142,066 results on '"AYDIN, A."'
Search Results
2. Flagellar Swimming at Low Reynolds Numbers: Zoospore-Inspired Robotic Swimmers with Dual Flagella for High-Speed Locomotion
- Author
-
Chikere, Nnamdi C., Voticky, Sofia Lozano, Tran, Quang D., and Ozkan-Aydin, Yasemin
- Subjects
Computer Science - Robotics - Abstract
Traditional locomotion strategies become ineffective at low Reynolds numbers, where viscous forces predominate over inertial forces. To adapt, microorganisms have evolved specialized structures like cilia and flagella for efficient maneuvering in viscous environments. Among these organisms, Phytophthora zoospores demonstrate unique locomotion mechanisms that allow them to rapidly spread and attack new hosts while expending minimal energy. In this study, we present the design, fabrication, and testing of a zoospore-inspired robot, which leverages dual flexible flagella and oscillatory propulsion mechanisms to emulate the natural swimming behavior of zoospores. Our experiments and theoretical model reveal that both flagellar length and oscillation frequency strongly influence the robot's propulsion speed, with longer flagella and higher frequencies yielding enhanced performance. Additionally, the anterior flagellum, which generates a pulling force on the body, plays a dominant role in enhancing propulsion efficiency compared to the posterior flagellum's pushing force. This is a significant experimental finding, as it would be challenging to observe directly in biological zoospores, which spontaneously release the posterior flagellum when the anterior flagellum detaches. This work contributes to the development of advanced microscale robotic systems with potential applications in medical, environmental, and industrial fields. It also provides a valuable platform for studying biological zoospores and their unique locomotion strategies.
- Published
- 2024
3. Resilience and Criticality: Brothers in Arms for 6G
- Author
-
Reifert, Robert-Jeron, Karacora, Yasemin, Chaccour, Christina, Sezgin, Aydin, and Saad, Walid
- Subjects
Computer Science - Information Theory - Abstract
In this paper, we develop the first comprehensive tutorial on designing future 6G networks that synergistically integrate notions of resilience and criticality from the ground up. While resilience refers to the ability to absorb, adapt to, and recover from adversarial or challenging conditions, criticality indicates the degree of importance or urgency assigned to a particular service or component. Despite a spiking interest in designing resilient wireless networks, most prior works do not provide a unified resilience definition, nor harness the intricate interplay between resilience and criticality. In order to fill this gap, in this paper, we highlight the importance of a criticality-aware approach as a key enabler for providing reliable and resilient service functionality. Moreover, we delve into the unique challenges and opportunities of the envisioned 6G features pertaining to resilience and (mixed) criticality. After reviewing resilience definitions, we present a core resilience strategy, a unified resilience metric, different criteria for service criticality, and prioritization frameworks, that augment the 6G resilience prospects. Afterwards, we explore the opportunities presented by promising technologies that enable a resilient 6G network design from a radio access network protocol stack perspective. We briefly revisit state-of-the-art network architectures, establish a rough connection to the Open-RAN Alliance vision, and discuss opportunities, existing techniques, and promising enabling mechanisms for 6G at each layer. Finally, the article discusses important research directions and open problems concerning resilience and criticality in 6G., Comment: 23 pages, 7 figures. Submitted to IEEE for possible publication
- Published
- 2024
4. Event-Based Framework for Agile Resilience in Criticality-Aware Wireless Networks
- Author
-
Karacora, Yasemin, Chaccour, Christina, Sezgin, Aydin, and Saad, Walid
- Subjects
Computer Science - Information Theory - Abstract
As mission- and safety-critical wireless applications grow in complexity and diversity, next-generation wireless systems must meet increasingly stringent and multifaceted requirements. These systems demand resilience along with enhanced intelligence and adaptability to ensure reliable communication under diverse conditions. This paper proposes an event-based multi-stage resilience framework, offering a guideline for efficiently integrating a combination of error mitigation techniques. The framework is applied to a case study focusing on uplink transmission of mixed-criticality data in the presence of random link blockages. The proposed scheme combines multiple blockage mitigation strategies - rate-splitting multiple access (RSMA), one-sided access point cooperation, and central decoding - within an event-driven algorithm. Each method, increasing in effectiveness and complexity, is activated sequentially to systematically overcome blockages. We model a mixed-criticality queuing system and formulate two transmit power allocation problems, one for separate decoding and one for central decoding, to ensure queue stability and fairness. Simulations evaluate the delay performance under varying blockage durations and examine the cost tradeoffs among resilience mechanisms within the proposed framework. The results suggest that passive robustness strategies effectively handle frequent short-term fluctuations, while more complex adaptation becomes germane for rare and prolonged blockages. Additionally, the results emphasize the importance of criticality-awareness for resilient communication design., Comment: 13 pages, 8 figures, submitted to IEEE Transactions on Wireless Communications
- Published
- 2024
5. Polaron formation within quantum acoustics
- Author
-
Aydin, Alhun, Keski-Rahkonen, Joonas, Graf, Anton M., Yuan, Shaobing, Ouyang, Xiao-Yu, Müstecaplıoğlu, Özgür E., and Heller, Eric J.
- Subjects
Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Strongly Correlated Electrons - Abstract
The quantum acoustic framework has recently emerged as a non-perturbative, coherent approach to electron-lattice interactions, uncovering rich physics often obscured by perturbative methods with incoherent scattering events. Here, we model the coupled dynamics of electrons and acoustic lattice vibrations within this framework, representing lattice vibrations as coherent states and electrons as quantum wavepackets. We derive and numerically implement electron backaction on the lattice, providing both visual and quantitative insights into electron wavepacket evolution, self-trapping, and the formation of small acoustic polarons. We investigate polaron binding energies across varying material parameters and compute key observables-including mean square displacement, kinetic energy, potential energy, and vibrational energy-over time. Our findings reveal the conditions that favor polaron formation, which is enhanced by low temperatures, high deformation potential constants, slow sound velocities, high effective masses, and small Fermi surfaces. Additionally, we explore the impact of external electric and magnetic fields, showing that while polaron formation remains robust under moderate fields, it is weakly suppressed at higher field strengths. These results deepen our understanding of polaron dynamics and pave the way for future studies into non-trivial transport behavior in quantum materials., Comment: 11 pages, 5 figures
- Published
- 2024
6. Large Scale Evaluation of Deep Learning-based Explainable Solar Flare Forecasting Models with Attribution-based Proximity Analysis
- Author
-
Adeyeha, Temitope, Pandey, Chetraj, and Aydin, Berkay
- Subjects
Computer Science - Machine Learning ,Astrophysics - Solar and Stellar Astrophysics ,Computer Science - Computer Vision and Pattern Recognition ,Statistics - Machine Learning - Abstract
Accurate and reliable predictions of solar flares are essential due to their potentially significant impact on Earth and space-based infrastructure. Although deep learning models have shown notable predictive capabilities in this domain, current evaluations often focus on accuracy while neglecting interpretability and reliability--factors that are especially critical in operational settings. To address this gap, we propose a novel proximity-based framework for analyzing post hoc explanations to assess the interpretability of deep learning models for solar flare prediction. Our study compares two models trained on full-disk line-of-sight (LoS) magnetogram images to predict $\geq$M-class solar flares within a 24-hour window. We employ the Guided Gradient-weighted Class Activation Mapping (Guided Grad-CAM) method to generate attribution maps from these models, which we then analyze to gain insights into their decision-making processes. To support the evaluation of explanations in operational systems, we introduce a proximity-based metric that quantitatively assesses the accuracy and relevance of local explanations when regions of interest are known. Our findings indicate that the models' predictions align with active region characteristics to varying degrees, offering valuable insights into their behavior. This framework enhances the evaluation of model interpretability in solar flare forecasting and supports the development of more transparent and reliable operational systems., Comment: This is a preprint accepted at IEEE International Conference on Big Data 2024( IEEE BigData 2024) Conference
- Published
- 2024
7. Planckian Diffusion: The Ghost of Anderson Localization
- Author
-
Zhang, Yubo, Graf, Anton M., Aydin, Alhun, Keski-Rahkonen, Joonas, and Heller, Eric J.
- Subjects
Quantum Physics ,Condensed Matter - Disordered Systems and Neural Networks - Abstract
We find that Anderson localization ceases to exist when a random medium begins to move, but another type of fundamental quantum effect, Planckian diffusion $D = \alpha\hbar/m$, rises to replace it, with $\alpha $ of order of unity. Planckian diffusion supercedes the Planckian speed limit $\tau= \alpha \hbar/k_B T,$ as it not only implies this relation in thermal systems but also applies more generally without requiring thermal equilibrium. Here we model a dynamic disordered system with thousands of itinerant impurities, having random initial positions and velocities. By incrementally increasing their speed from zero, we observe a transition from Anderson localization to Planckian diffusion, with $\alpha$ falling within the range of $0.5$ to $2$. Furthermore, we relate the breakdown of Anderson localization to three additional, distinctly different confirming cases that also exhibit Planckian diffusion $D\sim \hbar/m$, including one experiment on solid hydrogen. Our finding suggests that Planckian diffusion in dynamic disordered systems is as universal as Anderson localization in static disordered systems, which may shed light on quantum transport studies.
- Published
- 2024
8. Active partitioning: inverting the paradigm of active learning
- Author
-
Tacke, Marius, Busch, Matthias, Linka, Kevin, Cyron, Christian J., and Aydin, Roland C.
- Subjects
Computer Science - Machine Learning - Abstract
Datasets often incorporate various functional patterns related to different aspects or regimes, which are typically not equally present throughout the dataset. We propose a novel, general-purpose partitioning algorithm that utilizes competition between models to detect and separate these functional patterns. This competition is induced by multiple models iteratively submitting their predictions for the dataset, with the best prediction for each data point being rewarded with training on that data point. This reward mechanism amplifies each model's strengths and encourages specialization in different patterns. The specializations can then be translated into a partitioning scheme. The amplification of each model's strengths inverts the active learning paradigm: while active learning typically focuses the training of models on their weaknesses to minimize the number of required training data points, our concept reinforces the strengths of each model, thus specializing them. We validate our concept -- called active partitioning -- with various datasets with clearly distinct functional patterns, such as mechanical stress and strain data in a porous structure. The active partitioning algorithm produces valuable insights into the datasets' structure, which can serve various further applications. As a demonstration of one exemplary usage, we set up modular models consisting of multiple expert models, each learning a single partition, and compare their performance on more than twenty popular regression problems with single models learning all partitions simultaneously. Our results show significant improvements, with up to 54% loss reduction, confirming our partitioning algorithm's utility.
- Published
- 2024
9. Covertness in the Near Field: Maximizing the Covert Region with FDA
- Author
-
Lotfi, Fatemeh, Roth, Stefan, Chaaban, Anas, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Covert communication in wireless networks ensures that transmissions remain undetectable to adversaries, making it a potential enabler for privacy and security in sensitive applications. However, to meet the high performance and connectivity demands of sixth-generation (6G) networks, future wireless systems will require larger antenna arrays, higher operating frequencies, and advanced antenna architectures. This shift changes the propagation model from far-field planar-wave to near-field spherical-wave which necessitates a redesign of existing covert communication systems. Unlike far-field beamforming, which relies only on direction, near-field beamforming depends on both distance and direction, providing additional degrees of freedom for system design. In this paper, we aim to utilize those freedoms by proposing near-field Frequency Diverse Array (FDA)-based transmission strategies that manipulate the beampattern in both distance and angle, thereby establishing a non-covert region around the legitimate user. Our approach takes advantage of near-field properties and FDA technology to significantly reduce the area vulnerable to detection by adversaries while maintaining covert communication with the legitimate receiver. Numerical simulations show that our methods outperform conventional phased arrays by shrinking the non-covert region and allowing the covert region to expand as the number of antennas increases.
- Published
- 2024
10. Interface for Sparse Linear Algebra Operations
- Author
-
Abdelfattah, Ahmad, Ahrens, Willow, Anzt, Hartwig, Armstrong, Chris, Brock, Ben, Buluc, Aydin, Busato, Federico, Cojean, Terry, Davis, Tim, Demmel, Jim, Dinh, Grace, Gardener, David, Fiala, Jan, Gates, Mark, Haider, Azzam, Imamura, Toshiyuki, Lara, Pedro Valero, Moreira, Jose, Li, Sherry, Luszczek, Piotr, Melichenko, Max, Moeira, Jose, Mokwinski, Yvan, Murray, Riley, Patty, Spencer, Peles, Slaven, Ribizel, Tobias, Riedy, Jason, Rajamanickam, Siva, Sao, Piyush, Shantharam, Manu, Teranishi, Keita, Tomov, Stan, Tsai, Yu-Hsiang, and Weichelt, Heiko
- Subjects
Computer Science - Mathematical Software - Abstract
The standardization of an interface for dense linear algebra operations in the BLAS standard has enabled interoperability between different linear algebra libraries, thereby boosting the success of scientific computing, in particular in scientific HPC. Despite numerous efforts in the past, the community has not yet agreed on a standardization for sparse linear algebra operations due to numerous reasons. One is the fact that sparse linear algebra objects allow for many different storage formats, and different hardware may favor different storage formats. This makes the definition of a FORTRAN-style all-circumventing interface extremely challenging. Another reason is that opposed to dense linear algebra functionality, in sparse linear algebra, the size of the sparse data structure for the operation result is not always known prior to the information. Furthermore, as opposed to the standardization effort for dense linear algebra, we are late in the technology readiness cycle, and many production-ready software libraries using sparse linear algebra routines have implemented and committed to their own sparse BLAS interface. At the same time, there exists a demand for standardization that would improve interoperability, and sustainability, and allow for easier integration of building blocks. In an inclusive, cross-institutional effort involving numerous academic institutions, US National Labs, and industry, we spent two years designing a hardware-portable interface for basic sparse linear algebra functionality that serves the user needs and is compatible with the different interfaces currently used by different vendors. In this paper, we present a C++ API for sparse linear algebra functionality, discuss the design choices, and detail how software developers preserve a lot of freedom in terms of how to implement functionality behind this API., Comment: 43 pages
- Published
- 2024
11. Uncertainty Propagation and Minimization for Channel Estimation in UAV-mounted RIS Systems
- Author
-
Weinberger, Kevin, Müller, David, Mönnigmann, Martin, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Reconfigurable Intelligent Surfaces (RIS) are emerging as a key technology for sixth-generation (6G) wireless networks, leveraging adjustable reflecting elements to dynamically control electromagnetic wave propagation and optimize wireless connectivity. By positioning the RIS on an unmanned aerial vehicle (UAV), it can maintain line-of-sight and proximity to both the transmitter and receiver, critical factors that mitigate path loss and enhance signal strength. The lightweight, power-efficient nature of RIS makes UAV integration feasible, yet the setup faces significant disturbances from UAV motion, which can degrade RIS alignment and link performance. In this study, we address these challenges using both experimental measurements and analytical methods. Using an extended Kalman filter (EKF), we estimate the UAV's orientation in real time during experimental flights to capture real disturbance effects. The resulting orientation uncertainty is then propagated to the RIS's channel estimates by applying the Guide to the Expression of Uncertainty in Measurement (GUM) framework as well as complex-valued propagation techniques to accurately assess and minimize the impact of UAV orientation uncertainties on RIS performance. This method enables us to systematically trace and quantify how orientation uncertainties affect channel gain and phase stability in real-time. Through numerical simulations, we find that the uncertainty of the RIS channel link is influenced by the RIS's configuration. Furthermore, our results demonstrate that the uncertainty area is most accurately represented by an annular section, enabling a 58% reduction in the uncertainty area while maintaining a 95% coverage probability., Comment: 6 pages, 3 figures, submitted to IEEE International Conference on Communications 2025
- Published
- 2024
12. ITACLIP: Boosting Training-Free Semantic Segmentation with Image, Text, and Architectural Enhancements
- Author
-
Aydın, M. Arda, Çırpar, Efe Mert, Abdinli, Elvin, Unal, Gozde, and Sahin, Yusuf H.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Recent advances in foundational Vision Language Models (VLMs) have reshaped the evaluation paradigm in computer vision tasks. These foundational models, especially CLIP, have accelerated research in open-vocabulary computer vision tasks, including Open-Vocabulary Semantic Segmentation (OVSS). Although the initial results are promising, the dense prediction capabilities of VLMs still require further improvement. In this study, we enhance the semantic segmentation performance of CLIP by introducing new modules and modifications: 1) architectural changes in the last layer of ViT and the incorporation of attention maps from the middle layers with the last layer, 2) Image Engineering: applying data augmentations to enrich input image representations, and 3) using Large Language Models (LLMs) to generate definitions and synonyms for each class name to leverage CLIP's open-vocabulary capabilities. Our training-free method, ITACLIP, outperforms current state-of-the-art approaches on segmentation benchmarks such as COCO-Stuff, COCO-Object, Pascal Context, and Pascal VOC. Our code is available at https://github.com/m-arda-aydn/ITACLIP.
- Published
- 2024
13. Robust Communication Design in RIS-Assisted THz Channels
- Author
-
Karacora, Yasemin, Umra, Adam, and Sezgin, Aydin
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Terahertz (THz) communication offers the necessary bandwidth to meet the high data rate demands of next-generation wireless systems. However, it faces significant challenges, including severe path loss, dynamic blockages, and beam misalignment, which jeopardize communication reliability. Given that many 6G use cases require both high data rates and strong reliability, robust transmission schemes that achieve high throughput under these challenging conditions are essential for the effective use of high-frequency bands. In this context, we propose a novel mixed-criticality superposition coding scheme for reconfigurable intelligent surface (RIS)-assisted THz systems. This scheme leverages both the strong but intermittent direct line-of-sight link and the more reliable, yet weaker, RIS path to ensure robust delivery of high-criticality data while maintaining high overall throughput. We model a mixed-criticality queuing system and optimize transmit power to meet reliability and queue stability constraints. Simulation results show that our approach significantly reduces queuing delays for critical data while sustaining high overall throughput, outperforming conventional time-sharing methods. Additionally, we examine the impact of blockage, beam misalignment, and beamwidth adaptation on system performance. These results demonstrate that our scheme effectively balances reliability and throughput under challenging conditions, while also underscoring the need for robust beamforming techniques to mitigate the impact of misalignment in RIS-assisted channels., Comment: 12 pages, 10 figures. Invited paper, submitted to the IEEE Open Journal of the Communication Society (OJ-COMS)
- Published
- 2024
14. Double Media-Based Modulation Scheme for High-Rate Wireless Communication Systems
- Author
-
Ozden, Burak Ahmet, Aydin, Erdogan, and Cogen, Fatih
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Current wireless communication technologies are insufficient in the face of ever-increasing demands. Therefore, novel and high-performance communication systems are needed. In this paper, a novel high data rate and high-performance index modulation scheme called double media-based modulation (DMBM) is proposed. The DMBM system doubles the number of mirror activation patterns (MAPs) and the number of transmitted symbols compared to the traditional MBM system during the same symbol period. In this way, the spectral efficiency of the DMBM is doubled and the error performance improves as the number of bits carried in the indices increases. Performance analysis of the DMBM scheme is evaluated for $M$-ary quadrature amplitude modulation ($M$-QAM) on Rayleigh fading channels. The error performance of the proposed DMBM system is compared with spatial modulation (SM), quadrature SM (QSM), MBM, and double SM (DSM) techniques. Also, the throughput, complexity, energy efficiency, spectral efficiency, and capacity analyses for the proposed DMBM system and SM, QSM, MBM, and DSM systems are presented. All analysis results show that the proposed DMBM system is superior to the compared systems., Comment: 7 pages, 7 figures, 2 tables
- Published
- 2024
15. Leveraging Conversational Generative AI for Anomaly Detection in Digital Substations
- Author
-
Zaboli, Aydin, Choi, Seong Lok, and Hong, Junho
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Systems and Control - Abstract
This study addresses critical challenges of cybersecurity in digital substations by proposing an innovative task-oriented dialogue (ToD) system for anomaly detection (AD) in multicast messages, specifically, generic object oriented substation event (GOOSE) and sampled value (SV) datasets. Leveraging generative artificial intelligence (GenAI) technology, the proposed framework demonstrates superior error reduction, scalability, and adaptability compared with traditional human-in-the-loop (HITL) processes. Notably, this methodology offers significant advantages over machine learning (ML) techniques in terms of efficiency and implementation speed when confronting novel and/or unknown cyber threats, while also maintaining model complexity and precision. The research employs advanced performance metrics to conduct a comparative assessment between the proposed AD and HITL-based AD frameworks, utilizing a hardware-in-the-loop (HIL) testbed for generating and extracting features of IEC61850 communication messages. This approach presents a promising solution for enhancing the reliability of power system operations in the face of evolving cybersecurity challenges., Comment: 5 pages, 4 figures, Submitted to 2025 IEEE Power and Energy Society General Meeting (PESGM 2025), Austin, TX
- Published
- 2024
16. Studying network of symmetric periodic orbit families of the Hill problem via symplectic invariants
- Author
-
Aydin, Cengiz and Batkhin, Alexander
- Subjects
Mathematics - Dynamical Systems ,Mathematics - Symplectic Geometry ,70G45, 70F07, 70H12 - Abstract
In the framework of the spatial circular Hill three-body problem we illustrate the application of symplectic invariants to analyze the network structure of symmetric periodic orbit families. The extensive collection of families within this problem constitutes a complex network, fundamentally comprising the so-called basic families of periodic solutions, including the orbits of the satellite $g$, $f$, the libration (Lyapunov) $a,c$, and collision $\mathcal B_0$ families. Since the Conley-Zehnder index leads to a grading on the local Floer homology and its Euler characteristics, a bifurcation invariant, the computation of those indices facilitates the construction of well-organized bifurcation graphs depicting the interconnectedness among families of periodic solutions. The critical importance of the symmetries of periodic solutions in comprehending the interaction among these families is demonstrated., Comment: 57 pages, 26 figures, 17 tables of data
- Published
- 2024
17. Wireless Localization with Space-Time Coded Reconfigurable Intelligent Surfaces
- Author
-
Gholami, Mehdi, Khajavi, Soheil, Neshat, Mohammad, Tewes, Simon, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
In this paper, a novel approach for wireless localization is proposed and experimentally validated that leverages space-time coded reconfigurable intelligent surfaces (RIS). It is demonstrated that applying proper single-bit codes to each RIS element, enables accurate determination of the direction of arrival (AOA) at the receiver. Moreover, we introduce different scenarios that such technique can be used for localization. By incorporating RIS, a passive component, the method significantly reduces the complexity found in previous localization techniques. Additionally, the use of 1-bit codes minimizes hardware requirements, offering a reliable, low-cost solution for localization in advanced telecommunications networks.
- Published
- 2024
18. Realization of Reconfigurable Intelligent Surfaces with Space-Time Coded Metasurfaces
- Author
-
Gholami, Mehdi, Khajavi, Soheil, Neshat, Mohammad, Tewes, Simon, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
This paper presents experimental realization of a reconfigurable intelligent surface (RIS) using space-time coding metasurfaces to enable concurrent beam steering and data modulation. The proposed approach harnesses the capabilities of metasurfaces, allowing precise temporal control over individual unit cells of the RIS. We show that by employing proper binary codes manipulating the state of unit cells, the RIS can act as a digital data modulator with beam steering capability. We describe the experimental setup and computational tools, followed by validation through harmonic generation and investigation of beam steering and data modulation. Additionally, four digital modulation schemes are evaluated. By implementing customized binary codes, constellations under varying conditions are compared, showcasing the potential for real-world applications. This study offers new insights into the practical implementation of RIS for advanced wireless communication systems.
- Published
- 2024
19. Almost Sure Convergence of Networked Policy Gradient over Time-Varying Networks in Markov Potential Games
- Author
-
Aydin, Sarper and Eksin, Ceyhun
- Subjects
Electrical Engineering and Systems Science - Systems and Control ,Mathematics - Optimization and Control - Abstract
We propose networked policy gradient play for solving Markov potential games including continuous action and state spaces. In the decentralized algorithm, agents sample their actions from parametrized and differentiable policies that depend on the current state and other agents' policy parameters. During training, agents estimate their gradient information through two consecutive episodes, generating unbiased estimators of reward and policy score functions. Using this information, agents compute the stochastic gradients of their policy functions and update their parameters accordingly. Additionally, they update their estimates of other agents' policy parameters based on the local estimates received through a time-varying communication network. In Markov potential games, there exists a potential value function among agents with gradients corresponding to the gradients of local value functions. Using this structure, we prove the almost sure convergence of joint policy parameters to stationary points of the potential value function. We also show that the convergence rate of the networked policy gradient algorithm is $\mathcal{O}(1/\epsilon^2)$. Numerical experiments on a dynamic multi-agent newsvendor problem verify the convergence of local beliefs and gradients. It further shows that networked policy gradient play converges as fast as independent policy gradient updates, while collecting higher rewards., Comment: 22 pages, journal version
- Published
- 2024
20. Interchangeable Token Embeddings for Extendable Vocabulary and Alpha-Equivalence
- Author
-
Işık, İlker, Cinbis, Ramazan Gokberk, and Gol, Ebru Aydin
- Subjects
Computer Science - Computation and Language ,Computer Science - Machine Learning ,Computer Science - Logic in Computer Science - Abstract
We propose a novel approach for learning interchangeable tokens in language models to obtain an extendable vocabulary that can generalize to new tokens. Our method is designed to address alpha-equivalence, the principle that renaming bound variables in a syntactic expression preserves semantics. This property arises in many formal languages such as temporal logics, in which all proposition symbols represent the same concept but are distinguishable from each other. To handle such tokens, we develop a dual-part embedding approach. The first part is shared across all interchangeable tokens, thereby enforcing that they represent the same core concept. The second part is randomly generated for each token, which enables distinguishability. We evaluate our method in a Transformer encoder-decoder model on two tasks: solving linear temporal logic formulae and copying with extendable vocabulary. Our method demonstrates promising generalization capabilities in addition to introducing a favorable inductive bias for alpha-equivalence., Comment: 14 pages, 5 figures
- Published
- 2024
21. A Physics-Based Context-Aware Approach for Anomaly Detection in Teleoperated Driving Operations Under False Data Injection Attacks
- Author
-
Ghosh, Subhadip, Zaboli, Aydin, Hong, Junho, and Kwon, Jaerock
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Teleoperated driving (ToD) systems are a special type of cyber-physical system (CPS) where the operator remotely controls the steering, acceleration, and braking actions of the vehicle. Malicious actors may inject false data into communication channels to manipulate the teleoperator's driving commands to cause harm. Hence, protection of this communication is necessary for a safe operation of the target vehicle. However, according to the National Institute of Standards and Technology (NIST) cybersecurity framework, protection is not enough, and detecting an attack is necessary. Moreover, UN R155 mandates that vehicle fleets detect and log security incidents. Thus, the cyber-physical threats of ToD are modeled using the attack-centric approach in this paper. Then, an attack model with false data injection (FDI) on the steering control command is created from real vehicle data. A risk of this attack model is assessed for a last-mile delivery (LMD) application. Finally, a physics-based context-aware anomaly detection system (PCADS) is proposed to detect such false injection attacks, and preliminary experimental results are presented to validate the model., Comment: 27 pages, 14 figures, Submitted to IET Intelligent Transport Systems
- Published
- 2024
22. Elementary Constructions of Best Known Quantum Codes
- Author
-
Aydin, Nuh, Nguyen, Trang T. T., and Tran, Long B.
- Subjects
Computer Science - Information Theory ,Mathematics - Quantum Algebra - Abstract
Recently, many good quantum codes over various finite fields $F_q$ have been constructed from codes over extension rings or mixed alphabet rings via some version of a Gray map. We show that most of these codes can be obtained more directly from cyclic codes or their generalizations over $F_q$. Unless explicit benefits are demonstrated for the indirect approach, we believe that direct and more elementary methods should be preferred.
- Published
- 2024
23. A Structural Analysis of the User Behavior Dynamics for Environmentally Sustainable ICT
- Author
-
Roth, Stefan and Sezgin, Aydin
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing ,Electrical Engineering and Systems Science - Systems and Control - Abstract
The sector of information and communication technology (ICT) can contribute to the fulfillment of the Paris agreement and the sustainable development goals (SDGs) through the introduction of sustainability strategies. For environmental sustainability, such strategies should contain efficiency, sufficiency, and consistency measures. To propose such, a structural analysis of ICT is undertaken in this manuscript. Thereby, key mechanisms and dynamics behind the usage of ICT and the corresponding energy and resource use are analyzed by describing ICT as a complex system. The system contains data centers, communication networks, smartphone hardware, apps, and the behavior of the users as sub-systems, between which various Morinian interactions are present. Energy and non-energy resources can be seen as inputs of the system, while e-waste is an output. Based on the system description, we propose multiple measures for efficiency, sufficiency and consistency to reduce greenhouse gas emissions and other environmental impacts.
- Published
- 2024
24. Copula based joint regression models for correlated data: an analysis in the bivariate case
- Author
-
Sareff-Hibbert, Aydin and Heller, Gillian Z.
- Subjects
Statistics - Methodology ,Statistics - Applications - Abstract
Regression analysis of non-normal correlated data is commonly performed using generalized linear mixed models (GLMM) and generalized estimating equations (GEE). The recent development of generalized joint regression models (GJRM) presents an alternative to these approaches by using copulas to flexibly model response variables and their dependence structures. This paper provides a simulation study that compares the GJRM with alternative methods. We focus on the case of the marginal distributions having the same form, for example, in models for longitudinal data. We find that for the normal model with identity link, all models provide accurate estimates of the parameters of interest. However, for non-normal models and when a non-identity link function is used, GLMMs in general provide biased estimates of marginal model parameters with inaccurately low standard errors. GLMM bias is more pronounced when the marginal distributions are more skewed or highly correlated. However, in the case that a GLMM parameter is estimated independently of the random effect term, we show it is possible to extract accurate parameter estimates, shown for a longitudinal time parameter with a logarithmic link model. In contrast, we find that GJRM and GEE provide unbiased estimates for all parameters with accurate standard errors when using a logarithmic link. In addition, we show that GJRM provides a model fit comparable to GLMM. In a real-world study of doctor visits, we further demonstrate that the GJRM provides better model fits than a comparable GEE or GLM, due to its greater flexibility in choice of marginal distribution and copula fit to dependence structures. We conclude that the GJRM provides a superior approach to current popular models for analysis of non-normal correlated data.
- Published
- 2024
25. Assessing Privacy Policies with AI: Ethical, Legal, and Technical Challenges
- Author
-
Aydin, Irem, Diebel-Fischer, Hermann, Freiberger, Vincent, Möller-Klapperich, Julia, Buchmann, Erik, Färber, Michael, Lauber-Rönsberg, Anne, and Platow, Birte
- Subjects
Computer Science - Computers and Society - Abstract
The growing use of Machine Learning and Artificial Intelligence (AI), particularly Large Language Models (LLMs) like OpenAI's GPT series, leads to disruptive changes across organizations. At the same time, there is a growing concern about how organizations handle personal data. Thus, privacy policies are essential for transparency in data processing practices, enabling users to assess privacy risks. However, these policies are often long and complex. This might lead to user confusion and consent fatigue, where users accept data practices against their interests, and abusive or unfair practices might go unnoticed. LLMss can be used to assess privacy policies for users automatically. In this interdisciplinary work, we explore the challenges of this approach in three pillars, namely technical feasibility, ethical implications, and legal compatibility of using LLMs to assess privacy policies. Our findings aim to identify potential for future research, and to foster a discussion on the use of LLM technologies for enabling users to fulfil their important role as decision-makers in a constantly developing AI-driven digital economy., Comment: Published at AISyS 2024
- Published
- 2024
26. Optimizing Energy Efficiency with RSMA: Balancing Low and High QoS Requirements
- Author
-
Sivadevuni, Srivardhan, Weinberger, Kevin, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Future wireless systems are expected to deliver significantly higher quality-of-service (QoS) albeit with fewer energy resources for diverse, already existing and also novel wireless applications. The optimal resource allocation for a system in this regard could be investigated by reducing the overall power available at the expense of reduced QoS for the inefficient users. In other words, we maximize the system energy efficiency by achieving power saving through a minimal back-off in terms of QoS. In this paper, we investigate the energy efficiency vs. delivered QoS trade-off for the rate-splitting multiple access (RSMA) assisted downlink system. We first determine the user grouping with a normalised channel similarity metric so as to allow a large number of users with non-zero achievable private message rates. Through the private message removal (PMR) of these users, we aim to investigate the QoS vs. energy efficiency trade-off. Numerical results indicate a peak of ~$10\%$ increase in the network energy efficiency for the proposed normalised channel similarity metric based user grouping with scheduled PMR., Comment: 5 pages, 4 figures, IEEE SPAWC 2024 Conference version
- Published
- 2024
27. Class of codes correcting absorptions and emissions
- Author
-
Aydin, Arda and Barg, Alexander
- Subjects
Quantum Physics ,Computer Science - Information Theory - Abstract
We construct a general family of quantum codes that protect against all emission, absorption, dephasing, and raising/lowering errors up to an arbitrary fixed order. Such codes are known in the literature as absorption-emission (AE) codes. We derive simplified error correction conditions for a general AE code and show that any permutation-invariant code that corrects $\le t$ errors can be mapped to an AE code that corrects up to order-$t$ transitions. Carefully tuning the parameters of permutationally invariant codes, we construct several examples of efficient AE codes, hosted in systems with low total angular momentum. Our results also imply that spin codes can be mapped to AE codes, enabling us to characterize logical operators for certain subclasses of such codes.
- Published
- 2024
28. On Neural-Network Representation of Wireless Self-Interference for Inband Full-Duplex Communications
- Author
-
Enzner, Gerald, Chinaev, Aleksej, Voit, Svantje, and Sezgin, Aydin
- Subjects
Electrical Engineering and Systems Science - Signal Processing - Abstract
Neural network modeling is a key technology of science and research and a platform for deployment of algorithms to systems. In wireless communications, system modeling plays a pivotal role for interference cancellation with specifically high requirements of accuracy regarding the elimination of self-interference in full-duplex relays. This paper hence investigates the potential of identification and representation of the self-interference channel by neural network architectures. The approach is promising for its ability to cope with nonlinear representations, but the variability of channel characteristics is a first obstacle in straightforward application of data-driven neural networks. We therefore propose architectures with a touch of "adaptivity" to accomplish a successful training. For reproducibility of results and further investigations with possibly stronger models and enhanced performance, we document and share our data.
- Published
- 2024
29. Invastigation of Patient and Hospital Perceptions of Children Participating in Education at the House of Compassion
- Author
-
Zeynep Nur Aydin Kiliç, Fatma Tezel Sahin, and Seyma Sultan Bozkurt
- Abstract
This study was conducted to determine the perceptions of children, one of whose relatives was undergoing chemotherapy treatment and who participated in education at the House of Compassion, about the patient and hospital perceptions and their views on the House of Compassion. Case study design, one of the qualitative research designs, was used. Criterion sampling, one of the purposeful sampling types, was used to determine the study group. The study group consisted of 20 children who participated in the training at the House of Compassion in a hospital in Ankara and one of whose relatives was undergoing chemotherapy treatment. In the study, "Demographic Information Form" was used to collect information about children and parents, "Child Interview Form" and "Children's Pictures" were used to determine children's perceptions of patients, hospital and House of Compassion. The data obtained were analyzed using the descriptive analysis technique. As a result of the research, it was observed that children knew the definition of the hospital, the personnel working in the hospital, and the practices carried out, and emphasized the healing and therapeutic aspects of the hospital. Children reported coming to the House of Compassion to play games, have fun, and have a good time. It was determined that children felt happy and sound in the House of Compassion and that they liked the House of Compassion. As a result, it can be said that the House of Compassion has positive effects on children's perceptions of the patient and the hospital.
- Published
- 2024
30. Reflections of Local Learning Environments on Secondary School Students: The Wastewater Treatment Plant
- Author
-
Cuneyd Celik and Güliz Aydin
- Abstract
The purpose of the current study is to reveal the reflections of the Köycegiz Wastewater Treatment Plant (WTP) field trip planned within the context of the unit "Domestic Waste and Recycling" and the activities carried out concerning this trip on middle school students in Turkey. This research was conducted based on the semi-mixed method using a single-group pretest-posttest quasi-experimental design. The quantified data were collected using open-ended questions about domestic waste and recycling, while the qualitative data were collected through semi-structured interviews. Twenty-seven middle school students (17 females, 10 males) participated in the study selected by convenience sampling method. According to the study's quantitative findings, the field trip to the wastewater treatment plant made the students realize the wastes produced at home, recyclable materials, the importance of recycling, and the contributions of wastewater treatment plants to the country's economy and nature. On the other hand, the quantitative findings indicate that this trip helped the students develop more eco-centric behaviors (Protection of biodiversity, Protection of nature, and Protection of resources, etc.). Moreover, the contributions made by the field trip structured within environmental education to the students could be gathered under the following headings: sustainability, personal, and cognitive.
- Published
- 2024
31. A Proposal for Policy Framework and Emergency Action Plan after COVID-19 for Distance Education Practices in Higher Education
- Author
-
Mehmet Yavuz, Münevver Gündüz, Sinem Çilligöl Karabey, Yusuf Zafer Can Ugurhan, Selçuk Karaman, Engin Kursun, Halil I?Brahim Bülbül, Hasan Karal, Levent Sahin, Muhammet Recep Okur, Sinan Aydin, and Vehbi Aytekin Sanalan
- Abstract
This study aimed to investigate distance education practices in higher education during the pandemic, focusing on lived experiences, and proposing a policy decision framework for future distance education in similar conditions. Additionally, the study aimed to establish a design framework for an Emergency Action Plan for similar crisis periods. In the study, a case study was used to provide a detailed examination of the current situation's characteristics. The study group consisted of 63 administrators from 34 universities who actively participated in decision-making during the pandemic. Data were collected through 11 online focus group interviews, and the Miles-Huberman Model was used for analysis. The study proposed a policy decision framework for distance education in the post-pandemic period, consisting of 11 headings such as blended learning, open course materials, and Distance Education Center structuring. Additionally, the study presented an emergency action plan framework consisting of six components, including keeping the technological infrastructure working and supporting face-to-face courses with distance education. This study provides valuable insights for universities in preparing for potential crises and improving their distance education practices.
- Published
- 2024
32. Effectiveness of Blended Learning Environments in University Students Pursuing Undergraduate Education in Sports Sciences
- Author
-
Özgür Aydin and Talha Murathan
- Abstract
This study aims to examine the perceptions and effectiveness evaluations of blended learning environments among university students majoring in sports education at Inönü University and Firat University. The research, conducted in the 2022-2023 academic year, is descriptive using quantitative methods, with a sample of 674 students from the Faculties of Sports Sciences at Inönü University and Firat University. Data collected through the Blended Learning Environments Effectiveness Scale were analyzed using the SPSS program. The research findings indicate that students perceive face-to-face learning environments as more effective and contribute more to the learning experience (x=4.062). Blended learning environments are considered the second most effective learning environment (x=3.841). However, online learning environments (x=3.342) and technical issues (x=2.957) present some challenges. Correlation analysis reveals a moderate positive relationship between face-to-face learning environments and blended learning environments (r=0.435, p<0.01), as well as between online learning environments and blended learning environments (r=0.540, p<0.01). The effectiveness of blended learning environments for university students in sports education is associated with factors such as student motivation, student-teacher interaction, technical support, and communication. Face-to-face learning environments are perceived as the most effective by students and contribute significantly to the learning experience. Blended learning, as an effective method, has the potential to adapt to different learning styles and address technical challenges. However, careful attention is required regarding the effectiveness of online learning environments and technical support issues.
- Published
- 2024
33. Student Opinions on Technology-Assisted Drama Activities Applied in a Biology Course: Learning the Central Nervous System
- Author
-
Seda Vural Aydin and Meryem Konu Kadirhanogullari
- Abstract
This research aimed to determine students' opinions on technology-supported drama activities applied in teaching the subject of the central nervous system in the biology course. The research used a case study design, a qualitative research method. The study was conducted with 25 students studying biology at a state university. An appropriate sampling method was used to determine the study group. Within the scope of the research, a semi-structured interview form was used to determine students' opinions about technology-supported drama method applications. This form allowed students to express their experiences in depth. The research results indicated that the students had a generally positive perspective on the technology-supported drama method used in the biology course. Since technology-supported creative drama activities provide students with a learning environment that they enjoy, this method can be recommended to increase students' interest in lessons and ensure permanent learning of content.
- Published
- 2024
34. STEM-Engineering Education with a Disadvantaged Student Group
- Author
-
Ganime Aydin, Mehpare Saka, and Jale Çakiroglu
- Abstract
The aims of this research were to examine the changes in the students' perceptions of engineers, engineering as a profession, learning of engineering design processes (EDP), awareness of engineering branches, and their future career choices through Engineering Design Process activities with the 5E learning model. Sixty disadvantaged students between 4th grade to 8th grades comprised the sample group. Engineering activities were held over 8 weekend days outside of school with engineers and science educators. The study was a single group pre-test and post-test weak experimental design using qualitative data sources. Draw an Engineer Test (DAET) along with written descriptions were used as a pre-test and post-test to examine students' perceptions of engineers and engineering before and after the intervention and the career choice test (CCT) was used to compare their future career choices and awareness of engineering branches. Based on the results, their perceptions about engineering changed by using the words design, produce, invention, and production, which were included in EDP. Their career choice of being an engineer or learning engineering branches changed with the aim of improving their standard of living.
- Published
- 2024
35. The Effect of Using Technology-Assisted Drama Method in Teaching the Central Nervous System Subject on Academic Achievement and Attitude
- Author
-
Meryem Konu-Kadirhanogullari and Seda Vural-Aydin
- Abstract
The aim of this research is to examine the effects of technology-supported drama method applications on students' academic achievements regarding the central nervous system and their attitudes towards biology. In the research, quasi-experimental design with pre-test post-test control group, one of the quantitative research methods, was used. The sample of the research consists of 50 students studying in two separate classes at a state university and taking biology courses. Within the scope of the research, the subject of the central nervous system was taught with the traditional teaching method in the control group and with the technology-supported drama method in the experimental group. In the research, "Academic Achievement Test" and "Biology Attitude Scale" were used as data collection tools to measure the academic achievements of the students. A statistical package program was used to analyze the data. As a result of the research, it was determined that the course carried out with the technology-supported drama method generally positively affected the academic achievements and attitudes of the students. In future studies, it is recommended that the effects of technology-supported drama method on students' academic achievement and attitudes in biology courses be examined in the long term with larger and more diverse sample groups.
- Published
- 2024
36. The Impact of Computer-Assisted and Direct Strategy Teaching on Reading Comprehension
- Author
-
Aydin Bulut and Mustafa Yildiz
- Abstract
Background: The use of computer-assisted reading comprehension is of critical importance in the context of promoting effective and engaging literacy education in the digital age. It provides students with the opportunity to work at their own pace and convenience, thereby facilitating self-directed learning and accommodating various learning preferences and schedules. Objectives: The objective of the study was to investigate the impact of computer-assisted and direct strategy teaching on reading comprehension, reading comprehension self-efficacy and reading comprehension metacognitive awareness. An experimental application based on the SQ4R strategy was conducted in the direct strategy teaching (DST) and computer-assisted strategy teaching (CAST) programmes. In the DST group, the implementation of the SQ4R strategy was conducted through direct strategy teaching, whereas in the CAST group, the same activities were carried out with the assistance of computer-based resources. The principal objective of the study was to evaluate the efficacy of computer-assisted strategy instruction. Methods: This study employed a combined sequential descriptive design, integrating qualitative and quantitative research models. The study was conducted with 61 fourth-grade students, enrolled in three classrooms of a public school situated in the central district of Kastamonu, Turkey, which is characterised by a moderate socioeconomic level. The quantitative component of the study was designed as a pre-test--post-test control group experimental study. The qualitative component of the study comprised focus group interviews and observation. Two experimental groups and one control group were established in the course of this study. In the quantitative dimension of the combined sequential descriptive model, the Reading Comprehension Test, Metacognitive Reading Comprehension Scale, and Reading Comprehension Self-Efficacy Scale were employed as data collection instruments. In order to collect data in the qualitative dimension, semi-structured interview and observation forms were employed. Furthermore, the researcher's diaries, maintained throughout the research process, were employed as a data source. The quantitative data were analysed using the following techniques: arithmetic mean, frequency, percentage, standard deviation, ANOVA and covariance analysis (ANCOVA). A descriptive analysis was employed for the evaluation of the qualitative data. Results and Conclusions: Upon examination of the post-test scores of the CAST, DST and control group students in the Reading Comprehension Test, it was observed that the CAST group exhibited the highest average. A statistically significant difference was also identified between the CAST group and the control group. Nevertheless, no statistically significant difference was identified between the DST group and the control group. Nevertheless, an examination of the mean scores reveals that the DST group exhibited considerably higher Reading Comprehension Test scores.
- Published
- 2024
- Full Text
- View/download PDF
37. Promoting Inclusion through Embedded Instruction: Enhancing Preschool Teachers' Implementation of Learning Opportunities for Children with Disabilities
- Author
-
Salih Rakap, Serife Balikci, Burak Aydin, and Sinan Kalkan
- Abstract
Embedded instruction facilitates individualized support and promotes meaningful participation for all children, irrespective of their abilities or disabilities, by integrating learning opportunities into the natural, everyday activities of inclusive preschool settings. This study aimed to investigate the impact of a coaching intervention on the fidelity of preschool teachers' implementation of embedded learning opportunities (ELOs) and child learning outcomes, using a multiple baseline across participants design. Four preschool teachers and four children with disabilities participated in the study. Findings showed that teachers' correct implementation of ELOs increased slightly after the introduction of the workshop training, but criterion level of performance was only achieved after practice-based coaching support. All four teachers sustained high levels of correct implementation during maintenance sessions conducted intermittently after the coaching intervention. As the accuracy of preschool teachers' implementation of ELOs increased, the percentage of children's correct responses regarding target behaviors also increased. The social validity data indicated that preschool teachers found embedded instruction practices and the coaching intervention effective, beneficial, and suitable. Overall, the study provides evidence supporting coaching as an effective professional development strategy for improving the implementation of ELOs and enhancing child learning outcomes in inclusive preschool classrooms. The study underscores the importance of ongoing coaching support to ensure sustained use of ELOs among preschool teachers, thereby facilitating the development and learning of preschool children with developmental disabilities in inclusive settings.
- Published
- 2024
- Full Text
- View/download PDF
38. The Power Card Strategy: Strength-Based Intervention against Bullying for Children with Autism Spectrum Disorder
- Author
-
Hatice Ulu Aydin, Ilknur Cifci Tekinarslan, and Yesim Gulec Aslan
- Abstract
The pattern of behaviors and abilities that reflect the core characteristics of students with autism spectrum disorder (ASD) and an environment that lacks the ability to understand individuals with ASD can make these students targets of bullying. Bullying is a serious problem for students with ASD, and practices against it are important in terms of improving students' coping strategies and overall well-being. In this study, we used a multiple probe model with an interprobe phase across participants to evaluate the effectiveness of the power card strategy to teach three students with ASD to respond to bullying. At baseline, the students gave few appropriate responses based on coping strategies for bullying after listening to stories about bullying. During the application of the power cards, the students read scenarios and power cards created for their favorite heroes or special interests, which included coping strategies for three different bullying situations (exclusion, being pushed, and being tickled). Then, they watched animations prepared for these bullying situations and were asked to answer questions about strategies to deal with bullying. The findings showed that all three students learned targeted strategies for coping with bullying in the context of the sessions using power cards. The students were able to generalize to different bullying situations (teasing, damaging one's belongings, being ignored) while retaining their strategies for coping with bullying in the context of the sessions held after the teaching was completed. The social validity findings of the power card strategy showed that one out of three students exhibited coping strategies for bullying in the school environment. The findings of the present study are discussed in the context of bullying and ASD, limitations, and recommendations.
- Published
- 2024
- Full Text
- View/download PDF
39. Adaptation and Development of Parent Rating Scale for Giftedness
- Author
-
Seyda Aydin-Karaca, Mustafa Serdar Köksal, and Bilkay Bi
- Abstract
This study aimed to develop a parent rating scale (PRSG) for screening children for further identification process in terms of giftedness. The participants of the study were 255 parents of gifted and non-gifted students. The PRSG, consisting of 30 items, was created by consulting parents and reviewing instruments existent in the literature. As part of the validity testing, the content, construct, and criterion-related validities were examined. Expert opinion was sought for content validity. Construct validity was achieved as the findings of the confirmatory factor analysis confirmed the three-factor model in the 27-item instrument. The parents rated their own children after the researchers showed them how to rate their children. One hundred and sixty parents had a gifted child. Finally, the scores given by the parents of gifted children and those of the non-gifted were compared, which yielded a statistically significant difference between the mean scores in favor of the scores given by the parents of the gifted. The Cronbach alpha value was found to be .95 for the whole instrument.
- Published
- 2024
- Full Text
- View/download PDF
40. Accelerating Multi-GPU Embedding Retrieval with PGAS-Style Communication for Deep Learning Recommendation Systems
- Author
-
Chen, Yuxin, Buluc, Aydin, Yelick, Katherine Yelick, and Owens, John D.
- Subjects
PGAS ,DLMR ,communication ,GPU ,collective calls - Abstract
In this paper, we propose using Partitioned Global Address Space (PGAS) GPU one-sided asynchronous small messages to replace the widely used collective communication calls for sparse input multi-GPU embedding retrieval in deep learning recommendation systems. This GPU PGAS communication approach achieves (1) better communication and computation overlap, (2) smoother network usage, and (3) reduced overhead (due to the data unpack and rearrangement steps associated with collective communication calls). We implement a CUDA embedding retrieval backend for PyTorch that supports the proposed PGAS communication scheme and evaluate it on deep learning recommendation inference passes. Our backend outperforms the baseline using NCCL collective calls, achieving 1.97x speedup for the weak scaling test and 2.63x speedup for the strong scaling test in a 4 GPU NVLink-connected system.
- Published
- 2024
41. AI Foundation Model for Heliophysics: Applications, Design, and Implementation
- Author
-
Roy, Sujit, Singh, Talwinder, Freitag, Marcus, Schmude, Johannes, Lal, Rohit, Hegde, Dinesha, Ranjan, Soumya, Lin, Amy, Gaur, Vishal, Vos, Etienne Eben, Ghosal, Rinki, Patro, Badri Narayana, Aydin, Berkay, Pogorelov, Nikolai, Moreno, Juan Bernabe, Maskey, Manil, and Ramachandran, Rahul
- Subjects
Astrophysics - Solar and Stellar Astrophysics ,Astrophysics - Instrumentation and Methods for Astrophysics ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep learning-based methods have been widely researched in the areas of language and vision, demonstrating their capacity to understand long sequences of data and their usefulness in numerous helio-physics applications. Foundation models (FMs), which are pre-trained on a large-scale datasets, form the basis for a variety of downstream tasks. These models, especially those based on transformers in vision and language, show exceptional potential for adapting to a wide range of downstream applications. In this paper, we provide our perspective on the criteria for designing an FM for heliophysics and associated challenges and applications using the Solar Dynamics Observatory (SDO) dataset. We believe that this is the first study to design an FM in the domain of heliophysics., Comment: 31 Pages, 12 figures
- Published
- 2024
42. A variational approach to geometric mechanics for undulating robotic locomotion
- Author
-
Even, Sean, Martinez, Patrick S., Keogh, Cora, Gross, Oliver, Ozkan-Aydin, Yasemin, and Schröder, Peter
- Subjects
Computer Science - Robotics - Abstract
Limbless organisms of all sizes use undulating patterns of self-deformation to locomote. Geometric mechanics, which maps deformations to motions, provides a powerful framework to formalize and investigate the theoretical properties and limitations of such modes of locomotion. However, the inherent level of abstraction poses a challenge when bridging the gap between theory or simulations and laboratory experiments. We investigate the challenges of modeling motion trajectories of an undulating robotic locomotor by comparing experiments and simulations performed with a variational integrator. Despite the extensive simplifications that the model based on a geometric variation principle entails, the simulations show good agreement on average. Notably, our approach merely requires the knowledge of the \emph{dissipation metric} -- a Riemannian metric on the configuration space, which can in practice be approximated by means closely resembling \emph{resistive force theory}.
- Published
- 2024
43. Cross-modality image synthesis from TOF-MRA to CTA using diffusion-based models
- Author
-
Koch, Alexander, Aydin, Orhun Utku, Hilbert, Adam, Rieger, Jana, Tanioka, Satoru, Ishida, Fujimaro, and Frey, Dietmar
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Cerebrovascular disease often requires multiple imaging modalities for accurate diagnosis, treatment, and monitoring. Computed Tomography Angiography (CTA) and Time-of-Flight Magnetic Resonance Angiography (TOF-MRA) are two common non-invasive angiography techniques, each with distinct strengths in accessibility, safety, and diagnostic accuracy. While CTA is more widely used in acute stroke due to its faster acquisition times and higher diagnostic accuracy, TOF-MRA is preferred for its safety, as it avoids radiation exposure and contrast agent-related health risks. Despite the predominant role of CTA in clinical workflows, there is a scarcity of open-source CTA data, limiting the research and development of AI models for tasks such as large vessel occlusion detection and aneurysm segmentation. This study explores diffusion-based image-to-image translation models to generate synthetic CTA images from TOF-MRA input. We demonstrate the modality conversion from TOF-MRA to CTA and show that diffusion models outperform a traditional U-Net-based approach. Our work compares different state-of-the-art diffusion architectures and samplers, offering recommendations for optimal model performance in this cross-modality translation task.
- Published
- 2024
44. Causal Transformer for Fusion and Pose Estimation in Deep Visual Inertial Odometry
- Author
-
Kurt, Yunus Bilge, Akman, Ahmet, and Alatan, A. Aydın
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In recent years, transformer-based architectures become the de facto standard for sequence modeling in deep learning frameworks. Inspired by the successful examples, we propose a causal visual-inertial fusion transformer (VIFT) for pose estimation in deep visual-inertial odometry. This study aims to improve pose estimation accuracy by leveraging the attention mechanisms in transformers, which better utilize historical data compared to the recurrent neural network (RNN) based methods seen in recent methods. Transformers typically require large-scale data for training. To address this issue, we utilize inductive biases for deep VIO networks. Since latent visual-inertial feature vectors encompass essential information for pose estimation, we employ transformers to refine pose estimates by updating latent vectors temporally. Our study also examines the impact of data imbalance and rotation learning methods in supervised end-to-end learning of visual inertial odometry by utilizing specialized gradients in backpropagation for the elements of SE$(3)$ group. The proposed method is end-to-end trainable and requires only a monocular camera and IMU during inference. Experimental results demonstrate that VIFT increases the accuracy of monocular VIO networks, achieving state-of-the-art results when compared to previous methods on the KITTI dataset. The code will be made available at https://github.com/ybkurt/VIFT., Comment: Accepted to ECCV 2024 2nd Workshop on Vision-Centric Autonomous Driving (VCAD)
- Published
- 2024
45. Anonymized Network Sensing Graph Challenge
- Author
-
Jananthan, Hayden, Jones, Michael, Arcand, William, Bestor, David, Bergeron, William, Burrill, Daniel, Buluc, Aydin, Byun, Chansup, Davis, Timothy, Gadepally, Vijay, Grant, Daniel, Houle, Michael, Hubbell, Matthew, Luszczek, Piotr, Michaleas, Peter, Milechin, Lauren, Milner, Chasen, Morales, Guillermo, Morris, Andrew, Mullen, Julie, Patel, Ritesh, Pentland, Alex, Pisharody, Sandeep, Prout, Andrew, Reuther, Albert, Rosa, Antonio, Wachman, Gabriel, Yee, Charles, and Kepner, Jeremy
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Discrete Mathematics ,Computer Science - Performance ,Computer Science - Software Engineering ,Mathematics - Combinatorics - Abstract
The MIT/IEEE/Amazon GraphChallenge encourages community approaches to developing new solutions for analyzing graphs and sparse data derived from social media, sensor feeds, and scientific data to discover relationships between events as they unfold in the field. The anonymized network sensing Graph Challenge seeks to enable large, open, community-based approaches to protecting networks. Many large-scale networking problems can only be solved with community access to very broad data sets with the highest regard for privacy and strong community buy-in. Such approaches often require community-based data sharing. In the broader networking community (commercial, federal, and academia) anonymized source-to-destination traffic matrices with standard data sharing agreements have emerged as a data product that can meet many of these requirements. This challenge provides an opportunity to highlight novel approaches for optimizing the construction and analysis of anonymized traffic matrices using over 100 billion network packets derived from the largest Internet telescope in the world (CAIDA). This challenge specifies the anonymization, construction, and analysis of these traffic matrices. A GraphBLAS reference implementation is provided, but the use of GraphBLAS is not required in this Graph Challenge. As with prior Graph Challenges the goal is to provide a well-defined context for demonstrating innovation. Graph Challenge participants are free to select (with accompanying explanation) the Graph Challenge elements that are appropriate for highlighting their innovations., Comment: Accepted to IEEE HPEC 2024
- Published
- 2024
46. Towards Hybrid Embedded Feature Selection and Classification Approach with Slim-TSF
- Author
-
Ji, Anli, Pandey, Chetraj, and Aydin, Berkay
- Subjects
Computer Science - Machine Learning ,Astrophysics - Instrumentation and Methods for Astrophysics ,Astrophysics - Solar and Stellar Astrophysics - Abstract
Traditional solar flare forecasting approaches have mostly relied on physics-based or data-driven models using solar magnetograms, treating flare predictions as a point-in-time classification problem. This approach has limitations, particularly in capturing the evolving nature of solar activity. Recognizing the limitations of traditional flare forecasting approaches, our research aims to uncover hidden relationships and the evolutionary characteristics of solar flares and their source regions. Our previously proposed Sliding Window Multivariate Time Series Forest (Slim-TSF) has shown the feasibility of usage applied on multivariate time series data. A significant aspect of this study is the comparative analysis of our updated Slim-TSF framework against the original model outcomes. Preliminary findings indicate a notable improvement, with an average increase of 5\% in both the True Skill Statistic (TSS) and Heidke Skill Score (HSS). This enhancement not only underscores the effectiveness of our refined methodology but also suggests that our systematic evaluation and feature selection approach can significantly advance the predictive accuracy of solar flare forecasting models., Comment: This is a preprint accepted at the 26th International Conference on Big Data Analytics and Knowledge Discovery (DAWAK 2024)
- Published
- 2024
- Full Text
- View/download PDF
47. What is Normal? A Big Data Observational Science Model of Anonymized Internet Traffic
- Author
-
Kepner, Jeremy, Jananthan, Hayden, Jones, Michael, Arcand, William, Bestor, David, Bergeron, William, Burrill, Daniel, Buluc, Aydin, Byun, Chansup, Davis, Timothy, Gadepally, Vijay, Grant, Daniel, Houle, Michael, Hubbell, Matthew, Luszczek, Piotr, Milechin, Lauren, Milner, Chasen, Morales, Guillermo, Morris, Andrew, Mullen, Julie, Patel, Ritesh, Pentland, Alex, Pisharody, Sandeep, Prout, Andrew, Reuther, Albert, Rosa, Antonio, Wachman, Gabriel, Yee, Charles, and Michaleas, Peter
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Cryptography and Security ,Computer Science - Computers and Society ,Computer Science - Social and Information Networks - Abstract
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries, such as the GraphBLAS, coupled with supercomputers enables processing of the trillions of observations required. We leverage this approach to synthesize low-parameter observational models of anonymized Internet traffic with a high regard for privacy., Comment: Accepted to IEEE HPEC, 7 pages, 6 figures, 1 table, 41 references
- Published
- 2024
48. Large Language Models versus Classical Machine Learning: Performance in COVID-19 Mortality Prediction Using High-Dimensional Tabular Data
- Author
-
Ghaffarzadeh-Esfahani, Mohammadreza, Ghaffarzadeh-Esfahani, Mahdi, Salahi-Niri, Arian, Toreyhi, Hossein, Atf, Zahra, Mohsenzadeh-Kermani, Amirali, Sarikhani, Mahshad, Tajabadi, Zohreh, Shojaeian, Fatemeh, Bagheri, Mohammad Hassan, Feyzi, Aydin, Tarighatpayma, Mohammadamin, Gazmeh, Narges, Heydari, Fateme, Afshar, Hossein, Allahgholipour, Amirreza, Alimardani, Farid, Salehi, Ameneh, Asadimanesh, Naghmeh, Khalafi, Mohammad Amin, Shabanipour, Hadis, Moradi, Ali, Zadeh, Sajjad Hossein, Yazdani, Omid, Esbati, Romina, Maleki, Moozhan, Nasr, Danial Samiei, Soheili, Amirali, Majlesi, Hossein, Shahsavan, Saba, Soheilipour, Alireza, Goudarzi, Nooshin, Taherifard, Erfan, Hatamabadi, Hamidreza, Samaan, Jamil S, Savage, Thomas, Sakhuja, Ankit, Soroush, Ali, Nadkarni, Girish, Darazam, Ilad Alavi, Pourhoseingholi, Mohamad Amin, and Safavi-Naini, Seyed Amir Ahmad
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,92C50, 68T50 ,J.3 - Abstract
Background: This study aimed to evaluate and compare the performance of classical machine learning models (CMLs) and large language models (LLMs) in predicting mortality associated with COVID-19 by utilizing a high-dimensional tabular dataset. Materials and Methods: We analyzed data from 9,134 COVID-19 patients collected across four hospitals. Seven CML models, including XGBoost and random forest (RF), were trained and evaluated. The structured data was converted into text for zero-shot classification by eight LLMs, including GPT-4 and Mistral-7b. Additionally, Mistral-7b was fine-tuned using the QLoRA approach to enhance its predictive capabilities. Results: Among the CML models, XGBoost and RF achieved the highest accuracy, with F1 scores of 0.87 for internal validation and 0.83 for external validation. In the LLM category, GPT-4 was the top performer with an F1 score of 0.43. Fine-tuning Mistral-7b significantly improved its recall from 1% to 79%, resulting in an F1 score of 0.74, which was stable during external validation. Conclusion: While LLMs show moderate performance in zero-shot classification, fine-tuning can significantly enhance their effectiveness, potentially aligning them closer to CML models. However, CMLs still outperform LLMs in high-dimensional tabular data tasks., Comment: Code is available at: https://github.com/mohammad-gh009/Large-Language-Models-vs-Classical-Machine-learning and https://github.com/Sdamirsa/Tehran_COVID_Cohort. The datasets are available from the corresponding author on reasonable request (sdamirsa@ymail.com)
- Published
- 2024
49. A sparsity-aware distributed-memory algorithm for sparse-sparse matrix multiplication
- Author
-
Hong, Yuxi and Buluc, Aydin
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Multiplying two sparse matrices (SpGEMM) is a common computational primitive used in many areas including graph algorithms, bioinformatics, algebraic multigrid solvers, and randomized sketching. Distributed-memory parallel algorithms for SpGEMM have mainly focused on sparsity-oblivious approaches that use 2D and 3D partitioning. Sparsity-aware 1D algorithms can theoretically reduce communication by not fetching nonzeros of the sparse matrices that do not participate in the multiplication. Here, we present a distributed-memory 1D SpGEMM algorithm and implementation. It uses MPI RDMA operations to mitigate the cost of packing/unpacking submatrices for communication, and it uses a block fetching strategy to avoid excessive fine-grained messaging. Our results show that our 1D implementation outperforms state-of-the-art 2D and 3D implementations within CombBLAS for many configurations, inputs, and use cases, while remaining conceptually simpler., Comment: Accepted by 2024 International Conference on High Performance Computing, Networking, Storage and Analysis, 2024 (SC'24)
- Published
- 2024
50. Verifiable Homomorphic Linear Combinations in Multi-Instance Time-Lock Puzzles
- Author
-
Abadi, Aydin
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning - Abstract
Time-Lock Puzzles (TLPs) have been developed to securely transmit sensitive information into the future without relying on a trusted third party. Multi-instance TLP is a scalable variant of TLP that enables a server to efficiently find solutions to different puzzles provided by a client at once. Nevertheless, existing multi-instance TLPs lack support for (verifiable) homomorphic computation. To address this limitation, we introduce the "Multi-Instance partially Homomorphic TLP" (MH-TLP), a multi-instance TLP supporting efficient verifiable homomorphic linear combinations of puzzles belonging to a client. It ensures anyone can verify the correctness of computations and solutions. Building on MH-TLP, we further propose the "Multi-instance Multi-client verifiable partially Homomorphic TLP" (MMH-TLP). It not only supports all the features of MH-TLP but also allows for verifiable homomorphic linear combinations of puzzles from different clients. Our schemes refrain from using asymmetric-key cryptography for verification and, unlike most homomorphic TLPs, do not require a trusted third party. A comprehensive cost analysis demonstrates that our schemes scale linearly with the number of clients and puzzles., Comment: arXiv admin note: text overlap with arXiv:2406.15070
- Published
- 2024
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.