Skip to main content

Showing 1–50 of 59 results for author: Hanna, S

.
  1. arXiv:2404.03524  [pdf, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Approximate Gradient Coding for Privacy-Flexible Federated Learning with Non-IID Data

    Authors: Okko Makkonen, Sampo Niemelä, Camilla Hollanti, Serge Kas Hanna

    Abstract: This work focuses on the challenges of non-IID data and stragglers/dropouts in federated learning. We introduce and explore a privacy-flexible paradigm that models parts of the clients' local data as non-private, offering a more versatile and business-oriented perspective on privacy. Within this framework, we propose a data-driven strategy for mitigating the effects of label heterogeneity and clie… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  2. arXiv:2402.01244  [pdf, other

    cs.IT

    Short Systematic Codes for Correcting Random Edit Errors in DNA Storage

    Authors: Serge Kas Hanna

    Abstract: DNA storage faces challenges in ensuring data reliability in the presence of edit errors -- deletions, insertions, and substitutions -- that occur randomly during various phases of the storage process. Current limitations in DNA synthesis technology also require the use of short DNA sequences, highlighting the particular need for short edit-correcting codes. Motivated by these factors, we introduc… ▽ More

    Submitted 4 March, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Minor text edits and additional simulation results

  3. arXiv:2306.17016  [pdf, other

    physics.optics physics.comp-ph

    On the suitability of rigorous coupled-wave analysis for fast optical force simulations

    Authors: Bo Gao, Henkjan Gersen, Simon Hanna

    Abstract: Optical force responses underpin nanophotonic actuator design, which requires a large number of force simulations to optimize structures. Commonly used computation methods, such as the finite-difference time-domain (FDTD) method, are resource intensive and require large amounts of calculation time when multiple structures need to be compared during optimization. This research demonstrates that per… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: 12 pages, 5 figures

  4. arXiv:2304.09839  [pdf, other

    cs.IT cs.DM

    Optimal Codes Detecting Deletions in Concatenated Binary Strings Applied to Trace Reconstruction

    Authors: Serge Kas Hanna

    Abstract: Consider two or more strings $\mathbf{x}^1,\mathbf{x}^2,\ldots,$ that are concatenated to form $\mathbf{x}=\langle \mathbf{x}^1,\mathbf{x}^2,\ldots \rangle$. Suppose that up to $δ$ deletions occur in each of the concatenated strings. Since deletions alter the lengths of the strings, a fundamental question to ask is: how much redundancy do we need to introduce in $\mathbf{x}$ in order to recover th… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory. arXiv admin note: substantial text overlap with arXiv:2207.05126, arXiv:2105.00212

  5. arXiv:2304.08589  [pdf, other

    cs.DC cs.IT cs.LG stat.ML

    Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load

    Authors: Maximilian Egger, Serge Kas Hanna, Rawad Bitar

    Abstract: In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization procedures like stochastic gradient descent (SGD) can be leveraged to mitigate the effect of unresponsive or slow workers called stragglers, that otherwise degrade the benefit of outsourcing the computation. This can be done by only waiting for… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  6. arXiv:2302.08644  [pdf, other

    cs.IT

    Codes Correcting Burst and Arbitrary Erasures for Reliable and Low-Latency Communication

    Authors: Serge Kas Hanna, Zhiyuan Tan, Wen Xu, Antonia Wachter-Zeh

    Abstract: Motivated by modern network communication applications which require low latency, we study codes that correct erasures with low decoding delay. We provide a simple explicit construction that yields convolutional codes that can correct both burst and arbitrary erasures under a maximum decoding delay constraint $T$. Our proposed code has efficient encoding/decoding algorithms and requires a field si… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: Accepted for publication in IEEE ICASSP 2023

  7. arXiv:2208.03134  [pdf, other

    cs.LG cs.DC cs.IT

    Adaptive Stochastic Gradient Descent for Fast and Communication-Efficient Distributed Learning

    Authors: Serge Kas Hanna, Rawad Bitar, Parimal Parag, Venkat Dasari, Salim El Rouayheb

    Abstract: We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers, each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updatin… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2002.11005

  8. arXiv:2207.05126  [pdf, other

    cs.IT

    Coding for Trace Reconstruction over Multiple Channels with Vanishing Deletion Probabilities

    Authors: Serge Kas Hanna

    Abstract: Motivated by DNA-based storage applications, we study the problem of reconstructing a coded sequence from multiple traces. We consider the model where the traces are outputs of independent deletion channels, where each channel deletes each bit of the input codeword \(\mathbf{x} \in \{0,1\}^n\) independently with probability \(p\). We focus on the regime where the deletion probability \(p \to 0\) w… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: This is the full version of the short paper accepted at ISIT 2022

  9. arXiv:2205.04679  [pdf, other

    eess.SP

    Distributed Transmit Beamforming: Analyzing the Maximum Communication Range

    Authors: Samer Hanna, Danijela Cabric

    Abstract: Distributed transmit beamforming is a technique that adjusts the signals from cooperating radios to combine coherently at a destination radio. To achieve coherent combining, the radios can exchange preambles with the destination for frequency synchronization and signal phase adjustment. At the destination, coherent combining leads to a beamforming (BF) gain. The BF gain can extend the communicatio… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  10. arXiv:2112.15363  [pdf, other

    eess.SP

    WiSig: A Large-Scale WiFi Signal Dataset for Receiver and Channel Agnostic RF Fingerprinting

    Authors: Samer Hanna, Samurdhi Karunaratne, Danijela Cabric

    Abstract: RF fingerprinting leverages circuit-level variability of transmitters to identify them using signals they send. Signals used for identification are impacted by a wireless channel and receiver circuitry, creating additional impairments that can confuse transmitter identification. Eliminating these impairments or just evaluating them, requires data captured over a prolonged period of time, using man… ▽ More

    Submitted 12 January, 2022; v1 submitted 31 December, 2021; originally announced December 2021.

    Comments: Fixed a mistake in the name of the second author

  11. arXiv:2111.02584  [pdf, other

    cs.LG cs.CR eess.SP

    Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval

    Authors: Samurdhi Karunaratne, Samer Hanna, Danijela Cabric

    Abstract: As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excel… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: Submitted to IEEE DySPAN 2021

  12. arXiv:2110.13804  [pdf, other

    eess.SP

    Distributed Transmit Beamforming: Design and Demonstration from the Lab to UAVs

    Authors: Samer Hanna, Danijela Cabric

    Abstract: Cooperating radios can extend their communication range by adjusting their signals to ensure coherent combining at a destination radio. This technique is called distributed transmit beamforming. Beamforming (BF) relies on the BF radios having frequency synchronized carriers and phases adjusted for coherent combining. Both requirements are typically met by exchanging preambles with the destination.… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  13. arXiv:2108.13099  [pdf, other

    eess.SP cs.LG

    Open Set RF Fingerprinting using Generative Outlier Augmentation

    Authors: Samurdhi Karunaratne, Samer Hanna, Danijela Cabric

    Abstract: RF devices can be identified by unique imperfections embedded in the signals they transmit called RF fingerprints. The closed set classification of such devices, where the identification must be made among an authorized set of transmitters, has been well explored. However, the much more difficult problem of open set classification, where the classifier needs to reject unauthorized transmitters whi… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: Accepted to IEEE GLOBECOM 2021

  14. arXiv:2108.01837  [pdf, other

    eess.SP

    Destination-Feedback Free Distributed Transmit Beamforming using Guided Directionality

    Authors: Samer Hanna, Enes Krijestorac, Danijela Cabric

    Abstract: Distributed transmit beamforming enables cooperative radios to act as one virtual antenna array, extending their communications' range beyond the capabilities of a single radio. Most existing distributed beamforming approaches rely on the destination radio sending feedback to adjust the transmitters' signals for coherent combining. However, relying on the destination radio's feedback limits the co… ▽ More

    Submitted 12 January, 2022; v1 submitted 4 August, 2021; originally announced August 2021.

  15. arXiv:2106.10543  [pdf, other

    eess.SP cs.LG

    Signal Processing Based Deep Learning for Blind Symbol Decoding and Modulation Classification

    Authors: Samer Hanna, Chris Dick, Danijela Cabric

    Abstract: Blindly decoding a signal requires estimating its unknown transmit parameters, compensating for the wireless channel impairments, and identifying the modulation type. While deep learning can solve complex problems, digital signal processing (DSP) is interpretable and can be more computationally efficient. To combine both, we propose the dual path network (DPN). It consists of a signal path of DSP… ▽ More

    Submitted 25 October, 2021; v1 submitted 19 June, 2021; originally announced June 2021.

  16. arXiv:2106.00140  [pdf, other

    eess.SP

    A Schottky-Diode-Based Wake-Up Receiver for IoT Applications

    Authors: Mahmoud Elhebeary, Samer Hanna, Sudhakar Pamarti, Danijela Cabric, Chih-Kong Ken Yang

    Abstract: This paper presents an always-on low-power wake-up receiver (WuRx) that activates the remainder of the system when a wake-up signal is detected. The proposed receiver has two phases of waking up. The first phase uses an integrated CMOS Schottky diodes to detect the signal power at a low bias current. The approach dissipates low quiescent power and allows the reuse of the design in multiple frequen… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

  17. arXiv:2105.02298  [pdf, ps, other

    cs.IT

    Optimal Codes Correcting Localized Deletions

    Authors: Rawad Bitar, Serge Kas Hanna, Nikita Polyanskii, Ilya Vorobyev

    Abstract: We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 10 pages, a full version of the paper accepted to 2021 IEEE ISIT

  18. arXiv:2105.00212  [pdf, ps, other

    cs.IT

    Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy

    Authors: Serge Kas Hanna, Rawad Bitar

    Abstract: We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of detecting up to $\del$ deletions. We prove the optimality of these codes by deriving a converse result which shows that the redundancy of our codes is asymptotically optimal in $\del$ among all families of deletion detecting codes, and particularly… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: Shorter version accepted in ISIT 2021

  19. arXiv:2104.14075  [pdf, other

    eess.SP cs.NI

    UAV Swarm Position Optimization for High Capacity MIMO Backhaul

    Authors: Samer Hanna, Enes Krijestorac, Danijela Cabric

    Abstract: A swarm of cooperating UAVs communicating with a distant multiantenna ground station can leverage MIMO spatial multiplexing to scale the capacity. Due to the line-of-sight propagation between the swarm and the ground station, the MIMO channel is highly correlated, leading to limited multiplexing gains. In this paper, we optimize the UAV positions to attain the maximum MIMO capacity given by the si… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  20. arXiv:2104.12032  [pdf

    cs.CR cs.HC

    The Design of the User Interfaces for Privacy Enhancements for Android

    Authors: Jason I. Hong, Yuvraj Agarwal, Matt Fredrikson, Mike Czapik, Shawn Hanna, Swarup Sahoo, Judy Chun, Won-Woo Chung, Aniruddh Iyer, Ally Liu, Shen Lu, Rituparna Roychoudhury, Qian Wang, Shan Wang, Siqi Wang, Vida Zhang, Jessica Zhao, Yuan Jiang, Haojian **, Sam Kim, Evelyn Kuo, Tianshi Li, **** Liu, Yile Liu, Robert Zhang

    Abstract: We present the design and design rationale for the user interfaces for Privacy Enhancements for Android (PE for Android). These UIs are built around two core ideas, namely that developers should explicitly declare the purpose of why sensitive data is being used, and these permission-purpose pairs should be split by first party and third party uses. We also present a taxonomy of purposes and ways o… ▽ More

    Submitted 24 April, 2021; originally announced April 2021.

    Comments: 58 pages, 21 figures, 3 tables

  21. arXiv:2011.03597  [pdf, other

    eess.SP

    Spatial Signal Strength Prediction using 3D Maps and Deep Learning

    Authors: Enes Krijestorac, Samer Hanna, Danijela Cabric

    Abstract: Machine learning (ML) and artificial neural networks (ANNs) have been successfully applied to simulating complex physics by learning physics models thanks to large data. Inspired by the successes of ANNs in physics modeling, we use deep neural networks (DNNs) to predict the radio signal strength field in an urban environment. Our algorithm relies on samples of signal strength collected across the… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages

  22. arXiv:2006.00729  [pdf, ps, other

    eess.SP

    Combining Deep Learning and Linear Processing for Modulation Classification and Symbol Decoding

    Authors: Samer Hanna, Chris Dick, Danijela Cabric

    Abstract: Deep learning has been recently applied to many problems in wireless communications including modulation classification and symbol decoding. Many of the existing end-to-end learning approaches demonstrated robustness to signal distortions like frequency and timing errors, and outperformed classical signal processing techniques with sufficient training. However, deep learning approaches typically r… ▽ More

    Submitted 13 September, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

  23. arXiv:2005.00954  [pdf, other

    eess.SP

    Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Dataset Considerations

    Authors: Samer Hanna, Samurdhi Karunaratne, Danijela Cabric

    Abstract: Due to imperfections in transmitters' hardware, wireless signals can be used to verify their identity in an authorization system. While deep learning was proposed for transmitter identification, the majority of the work has focused on classification among a closed set of transmitters. Malicious transmitters outside this closed set will be misclassified, jeopardizing the authorization system. In th… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

  24. Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers

    Authors: Serge Kas Hanna, Rawad Bitar, Parimal Parag, Venkat Dasari, Salim El Rouayheb

    Abstract: We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updating… ▽ More

    Submitted 25 February, 2020; originally announced February 2020.

    Comments: Accepted to IEEE ICASSP 2020

    Report number: pp. 4262--4266, May 2020

    Journal ref: International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 4262--4266, May 2020

  25. arXiv:2002.07777  [pdf, other

    eess.SP

    Deep Learning Approaches for Open Set Wireless Transmitter Authorization

    Authors: Samer Hanna, Samurdhi Karunaratne, Danijela Cabric

    Abstract: Wireless signals contain transmitter specific features, which can be used to verify the identity of transmitters and assist in implementing an authentication and authorization system. Most recently, there has been wide interest in using deep learning for transmitter identification. However, the existing deep learning work has posed the problem as closed set classification, where a neural network c… ▽ More

    Submitted 1 June, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted for publication in SPAWC 2020

  26. BIM-assisted object recognition for the on-site autonomous robotic assembly of discrete structures

    Authors: Mohamed Dawod, Sean Hanna

    Abstract: Robots-operating autonomous assembly applications in an unstructured environment require precise methods to locate the building components on site. However, the current available object detection systems are not well-optimised for construction applications, due to the tedious setups incorporated for referencing an object to a system and inability to cope with the elements imperfections. In this pa… ▽ More

    Submitted 22 August, 2019; originally announced August 2019.

    Journal ref: Construction Robotics, 2019

  27. arXiv:1907.03912  [pdf, other

    eess.SP eess.SY

    UAV Access Point Placement for Connectivity to a User with Unknown Location Using Deep RL

    Authors: Enes Krijestorac, Samer Hanna, Danijela Cabric

    Abstract: In recent years, unmanned aerial vehicles (UAVs) have been considered for telecommunications purposes as relays, caches, or IoT data collectors. In addition to being easy to deploy, their maneuverability allows them to adjust their location to optimize the capacity of the link to the user equipment on the ground or of the link to the basestation. The majority of the previous work that analyzes the… ▽ More

    Submitted 12 July, 2019; v1 submitted 8 July, 2019; originally announced July 2019.

    Comments: 6 pages

  28. arXiv:1906.05174  [pdf, other

    eess.SP

    UAV Swarms as Amplify-and-Forward MIMO Relays

    Authors: Samer Hanna, Enes Krijestorac, Han Yan, Danijela Cabric

    Abstract: Unmanned aerial vehicles provide new opportunities for performance improvements in future wireless communications systems. For example, they can act as relays that extend the range of a communication link and improve the capacity. Unlike conventional relays that are deployed at fixed locations, UAVs can change their positions to optimize the capacity or range on demand. In this paper, we consider… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

  29. arXiv:1901.04525  [pdf

    astro-ph.HE astro-ph.IM

    A Second Source of Repeating Fast Radio Bursts

    Authors: The CHIME/FRB Collaboration, :, M. Amiri, K. Bandura, M. Bhardwaj, P. Boubel, M. M. Boyce, P. J. Boyle, C. Brar, M. Burhanpurkar, T. Cassanelli, P. Chawla, J. F. Cliche, D. Cubranic, M. Deng, N. Denman, M. Dobbs, M. Fandino, E. Fonseca, B. M. Gaensler, A. J. Gilbert, A. Gill, U. Giri, D. C. Good, M. Halpern , et al. (36 additional authors not shown)

    Abstract: The discovery of a repeating Fast Radio Burst (FRB) source, FRB 121102, eliminated models involving cataclysmic events for this source. No other repeating FRB has yet been detected in spite of many recent FRB discoveries and follow-ups, suggesting repeaters may be rare in the FRB population. Here we report the detection of six repeat bursts from FRB 180814.J0422+73, one of the 13 FRBs detected by… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

    Comments: accepted by Nature

  30. arXiv:1811.04521  [pdf, other

    eess.SP

    Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity

    Authors: Samer S. Hanna, Danijela Cabric

    Abstract: The imperfections in the RF frontend of different transmitters can be used to distinguish them. This process is called transmitter identification using RF fingerprints. The nonlinearity in the power amplifier of the RF frontend is a significant cause of the discrepancy in RF fingerprints, which enables transmitter identification. In this work, we use deep learning to identify different transmitter… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

  31. arXiv:1811.02136  [pdf, other

    eess.SP

    Distributed UAV Placement Optimization for Cooperative Line-of-Sight MIMO Communications

    Authors: Samer Hanna, Han Yan, Danijela Cabric

    Abstract: Cooperative communication using unmanned aerial vehicles (UAVs) is a promising technology for infrastructureless wireless networks. One of the key challenges in UAV based communications is the backhaul throughput. In this paper, we propose optimization of the UAV swarm positions to achieve a high mulitplexing gain in line-of-sight (LoS) MIMO backhaul. We develop two distributed algorithms to posit… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

  32. Software Defined Radio Implementation of Carrier and Timing Synchronization for Distributed Arrays

    Authors: Han Yan, Samer Hanna, Kevin Balke, Riten Gupta, Danijela Cabric

    Abstract: The communication range of wireless networks can be greatly improved by using distributed beamforming from a set of independent radio nodes. One of the key challenges in establishing a beamformed communication link from separate radios is achieving carrier frequency and sample timing synchronization. This paper describes an implementation that addresses both carrier frequency and sample timing syn… ▽ More

    Submitted 5 November, 2018; originally announced November 2018.

    Comments: Submitted to 2019 IEEE Aerospace Conference

  33. arXiv:1810.07281  [pdf, other

    cs.IT

    List Decoding of Deletions Using Guess & Check Codes

    Authors: Serge Kas Hanna, Salim El Rouayheb

    Abstract: Guess & Check (GC) codes are systematic binary codes that can correct multiple deletions, with high probability. GC codes have logarithmic redundancy in the length of the message $k$, and the encoding and decoding algorithms of these codes are deterministic and run in polynomial time for a constant number of deletions $δ$. The unique decoding properties of GC codes were examined in a previous work… ▽ More

    Submitted 29 April, 2019; v1 submitted 16 October, 2018; originally announced October 2018.

    Comments: This is a full version of the short paper accepted at ISIT 2019

  34. arXiv:1711.01941  [pdf, other

    cs.IT

    Codes for Correcting Localized Deletions

    Authors: Serge Kas Hanna, Salim El Rouayheb

    Abstract: We consider the problem of constructing binary codes for correcting deletions that are localized within certain parts of the codeword that are unknown a priori. The model that we study is when $δ\leq w$ deletions are localized in a window of size $w$ bits. These $δ$ deletions do not necessarily occur in consecutive positions, but are restricted to the window of size $w$. The localized deletions mo… ▽ More

    Submitted 8 January, 2021; v1 submitted 2 November, 2017; originally announced November 2017.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

  35. arXiv:1705.09569  [pdf, other

    cs.IT

    Guess & Check Codes for Deletions, Insertions, and Synchronization

    Authors: Serge Kas Hanna, Salim El Rouayheb

    Abstract: We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes, dating back to 1965, are zero-error single deletion $(δ=1)$ correcting codes, and have an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions remains an open problem. In this work, we relax the standar… ▽ More

    Submitted 24 May, 2018; v1 submitted 24 May, 2017; originally announced May 2017.

    Comments: Accepted to the IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1702.04466

  36. arXiv:1702.04466  [pdf, other

    cs.IT

    Guess & Check Codes for Deletions and Synchronization

    Authors: Serge Kas Hanna, Salim El Rouayheb

    Abstract: We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes can correct all possible single deletions $(δ=1)$ with an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions is an open problem. We propose a new family of codes, that we call Guess & Check (GC) codes,… ▽ More

    Submitted 27 April, 2017; v1 submitted 15 February, 2017; originally announced February 2017.

    Comments: Accepted in ISIT 2017

  37. arXiv:1601.01979  [pdf, ps, other

    physics.ins-det astro-ph.IM physics.med-ph

    Silicon photomultiplier-based Compton Telescope for Safety and Security (SCoTSS)

    Authors: Laurel E. Sinclair, Patrick R. B. Saull, David S. Hanna, Henry C. J. Seywerd, Audrey M. L. MacLeod, Patrick J. Boyle

    Abstract: A Compton gamma imager has been developed for use in consequence management operations and in security investigations. The imager uses solid inorganic scintillator, known for robust performance in field survey conditions. The design was constrained in overall size by the requirement that it be person transportable and operable from a variety of platforms. In order to introduce minimal dead materia… ▽ More

    Submitted 8 January, 2016; originally announced January 2016.

    Comments: 9 pages, 8 figures, presented at IEEE NSSMIC 2013 and published in IEEE Trans. Nucl. Sci

    Report number: NRCan/ESS Contribution number 20130419

    Journal ref: IEEE Transactions on Nuclear Science, Vol:61 Iss: 5, p 2745 - 2752, 2014

  38. Development of a Compton imager based on bars of scintillator

    Authors: A. M. L. MacLeod, P. J. Boyle, D. S. Hanna, P. R. B. Saull, L. E. Sinclair, H. C. J. Seywerd

    Abstract: We have developed a compact Compton gamma-ray imager with a large field of view and a low channel-count that is capable of quickly localizing gamma-ray sources in the few hundred keV - several MeV range. The two detector planes (scatter and absorber) employ bars of NaI(Tl) read out by photomultiplier tubes (PMTs) located at each end. The long-range imaging performance has been tested from 392 keV… ▽ More

    Submitted 16 June, 2015; originally announced June 2015.

    Journal ref: NIM A: vol. 767, Dec 2014, p. 397-406

  39. arXiv:1207.0826  [pdf, ps, other

    physics.ins-det hep-ex nucl-ex

    First demonstration of a Compton gamma imager based on silicon photomultipliers

    Authors: P. R. B. Saull, L. E. Sinclair, H. C. J. Seywerd, D. S. Hanna, P. J. Boyle, A. M. L. MacLeod

    Abstract: We are develo** a rugged and person-transportable Compton gamma imager for use in security investigations of radioactive materials, and for radiological incident remediation. The imager is composed of layers of scintillator with light collection for the forward layers provided by silicon photomultipliers and for the rear layer by photomultiplier tubes. As a first step, we have developed a 1/5th-… ▽ More

    Submitted 3 July, 2012; originally announced July 2012.

    Comments: 19 pages, 6 figures

    Report number: NRCan/ESS Contribution 20110314

    Journal ref: Nucl. Instr. and Meth. A Vol 679, (2012) p 89-96

  40. Very high-energy observations of the two high-frequency peaked BL Lac objects 1ES 1218+304 and H 1426+428

    Authors: C. Mueller, N. Akhter, J. Ball, D. A. Bramel, J. Carson, C. E. Covault, D. Driscoll, P. Fortin, D. M. Gingrich, D. S. Hanna, A. Jarvis, J. Kildea, T. Lindner, R. Mukherjee, R. A. Ong, K. Ragan, R. A. Scalzo, D. A. Williams, J. Zweerink

    Abstract: We present results of very-high-energy gamma-ray observations (E > 160 GeV) of two high-frequency-peaked BL Lac (HBL) objects, 1ES 1218+304 and H 1426+428, with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). Both sources are very-high-energy gamma-ray emitters above 100 GeV, detected using ground-based Cherenkov telescopes. STACEE observations of 1ES 1218+304 and H 1426+428 did… ▽ More

    Submitted 14 April, 2011; originally announced April 2011.

    Journal ref: Astropart.Phys.34:674-678,2011

  41. arXiv:1103.4559  [pdf

    physics.plasm-ph

    One-dimensional radiation-hydrodynamic scaling studies of imploding spherical plasma liners

    Authors: T. J. Awe, C. S. Adams, J. S. Davis, D. S. Hanna, S. C. Hsu, J. T. Cassibry

    Abstract: One-dimensional radiation-hydrodynamic simulations are performed to develop insight into the scaling of stagnation pressure with initial conditions of an imploding spherical plasma shell or "liner." Simulations reveal the evolution of high-Mach-number (M), annular, spherical plasma flows during convergence, stagnation, shock formation, and disassembly, and indicate that cm- and μs-scale plasmas wi… ▽ More

    Submitted 23 June, 2011; v1 submitted 23 March, 2011; originally announced March 2011.

    Comments: 28 pages, 12 figures, accepted by Physics of Plasmas (June 23, 2011)

    Report number: LA-UR-11-00698

    Journal ref: Physics of Plasmas 18, 072705 (2011)

  42. arXiv:0904.2230  [pdf, ps, other

    astro-ph.EP astro-ph.IM

    OSETI with STACEE: A Search for Nanosecond Optical Transients from Nearby Stars

    Authors: D. S. Hanna, J. Ball, C. E. Covault, J. E. Carson, D. D. Driscoll, P. Fortin, D. M. Gingrich, A. Jarvis, J. Kildea, T. Lindner, C. Mueller, R. Mukherjee, R. A. Ong, K. Ragan, D. A. Williams, J. Zweerink

    Abstract: We have used the STACEE high-energy gamma-ray detector to look for fast blue-green laser pulses from the vicinity of 187 stars. The STACEE detector offers unprecedented light-collecting capability for the detection of nanosecond pulses from such lasers. We estimate STACEE's sensitivity to be approximately 10 photons per square meter at a wavelength of 420 nm. The stars have been chosen because t… ▽ More

    Submitted 14 April, 2009; originally announced April 2009.

    Comments: 38 pages, 12 figures. Accepted for publication in Astrobiology

  43. Simulations of a Scintillator Compton Gamma Imager for Safety and Security

    Authors: L. E. Sinclair, D. S. Hanna, A. M. L. MacLeod, P. R. B. Saull

    Abstract: We are designing an all-scintillator Compton gamma imager for use in security investigations and remediation actions involving radioactive threat material. To satisfy requirements for a rugged and portable instrument, we have chosen solid scintillator for the active volumes of both the scatter and absorber detectors. Using the BEAMnrc/EGSnrc Monte Carlo simulation package, we have constructed mo… ▽ More

    Submitted 28 June, 2009; v1 submitted 24 September, 2008; originally announced September 2008.

    Comments: Revised text and figures, Presented at SORMA West 2008, Published in IEEE Transactions on Nuclear Science

    Journal ref: IEEE Trans.Nucl.Sci.56:1262-1268,2009

  44. arXiv:0710.4623  [pdf, other

    astro-ph

    Observations of the Pulsar PSR B1951+32 with the Solar Tower Atmospheric Cherenkov Effect Experiment

    Authors: J. Kildea, J. Zweerink, J. Ball, J. E. Carson, C. E. Covault, D. D. Driscoll, P. Fortin, D. M. Gingrich, D. S. Hanna, A. Jarvis, T. Lindner, C. Mueller, R. Mukherjee, R. A. Ong, K. Ragan, D. A. Williams

    Abstract: We present the analysis and results of 12.5 hours of high-energy gamma-ray observations of the EGRET-detected pulsar PSR B1951+32 using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). STACEE is an atmospheric Cherenkov detector, in Albuquerque, New Mexico, that detects cosmic gamma rays using the shower-front-sampling technique. STACEE's sensitivity to astrophysical sources at… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: 4 pages, 1 figure, ICRC 2007 conference proceedings

  45. arXiv:0710.4170  [pdf, ps, other

    astro-ph

    STACEE Observations of 1ES 1218+304

    Authors: STACEE Collaboration, R. Mukherjee, N. Akhter, J. Ball, J. E. Carson, C. E. Covault, D. D. Driscoll, P. Fortin, D. M. Gingrich, D. S. Hanna, A. Jarvis, J. Kildea, T. Lindner, C. Mueller, R. A. Ong, K. Ragan, D. A. Williams, J. Zweerink

    Abstract: We present the analysis and results of recent high-energy gamma-ray observations of the high energy-peaked BL Lac (HBL) object 1ES 1218+304 with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). 1ES 1218+304 is an X-ray bright HBL at a redshift z=0.182. It has been predicted to be a gamma-ray emitter above 100 GeV, detectable by ground-based Cherenkov telescopes. Recently this so… ▽ More

    Submitted 22 October, 2007; originally announced October 2007.

    Comments: 4 pages, 4 figures. Proc. 30th International Cosmic Ray Conference, Meridia, Mexico, 2007

  46. arXiv:0710.4149  [pdf, ps, other

    astro-ph

    Gamma-Ray Burst Follow-up Observations with STACEE During 2003-2007

    Authors: STACEE Collaboration, A. Jarvis, J. Ball, J. E. Carson, C. E. Covault, D. D. Driscoll, P. Fortin, D. M. Gingrich, D. S. Hanna, J. Kildea, T. Lindner, R. Mukherjee, C. Mueller, R. A. Ong, K. Ragan, D. A. Williams, J. Zweerink

    Abstract: The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an atmospheric Cherenkov telescope (ACT) that uses a large mirror array to achieve a relatively low energy threshold. For sources with Crab-like spectra, at high elevations, the detector response peaks near 100 GeV. Gamma-ray burst (GRB) observations have been a high priority for the STACEE collaboration since the inception of t… ▽ More

    Submitted 22 October, 2007; originally announced October 2007.

    Comments: 4 pages, 1 table, 2 figures, presented at the 30th International Cosmic Ray Conference, Merida, Mexico, 2007

  47. arXiv:0710.3545  [pdf, ps, other

    astro-ph

    Search for Dark Matter Annihilation in Draco with STACEE

    Authors: STACEE Collaboration, D. D. Driscoll, J. Ball, J. E. Carson, C. E. Covault, P. Fortin, D. M. Gingrich, D. S. Hanna, A. Jarvis, J. Kildea, T. Lindner, C. Mueller, R. Mukherjee, R. A. Ong, K. Ragan, D. A. Williams, J. Zweerink

    Abstract: For some time, the Draco dwarf spheroidal galaxy has garnered interest as a possible source for the indirect detection of dark matter. Its large mass-to-light ratio and relative proximity to the Earth provide favorable conditions for the production of detectable gamma rays from dark matter self-annihilation in its core. The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an air-s… ▽ More

    Submitted 18 October, 2007; originally announced October 2007.

    Comments: 4 pages, 1 table, 4 figures, presented at the 30th International Cosmic Ray Conference, Meridia, Mexico, 2007

  48. Very high energy observations of the BL Lac objects 3C 66A and OJ 287

    Authors: T. Lindner, D. S. Hanna, J. Kildea, J. Ball, D. A. Bramel, J. Carson, C. E. Covault, D. Driscoll, P. Fortin, D. M. Gingrich, A. Jarvis, C. Mueller, R. Mukherjee, R. A. Ong, K. Ragan, R. A. Scalzo, D. A. Williams, J. Zweerink

    Abstract: Using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE), we have observed the BL Lac objects 3C 66A and OJ 287. These are members of the class of low-frequency-peaked BL Lac objects (LBLs) and are two of the three LBLs predicted by Costamante and Ghisellini to be potential sources of very high energy (>100 GeV) gamma-ray emission. The third candidate, BL Lacertae, has recently bee… ▽ More

    Submitted 18 July, 2007; originally announced July 2007.

    Comments: 24 pages, 15 figures, Accepted for publication in Astroparticle Physics

    Journal ref: Astropart.Phys.28:338-347,2007

  49. The Energy Spectrum of the Blazar Markarian 421 Above 130 GeV

    Authors: J. E. Carson, J. Kildea, R. A. Ong, J. Ball, D. A. Bramel, C. E. Covault, D. Driscoll, P. Fortin, D. M. Gingrich, D. S. Hanna, T. Lindner, C. Mueller, A. Jarvis, R. Mukherjee, K. Ragan, R. A. Scalzo, D. A. Williams, J. Zweerink

    Abstract: Markarian 421 (Mrk 421) was the first blazar detected at gamma-ray energies above 300 GeV, and it remains one of only twelve TeV blazars detected to date. TeV gamma-ray measurements of its flaring activity and spectral variability have placed constraints on models of the high-energy emission from blazars. However, observations between 50 and 300 GeV are rare, and the high-energy peak of the spec… ▽ More

    Submitted 19 December, 2006; originally announced December 2006.

    Comments: 16 pages, 4 figures, submitted to ApJ

    Journal ref: Astrophys.J.662:199-204,2007

  50. The STACEE Ground-Based Gamma-Ray Detector

    Authors: STACEE Collaboration, D. M. Gingrich, L. M. Boone, D. Bramel, J. Carson, C. E. Covault, P. Fortin, D. S. Hanna, J. A. Hinton, A. Jarvis, J. Kildea, T. Lindner, C. Mueller, R. Mukherjee, R. A. Ong, K. Ragan, R. A. Scalzo, C. G. Theoret, D. A. Williams, J. A. Zweerink

    Abstract: We describe the design and performance of the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) in its complete configuration. STACEE uses the heliostats of a solar energy research facility to collect and focus the Cherenkov photons produced in gamma-ray induced air showers. The light is concentrated onto an array of photomultiplier tubes located near the top of a tower. The large Che… ▽ More

    Submitted 24 June, 2005; originally announced June 2005.

    Comments: Presented at the 2004 IEEE Nuclear Science Symposium

    Journal ref: IEEETrans.Nucl.Sci.52:2977-2985,2005