-
Deep Learning for Spectrum Prediction in Cognitive Radio Networks: State-of-the-Art, New Opportunities, and Challenges
Authors:
Guangliang Pan,
David K. Y. Yau,
Bo Zhou,
Qihui Wu
Abstract:
Spectrum prediction is considered to be a promising technology that enhances spectrum efficiency by assisting dynamic spectrum access (DSA) in cognitive radio networks (CRN). Nonetheless, the highly nonlinear nature of spectrum data across time, frequency, and space domains, coupled with the intricate spectrum usage patterns, poses challenges for accurate spectrum prediction. Deep learning (DL), r…
▽ More
Spectrum prediction is considered to be a promising technology that enhances spectrum efficiency by assisting dynamic spectrum access (DSA) in cognitive radio networks (CRN). Nonetheless, the highly nonlinear nature of spectrum data across time, frequency, and space domains, coupled with the intricate spectrum usage patterns, poses challenges for accurate spectrum prediction. Deep learning (DL), recognized for its capacity to extract nonlinear features, has been applied to solve these challenges. This paper first shows the advantages of applying DL by comparing with traditional prediction methods. Then, the current state-of-the-art DL-based spectrum prediction techniques are reviewed and summarized in terms of intra-band and crossband prediction. Notably, this paper uses a real-world spectrum dataset to prove the advancements of DL-based methods. Then, this paper proposes a novel intra-band spatiotemporal spectrum prediction framework named ViTransLSTM. This framework integrates visual self-attention and long short-term memory to capture both local and global long-term spatiotemporal dependencies of spectrum usage patterns. Similarly, the effectiveness of the proposed framework is validated on the aforementioned real-world dataset. Finally, the paper presents new related challenges and potential opportunities for future research.
△ Less
Submitted 12 December, 2024;
originally announced December 2024.
-
Spectrum Prediction With Deep 3D Pyramid Vision Transformer Learning
Authors:
Guangliang Pan,
Qihui Wu,
Bo Zhou,
Jie Li,
Wei Wang,
Guoru Ding,
David K. Y. Yau
Abstract:
In this paper, we propose a deep learning (DL)-based task-driven spectrum prediction framework, named DeepSPred. The DeepSPred comprises a feature encoder and a task predictor, where the encoder extracts spectrum usage pattern features, and the predictor configures different networks according to the task requirements to predict future spectrum. Based on the Deep- SPred, we first propose a novel 3…
▽ More
In this paper, we propose a deep learning (DL)-based task-driven spectrum prediction framework, named DeepSPred. The DeepSPred comprises a feature encoder and a task predictor, where the encoder extracts spectrum usage pattern features, and the predictor configures different networks according to the task requirements to predict future spectrum. Based on the Deep- SPred, we first propose a novel 3D spectrum prediction method combining a flow processing strategy with 3D vision Transformer (ViT, i.e., Swin) and a pyramid to serve possible applications such as spectrum monitoring task, named 3D-SwinSTB. 3D-SwinSTB unique 3D Patch Merging ViT-to-3D ViT Patch Expanding and pyramid designs help the model accurately learn the potential correlation of the evolution of the spectrogram over time. Then, we propose a novel spectrum occupancy rate (SOR) method by redesigning a predictor consisting exclusively of 3D convolutional and linear layers to serve possible applications such as dynamic spectrum access (DSA) task, named 3D-SwinLinear. Unlike the 3D-SwinSTB output spectrogram, 3D-SwinLinear projects the spectrogram directly as the SOR. Finally, we employ transfer learning (TL) to ensure the applicability of our two methods to diverse spectrum services. The results show that our 3D-SwinSTB outperforms recent benchmarks by more than 5%, while our 3D-SwinLinear achieves a 90% accuracy, with a performance improvement exceeding 10%.
△ Less
Submitted 20 August, 2024; v1 submitted 13 August, 2024;
originally announced August 2024.
-
Unleashing the Power of Unlabeled Data: A Self-supervised Learning Framework for Cyber Attack Detection in Smart Grids
Authors:
Hanyu Zeng,
Pengfei Zhou,
Xin Lou,
Zhen Wei Ng,
David K. Y. Yau,
Marianne Winslett
Abstract:
Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and ide…
▽ More
Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and identify various types of cyber attacks. Different from existing approaches, the proposed framework does not rely on large amounts of well-curated labeled data but makes use of the massive unlabeled data in the wild which are easily accessible. Specifically, the proposed framework adopts the BERT model from the natural language processing domain and learns generalizable and effective representations from the unlabeled sensing data, which capture the distinctive patterns of different attacks. Using the learned representations, together with a very small amount of labeled data, we can train a task-specific classifier to detect various types of cyber attacks. Meanwhile, real-world training datasets are usually imbalanced, i.e., there are only a limited number of data samples containing attacks. In order to cope with such data imbalance, we propose a new loss function, separate mean error (SME), which pays equal attention to the large and small categories to better train the model. Experiment results in a 5-area power grid system with 37 buses demonstrate the superior performance of our framework over existing approaches, especially when a very limited portion of labeled data are available, e.g., as low as 0.002\%. We believe such a framework can be easily adopted to detect a variety of cyber attacks in other power grid scenarios.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
May's Conjecture on Bimonoidal Functors and Multiplicative Infinite Loop Space Theory
Authors:
Donald Yau
Abstract:
A conjecture of May states that there is an up-to-adjunction strictification of symmetric bimonoidal functors between bipermutative categories. The main result of this paper proves a weaker form of May's conjecture that starts with multiplicatively strong symmetric bimonoidal functors. As the main application, for May's multiplicative infinite loop space machine from bipermutative categories to ei…
▽ More
A conjecture of May states that there is an up-to-adjunction strictification of symmetric bimonoidal functors between bipermutative categories. The main result of this paper proves a weaker form of May's conjecture that starts with multiplicatively strong symmetric bimonoidal functors. As the main application, for May's multiplicative infinite loop space machine from bipermutative categories to either E-infinity ring spaces or E-infinity ring spectra, multiplicatively strong symmetric bimonoidal functors can be replaced by strict symmetric bimonoidal functors.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Multifunctorial Equivariant Algebraic K-Theory
Authors:
Donald Yau
Abstract:
A central question in equivariant algebraic K-theory asks whether there exists an equivariant K-theory machine from genuine symmetric monoidal G-categories to orthogonal G-spectra that preserves equivariant algebraic structures. We answer this question positively by constructing an enriched multifunctor K from the G-categorically enriched multicategory of O-pseudoalgebras to the symmetric monoidal…
▽ More
A central question in equivariant algebraic K-theory asks whether there exists an equivariant K-theory machine from genuine symmetric monoidal G-categories to orthogonal G-spectra that preserves equivariant algebraic structures. We answer this question positively by constructing an enriched multifunctor K from the G-categorically enriched multicategory of O-pseudoalgebras to the symmetric monoidal category of orthogonal G-spectra, for a compact Lie group G and a 1-connected pseudo-commutative G-categorical operad O. As the main application of its enriched multifunctoriality, K preserves all equivariant algebraic structures parametrized by multicategories enriched in either G-spaces or G-categories. For example, for a finite group G and the G-Barratt-Eccles operad, K transports equivariant E-infinity algebras, in the sense of Guillou-May or Blumberg-Hill, of genuine symmetric monoidal G-categories to equivariant E-infinity algebras of orthogonal G-spectra.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Spatial-Temporal Graph Representation Learning for Tactical Networks Future State Prediction
Authors:
Junhua Liu,
Justin Albrethsen,
Lincoln Goh,
David Yau,
Kwan Hui Lim
Abstract:
Resource allocation in tactical ad-hoc networks presents unique challenges due to their dynamic and multi-hop nature. Accurate prediction of future network connectivity is essential for effective resource allocation in such environments. In this paper, we introduce the Spatial-Temporal Graph Encoder-Decoder (STGED) framework for Tactical Communication Networks that leverages both spatial and tempo…
▽ More
Resource allocation in tactical ad-hoc networks presents unique challenges due to their dynamic and multi-hop nature. Accurate prediction of future network connectivity is essential for effective resource allocation in such environments. In this paper, we introduce the Spatial-Temporal Graph Encoder-Decoder (STGED) framework for Tactical Communication Networks that leverages both spatial and temporal features of network states to learn latent tactical behaviors effectively. STGED hierarchically utilizes graph-based attention mechanism to spatially encode a series of communication network states, leverages a recurrent neural network to temporally encode the evolution of states, and a fully-connected feed-forward network to decode the connectivity in the future state. Through extensive experiments, we demonstrate that STGED consistently outperforms baseline models by large margins across different time-steps input, achieving an accuracy of up to 99.2\% for the future state prediction task of tactical communication networks.
△ Less
Submitted 14 July, 2024; v1 submitted 20 March, 2024;
originally announced March 2024.
-
A Testbed To Study Adversarial Cyber-Attack Strategies in Enterprise Networks
Authors:
Ayush Kumar,
David K. Yau
Abstract:
In this work, we propose a testbed environment to capture the attack strategies of an adversary carrying out a cyber-attack on an enterprise network. The testbed contains nodes with known security vulnerabilities which can be exploited by hackers. Participants can be invited to play the role of a hacker (e.g., black-hat, hacktivist) and attack the testbed. The testbed is designed such that there a…
▽ More
In this work, we propose a testbed environment to capture the attack strategies of an adversary carrying out a cyber-attack on an enterprise network. The testbed contains nodes with known security vulnerabilities which can be exploited by hackers. Participants can be invited to play the role of a hacker (e.g., black-hat, hacktivist) and attack the testbed. The testbed is designed such that there are multiple attack pathways available to hackers. We describe the working of the testbed components and discuss its implementation on a VMware ESXi server. Finally, we subject our testbed implementation to a few well-known cyber-attack strategies, collect data during the process and present our analysis of the data.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
The Grothendieck Construction of Bipermutative-Indexed Categories and Pseudo Symmetric Inverse K-Theory
Authors:
Donald Yau
Abstract:
The Grothendieck construction is a fundamental link between indexed categories and opfibrations. This work is a detailed study of the Grothendieck construction over a small tight bipermutative category in the context of Cat-enriched multicategories, with applications to inverse K-theory and pseudo symmetric E-infinity-algebras.
The ordinary Grothendieck construction over a small category C is a…
▽ More
The Grothendieck construction is a fundamental link between indexed categories and opfibrations. This work is a detailed study of the Grothendieck construction over a small tight bipermutative category in the context of Cat-enriched multicategories, with applications to inverse K-theory and pseudo symmetric E-infinity-algebras.
The ordinary Grothendieck construction over a small category C is a 2-equivalence that sends a C-indexed category to an opfibration over C. We show that the Grothendieck construction over a small tight bipermutative category D is a pseudo symmetric Cat-multifunctor that is generally not a Cat-multifunctor in the symmetric sense. When the projection to D is taken into account, we prove that the Grothendieck construction over D lifts to a non-symmetric Cat-multiequivalence whose codomain is a non-symmetric Cat-multicategory with small permutative opfibrations over D as objects.
As applications we show that inverse K-theory, from Gamma-categories to small permutative categories, is a pseudo symmetric Cat-multifunctor but not a Cat-multifunctor in the symmetric sense. It follows that inverse K-theory preserves algebraic structures parametrized by non-symmetric and pseudo symmetric Cat-multifunctors but not Cat-multifunctors in general. As a special case, we observe that inverse K-theory sends pseudo symmetric E-infinity-algebras in Gamma-categories to pseudo symmetric E-infinity-algebras in small permutative categories.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
Homotopy Theory of Enriched Mackey Functors
Authors:
Niles Johnson,
Donald Yau
Abstract:
Mackey functors provide the coefficient systems for equivariant cohomology theories. More generally, enriched presheaf categories provide a classification and organization for many stable model categories of interest. Changing enrichments along $K$-theory multifunctors provides an important tool for constructing spectral Mackey functors from Mackey functors enriched in algebraic structures such as…
▽ More
Mackey functors provide the coefficient systems for equivariant cohomology theories. More generally, enriched presheaf categories provide a classification and organization for many stable model categories of interest. Changing enrichments along $K$-theory multifunctors provides an important tool for constructing spectral Mackey functors from Mackey functors enriched in algebraic structures such as permutative categories.
This work gives a detailed development of diagrams, presheaves, and Mackey functors enriched over closed multicategories. Change of enrichment, including the relevant compositionality, is treated with care. This framework is applied to the homotopy theory of enriched diagram and Mackey functor categories, including equivalences of homotopy theories induced by $K$-theory multifunctors. Particular applications of interest include diagrams and Mackey functors enriched in pointed multicategories, permutative categories, and symmetric spectra.
△ Less
Submitted 4 December, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Multifunctorial $K$-Theory is an Equivalence of Homotopy Theories
Authors:
Niles Johnson,
Donald Yau
Abstract:
We show that each of the three $K$-theory multifunctors from small permutative categories to $\mathcal{G}_*$-categories, $\mathcal{G}_*$-simplicial sets, and connective spectra, is an equivalence of homotopy theories. For each of these $K$-theory multifunctors, we describe an explicit homotopy inverse functor. As a separate application of our general results about pointed diagram categories, we ob…
▽ More
We show that each of the three $K$-theory multifunctors from small permutative categories to $\mathcal{G}_*$-categories, $\mathcal{G}_*$-simplicial sets, and connective spectra, is an equivalence of homotopy theories. For each of these $K$-theory multifunctors, we describe an explicit homotopy inverse functor. As a separate application of our general results about pointed diagram categories, we observe that the right-induced homotopy theory of Bohmann-Osorno $\mathcal{E}_*$-categories is equivalent to the homotopy theory of pointed simplicial categories.
△ Less
Submitted 4 October, 2022; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Homotopy Equivalent Algebraic Structures in Multicategories and Permutative Categories
Authors:
Niles Johnson,
Donald Yau
Abstract:
We show that the free construction from multicategories to permutative categories is a categorically-enriched non-symmetric multifunctor. Our main result then shows that the induced functor between categories of algebras is an equivalence of homotopy theories. We describe an application to ring categories.
We show that the free construction from multicategories to permutative categories is a categorically-enriched non-symmetric multifunctor. Our main result then shows that the induced functor between categories of algebras is an equivalence of homotopy theories. We describe an application to ring categories.
△ Less
Submitted 4 October, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
Multicategories Model All Connective Spectra
Authors:
Niles Johnson,
Donald Yau
Abstract:
There is a free construction from multicategories to permutative categories, left adjoint to the endomorphism multicategory construction. The main result shows that these functors induce an equivalence of homotopy theories. This result extends a similar result of Thomason, that permutative categories model all connective spectra.
There is a free construction from multicategories to permutative categories, left adjoint to the endomorphism multicategory construction. The main result shows that these functors induce an equivalence of homotopy theories. This result extends a similar result of Thomason, that permutative categories model all connective spectra.
△ Less
Submitted 19 March, 2022; v1 submitted 16 November, 2021;
originally announced November 2021.
-
Multifunctorial Inverse $K$-Theory
Authors:
Niles Johnson,
Donald Yau
Abstract:
We show that Mandell's inverse $K$-theory functor is a categorically-enriched non-symmetric multifunctor. In particular, it preserves algebraic structures parametrized by non-symmetric operads. As applications, we describe how ring categories arise as the images of inverse $K$-theory.
We show that Mandell's inverse $K$-theory functor is a categorically-enriched non-symmetric multifunctor. In particular, it preserves algebraic structures parametrized by non-symmetric operads. As applications, we describe how ring categories arise as the images of inverse $K$-theory.
△ Less
Submitted 15 July, 2022; v1 submitted 3 September, 2021;
originally announced September 2021.
-
Bimonoidal Categories, $E_n$-Monoidal Categories, and Algebraic $K$-Theory
Authors:
Niles Johnson,
Donald Yau
Abstract:
Bimonoidal categories are categorical analogues of rings without additive inverses. They have been actively studied in category theory, homotopy theory, and algebraic $K$-theory since around 1970. There is an abundance of new applications and questions of bimonoidal categories in mathematics and other sciences. This work provides a unified treatment of bimonoidal and higher ring-like categories, t…
▽ More
Bimonoidal categories are categorical analogues of rings without additive inverses. They have been actively studied in category theory, homotopy theory, and algebraic $K$-theory since around 1970. There is an abundance of new applications and questions of bimonoidal categories in mathematics and other sciences. This work provides a unified treatment of bimonoidal and higher ring-like categories, their connection with algebraic $K$-theory and homotopy theory, and applications to quantum groups and topological quantum computation. With ample background material, extensive coverage, detailed presentation of both well-known and new theorems, and a list of open questions, this work is a user friendly resource for beginners and experts alike.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
Proposal of a FET-LET Hybrid 6T SRAM
Authors:
Antardipan Pal,
Yong Zhang,
Dennis D. Yau
Abstract:
There is an extremely high demand for a high speed, low power, low leakage, and low noise Static Random-Access Memory (SRAM) for high performance cache memories. The energy efficiency of SRAM is of paramount importance in both high performance and ultralow-power portable, battery operated electronic systems. In this article the factors affecting the over-all speed and total energy consumption of a…
▽ More
There is an extremely high demand for a high speed, low power, low leakage, and low noise Static Random-Access Memory (SRAM) for high performance cache memories. The energy efficiency of SRAM is of paramount importance in both high performance and ultralow-power portable, battery operated electronic systems. In this article the factors affecting the over-all speed and total energy consumption of a conventional 6T SRAM cell/array with 6 FETs, particularly roles of access tran-sistors are analyzed to highlight the needs and directions for improvement. A hybrid 6T SRAM with two access FETs being replaced by light-effect transistors (LETs) and the electrical word lines replaced by optical waveguides (OWGs) is proposed. This hybrid SRAM is analyzed to reveal its potential in im-provement of the switching speed and thus total energy con-sumption over the conventional 6T SRAM. Numerical analyses of a prototype hybrid SRAM array of 64 KB show a factor of 7 and 34 reduction in read delay and read energy consumption, respectively; and 4 and 6 in write delay and write energy con-sumption, respectively, when the access FETs are replaced by LETs. The potential impacts on the peripheral and assist cir-cuits due to this hybrid structure and application of the LETs there are also briefly discussed.
△ Less
Submitted 4 December, 2020; v1 submitted 23 June, 2020;
originally announced June 2020.
-
2-Dimensional Categories
Authors:
Niles Johnson,
Donald Yau
Abstract:
This book is an introduction to 2-categories and bicategories, assuming only the most elementary aspects of category theory. A review of basic category theory is followed by a systematic discussion of 2-/bicategories, pasting diagrams, lax functors, 2-/bilimits, the Duskin nerve, 2-nerve, adjunctions and monads in bicategories, 2-monads, biequivalences, the Bicategorical Yoneda Lemma, and the Cohe…
▽ More
This book is an introduction to 2-categories and bicategories, assuming only the most elementary aspects of category theory. A review of basic category theory is followed by a systematic discussion of 2-/bicategories, pasting diagrams, lax functors, 2-/bilimits, the Duskin nerve, 2-nerve, adjunctions and monads in bicategories, 2-monads, biequivalences, the Bicategorical Yoneda Lemma, and the Coherence Theorem for bicategories. Grothendieck fibrations and the Grothendieck construction are discussed next, followed by tricategories, monoidal bicategories, the Gray tensor product, and double categories. Completely detailed proofs of several fundamental but hard-to-find results are presented for the first time. With exercises and plenty of motivation and explanation, this book is useful for both beginners and experts.
△ Less
Submitted 17 June, 2020; v1 submitted 14 February, 2020;
originally announced February 2020.
-
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
Authors:
Zhenyong Zhang,
Ruilong Deng,
David K. Y. Yau,
Peng Cheng,
Jiming Chen
Abstract:
Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment of MTD, it is still possible for the attacker to launch stealthy FDI attacks generated with former branch susceptances. In this paper, we prove tha…
▽ More
Recent studies have considered thwarting false data injection (FDI) attacks against state estimation in power grids by proactively perturbing branch susceptances. This approach is known as moving target defense (MTD). However, despite of the deployment of MTD, it is still possible for the attacker to launch stealthy FDI attacks generated with former branch susceptances. In this paper, we prove that, an MTD has the capability to thwart all FDI attacks constructed with former branch susceptances only if (i) the number of branches $l$ in the power system is not less than twice that of the system states $n$ (i.e., $l \geq 2n$, where $n + 1$ is the number of buses); (ii) the susceptances of more than $n$ branches, which cover all buses, are perturbed. Moreover, we prove that the state variable of a bus that is only connected by a single branch (no matter it is perturbed or not) can always be modified by the attacker. Nevertheless, in order to reduce the attack opportunities of potential attackers, we first exploit the impact of the susceptance perturbation magnitude on the dimension of the \emph{stealthy attack space}, in which the attack vector is constructed with former branch susceptances. Then, we propose that, by perturbing an appropriate set of branches, we can minimize the dimension of the \emph{stealthy attack space} and maximize the number of covered buses. Besides, we consider the increasing operation cost caused by the activation of MTD. Finally, we conduct extensive simulations to illustrate our findings with IEEE standard test power systems.
△ Less
Submitted 24 December, 2019;
originally announced December 2019.
-
Quillen's Theorem A and the Whitehead theorem for bicategories
Authors:
Niles Johnson,
Donald Yau
Abstract:
We prove a bicategorical analogue of Quillen's Theorem A. As an application, we deduce the well-known result that a pseudofunctor is a biequivalence if and only if it is essentially surjective on objects, essentially full on 1-cells, and fully faithful on 2-cells.
We prove a bicategorical analogue of Quillen's Theorem A. As an application, we deduce the well-known result that a pseudofunctor is a biequivalence if and only if it is essentially surjective on objects, essentially full on 1-cells, and fully faithful on 2-cells.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
A bicategorical pasting theorem
Authors:
Niles Johnson,
Donald Yau
Abstract:
We provide an elementary proof of a bicategorical pasting theorem that does not rely on Power's 2-categorical pasting theorem, the bicategorical coherence theorem, or the local characterization of a biequivalence.
We provide an elementary proof of a bicategorical pasting theorem that does not rely on Power's 2-categorical pasting theorem, the bicategorical coherence theorem, or the local characterization of a biequivalence.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
Modular operads and the nerve theorem
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
We describe a category of undirected graphs which comes equipped with a faithful functor into the category of (colored) modular operads. The associated singular functor from modular operads to presheaves is fully faithful, and its essential image can be classified by a Segal condition. This theorem can be used to recover a related statement, due to André Joyal and Joachim Kock, concerning a larger…
▽ More
We describe a category of undirected graphs which comes equipped with a faithful functor into the category of (colored) modular operads. The associated singular functor from modular operads to presheaves is fully faithful, and its essential image can be classified by a Segal condition. This theorem can be used to recover a related statement, due to André Joyal and Joachim Kock, concerning a larger category of undirected graphs whose functor to modular operads is not just faithful but also full.
△ Less
Submitted 26 April, 2020; v1 submitted 3 June, 2019;
originally announced June 2019.
-
A graphical category for higher modular operads
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
We present a homotopy theory for a weak version of modular operads whose compositions and contractions are only defined up to homotopy. This homotopy theory takes the form of a Quillen model structure on the collection of simplicial presheaves for a certain category of undirected graphs. This new category of undirected graphs, denoted $\mathbf{U}$, plays a similar role for modular operads that the…
▽ More
We present a homotopy theory for a weak version of modular operads whose compositions and contractions are only defined up to homotopy. This homotopy theory takes the form of a Quillen model structure on the collection of simplicial presheaves for a certain category of undirected graphs. This new category of undirected graphs, denoted $\mathbf{U}$, plays a similar role for modular operads that the dendroidal category $Ω$ plays for operads. We carefully study properties of $\mathbf{U}$, including the existence of certain factorization systems. Related structures, such as cyclic operads and stable modular operads, can be similarly treated using categories derived from $\mathbf{U}$.
△ Less
Submitted 31 December, 2019; v1 submitted 3 June, 2019;
originally announced June 2019.
-
Performance and Resilience of Cyber-Physical Control Systems with Reactive Attack Mitigation
Authors:
Subhash Lakshminarayana,
Jabir Shabbir Karachiwala,
Teo Zhan Teng,
Rui Tan,
David K. Y. Yau
Abstract:
This paper studies the performance and resilience of a linear cyber-physical control system (CPCS) with attack detection and reactive attack mitigation in the context of power grids. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the power system. The results provide basic understanding about the limit of the at…
▽ More
This paper studies the performance and resilience of a linear cyber-physical control system (CPCS) with attack detection and reactive attack mitigation in the context of power grids. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the power system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. We apply the proposed framework to the voltage control system of power grids and run extensive simulations using PowerWorld. The results show that our framework can accurately characterize the maximum state estimation errors caused by an attacker who carefully designs the attack sequence to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation. Moreover, based on the proposed framework, we analyze the impact of false positives and negatives in detecting attacks on the system performance. The results are important for the system defenders in the joint design of attack detection and mitigation to reduce the impact of these attack detection errors.Finally, as MDP solutions are not scalable for high-dimensional systems, we apply Q-learning with linear and non-linear (neural networks based) function approximators to solve the attacker's problem in these systems and compare their performances.
△ Less
Submitted 20 April, 2019;
originally announced April 2019.
-
Infinity Operads and Monoidal Categories with Group Equivariance
Authors:
Donald Yau
Abstract:
This monograph provides a coherent development of operads, infinity operads, and monoidal categories, equipped with equivariant structures encoded by an action operad. A group operad is a planar operad with an action operad equivariant structure. In the first three parts of this monograph, we establish a foundation for group operads and for their higher coherent analogues called infinity group ope…
▽ More
This monograph provides a coherent development of operads, infinity operads, and monoidal categories, equipped with equivariant structures encoded by an action operad. A group operad is a planar operad with an action operad equivariant structure. In the first three parts of this monograph, we establish a foundation for group operads and for their higher coherent analogues called infinity group operads. Examples include planar, symmetric, braided, ribbon, and cactus operads, and their infinity analogues. For example, with the tools developed here, we observe that the coherent ribbon nerve of the universal cover of the framed little 2-disc operad is an infinity ribbon operad.
In Part 4 we define general monoidal categories equipped with an action operad equivariant structure, and provide a unifying treatment of coherence and strictification for them. Examples of such monoidal categories include symmetric, braided, ribbon, and coboundary monoidal categories, which naturally arise in the representation theory of quantum groups and of coboundary Hopf algebras and in the theory of crystals of finite dimensional complex reductive Lie algebras. Many illustrations and examples are included. Assuming only basic category theory, this monograph is intended for graduate students and researchers. In addition to being a coherent reference for the topics covered, this book is also suitable for a graduate student seminar and a reading course.
△ Less
Submitted 9 March, 2019;
originally announced March 2019.
-
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
Authors:
Subhash Lakshminarayana,
Jabir Shabbir Karachiwala,
Sang-Yoon Chang,
Girish Revadigar,
Sristi Lakshmi Sravana Kumar,
David K. Y. Yau,
Yih-Chun Hu
Abstract:
We study the impact of signal jamming attacks against the communication based train control (CBTC) systems and develop the countermeasures to limit the attacks' impact. CBTC supports the train operation automation and moving-block signaling, which improves the transport efficiency. We consider an attacker jamming the wireless communication between the trains or the train to wayside access point, w…
▽ More
We study the impact of signal jamming attacks against the communication based train control (CBTC) systems and develop the countermeasures to limit the attacks' impact. CBTC supports the train operation automation and moving-block signaling, which improves the transport efficiency. We consider an attacker jamming the wireless communication between the trains or the train to wayside access point, which can disable CBTC and the corresponding benefits. In contrast to prior work studying jamming only at the physical or link layer, we study the real impact of such attacks on end users, namely train journey time and passenger congestion. Our analysis employs a detailed model of leaky medium-based communication system (leaky waveguide or leaky feeder/coaxial cable) popularly used in CBTC systems. To counteract the jamming attacks, we develop a mitigation approach based on frequency hopping spread spectrum taking into account domain-specific structure of the leaky-medium CBTC systems. Specifically, compared with existing implementations of FHSS, we apply FHSS not only between the transmitter-receiver pair but also at the track-side repeaters. To demonstrate the feasibility of implementing this technology in CBTC systems, we develop a FHSS repeater prototype using software-defined radios on both leaky-medium and open-air (free-wave) channels. We perform extensive simulations driven by realistic running profiles of trains and real-world passenger data to provide insights into the jamming attack's impact and the effectiveness of the proposed countermeasure.
△ Less
Submitted 5 August, 2018;
originally announced August 2018.
-
Comonadic Coalgebras and Bousfield Localization
Authors:
David White,
Donald Yau
Abstract:
For a model category, we prove that taking the category of coalgebras over a comonad commutes with left Bousfield localization in a suitable sense. Then we prove a general existence result for the left-induced model structure on the category of coalgebras over a comonad in a left Bousfield localization. Next we provide several equivalent characterizations of when a left Bousfield localization pres…
▽ More
For a model category, we prove that taking the category of coalgebras over a comonad commutes with left Bousfield localization in a suitable sense. Then we prove a general existence result for the left-induced model structure on the category of coalgebras over a comonad in a left Bousfield localization. Next we provide several equivalent characterizations of when a left Bousfield localization preserves coalgebras over a comonad. These results are illustrated with many applications in chain complexes, (localized) spectra, the stable module category, and simplicial settings.
△ Less
Submitted 26 May, 2025; v1 submitted 29 May, 2018;
originally announced May 2018.
-
Cost-Benefit Analysis of Moving-Target Defense in Power Grids
Authors:
Subhash Lakshminarayana,
David K. Y. Yau
Abstract:
We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart stealthy false data injection (FDI) attacks against state estimation in a power grid. Prior work on this topic has proposed MTD based on randomly selected reactance perturbations, but these perturbations cannot guarantee effective attack detection. To address the issue, we present formal design crite…
▽ More
We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart stealthy false data injection (FDI) attacks against state estimation in a power grid. Prior work on this topic has proposed MTD based on randomly selected reactance perturbations, but these perturbations cannot guarantee effective attack detection. To address the issue, we present formal design criteria to select MTD reactance perturbations that are truly effective. However, based on a key optimal power flow (OPF) formulation, we find that the effective MTD may incur a non-trivial operational cost that has not hitherto received attention. Accordingly, we characterize important tradeoffs between the MTD's detection capability and its associated required cost. Extensive simulations, using the MATPOWER simulator and benchmark IEEE bus systems, verify and illustrate the proposed design approach that for the first time addresses both key aspects of cost and effectiveness of the MTD.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
Homotopical Quantum Field Theory
Authors:
Donald Yau
Abstract:
Algebraic quantum field theory and prefactorization algebra are two mathematical approaches to quantum field theory. In this monograph, using a new coend definition of the Boardman-Vogt construction of a colored operad, we define homotopy algebraic quantum field theories and homotopy prefactorization algebras and investigate their homotopy coherent structures. Homotopy coherent diagrams, homotopy…
▽ More
Algebraic quantum field theory and prefactorization algebra are two mathematical approaches to quantum field theory. In this monograph, using a new coend definition of the Boardman-Vogt construction of a colored operad, we define homotopy algebraic quantum field theories and homotopy prefactorization algebras and investigate their homotopy coherent structures. Homotopy coherent diagrams, homotopy inverses, A-infinity-algebras, E-infinity-algebras, and E-infinity-modules arise naturally in this context. In particular, each homotopy algebraic quantum field theory has the structure of a homotopy coherent diagram of A-infinity-algebras and satisfies a homotopy coherent version of the causality axiom. When the time-slice axiom is defined for algebraic quantum field theory, a homotopy coherent version of the time-slice axiom is satisfied by each homotopy algebraic quantum field theory. Over each topological space, every homotopy prefactorization algebra has the structure of a homotopy coherent diagram of E-infinity-modules over an E-infinity-algebra. To compare the two approaches, we construct a comparison morphism from the colored operad for (homotopy) prefactorization algebras to the colored operad for (homotopy) algebraic quantum field theories and study the induced adjunctions on algebras.
△ Less
Submitted 22 February, 2018;
originally announced February 2018.
-
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
Authors:
Subhash Lakshminarayana,
Teo Zhan Teng,
Rui Tan,
David K. Y. Yau
Abstract:
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' t…
▽ More
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.
△ Less
Submitted 21 September, 2017;
originally announced September 2017.
-
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
Authors:
Subhash Lakshminarayana,
Teo Zhan Teng,
David K. Y. Yau,
Rui Tan
Abstract:
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal atta…
▽ More
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation.
△ Less
Submitted 6 June, 2017;
originally announced June 2017.
-
On factorizations of graphical maps
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
We study the categories governing infinity (wheeled) properads. The graphical category, which was already known to be generalized Reedy, is in fact an Eilenberg-Zilber category. A minor alteration to the definition of the wheeled graphical category allows us to show that it is a generalized Reedy category. Finally, we present model structures for Segal properads and Segal wheeled properads.
We study the categories governing infinity (wheeled) properads. The graphical category, which was already known to be generalized Reedy, is in fact an Eilenberg-Zilber category. A minor alteration to the definition of the wheeled graphical category allows us to show that it is a generalized Reedy category. Finally, we present model structures for Segal properads and Segal wheeled properads.
△ Less
Submitted 14 April, 2018; v1 submitted 23 May, 2017;
originally announced May 2017.
-
Smith Ideals of Operadic Algebras in Monoidal Model Categories
Authors:
David White,
Donald Yau
Abstract:
Building upon Hovey's work on Smith ideals for monoids, we develop a homotopy theory of Smith ideals for general operads in a symmetric monoidal category. For a sufficiently nice stable monoidal model category and an operad satisfying a cofibrancy condition, we show that there is a Quillen equivalence between a model structure on Smith ideals and a model structure on algebra maps induced by the co…
▽ More
Building upon Hovey's work on Smith ideals for monoids, we develop a homotopy theory of Smith ideals for general operads in a symmetric monoidal category. For a sufficiently nice stable monoidal model category and an operad satisfying a cofibrancy condition, we show that there is a Quillen equivalence between a model structure on Smith ideals and a model structure on algebra maps induced by the cokernel and the kernel. For symmetric spectra, this applies to the commutative operad and all Sigma-cofibrant operads. For chain complexes over a field of characteristic zero and the stable module category, this Quillen equivalence holds for all operads. This paper ends with a comparison between the semi-model category approach and the $\infty$-category approach to encoding the homotopy theory of algebras over Sigma-cofibrant operads that are not necessarily admissible.
△ Less
Submitted 3 March, 2023; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Arrow Categories of Monoidal Model Categories
Authors:
David White,
Donald Yau
Abstract:
We prove that the arrow category of a monoidal model category, equipped with the pushout product monoidal structure and the projective model structure, is a monoidal model category. This answers a question posed by Mark Hovey, and has the important consequence that it allows for the consideration of a monoidal product in cubical homotopy theory. As illustrations we include numerous examples of non…
▽ More
We prove that the arrow category of a monoidal model category, equipped with the pushout product monoidal structure and the projective model structure, is a monoidal model category. This answers a question posed by Mark Hovey, and has the important consequence that it allows for the consideration of a monoidal product in cubical homotopy theory. As illustrations we include numerous examples of non-cofibrantly generated monoidal model categories, including chain complexes, small categories, topological spaces, and pro-categories.
△ Less
Submitted 30 December, 2018; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Higher cyclic operads
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
We introduce a convenient definition for weak cyclic operads, which is based on unrooted trees and Segal conditions. More specifically, we introduce a category $Ξ$ of trees, which carries a tight relationship to the Moerdijk-Weiss category of rooted trees $Ω$. We prove a nerve theorem exhibiting colored cyclic operads as presheaves on $Ξ$ which satisfy a Segal condition. Finally, we produce a Quil…
▽ More
We introduce a convenient definition for weak cyclic operads, which is based on unrooted trees and Segal conditions. More specifically, we introduce a category $Ξ$ of trees, which carries a tight relationship to the Moerdijk-Weiss category of rooted trees $Ω$. We prove a nerve theorem exhibiting colored cyclic operads as presheaves on $Ξ$ which satisfy a Segal condition. Finally, we produce a Quillen model category whose fibrant objects satisfy a weak Segal condition, and we consider these objects as an up-to-homotopy generalization of the concept of cyclic operad.
△ Less
Submitted 11 August, 2018; v1 submitted 8 November, 2016;
originally announced November 2016.
-
Right Bousfield Localization and Eilenberg-Moore Categories
Authors:
David White,
Donald Yau
Abstract:
We compare several recent approaches to studying right Bousfield localization and algebras over monads. We prove these approaches are equivalent, and we apply this equivalence to obtain several new results regarding right Bousfield localizations (some classical, some new) for spectra, spaces, equivariant spaces, chain complexes, simplicial abelian groups, and the stable module category. En route,…
▽ More
We compare several recent approaches to studying right Bousfield localization and algebras over monads. We prove these approaches are equivalent, and we apply this equivalence to obtain several new results regarding right Bousfield localizations (some classical, some new) for spectra, spaces, equivariant spaces, chain complexes, simplicial abelian groups, and the stable module category. En route, we provide conditions so that right Bousfield localization lifts to categories of algebras, so that right Bousfield localization preserves algebras over monads, and so that right Bousfield localization forms a compactly generated model category.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Dwyer-Kan Homotopy Theory of Algebras over Operadic Collections
Authors:
Donald Yau
Abstract:
Over suitable monoidal model categories, we construct a Dwyer-Kan model category structure on the category of algebras over an augmented operadic collection. As examples we obtain Dwyer-Kan model category structure on the categories of enriched wheeled props, wheeled properads, and wheeled operads, among others. This result extends known model category structure on the categories of operads, prope…
▽ More
Over suitable monoidal model categories, we construct a Dwyer-Kan model category structure on the category of algebras over an augmented operadic collection. As examples we obtain Dwyer-Kan model category structure on the categories of enriched wheeled props, wheeled properads, and wheeled operads, among others. This result extends known model category structure on the categories of operads, properads, and props enriched in simplicial sets and other monoidal model categories. We also show that our Dwyer-Kan model category structure is well behaved with respect to simultaneous changes of the underlying monoidal model category and the augmented operadic collection.
△ Less
Submitted 8 December, 2016; v1 submitted 5 August, 2016;
originally announced August 2016.
-
Homotopical Adjoint Lifting Theorem
Authors:
David White,
Donald Yau
Abstract:
This paper provides a homotopical version of the adjoint lifting theorem in category theory, allowing for Quillen equivalences to be lifted from monoidal model categories to categories of algebras over colored operads. The generality of our approach allows us to simultaneously answer questions of rectification and of changing the base model category to a Quillen equivalent one. We work in the sett…
▽ More
This paper provides a homotopical version of the adjoint lifting theorem in category theory, allowing for Quillen equivalences to be lifted from monoidal model categories to categories of algebras over colored operads. The generality of our approach allows us to simultaneously answer questions of rectification and of changing the base model category to a Quillen equivalent one. We work in the setting of colored operads, and we do not require them to be $Σ$-cofibrant. Special cases of our main theorem recover many known results regarding rectification and change of model category, as well as numerous new results. In particular, we recover a recent result of Richter-Shipley about a zig-zag of Quillen equivalences between commutative $H\mathbb{Q}$-algebra spectra and commutative differential graded $\mathbb{Q}$-algebras, but our version involves only three Quillen equivalences instead of six. We also work out the theory of how to lift Quillen equivalences to categories of colored operad algebras after a left Bousfield localization.
△ Less
Submitted 30 December, 2018; v1 submitted 6 June, 2016;
originally announced June 2016.
-
Data-Driven Evaluation of Building Demand Response Capacity
Authors:
Deokwoo Jung,
Varun Badrinath Krishna,
William Temple,
David K. Y. Yau
Abstract:
Before a building can participate in a demand response program, its facility managers must characterize the site's ability to reduce load. Today, this is often done through manual audit processes and prototypical control strategies. In this paper, we propose a new approach to estimate a building's demand response capacity using detailed data from various sensors installed in a building. We derive…
▽ More
Before a building can participate in a demand response program, its facility managers must characterize the site's ability to reduce load. Today, this is often done through manual audit processes and prototypical control strategies. In this paper, we propose a new approach to estimate a building's demand response capacity using detailed data from various sensors installed in a building. We derive a formula for a probabilistic measure that characterizes various tradeoffs between the available demand response capacity and the confidence level associated with that curtailment under the constraints of building occupant comfort level (or utility). Then, we develop a data-driven framework to associate observed or projected building energy consumption with a particular set of rules learned from a large sensor dataset. We apply this methodology using testbeds in two buildings in Singapore: a unique net-zero energy building and a modern commercial office building. Our experimental results identify key control parameters and provide insight into the available demand response strategies at each site.
△ Less
Submitted 9 February, 2016;
originally announced February 2016.
-
Impact of integrity attacks on real-time pricing in smart grids
Authors:
Rui Tan,
Varun Badrinath Krishna,
David K. Y. Yau,
Zbigniew Kalbarczyk
Abstract:
Modern information and communication technologies used by smart grids are subject to cybersecurity threats. This paper studies the impact of integrity attacks on real-time pricing (RTP), a key feature of smart grids that uses such technologies to improve system efficiency. Recent studies have shown that RTP creates a closed loop formed by the mutually dependent real-time price signals and price-ta…
▽ More
Modern information and communication technologies used by smart grids are subject to cybersecurity threats. This paper studies the impact of integrity attacks on real-time pricing (RTP), a key feature of smart grids that uses such technologies to improve system efficiency. Recent studies have shown that RTP creates a closed loop formed by the mutually dependent real-time price signals and price-taking demand. Such a closed loop can be exploited by an adversary whose objective is to destabilize the pricing system. Specifically, small malicious modifications to the price signals can be iteratively amplified by the closed loop, causing inefficiency and even severe failures such as blackouts. This paper adopts a control-theoretic approach to deriving the fundamental conditions of RTP stability under two broad classes of integrity attacks, namely, the scaling and delay attacks. We show that the RTP system is at risk of being destabilized only if the adversary can compromise the price signals advertised to smart meters by reducing their values in the scaling attack, or by providing old prices to over half of all consumers in the delay attack. The results provide useful guidelines for system operators to analyze the impact of various attack parameters on system stability, so that they may take adequate measures to secure RTP systems.
△ Less
Submitted 8 February, 2016;
originally announced February 2016.
-
Right Bousfield Localization and Operadic Algebras
Authors:
David White,
Donald Yau
Abstract:
It is well known that under some general conditions right Bousfield localization exists. We provide general conditions under which right Bousfield localization yields a monoidal model category. Then we address the questions of when this monoidal model structure on a right Bousfield localization induces a model structure on the category of algebras over a colored operad and when a right Bousfield l…
▽ More
It is well known that under some general conditions right Bousfield localization exists. We provide general conditions under which right Bousfield localization yields a monoidal model category. Then we address the questions of when this monoidal model structure on a right Bousfield localization induces a model structure on the category of algebras over a colored operad and when a right Bousfield localization preserves colored operadic algebras. We give numerous applications, to topological spaces, equivariant spaces, chain complexes, stable module categories, and to the category of small categories. We recover a wide range of classical results as special cases of our theory, and prove several new preservation results.
△ Less
Submitted 1 February, 2018; v1 submitted 23 December, 2015;
originally announced December 2015.
-
Operads of Wiring Diagrams
Authors:
Donald Yau
Abstract:
This monograph is a comprehensive study of the combinatorial structure of various operads of wiring diagrams and undirected wiring diagrams. Our first main objective is to prove a finite presentation theorem for each operad of wiring diagrams, describing each one in terms of just a few operadic generators and a small number of generating relations. For example, the operad of wiring diagrams has 8…
▽ More
This monograph is a comprehensive study of the combinatorial structure of various operads of wiring diagrams and undirected wiring diagrams. Our first main objective is to prove a finite presentation theorem for each operad of wiring diagrams, describing each one in terms of just a few operadic generators and a small number of generating relations. For example, the operad of wiring diagrams has 8 generators and 28 generating relations, while the operad of undirected wiring diagrams has 6 generators and 17 generating relations. Our second main objective is to prove a corresponding finite presentation theorem for algebras over each operad of wiring diagrams. As applications we provide finite presentations for the propagator algebra, the algebra of discrete systems, the algebra of open dynamical systems, and the (typed) relational algebra. We also provide a partial verification of Spivak's conjecture regarding the quotient-freeness of the relational algebra. Our third main objective is to construct explicit operad maps among the several operads of wiring diagrams. In particular, there is a surjective operad map from the operad of all wiring diagrams, including delay nodes, to the operad of undirected wiring diagrams.
This monograph is intended for graduate students, mathematicians, scientists, and engineers interested in operads and wiring diagrams. Assuming no prior knowledge of categories, operads, and wiring diagrams, this monograph is self-contained and can be used as a supplement in a graduate course and for independent study. There are over 100 graphical illustrations and a chapter with a list of problems.
△ Less
Submitted 7 February, 2017; v1 submitted 4 December, 2015;
originally announced December 2015.
-
Shrinkability, relative left properness, and derived base change
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
For a connected pasting scheme $\mathcal G$, under reasonable assumptions on the underlying category, the category of $\mathfrak C$-colored $\mathcal G$-props admits a cofibrantly generated model category structure. In this paper, we show that, if $\mathcal G$ is closed under shrinking internal edges, then this model structure on $\mathcal G$-props satisfies a (weaker version) of left properness.…
▽ More
For a connected pasting scheme $\mathcal G$, under reasonable assumptions on the underlying category, the category of $\mathfrak C$-colored $\mathcal G$-props admits a cofibrantly generated model category structure. In this paper, we show that, if $\mathcal G$ is closed under shrinking internal edges, then this model structure on $\mathcal G$-props satisfies a (weaker version) of left properness. Connected pasting schemes satisfying this property include those for all connected wheeled graphs (for wheeled properads), wheeled trees (for wheeled operads), simply connected graphs (for dioperads), unital trees (for symmetric operads), and unitial linear graphs (for small categories). The pasting scheme for connected wheel-free graphs (for properads) does _not_ satisfy this condition.
We furthermore prove, assuming $\mathcal G$ is shrinkable and our base categories are nice enough, that a weak symmetric monoidal Quillen equivalence between two base categories induces a Quillen equivalence between their categories of $\mathcal G$-props. The final section gives illuminating examples that justify the conditions on base model categories.
△ Less
Submitted 31 December, 2016; v1 submitted 5 October, 2015;
originally announced October 2015.
-
Bousfield Localization and Algebras over Colored Operads
Authors:
David White,
Donald Yau
Abstract:
We provide a very general approach to placing model structures and semi-model structures on algebras over symmetric colored operads. Our results require minimal hypotheses on the underlying model category $\mathcal{M}$, and these hypotheses vary depending on what is known about the colored operads in question. We obtain results for the classes of colored operad which are cofibrant as a symmetric c…
▽ More
We provide a very general approach to placing model structures and semi-model structures on algebras over symmetric colored operads. Our results require minimal hypotheses on the underlying model category $\mathcal{M}$, and these hypotheses vary depending on what is known about the colored operads in question. We obtain results for the classes of colored operad which are cofibrant as a symmetric collection, entrywise cofibrant, or arbitrary. As the hypothesis on the operad is weakened, the hypotheses on $\mathcal{M}$ must be strengthened. Via a careful development of the categorical algebra of colored operads we provide a unified framework which allows us to build (semi-)model structures for all three of these classes of colored operads. We then apply these results to provide conditions on $\mathcal{M}$, on the colored operad $\mathcal{O}$, and on a class $\mathcal{C}$ of morphisms in $\mathcal{M}$ so that the left Bousfield localization of $\mathcal{M}$ with respect to $\mathcal{C}$ preserves $\mathcal{O}$-algebras.
△ Less
Submitted 5 October, 2015; v1 submitted 23 March, 2015;
originally announced March 2015.
-
A simplicial model for infinity properads
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
We show how the model structure on the category of simplicially-enriched (colored) props induces a model structure on the category of simplicially-enriched (colored) properads. A similar result holds for dioperads.
We show how the model structure on the category of simplicially-enriched (colored) props induces a model structure on the category of simplicially-enriched (colored) properads. A similar result holds for dioperads.
△ Less
Submitted 14 April, 2018; v1 submitted 23 February, 2015;
originally announced February 2015.
-
Relative left properness of colored operads
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
The category of $\mathfrak{C}$-colored symmetric operads admits a cofibrantly generated model category structure. In this paper, we show that this model structure satisfies a relative left properness condition, i.e., that the class of weak equivalences between $Σ$-cofibrant operads is closed under cobase change along cofibrations. We also provide an example of Dwyer which shows that the model stru…
▽ More
The category of $\mathfrak{C}$-colored symmetric operads admits a cofibrantly generated model category structure. In this paper, we show that this model structure satisfies a relative left properness condition, i.e., that the class of weak equivalences between $Σ$-cofibrant operads is closed under cobase change along cofibrations. We also provide an example of Dwyer which shows that the model structure on $\mathfrak{C}$-colored symmetric operads is not left proper.
△ Less
Submitted 3 October, 2016; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Infinity Properads and Infinity Wheeled Properads
Authors:
Philip Hackney,
Marcy Robertson,
Donald Yau
Abstract:
A theory of $\infty$-properads is developed, extending both the Joyal-Lurie $\infty$-categories and the Cisinski-Moerdijk-Weiss $\infty$-operads. Every connected wheel-free graph generates a properad, giving rise to the graphical category $Γ$ of properads. Using graphical analogs of coface maps and the properadic nerve functor, an $\infty$-properad is defined as an object in the graphical set cate…
▽ More
A theory of $\infty$-properads is developed, extending both the Joyal-Lurie $\infty$-categories and the Cisinski-Moerdijk-Weiss $\infty$-operads. Every connected wheel-free graph generates a properad, giving rise to the graphical category $Γ$ of properads. Using graphical analogs of coface maps and the properadic nerve functor, an $\infty$-properad is defined as an object in the graphical set category $Set^{Γ^{op}}$ that satisfies some inner horn extension property. Symmetric monoidal closed structures are constructed in the categories of properads and of graphical sets. Strict $\infty$-properads, in which inner horns have unique fillers, are given two alternative characterizations, one in terms of graphical analogs of the Segal maps, and the other as images of the properadic nerve. The fundamental properad of an $\infty$-properad is characterized in terms of homotopy classes of $1$-dimensional elements. Using all connected graphs instead of connected wheel-free graphs, a parallel theory of $\infty$-wheeled properads is also developed.
△ Less
Submitted 11 February, 2015; v1 submitted 24 October, 2014;
originally announced October 2014.
-
The Mikheev identity in right Hom-alternative algebras
Authors:
Donald Yau
Abstract:
It is shown that in every multiplicative right Hom-alternative algebra, a Hom-type generalization of the Mikheev identity holds. It is then inferred that a multiplicative right Hom-alternative algebra with an injective twisting map and without Hom-nilpotent elements or left zero-divisors must be a Hom-alternative algebra.
It is shown that in every multiplicative right Hom-alternative algebra, a Hom-type generalization of the Mikheev identity holds. It is then inferred that a multiplicative right Hom-alternative algebra with an injective twisting map and without Hom-nilpotent elements or left zero-divisors must be a Hom-alternative algebra.
△ Less
Submitted 1 May, 2012;
originally announced May 2012.
-
Rota-Baxter Hom-Lie-admissible algebras
Authors:
Abdenacer Makhlouf,
Donald Yau
Abstract:
We study Hom-type analogs of Rota-Baxter and dendriform algebras, called Rota-Baxter $G$-Hom-associative algebras and Hom-dendriform algebras. Several construction results are proved. Free algebras for these objects are explicitly constructed. Various functors between these categories, as well as an adjunction between the categories of Rota-Baxter Hom-associative algebras and of Hom-(tri)dendrifor…
▽ More
We study Hom-type analogs of Rota-Baxter and dendriform algebras, called Rota-Baxter $G$-Hom-associative algebras and Hom-dendriform algebras. Several construction results are proved. Free algebras for these objects are explicitly constructed. Various functors between these categories, as well as an adjunction between the categories of Rota-Baxter Hom-associative algebras and of Hom-(tri)dendriform algebras, are constructed.
△ Less
Submitted 11 August, 2011;
originally announced August 2011.
-
Hom-algebras via PROPs
Authors:
Donald Yau
Abstract:
Hom-algebras over a PROP are defined and studied. Several twisting constructions for Hom-algebras over a large class of PROPs are proved, generalizing many such results in the literature. Partial classification of Hom-algebras over a PROP is obtained.
Hom-algebras over a PROP are defined and studied. Several twisting constructions for Hom-algebras over a large class of PROPs are proved, generalizing many such results in the literature. Partial classification of Hom-algebras over a PROP is obtained.
△ Less
Submitted 27 March, 2011;
originally announced March 2011.
-
A twisted generalization of Novikov-Poisson algebras
Authors:
Donald Yau
Abstract:
Hom-Novikov-Poisson algebras, which are twisted generalizations of Novikov-Poisson algebras, are studied. Hom-Novikov-Poisson algebras are shown to be closed under tensor products and several kinds of twistings. Necessary and sufficient conditions are given under which Hom-Novikov-Poisson algebras give rise to Hom-Poisson algebras.
Hom-Novikov-Poisson algebras, which are twisted generalizations of Novikov-Poisson algebras, are studied. Hom-Novikov-Poisson algebras are shown to be closed under tensor products and several kinds of twistings. Necessary and sufficient conditions are given under which Hom-Novikov-Poisson algebras give rise to Hom-Poisson algebras.
△ Less
Submitted 17 October, 2010;
originally announced October 2010.
-
Non-commutative Hom-Poisson algebras
Authors:
Donald Yau
Abstract:
A Hom-type generalization of non-commutative Poisson algebras, called non-commutative Hom-Poisson algebras, are studied. They are closed under twisting by suitable self-maps. Hom-Poisson algebras, in which the Hom-associative product is commutative, are closed under tensor products. Through (de)polarization Hom-Poisson algebras are equivalent to admissible Hom-Poisson algebras, each of which has o…
▽ More
A Hom-type generalization of non-commutative Poisson algebras, called non-commutative Hom-Poisson algebras, are studied. They are closed under twisting by suitable self-maps. Hom-Poisson algebras, in which the Hom-associative product is commutative, are closed under tensor products. Through (de)polarization Hom-Poisson algebras are equivalent to admissible Hom-Poisson algebras, each of which has only one binary operation. Multiplicative admissible Hom-Poisson algebras are Hom-power associative.
△ Less
Submitted 17 October, 2010;
originally announced October 2010.