002We study certain mild degenerations of algebraic varieties which appear in the analysis of a large class of supersymmetric theories, including superstring theory. We analyze Witten's sigma-model and find that the non-transversality of the superpotential ... More
Using Descriptive Analytics for the Improvement of National University Entrance Exam: A case study in the Context of Kankor in AfghanistanDec 02 2016In Afghanistan, High school graduates, to continue higher education, need to pass the National University Entrance Exam (Kankor). Kankor is very important and requires further research as it is used as the only means to identify the participant's competence ... More
Data is the Fuel of Organizations: Opportunities and Challenges in AfghanistanJan 22 2018In this paper, the author at first briefly outlines the value of data in organizations and the opportunities and challenges in Afghanistan. Then the author takes the Kankor (National University Entrance Exam) data, particularly names of participants, ... More
Maximum Entropy Multivariate Density Estimation: An exact goodness-of-fit approachJun 06 2004Jun 28 2004We consider the problem of estimating the population probability distribution given a finite set of multivariate samples, using the maximum entropy approach. In strict keeping with Jaynes' original definition, our precise formulation of the problem considers ... More
An Inductive Proof of Bertrand PostulateAug 15 2016In this paper, we are going to prove a famous problem concerning prime numbers. Bertrand postulate states that there is always a prime p with n < p < 2n, if n > 1. Bertrand postulate is not a newer one to be proven, in fact, after his assumption and numerical ... More
Discovering $CP$ violation in neutrino oscillation experiment using neutrino beam from electron captureSep 02 2012May 02 2014Considering the recently obtained value of $\theta_{13}$ from Daya Bay and other reactor experiments we have studied the prospects of considering mono-energetic neutrino beam in studying $CP$ violation in the leptonic sector. Using a neutrino beam from ... More
Magic baseline and magic energy in neutrino oscillation with non-standard interactionsApr 06 2010Feb 18 2011We have discussed conditions under which probability of oscillation ($\nu_e\rightarrow \nu_{\mu}$) is independent of CP violating phase $\delta$. The condition of magic baseline on its length is well-known. We have proposed another condition which is ... More
Fitting inverse power-law quintessence models using the SNAP satelliteFeb 07 2002We investigate the possibility of using the proposed SNAP satellite in combination with low-z supernova searches to distinguish between different inverse power-law quintessence models. If the true model is that of a cosmological constant, we determine ... More
Euclidean distance matrix completion and point configurations from the minimal spanning treeOct 20 2016The paper introduces a special case of the Euclidean distance matrix completion problem (edmcp) of interest in statistical data analysis where only the minimal spanning tree distances are given and the matrix completion must preserve the minimal spanning ... More
Notes on a Cure for Higher-Spin AcausalityMar 30 2011Aug 05 2011We present a Lagrangian describing a massive charged spin-2 field and a scalar in a constant electromagnetic background, and we provide a consistent description of the system. The Lagrangian, derived from string field theory through a suitable dimensional ... More
Comments on Higher-Spin Fields in Nontrivial BackgroundsMar 09 2016Mar 29 2016We consider the free propagation of totally symmetric massive bosonic fields in nontrivial backgrounds. The mutual compatibility of the dynamical equations and constraints in flat space amounts to the existence of an Abelian algebra formed by the d'Alembertian, ... More
Note on Gauge Invariance and Causal PropagationJun 24 2013Aug 29 2013Interactions of gauge-invariant systems are severely constrained by several consistency requirements. One is the preservation of the number of gauge symmetries, another is causal propagation. For lower-spin fields, the emphasis is usually put on gauge ... More
Cache Analysis of Non-uniform Distribution Sorting AlgorithmsJun 19 2007Aug 13 2007We analyse the average-case cache performance of distribution sorting algorithms in the case when keys are independently but not necessarily uniformly distributed. The analysis is for both `in-place' and `out-of-place' distribution sorting algorithms ... More
Strain and correlation induced half-metallic ferromagnetism in orthorhombic BaFeO$_{3}$Sep 01 2015Using first-principles calculations, the electronic and magnetic properties of orthorhombic BaFeO$_{3}$ (BFO) are investigated with local spin density approximation (LSDA). The calculations reveal that at the optimized lattice volume BFO has a lower energy ... More
Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security RisksNov 30 2015Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to mitigate and reduce ... More
Spacetime geometry of static fluid spheresMar 16 2001Feb 14 2002We exhibit a simple and explicit formula for the metric of an arbitrary static spherically symmetric perfect fluid spacetime. This class of metrics depends on one freely specifiable monotone non-increasing generating function. We also investigate various ... More
Non-profit Organizations' Need to Address Security for Effective Government ContactingNov 30 2015The need for information security within small to mid-size companies is increasing. The risks of information security breach, data loss, and disaster are growing. The impact of IT outages and issues on the company are unacceptable to any size business ... More
Incident Response Plan for a Small to Medium Sized HospitalNov 30 2015Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy ... More
On the Local Geometry of Graphs in Terms of Their SpectraJul 16 2018In this paper, we consider the relation between the spectrum and the number of short cycles in large graphs. Suppose $G_1, G_2, G_3, \ldots$ is a sequence of finite and connected graphs that share a common universal cover $T$ and such that the proportion ... More
Applicability of Educational Data Mining in Afghanistan: Opportunities and ChallengesMar 02 2017The author's own experience as a student and later as a lecturer in Afghanistan has shown that the methods used in the educational system are not only flawed, but also do not provide the minimum guidance to students to select proper course of study before ... More
Guessing models and the approachability idealFeb 27 2018Starting with two supercompact cardinals we produce a generic extension of the universe in which the principles ${\rm ISP}(\omega_2)$ and ${\rm ISP}(\omega_3)$ hold simultaneously, and the restriction of the approachability ideal $I[\omega_2]$ to the ... More
Narrowing the Modeling Gap: A Cluster-Ranking Approach to Coreference ResolutionJan 16 2014Traditional learning-based coreference resolvers operate by training the mention-pair model for determining whether two mentions are coreferent or not. Though conceptually simple and easy to understand, the mention-pair model is linguistically rather ... More
Ciliate Gene Unscrambling with Fewer TemplatesAug 10 2010One of the theoretical models proposed for the mechanism of gene unscrambling in some species of ciliates is the template-guided recombination (TGR) system by Prescott, Ehrenfeucht and Rozenberg which has been generalized by Daley and McQuillan from a ... More
Application of Machine Learning Techniques in AquacultureMay 03 2014In this paper we present applications of different machine learning algorithms in aquaculture. Machine learning algorithms learn models from historical data. In aquaculture historical data are obtained from farm practices, yields, and environmental data ... More
It should be Einstein-Laub Equations inside MatterNov 01 2012In a recent article [1], Mansuripur has claimed that inside the matter, conventional Lorentz Force law should be abandoned in favor of a more general expression of the electromagnetic force density such as the one discovered by A. Einstein and J.Laub ... More
Cardinal collapsing and product forcingJun 06 2015Oct 02 2015If $\langle \kappa_{n}: n<\omega \rangle$ is an increasing sequence of regular cardinals cofinal in $\kappa$, and $\langle \mathbb{P}_n: n<\omega \rangle$ is a sequence of non-trivial separative forcing notions, such that each $\mathbb{P}_n$ is $\kappa_n$-closed ... More
From Higher Spins to Strings: A PrimerDec 24 2015Apr 18 2016A contribution to the collection of reviews "Introduction to Higher Spin Theory" edited by S. Fredenhagen, this introductory article is a pedagogical account of higher-spin fields and their connections with String Theory. We start with the motivations ... More
Causal Propagation of a Charged Spin 3/2 Field in an External Electromagnetic BackgroundJun 08 2009Jul 07 2009We present a Lagrangian for a massive, charged spin 3/2 field in a constant external electromagnetic background, which correctly propagates only physical degrees of freedom inside the light cone. The Velo-Zwanziger acausality and other pathologies such ... More