-
Towards quantum computing for clinical trial design and optimization: A perspective on new opportunities and challenges
Authors:
Hakan Doga,
M. Emre Sahin,
Joao Bettencourt-Silva,
Anh Pham,
Eunyoung Kim,
Alan Andress,
Sudhir Saxena,
Aritra Bose,
Laxmi Parida,
Jan Lukas Robertus,
Hideaki Kawaguchi,
Radwa Soliman,
Daniel Blankenberg
Abstract:
Clinical trials are pivotal in the drug discovery process to determine the safety and efficacy of a drug candidate. The high failure rates of these trials are attributed to deficiencies in clinical model development and protocol design. Improvements in the clinical drug design process could therefore yield significant benefits for all stakeholders involved. This paper examines the current challeng…
▽ More
Clinical trials are pivotal in the drug discovery process to determine the safety and efficacy of a drug candidate. The high failure rates of these trials are attributed to deficiencies in clinical model development and protocol design. Improvements in the clinical drug design process could therefore yield significant benefits for all stakeholders involved. This paper examines the current challenges faced in clinical trial design and optimization, reviews established classical computational approaches, and introduces quantum algorithms aimed at enhancing these processes. Specifically, the focus is on three critical aspects: clinical trial simulations, site selection, and cohort identification. This study aims to provide a comprehensive framework that leverages quantum computing to innovate and refine the efficiency and effectiveness of clinical trials.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Molecular Arithmetic Coding (MAC) for Internet of Bio-Nano Things (IoBNT)
Authors:
Melih Şahin,
Beyza E. Ortlek,
Ozgur B. Akan
Abstract:
Molecular Communication (MC) has emerged as a promising paradigm employing molecules to transfer information at the nano-scale. Unlike MC channel coding, MC source coding has remained mostly an unexplored area of research. In a recent paper, prefix source coding was introduced into the field, through an MC-adapted version of the Huffman Coding. In the context of MC source coding, this paper propos…
▽ More
Molecular Communication (MC) has emerged as a promising paradigm employing molecules to transfer information at the nano-scale. Unlike MC channel coding, MC source coding has remained mostly an unexplored area of research. In a recent paper, prefix source coding was introduced into the field, through an MC-adapted version of the Huffman Coding. In the context of MC source coding, this paper proposes the Molecular Arithmetic Coding (MAC) whose algorithmic implementation and code-structure is non-arbitrarily different than that of the widely-known classical arithmetic coding. MAC is designed to mitigate Inter-Symbol Interference (ISI) for alphabets with known symbol probabilities through, in a highly efficient way, avoiding consecutive 1-bits. However, due to bit precision limitations any arithmetic coding method faces, without any assumption made on the structure of the symbol alphabet, unique-decodability of MAC is not guaranteed. Accordingly, a uniquely-decodable new coding scheme named Molecular Arithmetic with Prefix Coding (MAPC) is also introduced. Across multiple alphabets, we show that MAPC provides a better compression performance compared to the optimal MC-adapted prefix coding. Simulation results of an exemplary alphabet demonstrates the superior symbol and word error rate performance of MAPC compared to the optimal MC-adapted prefix coding and to the uncoded BCSK schemes.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
An Integrated Imitation and Reinforcement Learning Methodology for Robust Agile Aircraft Control with Limited Pilot Demonstration Data
Authors:
Gulay Goktas Sever,
Umut Demir,
Abdullah Sadik Satir,
Mustafa Cagatay Sahin,
Nazim Kemal Ure
Abstract:
In this paper, we present a methodology for constructing data-driven maneuver generation models for agile aircraft that can generalize across a wide range of trim conditions and aircraft model parameters. Maneuver generation models play a crucial role in the testing and evaluation of aircraft prototypes, providing insights into the maneuverability and agility of the aircraft. However, constructing…
▽ More
In this paper, we present a methodology for constructing data-driven maneuver generation models for agile aircraft that can generalize across a wide range of trim conditions and aircraft model parameters. Maneuver generation models play a crucial role in the testing and evaluation of aircraft prototypes, providing insights into the maneuverability and agility of the aircraft. However, constructing the models typically requires extensive amounts of real pilot data, which can be time-consuming and costly to obtain. Moreover, models built with limited data often struggle to generalize beyond the specific flight conditions covered in the original dataset. To address these challenges, we propose a hybrid architecture that leverages a simulation model, referred to as the source model. This open-source agile aircraft simulator shares similar dynamics with the target aircraft and allows us to generate unlimited data for building a proxy maneuver generation model. We then fine-tune this model to the target aircraft using a limited amount of real pilot data. Our approach combines techniques from imitation learning, transfer learning, and reinforcement learning to achieve this objective. To validate our methodology, we utilize real agile pilot data provided by Turkish Aerospace Industries (TAI). By employing the F-16 as the source model, we demonstrate that it is possible to construct a maneuver generation model that generalizes across various trim conditions and aircraft parameters without requiring any additional real pilot data. Our results showcase the effectiveness of our approach in develo** robust and adaptable models for agile aircraft.
△ Less
Submitted 27 December, 2023;
originally announced January 2024.
-
Efficient Parameter Optimisation for Quantum Kernel Alignment: A Sub-sampling Approach in Variational Training
Authors:
M. Emre Sahin,
Benjamin C. B. Symons,
Pushpak Pati,
Fayyaz Minhas,
Declan Millar,
Maria Gabrani,
Jan Lukas Robertus,
Stefano Mensa
Abstract:
Quantum machine learning with quantum kernels for classification problems is a growing area of research. Recently, quantum kernel alignment techniques that parameterise the kernel have been developed, allowing the kernel to be trained and therefore aligned with a specific dataset. While quantum kernel alignment is a promising technique, it has been hampered by considerable training costs because t…
▽ More
Quantum machine learning with quantum kernels for classification problems is a growing area of research. Recently, quantum kernel alignment techniques that parameterise the kernel have been developed, allowing the kernel to be trained and therefore aligned with a specific dataset. While quantum kernel alignment is a promising technique, it has been hampered by considerable training costs because the full kernel matrix must be constructed at every training iteration. Addressing this challenge, we introduce a novel method that seeks to balance efficiency and performance. We present a sub-sampling training approach that uses a subset of the kernel matrix at each training step, thereby reducing the overall computational cost of the training. In this work, we apply the sub-sampling method to synthetic datasets and a real-world breast cancer dataset and demonstrate considerable reductions in the number of circuits required to train the quantum kernel while maintaining classification accuracy.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
OFDM-RSMA: Robust Transmission under Inter-Carrier Interference
Authors:
Mehmet Mert Sahin,
Onur Dizdar,
Bruno Clerckx,
Huseyin Arslan
Abstract:
Rate-splitting multiple access (RSMA) is a multiple access scheme to mitigate the effects of the multi-user interference (MUI) in multi-antenna systems. In this study, we leverage the interference management capabilities of RSMA to tackle the issue of inter-carrier interference (ICI) in orthogonal frequency division multiplexing (OFDM) waveform. We formulate a sum-rate maximization problem to find…
▽ More
Rate-splitting multiple access (RSMA) is a multiple access scheme to mitigate the effects of the multi-user interference (MUI) in multi-antenna systems. In this study, we leverage the interference management capabilities of RSMA to tackle the issue of inter-carrier interference (ICI) in orthogonal frequency division multiplexing (OFDM) waveform. We formulate a sum-rate maximization problem to find the optimal subcarrier and power allocation for downlink transmission in a two-user system using RSMA and OFDM. A weighted minimum mean-square error (WMMSE)-based algorithm is proposed to obtain a solution for the formulated non-convex problem. We show that the marriage of rate-splitting (RS) with OFDM provides complementary strengths to cope with peculiar characteristic of wireless medium and its performance-limiting challenges including inter-symbol interference (ISI), MUI, ICI, and inter-numerology interference (INI). The sum-rate performance of the proposed OFDM-RSMA scheme is numerically compared with that of conventional orthogonal frequency division multiple access (OFDMA) and OFDM-non-orthogonal multiple access (NOMA). It is shown that the proposed OFDM-RSMA outperforms OFDM-NOMA and OFDMA in diverse propagation channel conditions owing to its flexible structure and robust interference management capabilities.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Incorporating Human Translator Style into English-Turkish Literary Machine Translation
Authors:
Zeynep Yirmibeşoğlu,
Olgun Dursun,
Harun Dallı,
Mehmet Şahin,
Ena Hodzik,
Sabri Gürses,
Tunga Güngör
Abstract:
Although machine translation systems are mostly designed to serve in the general domain, there is a growing tendency to adapt these systems to other domains like literary translation. In this paper, we focus on English-Turkish literary translation and develop machine translation models that take into account the stylistic features of translators. We fine-tune a pre-trained machine translation mode…
▽ More
Although machine translation systems are mostly designed to serve in the general domain, there is a growing tendency to adapt these systems to other domains like literary translation. In this paper, we focus on English-Turkish literary translation and develop machine translation models that take into account the stylistic features of translators. We fine-tune a pre-trained machine translation model by the manually-aligned works of a particular translator. We make a detailed analysis of the effects of manual and automatic alignments, data augmentation methods, and corpus size on the translations. We propose an approach based on stylistic features to evaluate the style of a translator in the output translations. We show that the human translator style can be highly recreated in the target machine translations by adapting the models to the style of the translator.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
The Hitchhiker's Guide to Malicious Third-Party Dependencies
Authors:
Piergiorgio Ladisa,
Merve Sahin,
Serena Elisa Ponta,
Marco Rosa,
Matias Martinez,
Olivier Barais
Abstract:
The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., npm, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, whereas package managers automatically handle dependency resolution and package installation on the client side. These…
▽ More
The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., npm, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, whereas package managers automatically handle dependency resolution and package installation on the client side. These mechanisms enhance software modularization and accelerate implementation. However, they have become a target for malicious actors seeking to propagate malware on a large scale.
In this work, we show how attackers can leverage capabilities of popular package managers and languages to achieve arbitrary code execution on victim machines, thereby realizing open-source software supply chain attacks. Based on the analysis of 7 ecosystems, we identify 3 install-time and 4 runtime techniques, and we provide recommendations describing how to reduce the risk when consuming third-party dependencies. We will provide proof-of-concepts that demonstrate the identified techniques. Furthermore, we describe evasion strategies employed by attackers to circumvent detection mechanisms.
△ Less
Submitted 6 October, 2023; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Communication-Efficient Zeroth-Order Distributed Online Optimization: Algorithm, Theory, and Applications
Authors:
Ege C. Kaya,
M. Berk Sahin,
Abolfazl Hashemi
Abstract:
This paper focuses on a multi-agent zeroth-order online optimization problem in a federated learning setting for target tracking. The agents only sense their current distances to their targets and aim to maintain a minimum safe distance from each other to prevent collisions. The coordination among the agents and dissemination of collision-prevention information is managed by a central server using…
▽ More
This paper focuses on a multi-agent zeroth-order online optimization problem in a federated learning setting for target tracking. The agents only sense their current distances to their targets and aim to maintain a minimum safe distance from each other to prevent collisions. The coordination among the agents and dissemination of collision-prevention information is managed by a central server using the federated learning paradigm. The proposed formulation leads to an instance of distributed online nonconvex optimization problem that is solved via a group of communication-constrained agents. To deal with the communication limitations of the agents, an error feedback-based compression scheme is utilized for agent-to-server communication. The proposed algorithm is analyzed theoretically for the general class of distributed online nonconvex optimization problems. We provide non-asymptotic convergence rates that show the dominant term is independent of the characteristics of the compression scheme. Our theoretical results feature a new approach that employs significantly more relaxed assumptions in comparison to standard literature. The performance of the proposed solution is further analyzed numerically in terms of tracking errors and collisions between agents in two relevant applications.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA
Authors:
Mehmet Mert Sahin,
Onur Dizdar,
Bruno Clerckx,
Huseyin Arslan
Abstract:
Rate-splitting multiple access (RSMA) is a multiple access technique generalizing conventional techniques, such as, space-division multiple access (SDMA), non-orthogonal multiple access (NOMA), and physical layer multi-casting, which aims to address multi-user interference (MUI) in multiple-input multiple-output (MIMO) systems. In this study, we leverage the interference management capabilities of…
▽ More
Rate-splitting multiple access (RSMA) is a multiple access technique generalizing conventional techniques, such as, space-division multiple access (SDMA), non-orthogonal multiple access (NOMA), and physical layer multi-casting, which aims to address multi-user interference (MUI) in multiple-input multiple-output (MIMO) systems. In this study, we leverage the interference management capabilities of RSMA to tackle the issue of inter-carrier interference (ICI) in orthogonal frequency division multiplexing (OFDM) waveform. We formulate a problem to find the optimal subcarrier and power allocation for downlink transmission in a two-user system using RSMA and OFDM and propose a weighted minimum mean-square error (WMMSE)-based algorithm to obtain a solution. The sum-rate performance of the proposed OFDM-RSMA scheme is compared with that of conventional orthogonal frequency division multiple access (OFDMA) and OFDM-NOMA by numerical results. It is shown that the proposed OFDM-RSMA outperforms OFDM-NOMA and OFDMA under ICI in diverse propagation channel conditions owing to its flexible structure and robust interference management capabilities.
△ Less
Submitted 24 September, 2023; v1 submitted 25 March, 2023;
originally announced March 2023.
-
Algebraic Invariants of Codes on Weighted Projective Planes
Authors:
Yağmur Çakıroğlu,
Mesut Şahin
Abstract:
Weighted projective spaces are natural generalizations of projective spaces with a rich structure. Projective Reed-Muller codes are error-correcting codes that played an important role in reliably transmitting information on digital communication channels. In this case study, we explore the power of commutative and homological algebraic techniques to study weighted projective Reed-Muller (WPRM) co…
▽ More
Weighted projective spaces are natural generalizations of projective spaces with a rich structure. Projective Reed-Muller codes are error-correcting codes that played an important role in reliably transmitting information on digital communication channels. In this case study, we explore the power of commutative and homological algebraic techniques to study weighted projective Reed-Muller (WPRM) codes on weighted projective spaces of the form $\mathbb{P}(1,1,a)$. We compute minimal free resolutions and thereby obtain Hilbert series for the vanishing ideal of the $\mathbb{F}_q$-rational points, and compute main parameters for these codes.
△ Less
Submitted 3 November, 2023; v1 submitted 12 January, 2023;
originally announced January 2023.
-
Codes on Subgroups of Weighted Projective Tori
Authors:
Mesut Şahin,
Oğuz Yayla
Abstract:
We obtain certain algebraic invariants relevant to study codes on subgroups of weighted projective tori inside an $n$-dimensional weighted projective space. As application, we compute all the main parameters of generalized toric codes on these subgroups of tori lying inside a weighted projective plane of the form $\Pp(1,1,a)$.
We obtain certain algebraic invariants relevant to study codes on subgroups of weighted projective tori inside an $n$-dimensional weighted projective space. As application, we compute all the main parameters of generalized toric codes on these subgroups of tori lying inside a weighted projective plane of the form $\Pp(1,1,a)$.
△ Less
Submitted 3 November, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
Sound and Complete Verification of Polynomial Networks
Authors:
Elias Abad Rocamora,
Mehmet Fatih Sahin,
Fanghui Liu,
Grigorios G Chrysos,
Volkan Cevher
Abstract:
Polynomial Networks (PNs) have demonstrated promising performance on face and image recognition recently. However, robustness of PNs is unclear and thus obtaining certificates becomes imperative for enabling their adoption in real-world applications. Existing verification algorithms on ReLU neural networks (NNs) based on classical branch and bound (BaB) techniques cannot be trivially applied to PN…
▽ More
Polynomial Networks (PNs) have demonstrated promising performance on face and image recognition recently. However, robustness of PNs is unclear and thus obtaining certificates becomes imperative for enabling their adoption in real-world applications. Existing verification algorithms on ReLU neural networks (NNs) based on classical branch and bound (BaB) techniques cannot be trivially applied to PN verification. In this work, we devise a new bounding method, equipped with BaB for global convergence guarantees, called Verification of Polynomial Networks or VPN for short. One key insight is that we obtain much tighter bounds than the interval bound propagation (IBP) and DeepT-Fast [Bonaert et al., 2021] baselines. This enables sound and complete PN verification with empirical validation on MNIST, CIFAR10 and STL10 datasets. We believe our method has its own interest to NN verification. The source code is publicly available at https://github.com/megaelius/PNVerification.
△ Less
Submitted 22 October, 2022; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Computing Vanishing Ideals for Toric Codes
Authors:
Mesut Şahin
Abstract:
Motivated by applications to the theory of error-correcting codes, we give an algorithmic method for computing a generating set for the ideal generated by $β$-graded polynomials vanishing on a subset of a simplicial complete toric variety $X$ over a finite field $\mathbb{F}_q$, parameterized by rational functions, where $β$ is a $d\times r$ matrix whose columns generate a subsemigroup…
▽ More
Motivated by applications to the theory of error-correcting codes, we give an algorithmic method for computing a generating set for the ideal generated by $β$-graded polynomials vanishing on a subset of a simplicial complete toric variety $X$ over a finite field $\mathbb{F}_q$, parameterized by rational functions, where $β$ is a $d\times r$ matrix whose columns generate a subsemigroup $\mathbb{N}β$ of $\mathbb{N}^d$. We also give a method for computing the vanishing ideal of the set of $\mathbb{F}_q$-rational points of $X$. When $β=[w_1 \cdots w_r]$ is a row matrix corresponding to a numerical semigroup $\mathbb{N}β=\langle w_1,\dots,w_r \rangle$, $X$ is a weighted projective space and generators of its vanishing ideal is given using generators of defining (toric) ideals of numerical semigroup rings corresponding to semigroups generated by subsets of $\{w_1,\dots,w_r\}$.
△ Less
Submitted 3 July, 2022;
originally announced July 2022.
-
Rational points of lattice ideals on a toric variety and toric codes
Authors:
Mesut Şahin
Abstract:
We show that the number of rational points of a subgroup inside a toric variety over a finite field defined by a homogeneous lattice ideal can be computed via Smith normal form of the matrix whose columns constitute a basis of the lattice. This generalizes and yields a concise toric geometric proof of the same fact proven purely algebraically by Lopez and Villarreal for the case of a projective sp…
▽ More
We show that the number of rational points of a subgroup inside a toric variety over a finite field defined by a homogeneous lattice ideal can be computed via Smith normal form of the matrix whose columns constitute a basis of the lattice. This generalizes and yields a concise toric geometric proof of the same fact proven purely algebraically by Lopez and Villarreal for the case of a projective space and a standard homogeneous lattice ideal of dimension one. We also prove a Nullstellensatz type theorem over a finite field establishing a one to one correspondence between subgroups of the dense split torus and certain homogeneous lattice ideals. As application, we compute the main parameters of generalized toric codes on subgroups of the torus of Hirzebruch surfaces, generalizing the existing literature.
△ Less
Submitted 3 May, 2023; v1 submitted 10 May, 2021;
originally announced May 2021.
-
Families of sequences with good family complexity and cross-correlation measure
Authors:
Kenan Doğan,
Murat Şahin,
Oğuz Yayla
Abstract:
In this paper we study pseudorandomness of a family of sequences in terms of two measures, the family complexity ($f$-complexity) and the cross-correlation measure of order $\ell$. We consider sequences not only on binary alphabet but also on $k$-symbols ($k$-ary) alphabet. We first generalize some known methods on construction of the family of binary pseudorandom sequences. We prove a bound on th…
▽ More
In this paper we study pseudorandomness of a family of sequences in terms of two measures, the family complexity ($f$-complexity) and the cross-correlation measure of order $\ell$. We consider sequences not only on binary alphabet but also on $k$-symbols ($k$-ary) alphabet. We first generalize some known methods on construction of the family of binary pseudorandom sequences. We prove a bound on the $f$-complexity of a large family of binary sequences of Legendre-symbols of certain irreducible polynomials. We show that this family as well as its dual family have both a large family complexity and a small cross-correlation measure up to a rather large order. Next, we present another family of binary sequences having high $f$-complexity and low cross-correlation measure. Then we extend the results to the family of sequences on $k$-symbols alphabet.
△ Less
Submitted 7 May, 2024; v1 submitted 28 April, 2020;
originally announced April 2020.
-
Let's be Honest: An Optimal No-Regret Framework for Zero-Sum Games
Authors:
Ehsan Asadi Kangarshahi,
Ya-** Hsieh,
Mehmet Fatih Sahin,
Volkan Cevher
Abstract:
We revisit the problem of solving two-player zero-sum games in the decentralized setting. We propose a simple algorithmic framework that simultaneously achieves the best rates for honest regret as well as adversarial regret, and in addition resolves the open problem of removing the logarithmic terms in convergence to the value of the game. We achieve this goal in three steps. First, we provide a n…
▽ More
We revisit the problem of solving two-player zero-sum games in the decentralized setting. We propose a simple algorithmic framework that simultaneously achieves the best rates for honest regret as well as adversarial regret, and in addition resolves the open problem of removing the logarithmic terms in convergence to the value of the game. We achieve this goal in three steps. First, we provide a novel analysis of the optimistic mirror descent (OMD), showing that it can be modified to guarantee fast convergence for both honest regret and value of the game, when the players are playing collaboratively. Second, we propose a new algorithm, dubbed as robust optimistic mirror descent (ROMD), which attains optimal adversarial regret without knowing the time horizon beforehand. Finally, we propose a simple signaling scheme, which enables us to bridge OMD and ROMD to achieve the best of both worlds. Numerical examples are presented to support our theoretical claims and show that our non-adaptive ROMD algorithm can be competitive to OMD with adaptive step-size selection.
△ Less
Submitted 6 June, 2018; v1 submitted 12 February, 2018;
originally announced February 2018.
-
Toric Codes and Lattice Ideals
Authors:
Mesut Şahin
Abstract:
Let $X$ be a complete simplicial toric variety over a finite field $\mathbb{F}_q$ with homogeneous coordinate ring $S=\mathbb{F}_q[x_1,\dots,x_r]$ and split torus $T_X\cong (\mathbb{F}^*_q)^n$. We prove that vanishing ideal of a subset $Y$ of the torus $T_X$ is a lattice ideal if and only if $Y$ is a subgroup. We show that these subgroups are exactly those subsets that are parameterized by Laurent…
▽ More
Let $X$ be a complete simplicial toric variety over a finite field $\mathbb{F}_q$ with homogeneous coordinate ring $S=\mathbb{F}_q[x_1,\dots,x_r]$ and split torus $T_X\cong (\mathbb{F}^*_q)^n$. We prove that vanishing ideal of a subset $Y$ of the torus $T_X$ is a lattice ideal if and only if $Y$ is a subgroup. We show that these subgroups are exactly those subsets that are parameterized by Laurents monomials. We give an algorithm for determining this parametrization if the subgroup is the zero locus of a lattice ideal in the torus. We also show that vanishing ideals of subgroups of $T_X$ are radical homogeneous lattice ideals of dimension $r-n$. We identify the lattice corresponding to a degenerate torus in $X$ and completely characterize when its lattice ideal is a complete intersection. We compute dimension and length of some generalized toric codes defined on these degenerate tori.
△ Less
Submitted 2 October, 2018; v1 submitted 3 December, 2017;
originally announced December 2017.