-
Nanocolumnar Material Platforms:Universal structural parameters revealed from optical anisotropy
Authors:
Ufuk Kilic,
Yousra Traouli,
Matthew Hilfiker,
Khalil Bryant,
Stefan Schoeche,
Rene Feder,
Christos Argyropoulos,
Eva Schubert,
Mathias Schubert
Abstract:
Nanostructures represent a frontier where meticulous attention to the control and assessment of structural dimensions becomes a linchpin for their seamless integration into diverse technological applications. By using integrative and comprehensive methodical series of studies, we investigate the evolution of the depolarization factors in the anisotropic Bruggeman effective medium approximation, th…
▽ More
Nanostructures represent a frontier where meticulous attention to the control and assessment of structural dimensions becomes a linchpin for their seamless integration into diverse technological applications. By using integrative and comprehensive methodical series of studies, we investigate the evolution of the depolarization factors in the anisotropic Bruggeman effective medium approximation, that are extremely sensitive to the changes in critical dimensions of the nanostructure platforms. To this end, we fabricate spatially coherent highly-ordered slanted nanocolumns from zirconia, silicon, titanium, and permalloy on silicon substrates with varying column lengths using glancing angle deposition. In tandem, broad-spectral range Mueller matrix spectroscopic ellipsometry data, spanning from the near-infrared to the vacuum ultraviolet (0.72 eV to 6.5 eV), is analyzed with a best-match model approach based on the anisotropic Bruggeman effective medium theory. We thereby extracted the anisotropic optical properties including complex dielectric function, birefringence, and dichroism. Most notably, our research unveils a universal, material-independent inverse relationship between depolarization factors and column length. We envision that the presented universal relationship will permit accurate prediction of optical properties of nanocolumnar thin films improving their integration and optimization for optoelectronic and photonic device applications.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Software Repositories and Machine Learning Research in Cyber Security
Authors:
Mounika Vanamala,
Keith Bryant,
Alex Caravella
Abstract:
In today's rapidly evolving technological landscape and advanced software development, the rise in cyber security attacks has become a pressing concern. The integration of robust cyber security defenses has become essential across all phases of software development. It holds particular significance in identifying critical cyber security vulnerabilities at the initial stages of the software develop…
▽ More
In today's rapidly evolving technological landscape and advanced software development, the rise in cyber security attacks has become a pressing concern. The integration of robust cyber security defenses has become essential across all phases of software development. It holds particular significance in identifying critical cyber security vulnerabilities at the initial stages of the software development life cycle, notably during the requirement phase. Through the utilization of cyber security repositories like The Common Attack Pattern Enumeration and Classification (CAPEC) from MITRE and the Common Vulnerabilities and Exposures (CVE) databases, attempts have been made to leverage topic modeling and machine learning for the detection of these early-stage vulnerabilities in the software requirements process. Past research themes have returned successful outcomes in attempting to automate vulnerability identification for software developers, employing a mixture of unsupervised machine learning methodologies such as LDA and topic modeling. Looking ahead, in our pursuit to improve automation and establish connections between software requirements and vulnerabilities, our strategy entails adopting a variety of supervised machine learning techniques. This array encompasses Support Vector Machines (SVM), Naïve Bayes, random forest, neural networking and eventually transitioning into deep learning for our investigation. In the face of the escalating complexity of cyber security, the question of whether machine learning can enhance the identification of vulnerabilities in diverse software development scenarios is a paramount consideration, offering crucial assistance to software developers in develo** secure software.
△ Less
Submitted 1 November, 2023;
originally announced November 2023.
-
Tapered MMI splitters with unconstrained splitting ratio on a thick SOI platform
Authors:
Matteo Cherchi,
Mikko Harjanne,
Katherine Bryant,
Fei Sun,
Päivi Heimala,
Timo Aalto
Abstract:
We have systematically studied multimode interferometer (MMI) splitters made from multiple tapered sections. The goal is to create a library of robust and low-loss splitters covering all splitting ratios (SR) for our silicon photonics platform based on 3 $μ$m thick waveguides. The starting point is always a non-tapered canonical MMI either with general symmetry (canonical SRs 50:50, 100:0, and rec…
▽ More
We have systematically studied multimode interferometer (MMI) splitters made from multiple tapered sections. The goal is to create a library of robust and low-loss splitters covering all splitting ratios (SR) for our silicon photonics platform based on 3 $μ$m thick waveguides. The starting point is always a non-tapered canonical MMI either with general symmetry (canonical SRs 50:50, 100:0, and reciprocal ratios), with mirror symmetric restricted symmetry (canonical SRs 85:15, 50:50, 100:0, and reciprocal ratios), and with point-symmetric restricted symmetry (canonical SRs 72:28 and 28:72). Splitters of these three types are then divided into one to four subsections of equal length, leading to 12 possible different configurations. In each of these subsections, the width is first linearly tapered either up or down and then tapered back to its starting value ensuring mirror symmetry. For all twelve configurations, we carried out an extensive campaign of numerical simulations. For each given width change, we scanned the splitter length and calculated the power in the fundamental mode at the output as well as its relative phase. We then selected the designs with sufficiently low loss and mapped their SR as a function of either the change in width change or length, therefore creating systematic maps for the design of MMI splitters with any SR. Eventually, we selected and fabricated a subset of designs with SRs ranging from 5:95 to 95:5 in steps of 5% and validated their operation through optical measurements.
△ Less
Submitted 8 February, 2023;
originally announced February 2023.
-
Search for $K_L \!\to\! π^0 ν\overlineν$ and $K_L \!\to\! π^0 X^0$ Decays at the J-PARC KOTO Experiment
Authors:
KOTO Collaboration,
J. K. Ahn,
B. Beckford,
J. Beechert,
K. Bryant,
M. Campbell,
S. H. Chen,
J. Comfort,
K. Dona,
N. Hara,
H. Haraguchi,
Y. B. Hsiung,
M. Hutcheson,
T. Inagaki,
I. Kamiji,
N. Kawasaki,
E. J. Kim,
J. L. Kim,
Y. J. Kim,
J. W. Ko,
T. K. Komatsubara,
K. Kotera,
A. S. Kurilin,
J. W. Lee,
G. Y. Lim
, et al. (45 additional authors not shown)
Abstract:
A search for the rare decay $K_L \!\to\! π^0 ν\overlineν$ was performed. With the data collected in 2015, corresponding to $2.2 \times 10^{19}$ protons on target, a single event sensitivity of $( 1.30 \pm 0.01_{\rm stat} \pm 0.14_{\rm syst} ) \times 10^{-9}$ was achieved and no candidate events were observed. We set an upper limit of $3.0 \times 10^{-9}$ for the branching fraction of…
▽ More
A search for the rare decay $K_L \!\to\! π^0 ν\overlineν$ was performed. With the data collected in 2015, corresponding to $2.2 \times 10^{19}$ protons on target, a single event sensitivity of $( 1.30 \pm 0.01_{\rm stat} \pm 0.14_{\rm syst} ) \times 10^{-9}$ was achieved and no candidate events were observed. We set an upper limit of $3.0 \times 10^{-9}$ for the branching fraction of $K_L \!\to\! π^0 ν\overlineν$ at the 90% confidence level (C.L.), which improved the previous limit by almost an order of magnitude. An upper limit for $K_L \!\to\! π^0 X^0$ was also set as $2.4 \times 10^{-9}$ at the 90% C.L., where $X^0$ is an invisible boson with a mass of $135~{\rm MeV}/c^2$.
△ Less
Submitted 26 February, 2019; v1 submitted 23 October, 2018;
originally announced October 2018.
-
Slice Implies Mutant Ribbon for Odd, 5-Stranded Pretzel Knots
Authors:
Kathryn A. Bryant
Abstract:
A pretzel knot $K$ is called $odd$ if all its twist parameters are odd, and $mutant$ $ribbon$ if it is mutant to a simple ribbon knot. We prove that the family of odd, 5-stranded pretzel knots satisfies a weaker version of the Slice-Ribbon Conjecture: All slice, odd, 5-stranded pretzel knots are $mutant$ $ribbon$. We do this in stages by first showing that 5-stranded pretzel knots having twist par…
▽ More
A pretzel knot $K$ is called $odd$ if all its twist parameters are odd, and $mutant$ $ribbon$ if it is mutant to a simple ribbon knot. We prove that the family of odd, 5-stranded pretzel knots satisfies a weaker version of the Slice-Ribbon Conjecture: All slice, odd, 5-stranded pretzel knots are $mutant$ $ribbon$. We do this in stages by first showing that 5-stranded pretzel knots having twist parameters with all the same sign or with exactly one parameter of a different sign have infinite order in the topological knot concordance group, and thus in the smooth knot concordance group as well. Next, we show that any odd, 5-stranded pretzel knot with zero pairs or with exactly one pair of canceling twist parameters is not slice.
△ Less
Submitted 18 January, 2016; v1 submitted 22 November, 2015;
originally announced November 2015.