-
Gamu Blue: A Practical Tool for Game Theory Security Equilibria
Authors:
Ameer Taweel,
Burcu Yıldız,
Alptekin Küpçü
Abstract:
The application of game theory in cybersecurity enables strategic analysis, adversarial modeling, and optimal decision-making to address security threats' complex and dynamic nature. Previous studies by Abraham et al. and Biçer et al. presented various definitions of equilibria to examine the security aspects of games involving multiple parties. Nonetheless, these definitions lack practical and ea…
▽ More
The application of game theory in cybersecurity enables strategic analysis, adversarial modeling, and optimal decision-making to address security threats' complex and dynamic nature. Previous studies by Abraham et al. and Biçer et al. presented various definitions of equilibria to examine the security aspects of games involving multiple parties. Nonetheless, these definitions lack practical and easy-to-use implementations. Our primary contribution is addressing this gap by develo** Gamu Blue, an easy-to-use tool with implementations for computing the equilibria definitions including k-resiliency, l-repellence, t-immunity, (l, t)-resistance, and m-stability.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
A Quantum Inspired Bi-level Optimization Algorithm for the First Responder Network Design Problem
Authors:
Anthony Karahalios,
Sridhar Tayur,
Ananth Tenneti,
Amirreza Pashapour,
F. Sibel Salman,
Barış Yıldız
Abstract:
In the aftermath of a sudden catastrophe, First Responders (FR) strive to promptly reach and rescue immobile victims. Simultaneously, other mobile individuals take roads to evacuate the affected region, or access shelters. The escalated traffic congestion significantly hinders critical FR operations if they share some of the same roads. A proposal from the Turkish Ministry of Transportation and In…
▽ More
In the aftermath of a sudden catastrophe, First Responders (FR) strive to promptly reach and rescue immobile victims. Simultaneously, other mobile individuals take roads to evacuate the affected region, or access shelters. The escalated traffic congestion significantly hinders critical FR operations if they share some of the same roads. A proposal from the Turkish Ministry of Transportation and Infrastructure being discussed for implementation is to allocate a subset of road segments for use by FRs only, mark them clearly, and pre-communicate them to the citizens. For the FR paths under consideration: (i) there should exist an FR path from designated entry points to each demand point in the network, and (ii) evacuees try to leave the network (through some exit points following the selfish routing principle) in the shortest time possible when they know that certain segments are not available to them. We develop a mixed integer non-linear programming formulation for this First Responder Network Design Problem (FRNDP). We solve FRNDP using a novel hybrid quantum-classical heuristic building on the Graver Augmented Multi-Seed Algorithm (GAMA). Using the flow-balance constraints for the FR and evacuee paths, we use a Quadratic Unconstrained Binary Optimization (QUBO) model to obtain a partial Graver Bases to move between the feasible solutions of FRNDP. To efficiently explore the solution space for high-quality solutions, we develop a novel bi-level nested GAMA within GAMA: GAGA. We test GAGA on random graph instances of various sizes and instances related to an expected Istanbul earthquake. Comparing GAGA against a state-of-the-art exact algorithm for traditional formulations, we find that GAGA offers a promising alternative approach. We hope our work encourages further study of quantum (inspired) algorithms to tackle complex optimization models from other application domains.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Machine-learning-accelerated simulations to enable automatic surface reconstruction
Authors:
Xiaochen Du,
James K. Damewood,
Jaclyn R. Lunger,
Reisel Millan,
Bilge Yildiz,
Lin Li,
Rafael Gómez-Bombarelli
Abstract:
Understanding material surfaces and interfaces is vital in applications like catalysis or electronics. By combining energies from electronic structure with statistical mechanics, ab initio simulations can in principle predict the structure of material surfaces as a function of thermodynamic variables. However, accurate energy simulations are prohibitive when coupled to the vast phase space that mu…
▽ More
Understanding material surfaces and interfaces is vital in applications like catalysis or electronics. By combining energies from electronic structure with statistical mechanics, ab initio simulations can in principle predict the structure of material surfaces as a function of thermodynamic variables. However, accurate energy simulations are prohibitive when coupled to the vast phase space that must be statistically sampled. Here, we present a bi-faceted computational loop to predict surface phase diagrams of multi-component materials that accelerates both the energy scoring and statistical sampling methods. Fast, scalable, and data-efficient machine learning interatomic potentials are trained on high-throughput density-functional theory calculations through closed-loop active learning. Markov-chain Monte Carlo sampling in the semi-grand canonical ensemble is enabled by using virtual surface sites. The predicted surfaces for GaN(0001), Si(111), and SrTiO3(001) are in agreement with past work and suggest that the proposed strategy can model complex material surfaces and discover previously unreported surface terminations.
△ Less
Submitted 21 November, 2023; v1 submitted 12 May, 2023;
originally announced May 2023.
-
Codes from incidence matrices of hypergraphs
Authors:
Sudipta Mallik,
Bahattin Yildiz
Abstract:
Binary codes are constructed from incidence matrices of hypergraphs. A combinatroial description is given for the minimum distances of such codes via a combinatorial tool called ``eonv". This combinatorial approach provides a faster alternative method of finding the minimum distance, which is known to be a hard problem. This is demonstrated on several classes of codes from hypergraphs. Moreover, s…
▽ More
Binary codes are constructed from incidence matrices of hypergraphs. A combinatroial description is given for the minimum distances of such codes via a combinatorial tool called ``eonv". This combinatorial approach provides a faster alternative method of finding the minimum distance, which is known to be a hard problem. This is demonstrated on several classes of codes from hypergraphs. Moreover, self-duality and self-orthogonality conditions are also studied through hypergraphs.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
AmsterTime: A Visual Place Recognition Benchmark Dataset for Severe Domain Shift
Authors:
Burak Yildiz,
Seyran Khademi,
Ronald Maria Siebes,
Jan van Gemert
Abstract:
We introduce AmsterTime: a challenging dataset to benchmark visual place recognition (VPR) in presence of a severe domain shift. AmsterTime offers a collection of 2,500 well-curated images matching the same scene from a street view matched to historical archival image data from Amsterdam city. The image pairs capture the same place with different cameras, viewpoints, and appearances. Unlike existi…
▽ More
We introduce AmsterTime: a challenging dataset to benchmark visual place recognition (VPR) in presence of a severe domain shift. AmsterTime offers a collection of 2,500 well-curated images matching the same scene from a street view matched to historical archival image data from Amsterdam city. The image pairs capture the same place with different cameras, viewpoints, and appearances. Unlike existing benchmark datasets, AmsterTime is directly crowdsourced in a GIS navigation platform (Mapillary). We evaluate various baselines, including non-learning, supervised and self-supervised methods, pre-trained on different relevant datasets, for both verification and retrieval tasks. Our result credits the best accuracy to the ResNet-101 model pre-trained on the Landmarks dataset for both verification and retrieval tasks by 84% and 24%, respectively. Additionally, a subset of Amsterdam landmarks is collected for feature evaluation in a classification task. Classification labels are further used to extract the visual explanations using Grad-CAM for inspection of the learned similar visuals in a deep metric learning models.
△ Less
Submitted 26 June, 2022; v1 submitted 30 March, 2022;
originally announced March 2022.
-
Antisite defects stabilized by antiphase boundaries in YFeO$_3$ thin films
Authors:
Abinash Kumar,
Konstantin Klyukin,
Shuai Ning,
Cigdem Ozsoy-Keskinbora,
Mikhail Ovsyanko,
Felix van Uden,
Ruud Krijnen,
Bilge Yildiz,
Caroline A. Ross,
James M. LeBeau
Abstract:
YFeO$_3$ thin films are a recent addition to the family of multiferroic orthoferrites where Y\textsubscript{Fe} antisite defects and strain have been shown to introduce polar displacements while retaining magnetic properties. Complete control of the multiferroic properties, however, necessitates knowledge of the defects present and their potential role in modifying behavior. Here, we report the st…
▽ More
YFeO$_3$ thin films are a recent addition to the family of multiferroic orthoferrites where Y\textsubscript{Fe} antisite defects and strain have been shown to introduce polar displacements while retaining magnetic properties. Complete control of the multiferroic properties, however, necessitates knowledge of the defects present and their potential role in modifying behavior. Here, we report the structure and chemistry of antiphase boundaries in multiferroic YFeO$_3$ thin films using aberration corrected scanning transmission electron microscopy combined with atomic resolution energy dispersive X-ray spectroscopy. We find that Fe\textsubscript{Y} antisites, which are not stable in the film bulk, periodically arrange along antiphase boundaries due to changes in the local environment. Using density functional theory, we show that the antiphase boundaries are polar and bi-stable, where the presence of Fe\textsubscript{Y} antisites significantly decreases the switching barrier. These results highlight how planar defects, such as antiphase boundaries, can stabilize point defects that would otherwise not be expected to form within the structure.
△ Less
Submitted 19 July, 2021;
originally announced July 2021.
-
Electronegative metal dopants improve switching consistency in Al2O3 resistive switching devices
Authors:
Zheng Jie Tan,
Vrindaa Somjit,
Cigdem Toparli,
Bilge Yildiz,
Nicholas Fang
Abstract:
Resistive random access memories are promising for non-volatile memory and brain-inspired computing applications. High variability and low yield of these devices are key drawbacks hindering reliable training of physical neural networks. In this study, we show that do** an oxide electrolyte, Al2O3, with electronegative metals makes resistive switching significantly more reproducible, surpassing t…
▽ More
Resistive random access memories are promising for non-volatile memory and brain-inspired computing applications. High variability and low yield of these devices are key drawbacks hindering reliable training of physical neural networks. In this study, we show that do** an oxide electrolyte, Al2O3, with electronegative metals makes resistive switching significantly more reproducible, surpassing the reproducibility requirements for obtaining reliable hardware neuromorphic circuits. The underlying mechanism is the ease of creating oxygen vacancies in the vicinity of electronegative dopants, due to the capture of the associated electrons by dopant mid-gap states, and the weakening of Al-O bonds. These oxygen vacancies and vacancy clusters also bind significantly to the dopant, thereby serving as preferential sites and building blocks in the formation of conducting paths. We validate this theory experimentally by implanting multiple dopants over a range of electronegativities, and find superior repeatability and yield with highly electronegative metals, Au, Pt and Pd. These devices also exhibit a gradual SET transition, enabling multibit switching that is desirable for analog computing.
△ Less
Submitted 2 May, 2021; v1 submitted 27 April, 2021;
originally announced April 2021.
-
An antisite defect mechanism for room temperature ferroelectricity in orthoferrites
Authors:
Shuai Ning,
Abinash Kumar,
Konstantin Klyukin,
Jong Heon Kim,
Tingyu Su,
Hyun-Suk Kim,
James M. LeBeau,
Bilge Yildiz,
Caroline A. Ross
Abstract:
Single-phase multiferroic materials that allow the coexistence of ferroelectric and magnetic ordering above room temperature are highly desirable, motivating an ongoing search for mechanisms for unconventional ferroelectricity in magnetic oxides. Here, we report an antisite defect mechanism for room temperature ferroelectricity in epitaxial thin films of yttrium orthoferrite, YFeO3, a perovskite-s…
▽ More
Single-phase multiferroic materials that allow the coexistence of ferroelectric and magnetic ordering above room temperature are highly desirable, motivating an ongoing search for mechanisms for unconventional ferroelectricity in magnetic oxides. Here, we report an antisite defect mechanism for room temperature ferroelectricity in epitaxial thin films of yttrium orthoferrite, YFeO3, a perovskite-structured canted antiferromagnet. A combination of piezoresponse force microscopy, atomically resolved elemental map** with aberration corrected scanning transmission electron microscopy and density functional theory calculations reveals that the presence of YFe antisite defects facilitates a non-centrosymmetric distortion promoting ferroelectricity. This mechanism is predicted to work analogously for other rare earth orthoferrites, with a dependence of the polarization on the radius of the rare earth cation. Furthermore, a vertically aligned nanocomposite consisting of pillars of a magnetoelastic oxide CoFe2O4 embedded epitaxially in the YFeO3 matrix exhibits both robust ferroelectricity and ferrimagnetism at room temperature, as well as a noticeable strain-mediated magnetoelectric coupling effect. Our work uncovers the distinctive role of antisite defects in providing a novel mechanism for ferroelectricity in a range of magnetic orthoferrites and further augments the functionality of this family of complex oxides for multiferroic applications.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
ReproducedPapers.org: Openly teaching and structuring machine learning reproducibility
Authors:
Burak Yildiz,
Hayley Hung,
Jesse H. Krijthe,
Cynthia C. S. Liem,
Marco Loog,
Gosia Migut,
Frans Oliehoek,
Annibale Panichella,
Przemyslaw Pawelczak,
Stjepan Picek,
Mathijs de Weerdt,
Jan van Gemert
Abstract:
We present ReproducedPapers.org: an open online repository for teaching and structuring machine learning reproducibility. We evaluate doing a reproduction project among students and the added value of an online reproduction repository among AI researchers. We use anonymous self-assessment surveys and obtained 144 responses. Results suggest that students who do a reproduction project place more val…
▽ More
We present ReproducedPapers.org: an open online repository for teaching and structuring machine learning reproducibility. We evaluate doing a reproduction project among students and the added value of an online reproduction repository among AI researchers. We use anonymous self-assessment surveys and obtained 144 responses. Results suggest that students who do a reproduction project place more value on scientific reproductions and become more critical thinkers. Students and AI researchers agree that our online reproduction repository is valuable.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
New Extremal Binary Self-Dual Codes from Block Circulant Matrices and Block Quadratic Residue Circulant Matrices
Authors:
Joe Gildea,
Abidin Kaya,
Rhian Taylor,
Alexander Tylyshchak,
Bahattin Yildiz
Abstract:
In this paper, we construct self-dual codes from a construction that involves both block circulant matrices and block quadratic residue circulant matrices. We provide conditions when this construction can yield self-dual codes. We construct self-dual codes of various lengths over F2 and F2 + uF2. Using extensions, neighbours and sequences of neighbours, we construct many new self-dual codes. In pa…
▽ More
In this paper, we construct self-dual codes from a construction that involves both block circulant matrices and block quadratic residue circulant matrices. We provide conditions when this construction can yield self-dual codes. We construct self-dual codes of various lengths over F2 and F2 + uF2. Using extensions, neighbours and sequences of neighbours, we construct many new self-dual codes. In particular, we construct one new self-dual code of length 66 and 51 new self-dual codes of length 68.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
Hot Electron Dynamics in Ultrafast Multilayer Epsilon-Near-Zero Metamaterial
Authors:
Alireza R. Rashed,
Bilge Can Yildiz,
Surya R. Ayyagari,
Humeyra Caglayan
Abstract:
Realizing remarkable tunability in optical properties without sacrificing speed is critical to obtain all optical ultrafast devices. In this work, we investigate the ultrafast temporal behavior of optically tunable epsilon-near-zero (ENZ) metamaterials, operating in the visible spectral range. To perform this the ultrafast dynamics of the hot electrons is acquired by femtosecond pump-probe spectro…
▽ More
Realizing remarkable tunability in optical properties without sacrificing speed is critical to obtain all optical ultrafast devices. In this work, we investigate the ultrafast temporal behavior of optically tunable epsilon-near-zero (ENZ) metamaterials, operating in the visible spectral range. To perform this the ultrafast dynamics of the hot electrons is acquired by femtosecond pump-probe spectroscopy and studied based on two-temperature model (2TM). We show that pum** with femtosecond pulses changes the effective permittivity of the metamaterial more than 400 %. This significant modulation is more pronounced in ENZ region and we confirm this by the 2TM. The realized ultrafast modulation in effective permittivity, along with the ultrashort relaxation time of 3.3 ps, opens a new avenue towards ultrafast photonic applications.
△ Less
Submitted 10 March, 2020;
originally announced March 2020.
-
New Extremal binary self-dual codes of length 68 from a novel approach to neighbors
Authors:
Joe Gildea,
Abidin Kaya,
Adrian Korban,
Bahattin Yildiz
Abstract:
In this work, we introduce the concept of distance between self-dual codes, which generalizes the concept of a neighbor for self-dual codes. Using the k-neighbors, we are able to construct extremal binary self-dual codes of length 68 with new weight enumerators. We construct 143 extremal binary self-dual codes of length 68 with new weight enumerators including 42 codes with gamma=8 in their W_{68,…
▽ More
In this work, we introduce the concept of distance between self-dual codes, which generalizes the concept of a neighbor for self-dual codes. Using the k-neighbors, we are able to construct extremal binary self-dual codes of length 68 with new weight enumerators. We construct 143 extremal binary self-dual codes of length 68 with new weight enumerators including 42 codes with gamma=8 in their W_{68,2} and 40 with gamma=9 in their W_{68,2}. These examples are the first in the literature for these gamma values. This completes the theoretical list of possible values for gamma in W_{68,2}.
△ Less
Submitted 23 February, 2020;
originally announced February 2020.
-
A group induced four-circulant construction for self-dual codes and new extremal binary self-dual codes
Authors:
Joe Gildea,
Abidin Kaya,
Alexander Tylyshchak,
Bahattin Yildiz
Abstract:
We introduce an altered version of the four circulant construction over group rings for self-dual codes. We consider this construction over the binary field, the rings F_2 + uF_2 and F_4 + uF_4; using groups of order 3, 7, 9, 13, and 15. Through these constructions and their extensions, we find binary self-dual codes of lengths 32, 40, 56, 64, 68 and 80, all of which are extremal or optimal. In pa…
▽ More
We introduce an altered version of the four circulant construction over group rings for self-dual codes. We consider this construction over the binary field, the rings F_2 + uF_2 and F_4 + uF_4; using groups of order 3, 7, 9, 13, and 15. Through these constructions and their extensions, we find binary self-dual codes of lengths 32, 40, 56, 64, 68 and 80, all of which are extremal or optimal. In particular, we find five new self-dual codes of parameters [56, 28, 10], twenty-three extremal binary self-dual codes of length 68 with new weight enumerators and fifteen new self-dual codes of parameters [80, 40, 14].
△ Less
Submitted 25 December, 2019;
originally announced December 2019.
-
New binary self-dual codes via a generalization of the four circulant construction
Authors:
Joe Gildea,
Abidin Kaya,
Bahattin Yildiz
Abstract:
In this work, we generalize the four circulant construction for self-dual codes. By applying the constructions over the alphabets F_2, F_2 + uF_2, F_4+uF_4, we were able to obtain extremal binary self-dual codes of lengths 40, 64 including new extremal binary self-dual codes of length 68. More precisely, 43 new extremal binary self-dual codes of length 68, with rare new parameters have been constr…
▽ More
In this work, we generalize the four circulant construction for self-dual codes. By applying the constructions over the alphabets F_2, F_2 + uF_2, F_4+uF_4, we were able to obtain extremal binary self-dual codes of lengths 40, 64 including new extremal binary self-dual codes of length 68. More precisely, 43 new extremal binary self-dual codes of length 68, with rare new parameters have been constructed.
△ Less
Submitted 25 December, 2019;
originally announced December 2019.
-
Isodual and Self-dual Codes from Graphs
Authors:
Sudipta Mallik,
Bahattin Yildiz
Abstract:
Binary linear codes are constructed from graphs, in particular, by the generator matrix $[I_n|A]$ where $A$ is the adjacency matrix of a graph on $n$ vertices. A combinatorial interpretation of the minimum distance of such codes is given. We also present graph theoretic conditions for such linear codes to be Type I and Type II self-dual. Several examples of binary linear codes produced by well-kno…
▽ More
Binary linear codes are constructed from graphs, in particular, by the generator matrix $[I_n|A]$ where $A$ is the adjacency matrix of a graph on $n$ vertices. A combinatorial interpretation of the minimum distance of such codes is given. We also present graph theoretic conditions for such linear codes to be Type I and Type II self-dual. Several examples of binary linear codes produced by well-known graph classes are given.
△ Less
Submitted 6 January, 2021; v1 submitted 9 August, 2019;
originally announced August 2019.
-
Plasmon lifetime enhancement in a bright-dark mode coupled system
Authors:
Bilge Can Yildiz,
Alpan Bek,
Mehmet Emre Tasgin
Abstract:
Metallic nanoparticles can localize the incident light to hotspots as plasmon oscillations, where the intensity can be increased up to four orders of magnitude. Even though the lifetime of plasmons are typically short, it can be increased via interactions with quantum emitters, e.g. spaser nano-lasers. However, molecules can bleach in days. Here, we study the lifetime enhancement of plasmon excita…
▽ More
Metallic nanoparticles can localize the incident light to hotspots as plasmon oscillations, where the intensity can be increased up to four orders of magnitude. Even though the lifetime of plasmons are typically short, it can be increased via interactions with quantum emitters, e.g. spaser nano-lasers. However, molecules can bleach in days. Here, we study the lifetime enhancement of plasmon excitations due to the coupling with longer lifetime dark plasmon modes. Exact solutions of the 3D Maxwell equations, i.e. FDTD, demonstrates that the lifetime of the coupled system increases, as also predicted by a basic oscillator model. We report an optimum bright-dark plasmon mode coupling, where lifetime enhancement becomes maximum, and show that no precise positioning of the nanostructures is required to obtain enhanced lifetime.
△ Less
Submitted 17 January, 2020; v1 submitted 17 May, 2019;
originally announced May 2019.
-
New Extremal binary self-dual codes from a Baumert-Hall array
Authors:
Abidin Kaya,
Bahattin Yildiz
Abstract:
In this work, we introduce new construction methods for self-dual codes using a Baumert-Hall array. We apply the constructions over the alphabets F_2 and F_4 + uF_4 and combine them with extension theorems and neighboring constructions. As a result, we construct 46 new extremal binary self-dual codes of length 68, 26 new best known Type II codes of length 72 and 8 new extremal Type II codes of len…
▽ More
In this work, we introduce new construction methods for self-dual codes using a Baumert-Hall array. We apply the constructions over the alphabets F_2 and F_4 + uF_4 and combine them with extension theorems and neighboring constructions. As a result, we construct 46 new extremal binary self-dual codes of length 68, 26 new best known Type II codes of length 72 and 8 new extremal Type II codes of length 80 that lead to new 3-(80,16,665) designs. Among the new codes of length 68 are the examples of codes with the rare γ= 5 parameter in W68;2. All these new codes are tabulated in the paper.
△ Less
Submitted 5 February, 2019;
originally announced February 2019.
-
Discovering Low-Precision Networks Close to Full-Precision Networks for Efficient Embedded Inference
Authors:
Jeffrey L. McKinstry,
Steven K. Esser,
Rathinakumar Appuswamy,
Deepika Bablani,
John V. Arthur,
Izzet B. Yildiz,
Dharmendra S. Modha
Abstract:
To realize the promise of ubiquitous embedded deep network inference, it is essential to seek limits of energy and area efficiency. To this end, low-precision networks offer tremendous promise because both energy and area scale down quadratically with the reduction in precision. Here we demonstrate ResNet-18, -34, -50, -152, Inception-v3, Densenet-161, and VGG-16bn networks on the ImageNet classif…
▽ More
To realize the promise of ubiquitous embedded deep network inference, it is essential to seek limits of energy and area efficiency. To this end, low-precision networks offer tremendous promise because both energy and area scale down quadratically with the reduction in precision. Here we demonstrate ResNet-18, -34, -50, -152, Inception-v3, Densenet-161, and VGG-16bn networks on the ImageNet classification benchmark that, at 8-bit precision exceed the accuracy of the full-precision baseline networks after one epoch of finetuning, thereby leveraging the availability of pretrained models. We also demonstrate ResNet-18, -34, -50, -152, Densenet-161, and VGG-16bn 4-bit models that match the accuracy of the full-precision baseline networks -- the highest scores to date. Surprisingly, the weights of the low-precision networks are very close (in cosine similarity) to the weights of the corresponding baseline networks, making training from scratch unnecessary.
We find that gradient noise due to quantization during training increases with reduced precision, and seek ways to overcome this noise. The number of iterations required by SGD to achieve a given training error is related to the square of (a) the distance of the initial solution from the final plus (b) the maximum variance of the gradient estimates. Therefore, we (a) reduce solution distance by starting with pretrained fp32 precision baseline networks and fine-tuning, and (b) combat gradient noise introduced by quantization by training longer and reducing learning rates. Sensitivity analysis indicates that these simple techniques, coupled with proper activation function range calibration to take full advantage of the limited precision, are sufficient to discover low-precision networks, if they exist, close to fp32 precision baseline networks. The results herein provide evidence that 4-bits suffice for classification.
△ Less
Submitted 24 February, 2019; v1 submitted 11 September, 2018;
originally announced September 2018.
-
Reversible DNA codes over a family of non-chain rings $R_{k,s}$
Authors:
Fatmanur Gursoy,
Elif Segah Oztas,
Bahattin Yildiz
Abstract:
In this paper, we solve the reversibility problem for DNA codes over the non-chain ring $R_{k,s}=\mathbb{F}_{4^{2k}}[u_1,...,u_{s}]/< u_1^2-u_1,..., u_s^2-u_s>$. We define an automorphism $θ$ over $R_{k,s}$ which help us both find the idempotent decomposition of $R_{k,s}$ and solve the reversibility problem via skew cyclic codes. Moreover, we introduce a generalized Gray map that preserves DNA rev…
▽ More
In this paper, we solve the reversibility problem for DNA codes over the non-chain ring $R_{k,s}=\mathbb{F}_{4^{2k}}[u_1,...,u_{s}]/< u_1^2-u_1,..., u_s^2-u_s>$. We define an automorphism $θ$ over $R_{k,s}$ which help us both find the idempotent decomposition of $R_{k,s}$ and solve the reversibility problem via skew cyclic codes. Moreover, we introduce a generalized Gray map that preserves DNA reversibility.
△ Less
Submitted 1 January, 2021; v1 submitted 7 November, 2017;
originally announced November 2017.
-
Fano enhancement of SERS signal without increasing the hot spot intensity
Authors:
Selen Postaci,
Bilge Can Yildiz,
Alpan Bek,
Mehmet Emre Tasgin
Abstract:
Plasmonic nanostructures enhance nonlinear response, such as surface enhanced Raman scattering (SERS), by localizing the incident field into hot spots. The localized hot spot field can be enhanced even further when linear Fano resonances (FR) take place in a double resonance scheme. However, hot spot enhancement is limited with the modification of the vibrational modes, the break-down of the molec…
▽ More
Plasmonic nanostructures enhance nonlinear response, such as surface enhanced Raman scattering (SERS), by localizing the incident field into hot spots. The localized hot spot field can be enhanced even further when linear Fano resonances (FR) take place in a double resonance scheme. However, hot spot enhancement is limited with the modification of the vibrational modes, the break-down of the molecule and the tunnelling regime. Here, we present a method which can circumvent these limitations. Our analytical model and solutions of 3D Maxwell equations show that: enhancement due to the localized field can be multiplied by a factor of $10^2$ to $10^3$. Moreover, this can be performed without increasing the hot spot intensity which also avoids the modification of the Raman modes. Unlike linear Fano resonances, we create a path interference in the nonlinear response. We demonstrate on a single equation that enhancement takes place due to cancellation of the contributing terms in the denominator of the SERS response.
△ Less
Submitted 19 May, 2018; v1 submitted 26 September, 2017;
originally announced September 2017.
-
Polarizing oxygen vacancies in insulating metal oxides under high electric field
Authors:
Mostafa Youssef,
Krystyn J. Van Vliet,
Bilge Yildiz
Abstract:
We demonstrate a thermodynamic formulation to quantify defect formation energetics in an insulator under high electric field. As a model system, we analyzed neutral oxygen vacancies (color centers) in alkaline-earth-metal binary oxides using density functional theory, Berry phase calculations, and maximally localized Wannier functions. Work of polarization lowers the field dependent electric Gibbs…
▽ More
We demonstrate a thermodynamic formulation to quantify defect formation energetics in an insulator under high electric field. As a model system, we analyzed neutral oxygen vacancies (color centers) in alkaline-earth-metal binary oxides using density functional theory, Berry phase calculations, and maximally localized Wannier functions. Work of polarization lowers the field dependent electric Gibbs energy of formation of this defect. This is attributed mainly to the ease of polarizing the two electrons trapped in the vacant site, and secondarily to the defect induced reduction in bond stiffness and softening of phonon modes. The formulation and analysis have implications for understanding the behavior of insulating oxides in electronic, magnetic, catalytic, and electrocaloric devices under high electric field.
△ Less
Submitted 15 August, 2017;
originally announced August 2017.
-
A Model-Derivation Framework for Software Analysis
Authors:
Bugra M. Yildiz,
Arend Rensink,
Christoph Bockisch,
Mehmet Aksit
Abstract:
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system. However, this requires expressive models which are difficult and cumbersome to create and maintain by hand. This paper presents a framework that automatically de…
▽ More
Model-based verification allows to express behavioral correctness conditions like the validity of execution states, boundaries of variables or timing at a high level of abstraction and affirm that they are satisfied by a software system. However, this requires expressive models which are difficult and cumbersome to create and maintain by hand. This paper presents a framework that automatically derives behavioral models from real-sized Java programs. Our framework builds on the EMF/ECore technology and provides a tool that creates an initial model from Java bytecode, as well as a series of transformations that simplify the model and eventually output a timed-automata model that can be processed by a model checker such as UPPAAL. The framework has the following properties: (1) consistency of models with software, (2) extensibility of the model derivation process, (3) scalability and (4) expressiveness of models. We report several case studies to validate how our framework satisfies these properties.
△ Less
Submitted 19 March, 2017;
originally announced March 2017.
-
Specific Cation Diffusion across the (La,Sr)MnO3 (Ce,Gd)O2 interface in SOFCs
Authors:
T. Daio,
S. R. Bishop,
B. Yildiz,
H. L. Tuller,
S. M. Lyth J. Hyodo K. Kaneko,
N. H. Perry
Abstract:
Oxide interfaces play very important roles for the physical and chemical properties of nanostructured materials, such as an ionic conductivity, superconductivity, and magnetism. Gadolinia-doped Ceria (GDC) is commonly selected as the interlayer between (La,Sr)MnO3 and Y2O3-stabilized ZrO2 in fuel cells. The chemical expansions across the oxide interlayer were carefully examined at the atomic resol…
▽ More
Oxide interfaces play very important roles for the physical and chemical properties of nanostructured materials, such as an ionic conductivity, superconductivity, and magnetism. Gadolinia-doped Ceria (GDC) is commonly selected as the interlayer between (La,Sr)MnO3 and Y2O3-stabilized ZrO2 in fuel cells. The chemical expansions across the oxide interlayer were carefully examined at the atomic resolution in order to understand the cation diffusion and existence of oxygen deficiency at the interfaces.
△ Less
Submitted 3 March, 2017;
originally announced March 2017.
-
Twisted Centralizer Codes
Authors:
Adel Alahmadi,
S. P. Glasby,
Cheryl E. Praeger,
Patrick Solé,
Bahattin Yildiz
Abstract:
Given an $n\times n$ matrix $A$ over a field $F$ and a scalar $a\in F$, we consider the linear codes $C(A,a):=\{B\in F^{n\times n}\mid \,AB=aBA\}$ of length $n^2$. We call $C(A,a)$ a twisted centralizer code. We investigate properties of these codes including their dimensions, minimum distances, parity-check matrices, syndromes, and automorphism groups. The minimal distance of a centralizer code (…
▽ More
Given an $n\times n$ matrix $A$ over a field $F$ and a scalar $a\in F$, we consider the linear codes $C(A,a):=\{B\in F^{n\times n}\mid \,AB=aBA\}$ of length $n^2$. We call $C(A,a)$ a twisted centralizer code. We investigate properties of these codes including their dimensions, minimum distances, parity-check matrices, syndromes, and automorphism groups. The minimal distance of a centralizer code (when $a=1$) is at most $n$, however for $a\ne 0,1$ the minimal distance can be much larger, as large as $n^2$.
△ Less
Submitted 12 March, 2017; v1 submitted 14 August, 2016;
originally announced August 2016.
-
Equi-depth Histogram Construction for Big Data with Quality Guarantees
Authors:
Burak Yıldız,
Tolga Büyüktanır,
Fatih Emekci
Abstract:
The amount of data generated and stored in cloud systems has been increasing exponentially. The examples of data include user generated data, machine generated data as well as data crawled from the Internet. There have been several frameworks with proven efficiency to store and process the petabyte scale data such as Apache Hadoop, HDFS and several NoSQL frameworks. These systems have been widely…
▽ More
The amount of data generated and stored in cloud systems has been increasing exponentially. The examples of data include user generated data, machine generated data as well as data crawled from the Internet. There have been several frameworks with proven efficiency to store and process the petabyte scale data such as Apache Hadoop, HDFS and several NoSQL frameworks. These systems have been widely used in industry and thus are subject to several research. The proposed data processing techniques should be compatible with the above frameworks in order to be practical. One of the key data operations is deriving equi-depth histograms as they are crucial in understanding the statistical properties of the underlying data with many applications including query optimization. In this paper, we focus on approximate equi-depth histogram construction for big data and propose a novel merge based histogram construction method with a histogram processing framework which constructs an equi-depth histogram for a given time interval. The proposed method constructs approximate equi-depth histograms by merging exact equi-depth histograms of partitioned data by guaranteeing a maximum error bound on the number of items in a bucket (bucket size) as well as any range on the histogram.
△ Less
Submitted 17 June, 2016;
originally announced June 2016.
-
New extremal binary self-dual codes from a modified four circulant construction
Authors:
Abidin Kaya,
Bahattin Yildiz,
Abdullah Paşa
Abstract:
In this work, we propose a modified four circulant construction for self-dual codes and a bordered version of the construction using the properties of λ-circulant and λ-reverse circulant matrices. By using the constructions on $F_2$, we obtain new binary codes of lengths 64 and 68. We also apply the constructions to the ring $R_2$ and considering the $F_2$ and $R_1$-extensions, we obtain new singl…
▽ More
In this work, we propose a modified four circulant construction for self-dual codes and a bordered version of the construction using the properties of λ-circulant and λ-reverse circulant matrices. By using the constructions on $F_2$, we obtain new binary codes of lengths 64 and 68. We also apply the constructions to the ring $R_2$ and considering the $F_2$ and $R_1$-extensions, we obtain new singly-even extremal binary self-dual codes of lengths 66 and 68. More precisely, we find 3 new codes of length 64, 15 new codes of length 66 and 22 new codes of length 68. These codes all have weight enumerators with parameters that were not known to exist in the literature.
△ Less
Submitted 6 July, 2015;
originally announced July 2015.
-
The homogeneous weight for $R_k$, related Gray map and new binary quasicyclic codes
Authors:
Bahattin Yildiz,
Ismail G. Kelebek
Abstract:
Using theoretical results about the homogeneous weights for Frobenius rings, we describe the homogeneous weight for the ring family $R_k$, a recently introduced family of Frobenius rings which have been used extensively in coding theory. We find an associated Gray map for the homogeneous weight using first order Reed-Muller codes and we describe some of the general properties of the images of code…
▽ More
Using theoretical results about the homogeneous weights for Frobenius rings, we describe the homogeneous weight for the ring family $R_k$, a recently introduced family of Frobenius rings which have been used extensively in coding theory. We find an associated Gray map for the homogeneous weight using first order Reed-Muller codes and we describe some of the general properties of the images of codes over $R_k$ under this Gray map. We then discuss quasitwisted codes over $R_k$ and their binary images under the homogeneous Gray map. In this way, we find many optimal binary codes which are self-orthogonal and quasicyclic. In particular, we find a substantial number of optimal binary codes that are quasicyclic of index 8, 16 and 24, nearly all of which are new additions to the database of quasicyclic codes kept by Chen.
△ Less
Submitted 16 April, 2015;
originally announced April 2015.
-
Enhanced Second Harmonic Generation from Coupled Asymmetric Plasmonic Metal Nanostructures
Authors:
Bilge Can Yildiz,
Mehmet Emre Tasgin,
Musa Kurtulus Abak,
Sahin Coskun,
Husnu Emrah Unalan,
Alpan Bek
Abstract:
We show that second harmonic generation can be enhanced by Fano resonant coupling of asymmetric plasmonic metal nanostructures. We develop a theoretical model examining the effects of electromagnetic interaction between two metal nanostructures on the second harmonic generation. We compare the second harmonic generation efficiency of a single plasmonic metal nanostructure with that of two coupled…
▽ More
We show that second harmonic generation can be enhanced by Fano resonant coupling of asymmetric plasmonic metal nanostructures. We develop a theoretical model examining the effects of electromagnetic interaction between two metal nanostructures on the second harmonic generation. We compare the second harmonic generation efficiency of a single plasmonic metal nanostructure with that of two coupled ones. We show that second harmonic generation from a single metal nanostructure can be enhanced about 30 times by attaching a second metal nanostructure with a 10 times higher quality factor than that of the first one. The origin of this enhancement is Fano resonant coupling of the two metal nanostructures. We support our findings on Fano enhancement of second harmonic generation by an experimental study of a coupled plasmonic system composed of a silver nanoparticle and a silver nanowire on glass surface in which the ratio of the quality factors are also estimated to be around 10 times.
△ Less
Submitted 25 October, 2015; v1 submitted 30 November, 2014;
originally announced December 2014.
-
The zero short Covering Problem for finite rings
Authors:
Abdullah Paşa,
Bahattin Yildiz
Abstract:
In this work, we find the cardinality of minimal zero short covers of An for any finite local ring A, removing the restriction of D(A)^2 = 0 from the previous works in the literature. Using the structure theorem for Artinian rings, we conclude that we have solved the zero short covering problem for all finite rings. We demonstrate our results on R_k, an infinite family of finite commutative rings…
▽ More
In this work, we find the cardinality of minimal zero short covers of An for any finite local ring A, removing the restriction of D(A)^2 = 0 from the previous works in the literature. Using the structure theorem for Artinian rings, we conclude that we have solved the zero short covering problem for all finite rings. We demonstrate our results on R_k, an infinite family of finite commutative rings extensively studied in coding theory, which satisfy D(A)^2 \neq 0 for all k \geq 2.
△ Less
Submitted 4 March, 2015; v1 submitted 29 September, 2014;
originally announced September 2014.
-
On Codes Over $\mathbb{Z}_{p^{s}}$ with the Extended Lee Weight
Authors:
Zeynep Ödemiş Özger,
Bahattin Yildiz,
Steven Dougherty
Abstract:
We consider codes over $\mathbb{Z}_{p^s}$ with the extended Lee weight. We find Singleton bounds with respect to this weight and define MLDS and MLDR codes accordingly. We also consider the kernels of these codes and the notion of independence of vectors in this space. We investigate the linearity and duality of the Gray images of codes over $\mathbb{Z}_{p^s}$.
We consider codes over $\mathbb{Z}_{p^s}$ with the extended Lee weight. We find Singleton bounds with respect to this weight and define MLDS and MLDR codes accordingly. We also consider the kernels of these codes and the notion of independence of vectors in this space. We investigate the linearity and duality of the Gray images of codes over $\mathbb{Z}_{p^s}$.
△ Less
Submitted 27 June, 2014;
originally announced July 2014.
-
On codes over R_{k,m} and constructions for new binary self-dual codes
Authors:
Nesibe Tufekci,
Bahattin Yildiz
Abstract:
In this work, we study codes over the ring R_{k,m}=F_2[u,v]/<u^{k},v^{m},uv-vu>, which is a family of Frobenius, characteristic 2 extensions of the binary field. We introduce a distance and duality preserving Gray map from R_{k,m} to F_2^{km} together with a Lee weight. After proving the MacWilliams identities for codes over R_{k,m} for all the relevant weight enumerators, we construct many binary…
▽ More
In this work, we study codes over the ring R_{k,m}=F_2[u,v]/<u^{k},v^{m},uv-vu>, which is a family of Frobenius, characteristic 2 extensions of the binary field. We introduce a distance and duality preserving Gray map from R_{k,m} to F_2^{km} together with a Lee weight. After proving the MacWilliams identities for codes over R_{k,m} for all the relevant weight enumerators, we construct many binary self-dual codes as the Gray images of self-dual codes over R_{k,m}. In addition to many extremal binary self-dual codes obtained in this way, including a new construction for the extended binary Golay code, we find 175 new Type I binary self-dual codes of parameters [72,36,12] and 105 new Type II binary self-dual codes of parameter [72,36,12].
△ Less
Submitted 5 June, 2014;
originally announced June 2014.
-
New extremal binary self-dual codes from F_4 + uF_4-lifts of quadratic double circulant codes over F_4
Authors:
Abidin Kaya,
Bahattin Yildiz,
Irfan Siap
Abstract:
In this work, quadratic double and quadratic bordered double circulant constructions are applied to F_4 + uF_4 as well as F_4, as a result of which extremal binary self-dual codes of length 56 and 64 are obtained. The binary extension theorems as well as the ring extension version are used to obtain 7 extremal self-dual binary codes of length 58, 24 extremal self-dual binary codes of length 66 and…
▽ More
In this work, quadratic double and quadratic bordered double circulant constructions are applied to F_4 + uF_4 as well as F_4, as a result of which extremal binary self-dual codes of length 56 and 64 are obtained. The binary extension theorems as well as the ring extension version are used to obtain 7 extremal self-dual binary codes of length 58, 24 extremal self-dual binary codes of length 66 and 29 extremal self-dual binary codes of length 68, all with new weight enumerators, updating the list of all the known extremal self-dual codes in the literature.
△ Less
Submitted 28 May, 2014;
originally announced May 2014.
-
Extension theorems for self-dual codes over rings and new binary self-dual codes
Authors:
Abidin Kaya,
Bahattin Yildiz
Abstract:
In this work, extension theorems are generalized to self-dual codes over rings and as applications many new binary self-dual extremal codes are found from self-dual codes over F_2^m+uF_2^m for m = 1, 2. The duality and distance preserving Gray maps from F4 +uF4 to (F_2 +uF_2)^2 and (F_4)^2 are used to obtain self-dual codes whose binary Gray images are [64,32,12]-extremal self-dual. An F_2+uF_2-ex…
▽ More
In this work, extension theorems are generalized to self-dual codes over rings and as applications many new binary self-dual extremal codes are found from self-dual codes over F_2^m+uF_2^m for m = 1, 2. The duality and distance preserving Gray maps from F4 +uF4 to (F_2 +uF_2)^2 and (F_4)^2 are used to obtain self-dual codes whose binary Gray images are [64,32,12]-extremal self-dual. An F_2+uF_2-extension is used and as binary images, 178 extremal binary self-dual codes of length 68 with new weight enumerators are obtained. Especially the first examples of codes with gamma=3 and many codes with the rare gamma= 4, 6 parameters are obtained. In addition to these, two hundred fifty doubly even self dual [96,48,16]-codes with new weight enumerators are obtained from four-circulant codes over F_4 + uF_4. New extremal doubly even binary codes of lengths 80 and 88 are also found by the F_2+uF_2-lifts of binary four circulant codes and a corresponding result about 3-designs is stated.
△ Less
Submitted 1 April, 2014;
originally announced April 2014.
-
New extremal binary self-dual codes of length 68 from quadratic residue codes over f_2+uf_2+u^2f_2
Authors:
Abidin Kaya,
Bahattin Yildiz,
Irfan Siap
Abstract:
In this work, quadratic reside codes over the ring F2 +uF2 +u^2F2 with u^3 = u are considered. A duality and distance preserving Gray map from F2 + uF2 + u^2F2 to (F_2)^3 is defined. By using quadratic double circulant, quadratic bordered double circulant constructions and their extensions self- dual codes of different lengths are obtained. As Gray images of these codes and their extensions, a sub…
▽ More
In this work, quadratic reside codes over the ring F2 +uF2 +u^2F2 with u^3 = u are considered. A duality and distance preserving Gray map from F2 + uF2 + u^2F2 to (F_2)^3 is defined. By using quadratic double circulant, quadratic bordered double circulant constructions and their extensions self- dual codes of different lengths are obtained. As Gray images of these codes and their extensions, a substantial number of new extremal self-dual binary codes are found. More precisely, thirty two new extremal binary self-dual codes of length 68, 363 Type I codes of parameters [72; 36; 12], a Type II [72; 36; 12] code and a Type II [96; 48; 16] code with new weight enumerators are obtained through these constructions. The results are tabulated.
△ Less
Submitted 10 December, 2013; v1 submitted 2 August, 2013;
originally announced August 2013.
-
Linear Codes over Z_4+uZ_4: MacWilliams identities, projections, and formally self-dual codes
Authors:
Bahattin Yildiz,
Suat Karadeniz
Abstract:
Linear codes are considered over the ring Z_4+uZ_4, a non-chain extension of Z_4. Lee weights, Gray maps for these codes are defined and MacWilliams identities for the complete, symmetrized and Lee weight enumerators are proved. Two projections from Z_4+uZ_4 to the rings Z_4 and F_2+uF_2 are considered and self-dual codes over Z_4+uZ_4 are studied in connection with these projections. Finally thre…
▽ More
Linear codes are considered over the ring Z_4+uZ_4, a non-chain extension of Z_4. Lee weights, Gray maps for these codes are defined and MacWilliams identities for the complete, symmetrized and Lee weight enumerators are proved. Two projections from Z_4+uZ_4 to the rings Z_4 and F_2+uF_2 are considered and self-dual codes over Z_4+uZ_4 are studied in connection with these projections. Finally three constructions are given for formally self-dual codes over Z_4+uZ_4 and their Z_4-images together with some good examples of formally self-dual Z_4-codes obtained through these constructions.
△ Less
Submitted 11 July, 2013;
originally announced July 2013.
-
Quadratic Residue Codes over F_p+vF_p and their Gray Images
Authors:
Abidin Kaya,
Bahattin Yildiz,
İrfan Siap
Abstract:
In this paper quadratic residue codes over the ring Fp + vFp are introduced in terms of their idempotent generators. The structure of these codes is studied and it is observed that these codes share similar properties with quadratic residue codes over finite fields. For the case p = 2, Euclidean and Hermitian self-dual families of codes as extended quadratic residue codes are considered and two op…
▽ More
In this paper quadratic residue codes over the ring Fp + vFp are introduced in terms of their idempotent generators. The structure of these codes is studied and it is observed that these codes share similar properties with quadratic residue codes over finite fields. For the case p = 2, Euclidean and Hermitian self-dual families of codes as extended quadratic residue codes are considered and two optimal Hermitian self-dual codes are obtained as examples. Moreover, a substantial number of good p-ary codes are obtained as images of quadratic residue codes over Fp +vFp in the cases where p is an odd prime. These results are presented in tables.
△ Less
Submitted 20 May, 2013;
originally announced May 2013.
-
The automorphism group of the doubly-even [72,36,16] code can only be of order 1, 3 or 5
Authors:
Steven T Dougherty,
Suat Karadeniz,
Bahattin Yildiz
Abstract:
We prove that a putative $[72,36,16]$ code is not the image of linear code over $\ZZ_4$, $\FF_2 + u \FF_2$ or $\FF_2+v\FF_2$, thus proving that the extremal doubly even $[72,36,16]$-binary code cannot have an automorphism group containing a fixed point-free involution. Combining this with the previously proved result by Bouyuklieva that such a code cannot have an automorphism group containing an i…
▽ More
We prove that a putative $[72,36,16]$ code is not the image of linear code over $\ZZ_4$, $\FF_2 + u \FF_2$ or $\FF_2+v\FF_2$, thus proving that the extremal doubly even $[72,36,16]$-binary code cannot have an automorphism group containing a fixed point-free involution. Combining this with the previously proved result by Bouyuklieva that such a code cannot have an automorphism group containing an involution with fixed points, we conclude that the automorphism group of the $[72,36,16]$-code cannot be of even order, leaving 3 and 5 as the only possibilities.
△ Less
Submitted 25 March, 2013; v1 submitted 20 March, 2013;
originally announced March 2013.
-
Online Discrimination of Nonlinear Dynamics with Switching Differential Equations
Authors:
Sebastian Bitzer,
Izzet B. Yildiz,
Stefan J. Kiebel
Abstract:
How to recognise whether an observed person walks or runs? We consider a dynamic environment where observations (e.g. the posture of a person) are caused by different dynamic processes (walking or running) which are active one at a time and which may transition from one to another at any time. For this setup, switching dynamic models have been suggested previously, mostly, for linear and nonlinear…
▽ More
How to recognise whether an observed person walks or runs? We consider a dynamic environment where observations (e.g. the posture of a person) are caused by different dynamic processes (walking or running) which are active one at a time and which may transition from one to another at any time. For this setup, switching dynamic models have been suggested previously, mostly, for linear and nonlinear dynamics in discrete time. Motivated by basic principles of computations in the brain (dynamic, internal models) we suggest a model for switching nonlinear differential equations. The switching process in the model is implemented by a Hopfield network and we use parametric dynamic movement primitives to represent arbitrary rhythmic motions. The model generates observed dynamics by linearly interpolating the primitives weighted by the switching variables and it is constructed such that standard filtering algorithms can be applied. In two experiments with synthetic planar motion and a human motion capture data set we show that inference with the unscented Kalman filter can successfully discriminate several dynamic processes online.
△ Less
Submitted 5 November, 2012;
originally announced November 2012.
-
A Dipole Polarizable Potential for Reduced and Doped CeO$_2$ from First-Principles
Authors:
Mario Burbano,
Dario Marrocchelli,
Bilge Yildiz,
Harry L Tuller,
Stefan T Norberg,
Stephen Hull,
Paul A Madden,
Graeme W. Watson
Abstract:
In this paper we present the parameterization of a new interionic potential for stoichiometric, reduced and doped CeO$_2$. We use a dipole-polarizable potential (DIPPIM) and optimize its parameters by fitting them to a series of DFT calculations. The resulting potential was tested by calculating a series of fundamental properties for CeO$_2$ and by comparing them to experimental values. The agreem…
▽ More
In this paper we present the parameterization of a new interionic potential for stoichiometric, reduced and doped CeO$_2$. We use a dipole-polarizable potential (DIPPIM) and optimize its parameters by fitting them to a series of DFT calculations. The resulting potential was tested by calculating a series of fundamental properties for CeO$_2$ and by comparing them to experimental values. The agreement for all the calculated properties (thermal and chemical expansion coefficients, lattice parameters, oxygen migration energies, local crystalline structure and elastic constants) is within 10-15% of the experimental one, an accuracy comparable to that of ab initio calculations. This result suggests the use of this new potential for reliably predicting atomic-scale properties of CeO$_2$ in problems where ab initio calculations are not feasible due to their size-limitations.
△ Less
Submitted 20 May, 2011;
originally announced May 2011.
-
Discontinuity of Topological Entropy for the Lozi Maps
Authors:
Izzet Burak Yildiz
Abstract:
Recently, Buzzi showed in the compact case that the entropy map $f\rightarrow$ $h_{top}(f)$ is lower semi-continuous for all piecewise affine surface homeomorphisms. We prove that topological entropy for the Lozi maps can jump from zero to a value above 0.1203 as one crosses a particular parameter and hence it is not upper semi-continuous in general. Moreover, our results can be extended to a smal…
▽ More
Recently, Buzzi showed in the compact case that the entropy map $f\rightarrow$ $h_{top}(f)$ is lower semi-continuous for all piecewise affine surface homeomorphisms. We prove that topological entropy for the Lozi maps can jump from zero to a value above 0.1203 as one crosses a particular parameter and hence it is not upper semi-continuous in general. Moreover, our results can be extended to a small neighborhood of this parameter showing the jump in the entropy occurs along a line segment in the parameter space.
△ Less
Submitted 17 May, 2011; v1 submitted 1 July, 2010;
originally announced July 2010.
-
Monotonicity of the Lozi Family and the Zero Entropy Locus
Authors:
Izzet Burak Yildiz
Abstract:
Ishii and Sands showed the monotonicity of the Lozi family $\mathcal L_{a,b}$ in a $\mathcal C^1$ neighborhood of a-axis in the $a$-$b$ parameter space. We show the monotonicity of the entropy in the vertical direction around $a=2$ and in some other directions for $1<a\leq2$. Also we give some rigorous and numerical results for the parameters at which the Lozi family has zero entropy.
Ishii and Sands showed the monotonicity of the Lozi family $\mathcal L_{a,b}$ in a $\mathcal C^1$ neighborhood of a-axis in the $a$-$b$ parameter space. We show the monotonicity of the entropy in the vertical direction around $a=2$ and in some other directions for $1<a\leq2$. Also we give some rigorous and numerical results for the parameters at which the Lozi family has zero entropy.
△ Less
Submitted 17 May, 2011; v1 submitted 1 July, 2010;
originally announced July 2010.