-
Towards Synergistic Deep Learning Models for Volumetric Cirrhotic Liver Segmentation in MRIs
Authors:
Vandan Gorade,
Onkar Susladkar,
Gorkem Durak,
Elif Keles,
Ertugrul Aktas,
Timurhan Cebeci,
Alpay Medetalibeyoglu,
Daniela Ladner,
Debesh Jha,
Ulas Bagci
Abstract:
Liver cirrhosis, a leading cause of global mortality, requires precise segmentation of ROIs for effective disease monitoring and treatment planning. Existing segmentation models often fail to capture complex feature interactions and generalize across diverse datasets. To address these limitations, we propose a novel synergistic theory that leverages complementary latent spaces for enhanced feature…
▽ More
Liver cirrhosis, a leading cause of global mortality, requires precise segmentation of ROIs for effective disease monitoring and treatment planning. Existing segmentation models often fail to capture complex feature interactions and generalize across diverse datasets. To address these limitations, we propose a novel synergistic theory that leverages complementary latent spaces for enhanced feature interaction modeling. Our proposed architecture, nnSynergyNet3D integrates continuous and discrete latent spaces for 3D volumes and features auto-configured training. This approach captures both fine-grained and coarse features, enabling effective modeling of intricate feature interactions. We empirically validated nnSynergyNet3D on a private dataset of 628 high-resolution T1 abdominal MRI scans from 339 patients. Our model outperformed the baseline nnUNet3D by approximately 2%. Additionally, zero-shot testing on healthy liver CT scans from the public LiTS dataset demonstrated superior cross-modal generalization capabilities. These results highlight the potential of synergistic latent space models to improve segmentation accuracy and robustness, thereby enhancing clinical workflows by ensuring consistency across CT and MRI modalities.
△ Less
Submitted 8 August, 2024;
originally announced August 2024.
-
Using graph neural networks to reconstruct charged pion showers in the CMS High Granularity Calorimeter
Authors:
M. Aamir,
B. Acar,
G. Adamov,
T. Adams,
C. Adloff,
S. Afanasiev,
C. Agrawal,
C. Agrawal,
A. Ahmad,
H. A. Ahmed,
S. Akbar,
N. Akchurin,
B. Akgul,
B. Akgun,
R. O. Akpinar,
E. Aktas,
A. AlKadhim,
V. Alexakhin,
J. Alimena,
J. Alison,
A. Alpana,
W. Alshehri,
P. Alvarez Dominguez,
M. Alyari,
C. Amendola
, et al. (550 additional authors not shown)
Abstract:
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadr…
▽ More
A novel method to reconstruct the energy of hadronic showers in the CMS High Granularity Calorimeter (HGCAL) is presented. The HGCAL is a sampling calorimeter with very fine transverse and longitudinal granularity. The active media are silicon sensors and scintillator tiles readout by SiPMs and the absorbers are a combination of lead and Cu/CuW in the electromagnetic section, and steel in the hadronic section. The shower reconstruction method is based on graph neural networks and it makes use of a dynamic reduction network architecture. It is shown that the algorithm is able to capture and mitigate the main effects that normally hinder the reconstruction of hadronic showers using classical reconstruction methods, by compensating for fluctuations in the multiplicity, energy, and spatial distributions of the shower's constituents. The performance of the algorithm is evaluated using test beam data collected in 2018 prototype of the CMS HGCAL accompanied by a section of the CALICE AHCAL prototype. The capability of the method to mitigate the impact of energy leakage from the calorimeter is also demonstrated.
△ Less
Submitted 30 June, 2024; v1 submitted 17 June, 2024;
originally announced June 2024.
-
Issue Report Validation in an Industrial Context
Authors:
Ethem Utku Aktas,
Ebru Cakmak,
Mete Cihad Inan,
Cemal Yilmaz
Abstract:
Effective issue triaging is crucial for software development teams to improve software quality, and thus customer satisfaction. Validating issue reports manually can be time-consuming, hindering the overall efficiency of the triaging process. This paper presents an approach on automating the validation of issue reports to accelerate the issue triaging process in an industrial set-up. We work on 1,…
▽ More
Effective issue triaging is crucial for software development teams to improve software quality, and thus customer satisfaction. Validating issue reports manually can be time-consuming, hindering the overall efficiency of the triaging process. This paper presents an approach on automating the validation of issue reports to accelerate the issue triaging process in an industrial set-up. We work on 1,200 randomly selected issue reports in banking domain, written in Turkish, an agglutinative language, meaning that new words can be formed with linear concatenation of suffixes to express entire sentences. We manually label these reports for validity, and extract the relevant patterns indicating that they are invalid. Since the issue reports we work on are written in an agglutinative language, we use morphological analysis to extract the features. Using the proposed feature extractors, we utilize a machine learning based approach to predict the issue reports' validity, performing a 0.77 F1-score.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Topology-guided Hypergraph Transformer Network: Unveiling Structural Insights for Improved Representation
Authors:
Khaled Mohammed Saifuddin,
Mehmet Emin Aktas,
Esra Akbas
Abstract:
Hypergraphs, with their capacity to depict high-order relationships, have emerged as a significant extension of traditional graphs. Although Graph Neural Networks (GNNs) have remarkable performance in graph representation learning, their extension to hypergraphs encounters challenges due to their intricate structures. Furthermore, current hypergraph transformers, a special variant of GNN, utilize…
▽ More
Hypergraphs, with their capacity to depict high-order relationships, have emerged as a significant extension of traditional graphs. Although Graph Neural Networks (GNNs) have remarkable performance in graph representation learning, their extension to hypergraphs encounters challenges due to their intricate structures. Furthermore, current hypergraph transformers, a special variant of GNN, utilize semantic feature-based self-attention, ignoring topological attributes of nodes and hyperedges. To address these challenges, we propose a Topology-guided Hypergraph Transformer Network (THTN). In this model, we first formulate a hypergraph from a graph while retaining its structural essence to learn higher-order relations within the graph. Then, we design a simple yet effective structural and spatial encoding module to incorporate the topological and spatial information of the nodes into their representation. Further, we present a structure-aware self-attention mechanism that discovers the important nodes and hyperedges from both semantic and structural viewpoints. By leveraging these two modules, THTN crafts an improved node representation, capturing both local and global topological expressions. Extensive experiments conducted on node classification tasks demonstrate that the performance of the proposed model consistently exceeds that of the existing approaches.
△ Less
Submitted 21 May, 2024; v1 submitted 14 October, 2023;
originally announced October 2023.
-
Photovoltaic potential of tin perovskites revealed through layer-by-layer investigation of optoelectronic and charge transport properties
Authors:
Mahmoud H. Aldamasy,
Artem Musiienko,
Marin Rusu,
Davide Regaldo,
Shengnan Zho,
Hannes Hampel,
Chiara Frasca,
Zafar Iqbal,
Thomas W. Gries,
Guixiang Li,
Ece Aktas,
Giuseppe Nasti,
Meng Li,
Jorge Pascual,
Noor Titan Putri Hartono,
Qiong Wang,
Thomas Unold,
Antonio Abate
Abstract:
Tin perovskites are the most promising environmentally friendly alternative to lead perovskites. Among tin perovskites, FASnI3 (CH4N2SnI3) shows optimum band gap, and easy processability. However, the performance of FASnI3 based solar cells is incomparable to lead perovskites for several reasons, including energy band mismatch between the perovskite absorber film and the charge transporting layers…
▽ More
Tin perovskites are the most promising environmentally friendly alternative to lead perovskites. Among tin perovskites, FASnI3 (CH4N2SnI3) shows optimum band gap, and easy processability. However, the performance of FASnI3 based solar cells is incomparable to lead perovskites for several reasons, including energy band mismatch between the perovskite absorber film and the charge transporting layers (CTLs) for both types of carriers, i.e., for electrons (ETLs) and holes (HTLs). However, the band diagrams in the literature are inconsistent, and the charge extraction dynamics are poorly understood. In this paper, we study the energy band positions of FASnI3 based perovskites using Kelvin probe (KP) and photoelectron yield spectroscopy (PYS) to provide a precise band diagram of the most used device stack. In addition, we analyze the defects within the current energetic landscape of tin perovskites. We uncover the role of bathocuproine (BCP) in enhancing the electron extraction at the fullerene C60/BCP interface. Furthermore, we used transient surface photovoltage (tr-SPV) for the first time for tin perovskites to understand the charge extraction dynamics of the most reported HTLs such as NiOx and PEDOT, and ETLs such as C60, ICBA, and PCBM. Finally, we used Hall effect, KP, and time-resolved photoluminescence (TRPL) to estimate an accurate value of the p-doping concentration in FASnI3 and showed a consistent result of 1.5 * 1017 cm-3. Our findings prove that the energetic system of tin halide perovskites is deformed and should be redesigned independently from lead perovskites to unlock the full potential of tin perovskites.
△ Less
Submitted 7 October, 2023; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Hypergraph Classification via Persistent Homology
Authors:
Mehmet Emin Aktas,
Thu Nguyen,
Rakin Riza,
Muhammad Ifte Islam,
Esra Akbas
Abstract:
Persistent homology is a mathematical tool used for studying the shape of data by extracting its topological features. It has gained popularity in network science due to its applicability in various network mining problems, including clustering, graph classification, and graph neural networks. The definition of persistent homology for graphs is relatively straightforward, as graphs possess distinc…
▽ More
Persistent homology is a mathematical tool used for studying the shape of data by extracting its topological features. It has gained popularity in network science due to its applicability in various network mining problems, including clustering, graph classification, and graph neural networks. The definition of persistent homology for graphs is relatively straightforward, as graphs possess distinct intrinsic distances and a simplicial complex structure. However, hypergraphs present a challenge in preserving topological information since they may not have a simplicial complex structure. In this paper, we define several topological characterizations of hypergraphs in defining hypergraph persistent homology to prioritize different higher-order structures within hypergraphs. We further use these persistent homology filtrations in classifying four different real-world hypergraphs and compare their performance to the state-of-the-art graph neural network models. Experimental results demonstrate that persistent homology filtrations are effective in classifying hypergraphs and outperform the baseline models. To the best of our knowledge, this study represents the first systematic attempt to tackle the hypergraph classification problem using persistent homology.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
Using Screenshot Attachments in Issue Reports for Triaging
Authors:
Ethem Utku Aktas,
Cemal Yilmaz
Abstract:
In previous work, we deployed IssueTAG, which uses the texts present in the one-line summary and the description fields of the issue reports to automatically assign them to the stakeholders, who are responsible for resolving the reported issues. Since its deployment on January 12, 2018 at Softtech, i.e., the software subsidiary of the largest private bank in Turkey, IssueTAG has made a total of 30…
▽ More
In previous work, we deployed IssueTAG, which uses the texts present in the one-line summary and the description fields of the issue reports to automatically assign them to the stakeholders, who are responsible for resolving the reported issues. Since its deployment on January 12, 2018 at Softtech, i.e., the software subsidiary of the largest private bank in Turkey, IssueTAG has made a total of 301,752 assignments (as of November 2021). One observation we make is that a large fraction of the issue reports submitted to Softtech has screenshot attachments and, in the presence of such attachments, the reports often convey less information in their one-line summary and the description fields, which tends to reduce the assignment accuracy. In this work, we use the screenshot attachments as an additional source of information to further improve the assignment accuracy, which (to the best of our knowledge) has not been studied before in this context. In particular, we develop a number of multi-source (using both the issue reports and the screenshot attachments) and single-source assignment models (using either the issue reports or the screenshot attachments) and empirically evaluate them on real issue reports. In the experiments, compared to the currently deployed single-source model in the field, the best multi-source model developed in this work, significantly (both in the practical and statistical sense) improved the assignment accuracy for the issue reports with screenshot attachments from 0.843 to 0.858 at acceptable overhead costs, a result strongly supporting our basic hypothesis.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Operational Research: Methods and Applications
Authors:
Fotios Petropoulos,
Gilbert Laporte,
Emel Aktas,
Sibel A. Alumur,
Claudia Archetti,
Hayriye Ayhan,
Maria Battarra,
Julia A. Bennell,
Jean-Marie Bourjolly,
John E. Boylan,
Michèle Breton,
David Canca,
Laurent Charlin,
Bo Chen,
Cihan Tugrul Cicek,
Louis Anthony Cox Jr,
Christine S. M. Currie,
Erik Demeulemeester,
Li Ding,
Stephen M. Disney,
Matthias Ehrgott,
Martin J. Eppler,
Güneş Erdoğan,
Bernard Fortz,
L. Alberto Franco
, et al. (57 additional authors not shown)
Abstract:
Throughout its history, Operational Research has evolved to include a variety of methods, models and algorithms that have been applied to a diverse and wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first aims to summarise the up-to-date knowledge and provide an overview of the state-of-the-art methods and key developments in the vari…
▽ More
Throughout its history, Operational Research has evolved to include a variety of methods, models and algorithms that have been applied to a diverse and wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first aims to summarise the up-to-date knowledge and provide an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion. It should be used as a point of reference or first-port-of-call for a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order. The authors dedicate this paper to the 2023 Turkey/Syria earthquake victims. We sincerely hope that advances in OR will play a role towards minimising the pain and suffering caused by this and future catastrophes.
△ Less
Submitted 13 January, 2024; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Liars are more influential: Effect of Deception in Influence Maximization on Social Networks
Authors:
Mehmet Emin Aktas,
Esra Akbas,
Ashley Hahn
Abstract:
Detecting influential users, called the influence maximization problem on social networks, is an important graph mining problem with many diverse applications such as information propagation, market advertising, and rumor controlling. There are many studies in the literature for influential users detection problem in social networks. Although the current methods are successfully used in many diffe…
▽ More
Detecting influential users, called the influence maximization problem on social networks, is an important graph mining problem with many diverse applications such as information propagation, market advertising, and rumor controlling. There are many studies in the literature for influential users detection problem in social networks. Although the current methods are successfully used in many different applications, they assume that users are honest with each other and ignore the role of deception on social networks. On the other hand, deception appears to be surprisingly common among humans within social networks. In this paper, we study the effect of deception in influence maximization on social networks. We first model deception in social networks. Then, we model the opinion dynamics on these networks taking the deception into consideration thanks to a recent opinion dynamics model via sheaf Laplacian. We then extend two influential node detection methods, namely Laplacian centrality and DFF centrality, for the sheaf Laplacian to measure the effect of deception in influence maximization. Our experimental results on synthetic and real-world networks suggest that liars are more influential than honest users in social networks.
△ Less
Submitted 21 March, 2022;
originally announced March 2022.
-
Identifying critical higher-order interactions in complex networks
Authors:
Mehmet Emin Aktas,
Thu Nguyen,
Sidra Jawaid,
Rakin Riza,
Esra Akbas
Abstract:
Information diffusion on networks is an important concept in network science observed in many situations such as information spreading and rumor controlling in social networks, disease contagion between individuals, cascading failures in power grids. The critical interactions in networks are the ones that play critical roles in information diffusion and primarily affect network structure and funct…
▽ More
Information diffusion on networks is an important concept in network science observed in many situations such as information spreading and rumor controlling in social networks, disease contagion between individuals, cascading failures in power grids. The critical interactions in networks are the ones that play critical roles in information diffusion and primarily affect network structure and functions. Besides, interactions can occur between not only two nodes as pairwise interactions, i.e., edges, but also three or more nodes, described as higher-order interactions. This report presents a novel method to identify critical higher-order interactions. We propose two new Laplacians that allow redefining classical graph centrality measures for higher-order interactions. We then compare the redefined centrality measures using the Susceptible-Infected-Recovered (SIR) simulation model. Experimental results suggest that the proposed method is promising in identifying critical higher-order interactions.
△ Less
Submitted 7 May, 2021; v1 submitted 6 May, 2021;
originally announced May 2021.
-
Automated Issue Assignment: Results and Insights from an Industrial Case
Authors:
Ethem Utku Aktas,
Cemal Yilmaz
Abstract:
Softtech, being a subsidiary of the largest private bank in Turkey, called IsBank, receives an average of 350 issue reports from the field every day. Manually assigning the reported issues to the software development teams is costly and cumbersome. We automate the issue assignments using data mining approaches and share our experience gained by deploying the resulting system at Softtech/IsBank. Au…
▽ More
Softtech, being a subsidiary of the largest private bank in Turkey, called IsBank, receives an average of 350 issue reports from the field every day. Manually assigning the reported issues to the software development teams is costly and cumbersome. We automate the issue assignments using data mining approaches and share our experience gained by deploying the resulting system at Softtech/IsBank. Automated issue assignment has been studied in the literature. However, most of these works report the results obtained on open source projects and the remaining few, although they use commercial, closed source projects, carry out the assignments in a retrospective manner. We, on the other hand, deploy the proposed approach, which has been making all the assignments since Jan 12, 2018. This presents us with an unprecedented opportunity to observe the practical effects of automated issue assignment in the field and to carry out user studies, which have not been done before in this context. We observe that it is not just about deploying a system for automated issue assignment, but also about designing/changing the assignment process around the system; the accuracy of the assignments does not have to be higher than that of manual assignments in order for the system to be useful; deploying such a system requires the development of additional functionalities, such as detecting deteriorations in assignment accuracies in an online manner and creating human-readable explanations for the assignments; stakeholders do not necessarily resist change; and gradual transition can help stakeholders build confidence.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Hypergraph Laplacians in Diffusion Framework
Authors:
Mehmet Emin Aktas,
Esra Akbas
Abstract:
Networks are important structures used to model complex systems where interactions take place. In a basic network model, entities are represented as nodes, and interaction and relations among them are represented as edges. However, in a complex system, we cannot describe all relations as pairwise interactions, rather should describe as higher-order interactions. Hypergraphs are successfully used t…
▽ More
Networks are important structures used to model complex systems where interactions take place. In a basic network model, entities are represented as nodes, and interaction and relations among them are represented as edges. However, in a complex system, we cannot describe all relations as pairwise interactions, rather should describe as higher-order interactions. Hypergraphs are successfully used to model higher-order interactions in complex systems. In this paper, we present two new hypergraph Laplacians based on diffusion framework. Our Laplacians take the relations between higher-order interactions into consideration, hence can be used to model diffusion on hypergraphs not only between vertices but also higher-order structures. These Laplacians can be employed in different network mining problems on hypergraphs, such as social contagion models on hypergraphs, influence study on hypergraphs, and hypergraph classification, to list a few.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
A Fine-grained Data Set and Analysis of Tangling in Bug Fixing Commits
Authors:
Steffen Herbold,
Alexander Trautsch,
Benjamin Ledel,
Alireza Aghamohammadi,
Taher Ahmed Ghaleb,
Kuljit Kaur Chahal,
Tim Bossenmaier,
Bhaveet Nagaria,
Philip Makedonski,
Matin Nili Ahmadabadi,
Kristof Szabados,
Helge Spieker,
Matej Madeja,
Nathaniel Hoy,
Valentina Lenarduzzi,
Shangwen Wang,
Gema Rodríguez-Pérez,
Ricardo Colomo-Palacios,
Roberto Verdecchia,
Paramvir Singh,
Yihao Qin,
Debasish Chakroborti,
Willard Davis,
Vijay Walunj,
Hongjun Wu
, et al. (23 additional authors not shown)
Abstract:
Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelevant for the study of bugs.
Objective: We want to improve our understanding of the prevalence of tangling and the types of changes that are tangled within bug fixing commits.
Metho…
▽ More
Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelevant for the study of bugs.
Objective: We want to improve our understanding of the prevalence of tangling and the types of changes that are tangled within bug fixing commits.
Methods: We use a crowd sourcing approach for manual labeling to validate which changes contribute to bug fixes for each line in bug fixing commits. Each line is labeled by four participants. If at least three participants agree on the same label, we have consensus.
Results: We estimate that between 17% and 32% of all changes in bug fixing commits modify the source code to fix the underlying problem. However, when we only consider changes to the production code files this ratio increases to 66% to 87%. We find that about 11% of lines are hard to label leading to active disagreements between participants. Due to confirmed tangling and the uncertainty in our data, we estimate that 3% to 47% of data is noisy without manual untangling, depending on the use case.
Conclusion: Tangled commits have a high prevalence in bug fixes and can lead to a large amount of noise in the data. Prior research indicates that this noise may alter results. As researchers, we should be skeptics and assume that unvalidated data is likely very noisy, until proven otherwise.
△ Less
Submitted 13 October, 2021; v1 submitted 12 November, 2020;
originally announced November 2020.
-
Graph Classification via Heat Diffusion on Simplicial Complexes
Authors:
Mehmet Emin Aktas,
Esra Akbas
Abstract:
In this paper, we study the graph classification problem in vertex-labeled graphs. Our main goal is to classify the graphs comparing their higher-order structures thanks to heat diffusion on their simplices. We first represent vertex-labeled graphs as simplex-weighted super-graphs. We then define the diffusion Frechet function over their simplices to encode the higher-order network topology and fi…
▽ More
In this paper, we study the graph classification problem in vertex-labeled graphs. Our main goal is to classify the graphs comparing their higher-order structures thanks to heat diffusion on their simplices. We first represent vertex-labeled graphs as simplex-weighted super-graphs. We then define the diffusion Frechet function over their simplices to encode the higher-order network topology and finally reach our goal by combining the function values with machine learning algorithms. Our experiments on real-world bioinformatics networks show that using diffusion Fr{é}chet function on simplices is promising in graph classification and more effective than the baseline methods. To the best of our knowledge, this paper is the first paper in the literature using heat diffusion on higher-dimensional simplices in a graph mining problem. We believe that our method can be extended to different graph mining domains, not only the graph classification problem.
△ Less
Submitted 26 June, 2020;
originally announced July 2020.
-
Persistence Homology of Networks: Methods and Applications
Authors:
Mehmet Emin Aktas,
Esra Akbas,
Ahmed El Fatmaoui
Abstract:
Information networks are becoming increasingly popular to capture complex relationships across various disciplines, such as social networks, citation networks, and biological networks. The primary challenge in this domain is measuring similarity or distance between networks based on topology. However, classical graph-theoretic measures are usually local and mainly based on differences between eith…
▽ More
Information networks are becoming increasingly popular to capture complex relationships across various disciplines, such as social networks, citation networks, and biological networks. The primary challenge in this domain is measuring similarity or distance between networks based on topology. However, classical graph-theoretic measures are usually local and mainly based on differences between either node or edge measurements or correlations without considering the topology of networks such as the connected components or holes. In recent years, mathematical tools and deep learning based methods have become popular to extract the topological features of networks. Persistent homology (PH) is a mathematical tool in computational topology that measures the topological features of data that persist across multiple scales with applications ranging from biological networks to social networks. In this paper, we provide a conceptual review of key advancements in this area of using PH on complex network science. We give a brief mathematical background on PH, review different methods (i.e. filtrations) to define PH on networks and highlight different algorithms and applications where PH is used in solving network mining problems. In doing so, we develop a unified framework to describe these recent approaches and emphasize major conceptual distinctions. We conclude with directions for future work. We focus our review on recent approaches that get significant attention in the mathematics and data mining communities working on network data. We believe our summary of the analysis of PH on networks will provide important insights to researchers in applied network science.
△ Less
Submitted 19 July, 2019;
originally announced July 2019.
-
A polynomial invariant for plane curve complements: Krammer polynomials
Authors:
Mehmet Emin Aktas,
Serdar Cellat,
Hubeyb Gurdogan
Abstract:
We use the Krammer representation of the braid group in Libgober's invariant and construct a new multivariate polynomial invariant for curve complements: Krammer polynomial. We show that the Krammer polynomial of an essential braid is equal to zero. We also compute the Krammer polynomials of some certain n-gonal curves.
We use the Krammer representation of the braid group in Libgober's invariant and construct a new multivariate polynomial invariant for curve complements: Krammer polynomial. We show that the Krammer polynomial of an essential braid is equal to zero. We also compute the Krammer polynomials of some certain n-gonal curves.
△ Less
Submitted 18 July, 2017;
originally announced July 2017.
-
Dessins d'Enfants of Trigonal Curves
Authors:
Mehmet Emin Aktas
Abstract:
In this paper, we focus on properties of dessins d'enfants associated to trigonal curves. Degtyarev studied dessins d'enfants to compute braid monodromies and fundamental groups of trigonal curves using their combinatorial data. We first classify all possible combinatorial data that can occur for trigonal curves of low degree, as well as bounds on the number of possibilities for all degree. We als…
▽ More
In this paper, we focus on properties of dessins d'enfants associated to trigonal curves. Degtyarev studied dessins d'enfants to compute braid monodromies and fundamental groups of trigonal curves using their combinatorial data. We first classify all possible combinatorial data that can occur for trigonal curves of low degree, as well as bounds on the number of possibilities for all degree. We also study deformations of trigonal curves and corresponding deformations of their dessins. Of special interest to Degtyarev was the case when the dessins are maximal. We give a sufficient condition for a trigonal curve to be deformable to one that is maximal.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Performance Analysis of Network Coded Systems Under Quasi-static Rayleigh Fading Channels
Authors:
Tugcan Aktas,
A. Ozgur Yilmaz,
Emre Aktas
Abstract:
In the area of basic and network coded cooperative communication, the expected end-to-end bit error rate (BER) values are frequently required to compare the proposed coding, relaying, and decoding techniques. Instead of obtaining these values via time consuming Monte Carlo simulations, deriving closed form expressions using approximations is crucial. In this work, the ultimate goal is to derive an…
▽ More
In the area of basic and network coded cooperative communication, the expected end-to-end bit error rate (BER) values are frequently required to compare the proposed coding, relaying, and decoding techniques. Instead of obtaining these values via time consuming Monte Carlo simulations, deriving closed form expressions using approximations is crucial. In this work, the ultimate goal is to derive an approximate average BER expression for a network coded system. While reaching this goal, we firstly consider the cooperative systems' instantaneous BER values that are commonly composed of Q-functions of more than one variables. For these Q-functions, we investigate the convergence characteristics of the sampling property and generalize this property to arbitrary functions of multiple variables. Second, we adapt the equivalent channel approach to the network coded scenario for the ease of analysis and propose a network decoder with reduced complexity. Finally, by combining these techniques, we show that the obtained closed form expressions well agree with simulation results in a wide SNR range.
△ Less
Submitted 5 December, 2013;
originally announced December 2013.
-
Cooperative Network Coded ARQ Strategies for Two Way Relay Channel
Authors:
Rasit Tutgun,
Emre Aktas
Abstract:
In this paper, novel cooperative automatic repeat request (ARQ) methods with network coding are proposed for two way relaying network. Upon a failed transmission of a packet, the network enters cooperation phase, where the retransmission of the packets is aided by the relay node. The proposed approach integrates network coding into cooperative ARQ, aiming to improve the network throughput by reduc…
▽ More
In this paper, novel cooperative automatic repeat request (ARQ) methods with network coding are proposed for two way relaying network. Upon a failed transmission of a packet, the network enters cooperation phase, where the retransmission of the packets is aided by the relay node. The proposed approach integrates network coding into cooperative ARQ, aiming to improve the network throughput by reducing the number of retransmissions. For successive retransmission, three different methods for choosing the retransmitting node are considered. The throughput of the methods are analyzed and compared. The analysis is based on binary Markov channel which takes the correlation of the channel coefficients in time into account. Analytical results show that the proposed use of network coding result in throughput performance superior to traditional ARQ and cooperative ARQ without network coding. It is also observed that correlation can have significant effect on the performance of the proposed cooperative network coded ARQ approach. In particular the proposed approach is advantageous for slow to moderately fast fading channels.
△ Less
Submitted 26 November, 2013; v1 submitted 26 August, 2013;
originally announced August 2013.
-
Generalizing the Sampling Property of the Q-function for Error Rate Analysis of Cooperative Communication in Fading Channels
Authors:
Tugcan Aktas,
Ali Ozgur Yilmaz,
Emre Aktas
Abstract:
This paper extends some approximation methods that are used to identify closed form Bit Error Rate (BER) expressions which are frequently utilized in investigation and comparison of performance for wireless communication systems in the literature. By using this group of approximation methods, some expectation integrals, which are complicated to analyze and have high computational complexity to eva…
▽ More
This paper extends some approximation methods that are used to identify closed form Bit Error Rate (BER) expressions which are frequently utilized in investigation and comparison of performance for wireless communication systems in the literature. By using this group of approximation methods, some expectation integrals, which are complicated to analyze and have high computational complexity to evaluate through Monte Carlo simulations, are computed. For these integrals, by using the sampling property of the integrand functions of one or more arguments, reliable BER expressions revealing the diversity and coding gains are derived. Although the methods we present are valid for a larger class of integration problems, in this work we show the step by step derivation of the BER expressions for a canonical cooperative communication scenario in addition to a network coded system starting from basic building blocks. The derived expressions agree with the simulation results for a very wide range of signal-to-noise ratio (SNR) values.
△ Less
Submitted 28 January, 2013;
originally announced January 2013.
-
Error Rate Analysis of GF(q) Network Coded Detect-and-Forward Wireless Relay Networks Using Equivalent Relay Channel Models
Authors:
Ilgın Şafak,
Emre Aktaş,
Ali Özgür Yılmaz
Abstract:
This paper investigates simple means of analyzing the error rate performance of a general q-ary Galois Field network coded detect-and-forward cooperative relay network with known relay error statistics at the destination. Equivalent relay channels are used in obtaining an approximate error rate of the relay network, from which the diversity order is found. Error rate analyses using equivalent rela…
▽ More
This paper investigates simple means of analyzing the error rate performance of a general q-ary Galois Field network coded detect-and-forward cooperative relay network with known relay error statistics at the destination. Equivalent relay channels are used in obtaining an approximate error rate of the relay network, from which the diversity order is found. Error rate analyses using equivalent relay channel models are shown to be closely matched with simulation results. Using the equivalent relay channels, low complexity receivers are developed whose performances are close to that of the optimal maximum likelihood receiver.
△ Less
Submitted 5 February, 2013; v1 submitted 10 September, 2012;
originally announced September 2012.
-
Practical Methods for Wireless Network Coding with Multiple Unicast Transmissions
Authors:
Tugcan Aktas,
A. Ozgur Yilmaz,
Emre Aktas
Abstract:
We propose a simple yet effective wireless network coding and decoding technique for a multiple unicast network. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. In order to exemplify the technique, we make use of greedy codes over the binary field and show that the arbitrary divers…
▽ More
We propose a simple yet effective wireless network coding and decoding technique for a multiple unicast network. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. In order to exemplify the technique, we make use of greedy codes over the binary field and show that the arbitrary diversity orders can be flexibly assigned to nodes. Furthermore, we present the optimal detection rule for the given model that accounts for intermediate node errors and suggest a low-complexity network decoder using the sum-product (SP) algorithm. The proposed SP detector exhibits near optimal performance. We also show asymptotic superiority of network coding over a method that utilizes the wireless channel in a repetitive manner without network coding (NC) and give related rate-diversity trade-off curves. Finally, we extend the given encoding method through selective encoding in order to obtain extra coding gains.
△ Less
Submitted 5 September, 2012; v1 submitted 14 December, 2011;
originally announced December 2011.
-
Practical Wireless Network Coding and Decoding Methods for Multiple Unicast Transmissions
Authors:
Tugcan Aktas,
Ali Ozgur Yilmaz,
Emre Aktas
Abstract:
We propose a simple yet effective wireless network coding and decoding technique. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. For this purpose, we make use of greedy codes over the binary field and show that desired diversity orders can be flexibly assigned to nodes in a multip…
▽ More
We propose a simple yet effective wireless network coding and decoding technique. It utilizes spatial diversity through cooperation between nodes which carry out distributed encoding operations dictated by generator matrices of linear block codes. For this purpose, we make use of greedy codes over the binary field and show that desired diversity orders can be flexibly assigned to nodes in a multiple unicast network, contrary to the previous findings in the literature. Furthermore, we present the optimal detection rule for the given model that accounts for intermediate node errors and suggest a network decoder using the sum-product algorithm. The proposed sum-product detector exhibits near optimal performance.
△ Less
Submitted 4 October, 2011;
originally announced October 2011.