-
Inverse Rendering of Fusion Plasmas: Inferring Plasma Composition from Imaging Systems
Authors:
Ekin Öztürk,
Rob Akers,
Stanislas Pamela,
The MAST Team,
Pieter Peers,
Abhijeet Ghosh
Abstract:
In this work, we develop a differentiable rendering pipeline for visualising plasma emission within tokamaks, and estimating the gradients of the emission and estimating other physical quantities. Unlike prior work, we are able to leverage arbitrary representations of plasma quantities and easily incorporate them into a non-linear optimisation framework. The efficiency of our method enables not on…
▽ More
In this work, we develop a differentiable rendering pipeline for visualising plasma emission within tokamaks, and estimating the gradients of the emission and estimating other physical quantities. Unlike prior work, we are able to leverage arbitrary representations of plasma quantities and easily incorporate them into a non-linear optimisation framework. The efficiency of our method enables not only estimation of a physically plausible image of plasma, but also recovery of the neutral Deuterium distribution from imaging and midplane measurements alone. We demonstrate our method with three different levels of complexity showing first that a poloidal neutrals density distribution can be recovered from imaging alone, second that the distributions of neutral Deuterium, electron density and electron temperature can be recovered jointly, and finally, that this can be done in the presence of realistic imaging systems that incorporate sensor cropping and quantisation.
△ Less
Submitted 14 August, 2024;
originally announced August 2024.
-
Intelligent Multi-View Test Time Augmentation
Authors:
Efe Ozturk,
Mohit Prabhushankar,
Ghassan AlRegib
Abstract:
In this study, we introduce an intelligent Test Time Augmentation (TTA) algorithm designed to enhance the robustness and accuracy of image classification models against viewpoint variations. Unlike traditional TTA methods that indiscriminately apply augmentations, our approach intelligently selects optimal augmentations based on predictive uncertainty metrics. This selection is achieved via a two-…
▽ More
In this study, we introduce an intelligent Test Time Augmentation (TTA) algorithm designed to enhance the robustness and accuracy of image classification models against viewpoint variations. Unlike traditional TTA methods that indiscriminately apply augmentations, our approach intelligently selects optimal augmentations based on predictive uncertainty metrics. This selection is achieved via a two-stage process: the first stage identifies the optimal augmentation for each class by evaluating uncertainty levels, while the second stage implements an uncertainty threshold to determine when applying TTA would be advantageous. This methodological advancement ensures that augmentations contribute to classification more effectively than a uniform application across the dataset. Experimental validation across several datasets and neural network architectures validates our approach, yielding an average accuracy improvement of 1.73% over methods that use single-view images. This research underscores the potential of adaptive, uncertainty-aware TTA in improving the robustness of image classification in the presence of viewpoint variations, paving the way for further exploration into intelligent augmentation strategies.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Towards Efficient Aggregation of Storage Flexibilities in Power Grids
Authors:
Emrah Öztürk,
Kevin Kaspar,
Timm Faulwasser,
Karl Worthmann,
Peter Kepplinger,
Klaus Rheinberger
Abstract:
The increasing penetration of volatile renewables combined with increasing demands poses a challenge to modern power grids. Furthermore, distributed energy resources and flexible devices (electric vehicles, PV generation, ...) are becoming more widespread, making their aggregate usage for ancillary services interesting. However, accurately quantifying the aggregate flexibility of numerous flexible…
▽ More
The increasing penetration of volatile renewables combined with increasing demands poses a challenge to modern power grids. Furthermore, distributed energy resources and flexible devices (electric vehicles, PV generation, ...) are becoming more widespread, making their aggregate usage for ancillary services interesting. However, accurately quantifying the aggregate flexibility of numerous flexible devices is known to be limited by the curse of dimensionality, i.e., it does not scale well computationally. This has led to the development of various approximation algorithms. In this study, we improve upon our previously proposed vertex-based inner approximation, extending it to more general storage devices. We demonstrate the efficacy and accuracy of the proposed method in a case study comparing our approach with an exact centralized control framework, where the flexibility of numerous electric vehicles is combined to reduce the peak load in a residential area.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
Alleviating the Curse of Dimensionality in Minkowski Sum Approximations of Storage Flexibility
Authors:
Emrah Öztürk,
Timm Faulwasser,
Karl Worthmann,
Markus Preißinger,
Klaus Rheinberger
Abstract:
Many real-world applications require the joint optimization of a large number of flexible devices over time. The flexibility of, e.g., multiple batteries, thermostatically controlled loads, or electric vehicles can be used to support grid operation and to reduce operation costs. Using piecewise constant power values, the flexibility of each device over $d$ time periods can be described as a polyto…
▽ More
Many real-world applications require the joint optimization of a large number of flexible devices over time. The flexibility of, e.g., multiple batteries, thermostatically controlled loads, or electric vehicles can be used to support grid operation and to reduce operation costs. Using piecewise constant power values, the flexibility of each device over $d$ time periods can be described as a polytopic subset in power space. The aggregated flexibility is given by the Minkowski sum of these polytopes. As the computation of Minkowski sums is in general demanding, several approximations have been proposed in the literature. Yet, their application potential is often objective-dependent and limited by the curse of dimensionality. We show that up to $2^d$ vertices of each polytope can be computed efficiently and that the convex hull of their sums provides a computationally efficient inner approximation of the Minkowski sum. Via an extensive simulation study, we illustrate that our approach outperforms ten state-of-the-art inner approximations in terms of computational complexity and accuracy for different objectives. Moreover, we propose an efficient disaggregation method applicable to any vertex-based approximation. The proposed methods provide an efficient means to aggregate and to disaggregate energy storages in quarter-hourly periods over an entire day with reasonable accuracy for aggregated cost and for peak power optimization.
△ Less
Submitted 28 February, 2024; v1 submitted 2 November, 2023;
originally announced November 2023.
-
An Empirical Study & Evaluation of Modern CAPTCHAs
Authors:
Andrew Searles,
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik,
Ai Enkoji
Abstract:
For nearly two decades, CAPTCHAs have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAs have continued to improve. Meanwhile, CAPTCHAs have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans. Given this long-standing and still-ongoi…
▽ More
For nearly two decades, CAPTCHAs have been widely used as a means of protection against bots. Throughout the years, as their use grew, techniques to defeat or bypass CAPTCHAs have continued to improve. Meanwhile, CAPTCHAs have also evolved in terms of sophistication and diversity, becoming increasingly difficult to solve for both bots (machines) and humans. Given this long-standing and still-ongoing arms race, it is critical to investigate how long it takes legitimate users to solve modern CAPTCHAs, and how they are perceived by those users.
In this work, we explore CAPTCHAs in the wild by evaluating users' solving performance and perceptions of unmodified currently-deployed CAPTCHAs. We obtain this data through manual inspection of popular websites and user studies in which 1,400 participants collectively solved 14,000 CAPTCHAs. Results show significant differences between the most popular types of CAPTCHAs: surprisingly, solving time and user perception are not always correlated. We performed a comparative study to investigate the effect of experimental context -- specifically the difference between solving CAPTCHAs directly versus solving them as part of a more natural task, such as account creation. Whilst there were several potential confounding factors, our results show that experimental context could have an impact on this task, and must be taken into account in future CAPTCHA studies. Finally, we investigate CAPTCHA-induced user task abandonment by analyzing participants who start and do not complete the task.
△ Less
Submitted 22 July, 2023;
originally announced July 2023.
-
Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input
Authors:
Tyler Kaczmarek,
Ercan Ozturk,
Pier Paolo Tricomi,
Gene Tsudik
Abstract:
To date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator: a new post-factum insider attack based on heat transfer caused by a user typing a password on a typical e…
▽ More
To date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator: a new post-factum insider attack based on heat transfer caused by a user typing a password on a typical external (plastic) keyboard.
We conduct and describe a user study that collected thermal residues from 30 users entering 10 unique passwords (both weak and strong) on 4 popular commodity keyboards. Results show that entire sets of key-presses can be recovered by non-expert users as late as 30 seconds after initial password entry, while partial sets can be recovered as late as 1 minute after entry. However, the thermal residue side-channel lacks information about password length, duplicate key-presses, and key-press ordering. To overcome these limitations, we leverage keyboard acoustic emanations and combine the two to yield AcuTherm, the first hybrid side-channel attack on keyboards. AcuTherm significantly reduces password search without the need for any training on the victim's typing. We report results gathered for many representative passwords based on a user study involving 19 subjects.
The takeaway of this work is three-fold: (1) using plastic keyboards to enter secrets (such as passwords and PINs) is even less secure than previously recognized, (2) post-factum thermal imaging attacks are realistic, and (3) hybrid (multiple side-channel) attacks are both realistic and effective.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
Zero-Shot AutoML with Pretrained Models
Authors:
Ekrem Öztürk,
Fabio Ferreira,
Hadi S. Jomaa,
Lars Schmidt-Thieme,
Josif Grabocka,
Frank Hutter
Abstract:
Given a new dataset D and a low compute budget, how should we choose a pre-trained model to fine-tune to D, and set the fine-tuning hyperparameters without risking overfitting, particularly if D is small? Here, we extend automated machine learning (AutoML) to best make these choices. Our domain-independent meta-learning approach learns a zero-shot surrogate model which, at test time, allows to sel…
▽ More
Given a new dataset D and a low compute budget, how should we choose a pre-trained model to fine-tune to D, and set the fine-tuning hyperparameters without risking overfitting, particularly if D is small? Here, we extend automated machine learning (AutoML) to best make these choices. Our domain-independent meta-learning approach learns a zero-shot surrogate model which, at test time, allows to select the right deep learning (DL) pipeline (including the pre-trained model and fine-tuning hyperparameters) for a new dataset D given only trivial meta-features describing D such as image resolution or the number of classes. To train this zero-shot model, we collect performance data for many DL pipelines on a large collection of datasets and meta-train on this data to minimize a pairwise ranking objective. We evaluate our approach under the strict time limit of the vision track of the ChaLearn AutoDL challenge benchmark, clearly outperforming all challenge contenders.
△ Less
Submitted 25 June, 2022; v1 submitted 16 June, 2022;
originally announced June 2022.
-
Lessons learned from the NeurIPS 2021 MetaDL challenge: Backbone fine-tuning without episodic meta-learning dominates for few-shot learning image classification
Authors:
Adrian El Baz,
Ihsan Ullah,
Edesio Alcobaça,
André C. P. L. F. Carvalho,
Hong Chen,
Fabio Ferreira,
Henry Gouk,
Chaoyu Guan,
Isabelle Guyon,
Timothy Hospedales,
Shell Hu,
Mike Huisman,
Frank Hutter,
Zhengying Liu,
Felix Mohr,
Ekrem Öztürk,
Jan N. van Rijn,
Haozhe Sun,
Xin Wang,
Wenwu Zhu
Abstract:
Although deep neural networks are capable of achieving performance superior to humans on various tasks, they are notorious for requiring large amounts of data and computing resources, restricting their success to domains where such resources are available. Metalearning methods can address this problem by transferring knowledge from related tasks, thus reducing the amount of data and computing reso…
▽ More
Although deep neural networks are capable of achieving performance superior to humans on various tasks, they are notorious for requiring large amounts of data and computing resources, restricting their success to domains where such resources are available. Metalearning methods can address this problem by transferring knowledge from related tasks, thus reducing the amount of data and computing resources needed to learn new tasks. We organize the MetaDL competition series, which provide opportunities for research groups all over the world to create and experimentally assess new meta-(deep)learning solutions for real problems. In this paper, authored collaboratively between the competition organizers and the top-ranked participants, we describe the design of the competition, the datasets, the best experimental results, as well as the top-ranked methods in the NeurIPS 2021 challenge, which attracted 15 active teams who made it to the final phase (by outperforming the baseline), making over 100 code submissions during the feedback phase. The solutions of the top participants have been open-sourced. The lessons learned include that learning good representations is essential for effective transfer learning.
△ Less
Submitted 11 July, 2022; v1 submitted 15 June, 2022;
originally announced June 2022.
-
CTR: Checkpoint, Transfer, and Restore for Secure Enclaves
Authors:
Yoshimichi Nakatsuka,
Ercan Ozturk,
Alex Shamis,
Andrew Paverd,
Peter Pietzuch
Abstract:
Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architec…
▽ More
Hardware-based Trusted Execution Environments (TEEs) are becoming increasingly prevalent in cloud computing, forming the basis for confidential computing. However, the security goals of TEEs sometimes conflict with existing cloud functionality, such as VM or process migration, because TEE memory cannot be read by the hypervisor, OS, or other software on the platform. Whilst some newer TEE architectures support migration of entire protected VMs, there is currently no practical solution for migrating individual processes containing in-process TEEs. The inability to migrate such processes leads to operational inefficiencies or even data loss if the host platform must be urgently restarted.
We present CTR, a software-only design to retrofit migration functionality into existing TEE architectures, whilst maintaining their expected security guarantees. Our design allows TEEs to be interrupted and migrated at arbitrary points in their execution, thus maintaining compatibility with existing VM and process migration techniques. By cooperatively involving the TEE in the migration process, our design also allows application developers to specify stateful migration-related policies, such as limiting the number of times a particular TEE may be migrated. Our prototype implementation for Intel SGX demonstrates that migration latency increases linearly with the size of the TEE memory and is dominated by TEE system operations.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
Fluctuation-dissipation relation for a Bose-Einstein condensate of photons
Authors:
Fahri Emre Öztürk,
Frank Vewinger,
Martin Weitz,
Julian Schmitt
Abstract:
For equilibrium systems, the magnitude of thermal fluctuations is closely linked to the dissipative response to external perturbations. This fluctuation-dissipation relation has been described for material particles in a wide range of fields. Here we experimentally probe the relation between the number fluctuations and the response function for a Bose-Einstein condensate of photons coupled to a dy…
▽ More
For equilibrium systems, the magnitude of thermal fluctuations is closely linked to the dissipative response to external perturbations. This fluctuation-dissipation relation has been described for material particles in a wide range of fields. Here we experimentally probe the relation between the number fluctuations and the response function for a Bose-Einstein condensate of photons coupled to a dye reservoir, demonstrating the fluctuation-dissipation relation for a quantum gas of light. The observed agreement of the scale factor with the environment temperature both directly confirms the thermal nature of the optical condensate and demonstrates the validity of the fluctuation-dissipation theorem for a Bose-Einstein condensate.
△ Less
Submitted 23 January, 2023; v1 submitted 24 March, 2022;
originally announced March 2022.
-
Deep Convolutional Learning-Aided Detector for Generalized Frequency Division Multiplexing with Index Modulation
Authors:
Merve Turhan,
Ersin Öztürk,
Hakan Ali Çırpan
Abstract:
In this paper, a deep convolutional neural network-based symbol detection and demodulation is proposed for generalized frequency division multiplexing with index modulation (GFDM-IM) scheme in order to improve the error performance of the system. The proposed method first pre-processes the received signal by using a zero-forcing (ZF) detector and then uses a neural network consisting of a convolut…
▽ More
In this paper, a deep convolutional neural network-based symbol detection and demodulation is proposed for generalized frequency division multiplexing with index modulation (GFDM-IM) scheme in order to improve the error performance of the system. The proposed method first pre-processes the received signal by using a zero-forcing (ZF) detector and then uses a neural network consisting of a convolutional neural network (CNN) followed by a fully-connected neural network (FCNN). The FCNN part uses only two fully-connected layers, which can be adapted to yield a trade-off between complexity and bit error rate (BER) performance. This two-stage approach prevents the getting stuck of neural network in a saddle point and enables IM blocks processing independently. It has been demonstrated that the proposed deep convolutional neural network-based detection and demodulation scheme provides better BER performance compared to ZF detector with a reasonable complexity increase. We conclude that non-orthogonal waveforms combined with IM schemes with the help of deep learning is a promising physical layer (PHY) scheme for future wireless networks
△ Less
Submitted 6 February, 2022;
originally announced February 2022.
-
Deep Learning-Aided Spatial Multiplexing with Index Modulation
Authors:
Merve Turhan,
Ersin Ozturk,
Hakan Ali Cirpan
Abstract:
In this paper, deep learning (DL)-aided data detection of spatial multiplexing (SMX) multiple-input multiple-output (MIMO) transmission with index modulation (IM) (Deep-SMX-IM) has been proposed. Deep-SMX-IM has been constructed by combining a zero-forcing (ZF) detector and DL technique. The proposed method uses the significant advantages of DL techniques to learn transmission characteristics of t…
▽ More
In this paper, deep learning (DL)-aided data detection of spatial multiplexing (SMX) multiple-input multiple-output (MIMO) transmission with index modulation (IM) (Deep-SMX-IM) has been proposed. Deep-SMX-IM has been constructed by combining a zero-forcing (ZF) detector and DL technique. The proposed method uses the significant advantages of DL techniques to learn transmission characteristics of the frequency and spatial domains. Furthermore, thanks to using subblockbased detection provided by IM, Deep-SMX-IM is a straightforward method, which eventually reveals reduced complexity. It has been shown that Deep-SMX-IM has significant error performance gains compared to ZF detector without increasing computational complexity for different system configurations.
△ Less
Submitted 6 February, 2022;
originally announced February 2022.
-
Doors in the Sky: Detection, Localization and Classification of Aerial Vehicles using Laser Mesh
Authors:
Wahab Khawaja,
Ender Ozturk,
Ismail Guvenc
Abstract:
The stealth technology and unmanned aerial vehicles (UAVs) are expected to dominate current and future aerial warfare. The radar systems at their maximum operating ranges, however, are not always able to detect stealth and small UAVs mainly due to their small radar cross-sections and/or low altitudes. In this paper, a novel technique as an alternative to radar technology is proposed. The proposed…
▽ More
The stealth technology and unmanned aerial vehicles (UAVs) are expected to dominate current and future aerial warfare. The radar systems at their maximum operating ranges, however, are not always able to detect stealth and small UAVs mainly due to their small radar cross-sections and/or low altitudes. In this paper, a novel technique as an alternative to radar technology is proposed. The proposed approach is based on creating a mesh structure of laser beams initiated from aerial platforms towards the ground. The laser mesh acts as a virtual net in the sky. Any aerial vehicle disrupting the path of the laser beams are detected and subsequently localized and tracked. As an additional feature, steering of the beams can be used for increased coverage and improved localization and classification performance. A database of different types of aerial vehicles is created artificially based on Gaussian distributions. The database is used to develop several machine learning (ML) models using different algorithms to classify a target. Overall, we demonstrated through simulations that our proposed model achieves simultaneous detection, classification, localization, and tracking of a target.
△ Less
Submitted 13 November, 2021;
originally announced November 2021.
-
ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies
Authors:
Ş. S. Mağara,
C. Yıldırım,
F. Yaman,
B. Dilekoğlu,
F. R. Tutaş,
E. Öztürk,
K. Kaya,
Ö. Taştan,
E. Savaş
Abstract:
Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, w…
▽ More
Preserving the privacy and security of big data in the context of cloud computing, while maintaining a certain level of efficiency of its processing remains to be a subject, open for improvement. One of the most popular applications epitomizing said concerns is found to be useful in genome analysis. This work proposes a secure multi-label tumor classification method using homomorphic encryption, whereby two different machine learning algorithms, SVM and XGBoost, are used to classify the encrypted genome data of different tumor types.
△ Less
Submitted 1 February, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
Deep learning models for predicting RNA degradation via dual crowdsourcing
Authors:
Hannah K. Wayment-Steele,
Wipapat Kladwang,
Andrew M. Watkins,
Do Soon Kim,
Bojan Tunguz,
Walter Reade,
Maggie Demkin,
Jonathan Romano,
Roger Wellington-Oguri,
John J. Nicol,
Jiayang Gao,
Kazuki Onodera,
Kazuki Fujikawa,
Hanfei Mao,
Gilles Vandewiele,
Michele Tinti,
Bram Steenwinckel,
Takuya Ito,
Taiga Noumi,
Shujun He,
Keiichiro Ishi,
Youhan Lee,
Fatih Öztürk,
Anthony Chiu,
Emin Öztürk
, et al. (4 additional authors not shown)
Abstract:
Messenger RNA-based medicines hold immense potential, as evidenced by their rapid deployment as COVID-19 vaccines. However, worldwide distribution of mRNA molecules has been limited by their thermostability, which is fundamentally limited by the intrinsic instability of RNA molecules to a chemical degradation reaction called in-line hydrolysis. Predicting the degradation of an RNA molecule is a ke…
▽ More
Messenger RNA-based medicines hold immense potential, as evidenced by their rapid deployment as COVID-19 vaccines. However, worldwide distribution of mRNA molecules has been limited by their thermostability, which is fundamentally limited by the intrinsic instability of RNA molecules to a chemical degradation reaction called in-line hydrolysis. Predicting the degradation of an RNA molecule is a key task in designing more stable RNA-based therapeutics. Here, we describe a crowdsourced machine learning competition ("Stanford OpenVaccine") on Kaggle, involving single-nucleotide resolution measurements on 6043 102-130-nucleotide diverse RNA constructs that were themselves solicited through crowdsourcing on the RNA design platform Eterna. The entire experiment was completed in less than 6 months, and 41% of nucleotide-level predictions from the winning model were within experimental error of the ground truth measurement. Furthermore, these models generalized to blindly predicting orthogonal degradation data on much longer mRNA molecules (504-1588 nucleotides) with improved accuracy compared to previously published models. Top teams integrated natural language processing architectures and data augmentation techniques with predictions from previous dynamic programming models for RNA secondary structure. These results indicate that such models are capable of representing in-line hydrolysis with excellent accuracy, supporting their use for designing stabilized messenger RNAs. The integration of two crowdsourcing platforms, one for data set creation and another for machine learning, may be fruitful for other urgent problems that demand scientific discovery on rapid timescales.
△ Less
Submitted 22 April, 2022; v1 submitted 14 October, 2021;
originally announced October 2021.
-
60 GHz Outdoor Propagation Measurements and Analysis Using Facebook Terragraph Radios
Authors:
Kairui Du,
Omkar Mujumdar,
Ozgur Ozdemir,
Ender Ozturk,
Ismail Guvenc,
Mihail L. Sichitiu,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
The high attenuation of millimeter-wave (mmWave) would significantly reduce the coverage areas, and hence it is critical to study the propagation characteristics of mmWave in multiple deployment scenarios. In this work, we investigated the propagation and scattering behavior of 60 GHz mmWave signals in outdoor environments at a travel distance of 98 m for an aerial link (rooftop to rooftop), and 1…
▽ More
The high attenuation of millimeter-wave (mmWave) would significantly reduce the coverage areas, and hence it is critical to study the propagation characteristics of mmWave in multiple deployment scenarios. In this work, we investigated the propagation and scattering behavior of 60 GHz mmWave signals in outdoor environments at a travel distance of 98 m for an aerial link (rooftop to rooftop), and 147 m for a ground link (light-pole to light-pole). Measurements were carried out using Facebook Terragraph (TG) radios. Results include received power, path loss, signal-to-noise ratio (SNR), and root mean square (RMS) delay spread for all beamforming directions supported by the antenna array. Strong line-of-sight (LOS) propagation exists in both links. We also observed rich multipath components (MPCs) due to edge scatterings in the aerial link, while only LOS and ground reflection MPCs in the other link.
△ Less
Submitted 1 September, 2021;
originally announced September 2021.
-
The limit as $p\rightarrow\infty$ for the $p-$Laplacian equation with dynamical boundary conditions
Authors:
Eylem Öztürk,
Julio D. Rossi
Abstract:
In this paper we study the limit as $p\to \infty$ in the evolution problem driven by the $p-$Laplacian with dynamical boundary conditions. We prove that the natural energy functional associated with this problem converges to a limit in the sense of Mosco convergence and as a consequence we obtain convergence of the solutions to the evolution problems. For the limit problem we show an interpretatio…
▽ More
In this paper we study the limit as $p\to \infty$ in the evolution problem driven by the $p-$Laplacian with dynamical boundary conditions. We prove that the natural energy functional associated with this problem converges to a limit in the sense of Mosco convergence and as a consequence we obtain convergence of the solutions to the evolution problems. For the limit problem we show an interpretation in terms of optimal mass transportation and provide examples of explicit solutions for some particular data.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Experimental Study of Outdoor UAV Localization and Tracking using Passive RF Sensing
Authors:
Udita Bhattacherjee,
Ender Ozturk,
Ozgur Ozdemir,
Ismail Guvenc,
Mihail L. Sichitiu,
Huaiyu Dai
Abstract:
Extensive use of unmanned aerial vehicles (UAVs) is expected to raise privacy and security concerns among individuals and communities. In this context, the detection and localization of UAVs will be critical for maintaining safe and secure airspace in the future. In this work, Keysight N6854A radio frequency (RF) sensors are used to detect and locate a UAV by passively monitoring the signals emitt…
▽ More
Extensive use of unmanned aerial vehicles (UAVs) is expected to raise privacy and security concerns among individuals and communities. In this context, the detection and localization of UAVs will be critical for maintaining safe and secure airspace in the future. In this work, Keysight N6854A radio frequency (RF) sensors are used to detect and locate a UAV by passively monitoring the signals emitted from the UAV. First, the Keysight sensor detects the UAV by comparing the received RF signature with various other UAVs' RF signatures in the Keysight database using an envelope detection algorithm. Afterward, time difference of arrival (TDoA) based localization is performed by a central controller using the sensor data, and the drone is localized with some error. To mitigate the localization error, implementation of an extended Kalman filter~(EKF) is proposed in this study. The performance of the proposed approach is evaluated on a realistic experimental dataset. EKF requires basic assumptions on the type of motion throughout the trajectory, i.e., the movement of the object is assumed to fit some motion model~(MM) such as constant velocity (CV), constant acceleration (CA), and constant turn (CT). In the experiments, an arbitrary trajectory is followed, therefore it is not feasible to fit the whole trajectory into a single MM. Consequently, the trajectory is segmented into sub-parts and a different MM is assumed in each segment while building the EKF model. Simulation results demonstrate an improvement in error statistics when EKF is used if the MM assumption aligns with the real motion.
△ Less
Submitted 3 September, 2021; v1 submitted 17 August, 2021;
originally announced August 2021.
-
Channel Rank Improvement in Urban Drone Corridors Using Passive Intelligent Reflectors
Authors:
Ender Ozturk,
Chethan Kumar Anjinappa,
Fatih Erden,
Ismail Guvenc,
Huaiyu Dai,
Arupjyoti Bhuyan
Abstract:
Multiple-input multiple-output (MIMO) techniques can help in scaling the achievable air-to-ground (A2G) channel capacity while communicating with drones. However, spatial multiplexing with drones suffers from rank deficient channels due to the unobstructed line-of-sight (LoS), especially in millimeter-wave (mmWave) frequencies that use narrow beams. One possible solution is utilizing low-cost and…
▽ More
Multiple-input multiple-output (MIMO) techniques can help in scaling the achievable air-to-ground (A2G) channel capacity while communicating with drones. However, spatial multiplexing with drones suffers from rank deficient channels due to the unobstructed line-of-sight (LoS), especially in millimeter-wave (mmWave) frequencies that use narrow beams. One possible solution is utilizing low-cost and low-complexity metamaterial-based intelligent reflecting surfaces (IRS) to enrich the multipath environment, taking into account that the drones are restricted to fly only within well-defined drone corridors. A hurdle with this solution is placing the IRSs optimally. In this study, we propose an approach for IRS placement with a goal to improve the spatial multiplexing gains, and hence to maximize the average channel capacity in a predefined drone corridor. Our results at 6 GHz, 28 GHz and 60 GHz show that the proposed approach increases the average rates for all frequency bands for a given drone corridor, when compared with the environment where there are no IRSs present, and IRS-aided channels perform close to each other at sub-6 and mmWave bands.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Authors:
Scott Jordan,
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik
Abstract:
Recent data protection regulations (such as GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers wit…
▽ More
Recent data protection regulations (such as GDPR and CCPA) grant consumers various rights, including the right to access, modify or delete any personal information collected about them (and retained) by a service provider. To exercise these rights, one must submit a verifiable consumer request proving that the collected data indeed pertains to them. This action is straightforward for consumers with active accounts with a service provider at the time of data collection, since they can use standard (e.g., password-based) means of authentication to validate their requests. However, a major conundrum arises from the need to support consumers without accounts to exercise their rights. To this end, some service providers began requiring such accountless consumers to reveal and prove their identities (e.g., using government-issued documents, utility bills, or credit card numbers) as part of issuing a verifiable consumer request. While understandable as a short-term cure, this approach is cumbersome and expensive for service providers as well as privacy-invasive for consumers. Consequently, there is a strong need to provide better means of authenticating requests from accountless consumers. To achieve this, we propose VICEROY, a privacy-preserving and scalable framework for producing proofs of data ownership, which form a basis for verifiable consumer requests. Building upon existing web techniques and features, VICEROY allows accountless consumers to interact with service providers, and later prove that they are the same person in a privacy-preserving manner, while requiring minimal changes for both parties. We design and implement VICEROY with emphasis on security/privacy, deployability and usability. We also thoroughly assess its practicality via extensive experiments.
△ Less
Submitted 21 October, 2022; v1 submitted 14 May, 2021;
originally announced May 2021.
-
Accurate Prediction Of Machining Feedrate And Cycle Time Prediction Considering Interpolator Dynamics
Authors:
Rob Ward,
Burak Sencer,
Bryn Jones,
Erdem Ozturk
Abstract:
This paper presents an accurate machining feedrate prediction technique by modeling the trajectory generation behaviour of modern CNC machine tools. Typically, CAM systems simulate machines motion based on the commanded feedrate and the path geometry. Such approach does not consider the feed planning and interpolation strategy of the machines numerical control (NC) system. In this study, trajector…
▽ More
This paper presents an accurate machining feedrate prediction technique by modeling the trajectory generation behaviour of modern CNC machine tools. Typically, CAM systems simulate machines motion based on the commanded feedrate and the path geometry. Such approach does not consider the feed planning and interpolation strategy of the machines numerical control (NC) system. In this study, trajectory generation behaviour of the NC system is modelled and accurate cycle time prediction for complex machining toolpaths is realized. NC systems linear interpolation dynamics and commanded axis kinematic profiles are predicted by using Finite Impulse Response (FIR) based low-pass filters. The corner blending behaviour during nonstop interpolation of linear segments is modeled, and for the first time, the minimum cornering feedrate, that satisfies both the tolerance and machining constraints, has been calculated analytically for 3 axis toolpaths of any geometry. The proposed method is applied to 4 different case studies including complex machining tool-paths. Experimental validations show actual cycle times can be estimated with greater than 90 percent accuracy, greatly outperforming CAM-based predictions. It is expected that the proposed approach will help improve the accuracy of virtual machining models and support businesses decision making when costing machining processes.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Observation of a non-Hermitian phase transition in an optical quantum gas
Authors:
Fahri Emre Öztürk,
Tim Lappe,
Göran Hellmann,
Julian Schmitt,
Jan Klaers,
Frank Vewinger,
Johann Kroha,
Martin Weitz
Abstract:
Quantum gases of light, as photons or polariton condensates in optical microcavities, are collective quantum systems enabling a tailoring of dissipation from e.g. cavity loss. This makes them a tool to study dissipative phases, an emerging subject in quantum manybody physics. Here we experimentally demonstrate a non-Hermitian phase transition of a photon Bose-Einstein condensate to a new dissipati…
▽ More
Quantum gases of light, as photons or polariton condensates in optical microcavities, are collective quantum systems enabling a tailoring of dissipation from e.g. cavity loss. This makes them a tool to study dissipative phases, an emerging subject in quantum manybody physics. Here we experimentally demonstrate a non-Hermitian phase transition of a photon Bose-Einstein condensate to a new dissipative phase, characterized by a biexponential decay of the condensate's second-order coherence. The phase transition occurs due to the emergence of an exceptional point in the quantum gas. While Bose-Einstein condensation is usually connected to ordinary lasing by a smooth crossover, the observed phase transition separates the novel, biexponential phase from both lasing and an intermediate, oscillatory condensate regime. Our findings pave the way for studies of a wide class of dissipative quantum phases, for instance in topological or lattice systems.
△ Less
Submitted 5 April, 2021; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Multilayer Minkowski Reflectarray Antenna with Improved Phase Performance
Authors:
Ender Ozturk,
Birsen Saka
Abstract:
We propose a multi-layer unit cell consisting of Minkowski fractal shaped reflector with aperture coupled phasing stubs to obtain a broad phase range for the reflectarray antenna with smaller unit cell size and inter-element spacing compared to some other studies in the literature. In the study, simulations are conducted using HFSS(TM) program with Floquet Port incidence. A unit cell with two cycl…
▽ More
We propose a multi-layer unit cell consisting of Minkowski fractal shaped reflector with aperture coupled phasing stubs to obtain a broad phase range for the reflectarray antenna with smaller unit cell size and inter-element spacing compared to some other studies in the literature. In the study, simulations are conducted using HFSS(TM) program with Floquet Port incidence. A unit cell with two cycles of phase range and very low reflection loss is designed. 21.9% shrinkage is achieved in patch surface area using Minkowski fractals. Subsequently, proposed unit cell is used to design and fabricate a full scale 221 element reflectarray antenna. At 10 GHz, simulation results are compared with measured data and good agreement is observed.
△ Less
Submitted 21 August, 2020;
originally announced September 2020.
-
RF-Based Low-SNR Classification of UAVs Using Convolutional Neural Networks
Authors:
Ender Ozturk,
Fatih Erden,
Ismail Guvenc
Abstract:
This paper investigates the problem of classification of unmanned aerial vehicles (UAVs) from radio frequency (RF) fingerprints at the low signal-to-noise ratio (SNR) regime. We use convolutional neural networks (CNNs) trained with both RF time-series images and the spectrograms of 15 different off-the-shelf drone controller RF signals. When using time-series signal images, the CNN extracts featur…
▽ More
This paper investigates the problem of classification of unmanned aerial vehicles (UAVs) from radio frequency (RF) fingerprints at the low signal-to-noise ratio (SNR) regime. We use convolutional neural networks (CNNs) trained with both RF time-series images and the spectrograms of 15 different off-the-shelf drone controller RF signals. When using time-series signal images, the CNN extracts features from the signal transient and envelope. As the SNR decreases, this approach fails dramatically because the information in the transient is lost in the noise, and the envelope is distorted heavily. In contrast to time-series representation of the RF signals, with spectrograms, it is possible to focus only on the desired frequency interval, i.e., 2.4 GHz ISM band, and filter out any other signal component outside of this band. These advantages provide a notable performance improvement over the time-series signals-based methods. To further increase the classification accuracy of the spectrogram-based CNN, we denoise the spectrogram images by truncating them to a limited spectral density interval. Creating a single model using spectrogram images of noisy signals and tuning the CNN model parameters, we achieve a classification accuracy varying from 92% to 100% for an SNR range from -10 dB to 30 dB, which significantly outperforms the existing approaches to our best knowledge.
△ Less
Submitted 21 September, 2020; v1 submitted 11 September, 2020;
originally announced September 2020.
-
CACTI: Captcha Avoidance via Client-side TEE Integration
Authors:
Yoshimichi Nakatsuka,
Ercan Ozturk,
Andrew Paverd,
Gene Tsudik
Abstract:
Preventing abuse of web services by bots is an increasingly important problem, as abusive activities grow in both volume and variety. CAPTCHAs are the most common way for thwarting bot activities. However, they are often ineffective against bots and frustrating for humans. In addition, some recent CAPTCHA techniques diminish user privacy. Meanwhile, client-side Trusted Execution Environments (TEEs…
▽ More
Preventing abuse of web services by bots is an increasingly important problem, as abusive activities grow in both volume and variety. CAPTCHAs are the most common way for thwarting bot activities. However, they are often ineffective against bots and frustrating for humans. In addition, some recent CAPTCHA techniques diminish user privacy. Meanwhile, client-side Trusted Execution Environments (TEEs) are becoming increasingly widespread (notably, ARM TrustZone and Intel SGX), allowing establishment of trust in a small part (trust anchor or TCB) of client-side hardware. This prompts the question: can a TEE help reduce (or remove entirely) user burden of solving CAPTCHAs?
In this paper, we design CACTI: CAPTCHA Avoidance via Client-side TEE Integration. Using client-side TEEs, CACTI allows legitimate clients to generate unforgeable rate-proofs demonstrating how frequently they have performed specific actions. These rate-proofs can be sent to web servers in lieu of solving CAPTCHAs. CACTI provides strong client privacy guarantees, since the information is only sent to the visited website and authenticated using a group signature scheme. Our evaluations show that overall latency of generating and verifying a CACTI rate-proof is less than 0.25 sec, while CACTI's bandwidth overhead is over 98% lower than that of current CAPTCHA systems.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
Demonstrating Immersive Media Delivery on 5G Broadcast and Multicast Testing Networks
Authors:
De Mi,
Joe Eyles,
Tero Jokela,
Swen Petersen,
Roman Odarchenko,
Ece Ozturk,
Duy-Kha Chau,
Tuan Tran,
Rory Turnbull,
Heikki Kokkinen,
Baruch Altman,
Menno Bot,
Darko Ratkaj,
Olaf Renner,
David Gomez-Barquero,
Jordi Joan Gimenez
Abstract:
This work presents eight demonstrators and one showcase developed within the 5G-Xcast project. They experimentally demonstrate and validate key technical enablers for the future of media delivery, associated with multicast and broadcast communication capabilities in 5th Generation (5G). In 5G-Xcast, three existing testbeds: IRT in Munich (Germany), 5GIC in Surrey (UK), and TUAS in Turku (Finland),…
▽ More
This work presents eight demonstrators and one showcase developed within the 5G-Xcast project. They experimentally demonstrate and validate key technical enablers for the future of media delivery, associated with multicast and broadcast communication capabilities in 5th Generation (5G). In 5G-Xcast, three existing testbeds: IRT in Munich (Germany), 5GIC in Surrey (UK), and TUAS in Turku (Finland), have been developed into 5G broadcast and multicast testing networks, which enables us to demonstrate our vision of a converged 5G infrastructure with fixed and mobile accesses and terrestrial broadcast, delivering immersive audio-visual media content. Built upon the improved testing networks, the demonstrators and showcase developed in 5G-Xcast show the impact of the technology developed in the project. Our demonstrations predominantly cover use cases belonging to two verticals: Media & Entertainment and Public Warning, which are future 5G scenarios relevant to multicast and broadcast delivery. In this paper, we present the development of these demonstrators, the showcase, and the testbeds. We also provide key findings from the experiments and demonstrations, which not only validate the technical solutions developed in the project, but also illustrate the potential technical impact of these solutions for broadcasters, content providers, operators, and other industries interested in the future immersive media delivery.
△ Less
Submitted 1 March, 2020;
originally announced April 2020.
-
Outdoor mmWave Base Station Placement: A Multi-Armed Bandit Learning Approach
Authors:
Fatih Erden,
Chethan K. Anjinappa,
Ender Ozturk,
Ismail Guvenc
Abstract:
Base station (BS) placement in mobile networks is critical to the efficient use of resources in any communication system and one of the main factors that determines the quality of communication. Although there is ample literature on the optimum placement of BSs for sub-6 GHz bands, channel propagation characteristics, such as penetration loss, are notably different in millimeter-wave (mmWave) band…
▽ More
Base station (BS) placement in mobile networks is critical to the efficient use of resources in any communication system and one of the main factors that determines the quality of communication. Although there is ample literature on the optimum placement of BSs for sub-6 GHz bands, channel propagation characteristics, such as penetration loss, are notably different in millimeter-wave (mmWave) bands than in sub-6 GHz bands. Therefore, designated solutions are needed for mmWave systems to have reliable quality of service (QoS) assessment. This article proposes a multi-armed bandit (MAB) learning approach for the mmWave BS placement problem. The proposed solution performs viewshed analysis to identify the areas that are visible to a given BS location by considering the 3D geometry of the outdoor environments. Coverage probability, which is used as the QoS metric, is calculated using the appropriate path loss model depending on the viewshed analysis and a probabilistic blockage model and then fed to the MAB learning mechanism. The optimum BS location is then determined based on the expected reward that the candidate locations attain at the end of the training process. Unlike the optimization-based techniques, this method can capture the time-varying behavior of the channel and find the optimal BS locations that maximize long-term performance.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Localization with Deep Neural Networks using mmWave Ray Tracing Simulations
Authors:
Udita Bhattacherjee,
Chethan Kumar Anjinappa,
LoyCurtis Smith,
Ender Ozturk,
Ismail Guvenc
Abstract:
The world is moving towards faster data transformation with more efficient localization of a user being the preliminary requirement. This work investigates the use of a deep learning technique for wireless localization, considering both millimeter-wave (mmWave) and sub-6 GHz frequencies. The capability of learning a new neural network model makes the localization process easier and faster. In this…
▽ More
The world is moving towards faster data transformation with more efficient localization of a user being the preliminary requirement. This work investigates the use of a deep learning technique for wireless localization, considering both millimeter-wave (mmWave) and sub-6 GHz frequencies. The capability of learning a new neural network model makes the localization process easier and faster. In this study, a Deep Neural Network (DNN) was used to localize User Equipment (UE) in two static scenarios. We propose two different methods to train a neural network, one using channel parameters (features) and another using a channel response vector and compare their performances using preliminary computer simulations. We observe that the former approach produces high localization accuracy considering that all of the users have a fixed number of multipath components (MPCs), this method is reliant on the number of MPCs. On the other hand, the latter approach is independent of the MPCs, but it performs relatively poorly compared to the first approach.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
Real-Time Optimal Guidance and Control for Interplanetary Transfers Using Deep Networks
Authors:
Dario Izzo,
Ekin Öztürk
Abstract:
We consider the Earth-Venus mass-optimal interplanetary transfer of a low-thrust spacecraft and show how the optimal guidance can be represented by deep networks in a large portion of the state space and to a high degree of accuracy. Imitation (supervised) learning of optimal examples is used as a network training paradigm. The resulting models are suitable for an on-board, real-time, implementati…
▽ More
We consider the Earth-Venus mass-optimal interplanetary transfer of a low-thrust spacecraft and show how the optimal guidance can be represented by deep networks in a large portion of the state space and to a high degree of accuracy. Imitation (supervised) learning of optimal examples is used as a network training paradigm. The resulting models are suitable for an on-board, real-time, implementation of the optimal guidance and control system of the spacecraft and are called G&CNETs. A new general methodology called Backward Generation of Optimal Examples is introduced and shown to be able to efficiently create all the optimal state action pairs necessary to train G&CNETs without solving optimal control problems. With respect to previous works, we are able to produce datasets containing a few orders of magnitude more optimal trajectories and obtain network performances compatible with real missions requirements. Several schemes able to train representations of either the optimal policy (thrust profile) or the value function (optimal mass) are proposed and tested. We find that both policy learning and value function learning successfully and accurately learn the optimal thrust and that a spacecraft employing the learned thrust is able to reach the target conditions orbit spending only 2 permil more propellant than in the corresponding mathematically optimal transfer. Moreover, the optimal propellant mass can be predicted (in case of value function learning) within an error well within 1%. All G&CNETs produced are tested during simulations of interplanetary transfers with respect to their ability to reach the target conditions optimally starting from nominal and off-nominal conditions.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Multiple Ray Received Power Modeling for mmWave Indoor and Outdoor Scenarios
Authors:
Wahab Khawaja,
Ozgur Ozdemir,
Fatih Erden,
Ender Ozturk,
Ismail Guvenc
Abstract:
Millimeter-wave (mmWave) frequency bands are expected to be used for future 5G networks due to the availability of large unused spectrum. However, the attenuation at mmWave frequencies is high. To resolve this issue, the utilization of high gain antennas and beamforming mechanisms are widely investigated in the literature. In this work, we considered mmWave end-to-end propagation modeled by indivi…
▽ More
Millimeter-wave (mmWave) frequency bands are expected to be used for future 5G networks due to the availability of large unused spectrum. However, the attenuation at mmWave frequencies is high. To resolve this issue, the utilization of high gain antennas and beamforming mechanisms are widely investigated in the literature. In this work, we considered mmWave end-to-end propagation modeled by individual ray sources, and explored the effects of the number of rays in the model and radiation patterns of the deployed antennas on the received power. It is shown that taking the dominant two rays is sufficient to model the channel for outdoor open areas as opposed to the indoor corridor which needs five dominant rays to have a good fit for the measurement and simulation results. It is observed that the radiation pattern of the antenna affects the slope of the path loss. Multi-path components increase the received power, thus, for indoor corridor scenarios, path loss according to the link distance is smaller for lower gain antennas due to increased reception of reflected components. For an outdoor open area, the slope of the path loss is found to be very close to that of the free space.
△ Less
Submitted 17 January, 2020;
originally announced January 2020.
-
Aggressive Online Control of a Quadrotor via Deep Network Representations of Optimality Principles
Authors:
Shuo Li,
Ekin Ozturk,
Christophe De Wagter,
Guido C. H. E. de Croon,
Dario Izzo
Abstract:
Optimal control holds great potential to improve a variety of robotic applications. The application of optimal control on-board limited platforms has been severely hindered by the large computational requirements of current state of the art implementations. In this work, we make use of a deep neural network to directly map the robot states to control actions. The network is trained offline to imit…
▽ More
Optimal control holds great potential to improve a variety of robotic applications. The application of optimal control on-board limited platforms has been severely hindered by the large computational requirements of current state of the art implementations. In this work, we make use of a deep neural network to directly map the robot states to control actions. The network is trained offline to imitate the optimal control computed by a time consuming direct nonlinear method. A mixture of time optimality and power optimality is considered with a continuation parameter used to select the predominance of each objective. We apply our networks (termed G\&CNets) to aggressive quadrotor control, first in simulation and then in the real world. We give insight into the factors that influence the `reality gap' between the quadrotor model used by the offline optimal control method and the real quadrotor. Furthermore, we explain how we set up the model and the control structure on-board of the real quadrotor to successfully close this gap and perform time-optimal maneuvers in the real world. Finally, G\&CNet's performance is compared to state-of-the-art differential-flatness-based optimal control methods. We show, in the experiments, that G\&CNets lead to significantly faster trajectory execution due to, in part, the less restrictive nature of the allowed state-to-input mappings.
△ Less
Submitted 15 December, 2019;
originally announced December 2019.
-
Fluctuation dynamics of an open photon Bose-Einstein condensate
Authors:
Fahri Emre Ozturk,
Tim Lappe,
Goran Hellmann,
Julian Schmitt,
Jan Klaers,
Frank Vewinger,
Johann Kroha,
Martin Weitz
Abstract:
Bosonic gases coupled to a particle reservoir have proven to support a regime of operation where Bose-Einstein condensation coexists with unusually large particle-number fluctuations. Experimentally, this situation has been realized with two-dimensional photon gases in a dye-filled optical microcavity. Here, we investigate theoretically and experimentally the open-system dynamics of a grand canoni…
▽ More
Bosonic gases coupled to a particle reservoir have proven to support a regime of operation where Bose-Einstein condensation coexists with unusually large particle-number fluctuations. Experimentally, this situation has been realized with two-dimensional photon gases in a dye-filled optical microcavity. Here, we investigate theoretically and experimentally the open-system dynamics of a grand canonical Bose-Einstein condensate of photons. We identify a regime with temporal oscillations of the second-order coherence function $g^{(2)}(τ)$, even though the energy spectrum closely matches the predictions for an equilibrium Bose-Einstein distribution and the system is operated deeply in the regime of weak light-matter coupling. The observed temporal oscillations are attributed to the nonlinear, weakly driven-dissipative nature of the system which leads to time-reversal symmetry breaking.
△ Less
Submitted 8 October, 2019; v1 submitted 2 August, 2019;
originally announced August 2019.
-
Interplanetary Transfers via Deep Representations of the Optimal Policy and/or of the Value Function
Authors:
Dario Izzo,
Ekin Öztürk,
Marcus Märtens
Abstract:
A number of applications to interplanetary trajectories have been recently proposed based on deep networks. These approaches often rely on the availability of a large number of optimal trajectories to learn from. In this paper we introduce a new method to quickly create millions of optimal spacecraft trajectories from a single nominal trajectory. Apart from the generation of the nominal trajectory…
▽ More
A number of applications to interplanetary trajectories have been recently proposed based on deep networks. These approaches often rely on the availability of a large number of optimal trajectories to learn from. In this paper we introduce a new method to quickly create millions of optimal spacecraft trajectories from a single nominal trajectory. Apart from the generation of the nominal trajectory, no additional optimal control problems need to be solved as all the trajectories, by construction, satisfy Pontryagin's minimum principle and the relevant transversality conditions. We then consider deep feed forward neural networks and benchmark three learning methods on the created dataset: policy imitation, value function learning and value function gradient learning. Our results are shown for the case of the interplanetary trajectory optimization problem of reaching Venus orbit, with the nominal trajectory starting from the Earth. We find that both policy imitation and value function gradient learning are able to learn the optimal state feedback, while in the case of value function learning the optimal policy is not captured, only the final value of the optimal propellant mass is.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
Experimental observation of proton bunch modulation in a plasma, at varying plasma densities
Authors:
E. Adli,
A. Ahuja,
O. Apsimon,
R. Apsimon,
A. -M. Bachmann,
D. Barrientos,
M. M. Barros,
J. Batkiewicz,
F. Batsch,
J. Bauche,
V. K. Berglyd Olsen,
M. Bernardini,
B. Biskup,
A. Boccardi,
T. Bogey,
T. Bohl,
C. Bracco,
F. Braunmüller,
S. Burger,
G. Burt,
S. Bustamante,
B. Buttenschön,
A. Caldwell,
M. Cascella,
J. Chappell
, et al. (87 additional authors not shown)
Abstract:
We give direct experimental evidence for the observation of the full transverse self-modulation of a relativistic proton bunch propagating through a dense plasma. The bunch exits the plasma with a density modulation resulting from radial wakefield effects with a period reciprocal to the plasma frequency. We show that the modulation is seeded by using an intense laser pulse co-propagating with the…
▽ More
We give direct experimental evidence for the observation of the full transverse self-modulation of a relativistic proton bunch propagating through a dense plasma. The bunch exits the plasma with a density modulation resulting from radial wakefield effects with a period reciprocal to the plasma frequency. We show that the modulation is seeded by using an intense laser pulse co-propagating with the proton bunch which creates a relativistic ionization front within the bunch. We show by varying the plasma density over one order of magnitude that the modulation period scales with the expected dependence on the plasma density.
△ Less
Submitted 1 April, 2019; v1 submitted 12 September, 2018;
originally announced September 2018.
-
Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry
Authors:
Tyler Kaczmarek,
Ercan Ozturk,
Gene Tsudik
Abstract:
As a warm-blooded mammalian species, we humans routinely leave thermal residues on various objects with which we come in contact. This includes common input devices, such as keyboards, that are used for entering (among other things) secret information, such as passwords and PINs. Although thermal residue dissipates over time, there is always a certain time window during which thermal energy readin…
▽ More
As a warm-blooded mammalian species, we humans routinely leave thermal residues on various objects with which we come in contact. This includes common input devices, such as keyboards, that are used for entering (among other things) secret information, such as passwords and PINs. Although thermal residue dissipates over time, there is always a certain time window during which thermal energy readings can be harvested from input devices to recover recently entered, and potentially sensitive, information. To-date, there has been no systematic investigation of thermal profiles of keyboards, and thus no efforts have been made to secure them. This serves as our main motivation for constructing a means for password harvesting from keyboard thermal emanations. Specifically, we introduce Thermanator, a new post factum insider attack based on heat transfer caused by a user typing a password on a typical external keyboard. We conduct and describe a user study that collected thermal residues from 30 users entering 10 unique passwords (both weak and strong) on 4 popular commodity keyboards. Results show that entire sets of key-presses can be recovered by non-expert users as late as 30 seconds after initial password entry, while partial sets can be recovered as late as 1 minute after entry. Furthermore, we find that Hunt-and-Peck typists are particularly vulnerable. We also discuss some Thermanator mitigation strategies. The main take-away of this work is three-fold: (1) using external keyboards to enter (already much-maligned) passwords is even less secure than previously recognized, (2) post factum (planned or impromptu) thermal imaging attacks are realistic, and finally (3) perhaps it is time to either stop using keyboards for password entry, or abandon passwords altogether.
△ Less
Submitted 10 July, 2018; v1 submitted 26 June, 2018;
originally announced June 2018.
-
Well-posedness and Global Attractors for Viscous Fractional Cahn-Hilliard Equations with Memory
Authors:
Eylem Öztürk,
Joseph L. Shomberg
Abstract:
We examine a viscous Cahn-Hilliard phase-separation model with memory and where the chemical potential possesses a nonlocal fractional Laplacian operator. The existence of global weak solutions is proven using a Galerkin approximation scheme. A continuous dependence estimate provides uniqueness of the weak solutions and also serves to define a precompact pseudometric. This, in addition to the exis…
▽ More
We examine a viscous Cahn-Hilliard phase-separation model with memory and where the chemical potential possesses a nonlocal fractional Laplacian operator. The existence of global weak solutions is proven using a Galerkin approximation scheme. A continuous dependence estimate provides uniqueness of the weak solutions and also serves to define a precompact pseudometric. This, in addition to the existence of a bounded absorbing set, shows that the associated semigroup of solution operators admits a compact connected global attractor in the weak energy phase space. The minimal assumptions on the nonlinear potential allow for arbitrary polynomial growth.
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
Existence and Behavior Results For a Nonlocal Nonlinear Parabolic Equation With Variable Exponent
Authors:
Ugur Sert,
Eylem Ozturk
Abstract:
In this paper, we study the solvability of a Cauchy- Dirichlet problem for nonlinear parabolic equation with non standard growths and nonlocal terms. We show the existence of weak solutions of the considered problem under more general conditions. In addition, we obtain some results on the behavior of the solution when the problem is homogeneous.
In this paper, we study the solvability of a Cauchy- Dirichlet problem for nonlinear parabolic equation with non standard growths and nonlocal terms. We show the existence of weak solutions of the considered problem under more general conditions. In addition, we obtain some results on the behavior of the solution when the problem is homogeneous.
△ Less
Submitted 28 February, 2018;
originally announced February 2018.
-
Prediction of the Optimal Threshold Value in DF Relay Selection Schemes Based on Artificial Neural Networks
Authors:
Ferdi Kara,
Hakan Kaya,
Okan Erkaymaz,
Ertan Ozturk
Abstract:
In wireless communications, the cooperative communication (CC) technology promises performance gains compared to traditional Single-Input Single Output (SISO) techniques. Therefore, the CC technique is one of the nominees for 5G networks. In the Decode-and-Forward (DF) relaying scheme which is one of the CC techniques, determination of the threshold value at the relay has a key role for the system…
▽ More
In wireless communications, the cooperative communication (CC) technology promises performance gains compared to traditional Single-Input Single Output (SISO) techniques. Therefore, the CC technique is one of the nominees for 5G networks. In the Decode-and-Forward (DF) relaying scheme which is one of the CC techniques, determination of the threshold value at the relay has a key role for the system performance and power usage. In this paper, we propose prediction of the optimal threshold values for the best relay selection scheme in cooperative communications, based on Artificial Neural Networks (ANNs) for the first time in literature. The average link qualities and number of relays have been used as inputs in the prediction of optimal threshold values using Artificial Neural Networks (ANNs): Multi-Layer Perceptron (MLP) and Radial Basis Function (RBF) networks. The MLP network has better performance from the RBF network on the prediction of optimal threshold value when the same number of neurons is used at the hidden layer for both networks. Besides, the optimal threshold values obtained using ANNs are verified by the optimal threshold values obtained numerically using the closed form expression derived for the system. The results show that the optimal threshold values obtained by ANNs on the best relay selection scheme provide a minimum Bit-Error-Rate (BER) because of the reduction of the probability that error propagation may occur. Also, for the same BER performance goal, prediction of optimal threshold values provides 2dB less power usage, which is great gain in terms of green communicationBER performance goal, prediction of optimal threshold values provides 2dB less power usage, which is great gain in terms of green communication.
△ Less
Submitted 18 January, 2018;
originally announced January 2018.
-
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Authors:
Tyler Kaczmarek,
Ercan Ozturk,
Gene Tsudik
Abstract:
Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are…
▽ More
Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are well suited for continuous, and sometimes more unobtrusive, operation. One important application domain for biometrics is deauthentication, a means of quickly detecting absence of a previously authenticated user and immediately terminating that user's active secure sessions. Deauthentication is crucial for mitigating so called Lunchtime Attacks, whereby an insider adversary takes over (before any inactivity timeout kicks in) authenticated state of a careless user who walks away from her computer. Motivated primarily by the need for an unobtrusive and continuous biometric to support effective deauthentication, we introduce PoPa, a new hybrid biometric based on a human user's seated posture pattern. PoPa captures a unique combination of physiological and behavioral traits. We describe a low cost fully functioning prototype that involves an office chair instrumented with 16 tiny pressure sensors. We also explore (via user experiments) how PoPa can be used in a typical workplace to provide continuous authentication (and deauthentication) of users. We experimentally assess viability of PoPa in terms of uniqueness by collecting and evaluating posture patterns of a cohort of users. Results show that PoPa exhibits very low false positive, and even lower false negative, rates. In particular, users can be identified with, on average, 91.0% accuracy. Finally, we compare pros and cons of PoPa with those of several prominent biometric based deauthentication techniques.
△ Less
Submitted 13 August, 2017;
originally announced August 2017.
-
AWAKE readiness for the study of the seeded self-modulation of a 400\,GeV proton bunch
Authors:
P. Muggli,
E. Adli,
R. Apsimon,
F. Asmus,
R. Baartman,
A. -M. Bachmann,
M. Barros Marin,
F. Batsch,
J. Bauche,
V. K. Berglyd Olsen,
M. Bernardini,
B. Biskup,
A. Boccardi,
T. Bogey,
T. Bohl,
C. Bracco,
F. Braunmuller,
S. Burger,
G. Burt,
S. Bustamante,
B. Buttenschon,
A. Butterworth,
A. Caldwell,
M. Cascella,
E. Chevallay
, et al. (82 additional authors not shown)
Abstract:
AWAKE is a proton-driven plasma wakefield acceleration experiment. % We show that the experimental setup briefly described here is ready for systematic study of the seeded self-modulation of the 400\,GeV proton bunch in the 10\,m-long rubidium plasma with density adjustable from 1 to 10$\times10^{14}$\,cm$^{-3}$. % We show that the short laser pulse used for ionization of the rubidium vapor propag…
▽ More
AWAKE is a proton-driven plasma wakefield acceleration experiment. % We show that the experimental setup briefly described here is ready for systematic study of the seeded self-modulation of the 400\,GeV proton bunch in the 10\,m-long rubidium plasma with density adjustable from 1 to 10$\times10^{14}$\,cm$^{-3}$. % We show that the short laser pulse used for ionization of the rubidium vapor propagates all the way along the column, suggesting full ionization of the vapor. % We show that ionization occurs along the proton bunch, at the laser time and that the plasma that follows affects the proton bunch. %
△ Less
Submitted 3 August, 2017;
originally announced August 2017.