-
Hybrid Reconfigurable Intelligent Surface Enabled Over the Air Index Modulation
Authors:
Emre Arslan,
Ali Tugberk Dogukan,
Fatih Kilinc,
Ertugrul Basar
Abstract:
Users' desire for enhanced performance drive the inevitable technological progress on vertical applications in wireless communication systems. To meet these demands, researchers vigorously investigate potential 6G and beyond technologies and solutions. Reconfigurable intelligent surfaces (RISs) have risen in popularity and attracted the attention of academia as well as industry and seem to be a pr…
▽ More
Users' desire for enhanced performance drive the inevitable technological progress on vertical applications in wireless communication systems. To meet these demands, researchers vigorously investigate potential 6G and beyond technologies and solutions. Reconfigurable intelligent surfaces (RISs) have risen in popularity and attracted the attention of academia as well as industry and seem to be a promising candidate for 6G technology. RISs are reflective metamaterials with many configurable elements consisting of pin diodes that have the ability to manipulate the im**ing signals' properties, hence, enabling some sort of virtual control over the wireless channel. In this paper, we propose a novel over-the-air index modulation (IM) scheme through the use of a hybrid RIS with active and passive partitions to convey additional IM bits over-the-air. In addition we propose another modified scheme that allows the transmission for even more IM bits but at the expense of certain trade-offs. First, we present the system model for both of the proposed schemes. Furthermore, comprehensive computer simulation results are provided and discussed presenting the superior bit error rate (BER) performance and additional benefits of the proposed systems compared to similar benchmarks.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
Reconfigurable Intelligent Surface Identification in Mobile Networks: Opportunities and Challenges
Authors:
Emre Arslan,
Ali Tugberk Dogukan,
Fatih Kilinc,
Ahmet Faruk Coskun,
Ertugrul Basar
Abstract:
The advent of the sixth generation (6G) wireless networks heralds a transformative era for mobile communication, where the integration of cutting-edge technologies like Reconfigurable Intelligent Surfaces (RISs) is paramount in addressing the burgeoning demands for energy efficiency, high data rates, reliable connectivity, and enhanced coverage in densely populated areas. RISs have attracted the a…
▽ More
The advent of the sixth generation (6G) wireless networks heralds a transformative era for mobile communication, where the integration of cutting-edge technologies like Reconfigurable Intelligent Surfaces (RISs) is paramount in addressing the burgeoning demands for energy efficiency, high data rates, reliable connectivity, and enhanced coverage in densely populated areas. RISs have attracted the attention of academia as well as the industry and emerged as a beacon of innovation, offering a novel paradigm to reconfigure the wireless propagation environment beneficially, thereby enhancing the overall network performance. It is envisioned that the deployment of numerous RISs in a mobile network will serve user equipments (UEs) to boost various key performance indicators (KPIs), with lower energy consumption compared to alternative solutions (e.g., relays, and network-controlled repeaters). However, the knowledge of whether or not a UE is being served through an RIS and if so, which RIS it is being served by is crucial and beneficial for various network planning and operational reasons. In this paper, we address the importance and the benefits of RIS identification in a mobile network. Additionally, we guide the readers and researchers by introducing alternative methods to enable RIS identification. Through the lens of this research, we unveil and shed light to various benefits, the challenges, and future opportunities in the identification of RISs serving mobile users in complex network environments, highlighting the necessity for advanced identification strategies to fully harness the potential of RIS technology in next-generation wireless systems.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
Reconfigurable Intelligent Surface-Enabled Downlink NOMA
Authors:
Ali Tugberk Dogukan,
Emre Arslan,
Ertugrul Basar
Abstract:
Reconfigurable intelligent surfaces (RISs) bring great potential to the advancement of 6G and beyond wireless communication technologies. RISs introduce a great degree of flexibility, allowing some sort of virtual control over the wireless channel. Exploiting the flexibility introduced by RISs, we propose a novel RIS-enabled downlink (DL) non-orthogonal multiple access (NOMA) scheme where NOMA is…
▽ More
Reconfigurable intelligent surfaces (RISs) bring great potential to the advancement of 6G and beyond wireless communication technologies. RISs introduce a great degree of flexibility, allowing some sort of virtual control over the wireless channel. Exploiting the flexibility introduced by RISs, we propose a novel RIS-enabled downlink (DL) non-orthogonal multiple access (NOMA) scheme where NOMA is enabled over-the-air rather than at the base station (BS) or the receiver (Rx). Here, the RIS is partitioned into distinctive groups where each part of the RIS serves a different user equipment (UE) to perform multiple accessing. The BS transmits an unmodulated signal to the RIS, and each partition modulates the im**ing signal over-the-air by introducing a phase shift according to the incoming information bits to serve the corresponding UE. First, the end-to-end system model for the proposed system is presented. Furthermore, outage probability calculations, theoretical error probability analysis, and bit error rate (BER) derivations are discussed and reinforced with comprehensive computer simulation results.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Clustering Students Based on Gamification User Types and Learning Styles
Authors:
Emre Arslan,
Atilla Özkaymak,
Nesrin Özdener Dönmez
Abstract:
The aim of this study is clustering students according to their gamification user types and learning styles with the purpose of providing instructors with a new perspective of grou** students in case of clustering which cannot be done by hand when there are multiple scales in data. The data used consists of 251 students who were enrolled at a Turkish state university. When grou** students, K-m…
▽ More
The aim of this study is clustering students according to their gamification user types and learning styles with the purpose of providing instructors with a new perspective of grou** students in case of clustering which cannot be done by hand when there are multiple scales in data. The data used consists of 251 students who were enrolled at a Turkish state university. When grou** students, K-means algorithm has been utilized as clustering algorithm. As for determining the gamification user types and learning styles of students, Gamification User Type Hexad Scale and Grasha-Riechmann Student Learning Style Scale have been used respectively. Silhouette coefficient is utilized as clustering quality measure. After fitting the algorithm in several ways, highest Silhouette coefficient obtained was 0.12 meaning that results are neutral but not satisfactory. All the statistical operations and data visualizations were made using Python programming language.
△ Less
Submitted 22 October, 2023;
originally announced October 2023.
-
Demystifying the Performance of Data Transfers in High-Performance Research Networks
Authors:
Ehsan Saeedizade,
Bing Zhang,
Engin Arslan
Abstract:
High-speed research networks are built to meet the ever-increasing needs of data-intensive distributed workflows. However, data transfers in these networks often fail to attain the promised transfer rates for several reasons, including I/O and network interference, server misconfigurations, and network anomalies. Although understanding the root causes of performance issues is critical to mitigatin…
▽ More
High-speed research networks are built to meet the ever-increasing needs of data-intensive distributed workflows. However, data transfers in these networks often fail to attain the promised transfer rates for several reasons, including I/O and network interference, server misconfigurations, and network anomalies. Although understanding the root causes of performance issues is critical to mitigating them and increasing the utilization of expensive network infrastructures, there is currently no available mechanism to monitor data transfers in these networks. In this paper, we present a scalable, end-to-end monitoring framework to gather and store key performance metrics for file transfers to shed light on the performance of transfers. The evaluation results show that the proposed framework can monitor up to 400 transfers per host and more than 40, 000 transfers in total while collecting performance statistics at one-second precision. We also introduce a heuristic method to automatically process the gathered performance metrics and identify the root causes of performance anomalies with an F-score of 87 - 98%.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
I/O Burst Prediction for HPC Clusters using Darshan Logs
Authors:
Ehsan Saeedizade,
Roya Taheri,
Engin Arslan
Abstract:
Understanding cluster-wide I/O patterns of large-scale HPC clusters is essential to minimize the occurrence and impact of I/O interference. Yet, most previous work in this area focused on monitoring and predicting task and node-level I/O burst events. This paper analyzes Darshan reports from three supercomputers to extract system-level read and write I/O rates in five minutes intervals. We observe…
▽ More
Understanding cluster-wide I/O patterns of large-scale HPC clusters is essential to minimize the occurrence and impact of I/O interference. Yet, most previous work in this area focused on monitoring and predicting task and node-level I/O burst events. This paper analyzes Darshan reports from three supercomputers to extract system-level read and write I/O rates in five minutes intervals. We observe significant (over 100x) fluctuations in read and write I/O rates in all three clusters. We then train machine learning models to estimate the occurrence of system-level I/O bursts 5 - 120 minutes ahead. Evaluation results show that we can predict I/O bursts with more than 90% accuracy (F-1 score) five minutes ahead and more than 87% accuracy two hours ahead. We also show that the ML models attain more than 70% accuracy when estimating the degree of the I/O burst. We believe that high-accuracy predictions of I/O bursts can be used in multiple ways, such as postponing delay-tolerant I/O operations (e.g., checkpointing), pausing nonessential applications (e.g., file system scrubbers), and devising I/O-aware job scheduling methods. To validate this claim, we simulated a burst-aware job scheduler that can postpone the start time of applications to avoid I/O bursts. We show that the burst-aware job scheduling can lead to an up to 5x decrease in application runtime.
△ Less
Submitted 20 August, 2023;
originally announced August 2023.
-
Network-Independent and User-Controlled RIS: An Experimental Perspective
Authors:
Emre Arslan,
Fatih Kilinc,
Ertugrul Basar,
Huseyin Arslan
Abstract:
The march towards 6G is accelerating and future wireless network architectures require enhanced performance along with significant coverage especially, to combat impairments on account of the wireless channel. Reconfigurable intelligent surface (RIS) technology is a promising solution, that has recently been considered as a research topic in standards, to help manipulate the channel in favor of us…
▽ More
The march towards 6G is accelerating and future wireless network architectures require enhanced performance along with significant coverage especially, to combat impairments on account of the wireless channel. Reconfigurable intelligent surface (RIS) technology is a promising solution, that has recently been considered as a research topic in standards, to help manipulate the channel in favor of users needs. Generally, in experimental RIS systems, the RIS is either connected to the transmitter (Tx) or receiver (Rx) through a physical backhaul link and it is controlled by the network and requires significant computation at the RIS for codebook (CB) designs. In this paper, we propose a practical user-controlled RIS system that is isolated from the network to enhance communication performance and provide coverage to the user based on its location and preference. Furthermore, a low-complexity algorithm is proposed to aid in CB selection for the user, which is performed through the wireless cloud to enable a passive and energy efficient RIS. Extensive experimental test-bed measurements demonstrate the enhanced performance of the proposed system while both results match and validate each other.
△ Less
Submitted 15 August, 2023;
originally announced August 2023.
-
Quantum Key Distribution with Minimal Qubit Transmission Based on MultiQubit Greenberger Horne Zeilinger State
Authors:
Tasdiqul Islam,
Engin Arslan
Abstract:
Conventional Quantum Key Distribution (QKD) requires the transmission of multiple qubits equivalent to the length of the key. As quantum networks are still in their infancy thus, they are expected to have a limited capacity, necessitating too many qubit transmissions for QKD might limit the effective use of limited network bandwidth of quantum networks. To address this challenge and enhance the pr…
▽ More
Conventional Quantum Key Distribution (QKD) requires the transmission of multiple qubits equivalent to the length of the key. As quantum networks are still in their infancy thus, they are expected to have a limited capacity, necessitating too many qubit transmissions for QKD might limit the effective use of limited network bandwidth of quantum networks. To address this challenge and enhance the practicality of QKD, we propose a Multi-Qubit Greenberger Horne Zeilinger (GHZ) State-based QKD scheme that requires a small number of qubit transmissions. The proposed method transmits one qubit between endpoints and reuses it for the transmission of multiple classical bits with the help of Quantum nondemolition (QND) measurements. We show that one can transfer L-1 classical bits by generating an L-qubit GHZ state and transferring one to the remote party. We further show that the proposed QKD algorithm can be extended to enable multi-party QKD. It can also support QKD between parties with minimal quantum resources. As a result, the proposed scheme offers a quantum network-efficient alternative QKD.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Scalable Quantum Repeater Deployment Modeling
Authors:
Tasdiqul Islam,
Engin Arslan
Abstract:
Long-distance quantum communication presents a significant challenge as maintaining the fidelity of qubits can be difficult. This issue can be addressed through the use of quantum repeaters to transmit entanglement information through Bell measurements. However, despite its necessity to enable wide-area quantum internet, the deployment cost of quantum repeaters can be prohibitively expensive, thus…
▽ More
Long-distance quantum communication presents a significant challenge as maintaining the fidelity of qubits can be difficult. This issue can be addressed through the use of quantum repeaters to transmit entanglement information through Bell measurements. However, despite its necessity to enable wide-area quantum internet, the deployment cost of quantum repeaters can be prohibitively expensive, thus it is important to develop a quantum repeater deployment model that can strike a balance between cost and effectiveness. In this work, we present novel heuristic models to quickly determine a minimum number of quantum repeaters to deploy in large-scale networks to provide end-to-end connectivity between all end hosts. The results show that, compared to the linear programming approach, the heuristic methods can find near-optimal solutions while reducing the execution time from days to seconds when evaluated against several synthetic and real-world networks such as SURFnet and ESnet. As reliability is key for any network, we also demonstrate that the heuristic method can determine deployment models that can endure up to two link/node failures.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Reconfigurable Intelligent Surface Enabled Over-the-Air Uplink Non-orthogonal Multiple Access
Authors:
Emre Arslan,
Fatih Kilinc,
Sultangali Arzykulov,
Ali Tugberk Dogukan,
Abdulkadir Celik,
Ertugrul Basar,
Ahmad M. Eltawil
Abstract:
Innovative reconfigurable intelligent surface (RIS) technologies are rising and recognized as promising candidates to enhance 6G and beyond wireless communication systems. RISs acquire the ability to manipulate electromagnetic signals, thus, offering a degree of control over the wireless channel and the potential for many more benefits. Furthermore, active RIS designs have recently been introduced…
▽ More
Innovative reconfigurable intelligent surface (RIS) technologies are rising and recognized as promising candidates to enhance 6G and beyond wireless communication systems. RISs acquire the ability to manipulate electromagnetic signals, thus, offering a degree of control over the wireless channel and the potential for many more benefits. Furthermore, active RIS designs have recently been introduced to combat the critical double fading problem and other impairments passive RIS designs may possess. In this paper, the potential and flexibility of active RIS technology are exploited for uplink systems to achieve virtual non-orthogonal multiple access (NOMA) through power disparity over-the-air rather than controlling transmit powers at the user side. Specifically, users with identical transmit power, path loss, and distance can communicate with a base station sharing time and frequency resources in a NOMA fashion with the aid of the proposed hybrid RIS system. Here, the RIS is partitioned into active and passive parts and the distinctive partitions serve different users aligning their phases accordingly while introducing a power difference to the users' signals to enable NOMA. First, the end-to-end system model is presented considering two users. Furthermore, outage probability calculations and theoretical error probability analysis are discussed and reinforced with computer simulation results.
△ Less
Submitted 6 August, 2022;
originally announced August 2022.
-
Over-the-Air Equalization with Reconfigurable Intelligent Surfaces
Authors:
Emre Arslan,
Ibrahim Yildirim,
Fatih Kilinc,
Ertugrul Basar
Abstract:
Reconfigurable intelligent surface (RIS)-empowered communications is on the rise and is a promising technology envisioned to aid in 6G and beyond wireless communication networks. RISs can manipulate im**ing waves through their electromagnetic elements enabling some sort of control over the wireless channel. In this paper, the potential of RIS technology is explored to perform a sort of virtual e…
▽ More
Reconfigurable intelligent surface (RIS)-empowered communications is on the rise and is a promising technology envisioned to aid in 6G and beyond wireless communication networks. RISs can manipulate im**ing waves through their electromagnetic elements enabling some sort of control over the wireless channel. In this paper, the potential of RIS technology is explored to perform a sort of virtual equalization over-the-air for frequency-selective channels whereas, equalization is generally conducted at either the transmitter or receiver in conventional communication systems. Specifically, with the aid of an RIS, the frequency-selective channel from the transmitter to the RIS is transformed to a frequency-flat channel through elimination of inter-symbol interference (ISI) components at the receiver. ISI is eliminated by adjusting the phases of im**ing signals particularly to maximize the incoming signal of the strongest tap. First, a general end-to-end system model is provided and a continuous to discrete-time signal model is presented. Subsequently, a probabilistic analysis for the elimination of ISI terms is conducted and reinforced with computer simulations. Furthermore, a theoretical error probability analysis is performed along with computer simulations. It is analyzed and demonstrated that conventional RIS phase alignment methods, can successfully eliminate ISI and the RIS-aided communication channel can be converted from frequency-selective to frequency-flat.
△ Less
Submitted 18 May, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Sparse-Encoded Codebook Index Modulation
Authors:
Emre Arslan,
Ali Tugberk Dogukan,
Ertugrul Basar
Abstract:
Ultra-reliable and low-latency communications (URLLC) partakes a major role in 5G networks for mission-critical applications. Sparse vector coding (SVC) appears as a strong candidate for future URLLC networks by enabling superior performance in terms of bit error rate (BER). SVC exploits the virtual digital domain (VDD) and compressed sensing (CS) algorithms to encode and decode its information th…
▽ More
Ultra-reliable and low-latency communications (URLLC) partakes a major role in 5G networks for mission-critical applications. Sparse vector coding (SVC) appears as a strong candidate for future URLLC networks by enabling superior performance in terms of bit error rate (BER). SVC exploits the virtual digital domain (VDD) and compressed sensing (CS) algorithms to encode and decode its information through active symbol indices. In this paper, first, a clever encoding/decoding algorithm is proposed for the SVC scheme, which allows the use of all possible activation patterns (APs) resulting in increasing spectral efficiency. Second, a novel solution is proposed to convey additional information bits by further exploiting index modulation (IM) for the codebooks of the SVC scheme. Computer simulation results reveal that our low-complexity algorithm and novel IM solution provide not only a superior BER performance but also an increase in the number of bits conveyed by IM compared to the ordinary SVC approach.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
Index Modulation-Based Flexible Non-Orthogonal Multiple Access
Authors:
Emre Arslan,
Ali Tugberk Dogukan,
Ertugrul Basar
Abstract:
Non-orthogonal multiple access (NOMA) is envisioned as an efficient candidate for future communication systems. This letter proposes a novel orthogonal frequency division multiplexing (OFDM) with index modulation (IM)-based NOMA scheme, called OFDM-IM NOMA, for future multi-user communication systems. Inspired by IM and classical OFDM-NOMA, users utilize flexibility by adjusting power allocation f…
▽ More
Non-orthogonal multiple access (NOMA) is envisioned as an efficient candidate for future communication systems. This letter proposes a novel orthogonal frequency division multiplexing (OFDM) with index modulation (IM)-based NOMA scheme, called OFDM-IM NOMA, for future multi-user communication systems. Inspired by IM and classical OFDM-NOMA, users utilize flexibility by adjusting power allocation factors and subcarrier activation ratios. Our new scheme allows different service users to share available resources as in classical NOMA, more efficiently. It is shown that OFDM-IM NOMA reliably supports a high and low data rate user at the same resources by adjusting their subcarrier activation ratios.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
Fast Integrity Verification for High-Speed File Transfers
Authors:
Engin Arslan,
Ahmed Alhussen
Abstract:
The amount of data generated by scientific and commercial applications is growing at an ever-increasing pace. This data is often moved between geographically distributed sites for various purposes such as collaboration and backup which has led to significant increase in data transfer rates. Surge in data transfer rates when combined with proliferation of scientific applications that cannot tolerat…
▽ More
The amount of data generated by scientific and commercial applications is growing at an ever-increasing pace. This data is often moved between geographically distributed sites for various purposes such as collaboration and backup which has led to significant increase in data transfer rates. Surge in data transfer rates when combined with proliferation of scientific applications that cannot tolerate data corruption triggered enhanced integrity verification techniques to be developed. End-to-end integrity verification minimizes the likelihood of silent data corruption by comparing checksum of files at source and destination servers using secure hash algorithms such as MD5 and SHA1. However, it imposes significant performance penalty due to overhead of checksum computation. In this paper, we propose Fast Integrity VERification (FIVER) algorithm which overlaps checksum computation and data transfer operations of files to minimize the cost of integrity verification. Extensive experiments show that FIVER is able to bring down the cost from 60% by the state-of-the-art solutions to below 10% by concurrently executing transfer and checksum operations and enabling file I/O share between them. We also implemented FIVER-Hybrid to mimic disk access patterns of sequential integrity verification approach to capture possible data corruption that may occur during file write operations which FIVER may miss. Results show that FIVER-Hybrid is able to reduce execution time by 20% compared to sequential approach without compromising the reliability of integrity verification.
△ Less
Submitted 3 November, 2018;
originally announced November 2018.
-
A Heuristic Approach to Protocol Tuning for High Performance Data Transfers
Authors:
Engin Arslan,
Tevfik Kosar
Abstract:
Obtaining optimal data transfer performance is of utmost importance to today's data-intensive distributed applications and wide-area data replication services. Doing so necessitates effectively utilizing available network bandwidth and resources, yet in practice transfers seldom reach the levels of utilization they potentially could. Tuning protocol parameters such as pipelining, parallelism, and…
▽ More
Obtaining optimal data transfer performance is of utmost importance to today's data-intensive distributed applications and wide-area data replication services. Doing so necessitates effectively utilizing available network bandwidth and resources, yet in practice transfers seldom reach the levels of utilization they potentially could. Tuning protocol parameters such as pipelining, parallelism, and concurrency can significantly increase utilization and performance, however determining the best settings for these parameters is a difficult problem, as network conditions can vary greatly between sites and over time. Nevertheless, it is an important problem, since poor tuning can cause either under- or over-utilization of network resources and thus degrade transfer performance. In this paper, we present three algorithms for application-level tuning of different protocol parameters for maximizing transfer throughput in wide-area networks. Our algorithms dynamically tune the number of parallel data streams per file (for large file optimization), the level of control channel pipelining (for small file optimization), and the number of concurrent file transfers to increase I/O throughput (a technique useful for all types of files). The proposed heuristic algorithms improve the transfer throughput up to 10x compared to the baseline and 7x compared to the state of the art solutions.
△ Less
Submitted 17 August, 2017;
originally announced August 2017.
-
Application Level High Speed Transfer Optimization Based on Historical Analysis and Real-time Tuning
Authors:
Engin Arslan,
Tevfik Kosar
Abstract:
Data-intensive scientific and commercial applications increasingly require frequent movement of large datasets from one site to the other(s). Despite growing network capacities, these data movements rarely achieve the promised data transfer rates of the underlying physical network due to poorly tuned data transfer protocols. Accurately and efficiently tuning the data transfer protocol parameters i…
▽ More
Data-intensive scientific and commercial applications increasingly require frequent movement of large datasets from one site to the other(s). Despite growing network capacities, these data movements rarely achieve the promised data transfer rates of the underlying physical network due to poorly tuned data transfer protocols. Accurately and efficiently tuning the data transfer protocol parameters in a dynamically changing network environment is a major challenge and remains as an open research problem. In this paper, we present predictive end-to-end data transfer optimization algorithms based on historical data analysis and real-time background traffic probing, dubbed HARP. Most of the previous work in this area are solely based on real time network probing which results either in an excessive sampling overhead or fails to accurately predict the optimal transfer parameters. Combining historical data analysis with real time sampling enables our algorithms to tune the application level data transfer parameters accurately and efficiently to achieve close-to-optimal end-to-end data transfer throughput with very low overhead. Our experimental analysis over a variety of network settings shows that HARP outperforms existing solutions by up to 50% in terms of the achieved throughput.
△ Less
Submitted 9 August, 2017;
originally announced August 2017.
-
On the Barr exactness property of $\mathsf{BXMod/R}$
Authors:
Hatice Gülsün Akay,
Ummahan Ege Arslan
Abstract:
In this work, it is shown that the category $\mathsf{BXMod/R}$ of braided crossed modules over a fixed commutative algebra $R$ is an exact category in the sense of Barr.
In this work, it is shown that the category $\mathsf{BXMod/R}$ of braided crossed modules over a fixed commutative algebra $R$ is an exact category in the sense of Barr.
△ Less
Submitted 16 May, 2016;
originally announced May 2016.
-
Categorification of Algebras: 2-Algebras
Authors:
İbrahim İlker Akça,
Ummahan Ege Arslan
Abstract:
This paper introduces a categorification of $k$-algebras called 2 -algebras, where k is a commutative ring. We define the 2-algebras as a 2-category with single object in which collections of all 1-morphisms and all 2-morphisms are k-algebras. It is shown that the category of 2 -algebras is equivalent to the category of crossed modules in commutative k -algebras. Also we define the notion of homot…
▽ More
This paper introduces a categorification of $k$-algebras called 2 -algebras, where k is a commutative ring. We define the 2-algebras as a 2-category with single object in which collections of all 1-morphisms and all 2-morphisms are k-algebras. It is shown that the category of 2 -algebras is equivalent to the category of crossed modules in commutative k -algebras. Also we define the notion of homotopy for 2-algebras and we explore the relations of crossed module homotopy and 2-algebra homotopy.
△ Less
Submitted 20 April, 2016;
originally announced April 2016.
-
The Embedding Theorem
Authors:
Ummahan Ege Arslan,
GÜlÜmsen Onarli
Abstract:
In this work, it is shown that the category XMod/P of crossed modules over fixed group P is an exact category and the complete proof of the embedding theorem of XMod/P into a set valued functor category is given.
In this work, it is shown that the category XMod/P of crossed modules over fixed group P is an exact category and the complete proof of the embedding theorem of XMod/P into a set valued functor category is given.
△ Less
Submitted 21 November, 2012;
originally announced November 2012.
-
Categorical Results in the Theory of Two-Crossed Modules of Commutative Algebras
Authors:
Ummahan Ege Arslan,
Gülümsen Onarlı
Abstract:
In this paper we explore some categorical results of 2-crossed module of commutative algebras extending work of Porter in [18]. We also show that the forgetful functor from the category of 2-crossed modules to the category of k-algebras, taking {L, M, P, \partial_2, \partial_1} to the base algebra P, is fibred and cofibred considering the pullback (coinduced) and induced 2-crossed modules construc…
▽ More
In this paper we explore some categorical results of 2-crossed module of commutative algebras extending work of Porter in [18]. We also show that the forgetful functor from the category of 2-crossed modules to the category of k-algebras, taking {L, M, P, \partial_2, \partial_1} to the base algebra P, is fibred and cofibred considering the pullback (coinduced) and induced 2-crossed modules constructions, respectively. Also we consider free 2- crossed modules as an application of induced 2-crossed modules.
△ Less
Submitted 1 February, 2012; v1 submitted 16 August, 2011;
originally announced August 2011.
-
(Co)-Induced Two Crossed Modules
Authors:
Ummahan Ege Arslan,
Zekeriya Arvasi,
Gülümsen Onarlı
Abstract:
We introduce the notion of an induced 2-crossed module, which extends the notion of an induced crossed module (Brown and Higgins).
We introduce the notion of an induced 2-crossed module, which extends the notion of an induced crossed module (Brown and Higgins).
△ Less
Submitted 11 February, 2013; v1 submitted 21 July, 2011;
originally announced July 2011.
-
Change of Base for Commutative Algebras
Authors:
U. Ege Arslan,
Ö. Gürmen
Abstract:
In this paper we examine on a pair of adjoint functors $(φ^{\ast},φ_{\ast})$ for a subcategory of the category of crossed modules over commutative algebras where $φ^{\ast}:\mathbf{XMod}$\textbf{/}$% Q\rightarrow $ $\mathbf{XMod/}P$, pullback, which enables us to move from crossed $Q$-modules to crossed $P$-modules by an algebra morphism $φ:P\rightarrow Q$ and $φ_{\ast}:\mathbf{XMod}$\textbf{/}…
▽ More
In this paper we examine on a pair of adjoint functors $(φ^{\ast},φ_{\ast})$ for a subcategory of the category of crossed modules over commutative algebras where $φ^{\ast}:\mathbf{XMod}$\textbf{/}$% Q\rightarrow $ $\mathbf{XMod/}P$, pullback, which enables us to move from crossed $Q$-modules to crossed $P$-modules by an algebra morphism $φ:P\rightarrow Q$ and $φ_{\ast}:\mathbf{XMod}$\textbf{/}$P\rightarrow $ $\mathbf{XMod/}Q$, induced. We note that this adjoint functor pair $(φ^{\ast},φ_{\ast})$ makes $p:\mathbf{XMod}\rightarrow $ $k$\textbf{-Alg}into a bifibred category over $k$\textbf{-Alg}, the category of commutative algebras, where $p$ is given by $p(C,R,\partial)=R.$
Also, some examples and results on induced crossed modules are given.
△ Less
Submitted 11 November, 2011; v1 submitted 12 October, 2009;
originally announced October 2009.