-
Tuning dissipation dilution in 2D material resonators by MEMS-induced tension
Authors:
M. P. F. Wopereis,
N. Bouman,
S. Dutta,
P. G. Steeneken,
F. Alijani,
G. J. Verbiest
Abstract:
Resonators based on two-dimensional (2D) materials have exceptional properties for application as nanomechanical sensors, which allows them to operate at high frequencies with high sensitivity. However, their performance as nanomechanical sensors is currently limited by their low quality ($Q$)-factor. Here, we make use of micro-electromechanical systems (MEMS) to apply pure in-plane mechanical str…
▽ More
Resonators based on two-dimensional (2D) materials have exceptional properties for application as nanomechanical sensors, which allows them to operate at high frequencies with high sensitivity. However, their performance as nanomechanical sensors is currently limited by their low quality ($Q$)-factor. Here, we make use of micro-electromechanical systems (MEMS) to apply pure in-plane mechanical strain, enhancing both their resonance frequency and Q-factor. In contrast to earlier work, the 2D material resonators are fabricated on the MEMS actuators without any wet processing steps, using a dry-transfer method. A platinum clamp, that is deposited by electron beam-induced deposition, is shown to be effective in fixing the 2D membrane to the MEMS and preventing slippage. By in-plane straining the membranes in a purely mechanical fashion, we increase the tensile energy, thereby diluting dissipation. This way, we show how dissipation dilution can increase the $Q$-factor of 2D material resonators by 91\%. The presented MEMS actuated dissipation dilution method does not only pave the way towards higher $Q$-factors in resonators based on 2D materials, but also provides a route toward studies of the intrinsic loss mechanisms of 2D materials in the monolayer limit.
△ Less
Submitted 1 March, 2024; v1 submitted 13 January, 2024;
originally announced January 2024.
-
A study of DC electrical breakdown in liquid helium through analysis of the empirical breakdown field distributions
Authors:
N. S. Phan,
W. Wei,
B. Beaumont,
N. Bouman,
S. M. Clayton,
S. A. Currie,
T. M. Ito,
J. C. Ramsey,
G. M. Seidel
Abstract:
We report results from a study on electrical breakdown in liquid helium using near-uniform-field stainless steel electrodes with a stressed area of $\sim$0.725 cm$^2$. The distribution of the breakdown field is obtained for temperatures between 1.7 K and 4.0 K, pressures between the saturated vapor pressure and 626 Torr, and with electrodes of different surface polishes. A data-based approach for…
▽ More
We report results from a study on electrical breakdown in liquid helium using near-uniform-field stainless steel electrodes with a stressed area of $\sim$0.725 cm$^2$. The distribution of the breakdown field is obtained for temperatures between 1.7 K and 4.0 K, pressures between the saturated vapor pressure and 626 Torr, and with electrodes of different surface polishes. A data-based approach for determining the electrode-surface-area scaling of the breakdown field is presented. The dependence of the breakdown probability on the field strength as extracted from the breakdown field distribution data is used to show that breakdown is a surface phenomenon closely correlated with Fowler-Nordheim field emission from asperities on the cathode. We show that the results from this analysis provides an explanation for the supposed electrode gap-size effect and also allows for a determination of the breakdown-field distribution for arbitrary shaped electrodes. Most importantly, the analysis method presented in this work can be extended to other noble liquids to explore the dependencies for electrical breakdown in those media.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Average Point Pursuit using the Greedy Algorithm: Theory and Applications
Authors:
Andrey Bernstein,
Niek J. Bouman
Abstract:
This paper considers a discrete-time decision problem wherein a decision maker has to track, on average, a sequence of inputs selected from a convex set $\mathcal X \subset \mathbb{R}^d$ by choosing actions from a possibly non-convex feasible set $\mathcal Y\subset \mathbb{R}^d$, where $\mathcal X$ is in fact the convex hull of $\mathcal Y$. We study some generalized variants of this problem, in w…
▽ More
This paper considers a discrete-time decision problem wherein a decision maker has to track, on average, a sequence of inputs selected from a convex set $\mathcal X \subset \mathbb{R}^d$ by choosing actions from a possibly non-convex feasible set $\mathcal Y\subset \mathbb{R}^d$, where $\mathcal X$ is in fact the convex hull of $\mathcal Y$. We study some generalized variants of this problem, in which: (i) $\mathcal X$ and $\mathcal Y$ vary with time, and (ii) there might be a delay between them, in the sense that $\mathcal X$ is the convex hull of the previous $\mathcal Y$. We investigate the conditions under which the greedy algorithm that minimizes, in an online fashion, the accumulated error between the sequence of inputs and decisions, is able to track the average input asymptotically. Essentially, this comes down to proving that the accumulated error, whose evolution is governed by a non-linear dynamical system, remains within a bounded invariant set. Applications include control of discrete devices using continuous setpoints; control of highly uncertain devices with some information delay; and digital printing, scheduling, and assignment problems.
△ Less
Submitted 16 November, 2018;
originally announced November 2018.
-
Multiprecision Arithmetic for Cryptology in C++ - Compile-Time Computations and Beating the Performance of Hand-Optimized Assembly at Run-Time
Authors:
Niek J. Bouman
Abstract:
We describe a new C++ library for multiprecision arithmetic for numbers in the order of 100--500 bits, i.e., representable with just a few limbs. The library is written in "optimizing-compiler-friendly" C++, with an emphasis on the use of fixed-size arrays and particular function-argument-passing styles (including the avoidance of naked pointers) to allow the limbs to be allocated on the stack or…
▽ More
We describe a new C++ library for multiprecision arithmetic for numbers in the order of 100--500 bits, i.e., representable with just a few limbs. The library is written in "optimizing-compiler-friendly" C++, with an emphasis on the use of fixed-size arrays and particular function-argument-passing styles (including the avoidance of naked pointers) to allow the limbs to be allocated on the stack or even in registers. Depending on the particular functionality, we get close to, or significantly beat the performance of existing libraries for multiprecision arithmetic that employ hand-optimized assembly code.
Most functions in the library are constant-time, which is a necessity for secure implementations of cryptographic protocols.
Beyond the favorable runtime performance, our library is, to the best of the author's knowledge, the first library that offers big-integer computations during compile-time. For example, when implementing finite-field arithmetic with a fixed modulus, this feature enables the automatic precomputation (at compile time) of the special modulus-dependent constants required for Barrett and Montgomery reduction. Another application is to parse (at compile-time) a base-10-encoded big-integer literal.
△ Less
Submitted 19 April, 2018;
originally announced April 2018.
-
Real-Time Minimization of Average Error in the Presence of Uncertainty and Convexification of Feasible Sets
Authors:
Andrey Bernstein,
Niek J. Bouman,
Jean-Yves Le Boudec
Abstract:
We consider a two-level discrete-time control framework with real-time constraints where a central controller issues setpoints to be implemented by local controllers. The local controllers implement the setpoints with some approximation and advertize a prediction of their constraints to the central controller. The local controllers might not be able to implement the setpoint exactly, due to predic…
▽ More
We consider a two-level discrete-time control framework with real-time constraints where a central controller issues setpoints to be implemented by local controllers. The local controllers implement the setpoints with some approximation and advertize a prediction of their constraints to the central controller. The local controllers might not be able to implement the setpoint exactly, due to prediction errors or because the central controller convexifies the problem for tractability. In this paper, we propose to compensate for these mismatches at the level of the local controller by using a variant of the error diffusion algorithm. We give conditions under which the minimal (convex) invariant set for the accumulated-error dynamics is bounded, and give a computational method to construct this set. This can be used to compute a bound on the accumulated error and hence establish convergence of the average error to zero. We illustrate the approach in the context of real-time control of electrical grids.
△ Less
Submitted 21 December, 2016;
originally announced December 2016.
-
Design of Resource Agents with Guaranteed Tracking Properties for Real-Time Control of Electrical Grids
Authors:
Andrey Bernstein,
Niek J. Bouman,
Jean-Yves Le Boudec
Abstract:
We target the problem of controlling electrical microgrids with little inertia in real time. We consider a central controller and a number of resources, where each resource is either a load, a generator, or a combination thereof, like a battery. The controller periodically computes power setpoints for the resources based on the estimated state of the grid and an overall objective, and subject to s…
▽ More
We target the problem of controlling electrical microgrids with little inertia in real time. We consider a central controller and a number of resources, where each resource is either a load, a generator, or a combination thereof, like a battery. The controller periodically computes power setpoints for the resources based on the estimated state of the grid and an overall objective, and subject to safety constraints. Each resource is augmented with a resource agent that a) implements the setpoint requests sent by the controller on the resource, and b) translates device-specific information about the resource into a device-independent representation and transmits this to the controller.
We focus on the resource agents and their impact on the overall system's behavior. Intuitively, for the system to converge to the objective, the resource agents should be obedient to the requests from the controller, in the sense that the actually implemented setpoint should be close to the requested setpoint, at least on average. This can be important especially when a controller that performs continuous optimization is used (for the sake of performance) to control discrete resources (which have a discrete set of implementable setpoints).
We formalize obedience by defining the notion of $c$-bounded accumulated-error. We then demonstrate its usefulness, by presenting theoretical results (for a simple scenario) and simulation results (for a more realistic setting) that indicate that, if all resource agents in the system have bounded accumulated-error, the closed-loop system converges on average to the objective. Finally, we show how to design resource agents that provably have bounded accumulated-error for various types of resources, such as resources with uncertainty (e.g., PV panels) and resources with a discrete set of implementable setpoints (e.g., on-off heating systems).
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Delay Performance and Mixing Times in Random-Access Networks
Authors:
Niek Bouman,
Sem Borst,
Johan van Leeuwaarden
Abstract:
We explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules for which throughput opti…
▽ More
We explore the achievable delay performance in wireless random-access networks. While relatively simple and inherently distributed in nature, suitably designed queue-based random-access schemes provide the striking capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. The specific type of activation rules for which throughput optimality has been established, may however yield excessive queues and delays.
Motivated by that issue, we examine whether the poor delay performance is inherent to the basic operation of these schemes, or caused by the specific kind of activation rules. We derive delay lower bounds for queue-based activation rules, which offer fundamental insight in the cause of the excessive delays. For fixed activation rates we obtain lower bounds indicating that delays and mixing times can grow dramatically with the load in certain topologies as well.
△ Less
Submitted 16 May, 2013;
originally announced May 2013.
-
Queues with random back-offs
Authors:
Niek Bouman,
Sem C. Borst,
Onno J. Boxma,
Johan S. H. van Leeuwaarden
Abstract:
We consider a broad class of queueing models with random state-dependent vacation periods, which arise in the analysis of queue-based back-off algorithms in wireless random-access networks. In contrast to conventional models, the vacation periods may be initiated after each service completion, and can be randomly terminated with certain probabilities that depend on the queue length. We examine the…
▽ More
We consider a broad class of queueing models with random state-dependent vacation periods, which arise in the analysis of queue-based back-off algorithms in wireless random-access networks. In contrast to conventional models, the vacation periods may be initiated after each service completion, and can be randomly terminated with certain probabilities that depend on the queue length. We examine the scaled queue length and delay in a heavy-traffic regime, and demonstrate a sharp trichotomy, depending on how the activation rate and vacation probability behave as function of the queue length. In particular, the effect of the vacation periods may either (i) completely vanish in heavy-traffic conditions, (ii) contribute an additional term to the queue lengths and delays of similar magnitude, or even (iii) give rise to an order-of-magnitude increase. The heavy-traffic asymptotics are obtained by combining stochastic lower and upper bounds with exact results for some specific cases. The heavy-traffic trichotomy provides valuable insight in the impact of the back-off algorithms on the delay performance in wireless random-access networks.
△ Less
Submitted 13 February, 2013;
originally announced February 2013.
-
Lingering Issues in Distributed Scheduling
Authors:
Florian Simatos,
Niek Bouman,
Sem Borst
Abstract:
Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fashion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the "cautious" activation rules involved in establishing throughput optimality tend to produce extremely large delays, typically growing…
▽ More
Recent advances have resulted in queue-based algorithms for medium access control which operate in a distributed fashion, and yet achieve the optimal throughput performance of centralized scheduling algorithms. However, fundamental performance bounds reveal that the "cautious" activation rules involved in establishing throughput optimality tend to produce extremely large delays, typically growing exponentially in 1/(1-r), with r the load of the system, in contrast to the usual linear growth.
Motivated by that issue, we explore to what extent more "aggressive" schemes can improve the delay performance. Our main finding is that aggressive activation rules induce a lingering effect, where individual nodes retain possession of a shared resource for excessive lengths of time even while a majority of other nodes idle. Using central limit theorem type arguments, we prove that the idleness induced by the lingering effect may cause the delays to grow with 1/(1-r) at a quadratic rate. To the best of our knowledge, these are the first mathematical results illuminating the lingering effect and quantifying the performance impact.
In addition extensive simulation experiments are conducted to illustrate and validate the various analytical results.
△ Less
Submitted 23 May, 2013; v1 submitted 12 February, 2013;
originally announced February 2013.
-
Energy minimisation of repelling particles on a toric grid
Authors:
Niek Bouman,
Jan Draisma,
Johan van Leeuwaarden
Abstract:
We explore the minimum energy configurations of repelling particles distributed over n possible locations forming a toric grid. We conjecture that the most energy-efficient way to distribute n/2 particles over this space is to place them in a checkerboard pattern. Numerical experiments validate this conjecture for reasonable choices of the repelling force. In the present paper, we prove this conje…
▽ More
We explore the minimum energy configurations of repelling particles distributed over n possible locations forming a toric grid. We conjecture that the most energy-efficient way to distribute n/2 particles over this space is to place them in a checkerboard pattern. Numerical experiments validate this conjecture for reasonable choices of the repelling force. In the present paper, we prove this conjecture in a large number of special cases---most notably, when the sizes of the torus are either two or multiples of four in all dimensions and the repelling force is a completely monotonic function of the Lee distance between the particles.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
An All-But-One Entropic Uncertainty Relation, and Application to Password-based Identification
Authors:
Niek J. Bouman,
Serge Fehr,
Carlos González-Guillén,
Christian Schaffner
Abstract:
Entropic uncertainty relations are quantitative characterizations of Heisenberg's uncertainty principle, which make use of an entropy measure to quantify uncertainty. In quantum cryptography, they are often used as convenient tools in security proofs. We propose a new entropic uncertainty relation. It is the first such uncertainty relation that lower bounds the uncertainty in the measurement outco…
▽ More
Entropic uncertainty relations are quantitative characterizations of Heisenberg's uncertainty principle, which make use of an entropy measure to quantify uncertainty. In quantum cryptography, they are often used as convenient tools in security proofs. We propose a new entropic uncertainty relation. It is the first such uncertainty relation that lower bounds the uncertainty in the measurement outcome for all but one choice for the measurement from an arbitrarily large (but specifically chosen) set of possible measurements, and, at the same time, uses the min-entropy as entropy measure, rather than the Shannon entropy. This makes it especially suited for quantum cryptography. As application, we propose a new quantum identification scheme in the bounded quantum storage model. It makes use of our new uncertainty relation at the core of its security proof. In contrast to the original quantum identification scheme proposed by Damgård et al., our new scheme also offers some security in case the bounded quantum storage assumption fails hold. Specifically, our scheme remains secure against an adversary that has unbounded storage capabilities but is restricted to non-adaptive single-qubit operations. The scheme by Damgård et al., on the other hand, completely breaks down under such an attack.
△ Less
Submitted 21 June, 2012; v1 submitted 31 May, 2011;
originally announced May 2011.
-
Stability of Random Admissible-Set Scheduling in Spatially Continuous Wireless Systems
Authors:
Niek Bouman,
Sem Borst,
Johan van Leeuwaarden
Abstract:
We examine the stability of wireless networks whose users are distributed over a compact space. A subset of users is called {\it admissible} when their simultaneous activity obeys the prevailing interference constraints and, in each time slot, an admissible subset of users is selected uniformly at random to transmit one packet. We show that, under a mild condition, this random admissible-set sched…
▽ More
We examine the stability of wireless networks whose users are distributed over a compact space. A subset of users is called {\it admissible} when their simultaneous activity obeys the prevailing interference constraints and, in each time slot, an admissible subset of users is selected uniformly at random to transmit one packet. We show that, under a mild condition, this random admissible-set scheduling mechanism achieves maximum stability in a broad set of scenarios, and in particular in symmetric cases. The proof relies on a description of the system as a measure-valued process and the identification of a Lyapunov function.
△ Less
Submitted 4 September, 2013; v1 submitted 15 December, 2010;
originally announced December 2010.
-
Sampling in a Quantum Population, and Applications
Authors:
Niek J. Bouman,
Serge Fehr
Abstract:
We propose a framework for analyzing classical sampling strategies for estimating the Hamming weight of a large string, when applied to a multi-qubit quantum system instead. The framework shows how to interpret such a strategy and how to define its accuracy when applied to a quantum system. Furthermore, we show how the accuracy of any strategy relates to its accuracy in its classical usage, which…
▽ More
We propose a framework for analyzing classical sampling strategies for estimating the Hamming weight of a large string, when applied to a multi-qubit quantum system instead. The framework shows how to interpret such a strategy and how to define its accuracy when applied to a quantum system. Furthermore, we show how the accuracy of any strategy relates to its accuracy in its classical usage, which is well understood for the important examples. We show the usefulness of our framework by using it to obtain new and simple security proofs for the following quantum-cryptographic schemes: quantum oblivious-transfer from bit-commitment, and BB84 quantum-key-distribution.
△ Less
Submitted 16 January, 2012; v1 submitted 24 July, 2009;
originally announced July 2009.