Skip to main content

Showing 1–50 of 52 results for author: Yilmaz, S

.
  1. arXiv:2406.18973  [pdf, other

    math.OC math.DS math.SP

    Schur Stability of Matrix Segment via Bialternate Product

    Authors: Serife Yilmaz

    Abstract: In this study, the problem of robust Schur stability of $n\times n$ dimensional matrix segments by using the bialternate product of matrices is considered. It is shown that the problem can be reduced to the existence of negative eigenvalues of two of three specially constructed matrices and the existence of eigenvalues belonging to the interval $[1,\infty)$ of the third matrix. A necessary and suf… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2310.04311  [pdf, other

    cs.CV cs.IT cs.LG

    Distributed Deep Joint Source-Channel Coding with Decoder-Only Side Information

    Authors: Selim F. Yilmaz, Ezgi Ozyilkan, Deniz Gunduz, Elza Erkip

    Abstract: We consider low-latency image transmission over a noisy wireless channel when correlated side information is present only at the receiver side (the Wyner-Ziv scenario). In particular, we are interested in develo** practical schemes using a data-driven joint source-channel coding (JSCC) approach, which has been previously shown to outperform conventional separation-based approaches in the practic… ▽ More

    Submitted 27 February, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: To appear in IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN) 2024

  3. arXiv:2309.15889  [pdf, other

    eess.IV cs.CV cs.IT cs.LG cs.MM

    High Perceptual Quality Wireless Image Delivery with Denoising Diffusion Models

    Authors: Selim F. Yilmaz, Xueyan Niu, Bo Bai, Wei Han, Lei Deng, Deniz Gunduz

    Abstract: We consider the image transmission problem over a noisy wireless channel via deep learning-based joint source-channel coding (DeepJSCC) along with a denoising diffusion probabilistic model (DDPM) at the receiver. Specifically, we are interested in the perception-distortion trade-off in the practical finite block length regime, in which separate source and channel coding can be highly suboptimal. W… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

    Comments: 6 pages, 4 figures

  4. arXiv:2309.10645  [pdf, other

    cs.LG cs.AI cs.DC cs.NI

    Towards Energy-Aware Federated Traffic Prediction for Cellular Networks

    Authors: Vasileios Perifanis, Nikolaos Pavlidis, Selim F. Yilmaz, Francesc Wilhelmi, Elia Guerra, Marco Miozzo, Pavlos S. Efraimidis, Paolo Dini, Remous-Aris Koutsiamanis

    Abstract: Cellular traffic prediction is a crucial activity for optimizing networks in fifth-generation (5G) networks and beyond, as accurate forecasting is essential for intelligent network design, resource allocation and anomaly mitigation. Although machine learning (ML) is a promising approach to effectively predict network traffic, the centralization of massive data in a single data center raises issues… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: International Symposium on Federated Learning Technologies and Applications (FLTA), 2023

  5. arXiv:2305.03501  [pdf

    cs.CL

    Improving Cancer Hallmark Classification with BERT-based Deep Learning Approach

    Authors: Sultan Zavrak, Seyhmus Yilmaz

    Abstract: This paper presents a novel approach to accurately classify the hallmarks of cancer, which is a crucial task in cancer research. Our proposed method utilizes the Bidirectional Encoder Representations from Transformers (BERT) architecture, which has shown exceptional performance in various downstream applications. By applying transfer learning, we fine-tuned the pre-trained BERT model on a small co… ▽ More

    Submitted 7 June, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

    ACM Class: I.2; I.2.7

  6. arXiv:2303.16561  [pdf, other

    cs.CR

    Exploring placement of intrusion detection systems in rpl-based internet of things

    Authors: Selim Yilmaz, Emre Aydogan, Sevil Sen

    Abstract: Intrusion detection is an indispensable part of RPL security due to its nature opening to attacks from insider attackers. While there are a good deal of studies that analyze different types of attack and propose intrusion detection systems based on various techniques that are proposed in the literature, how to place such intrusion detection systems on RPL topology is not investigated. This is the… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: 15 pages, 5 figures, research article

  7. arXiv:2303.16499  [pdf, other

    cs.CR

    Assessing the Impact of Mobile Attackers on RPL-based Internet of Things

    Authors: Cansu Dogan, Selim Yilmaz, Sevil Sen

    Abstract: The Internet of Things (IoT) is becoming ubiquitous in our daily life. IoT networks that are made up of devices low power, low memory, and low computing capability appears in many applications such as healthcare, home, agriculture. IPv6 Routing Protocol for Low Power and Lossy Network (RPL) has become a standardized routing protocol for such low-power and lossy networks in IoT. RPL establishes the… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: 11 pages,3 figures, Journal

  8. arXiv:2302.01982  [pdf, other

    stat.ME stat.AP stat.CO

    multi-GPA-Tree: Statistical Approach for Pleiotropy Informed and Functional Annotation Tree Guided Prioritization of GWAS Results

    Authors: Aastha Khatiwada, Ayse Selen Yilmaz, Bethany J. Wolf, Maciej Pietrzak, Dongjun Chung

    Abstract: Genome-wide association studies (GWAS) have successfully identified over two hundred thousand genotype-trait associations. Yet some challenges remain. First, complex traits are often associated with many single nucleotide polymorphisms (SNPs), most with small or moderate effect sizes, making them difficult to detect. Second, many complex traits share a common genetic basis due to `pleiotropy' and… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

    Comments: 25 pages, 6 figures, 1 table

  9. arXiv:2211.09920  [pdf, other

    eess.IV cs.CV cs.IT cs.LG eess.SP

    Distributed Deep Joint Source-Channel Coding over a Multiple Access Channel

    Authors: Selim F. Yilmaz, Can Karamanli, Deniz Gunduz

    Abstract: We consider distributed image transmission over a noisy multiple access channel (MAC) using deep joint source-channel coding (DeepJSCC). It is known that Shannon's separation theorem holds when transmitting independent sources over a MAC in the asymptotic infinite block length regime. However, we are interested in the practical finite block length regime, in which case separate source and channel… ▽ More

    Submitted 2 March, 2023; v1 submitted 17 November, 2022; originally announced November 2022.

    Comments: To appear in IEEE International Conference on Communications (ICC) 2023

  10. arXiv:2207.08230  [pdf

    cs.CL cs.AI

    A Context-Sensitive Word Embedding Approach for The Detection of Troll Tweets

    Authors: Seyhmus Yilmaz, Sultan Zavrak

    Abstract: In this study, we aimed to address the growing concern of trolling behavior on social media by develo** and evaluating a set of model architectures for the automatic detection of troll tweets. Utilizing deep learning techniques and pre-trained word embedding methods such as BERT, ELMo, and GloVe, we evaluated the performance of each architecture using metrics such as classification accuracy, F1… ▽ More

    Submitted 7 June, 2023; v1 submitted 17 July, 2022; originally announced July 2022.

    ACM Class: I.2; I.2.7

  11. arXiv:2206.02248  [pdf, other

    cs.CR

    LNGate$^2$: Secure Bidirectional IoT Micro-payments using Bitcoin's Lightning Network and Threshold Cryptography

    Authors: Ahmet Kurt, Kemal Akkaya, Sabri Yilmaz, Suat Mercan, Omer Shlomovits, Enes Erdin

    Abstract: Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept; however it has significant problems such as high transaction fees and low throughput. Lightning Network (LN), which was introduced much later, solves most of these problems with an innovative concept called off-chain payments. With this advancement, Bitcoin has become an attractive venue to perform micro-p… ▽ More

    Submitted 19 July, 2023; v1 submitted 5 June, 2022; originally announced June 2022.

    Comments: Revised again based on anonymous reviewers' comments. Journal extension of https://doi.org/10.1145/3448300.3467833. arXiv admin note: text overlap with arXiv:2105.08902

  12. arXiv:2204.07390  [pdf

    cs.CL cs.LG cs.NE

    Email Spam Detection Using Hierarchical Attention Hybrid Deep Learning Method

    Authors: Sultan Zavrak, Seyhmus Yilmaz

    Abstract: Email is one of the most widely used ways to communicate, with millions of people and businesses relying on it to communicate and share knowledge and information on a daily basis. Nevertheless, the rise in email users has occurred a dramatic increase in spam emails in recent years. Processing and managing emails properly for individuals and companies are getting increasingly difficult. This articl… ▽ More

    Submitted 28 July, 2022; v1 submitted 15 April, 2022; originally announced April 2022.

    ACM Class: I.2.7

  13. arXiv:2204.06714  [pdf, other

    q-bio.GN

    graph-GPA 2.0: A Graphical Model for Multi-disease Analysis of GWAS Results with Integration of Functional Annotation Data

    Authors: Qiaolan Deng, ** Hyun Nam, Ayse Selen Yilmaz, Won Chang, Maciej Pietrzak, Lang Li, Hang J. Kim, Dongjun Chung

    Abstract: Genome-wide association studies (GWAS) have successfully identified a large number of genetic variants associated with traits and diseases. However, it still remains challenging to fully understand functional mechanisms underlying many associated variants. This is especially the case when we are interested in variants shared across multiple phenotypes. To address this challenge, we propose graph-G… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

  14. arXiv:2203.13335  [pdf, other

    stat.AP

    Adverse Health Correlates of Intimate Partner Violence against Older Women: Mining Electronic Health Records

    Authors: Serhan Yilmaz, Erkan Gunay, Da Hee Lee, Kathleen Whiting, Kristen Silver, Mehmet Koyuturk, Gunnur Karakurt

    Abstract: Intimate partner violence (IPV) is often studied as a problem that predominantly affects younger women. However, studies show that older women are also frequently victims of abuse even though the physical effects of abuse are harder to detect. In this study, we mined the electronic health records (EHR) available through IBM Explorys to identify health correlates of IPV that are specific to older w… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

  15. arXiv:2203.10472  [pdf, other

    cs.NI cs.AI cs.DC cs.LG

    Federated Spatial Reuse Optimization in Next-Generation Decentralized IEEE 802.11 WLANs

    Authors: Francesc Wilhelmi, Jernej Hribar, Selim F. Yilmaz, Emre Ozfatura, Kerem Ozfatura, Ozlem Yildiz, Deniz Gündüz, Hao Chen, Xiaoying Ye, Lizhao You, Yulin Shao, Paolo Dini, Boris Bellalta

    Abstract: As wireless standards evolve, more complex functionalities are introduced to address the increasing requirements in terms of throughput, latency, security, and efficiency. To unleash the potential of such new features, artificial intelligence (AI) and machine learning (ML) are currently being exploited for deriving models and protocols from data, rather than by hand-programming. In this paper, we… ▽ More

    Submitted 7 June, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  16. arXiv:2202.03129  [pdf, other

    cs.LG cs.CR eess.SP

    Over-the-Air Ensemble Inference with Model Privacy

    Authors: Selim F. Yilmaz, Burak Hasircioglu, Deniz Gunduz

    Abstract: We consider distributed inference at the wireless edge, where multiple clients with an ensemble of models, each trained independently on a local dataset, are queried in parallel to make an accurate decision on a new sample. In addition to maximizing inference accuracy, we also want to maximize the privacy of local models. We exploit the superposition property of the air to implement bandwidth-effi… ▽ More

    Submitted 15 May, 2022; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: To appear in IEEE International Symposium on Information Theory (ISIT) 2022

  17. arXiv:2201.05350  [pdf, ps, other

    math.CT math.GR

    2-Dimensional Groups with Action : The Category of Crossed Module of Groups with Action

    Authors: Alper Odabaş, Elis Soylu Yılmaz

    Abstract: In this paper, we define the notion of crossed modules of groups with action and investigate related structures. Functions for computing of these structures have been written using the GAP computational discrete algebra programming language.

    Submitted 18 January, 2022; v1 submitted 14 January, 2022; originally announced January 2022.

    MSC Class: 18-08; 18G50

  18. Shallow geothermal energy potential for heating and cooling of buildings with regeneration under climate change scenarios

    Authors: Alina Walch, Xiang Li, Jonathan Chambers, Nahid Mohajeri, Selin Yilmaz, Martin Patel, Jean-Louis Scartezzini

    Abstract: Shallow ground-source heat pumps (GSHPs) are a promising technology for contributing to the decarbonisation of the energy sector. In heating-dominated climates, the combined use of GSHPs for both heating and cooling increases their technical potential, defined as the maximum energy that can be exchanged with the ground, as the re-injection of excess heat from space cooling leads to a seasonal rege… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: Walch and Li contributed equally. Revision submitted to Energy

  19. arXiv:2107.09487  [pdf, other

    physics.soc-ph cs.SI

    On node ranking in graphs

    Authors: Ekaterina Dudkina, Michelangelo Bin, Jane Breen, Emanuele Crisostomi, Pietro Ferraro, Steve Kirkland, Jakub Marecek, Roderick Murray-Smith, Thomas Parisini, Lewi Stone, Serife Yilmaz, Robert Shorten

    Abstract: The ranking of nodes in a network according to their ``importance'' is a classic problem that has attracted the interest of different scientific communities in the last decades. The current COVID-19 pandemic has recently rejuvenated the interest in this problem, as it is related to the selection of which individuals should be tested in a population of asymptomatic individuals, or which individuals… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Journal ref: International Journal of Control, 2023

  20. arXiv:2107.06860  [pdf, other

    physics.soc-ph math.OC

    Markovian city-scale modelling and mitigation of micro-particles from tyres

    Authors: Gunda Obereigner, Roman Overko, Serife Yilmaz, Emanuele Crisostomi, Robert Shorten

    Abstract: The recent uptake in popularity in vehicles with zero tailpipe emissions is a welcome development in the fight against traffic induced airborne pollutants. As vehicle fleets become electrified, and tailpipe emissions become less prevalent, non-tailpipe emissions (from tires and brake disks) will become the dominant source of traffic related emissions, and will in all likelihood become a major conc… ▽ More

    Submitted 27 September, 2021; v1 submitted 1 June, 2021; originally announced July 2021.

    Comments: 24 pages, 11 figures

  21. arXiv:2106.06877  [pdf, other

    q-bio.GN stat.ME

    GPA-Tree: Statistical Approach for Functional-Annotation-Tree-Guided Prioritization of GWAS Results

    Authors: Aastha Khatiwada, Bethany J. Wolf, Ayse Selen Yilmaz, Paula S. Ramos, Maciej Pietrzak, Andrew Lawson, Kelly J. Hunt, Hang J. Kim, Dongjun Chung

    Abstract: Motivation: In spite of great success of genome-wide association studies (GWAS), multiple challenges still remain. First, complex traits are often associated with many single nucleotide polymorphisms (SNPs), each with small or moderate effect sizes. Second, our understanding of the functional mechanisms through which genetic variants are associated with complex traits is still limited. To address… ▽ More

    Submitted 12 June, 2021; originally announced June 2021.

    Comments: 14 pages, 3 figures

  22. Study of a large array to detect ultra high energy tau-neutrino

    Authors: S. Atik Yilmaz, A. Yilmaz, M. Iori, K. Y. Oyulmaz, H. Denizli

    Abstract: The $PeV$ cosmogenic neutrino is still interesting argument. Since cosmogenic neutrinos interact weakly with matter, the detection of their direction will precisely point out the source in the space. In this paper, we show the results of the simulation of tau lepton air showers induced by high energy neutrinos detected by an array of stations designed to use the Earth Skimming method improved by t… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.

    Comments: 14 pages, 5 figures

    Report number: 2105.06874

  23. arXiv:2104.05158  [pdf, other

    cs.DC cs.AI cs.LG cs.PF

    Software-Hardware Co-design for Fast and Scalable Training of Deep Learning Recommendation Models

    Authors: Dheevatsa Mudigere, Yuchen Hao, Jianyu Huang, Zhihao Jia, Andrew Tulloch, Srinivas Sridharan, Xing Liu, Mustafa Ozdal, Jade Nie, Jongsoo Park, Liang Luo, Jie Amy Yang, Leon Gao, Dmytro Ivchenko, Aarti Basant, Yuxi Hu, Jiyan Yang, Ehsan K. Ardestani, Xiaodong Wang, Rakesh Komuravelli, Ching-Hsiang Chu, Serhat Yilmaz, Huayu Li, Jiyuan Qian, Zhuobo Feng , et al. (28 additional authors not shown)

    Abstract: Deep learning recommendation models (DLRMs) are used across many business-critical services at Facebook and are the single largest AI application in terms of infrastructure demand in its data-centers. In this paper we discuss the SW/HW co-designed solution for high-performance distributed training of large-scale DLRMs. We introduce a high-performance scalable software stack based on PyTorch and pa… ▽ More

    Submitted 26 February, 2023; v1 submitted 11 April, 2021; originally announced April 2021.

  24. arXiv:2009.02572  [pdf, other

    cs.LG stat.ML

    PySAD: A Streaming Anomaly Detection Framework in Python

    Authors: Selim F. Yilmaz, Suleyman S. Kozat

    Abstract: PySAD is an open-source python framework for anomaly detection on streaming data. PySAD serves various state-of-the-art methods for streaming anomaly detection. The framework provides a complete set of tools to design anomaly detection experiments ranging from projectors to probability calibrators. PySAD builds upon popular open-source frameworks such as PyOD and scikit-learn. We enforce software… ▽ More

    Submitted 5 September, 2020; originally announced September 2020.

    Comments: 6 pages, 1 figure

  25. arXiv:2008.11573  [pdf, other

    cs.LG cs.CL stat.ML

    Multi-Label Sentiment Analysis on 100 Languages with Dynamic Weighting for Label Imbalance

    Authors: Selim F. Yilmaz, E. Batuhan Kaynak, Aykut Koç, Hamdi Dibeklioğlu, Suleyman S. Kozat

    Abstract: We investigate cross-lingual sentiment analysis, which has attracted significant attention due to its applications in various areas including market research, politics and social sciences. In particular, we introduce a sentiment analysis framework in multi-label setting as it obeys Plutchik wheel of emotions. We introduce a novel dynamic weighting method that balances the contribution from each cl… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: 11 pages, 6 figures

  26. arXiv:2006.08504  [pdf, ps, other

    physics.soc-ph q-bio.PE

    Kemeny-based testing for COVID-19

    Authors: Serife Yilmaz, Ekaterina Dudkina, Michelangelo Bin, Emanuele Crisostomi, Pietro Ferraro, Roderick Murray-Smith, Thomas Parisini, Lewi Stone, Robert Shorten

    Abstract: Testing, tracking and tracing abilities have been identified as pivotal in hel** countries to safely reopen activities after the first wave of the COVID-19 virus. Contact tracing apps give the unprecedented possibility to reconstruct graphs of daily contacts, so the question is who should be tested? As human contact networks are known to exhibit community structure, in this paper we show that th… ▽ More

    Submitted 24 July, 2020; v1 submitted 15 June, 2020; originally announced June 2020.

  27. arXiv:2006.05789  [pdf, other

    cond-mat.mtrl-sci

    Apparent Differences between Single Layer Molybdenum Disulfide Fabricated via Chemical Vapor Deposition and Exfoliation

    Authors: E. Pollmann, L. Madauß, S. Schumacher, U. Kumar, F. Heuvel, C. vom Ende, S. Yilmaz, S. Gündörmüs, M. Schleberger

    Abstract: Innovative applications based on two-dimensional solids require cost-effective fabrication processes resulting in large areas of high quality materials. Chemical vapour deposition is among the most promising methods to fulfill these requirements. However, for 2D materials prepared in this way it is generally assumed that they are of inferior quality in comparison to the exfoliated 2D materials com… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

  28. arXiv:2005.09402  [pdf, ps, other

    math.NT cs.CR cs.IT

    The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace

    Authors: Yağmur Çakıroğlu, Oğuz Yayla, Emrah Sercan Yılmaz

    Abstract: We present the formula for the number of monic irreducible polynomials of degree $n$ over the finite field $\mathbb F_q$ where the coefficients of $x^{n-1}$ and $x$ vanish for $n\ge3$. In particular, we give a relation between rational points of algebraic curves over finite fields and the number of elements $a\in\mathbb F_{q^n}$ for which Trace$(a)=0$ and Trace$(a^{-1})=0$. Besides, we apply the f… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 pages. Comments are welcome

    MSC Class: 11T06; 11G20; 94A55

  29. arXiv:2005.08948  [pdf, other

    cs.LG stat.ML

    Achieving Online Regression Performance of LSTMs with Simple RNNs

    Authors: N. Mert Vural, Fatih Ilhan, Selim F. Yilmaz, Salih Ergüt, Suleyman S. Kozat

    Abstract: Recurrent Neural Networks (RNNs) are widely used for online regression due to their ability to generalize nonlinear temporal dependencies. As an RNN model, Long-Short-Term-Memory Networks (LSTMs) are commonly preferred in practice, as these networks are capable of learning long-term dependencies while avoiding the vanishing gradient problem. However, due to their large number of parameters, traini… ▽ More

    Submitted 31 May, 2021; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2003.03601

  30. arXiv:2005.05865  [pdf, other

    cs.LG stat.ML

    Unsupervised Anomaly Detection via Deep Metric Learning with End-to-End Optimization

    Authors: Selim F. Yilmaz, Suleyman S. Kozat

    Abstract: We investigate unsupervised anomaly detection for high-dimensional data and introduce a deep metric learning (DML) based framework. In particular, we learn a distance metric through a deep neural network. Through this metric, we project the data into the metric space that better separates the anomalies from the normal data and reduces the effect of the curse of dimensionality for high-dimensional… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 11 pages, 3 figures

  31. arXiv:2003.09518  [pdf, other

    cs.DC

    Deep Learning Training in Facebook Data Centers: Design of Scale-up and Scale-out Systems

    Authors: Maxim Naumov, John Kim, Dheevatsa Mudigere, Srinivas Sridharan, Xiaodong Wang, Whitney Zhao, Serhat Yilmaz, Changkyu Kim, Hector Yuen, Mustafa Ozdal, Krishnakumar Nair, Isabel Gao, Bor-Yiing Su, Jiyan Yang, Mikhail Smelyanskiy

    Abstract: Large-scale training is important to ensure high performance and accuracy of machine-learning models. At Facebook we use many different models, including computer vision, video and language models. However, in this paper we focus on the deep learning recommendation models (DLRMs), which are responsible for more than 50% of the training demand in our data centers. Recommendation models present uniq… ▽ More

    Submitted 18 August, 2020; v1 submitted 20 March, 2020; originally announced March 2020.

    Comments: 10 pages, 14 figures; adjusted Fig. 10, added reference; fixed typos

    MSC Class: 68T05; 68M10 ACM Class: H.3.3; I.2.6; C.2.1

  32. arXiv:2003.03601   

    cs.LG stat.ML

    RNN-based Online Learning: An Efficient First-Order Optimization Algorithm with a Convergence Guarantee

    Authors: N. Mert Vural, Selim F. Yilmaz, Fatih Ilhan, Suleyman S. Kozat

    Abstract: We investigate online nonlinear regression with continually running recurrent neural network networks (RNNs), i.e., RNN-based online learning. For RNN-based online learning, we introduce an efficient first-order training algorithm that theoretically guarantees to converge to the optimum network parameters. Our algorithm is truly online such that it does not make any assumption on the learning envi… ▽ More

    Submitted 31 May, 2021; v1 submitted 7 March, 2020; originally announced March 2020.

    Comments: This paper was an early draft of the presented results. We have written and published another paper (arXiv:2005.08948) where we have improved the material in this paper. The published paper covers most of the material presented in this paper as well. Therefore, we remove this paper from Arxiv and kindly refer the interested readers to arXiv:2005.08948

  33. arXiv:2001.04764  [pdf, ps, other

    math.AG

    The Number of Zeros of Quadratic Forms with Two Terms

    Authors: Emrah Seran Yılmaz

    Abstract: In this paper, we will interest in finding the number of zeros of the quadratic forms over finite fields. We will apply the tool for finding the number of rational points of supersingular curves in [6]. We will give some more tools for Artin-Schreier curves related with quadratic form. We will especially interest in the (supersingular) Artin-Schreier curve $y^q-y=x^{q^b+1}-x^{q^a+1}$.

    Submitted 14 January, 2020; originally announced January 2020.

  34. arXiv:1911.09899  [pdf

    cs.CY cs.SI

    Knowledge Network and a Knowledge Network Example

    Authors: Hilmi Bahadır Temur, Ahmet Serdar Yılmaz, Mehmet Tekerek

    Abstract: Knowledge networks can be defined as social networks that enable the transfer of the knowledge, which is defined as the intellectual product formed as a result of the work of human intelligence, to be transferred to any other means of communication. A knowledge network represents a large number of people, resources and relationships between them, to create the highest value, primarily to accumulat… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 6 Pages, in Turkish language, 4 figures, Conference Proceeding

    Journal ref: Proceedings of International Symposium on Advanced Engineering Technologies 2019, 1, 1350-1355 (2019)

  35. arXiv:1911.06610  [pdf

    cs.RO cs.NI

    Design of Internet of Things Based Controller for Direct Current Motors

    Authors: Zeynep Özdemir, Mehmet Tekerek, Ahmet Serdar Yılmaz

    Abstract: It is known that internet have been widespread in many areas of life and enabled machines to communicate each other. The terms of Internet of Things (IoT) has emerged as a result of networks consist of machines and equipment that work independent of operator and communicate each other. Sensors, embedded systems, communication technologies and data storage systems like clouds create wide area netwo… ▽ More

    Submitted 21 October, 2019; originally announced November 2019.

    Comments: in Turkish language. International Symposium on Advanced Engineering Technologies 2019

  36. arXiv:1812.10558  [pdf, other

    cs.CV

    Deception Detection by 2D-to-3D Face Reconstruction from Videos

    Authors: Minh Ngô, Burak Mandira, Selim Fırat Yılmaz, Ward Heij, Sezer Karaoglu, Henri Bouma, Hamdi Dibeklioglu, Theo Gevers

    Abstract: Lies and deception are common phenomena in society, both in our private and professional lives. However, humans are notoriously bad at accurate deception detection. Based on the literature, human accuracy of distinguishing between lies and truthful statements is 54% on average, in other words it is slightly better than a random guess. While people do not much care about this issue, in high-stakes… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 9 pages, 3 figures

  37. arXiv:1807.04782  [pdf, ps, other

    math.AG

    Number of Rational points of the Generalized Hermitian Curves over $\mathbb F_{p^n}$

    Authors: Emrah Sercan Yılmaz

    Abstract: In this paper we consider the curves $H_{k,t}^{(p)} : y^{p^k}+y=x^{p^{kt}+1}$ over $\mathbb F_p$ and and find an exact formula for the number of $\mathbb F_{p^n}$-rational points on $H_{k,t}^{(p)}$ for all integers $n\ge 1$. We also give the condition when the $L$-polynomial of a Hermitian curve divides the $L$-polynomial of another over $\mathbb F_p$.

    Submitted 12 July, 2018; originally announced July 2018.

  38. arXiv:1807.04092  [pdf, ps, other

    math.AG

    Explicit Maximal and Minimal Curves of Artin-Schreier Type from Quadratic Forms

    Authors: Daniele Bartoli, Luciane Quoos, Zülfükar Saygı, Emrah Sercan Yılmaz

    Abstract: In this work we present explicit examples of maximal and minimal curves over finite fields in odd characteristic. The curves are of Artin-Schreier type and the construction is closely related to quadratic forms from $\mathbb{F}_{q^n}$ to $\mathbb{F}_q$.

    Submitted 11 July, 2018; originally announced July 2018.

  39. arXiv:1803.03511  [pdf, ps, other

    math.AG

    Divisibility of L-Polynomials for a Family of Artin-Schreier Curves

    Authors: Gary McGuire, Emrah Sercan Yılmaz

    Abstract: In this paper we consider the curves $C_k^{(p,a)} : y^p-y=x^{p^k+1}+ax$ defined over $\mathbb F_p$ and give a positive answer to a conjecture about a divisibility condition on $L$-polynomials of the curves $C_k^{(p,a)}$. Our proof involves finding an exact formula for the number of $\mathbb F_{p^n}$-rational points on $C_k^{(p,a)}$ for all $n$, and uses a result we proved elsewhere about the numbe… ▽ More

    Submitted 24 May, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

  40. arXiv:1803.03509  [pdf, ps, other

    math.AG

    On the Zeta Functions of Supersingular Curves

    Authors: Gary McGuire, Emrah Sercan Yılmaz

    Abstract: In general, the L-polynomial of a curve of genus $g$ is determined by $g$ coefficients. We show that the L-polynomial of a supersingular curve of genus $g$ is determined by fewer than $g$ coefficients.

    Submitted 15 June, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

  41. arXiv:1802.05897  [pdf, ps, other

    math.NT

    The generalized bi-periodic Fibonacci quaternions and octonions

    Authors: Elif Tan, Murat Şahin, Semih Yılmaz

    Abstract: In this paper, we present a further generalization of the bi- periodic Fibonacci quaternions and octonions. We give the generating function, the Binet formula, and some basic properties of these quaternions and octonions. The results of this paper not only give a generalization of the bi-periodic Fibonacci quaternions and octonions, but also include new results such as the matrix representation an… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.

  42. arXiv:1712.05763  [pdf, ps, other

    math.NT math.AC math.AG

    Differential operators and hyperelliptic curves over finite fields

    Authors: Iván Blanco-Chacón, Alberto F. Boix, Stiofáin Fordham, Emrah Sercan Yilmaz

    Abstract: Boix, De Stefani and Vanzo have characterized ordinary/supersingular elliptic curves over $\mathbb{F}_p$ in terms of the level of the defining cubic homogenous polynomial. We extend their study to arbitrary genus, in particular we prove that every ordinary hyperelliptic curve $\mathcal{C}$ of genus $g\geq 2$ has level $2$. We provide a good number of examples and raise a conjecture.

    Submitted 15 January, 2018; v1 submitted 15 December, 2017; originally announced December 2017.

    Comments: 14 pages, comments are welcome. This version: errata corrected, main results unchanged

    MSC Class: 13A35 (Primary); 13N10; 14B05 (Secondary)

    Journal ref: Finite Fields and their Applications, volume 51 (2018), 351-370

  43. arXiv:1609.02314  [pdf, ps, other

    math.AG

    The Number of Irreducible Polynomials with the First Two Coefficients Fixed over Finite Fields of Odd Characteristic

    Authors: Gary McGuire, Emrah Sercan Yılmaz

    Abstract: In this paper we give a different proof of Kuz'min's result on the number of irreducible polynomials with the first two coefficients fixed. Our technique is to relate the question to the number of points on a curve, and to calculate the L-polynomial of the curve.

    Submitted 6 September, 2017; v1 submitted 8 September, 2016; originally announced September 2016.

    Comments: arXiv admin note: text overlap with arXiv:1605.07229

  44. arXiv:1608.08158  [pdf, ps, other

    math.AG

    Slope Estimates for Generalized Artin-Schreier Curves

    Authors: Emrah Sercan Yılmaz, Gary McGuire

    Abstract: We provide first slope estimates of the Newton polygon of generalized Artin-Schreier curves, which are proved using the action of Frobenius and Verschiebung on cohomology. We provide a number of applications such as an improved Hasse-Weil bound for this class of curves.

    Submitted 23 March, 2018; v1 submitted 29 August, 2016; originally announced August 2016.

  45. arXiv:1605.07229  [pdf, ps, other

    math.NT

    Fibre Products of Supersingular Curves and the Enumeration of Irreducible Polynomials with Prescribed Coefficients

    Authors: Omran Ahmadi, Faruk Gologlu, Robert Granger, Gary McGuire, Emrah Sercan Yilmaz

    Abstract: For any positive integers $n\geq 3, r\geq 1$ we present formulae for the number of irreducible polynomials of degree $n$ over the finite field $\mathbb{F}_{2^r}$ where the coefficients of $x^{n-1}$, $x^{n-2}$ and $x^{n-3}$ are zero. Our proofs involve counting the number of points on certain algebraic curves over finite fields, a technique which arose from Fourier-analysing the known formulae for… ▽ More

    Submitted 9 August, 2016; v1 submitted 23 May, 2016; originally announced May 2016.

    Comments: 29 pages. Final version. To appear in Finite Fields and Their Applications

    MSC Class: 12Y05; 14H99

  46. Reduced quantum dynamics with initial system-environment correlations characterized by pure Markov states

    Authors: A. Türkmen, A. Verçin, S. Yılmaz

    Abstract: Any tripartite state which saturates the strong subadditivity relation for the quantum entropy is defined as the Markov state.A tripartite pure state describing an open system, its environment and their purifying system isa pure Markov state iff the bipartite marginal state of purifying system and environment is a product state. It has been shown that as long as the purification of the input syste… ▽ More

    Submitted 8 August, 2016; v1 submitted 16 March, 2016; originally announced March 2016.

    Comments: 9 pages, Accepted version

  47. An overview of visible light communication systems

    Authors: Taner Cevik, Serdar Yilmaz

    Abstract: Visible Light Communication (VLC) has gained great interest in the last decade due to the rapid developments in Light Emitting Diodes (LEDs) fabrication. Efficiency, durability and long life span of LEDs make them a promising residential lighting equipment as well as an alternative cheap and fast data transfer equipment. Appliance of visual light in data communication by means of LEDs has been den… ▽ More

    Submitted 11 December, 2015; originally announced December 2015.

  48. arXiv:1304.0806   

    cs.AI

    IFP-Intuitionistic fuzzy soft set theory and its applications

    Authors: Faruk Karaaslan, Naim Cagman, Saban Yilmaz

    Abstract: In this work, we present definition of intuitionistic fuzzy parameterized (IFP) intuitionistic fuzzy soft set and its operations. Then we define IFP-aggregation operator to form IFP-intuitionistic fuzzy soft-decision-making method which allows constructing more efficient decision processes.

    Submitted 17 April, 2016; v1 submitted 2 April, 2013; originally announced April 2013.

    Comments: This paper has been withdrawn by the author due to a crucial errors in the notation and some problems in the algorithm

    MSC Class: 62C86 (Decision theory and fuzziness)

  49. Electromagnetic response of a highly granular hadronic calorimeter

    Authors: C. Adloff, J. Blaha, J. -J. Blaising, C. Drancourt, A. Espargilière, R. Gaglione, N. Geffroy, Y. Karyotakis, J. Prast, G. Vouters, K. Francis, J. Repond, J. Smith, L. Xia, E. Baldolemar, J. Li, S. T. Park, M. Sosebee, A. P. White, J. Yu, Y. Mikami, N. K. Watson T. Goto, G. Mavromanolakis, M. A. Thomson, D. R. Ward W. Yan , et al. (142 additional authors not shown)

    Abstract: The CALICE collaboration is studying the design of high performance electromagnetic and hadronic calorimeters for future International Linear Collider detectors. For the hadronic calorimeter, one option is a highly granular sampling calorimeter with steel as absorber and scintillator layers as active material. High granularity is obtained by segmenting the scintillator into small tiles individuall… ▽ More

    Submitted 8 June, 2011; v1 submitted 20 December, 2010; originally announced December 2010.

    Report number: DESY 10-241

    Journal ref: JINST 6 (2011) P04003

  50. arXiv:1009.0181  [pdf, other

    cond-mat.mes-hall

    Observation of heavy-hole hyperfine interaction in quantum dots

    Authors: P. Fallahi, S. T. Yilmaz, A. Imamoglu

    Abstract: We measure the strength and the sign of hyperfine interaction of a heavy-hole with nuclear spins in single self-assembled quantum dots. Our experiments utilize the locking of a quantum dot resonance to an incident laser frequency to generate nuclear spin polarization. By monitoring the resulting Overhauser shift of optical transitions that are split either by electron or exciton Zeeman energy with… ▽ More

    Submitted 1 September, 2010; originally announced September 2010.