-
Comparison between InAs-based and GaSb-based Interband cascade lasers with hybrid superlattice plasmon-enhanced claddings
Authors:
B. Petrović,
A. Bader,
J. Nauschütz,
T. Sato,
S. Birner,
S. Estevam,
R. Weih,
F. Hartmann,
S. Höfling
Abstract:
We compare InAs-based and GaSb-based interband cascade lasers (ICLs) with the same 12 stages active region designed to emit at a wavelength of 4.6 μm. They employ a hybrid cladding architecture with the same geometry and inner claddings consisting of InAs/AlSb superlattices but different outer claddings: The InAs-based ICL employs plasmon enhanced n-type doped InAs layers while the GaSb-based ICL…
▽ More
We compare InAs-based and GaSb-based interband cascade lasers (ICLs) with the same 12 stages active region designed to emit at a wavelength of 4.6 μm. They employ a hybrid cladding architecture with the same geometry and inner claddings consisting of InAs/AlSb superlattices but different outer claddings: The InAs-based ICL employs plasmon enhanced n-type doped InAs layers while the GaSb-based ICL employs plasmon-enhanced n-type doped InAs_0.915 Sb_0.085 claddings lattice matched to GaSb. Due to the lower refractive index of n+-InAsSb (n=2.88) compared to n+-InAs (n=3.10) and higher refractive index of separate confinement layers, the GaSb-based ICL shows a 3.8 % higher optical mode confinement in the active region compared to the InAs-based ICL. Experimentally, the GaSb-based ICL shows a 17.3 % lower threshold current density in pulsed operation at room temperature. Also presented is the influence of geometry and do** variation on confinement factors and calculated free carrier absorption losses in the GaSb-based ICL.
△ Less
Submitted 5 July, 2024; v1 submitted 11 March, 2024;
originally announced March 2024.
-
Profile of Vulnerability Remediations in Dependencies Using Graph Analysis
Authors:
Fernando Vera,
Palina Pauliuchenka,
Ethan Oh,
Bai Chien Kao,
Louis DiValentin,
David A. Bader
Abstract:
This research introduces graph analysis methods and a modified Graph Attention Convolutional Neural Network (GAT) to the critical challenge of open source package vulnerability remediation by analyzing control flow graphs to profile breaking changes in applications occurring from dependency upgrades intended to remediate vulnerabilities. Our approach uniquely applies node centrality metrics -- deg…
▽ More
This research introduces graph analysis methods and a modified Graph Attention Convolutional Neural Network (GAT) to the critical challenge of open source package vulnerability remediation by analyzing control flow graphs to profile breaking changes in applications occurring from dependency upgrades intended to remediate vulnerabilities. Our approach uniquely applies node centrality metrics -- degree, norm, and closeness centrality -- to the GAT model, enabling a detailed examination of package code interactions with a focus on identifying and understanding vulnerable nodes, and when dependency package upgrades will interfere with application workflow. The study's application on a varied dataset reveals an unexpected limited inter-connectivity of vulnerabilities in core code, thus challenging established notions in software security. The results demonstrate the effectiveness of the enhanced GAT model in offering nuanced insights into the relational dynamics of code vulnerabilities, proving its potential in advancing cybersecurity measures. This approach not only aids in the strategic mitigation of vulnerabilities but also lays the groundwork for the development of sophisticated, sustainable monitoring systems for the evaluation of work effort for vulnerability remediation resulting from open source software. The insights gained from this study mark a significant advancement in the field of package vulnerability analysis and cybersecurity.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Cover Edge-Based Novel Triangle Counting
Authors:
David A. Bader,
Fuhuan Li,
Zhihui Du,
Palina Pauliuchenka,
Oliver Alvarado Rodriguez,
Anant Gupta,
Sai Sri Vastav Minnal,
Valmik Nahata,
Anya Ganeshan,
Ahmet Gundogdu,
Jason Lew
Abstract:
Listing and counting triangles in graphs is a key algorithmic kernel for network analyses, including community detection, clustering coefficients, k-trusses, and triangle centrality. In this paper, we propose the novel concept of a cover-edge set that can be used to find triangles more efficiently. Leveraging the breadth-first search (BFS) method, we can quickly generate a compact cover-edge set.…
▽ More
Listing and counting triangles in graphs is a key algorithmic kernel for network analyses, including community detection, clustering coefficients, k-trusses, and triangle centrality. In this paper, we propose the novel concept of a cover-edge set that can be used to find triangles more efficiently. Leveraging the breadth-first search (BFS) method, we can quickly generate a compact cover-edge set. Novel sequential and parallel triangle counting algorithms that employ cover-edge sets are presented. The novel sequential algorithm performs competitively with the fastest previous approaches on both real and synthetic graphs, such as those from the Graph500 Benchmark and the MIT/Amazon/IEEE Graph Challenge. We implement 22 sequential algorithms for performance evaluation and comparison. At the same time, we employ OpenMP to parallelize 11 sequential algorithms, presenting an in-depth analysis of their parallel performance. Furthermore, we develop a distributed parallel algorithm that can asymptotically reduce communication on massive graphs. In our estimate from massive-scale Graph500 graphs, our distributed parallel algorithm can reduce the communication on a scale~36 graph by 1156x and on a scale~42 graph by 2368x. Comprehensive experiments are conducted on the recently launched Intel Xeon 8480+ processor and shed light on how graph attributes, such as topology, diameter, and degree distribution, can affect the performance of these algorithms.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Deep Learning Detection Method for Large Language Models-Generated Scientific Content
Authors:
Bushra Alhijawi,
Rawan Jarrar,
Aseel AbuAlRub,
Arwa Bader
Abstract:
Large Language Models (LLMs), such as GPT-3 and BERT, reshape how textual content is written and communicated. These models have the potential to generate scientific content that is indistinguishable from that written by humans. Hence, LLMs carry severe consequences for the scientific community, which relies on the integrity and reliability of publications. This research paper presents a novel Cha…
▽ More
Large Language Models (LLMs), such as GPT-3 and BERT, reshape how textual content is written and communicated. These models have the potential to generate scientific content that is indistinguishable from that written by humans. Hence, LLMs carry severe consequences for the scientific community, which relies on the integrity and reliability of publications. This research paper presents a novel ChatGPT-generated scientific text detection method, AI-Catcher. AI-Catcher integrates two deep learning models, multilayer perceptron (MLP) and convolutional neural networks (CNN). The MLP learns the feature representations of the linguistic and statistical features. The CNN extracts high-level representations of the sequential patterns from the textual content. AI-Catcher is a multimodal model that fuses hidden patterns derived from MLP and CNN. In addition, a new ChatGPT-Generated scientific text dataset is collected to enhance AI-generated text detection tools, AIGTxt. AIGTxt contains 3000 records collected from published academic articles across ten domains and divided into three classes: Human-written, ChatGPT-generated, and Mixed text. Several experiments are conducted to evaluate the performance of AI-Catcher. The comparative results demonstrate the capability of AI-Catcher to distinguish between human-written and ChatGPT-generated scientific text more accurately than alternative methods. On average, AI-Catcher improved accuracy by 37.4%.
△ Less
Submitted 27 February, 2024;
originally announced March 2024.
-
5.0 $μ$m emitting Interband Cascade Lasers with Superlattice and Bulk AlGaAsSb Claddings
Authors:
B. Petrović,
A. Bader,
J. Nauschütz,
T. Sato,
S. Birner,
R. Weih,
F. Hartmann,
S. Höfling
Abstract:
We present a comparison between interband cascade lasers (ICLs) with a 6-stage active region emitting at 5 $μ$m with AlSb/InAs superlattice claddings and with bulk Al_0.85 Ga_0.15 As_0.07 Sb_0.93 claddings. Utilizing bulk AlGaAsSb claddings with their lower refractive index compared to the more commonly used AlSb/InAs superlattice claddings, the mode-confinement in the active region increases by 1…
▽ More
We present a comparison between interband cascade lasers (ICLs) with a 6-stage active region emitting at 5 $μ$m with AlSb/InAs superlattice claddings and with bulk Al_0.85 Ga_0.15 As_0.07 Sb_0.93 claddings. Utilizing bulk AlGaAsSb claddings with their lower refractive index compared to the more commonly used AlSb/InAs superlattice claddings, the mode-confinement in the active region increases by 14.4% resulting in an improvement of the lasing threshold current density. For broad area laser and under pulsed excitation, the ICL with AlGaAsSb claddings shows a lower threshold current density of J_th=396 A/cm$^2$ compared to J_th=521 A/cm$^2$ for the reference ICL with superlattice claddings. Additionally, a higher characteristic temperature was obtained for the ICL with bulk claddings. A measured pulsed operation is observed up to 65 C.
△ Less
Submitted 11 June, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
GaSb-based Interband Cascade Laser with hybrid superlattice plasmon-enhanced claddings
Authors:
B. Petrović,
A. Bader,
J. Nauschütz,
T. Sato,
S. Birner,
R. Weih,
F. Hartmann,
S. Höfling
Abstract:
We present an interband cascade laser (ICL) emitting at 5.2 μm consisting of an 8-stage active region and a hybrid cladding composed of outer plasmon-enhanced InAs_0.915 Sb_0.085 and inner InAs/AlSb superlattice claddings. The hybrid cladding architecture shows an increase in mode-confinement in the active region by 11.2 % according to the simulation. This is a consequence of a significantly lower…
▽ More
We present an interband cascade laser (ICL) emitting at 5.2 μm consisting of an 8-stage active region and a hybrid cladding composed of outer plasmon-enhanced InAs_0.915 Sb_0.085 and inner InAs/AlSb superlattice claddings. The hybrid cladding architecture shows an increase in mode-confinement in the active region by 11.2 % according to the simulation. This is a consequence of a significantly lower refractive index of plasmon-enhanced claddings. The threshold current density is 242 A/cm^2 in pulsed operation at room temperature. This is the lowest value reported to date for ICLs emitting at wavelengths longer than 5 μm. We also report close to record value threshold power density of 840 W/cm^2 for ICLs at such wavelengths.
△ Less
Submitted 11 June, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
Contour Algorithm for Connectivity
Authors:
Zhihui Du,
Oliver Alvarado Rodriguez,
Fuhuan Li,
Mohammad Dindoost,
David A. Bader
Abstract:
Finding connected components in a graph is a fundamental problem in graph analysis. In this work, we present a novel minimum-map** based Contour algorithm to efficiently solve the connectivity problem. We prove that the Contour algorithm with two or higher order operators can identify all connected components of an undirected graph within $\mathcal{O}(\log d_{max})$ iterations, with each iterati…
▽ More
Finding connected components in a graph is a fundamental problem in graph analysis. In this work, we present a novel minimum-map** based Contour algorithm to efficiently solve the connectivity problem. We prove that the Contour algorithm with two or higher order operators can identify all connected components of an undirected graph within $\mathcal{O}(\log d_{max})$ iterations, with each iteration involving $\mathcal{O}(m)$ work, where $d_{max}$ represents the largest diameter among all components in the given graph, and $m$ is the total number of edges in the graph. Importantly, each iteration is highly parallelizable, making use of the efficient minimum-map** operator applied to all edges. To further enhance its practical performance, we optimize the Contour algorithm through asynchronous updates, early convergence checking, eliminating atomic operations, and choosing more efficient map** operators. Our implementation of the Contour algorithm has been integrated into the open-source framework Arachne. Arachne extends Arkouda for large-scale interactive graph analytics, providing a Python API powered by the high-productivity parallel language Chapel. Experimental results on both real-world and synthetic graphs demonstrate the superior performance of our proposed Contour algorithm compared to state-of-the-art large-scale parallel algorithm FastSV and the fastest shared memory algorithm ConnectIt. On average, Contour achieves a speedup of 7.3x and 1.4x compared to FastSV and ConnectIt, respectively. All code for the Contour algorithm and the Arachne framework is publicly available on GitHub ( https://github.com/Bears-R-Us/arkouda-njit ), ensuring transparency and reproducibility of our work.
△ Less
Submitted 6 November, 2023; v1 submitted 5 November, 2023;
originally announced November 2023.
-
Property Graphs in Arachne
Authors:
Oliver Alvarado Rodriguez,
Fernando Vera Buschmann,
Zhihui Du,
David A. Bader
Abstract:
Analyzing large-scale graphs poses challenges due to their increasing size and the demand for interactive and user-friendly analytics tools. These graphs arise from various domains, including cybersecurity, social sciences, health sciences, and network sciences, where networks can represent interactions between humans, neurons in the brain, or malicious flows in a network. Exploring these large gr…
▽ More
Analyzing large-scale graphs poses challenges due to their increasing size and the demand for interactive and user-friendly analytics tools. These graphs arise from various domains, including cybersecurity, social sciences, health sciences, and network sciences, where networks can represent interactions between humans, neurons in the brain, or malicious flows in a network. Exploring these large graphs is crucial for revealing hidden structures and metrics that are not easily computable without parallel computing. Currently, Python users can leverage the open-source Arkouda framework to efficiently execute Pandas and NumPy-related tasks on thousands of cores. To address large-scale graph analysis, Arachne, an extension to Arkouda, enables easy transformation of Arkouda dataframes into graphs. This paper proposes and evaluates three distributable data structures for property graphs, implemented in Chapel, that are integrated into Arachne. Enriching Arachne with support for property graphs will empower data scientists to extend their analysis to new problem domains. Property graphs present additional complexities, requiring efficient storage for extra information on vertices and edges, such as labels, relationships, and properties.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Parallel Longest Common SubSequence Analysis In Chapel
Authors:
Soroush Vahidi,
Baruch Schieber,
Zhihui Du,
David A. Bader
Abstract:
One of the most critical problems in the field of string algorithms is the longest common subsequence problem (LCS). The problem is NP-hard for an arbitrary number of strings but can be solved in polynomial time for a fixed number of strings. In this paper, we select a typical parallel LCS algorithm and integrate it into our large-scale string analysis algorithm library to support different types…
▽ More
One of the most critical problems in the field of string algorithms is the longest common subsequence problem (LCS). The problem is NP-hard for an arbitrary number of strings but can be solved in polynomial time for a fixed number of strings. In this paper, we select a typical parallel LCS algorithm and integrate it into our large-scale string analysis algorithm library to support different types of large string analysis. Specifically, we take advantage of the high-level parallel language, Chapel, to integrate Lu and Liu's parallel LCS algorithm into Arkouda, an open-source framework. Through Arkouda, data scientists can easily handle large string analytics on the back-end high-performance computing resources from the front-end Python interface. The Chapel-enabled parallel LCS algorithm can identify the longest common subsequences of two strings, and experimental results are given to show how the number of parallel resources and the length of input strings can affect the algorithm's performance.
△ Less
Submitted 16 September, 2023;
originally announced September 2023.
-
Fast Triangle Counting
Authors:
David A. Bader
Abstract:
Listing and counting triangles in graphs is a key algorithmic kernel for network analyses including community detection, clustering coefficients, k-trusses, and triangle centrality. We design and implement a new serial algorithm for triangle counting that performs competitively with the fastest previous approaches on both real and synthetic graphs, such as those from the Graph500 Benchmark and the…
▽ More
Listing and counting triangles in graphs is a key algorithmic kernel for network analyses including community detection, clustering coefficients, k-trusses, and triangle centrality. We design and implement a new serial algorithm for triangle counting that performs competitively with the fastest previous approaches on both real and synthetic graphs, such as those from the Graph500 Benchmark and the MIT/Amazon/IEEE Graph Challenge. The experimental results use the recently-launched Intel Xeon Platinum 8480+ and CPU Max 9480 processors.
△ Less
Submitted 20 September, 2023; v1 submitted 16 September, 2023;
originally announced September 2023.
-
Growth of aligned and twisted hexagonal boron nitride on Ir(110)
Authors:
Thomas Michely,
Jason Bergelt,
Affan Safeer,
Alexander Bäder,
Tobias Hartl,
Jeison Fischer
Abstract:
The growth of monolayer hexagonal boron nitride (h-BN) on Ir(110) through low-pressure chemical vapor deposition is investigated using low energy electron diffraction and scanning tunneling microscopy. We find that the growth of aligned single hexagonal boron nitride on Ir(110) requires a growth temperature of 1500 K, whereas lower growth temperatures result in coexistence of aligned h-BN with twi…
▽ More
The growth of monolayer hexagonal boron nitride (h-BN) on Ir(110) through low-pressure chemical vapor deposition is investigated using low energy electron diffraction and scanning tunneling microscopy. We find that the growth of aligned single hexagonal boron nitride on Ir(110) requires a growth temperature of 1500 K, whereas lower growth temperatures result in coexistence of aligned h-BN with twisted h-BN The presence of the h-BN overlayer suppresses the formation of the nano-faceted ridge pattern known from clean Ir(110). Instead, we observe the formation of a (1 $\times$ n) reconstruction, with n such that the missing rows are in registry with the h-BN/Ir(110) moiré pattern. Our moiré analysis showcases a precise methodology for determining both the moiré periodicity and the h-BN lattice parameter on an fcc(110) surface.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
Exploration of Non-Resonant Divertor Features on the Compact Toroidal Hybrid
Authors:
K. A. Garcia,
A. Bader,
H. Frerichs,
G. J. Hartwell,
J. C. Schmitt,
N. Allen,
O. Schmitz
Abstract:
Non-resonant divertors (NRDs) separate the confined plasma from the surrounding plasma facing components (PFCs). The resulting striking field line intersection pattern on these PFCs is insensitive to plasma equilibrium effects. However, a complex scrape-off layer (SOL), created by chaotic magnetic topology in the plasma edge, connects the core plasma to the PFCs through varying magnetic flux tubes…
▽ More
Non-resonant divertors (NRDs) separate the confined plasma from the surrounding plasma facing components (PFCs). The resulting striking field line intersection pattern on these PFCs is insensitive to plasma equilibrium effects. However, a complex scrape-off layer (SOL), created by chaotic magnetic topology in the plasma edge, connects the core plasma to the PFCs through varying magnetic flux tubes. The Compact Toroidal Hybrid (CTH) serves as a test-bed to study this by scanning across its inductive current. Simulations observe a significant change of the chaotic edge structure and an effective distance between the confined plasma and the instrumented wall targets. The intersection pattern is observed to be a narrow helical band, which we claim is a resilient strike line pattern. However, signatures of finger-like structures, defined as heteroclinic tangles in chaotic domains, within the plasma edge connect the island chains to this resilient pattern. The dominant connection length field lines intersecting the targets are observed via heat flux modelling with EMC3-EIRENE. At low inductive current levels, the excursion of the field lines resembles a limited plasma wall scenario. At high currents, a private flux region is created in the area where the helical strike line pattern splits into two bands. These bands are divertor legs with distinct SOL parallel particle flow channels. The results demonstrate the NRD strike line pattern resiliency within CTH, but also show the underlying chaotic edge structure determining if the configuration is diverted or limited. This work supports future design efforts for a mechanical structure for the NRD.
△ Less
Submitted 24 August, 2023; v1 submitted 20 July, 2023;
originally announced July 2023.
-
Strain-free GaSb quantum dots as single-photon sources in the telecom S-band
Authors:
Johannes Michl,
Giora Peniakov,
Andreas Pfenning,
Joonas Hilska,
Abhiroop Chellu,
Andreas Bader,
Mircea Guina,
Sven Höfling,
Teemu Hakkarainen,
Tobias Huber-Loyola
Abstract:
Creating single photons in the telecommunication wavelength range from semiconductor quantum dots (QDs) and interfacing them with spins of electrons or holes has been of high interest in recent years, with research mainly focusing on indium based QDs. However, there is not much data on the optical and spin properties of galliumantimonide (GaSb) QDs, despite it being a physically rich system with a…
▽ More
Creating single photons in the telecommunication wavelength range from semiconductor quantum dots (QDs) and interfacing them with spins of electrons or holes has been of high interest in recent years, with research mainly focusing on indium based QDs. However, there is not much data on the optical and spin properties of galliumantimonide (GaSb) QDs, despite it being a physically rich system with an indirect to direct bandgap crossover in the telecom wavelength range. Here, we investigate the (quantum-) optical properties of GaSb quantum dots, which are fabricated by filling droplet-etched nanoholes in an aluminum-galliumantimonide (AlGaSb) matrix. We observe photoluminescence (PL) features from isolated and highly symmetric QDs that exhibit narrow linewidth in the telecom S-band and show an excitonic fine structure splitting of $ΔE=(12.0\pm0.5)μeV$. Moreover, we perform time-resolved measurements of the decay characteristics of an exciton and measure the second-order photon autocorrelation function of the charge complex to $g^{(2)}(0)=0.16\pm0.02$, revealing clear antibunching and thus proving the capability of this material platform to generate non-classical light.
△ Less
Submitted 7 May, 2023;
originally announced May 2023.
-
End-to-end resource analysis for quantum interior point methods and portfolio optimization
Authors:
Alexander M. Dalzell,
B. David Clader,
Grant Salton,
Mario Berta,
Cedric Yen-Yu Lin,
David A. Bader,
Nikitas Stamatopoulos,
Martin J. A. Schuetz,
Fernando G. S. L. Brandão,
Helmut G. Katzgraber,
William J. Zeng
Abstract:
We study quantum interior point methods (QIPMs) for second-order cone programming (SOCP), guided by the example use case of portfolio optimization (PO). We provide a complete quantum circuit-level description of the algorithm from problem input to problem output, making several improvements to the implementation of the QIPM. We report the number of logical qubits and the quantity/depth of non-Clif…
▽ More
We study quantum interior point methods (QIPMs) for second-order cone programming (SOCP), guided by the example use case of portfolio optimization (PO). We provide a complete quantum circuit-level description of the algorithm from problem input to problem output, making several improvements to the implementation of the QIPM. We report the number of logical qubits and the quantity/depth of non-Clifford T-gates needed to run the algorithm, including constant factors. The resource counts we find depend on instance-specific parameters, such as the condition number of certain linear systems within the problem. To determine the size of these parameters, we perform numerical simulations of small PO instances, which lead to concrete resource estimates for the PO use case. Our numerical results do not probe large enough instance sizes to make conclusive statements about the asymptotic scaling of the algorithm. However, already at small instance sizes, our analysis suggests that, due primarily to large constant pre-factors, poorly conditioned linear systems, and a fundamental reliance on costly quantum state tomography, fundamental improvements to the QIPM are required for it to lead to practical quantum advantage.
△ Less
Submitted 23 May, 2024; v1 submitted 22 November, 2022;
originally announced November 2022.
-
Triangle Counting Through Cover-Edges
Authors:
David A. Bader,
Fuhuan Li,
Anya Ganeshan,
Ahmet Gundogdu,
Jason Lew,
Oliver Alvarado Rodriguez,
Zhihui Du
Abstract:
Counting and finding triangles in graphs is often used in real-world analytics to characterize cohesiveness and identify communities in graphs. In this paper, we propose the novel concept of a cover-edge set that can be used to find triangles more efficiently. We use a breadth-first search (BFS) to quickly generate a compact cover-edge set. Novel sequential and parallel triangle counting algorithm…
▽ More
Counting and finding triangles in graphs is often used in real-world analytics to characterize cohesiveness and identify communities in graphs. In this paper, we propose the novel concept of a cover-edge set that can be used to find triangles more efficiently. We use a breadth-first search (BFS) to quickly generate a compact cover-edge set. Novel sequential and parallel triangle counting algorithms are presented that employ cover-edge sets. The sequential algorithm avoids unnecessary triangle-checking operations, and the parallel algorithm is communication-efficient. The parallel algorithm can asymptotically reduce communication on massive graphs such as from real social networks and synthetic graphs from the Graph500 Benchmark. In our estimate from massive-scale Graph500 graphs, our new parallel algorithm can reduce the communication on a scale 36 graph by 1156x and on a scale 42 graph by 2368x.
△ Less
Submitted 16 September, 2023; v1 submitted 1 October, 2022;
originally announced October 2022.
-
Energetic particle transport in optimized stellarators
Authors:
A Bader,
D T Anderson,
M Drevlak,
B J Faber,
C C Hegna,
S Henneberg,
M Landreman,
J C Schmitt,
Y Suzuki,
A Ware
Abstract:
Nine stellarator configurations, three quasiaxisymmetric, three quasihelically symmetric and three non-quasisymmetric are scaled to ARIES-CS size and analyzed for energetic particle content. The best performing configurations with regard to energetic particle confinement also perform the best on the neoclassical Γc metric, which attempts to align contours of the second adiabatic invariant with flu…
▽ More
Nine stellarator configurations, three quasiaxisymmetric, three quasihelically symmetric and three non-quasisymmetric are scaled to ARIES-CS size and analyzed for energetic particle content. The best performing configurations with regard to energetic particle confinement also perform the best on the neoclassical Γc metric, which attempts to align contours of the second adiabatic invariant with flux surfaces. Quasisymmetric configurations that simultaneously perform well on Γc and quasisymmetry have the best overall confinement, with collisional losses under 3%, approaching the performance of ITER with ferritic inserts.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
LAGraph: Linear Algebra, Network Analysis Libraries, and the Study of Graph Algorithms
Authors:
Gábor Szárnyas,
David A. Bader,
Timothy A. Davis,
James Kitchen,
Timothy G. Mattson,
Scott McMillan,
Erik Welch
Abstract:
Graph algorithms can be expressed in terms of linear algebra. GraphBLAS is a library of low-level building blocks for such algorithms that targets algorithm developers. LAGraph builds on top of the GraphBLAS to target users of graph algorithms with high-level algorithms common in network analysis. In this paper, we describe the first release of the LAGraph library, the design decisions behind the…
▽ More
Graph algorithms can be expressed in terms of linear algebra. GraphBLAS is a library of low-level building blocks for such algorithms that targets algorithm developers. LAGraph builds on top of the GraphBLAS to target users of graph algorithms with high-level algorithms common in network analysis. In this paper, we describe the first release of the LAGraph library, the design decisions behind the library, and performance using the GAP benchmark suite. LAGraph, however, is much more than a library. It is also a project to document and analyze the full range of algorithms enabled by the GraphBLAS. To that end, we have developed a compact and intuitive notation for describing these algorithms. In this paper, we present that notation with examples from the GAP benchmark suite.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
When Wireless Communication Faces COVID-19: Combating the Pandemic and Saving the Economy
Authors:
Nasir Saeed,
Ahmed Bader,
Tareq Y. Al-Naffouri,
Mohamed-Slim Alouini
Abstract:
The year 2020 is experiencing a global health and economic crisis due to the COVID-19 pandemic. Countries across the world are using digital technologies to fight this global crisis. These digital technologies, in one way or another, strongly rely on the availability of wireless communication technologies. In this paper, we present the role of wireless communications in the COVID-19 pandemic from…
▽ More
The year 2020 is experiencing a global health and economic crisis due to the COVID-19 pandemic. Countries across the world are using digital technologies to fight this global crisis. These digital technologies, in one way or another, strongly rely on the availability of wireless communication technologies. In this paper, we present the role of wireless communications in the COVID-19 pandemic from different perspectives. First, we show how these technologies are hel** to combat this pandemic, including monitoring of the virus spread, enabling healthcare automation, and allowing virtual education and conferencing. Also, we show the importance of digital inclusiveness in the pandemic and possible solutions to connect the unconnected. Next, we discuss the challenges faced by wireless technologies, including privacy, security, and misinformation. Then, we present the importance of wireless communication technologies in the survival of the global economy, such as automation of industries and supply chain, e-commerce, and supporting occupations that are at risk. Finally, we reveal that how the technologies developed during the pandemic can be helpful in the post-pandemic era.
△ Less
Submitted 6 June, 2020; v1 submitted 12 May, 2020;
originally announced May 2020.
-
A New Optimized Quasihelically SymmetricStellarator
Authors:
A. Bader,
B. J. Faber,
J. C. Schmitt,
D. T. Anderson,
M. Drevlak,
J. M. Duff,
H. Frerichs,
C. C. Hegna,
T. G. Kruger,
M. Landreman,
I. J. McKinney,
L. Singh,
J. M. Schroeder,
P. W. Terry,
A. S. Ware
Abstract:
A new optimized quasihelically symmetric configuration is described that has the desir-able properties of improved energetic particle confinement, reduced turbulent transportby 3D sha**, and non-resonant divertor capabilities. The configuration presented in thispaper is explicitly optimized for quasihelical symmetry, energetic particle confinement,neoclassical confinement, and stability near the…
▽ More
A new optimized quasihelically symmetric configuration is described that has the desir-able properties of improved energetic particle confinement, reduced turbulent transportby 3D sha**, and non-resonant divertor capabilities. The configuration presented in thispaper is explicitly optimized for quasihelical symmetry, energetic particle confinement,neoclassical confinement, and stability near the axis. Post optimization, the configurationwas evaluated for its performance with regard to energetic particle transport, idealmagnetohydrodynamic (MHD) stability at various values of plasma pressure, and iontemperature gradient instability induced turbulent transport. The effect of discrete coilson various confinement figures of merit, including energetic particle confinement, aredetermined by generating single-filament coils for the configuration. Preliminary divertoranalysis shows that coils can be created that do not interfere with expansion of thevessel volume near the regions of outgoing heat flux, thus demonstrating the possibilityof operating a non-resonant divertor.
△ Less
Submitted 23 April, 2020;
originally announced April 2020.
-
A Simple and Efficient Algorithm for Finding Minimum Spanning Tree Replacement Edges
Authors:
David A. Bader,
Paul Burkhardt
Abstract:
Given an undirected, weighted graph, the minimum spanning tree (MST) is a tree that connects all of the vertices of the graph with minimum sum of edge weights. In real world applications, network designers often seek to quickly find a replacement edge for each edge in the MST. For example, when a traffic accident closes a road in a transportation network, or a line goes down in a communication net…
▽ More
Given an undirected, weighted graph, the minimum spanning tree (MST) is a tree that connects all of the vertices of the graph with minimum sum of edge weights. In real world applications, network designers often seek to quickly find a replacement edge for each edge in the MST. For example, when a traffic accident closes a road in a transportation network, or a line goes down in a communication network, the replacement edge may reconnect the MST at lowest cost. In the paper, we consider the case of finding the lowest cost replacement edge for each edge of the MST. A previous algorithm by Tarjan takes $O(m α(m, n))$ time and space, where $α(m, n)$ is the inverse Ackermann's function. Given the MST and sorted non-tree edges, our algorithm is the first practical algorithm that runs in $O(m+n)$ time and $O(m+n)$ space to find all replacement edges. Additionally, since the most vital edge is the tree edge whose removal causes the highest cost, our algorithm finds it in linear time.
△ Less
Submitted 27 December, 2022; v1 submitted 9 August, 2019;
originally announced August 2019.
-
On the 3-D Placement of Airborne Base Stations Using Tethered UAVs
Authors:
Mustafa A. Kishk,
Ahmed Bader,
Mohamed-Slim Alouini
Abstract:
One of the main challenges slowing the deployment of airborne base stations (BSs) using unmanned aerial vehicles (UAVs) is the limited on-board energy and flight time. One potential solution to such problem, is to provide the UAV with power supply through a tether that connects the UAV to the ground. In this paper, we study the optimal placement of tethered UAVs (TUAVs) to minimize the average pat…
▽ More
One of the main challenges slowing the deployment of airborne base stations (BSs) using unmanned aerial vehicles (UAVs) is the limited on-board energy and flight time. One potential solution to such problem, is to provide the UAV with power supply through a tether that connects the UAV to the ground. In this paper, we study the optimal placement of tethered UAVs (TUAVs) to minimize the average path-loss between the TUAV and a receiver located on the ground. Given that the tether has a maximum length, and the launching point of the TUAV (the starting point of the tether) is placed on a rooftop, the TUAV is only allowed to hover within a specific hovering region. Beside the maximum tether length, this hovering region also depends on the heights of the buildings surrounding the rooftop, which requires the inclination angle of the tether not to be below a given minimum value, in order to avoid tangling and ensure safety. We first formulate the optimization problem for such setup and provide some useful insights on its solution. Next, we derive upper and lower bounds for the optimal values of the tether length and inclination angle. We also propose a suboptimal closed-form solution for the tether length and its inclination angle that is based on maximizing the line-of-sight probability. Finally, we derive the probability distribution of the minimum inclination angle of the tether length. We show that its mean value varies depending on the environment from 10 degrees in suburban environments to 31 degrees in high rise urban environments. Our numerical results show that the derived upper and lower bounds on the optimal values of the tether length and inclination angle lead to tight suboptimal values of the average path-loss that are only 0-3 dBs above the minimum value.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Aerial Base Stations Deployment in 6G Cellular Networks using Tethered Drones: The Mobility and Endurance Trade-off
Authors:
Mustafa A. Kishk,
Ahmed Bader,
Mohamed-Slim Alouini
Abstract:
Airborne base stations (carried by drones) have a great potential to enhance coverage and capacity of cellular networks. Multiple scenarios and use cases will highly benefit from such technology such as (i) offloading terrestrial base stations (BSs) in dense and urban areas, and (ii) providing coverage for rural areas. However, one of the main challenges facing the deployment of airborne BSs is th…
▽ More
Airborne base stations (carried by drones) have a great potential to enhance coverage and capacity of cellular networks. Multiple scenarios and use cases will highly benefit from such technology such as (i) offloading terrestrial base stations (BSs) in dense and urban areas, and (ii) providing coverage for rural areas. However, one of the main challenges facing the deployment of airborne BSs is the limited available energy at the drone, which limits the flight time. In fact, most of the currently used unmanned aerial vehicles (UAVs) can only operate for one hour maximum. This limits the performance of the UAV-enabled cellular network due to the need to frequently visit the ground station to recharge, leaving the UAV's coverage area temporarily out of service. In this article, we propose a new UAV-enabled cellular network setup based on tethered UAVs (TUAVs). In the proposed setup, the TUAV is connected to a ground station (GS) through a tether, which provides the TUAV with both energy and data. This enables a flight that can stay for days. We describe in detail the components of the proposed system. Furthermore, we enlist the main advantages of a TUAV-enabled cellular network compared to typical untethered UAVs. Next, we discuss the potential applications and use cases for TUAVs. Finally, we discuss the challenges, design considerations, and future research directions to realize the proposed setup.
△ Less
Submitted 12 August, 2020; v1 submitted 27 June, 2019;
originally announced June 2019.
-
Self-Organized Scheduling Request for Uplink 5G Networks: A D2D Clustering Approach
Authors:
Mohammad Gharbieh,
Ahmed Bader,
Hesham ElSawy,
Hong-Chuan Yang,
Mohamed-Slim Alouini,
Abdulkareem Adinoyi
Abstract:
In one of the several manifestations, the future cellular networks are required to accommodate a massive number of devices; several orders of magnitude compared to today's networks. At the same time, the future cellular networks will have to fulfill stringent latency constraints. To that end, one problem that is posed as a potential showstopper is extreme congestion for requesting uplink schedulin…
▽ More
In one of the several manifestations, the future cellular networks are required to accommodate a massive number of devices; several orders of magnitude compared to today's networks. At the same time, the future cellular networks will have to fulfill stringent latency constraints. To that end, one problem that is posed as a potential showstopper is extreme congestion for requesting uplink scheduling over the physical random access channel (PRACH). Indeed, such congestion drags along scheduling delay problems. In this paper, the use of self-organized device-to-device (D2D) clustering is advocated for mitigating PRACH congestion. To this end, the paper proposes two D2D clustering schemes, namely; Random-Based Clustering (RBC) and Channel-Gain-Based Clustering (CGBC). Accordingly, this paper sheds light on random access within the proposed D2D clustering schemes and presents a case study based on a stochastic geometry framework. For the sake of objective evaluation, the D2D clustering is benchmarked by the conventional scheduling request procedure. Accordingly, the paper offers insights into useful scenarios that minimize the scheduling delay for each clustering scheme. Finally, the paper discusses the implementation algorithm and some potential implementation issues and remedies.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Spatiotemporal Model for Uplink IoT Traffic: Scheduling & Random Access Paradox
Authors:
Mohammad Gharbieh,
Hesham ElSawy,
Hong-Chuan Yang,
Ahmed Bader,
Mohamed-Slim Alouini
Abstract:
The Internet-of-things (IoT) is the paradigm where anything will be connected. There are two main approaches to handle the surge in the uplink (UL) traffic the IoT is expected to generate, namely, Scheduled UL (SC-UL) and random access uplink (RA-UL) transmissions. SC-UL is perceived as a viable tool to control Quality-of-Service (QoS) levels while entailing some overhead in the scheduling request…
▽ More
The Internet-of-things (IoT) is the paradigm where anything will be connected. There are two main approaches to handle the surge in the uplink (UL) traffic the IoT is expected to generate, namely, Scheduled UL (SC-UL) and random access uplink (RA-UL) transmissions. SC-UL is perceived as a viable tool to control Quality-of-Service (QoS) levels while entailing some overhead in the scheduling request prior to any UL transmission. On the other hand, RA-UL is a simple single-phase transmission strategy. While this obviously eliminates scheduling overheads, very little is known about how scalable RA-UL is. At this critical junction, there is a dire need to analyze the scalability of these two paradigms. To that end, this paper develops a spatiotemporal mathematical framework to analyze and assess the performance of SC-UL and RA-UL. The developed paradigm jointly utilizes stochastic geometry and queueing theory. Based on such a framework, we show that the answer to the "scheduling vs. random access paradox" actually depends on the operational scenario. Particularly, RA-UL scheme offers low access delays but suffers from limited scalability, i.e., cannot support a large number of IoT devices. On the other hand, SC-UL transmission is better suited for higher device intensities and traffic rates.
△ Less
Submitted 11 October, 2018;
originally announced October 2018.
-
Scalable Katz Ranking Computation in Large Static and Dynamic Graphs
Authors:
Alexander van der Grinten,
Elisabetta Bergamini,
Oded Green,
David A. Bader,
Henning Meyerhenke
Abstract:
Network analysis defines a number of centrality measures to identify the most central nodes in a network. Fast computation of those measures is a major challenge in algorithmic network analysis. Aside from closeness and betweenness, Katz centrality is one of the established centrality measures. In this paper, we consider the problem of computing rankings for Katz centrality. In particular, we prop…
▽ More
Network analysis defines a number of centrality measures to identify the most central nodes in a network. Fast computation of those measures is a major challenge in algorithmic network analysis. Aside from closeness and betweenness, Katz centrality is one of the established centrality measures. In this paper, we consider the problem of computing rankings for Katz centrality. In particular, we propose upper and lower bounds on the Katz score of a given node. While previous approaches relied on numerical approximation or heuristics to compute Katz centrality rankings, we construct an algorithm that iteratively improves those upper and lower bounds until a correct Katz ranking is obtained. We extend our algorithm to dynamic graphs while maintaining its correctness guarantees. Experiments demonstrate that our static graph algorithm outperforms both numerical approaches and heuristics with speedups between 1.5x and 3.5x, depending on the desired quality guarantees. Our dynamic graph algorithm improves upon the static algorithm for update batches of less than 10000 edges. We provide efficient parallel CPU and GPU implementations of our algorithms that enable near real-time Katz centrality computation for graphs with hundreds of millions of nodes in fractions of seconds.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
An adjoint method for gradient-based optimization of stellarator coil shapes
Authors:
E. J. Paul,
M. Landreman,
A. Bader,
W. Dorland
Abstract:
We present a method for stellarator coil design via gradient-based optimization of the coil-winding surface. The REGCOIL (Landreman 2017 Nucl. Fusion 57 046003) approach is used to obtain the coil shapes on the winding surface using a continuous current potential. We apply the adjoint method to calculate derivatives of the objective function, allowing for efficient computation of analytic gradient…
▽ More
We present a method for stellarator coil design via gradient-based optimization of the coil-winding surface. The REGCOIL (Landreman 2017 Nucl. Fusion 57 046003) approach is used to obtain the coil shapes on the winding surface using a continuous current potential. We apply the adjoint method to calculate derivatives of the objective function, allowing for efficient computation of analytic gradients while eliminating the numerical noise of approximate derivatives. We are able to improve engineering properties of the coils by targeting the root-mean-squared current density in the objective function. We obtain winding surfaces for W7-X and HSX which simultaneously decrease the normal magnetic field on the plasma surface and increase the surface-averaged distance between the coils and the plasma in comparison with the actual winding surfaces. The coils computed on the optimized surfaces feature a smaller toroidal extent and curvature and increased inter-coil spacing. A technique for visualization of the sensitivity of figures of merit to normal surface displacement of the winding surface is presented, with potential applications for understanding engineering tolerances.
△ Less
Submitted 12 January, 2018;
originally announced January 2018.
-
Exemplar or Matching: Modeling DCJ Problems with Unequal Content Genome Data
Authors:
Zhaoming Yin,
Jijun Tang,
Stephen W. Schaeffer,
David A. Bader
Abstract:
The edit distance under the DCJ model can be computed in linear time for genomes with equal content or with Indels. But it becomes NP-Hard in the presence of duplications, a problem largely unsolved especially when Indels are considered. In this paper, we compare two mainstream methods to deal with duplications and associate them with Indels: one by deletion, namely DCJ-Indel-Exemplar distance; ve…
▽ More
The edit distance under the DCJ model can be computed in linear time for genomes with equal content or with Indels. But it becomes NP-Hard in the presence of duplications, a problem largely unsolved especially when Indels are considered. In this paper, we compare two mainstream methods to deal with duplications and associate them with Indels: one by deletion, namely DCJ-Indel-Exemplar distance; versus the other by gene matching, namely DCJ-Indel-Matching distance. We design branch-and-bound algorithms with set of optimization methods to compute exact distances for both. Furthermore, median problems are discussed in alignment with both of these distance methods, which are to find a median genome that minimizes distances between itself and three given genomes. Lin-Kernighan (LK) heuristic is leveraged and powered up by sub-graph decomposition and search space reduction technologies to handle median computation. A wide range of experiments are conducted on synthetic data sets and real data sets to show pros and cons of these two distance metrics per se, as well as putting them in the median computation scenario.
△ Less
Submitted 18 May, 2017;
originally announced May 2017.
-
Evolving understanding of Antarctic ice-sheet physics and ambiguity in probabilistic sea-level projections
Authors:
Robert E. Kopp,
Robert M. DeConto,
Daniel A. Bader,
Carling C. Hay,
Radley M. Horton,
Scott Kulp,
Michael Oppenheimer,
David Pollard,
Benjamin H. Strauss
Abstract:
Mechanisms such as ice-shelf hydrofracturing and ice-cliff collapse may rapidly increase discharge from marine-based ice sheets. Here, we link a probabilistic framework for sea-level projections to a small ensemble of Antarctic ice-sheet (AIS) simulations incorporating these physical processes to explore their influence on global-mean sea-level (GMSL) and relative sea-level (RSL). We compare the n…
▽ More
Mechanisms such as ice-shelf hydrofracturing and ice-cliff collapse may rapidly increase discharge from marine-based ice sheets. Here, we link a probabilistic framework for sea-level projections to a small ensemble of Antarctic ice-sheet (AIS) simulations incorporating these physical processes to explore their influence on global-mean sea-level (GMSL) and relative sea-level (RSL). We compare the new projections to past results using expert assessment and structured expert elicitation about AIS changes. Under high greenhouse gas emissions (Representative Concentration Pathway [RCP] 8.5), median projected 21st century GMSL rise increases from 79 to 146 cm. Without protective measures, revised median RSL projections would by 2100 submerge land currently home to 153 million people, an increase of 44 million. The use of a physical model, rather than simple parameterizations assuming constant acceleration of ice loss, increases forcing sensitivity: overlap between the central 90% of simulations for 2100 for RCP 8.5 (93-243 cm) and RCP 2.6 (26-98 cm) is minimal. By 2300, the gap between median GMSL estimates for RCP 8.5 and RCP 2.6 reaches >10 m, with median RSL projections for RCP 8.5 jeopardizing land now occupied by 950 million people (vs. 167 million for RCP 2.6). The minimal correlation between the contribution of AIS to GMSL by 2050 and that in 2100 and beyond implies current sea-level observations cannot exclude future extreme outcomes. The sensitivity of post-2050 projections to deeply uncertain physics highlights the need for robust decision and adaptive management frameworks.
△ Less
Submitted 4 November, 2017; v1 submitted 18 April, 2017;
originally announced April 2017.
-
Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis
Authors:
Mohammad Gharbieh,
Hesham ElSawy,
Ahmed Bader,
Mohamed-Slim Alouini
Abstract:
The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, are natural candidates to provide the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability pr…
▽ More
The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, are natural candidates to provide the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ram**. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.
△ Less
Submitted 26 February, 2017; v1 submitted 17 September, 2016;
originally announced September 2016.
-
Tractable Stochastic Geometry Model for IoT Access in LTE Networks
Authors:
Mohammad Gharbieh,
Hesham ElSawy,
Ahmed Bader,
Mohamed-Slim Alouini
Abstract:
The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request r…
▽ More
The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ram**. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.
△ Less
Submitted 12 July, 2016;
originally announced July 2016.
-
Mass measurements of neutron-rich Rb and Sr isotopes
Authors:
R. Klawitter,
A. Bader,
M. Brodeur,
U. Chowdhury,
A. Chausdhuri,
J. Fallis,
A. T. Gallant,
A. Grossheim,
A. A. Kwiatkowski,
D. Lascar,
K. G. Leach,
A. Lennarz,
T. D. Macdonald,
J. Pearkes,
S. Seeraji,
M. C. Simon,
V. V. Simon,
B. E. Schultz,
J. Dilling
Abstract:
We report on the mass measurements of several neutron-rich $\mathrm{Rb}$ and $\mathrm{Sr}$ isotopes in the $A \approx 100$ region with the TITAN Penning-trap mass spectrometer. Using highly charged ions in the charge state $q=10+$, the masses of $^{98,99}\mathrm{Rb}$ and $^{98-100}\mathrm{Sr}$ have been determined with a precision of $6 - 12\ \mathrm{keV}$, making their uncertainty negligible for…
▽ More
We report on the mass measurements of several neutron-rich $\mathrm{Rb}$ and $\mathrm{Sr}$ isotopes in the $A \approx 100$ region with the TITAN Penning-trap mass spectrometer. Using highly charged ions in the charge state $q=10+$, the masses of $^{98,99}\mathrm{Rb}$ and $^{98-100}\mathrm{Sr}$ have been determined with a precision of $6 - 12\ \mathrm{keV}$, making their uncertainty negligible for r-process nucleosynthesis network calculations. The mass of $^{101}\mathrm{Sr}$ has been determined directly for the first time with a precision eight times higher than the previous indirect measurement and a deviation of $3σ$ when compared to the Atomic Mass Evaluation. We also confirm the mass of $^{100}\mathrm{Rb}$ from a previous measurement. Furthermore, our data indicates the existance of a low-lying isomer with $80\ \mathrm{keV}$ excitation energy in $^{98}\mathrm{Rb}$. We show that our updated mass values lead to minor changes in the r-process by calculating fractional abundances in the $A\approx 100$ region of the nuclear chart.
△ Less
Submitted 22 December, 2015;
originally announced December 2015.
-
Spectral Partitioning with Blends of Eigenvectors
Authors:
James P. Fairbanks,
Geoffrey D. Sanders,
David A. Bader
Abstract:
Many common methods for data analysis rely on linear algebra. We provide new results connecting data analysis error to numerical accuracy, which leads to the first meaningful stop** criterion for two way spectral partitioning. More generally, we provide pointwise convergence guarantees so that blends (linear combinations) of eigenvectors can be employed to solve data analysis problems with confi…
▽ More
Many common methods for data analysis rely on linear algebra. We provide new results connecting data analysis error to numerical accuracy, which leads to the first meaningful stop** criterion for two way spectral partitioning. More generally, we provide pointwise convergence guarantees so that blends (linear combinations) of eigenvectors can be employed to solve data analysis problems with confidence in their accuracy. We demonstrate this theory on an accessible model problem, the Ring of Cliques, by deriving the relevant eigenpairs and comparing the predicted results to numerical solutions. These results bridge the gap between linear algebra based data analysis methods and the convergence theory of iterative approximation methods.
△ Less
Submitted 2 February, 2016; v1 submitted 15 October, 2015;
originally announced October 2015.
-
The power collection method for connection relations: Meixner polynomials
Authors:
Michael A. Baeder,
Howard S. Cohl,
Roberto S. Costas-Santos,
Wenqing Xu
Abstract:
We introduce the power collection method for easily deriving connection relations for certain hypergeometric orthogonal polynomials in the $(q-)$Askey scheme. We summarize the full-extent to which the power collection method may be used. As an example, we use the power collection method to derive connection and connection-type relations for Meixner and Krawtchouk polynomials. These relations are t…
▽ More
We introduce the power collection method for easily deriving connection relations for certain hypergeometric orthogonal polynomials in the $(q-)$Askey scheme. We summarize the full-extent to which the power collection method may be used. As an example, we use the power collection method to derive connection and connection-type relations for Meixner and Krawtchouk polynomials. These relations are then used to derive generalizations of generating functions for these orthogonal polynomials. The coefficients of these generalized generating functions are in general, given in term of multiple hypergeometric functions. From derived generalized generating functions, we derive corresponding contour integral and infinite series expressions by using orthogonality.
△ Less
Submitted 12 January, 2016; v1 submitted 3 September, 2015;
originally announced September 2015.
-
Breakdown of the Isobaric Multiplet Mass Equation for the A = 20 and 21 Multiplets
Authors:
A. T. Gallant,
M. Brodeur,
C. Andreoiu,
A. Bader,
A. Chaudhuri,
U. Chowdhury,
A. Grossheim,
R. Klawitter,
A. A. Kwiatkowski,
K. G. Leach,
A. Lennarz,
T. D. Macdonald,
B. E. Schultz,
J. Lassen,
H. Heggen,
S. Raeder,
A. Teigelhöfer,
B. A. Brown,
A. Magilligan,
J. D. Holt,
J. Menéndez,
J. Simonis,
A. Schwenk,
J. Dilling
Abstract:
Using the Penning trap mass spectrometer TITAN, we performed the first direct mass measurements of 20,21Mg, isotopes that are the most proton-rich members of the A = 20 and A = 21 isospin multiplets. These measurements were possible through the use of a unique ion-guide laser ion source, a development that suppressed isobaric contamination by six orders of magnitude. Compared to the latest atomic…
▽ More
Using the Penning trap mass spectrometer TITAN, we performed the first direct mass measurements of 20,21Mg, isotopes that are the most proton-rich members of the A = 20 and A = 21 isospin multiplets. These measurements were possible through the use of a unique ion-guide laser ion source, a development that suppressed isobaric contamination by six orders of magnitude. Compared to the latest atomic mass evaluation, we find that the mass of 21Mg is in good agreement but that the mass of 20Mg deviates by 3σ. These measurements reduce the uncertainties in the masses of 20,21Mg by 15 and 22 times, respectively, resulting in a significant departure from the expected behavior of the isobaric multiplet mass equation in both the A = 20 and A = 21 multiplets. This presents a challenge to shell model calculations using either the isospin non-conserving USDA/B Hamiltonians or isospin non-conserving interactions based on chiral two- and three-nucleon forces.
△ Less
Submitted 4 September, 2014;
originally announced September 2014.
-
Generalizations of generating functions for higher continuous hypergeometric orthogonal polynomials in the Askey scheme
Authors:
Michael A. Baeder,
Howard S. Cohl,
Hans Volkmer
Abstract:
We use connection relations and series rearrangement to generalize generating functions for several higher continuous orthogonal polynomials in the Askey scheme, namely the Wilson, continuous dual Hahn, continuous Hahn, and Meixner-Pollaczek polynomials. We also determine corresponding definite integrals using the orthogonality relations for these polynomials.
We use connection relations and series rearrangement to generalize generating functions for several higher continuous orthogonal polynomials in the Askey scheme, namely the Wilson, continuous dual Hahn, continuous Hahn, and Meixner-Pollaczek polynomials. We also determine corresponding definite integrals using the orthogonality relations for these polynomials.
△ Less
Submitted 23 October, 2014; v1 submitted 8 May, 2014;
originally announced May 2014.
-
Technical Report: Beaconless Geo-Routing Under The Spotlight: Practical Link Models and Application Scenarios
Authors:
Ahmed Bader,
Karim Abed-Meraim,
Mohamed-Slim Alouini
Abstract:
Analysis and simulation of beaconless geo-routing protocols have been traditionally conducted assuming equal communication ranges for the data and control packets. In reality, this is not true since the communication range is actually function of the packet length. Control packets are typically much shorter than data packets. As a consequence, a substantial discrepancy exists in practice between t…
▽ More
Analysis and simulation of beaconless geo-routing protocols have been traditionally conducted assuming equal communication ranges for the data and control packets. In reality, this is not true since the communication range is actually function of the packet length. Control packets are typically much shorter than data packets. As a consequence, a substantial discrepancy exists in practice between their respective communication ranges. In this paper, we devise a practical link model for computing the effective communication range. We further introduce two simple strategies for bridging the gap between the control and data packet communication ranges. Our primary objective in this paper is to construct a realistic analytical framework describing the end-to-end performance of beaconless geo-routing protocols. Two flagship protocols are selected in this paper for further investigation under the developed framework. For a better perspective, the two protocols are actually compared to a hypothetical limit case; one which offers optimal energy and latency performance. Finally, we present four different application scenarios. For each scenario, we highlight the geo-routing protocol which performs the best and discuss the reasons behind it.
△ Less
Submitted 16 January, 2013;
originally announced January 2013.
-
Technical Report: Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks
Authors:
Ahmed Bader,
Karim Abed-Meraim,
Mohamed-Slim Alouini
Abstract:
Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of develo** a packet forwarding mec…
▽ More
Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of develo** a packet forwarding mechanism that is tolerant to node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker.
△ Less
Submitted 7 September, 2011; v1 submitted 9 August, 2011;
originally announced August 2011.
-
On the random access performance of Cell Broadband Engine with graph analysis application
Authors:
Mingyu Chen,
David A. Bader
Abstract:
The Cell Broad Engine (BE) Processor has unique memory access architecture besides its powerful computing engines. Many computing-intensive applications have been ported to Cell/BE successfully. But memory-intensive applications are rarely investigated except for several micro benchmarks. Since Cell/BE has powerful software visible DMA engine, this paper studies on whether Cell/BE is suit for appl…
▽ More
The Cell Broad Engine (BE) Processor has unique memory access architecture besides its powerful computing engines. Many computing-intensive applications have been ported to Cell/BE successfully. But memory-intensive applications are rarely investigated except for several micro benchmarks. Since Cell/BE has powerful software visible DMA engine, this paper studies on whether Cell/BE is suit for applica- tions with large amount of random memory accesses. Two benchmarks, GUPS and SSCA#2, are used. The latter is a rather complex one that in representative of real world graph analysis applications. We find both benchmarks have good performance on Cell/BE based IBM QS20/22. Com- pared with 2 conventional multi-processor systems with the same core/thread number, GUPS is about 40-80% fast and SSCA#2 about 17-30% fast. The dynamic load balanc- ing and software pipeline for optimizing SSCA#2 are intro- duced. Based on the experiment, the potential of Cell/BE for random access is analyzed in detail as well as its limita- tions of memory controller, atomic engine and TLB manage- ment.Our research shows although more programming effort are needed, Cell/BE has the potencial for irregular memory access applications.
△ Less
Submitted 5 June, 2011; v1 submitted 30 May, 2011;
originally announced May 2011.
-
Surface-enhanced optical third-harmonic generation in Ag island films
Authors:
E. M. Kim,
S. S. Elovikov,
T. V. Murzina,
A. A. Nikulin,
O. A. Aktsipetrov,
M. A. Bader,
G. Marowsky
Abstract:
Surface-enhanced optical third-harmonic generation (THG) is observed in silver island films. The THG intensity from Ag nanoparticles is enhanced by more than two orders of magnitude with respect to the THG intensity from a smooth and homogeneous silver surface. This enhancement is attributed to local plasmon excitation and resonance of the local field at the third-harmonic wavelength. The diffus…
▽ More
Surface-enhanced optical third-harmonic generation (THG) is observed in silver island films. The THG intensity from Ag nanoparticles is enhanced by more than two orders of magnitude with respect to the THG intensity from a smooth and homogeneous silver surface. This enhancement is attributed to local plasmon excitation and resonance of the local field at the third-harmonic wavelength. The diffuse and depolarized component of the enhanced THG is associated with the third-order hyper-Rayleigh scattering in a 2-D random array of silver nanoparticles.
△ Less
Submitted 17 May, 2005;
originally announced May 2005.