-
Approximate Gradient Coding for Privacy-Flexible Federated Learning with Non-IID Data
Authors:
Okko Makkonen,
Sampo Niemelä,
Camilla Hollanti,
Serge Kas Hanna
Abstract:
This work focuses on the challenges of non-IID data and stragglers/dropouts in federated learning. We introduce and explore a privacy-flexible paradigm that models parts of the clients' local data as non-private, offering a more versatile and business-oriented perspective on privacy. Within this framework, we propose a data-driven strategy for mitigating the effects of label heterogeneity and clie…
▽ More
This work focuses on the challenges of non-IID data and stragglers/dropouts in federated learning. We introduce and explore a privacy-flexible paradigm that models parts of the clients' local data as non-private, offering a more versatile and business-oriented perspective on privacy. Within this framework, we propose a data-driven strategy for mitigating the effects of label heterogeneity and client straggling on federated learning. Our solution combines both offline data sharing and approximate gradient coding techniques. Through numerical simulations using the MNIST dataset, we demonstrate that our approach enables achieving a deliberate trade-off between privacy and utility, leading to improved model convergence and accuracy while using an adaptable portion of non-private data.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Short Systematic Codes for Correcting Random Edit Errors in DNA Storage
Authors:
Serge Kas Hanna
Abstract:
DNA storage faces challenges in ensuring data reliability in the presence of edit errors -- deletions, insertions, and substitutions -- that occur randomly during various phases of the storage process. Current limitations in DNA synthesis technology also require the use of short DNA sequences, highlighting the particular need for short edit-correcting codes. Motivated by these factors, we introduc…
▽ More
DNA storage faces challenges in ensuring data reliability in the presence of edit errors -- deletions, insertions, and substitutions -- that occur randomly during various phases of the storage process. Current limitations in DNA synthesis technology also require the use of short DNA sequences, highlighting the particular need for short edit-correcting codes. Motivated by these factors, we introduce a systematic code designed to correct random edits while adhering to typical length constraints in DNA storage. We evaluate the performance of the code through simulations and assess its effectiveness within a DNA storage framework, revealing promising results.
△ Less
Submitted 4 March, 2024; v1 submitted 2 February, 2024;
originally announced February 2024.
-
On the suitability of rigorous coupled-wave analysis for fast optical force simulations
Authors:
Bo Gao,
Henkjan Gersen,
Simon Hanna
Abstract:
Optical force responses underpin nanophotonic actuator design, which requires a large number of force simulations to optimize structures. Commonly used computation methods, such as the finite-difference time-domain (FDTD) method, are resource intensive and require large amounts of calculation time when multiple structures need to be compared during optimization. This research demonstrates that per…
▽ More
Optical force responses underpin nanophotonic actuator design, which requires a large number of force simulations to optimize structures. Commonly used computation methods, such as the finite-difference time-domain (FDTD) method, are resource intensive and require large amounts of calculation time when multiple structures need to be compared during optimization. This research demonstrates that performing optical force calculations on periodic structures using the rigorous coupled-wave analysis method is typically on the order of 10 times faster than FDTD with sufficient accuracy to suit optical design purposes. Moreover, this speed increase is available on consumer grade laptops with a CUDA-compatible GPU avoiding the need for a high performance computing resource.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Optimal Codes Detecting Deletions in Concatenated Binary Strings Applied to Trace Reconstruction
Authors:
Serge Kas Hanna
Abstract:
Consider two or more strings $\mathbf{x}^1,\mathbf{x}^2,\ldots,$ that are concatenated to form $\mathbf{x}=\langle \mathbf{x}^1,\mathbf{x}^2,\ldots \rangle$. Suppose that up to $δ$ deletions occur in each of the concatenated strings. Since deletions alter the lengths of the strings, a fundamental question to ask is: how much redundancy do we need to introduce in $\mathbf{x}$ in order to recover th…
▽ More
Consider two or more strings $\mathbf{x}^1,\mathbf{x}^2,\ldots,$ that are concatenated to form $\mathbf{x}=\langle \mathbf{x}^1,\mathbf{x}^2,\ldots \rangle$. Suppose that up to $δ$ deletions occur in each of the concatenated strings. Since deletions alter the lengths of the strings, a fundamental question to ask is: how much redundancy do we need to introduce in $\mathbf{x}$ in order to recover the boundaries of $\mathbf{x}^1,\mathbf{x}^2,\ldots$? This boundary problem is equivalent to the problem of designing codes that can detect the exact number of deletions in each concatenated string. In this work, we answer the question above by first deriving converse results that give lower bounds on the redundancy of deletion-detecting codes. Then, we present a marker-based code construction whose redundancy is asymptotically optimal in $δ$ among all families of deletion-detecting codes, and exactly optimal among all block-by-block decodable codes. To exemplify the usefulness of such deletion-detecting codes, we apply our code to trace reconstruction and design an efficient coded reconstruction scheme that requires a constant number of traces.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Fast and Straggler-Tolerant Distributed SGD with Reduced Computation Load
Authors:
Maximilian Egger,
Serge Kas Hanna,
Rawad Bitar
Abstract:
In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization procedures like stochastic gradient descent (SGD) can be leveraged to mitigate the effect of unresponsive or slow workers called stragglers, that otherwise degrade the benefit of outsourcing the computation. This can be done by only waiting for…
▽ More
In distributed machine learning, a central node outsources computationally expensive calculations to external worker nodes. The properties of optimization procedures like stochastic gradient descent (SGD) can be leveraged to mitigate the effect of unresponsive or slow workers called stragglers, that otherwise degrade the benefit of outsourcing the computation. This can be done by only waiting for a subset of the workers to finish their computation at each iteration of the algorithm. Previous works proposed to adapt the number of workers to wait for as the algorithm evolves to optimize the speed of convergence. In contrast, we model the communication and computation times using independent random variables. Considering this model, we construct a novel scheme that adapts both the number of workers and the computation load throughout the run-time of the algorithm. Consequently, we improve the convergence speed of distributed SGD while significantly reducing the computation load, at the expense of a slight increase in communication load.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Codes Correcting Burst and Arbitrary Erasures for Reliable and Low-Latency Communication
Authors:
Serge Kas Hanna,
Zhiyuan Tan,
Wen Xu,
Antonia Wachter-Zeh
Abstract:
Motivated by modern network communication applications which require low latency, we study codes that correct erasures with low decoding delay. We provide a simple explicit construction that yields convolutional codes that can correct both burst and arbitrary erasures under a maximum decoding delay constraint $T$. Our proposed code has efficient encoding/decoding algorithms and requires a field si…
▽ More
Motivated by modern network communication applications which require low latency, we study codes that correct erasures with low decoding delay. We provide a simple explicit construction that yields convolutional codes that can correct both burst and arbitrary erasures under a maximum decoding delay constraint $T$. Our proposed code has efficient encoding/decoding algorithms and requires a field size that is linear in $T$. We study the performance of our code over the Gilbert-Elliot channel; our simulation results show significant performance gains over low-delay codes existing in the literature.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
Adaptive Stochastic Gradient Descent for Fast and Communication-Efficient Distributed Learning
Authors:
Serge Kas Hanna,
Rawad Bitar,
Parimal Parag,
Venkat Dasari,
Salim El Rouayheb
Abstract:
We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers, each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updatin…
▽ More
We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers, each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updating the model, where $k$ is a fixed parameter. The choice of the value of $k$ presents a trade-off between the runtime (i.e., convergence rate) of SGD and the error of the model. Towards optimizing the error-runtime trade-off, we investigate distributed SGD with adaptive~$k$, i.e., varying $k$ throughout the runtime of the algorithm. We first design an adaptive policy for varying $k$ that optimizes this trade-off based on an upper bound on the error as a function of the wall-clock time that we derive. Then, we propose and implement an algorithm for adaptive distributed SGD that is based on a statistical heuristic. Our results show that the adaptive version of distributed SGD can reach lower error values in less time compared to non-adaptive implementations. Moreover, the results also show that the adaptive version is communication-efficient, where the amount of communication required between the master and the workers is less than that of non-adaptive versions.
△ Less
Submitted 4 August, 2022;
originally announced August 2022.
-
Coding for Trace Reconstruction over Multiple Channels with Vanishing Deletion Probabilities
Authors:
Serge Kas Hanna
Abstract:
Motivated by DNA-based storage applications, we study the problem of reconstructing a coded sequence from multiple traces. We consider the model where the traces are outputs of independent deletion channels, where each channel deletes each bit of the input codeword \(\mathbf{x} \in \{0,1\}^n\) independently with probability \(p\). We focus on the regime where the deletion probability \(p \to 0\) w…
▽ More
Motivated by DNA-based storage applications, we study the problem of reconstructing a coded sequence from multiple traces. We consider the model where the traces are outputs of independent deletion channels, where each channel deletes each bit of the input codeword \(\mathbf{x} \in \{0,1\}^n\) independently with probability \(p\). We focus on the regime where the deletion probability \(p \to 0\) when \(n\to \infty\). Our main contribution is designing a novel code for trace reconstruction that allows reconstructing a coded sequence efficiently from a constant number of traces. We provide theoretical results on the performance of our code in addition to simulation results where we compare the performance of our code to other reconstruction techniques in terms of the edit distance error.
△ Less
Submitted 11 July, 2022;
originally announced July 2022.
-
Distributed Transmit Beamforming: Analyzing the Maximum Communication Range
Authors:
Samer Hanna,
Danijela Cabric
Abstract:
Distributed transmit beamforming is a technique that adjusts the signals from cooperating radios to combine coherently at a destination radio. To achieve coherent combining, the radios can exchange preambles with the destination for frequency synchronization and signal phase adjustment. At the destination, coherent combining leads to a beamforming (BF) gain. The BF gain can extend the communicatio…
▽ More
Distributed transmit beamforming is a technique that adjusts the signals from cooperating radios to combine coherently at a destination radio. To achieve coherent combining, the radios can exchange preambles with the destination for frequency synchronization and signal phase adjustment. At the destination, coherent combining leads to a beamforming (BF) gain. The BF gain can extend the communication range by countering the path loss that increases with the distance from the destination. While ideally the maximum range can be trivially calculated from the BF gain, in reality, the BF gain depends on the distance because, at a larger distance, lower SNR of the exchanged preambles causes higher synchronization and phase estimation errors, which in turn degrades the BF gain. In this paper, considering the BF gain degradation for a destination-led BF protocol, we calculate the maximum communication range to realize a desired post-BF SNR by analyzing the relation between the pre-BF SNR and the BF gain. We show that increasing the preamble lengths or increasing the destination power can significantly increase the maximum range while just increasing the number of radios gives diminishing range extension.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
WiSig: A Large-Scale WiFi Signal Dataset for Receiver and Channel Agnostic RF Fingerprinting
Authors:
Samer Hanna,
Samurdhi Karunaratne,
Danijela Cabric
Abstract:
RF fingerprinting leverages circuit-level variability of transmitters to identify them using signals they send. Signals used for identification are impacted by a wireless channel and receiver circuitry, creating additional impairments that can confuse transmitter identification. Eliminating these impairments or just evaluating them, requires data captured over a prolonged period of time, using man…
▽ More
RF fingerprinting leverages circuit-level variability of transmitters to identify them using signals they send. Signals used for identification are impacted by a wireless channel and receiver circuitry, creating additional impairments that can confuse transmitter identification. Eliminating these impairments or just evaluating them, requires data captured over a prolonged period of time, using many spatially separated transmitters and receivers. In this paper, we present WiSig; a large scale WiFi dataset containing 10 million packets captured from 174 off-the-shelf WiFi transmitters and 41 USRP receivers over 4 captures spanning a month. WiSig is publicly available, not just as raw captures, but as conveniently pre-processed subsets of limited size, along with the scripts and examples. A preliminary evaluation performed using WiSig shows that changing receivers, or using signals captured on a different day can significantly degrade a trained classifier's performance. While capturing data over more days or more receivers limits the degradation, it is not always feasible and novel data-driven approaches are needed. WiSig provides the data to develop and evaluate these approaches towards channel and receiver agnostic transmitter fingerprinting.
△ Less
Submitted 12 January, 2022; v1 submitted 31 December, 2021;
originally announced December 2021.
-
Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval
Authors:
Samurdhi Karunaratne,
Samer Hanna,
Danijela Cabric
Abstract:
As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excel…
▽ More
As the Internet of Things (IoT) continues to grow, ensuring the security of systems that rely on wireless IoT devices has become critically important. Deep learning-based passive physical layer transmitter authorization systems have been introduced recently for this purpose, as they accommodate the limited computational and power budget of such devices. These systems have been shown to offer excellent outlier detection accuracies when trained and tested on a fixed authorized transmitter set. However in a real-life deployment, a need may arise for transmitters to be added and removed as the authorized set of transmitters changes. In such cases, the system could experience long down-times, as retraining the underlying deep learning model is often a time-consuming process. In this paper, we draw inspiration from information retrieval to address this problem: by utilizing feature vectors as RF fingerprints, we first demonstrate that training could be simplified to indexing those feature vectors into a database using locality sensitive hashing (LSH). Then we show that approximate nearest neighbor search could be performed on the database to perform transmitter authorization that matches the accuracy of deep learning models, while allowing for more than 100x faster retraining. Furthermore, dimensionality reduction techniques are used on the feature vectors to show that the authorization latency of our technique could be reduced to approach that of traditional deep learning-based systems.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Distributed Transmit Beamforming: Design and Demonstration from the Lab to UAVs
Authors:
Samer Hanna,
Danijela Cabric
Abstract:
Cooperating radios can extend their communication range by adjusting their signals to ensure coherent combining at a destination radio. This technique is called distributed transmit beamforming. Beamforming (BF) relies on the BF radios having frequency synchronized carriers and phases adjusted for coherent combining. Both requirements are typically met by exchanging preambles with the destination.…
▽ More
Cooperating radios can extend their communication range by adjusting their signals to ensure coherent combining at a destination radio. This technique is called distributed transmit beamforming. Beamforming (BF) relies on the BF radios having frequency synchronized carriers and phases adjusted for coherent combining. Both requirements are typically met by exchanging preambles with the destination. However, since BF aims to increase the communication range, the individually transmitted preambles are typically at low SNR and their lengths are constrained by the channel coherence time. These noisy preambles lead to errors in frequency and phase estimation, which result in randomly changing BF gains. To build reliable distributed BF systems, the impact of estimation errors on the BF gains need to be considered in the design. In this work, assuming a destination-led BF protocol and Kalman filter for frequency tracking, we optimize the number of BF radios and the preamble lengths to achieve reliable BF gain. To do that, we characterize the relations between the BF gains distribution, the channel coherence time, and design parameters like the SNR, preamble lengths, and the number of radios. The proposed relations are verified using simulations and via experiments using software-defined radios in a lab and on UAVs.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Open Set RF Fingerprinting using Generative Outlier Augmentation
Authors:
Samurdhi Karunaratne,
Samer Hanna,
Danijela Cabric
Abstract:
RF devices can be identified by unique imperfections embedded in the signals they transmit called RF fingerprints. The closed set classification of such devices, where the identification must be made among an authorized set of transmitters, has been well explored. However, the much more difficult problem of open set classification, where the classifier needs to reject unauthorized transmitters whi…
▽ More
RF devices can be identified by unique imperfections embedded in the signals they transmit called RF fingerprints. The closed set classification of such devices, where the identification must be made among an authorized set of transmitters, has been well explored. However, the much more difficult problem of open set classification, where the classifier needs to reject unauthorized transmitters while recognizing authorized transmitters, has only been recently visited. So far, efforts at open set classification have largely relied on the utilization of signal samples captured from a known set of unauthorized transmitters to aid the classifier learn unauthorized transmitter fingerprints. Since acquiring new transmitters to use as known transmitters is highly expensive, we propose to use generative deep learning methods to emulate unauthorized signal samples for the augmentation of training datasets. We develop two different data augmentation techniques, one that exploits a limited number of known unauthorized transmitters and the other that does not require any unauthorized transmitters. Experiments conducted on a dataset captured from a WiFi testbed indicate that data augmentation allows for significant increases in open set classification accuracy, especially when the authorized set is small.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Destination-Feedback Free Distributed Transmit Beamforming using Guided Directionality
Authors:
Samer Hanna,
Enes Krijestorac,
Danijela Cabric
Abstract:
Distributed transmit beamforming enables cooperative radios to act as one virtual antenna array, extending their communications' range beyond the capabilities of a single radio. Most existing distributed beamforming approaches rely on the destination radio sending feedback to adjust the transmitters' signals for coherent combining. However, relying on the destination radio's feedback limits the co…
▽ More
Distributed transmit beamforming enables cooperative radios to act as one virtual antenna array, extending their communications' range beyond the capabilities of a single radio. Most existing distributed beamforming approaches rely on the destination radio sending feedback to adjust the transmitters' signals for coherent combining. However, relying on the destination radio's feedback limits the communications range to that of a single radio. Existing destination-feedback-free approaches rely on phase synchronization and knowing the node locations with sub-wavelength accuracy, which becomes impractical for radios mounted on high-mobility platforms like UAVs. In this work, we propose and demonstrate a destination-feedback-free distributed beamforming approach that leverages the radio's mobility and coarse location information in a dominant line-of-sight channel. In the proposed approach, one radio acts as a guide and moves to point the beam of the remaining radios towards the destination. We specify the radios' position requirements and verify their relation to the combined signal at the destination using simulations. A proof of concept demo was implemented using software defined radios, showing up to 9dB SNR improvement in the beamforming direction just by relying on the coarse placement of four radios.
△ Less
Submitted 12 January, 2022; v1 submitted 4 August, 2021;
originally announced August 2021.
-
Signal Processing Based Deep Learning for Blind Symbol Decoding and Modulation Classification
Authors:
Samer Hanna,
Chris Dick,
Danijela Cabric
Abstract:
Blindly decoding a signal requires estimating its unknown transmit parameters, compensating for the wireless channel impairments, and identifying the modulation type. While deep learning can solve complex problems, digital signal processing (DSP) is interpretable and can be more computationally efficient. To combine both, we propose the dual path network (DPN). It consists of a signal path of DSP…
▽ More
Blindly decoding a signal requires estimating its unknown transmit parameters, compensating for the wireless channel impairments, and identifying the modulation type. While deep learning can solve complex problems, digital signal processing (DSP) is interpretable and can be more computationally efficient. To combine both, we propose the dual path network (DPN). It consists of a signal path of DSP operations that recover the signal, and a feature path of neural networks that estimate the unknown transmit parameters. By interconnecting the paths over several recovery stages, later stages benefit from the recovered signals and reuse all the previously extracted features. The proposed design is demonstrated to provide 5% improvement in modulation classification compared to alternative designs lacking either feature sharing or access to recovered signals. The estimation results of DPN along with its blind decoding performance are shown to outperform a blind signal processing algorithm for BPSK and QPSK on a simulated dataset. An over-the-air software-defined-radio capture was used to verify DPN results at high SNRs. DPN design can process variable length inputs and is shown to outperform relying on fixed length inputs with prediction averaging on longer signals by up to 15% in modulation classification.
△ Less
Submitted 25 October, 2021; v1 submitted 19 June, 2021;
originally announced June 2021.
-
A Schottky-Diode-Based Wake-Up Receiver for IoT Applications
Authors:
Mahmoud Elhebeary,
Samer Hanna,
Sudhakar Pamarti,
Danijela Cabric,
Chih-Kong Ken Yang
Abstract:
This paper presents an always-on low-power wake-up receiver (WuRx) that activates the remainder of the system when a wake-up signal is detected. The proposed receiver has two phases of waking up. The first phase uses an integrated CMOS Schottky diodes to detect the signal power at a low bias current. The approach dissipates low quiescent power and allows the reuse of the design in multiple frequen…
▽ More
This paper presents an always-on low-power wake-up receiver (WuRx) that activates the remainder of the system when a wake-up signal is detected. The proposed receiver has two phases of waking up. The first phase uses an integrated CMOS Schottky diodes to detect the signal power at a low bias current. The approach dissipates low quiescent power and allows the reuse of the design in multiple frequency bands with only modifying the matching network. In the second phase, a data-locked startable oscillator is proposed to correlate the received data with a target signature. This design eliminates the area and power dissipation of an external crystal oscillator and only turns on when the second phase is activated. By correlating to a target signature, the second phase also reduces the probability of a false alarm (PFA) that would otherwise wake up the high-power bulk of the system. The two-phase approach leads to significant reduction in average power consumption when compared to a single-phase design. This implementation targets sub-ms wake-up latency and operates in the unlicensed band at a 750-MHz carrier frequency with a data rate of 200 kbps. The design achieves $\sim$8.45pJ/bit and $<$-50 dBm of input sensitivity and average power of 1.69$μ$W. The system is implemented in 65-nm CMOS technology and occupies an area of 1mm$\times$0.75mm.
△ Less
Submitted 31 May, 2021;
originally announced June 2021.
-
Optimal Codes Correcting Localized Deletions
Authors:
Rawad Bitar,
Serge Kas Hanna,
Nikita Polyanskii,
Ilya Vorobyev
Abstract:
We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletio…
▽ More
We consider the problem of constructing codes that can correct deletions that are localized within a certain part of the codeword that is unknown a priori. Namely, the model that we study is when at most $k$ deletions occur in a window of size $k$, where the positions of the deletions within this window are not necessarily consecutive. Localized deletions are thus a generalization of burst deletions that occur in consecutive positions. We present novel explicit codes that are efficiently encodable and decodable and can correct up to $k$ localized deletions. Furthermore, these codes have $\log n+\mathcal{O}(k \log^2 (k\log n))$ redundancy, where $n$ is the length of the information message, which is asymptotically optimal in $n$ for $k=o(\log n/(\log \log n)^2)$.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Detecting Deletions and Insertions in Concatenated Strings with Optimal Redundancy
Authors:
Serge Kas Hanna,
Rawad Bitar
Abstract:
We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of detecting up to $\del$ deletions. We prove the optimality of these codes by deriving a converse result which shows that the redundancy of our codes is asymptotically optimal in $\del$ among all families of deletion detecting codes, and particularly…
▽ More
We study codes that can detect the exact number of deletions and insertions in concatenated binary strings. We construct optimal codes for the case of detecting up to $\del$ deletions. We prove the optimality of these codes by deriving a converse result which shows that the redundancy of our codes is asymptotically optimal in $\del$ among all families of deletion detecting codes, and particularly optimal among all block-by-block decodable codes. For the case of insertions, we construct codes that can detect up to $2$ insertions in each concatenated binary string.
△ Less
Submitted 1 May, 2021;
originally announced May 2021.
-
UAV Swarm Position Optimization for High Capacity MIMO Backhaul
Authors:
Samer Hanna,
Enes Krijestorac,
Danijela Cabric
Abstract:
A swarm of cooperating UAVs communicating with a distant multiantenna ground station can leverage MIMO spatial multiplexing to scale the capacity. Due to the line-of-sight propagation between the swarm and the ground station, the MIMO channel is highly correlated, leading to limited multiplexing gains. In this paper, we optimize the UAV positions to attain the maximum MIMO capacity given by the si…
▽ More
A swarm of cooperating UAVs communicating with a distant multiantenna ground station can leverage MIMO spatial multiplexing to scale the capacity. Due to the line-of-sight propagation between the swarm and the ground station, the MIMO channel is highly correlated, leading to limited multiplexing gains. In this paper, we optimize the UAV positions to attain the maximum MIMO capacity given by the single user bound. An infinite set of UAV placements that attains the capacity bound is first derived. Given an initial swarm placement, we formulate the problem of minimizing the distance traveled by the UAVs to reach a placement within the capacity maximizing set of positions. An offline centralized solution to the problem using block coordinate descent is developed assuming known initial positions of UAVs. We also propose an online distributed algorithm, where the UAVs iteratively adjust their positions to maximize the capacity. Our proposed approaches are shown to significantly increase the capacity at the expense of a bounded translation from the initial UAV placements. This capacity increase persists when using a massive MIMO ground station. Using numerical simulations, we show the robustness of our approaches in a Rician channel under UAV motion disturbances.
△ Less
Submitted 28 April, 2021;
originally announced April 2021.
-
The Design of the User Interfaces for Privacy Enhancements for Android
Authors:
Jason I. Hong,
Yuvraj Agarwal,
Matt Fredrikson,
Mike Czapik,
Shawn Hanna,
Swarup Sahoo,
Judy Chun,
Won-Woo Chung,
Aniruddh Iyer,
Ally Liu,
Shen Lu,
Rituparna Roychoudhury,
Qian Wang,
Shan Wang,
Siqi Wang,
Vida Zhang,
Jessica Zhao,
Yuan Jiang,
Haojian **,
Sam Kim,
Evelyn Kuo,
Tianshi Li,
**** Liu,
Yile Liu,
Robert Zhang
Abstract:
We present the design and design rationale for the user interfaces for Privacy Enhancements for Android (PE for Android). These UIs are built around two core ideas, namely that developers should explicitly declare the purpose of why sensitive data is being used, and these permission-purpose pairs should be split by first party and third party uses. We also present a taxonomy of purposes and ways o…
▽ More
We present the design and design rationale for the user interfaces for Privacy Enhancements for Android (PE for Android). These UIs are built around two core ideas, namely that developers should explicitly declare the purpose of why sensitive data is being used, and these permission-purpose pairs should be split by first party and third party uses. We also present a taxonomy of purposes and ways of how these ideas can be deployed in the existing Android ecosystem.
△ Less
Submitted 24 April, 2021;
originally announced April 2021.
-
Spatial Signal Strength Prediction using 3D Maps and Deep Learning
Authors:
Enes Krijestorac,
Samer Hanna,
Danijela Cabric
Abstract:
Machine learning (ML) and artificial neural networks (ANNs) have been successfully applied to simulating complex physics by learning physics models thanks to large data. Inspired by the successes of ANNs in physics modeling, we use deep neural networks (DNNs) to predict the radio signal strength field in an urban environment. Our algorithm relies on samples of signal strength collected across the…
▽ More
Machine learning (ML) and artificial neural networks (ANNs) have been successfully applied to simulating complex physics by learning physics models thanks to large data. Inspired by the successes of ANNs in physics modeling, we use deep neural networks (DNNs) to predict the radio signal strength field in an urban environment. Our algorithm relies on samples of signal strength collected across the prediction space and a 3D map of the environment, which enables it to predict the scattering of radio waves through the environment. While already extensive body of research exists in spatial signal strength prediction, our approach differs from most existing approaches in that it does not require the knowledge of the transmitter location, it does not require side channel information such as attenuation and shadowing parameters, and it is the first work, to the best of our knowledge, to use 3D maps to accomplish the task of signal strength prediction. This algorithm is developed for the purpose of placement optimization of a UAV or mobile robot to maximize the signal strength to or from a stationary transceiver but it also holds relevance to dynamic spectrum access networks, cellular coverage design, power control algorithms, etc.
△ Less
Submitted 6 November, 2020;
originally announced November 2020.
-
Combining Deep Learning and Linear Processing for Modulation Classification and Symbol Decoding
Authors:
Samer Hanna,
Chris Dick,
Danijela Cabric
Abstract:
Deep learning has been recently applied to many problems in wireless communications including modulation classification and symbol decoding. Many of the existing end-to-end learning approaches demonstrated robustness to signal distortions like frequency and timing errors, and outperformed classical signal processing techniques with sufficient training. However, deep learning approaches typically r…
▽ More
Deep learning has been recently applied to many problems in wireless communications including modulation classification and symbol decoding. Many of the existing end-to-end learning approaches demonstrated robustness to signal distortions like frequency and timing errors, and outperformed classical signal processing techniques with sufficient training. However, deep learning approaches typically require hundreds of thousands of floating points operations for inference, which is orders of magnitude higher than classical signal processing approaches and thus do not scale well for long sequences. Additionally, they typically operate as a black box and without insight on how their final output was obtained, they can't be integrated with existing approaches. In this paper, we propose a novel neural network architecture that combines deep learning with linear signal processing typically done at the receiver to realize joint modulation classification and symbol recovery. The proposed method estimates signal parameters by learning and corrects signal distortions like carrier frequency offset and multipath fading by linear processing. Using this hybrid approach, we leverage the power of deep learning while retaining the efficiency of conventional receiver processing techniques for long sequences. The proposed hybrid approach provides good accuracy in signal distortion estimation leading to promising results in terms of symbol error rate. For modulation classification accuracy, it outperforms many state of the art deep learning networks.
△ Less
Submitted 13 September, 2020; v1 submitted 1 June, 2020;
originally announced June 2020.
-
Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Dataset Considerations
Authors:
Samer Hanna,
Samurdhi Karunaratne,
Danijela Cabric
Abstract:
Due to imperfections in transmitters' hardware, wireless signals can be used to verify their identity in an authorization system. While deep learning was proposed for transmitter identification, the majority of the work has focused on classification among a closed set of transmitters. Malicious transmitters outside this closed set will be misclassified, jeopardizing the authorization system. In th…
▽ More
Due to imperfections in transmitters' hardware, wireless signals can be used to verify their identity in an authorization system. While deep learning was proposed for transmitter identification, the majority of the work has focused on classification among a closed set of transmitters. Malicious transmitters outside this closed set will be misclassified, jeopardizing the authorization system. In this paper, we consider the problem of recognizing authorized transmitters and rejecting new transmitters. To address this problem, we adapt the most prominent approaches from the open set recognition and anomaly detection literature to the problem. We study how these approaches scale with the required number of authorized transmitters. We propose using a known set of unauthorized transmitters to assist the training and study its impact. The evaluation procedure takes into consideration that some transmitters might be more similar than others and nuances these effects. The robustness of the RF authorization with respect to temporal changes in fingerprints is also considered in the evaluation. When using 10 authorized and 50 known unauthorized WiFi transmitters from a publicly accessible testbed, we were able to achieve an outlier detection accuracy of 98% on the same day test set and 80% on the different day test set.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Adaptive Distributed Stochastic Gradient Descent for Minimizing Delay in the Presence of Stragglers
Authors:
Serge Kas Hanna,
Rawad Bitar,
Parimal Parag,
Venkat Dasari,
Salim El Rouayheb
Abstract:
We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updating…
▽ More
We consider the setting where a master wants to run a distributed stochastic gradient descent (SGD) algorithm on $n$ workers each having a subset of the data. Distributed SGD may suffer from the effect of stragglers, i.e., slow or unresponsive workers who cause delays. One solution studied in the literature is to wait at each iteration for the responses of the fastest $k<n$ workers before updating the model, where $k$ is a fixed parameter. The choice of the value of $k$ presents a trade-off between the runtime (i.e., convergence rate) of SGD and the error of the model. Towards optimizing the error-runtime trade-off, we investigate distributed SGD with adaptive $k$. We first design an adaptive policy for varying $k$ that optimizes this trade-off based on an upper bound on the error as a function of the wall-clock time which we derive. Then, we propose an algorithm for adaptive distributed SGD that is based on a statistical heuristic. We implement our algorithm and provide numerical simulations which confirm our intuition and theoretical analysis.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
Deep Learning Approaches for Open Set Wireless Transmitter Authorization
Authors:
Samer Hanna,
Samurdhi Karunaratne,
Danijela Cabric
Abstract:
Wireless signals contain transmitter specific features, which can be used to verify the identity of transmitters and assist in implementing an authentication and authorization system. Most recently, there has been wide interest in using deep learning for transmitter identification. However, the existing deep learning work has posed the problem as closed set classification, where a neural network c…
▽ More
Wireless signals contain transmitter specific features, which can be used to verify the identity of transmitters and assist in implementing an authentication and authorization system. Most recently, there has been wide interest in using deep learning for transmitter identification. However, the existing deep learning work has posed the problem as closed set classification, where a neural network classifies among a finite set of known transmitters. No matter how large this set is, it will not include all transmitters that exist. Malicious transmitters outside this closed set, once within communications range, can jeopardize the system security. In this paper, we propose a deep learning approach for transmitter authorization based on open set recognition. Our proposed approach identifies a set of authorized transmitters, while rejecting any other unseen transmitters by recognizing their signals as outliers. We propose three approaches for this problem and show their ability to reject signals from unauthorized transmitters on a dataset of WiFi captures. We consider the structure of training data needed, and we show that the accuracy improves by having signals from known unauthorized transmitters in the training set.
△ Less
Submitted 1 June, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
BIM-assisted object recognition for the on-site autonomous robotic assembly of discrete structures
Authors:
Mohamed Dawod,
Sean Hanna
Abstract:
Robots-operating autonomous assembly applications in an unstructured environment require precise methods to locate the building components on site. However, the current available object detection systems are not well-optimised for construction applications, due to the tedious setups incorporated for referencing an object to a system and inability to cope with the elements imperfections. In this pa…
▽ More
Robots-operating autonomous assembly applications in an unstructured environment require precise methods to locate the building components on site. However, the current available object detection systems are not well-optimised for construction applications, due to the tedious setups incorporated for referencing an object to a system and inability to cope with the elements imperfections. In this paper, we propose a flexible object pose estimation framework to enable robots to autonomously handle building components on-site with an error tolerance to build a specific design target without the need to sort or label them. We implemented an object recognition approach that uses the virtual representation model of all the objects found in a BIM model to autonomously search for the best-matched objects in a scene. The design layout is used to guide the robot to grasp and manipulate the found elements to build the desired structure. We verify our proposed framework by testing it in an automatic discrete wall assembly workflow. Although the precision is not as expected, we analyse the possible reasons that might cause this imprecision, which paves the path for future improvements.
△ Less
Submitted 22 August, 2019;
originally announced August 2019.
-
UAV Access Point Placement for Connectivity to a User with Unknown Location Using Deep RL
Authors:
Enes Krijestorac,
Samer Hanna,
Danijela Cabric
Abstract:
In recent years, unmanned aerial vehicles (UAVs) have been considered for telecommunications purposes as relays, caches, or IoT data collectors. In addition to being easy to deploy, their maneuverability allows them to adjust their location to optimize the capacity of the link to the user equipment on the ground or of the link to the basestation. The majority of the previous work that analyzes the…
▽ More
In recent years, unmanned aerial vehicles (UAVs) have been considered for telecommunications purposes as relays, caches, or IoT data collectors. In addition to being easy to deploy, their maneuverability allows them to adjust their location to optimize the capacity of the link to the user equipment on the ground or of the link to the basestation. The majority of the previous work that analyzes the optimal placement of such a UAV makes at least one of two assumptions: the channel can be predicted using a simple model or the locations of the users on the ground are known. In this paper, we use deep reinforcement learning (deep RL) to optimally place a UAV serving a ground user in an urban environment, without the previous knowledge of the channel or user location. Our algorithm relies on signal-to-interference-plus-noise ratio (SINR) measurements and a 3D map of the topology to account for blockage and scatterers. Furthermore, it is designed to operate in any urban environment. Results in conditions simulated by a ray tracing software show that with the constraint on the maximum number of iterations our algorithm has a 90% success rate in converging to a target SINR.
△ Less
Submitted 12 July, 2019; v1 submitted 8 July, 2019;
originally announced July 2019.
-
UAV Swarms as Amplify-and-Forward MIMO Relays
Authors:
Samer Hanna,
Enes Krijestorac,
Han Yan,
Danijela Cabric
Abstract:
Unmanned aerial vehicles provide new opportunities for performance improvements in future wireless communications systems. For example, they can act as relays that extend the range of a communication link and improve the capacity. Unlike conventional relays that are deployed at fixed locations, UAVs can change their positions to optimize the capacity or range on demand. In this paper, we consider…
▽ More
Unmanned aerial vehicles provide new opportunities for performance improvements in future wireless communications systems. For example, they can act as relays that extend the range of a communication link and improve the capacity. Unlike conventional relays that are deployed at fixed locations, UAVs can change their positions to optimize the capacity or range on demand. In this paper, we consider using a swarm of UAVs as amplify-and-forward MIMO relays to provide connectivity between an obstructed multi-antenna equipped source and destination. We start by optimizing UAV placement for the single antenna case, and analyze its dependence on the noise introduced by the relay, its gain, and transmit power constraint. We extend our analysis for an arbitrary UAV swarm and show how the MIMO link capacity can be optimized by changing the distance of the swarm to the source and the destination. Then, we consider the effect of optimizing the positions of the UAVs within the swarm and derive an upper bound for the capacity at any given placement of the swarm. We also propose a simple near optimal approach to find the positions that optimize the capacity for the end-to-end link given that the source and the destination have uniform rectangular arrays.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
A Second Source of Repeating Fast Radio Bursts
Authors:
The CHIME/FRB Collaboration,
:,
M. Amiri,
K. Bandura,
M. Bhardwaj,
P. Boubel,
M. M. Boyce,
P. J. Boyle,
C. Brar,
M. Burhanpurkar,
T. Cassanelli,
P. Chawla,
J. F. Cliche,
D. Cubranic,
M. Deng,
N. Denman,
M. Dobbs,
M. Fandino,
E. Fonseca,
B. M. Gaensler,
A. J. Gilbert,
A. Gill,
U. Giri,
D. C. Good,
M. Halpern
, et al. (36 additional authors not shown)
Abstract:
The discovery of a repeating Fast Radio Burst (FRB) source, FRB 121102, eliminated models involving cataclysmic events for this source. No other repeating FRB has yet been detected in spite of many recent FRB discoveries and follow-ups, suggesting repeaters may be rare in the FRB population. Here we report the detection of six repeat bursts from FRB 180814.J0422+73, one of the 13 FRBs detected by…
▽ More
The discovery of a repeating Fast Radio Burst (FRB) source, FRB 121102, eliminated models involving cataclysmic events for this source. No other repeating FRB has yet been detected in spite of many recent FRB discoveries and follow-ups, suggesting repeaters may be rare in the FRB population. Here we report the detection of six repeat bursts from FRB 180814.J0422+73, one of the 13 FRBs detected by the Canadian Hydrogen Intensity Map** Experiment (CHIME) FRB project during its pre-commissioning phase in July and August 2018. These repeat bursts are consistent with originating from a single position on the sky, with the same dispersion measure (DM), ~189 pc cm-3. This DM is approximately twice the expected Milky Way column density, and implies an upper limit on the source redshift of 0.1, at least a factor of ~2 closer than FRB 121102. In some of the repeat bursts, we observe sub-pulse frequency structure, drifting, and spectral variation reminiscent of that seen in FRB 121102, suggesting similar emission mechanisms and/or propagation effects. This second repeater, found among the first few CHIME/FRB discoveries, suggests that there exists -- and that CHIME/FRB and other wide-field, sensitive radio telescopes will find -- a substantial population of repeating FRBs.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity
Authors:
Samer S. Hanna,
Danijela Cabric
Abstract:
The imperfections in the RF frontend of different transmitters can be used to distinguish them. This process is called transmitter identification using RF fingerprints. The nonlinearity in the power amplifier of the RF frontend is a significant cause of the discrepancy in RF fingerprints, which enables transmitter identification. In this work, we use deep learning to identify different transmitter…
▽ More
The imperfections in the RF frontend of different transmitters can be used to distinguish them. This process is called transmitter identification using RF fingerprints. The nonlinearity in the power amplifier of the RF frontend is a significant cause of the discrepancy in RF fingerprints, which enables transmitter identification. In this work, we use deep learning to identify different transmitters using their nonlinear characteristics. By develo** a nonlinear model generator based on extensive measurements, we were able to extend the evaluation of transmitter identification to include a larger number of transmitters beyond what exists in the literature. We were also able to study the impact of transmitter variability on identification accuracy. Additionally, many other factors were considered including modulation type, length of data used for identification, and type of data being transmitted whether identical or random under a realistic channel model. Simulation results were compared with experiments which confirmed similar trends.
△ Less
Submitted 11 November, 2018;
originally announced November 2018.
-
Distributed UAV Placement Optimization for Cooperative Line-of-Sight MIMO Communications
Authors:
Samer Hanna,
Han Yan,
Danijela Cabric
Abstract:
Cooperative communication using unmanned aerial vehicles (UAVs) is a promising technology for infrastructureless wireless networks. One of the key challenges in UAV based communications is the backhaul throughput. In this paper, we propose optimization of the UAV swarm positions to achieve a high mulitplexing gain in line-of-sight (LoS) MIMO backhaul. We develop two distributed algorithms to posit…
▽ More
Cooperative communication using unmanned aerial vehicles (UAVs) is a promising technology for infrastructureless wireless networks. One of the key challenges in UAV based communications is the backhaul throughput. In this paper, we propose optimization of the UAV swarm positions to achieve a high mulitplexing gain in line-of-sight (LoS) MIMO backhaul. We develop two distributed algorithms to position the UAVs such that each UAV moves a minimal distance to realize the highest capacity LoS MIMO channel. The first approach uses iterative gradient descent (GD) and the second uses iterative brute force (BF). Simulations show that both algorithms can achieve up to 6 times higher capacity compared to the approach relying on random UAV placement, earlier proposed in the literature. BF has the advantage of not requiring any location information, while GD is less sensitive to errors in motion.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
Software Defined Radio Implementation of Carrier and Timing Synchronization for Distributed Arrays
Authors:
Han Yan,
Samer Hanna,
Kevin Balke,
Riten Gupta,
Danijela Cabric
Abstract:
The communication range of wireless networks can be greatly improved by using distributed beamforming from a set of independent radio nodes. One of the key challenges in establishing a beamformed communication link from separate radios is achieving carrier frequency and sample timing synchronization. This paper describes an implementation that addresses both carrier frequency and sample timing syn…
▽ More
The communication range of wireless networks can be greatly improved by using distributed beamforming from a set of independent radio nodes. One of the key challenges in establishing a beamformed communication link from separate radios is achieving carrier frequency and sample timing synchronization. This paper describes an implementation that addresses both carrier frequency and sample timing synchronization simultaneously using RF signaling between designated master and slave nodes. By using a pilot signal transmitted by the master node, each slave estimates and tracks the frequency and timing offset and digitally compensates for them. A real-time implementation of the proposed system was developed in GNU Radio and tested with Ettus USRP N210 software defined radios. The measurements show that the distributed array can reach a residual frequency error of 5 Hz and a residual timing offset of 1/16 the sample duration for 70 percent of the time. This performance enables distributed beamforming for range extension applications.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
List Decoding of Deletions Using Guess & Check Codes
Authors:
Serge Kas Hanna,
Salim El Rouayheb
Abstract:
Guess & Check (GC) codes are systematic binary codes that can correct multiple deletions, with high probability. GC codes have logarithmic redundancy in the length of the message $k$, and the encoding and decoding algorithms of these codes are deterministic and run in polynomial time for a constant number of deletions $δ$. The unique decoding properties of GC codes were examined in a previous work…
▽ More
Guess & Check (GC) codes are systematic binary codes that can correct multiple deletions, with high probability. GC codes have logarithmic redundancy in the length of the message $k$, and the encoding and decoding algorithms of these codes are deterministic and run in polynomial time for a constant number of deletions $δ$. The unique decoding properties of GC codes were examined in a previous work by the authors. In this paper, we investigate the list decoding performance of these codes. Namely, we study the average size and the maximum size of the list obtained by a GC decoder for a constant number of deletions $δ$. The theoretical results show that: (i) the average size of the list approaches $1$ as $k$ grows; and (ii) there exists an infinite sequence of GC codes indexed by $k$, whose maximum list size in upper bounded by a constant that is independent of $k$. We also provide numerical simulations on the list decoding performance of GC codes for multiple values of $k$ and $δ$.
△ Less
Submitted 29 April, 2019; v1 submitted 16 October, 2018;
originally announced October 2018.
-
Codes for Correcting Localized Deletions
Authors:
Serge Kas Hanna,
Salim El Rouayheb
Abstract:
We consider the problem of constructing binary codes for correcting deletions that are localized within certain parts of the codeword that are unknown a priori. The model that we study is when $δ\leq w$ deletions are localized in a window of size $w$ bits. These $δ$ deletions do not necessarily occur in consecutive positions, but are restricted to the window of size $w$. The localized deletions mo…
▽ More
We consider the problem of constructing binary codes for correcting deletions that are localized within certain parts of the codeword that are unknown a priori. The model that we study is when $δ\leq w$ deletions are localized in a window of size $w$ bits. These $δ$ deletions do not necessarily occur in consecutive positions, but are restricted to the window of size $w$. The localized deletions model is a generalization of the bursty model, in which all the deleted bits are consecutive. In this paper, we construct new explicit codes for the localized model, based on the family of Guess & Check codes which was previously introduced by the authors. The codes that we construct can correct, with high probability, $δ\leq w$ deletions that are localized in a single window of size $w$, where $w$ grows with the block length. Moreover, these codes are systematic; have low redundancy; and have efficient deterministic encoding and decoding algorithms. We also generalize these codes to deletions that are localized within multiple windows in the codeword.
△ Less
Submitted 8 January, 2021; v1 submitted 2 November, 2017;
originally announced November 2017.
-
Guess & Check Codes for Deletions, Insertions, and Synchronization
Authors:
Serge Kas Hanna,
Salim El Rouayheb
Abstract:
We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes, dating back to 1965, are zero-error single deletion $(δ=1)$ correcting codes, and have an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions remains an open problem. In this work, we relax the standar…
▽ More
We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes, dating back to 1965, are zero-error single deletion $(δ=1)$ correcting codes, and have an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions remains an open problem. In this work, we relax the standard zero-error (i.e., worst-case) decoding requirement by assuming that the positions of the $δ$ deletions (or insertions) are independent of the codeword. Our contribution is a new family of explicit codes, that we call Guess & Check (GC) codes, that can correct with high probability up to a constant number of $δ$ deletions (or insertions). GC codes are systematic; and have deterministic polynomial time encoding and decoding algorithms. We also describe the application of GC codes to file synchronization.
△ Less
Submitted 24 May, 2018; v1 submitted 24 May, 2017;
originally announced May 2017.
-
Guess & Check Codes for Deletions and Synchronization
Authors:
Serge Kas Hanna,
Salim El Rouayheb
Abstract:
We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes can correct all possible single deletions $(δ=1)$ with an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions is an open problem. We propose a new family of codes, that we call Guess & Check (GC) codes,…
▽ More
We consider the problem of constructing codes that can correct $δ$ deletions occurring in an arbitrary binary string of length $n$ bits. Varshamov-Tenengolts (VT) codes can correct all possible single deletions $(δ=1)$ with an asymptotically optimal redundancy. Finding similar codes for $δ\geq 2$ deletions is an open problem. We propose a new family of codes, that we call Guess & Check (GC) codes, that can correct, with high probability, a constant number of deletions $δ$ occurring at uniformly random positions within an arbitrary string. The GC codes are based on MDS codes and have an asymptotically optimal redundancy that is $Θ(δ\log n)$. We provide deterministic polynomial time encoding and decoding schemes for these codes. We also describe the applications of GC codes to file synchronization.
△ Less
Submitted 27 April, 2017; v1 submitted 15 February, 2017;
originally announced February 2017.
-
Silicon photomultiplier-based Compton Telescope for Safety and Security (SCoTSS)
Authors:
Laurel E. Sinclair,
Patrick R. B. Saull,
David S. Hanna,
Henry C. J. Seywerd,
Audrey M. L. MacLeod,
Patrick J. Boyle
Abstract:
A Compton gamma imager has been developed for use in consequence management operations and in security investigations. The imager uses solid inorganic scintillator, known for robust performance in field survey conditions. The design was constrained in overall size by the requirement that it be person transportable and operable from a variety of platforms. In order to introduce minimal dead materia…
▽ More
A Compton gamma imager has been developed for use in consequence management operations and in security investigations. The imager uses solid inorganic scintillator, known for robust performance in field survey conditions. The design was constrained in overall size by the requirement that it be person transportable and operable from a variety of platforms. In order to introduce minimal dead material in the path of the incoming and scattered gamma rays, custom silicon photomultipliers (SiPMs), with a thin glass substrate, were used to collect the scintillation light from the scatter layers. To move them out of the path of the gamma rays, preamplification electronics for the silicon photomultipliers were located a distance from the imager. This imager, the Silicon photomultiplier Compton Telescope for Safety and Security (SCoTSS) is able to provide a one-degree image resolution in a plus-minus 45 degree field of view for a 10 mCi point source 40 m distant, within about one minute, for gamma-ray energies ranging from 344 keV to 1274 keV. Here, we present a comprehensive performance study of the SCoTSS imager.
△ Less
Submitted 8 January, 2016;
originally announced January 2016.
-
Development of a Compton imager based on bars of scintillator
Authors:
A. M. L. MacLeod,
P. J. Boyle,
D. S. Hanna,
P. R. B. Saull,
L. E. Sinclair,
H. C. J. Seywerd
Abstract:
We have developed a compact Compton gamma-ray imager with a large field of view and a low channel-count that is capable of quickly localizing gamma-ray sources in the few hundred keV - several MeV range. The two detector planes (scatter and absorber) employ bars of NaI(Tl) read out by photomultiplier tubes (PMTs) located at each end. The long-range imaging performance has been tested from 392 keV…
▽ More
We have developed a compact Compton gamma-ray imager with a large field of view and a low channel-count that is capable of quickly localizing gamma-ray sources in the few hundred keV - several MeV range. The two detector planes (scatter and absorber) employ bars of NaI(Tl) read out by photomultiplier tubes (PMTs) located at each end. The long-range imaging performance has been tested from 392 keV to 1274 keV. An angular resolution measure of 2.72 +/- 0.06 degrees and an efficiency of (1.79 +/- 0.04) x 10^(-3) at 662 keV is obtained. A Cs-137 (662 keV) source equivalent to a 10 mCi source 40 m away can be located in 60 seconds with an uncertainty of about a degree. No significant degradation in imaging performance is observed for source angles up to 40 degrees off axis.
△ Less
Submitted 16 June, 2015;
originally announced June 2015.
-
First demonstration of a Compton gamma imager based on silicon photomultipliers
Authors:
P. R. B. Saull,
L. E. Sinclair,
H. C. J. Seywerd,
D. S. Hanna,
P. J. Boyle,
A. M. L. MacLeod
Abstract:
We are develo** a rugged and person-transportable Compton gamma imager for use in security investigations of radioactive materials, and for radiological incident remediation. The imager is composed of layers of scintillator with light collection for the forward layers provided by silicon photomultipliers and for the rear layer by photomultiplier tubes. As a first step, we have developed a 1/5th-…
▽ More
We are develo** a rugged and person-transportable Compton gamma imager for use in security investigations of radioactive materials, and for radiological incident remediation. The imager is composed of layers of scintillator with light collection for the forward layers provided by silicon photomultipliers and for the rear layer by photomultiplier tubes. As a first step, we have developed a 1/5th-scale demonstration unit of the final imager. We present the imaging performance of this demonstration unit for Cs-137 at angles of up to 30 degrees off-axis. Results are also presented for Sn-113 and Na-22. This represents the first demonstration of the use of silicon photomultipliers as an embedded component for light collection in a Compton gamma imager.
△ Less
Submitted 3 July, 2012;
originally announced July 2012.
-
Very high-energy observations of the two high-frequency peaked BL Lac objects 1ES 1218+304 and H 1426+428
Authors:
C. Mueller,
N. Akhter,
J. Ball,
D. A. Bramel,
J. Carson,
C. E. Covault,
D. Driscoll,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
A. Jarvis,
J. Kildea,
T. Lindner,
R. Mukherjee,
R. A. Ong,
K. Ragan,
R. A. Scalzo,
D. A. Williams,
J. Zweerink
Abstract:
We present results of very-high-energy gamma-ray observations (E > 160 GeV) of two high-frequency-peaked BL Lac (HBL) objects, 1ES 1218+304 and H 1426+428, with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). Both sources are very-high-energy gamma-ray emitters above 100 GeV, detected using ground-based Cherenkov telescopes. STACEE observations of 1ES 1218+304 and H 1426+428 did…
▽ More
We present results of very-high-energy gamma-ray observations (E > 160 GeV) of two high-frequency-peaked BL Lac (HBL) objects, 1ES 1218+304 and H 1426+428, with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). Both sources are very-high-energy gamma-ray emitters above 100 GeV, detected using ground-based Cherenkov telescopes. STACEE observations of 1ES 1218+304 and H 1426+428 did not produce detections; we present 99% CL flux upper limits for both sources, assuming spectral indices measured mostly at higher energies.
△ Less
Submitted 14 April, 2011;
originally announced April 2011.
-
One-dimensional radiation-hydrodynamic scaling studies of imploding spherical plasma liners
Authors:
T. J. Awe,
C. S. Adams,
J. S. Davis,
D. S. Hanna,
S. C. Hsu,
J. T. Cassibry
Abstract:
One-dimensional radiation-hydrodynamic simulations are performed to develop insight into the scaling of stagnation pressure with initial conditions of an imploding spherical plasma shell or "liner." Simulations reveal the evolution of high-Mach-number (M), annular, spherical plasma flows during convergence, stagnation, shock formation, and disassembly, and indicate that cm- and μs-scale plasmas wi…
▽ More
One-dimensional radiation-hydrodynamic simulations are performed to develop insight into the scaling of stagnation pressure with initial conditions of an imploding spherical plasma shell or "liner." Simulations reveal the evolution of high-Mach-number (M), annular, spherical plasma flows during convergence, stagnation, shock formation, and disassembly, and indicate that cm- and μs-scale plasmas with peak pressures near 1 Mbar can be generated by liners with initial kinetic energy of several hundred kilo-joules. It is shown that radiation transport and thermal conduction must be included to avoid non-physical plasma temperatures at the origin which artificially limit liner convergence and thus the peak stagnation pressure. Scalings of the stagnated plasma lifetime (τstag) and average stagnation pressure (Pstag, the pressure at the origin, averaged over τstag) are determined by evaluating a wide range of liner initial conditions. For high-M flows, τstag L0/v0, where L0 and v0 are the initial liner thickness and velocity, respectively. Furthermore, for argon liners, Pstag scales approximately as v0^(15/4) over a wide range of initial densities (n0), and as n0^(1/2) over a wide range of v0. The approximate scaling Pstag ~ M 3/2 is also found for a wide range of liner-plasma initial conditions.
△ Less
Submitted 23 June, 2011; v1 submitted 23 March, 2011;
originally announced March 2011.
-
OSETI with STACEE: A Search for Nanosecond Optical Transients from Nearby Stars
Authors:
D. S. Hanna,
J. Ball,
C. E. Covault,
J. E. Carson,
D. D. Driscoll,
P. Fortin,
D. M. Gingrich,
A. Jarvis,
J. Kildea,
T. Lindner,
C. Mueller,
R. Mukherjee,
R. A. Ong,
K. Ragan,
D. A. Williams,
J. Zweerink
Abstract:
We have used the STACEE high-energy gamma-ray detector to look for fast blue-green laser pulses from the vicinity of 187 stars. The STACEE detector offers unprecedented light-collecting capability for the detection of nanosecond pulses from such lasers. We estimate STACEE's sensitivity to be approximately 10 photons per square meter at a wavelength of 420 nm. The stars have been chosen because t…
▽ More
We have used the STACEE high-energy gamma-ray detector to look for fast blue-green laser pulses from the vicinity of 187 stars. The STACEE detector offers unprecedented light-collecting capability for the detection of nanosecond pulses from such lasers. We estimate STACEE's sensitivity to be approximately 10 photons per square meter at a wavelength of 420 nm. The stars have been chosen because their characteristics are such that they may harbor habitable planets and they are relatively close to Earth. Each star was observed for 10 minutes and we found no evidence for laser pulses in any of the data sets.
△ Less
Submitted 14 April, 2009;
originally announced April 2009.
-
Simulations of a Scintillator Compton Gamma Imager for Safety and Security
Authors:
L. E. Sinclair,
D. S. Hanna,
A. M. L. MacLeod,
P. R. B. Saull
Abstract:
We are designing an all-scintillator Compton gamma imager for use in security investigations and remediation actions involving radioactive threat material. To satisfy requirements for a rugged and portable instrument, we have chosen solid scintillator for the active volumes of both the scatter and absorber detectors. Using the BEAMnrc/EGSnrc Monte Carlo simulation package, we have constructed mo…
▽ More
We are designing an all-scintillator Compton gamma imager for use in security investigations and remediation actions involving radioactive threat material. To satisfy requirements for a rugged and portable instrument, we have chosen solid scintillator for the active volumes of both the scatter and absorber detectors. Using the BEAMnrc/EGSnrc Monte Carlo simulation package, we have constructed models using four different materials for the scatter detector: LaBr_3, NaI, CaF_2 and PVT. We have compared the detector performances using angular resolution, efficiency, and image resolution. We find that while PVT provides worse performance than that of the detectors based entirely on inorganic scintillators, all of the materials investigated for the scatter detector have the potential to provide performance adequate for our purposes.
△ Less
Submitted 28 June, 2009; v1 submitted 24 September, 2008;
originally announced September 2008.
-
Observations of the Pulsar PSR B1951+32 with the Solar Tower Atmospheric Cherenkov Effect Experiment
Authors:
J. Kildea,
J. Zweerink,
J. Ball,
J. E. Carson,
C. E. Covault,
D. D. Driscoll,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
A. Jarvis,
T. Lindner,
C. Mueller,
R. Mukherjee,
R. A. Ong,
K. Ragan,
D. A. Williams
Abstract:
We present the analysis and results of 12.5 hours of high-energy gamma-ray observations of the EGRET-detected pulsar PSR B1951+32 using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). STACEE is an atmospheric Cherenkov detector, in Albuquerque, New Mexico, that detects cosmic gamma rays using the shower-front-sampling technique. STACEE's sensitivity to astrophysical sources at…
▽ More
We present the analysis and results of 12.5 hours of high-energy gamma-ray observations of the EGRET-detected pulsar PSR B1951+32 using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). STACEE is an atmospheric Cherenkov detector, in Albuquerque, New Mexico, that detects cosmic gamma rays using the shower-front-sampling technique. STACEE's sensitivity to astrophysical sources at energies around 100 GeV allows it to investigate emission from gamma-ray pulsars with expected pulsed emission cutoffs below 100 GeV. We discuss the observations and analysis of STACEE's PSR 1951+32 data, accumulated during the 2005 and 2006 observing seasons.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.
-
STACEE Observations of 1ES 1218+304
Authors:
STACEE Collaboration,
R. Mukherjee,
N. Akhter,
J. Ball,
J. E. Carson,
C. E. Covault,
D. D. Driscoll,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
A. Jarvis,
J. Kildea,
T. Lindner,
C. Mueller,
R. A. Ong,
K. Ragan,
D. A. Williams,
J. Zweerink
Abstract:
We present the analysis and results of recent high-energy gamma-ray observations of the high energy-peaked BL Lac (HBL) object 1ES 1218+304 with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). 1ES 1218+304 is an X-ray bright HBL at a redshift z=0.182. It has been predicted to be a gamma-ray emitter above 100 GeV, detectable by ground-based Cherenkov telescopes. Recently this so…
▽ More
We present the analysis and results of recent high-energy gamma-ray observations of the high energy-peaked BL Lac (HBL) object 1ES 1218+304 with the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE). 1ES 1218+304 is an X-ray bright HBL at a redshift z=0.182. It has been predicted to be a gamma-ray emitter above 100 GeV, detectable by ground-based Cherenkov telescopes. Recently this source has been detected by MAGIC and VERITAS, confirming these predictions. STACEE's sensitivity to astrophysical sources at energies above 100 GeV allows it to explore high energy sources such as X-ray bright active galaxies and gamma-ray bursts. We present results from STACEE observations of 1ES 1218+304 in the 2006 and 2007 observing seasons.
△ Less
Submitted 22 October, 2007;
originally announced October 2007.
-
Gamma-Ray Burst Follow-up Observations with STACEE During 2003-2007
Authors:
STACEE Collaboration,
A. Jarvis,
J. Ball,
J. E. Carson,
C. E. Covault,
D. D. Driscoll,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
J. Kildea,
T. Lindner,
R. Mukherjee,
C. Mueller,
R. A. Ong,
K. Ragan,
D. A. Williams,
J. Zweerink
Abstract:
The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an atmospheric Cherenkov telescope (ACT) that uses a large mirror array to achieve a relatively low energy threshold. For sources with Crab-like spectra, at high elevations, the detector response peaks near 100 GeV. Gamma-ray burst (GRB) observations have been a high priority for the STACEE collaboration since the inception of t…
▽ More
The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an atmospheric Cherenkov telescope (ACT) that uses a large mirror array to achieve a relatively low energy threshold. For sources with Crab-like spectra, at high elevations, the detector response peaks near 100 GeV. Gamma-ray burst (GRB) observations have been a high priority for the STACEE collaboration since the inception of the experiment. We present the results of 20 GRB follow-up observations at times ranging from 3 minutes to 15 hours after the burst triggers. Where redshift measurements are available, we place constraints on the intrinsic high-energy spectra of the bursts.
△ Less
Submitted 22 October, 2007;
originally announced October 2007.
-
Search for Dark Matter Annihilation in Draco with STACEE
Authors:
STACEE Collaboration,
D. D. Driscoll,
J. Ball,
J. E. Carson,
C. E. Covault,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
A. Jarvis,
J. Kildea,
T. Lindner,
C. Mueller,
R. Mukherjee,
R. A. Ong,
K. Ragan,
D. A. Williams,
J. Zweerink
Abstract:
For some time, the Draco dwarf spheroidal galaxy has garnered interest as a possible source for the indirect detection of dark matter. Its large mass-to-light ratio and relative proximity to the Earth provide favorable conditions for the production of detectable gamma rays from dark matter self-annihilation in its core. The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an air-s…
▽ More
For some time, the Draco dwarf spheroidal galaxy has garnered interest as a possible source for the indirect detection of dark matter. Its large mass-to-light ratio and relative proximity to the Earth provide favorable conditions for the production of detectable gamma rays from dark matter self-annihilation in its core. The Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) is an air-shower Cherenkov telescope located in Albuquerque, NM capable of detecting gamma rays at energies above 100 GeV. We present the results of the STACEE observations of Draco during the 2005-2006 observing season totaling 10 hours of livetime after cuts.
△ Less
Submitted 18 October, 2007;
originally announced October 2007.
-
Very high energy observations of the BL Lac objects 3C 66A and OJ 287
Authors:
T. Lindner,
D. S. Hanna,
J. Kildea,
J. Ball,
D. A. Bramel,
J. Carson,
C. E. Covault,
D. Driscoll,
P. Fortin,
D. M. Gingrich,
A. Jarvis,
C. Mueller,
R. Mukherjee,
R. A. Ong,
K. Ragan,
R. A. Scalzo,
D. A. Williams,
J. Zweerink
Abstract:
Using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE), we have observed the BL Lac objects 3C 66A and OJ 287. These are members of the class of low-frequency-peaked BL Lac objects (LBLs) and are two of the three LBLs predicted by Costamante and Ghisellini to be potential sources of very high energy (>100 GeV) gamma-ray emission. The third candidate, BL Lacertae, has recently bee…
▽ More
Using the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE), we have observed the BL Lac objects 3C 66A and OJ 287. These are members of the class of low-frequency-peaked BL Lac objects (LBLs) and are two of the three LBLs predicted by Costamante and Ghisellini to be potential sources of very high energy (>100 GeV) gamma-ray emission. The third candidate, BL Lacertae, has recently been detected by the MAGIC collaboration. Our observations have not produced detections; we calculate a 99% CL upper limit of flux from 3C 66A of 0.15 Crab flux units and from OJ 287 our limit is 0.52 Crab. These limits assume a Crab-like energy spectrum with an effective energy threshold of 185 GeV.
△ Less
Submitted 18 July, 2007;
originally announced July 2007.
-
The Energy Spectrum of the Blazar Markarian 421 Above 130 GeV
Authors:
J. E. Carson,
J. Kildea,
R. A. Ong,
J. Ball,
D. A. Bramel,
C. E. Covault,
D. Driscoll,
P. Fortin,
D. M. Gingrich,
D. S. Hanna,
T. Lindner,
C. Mueller,
A. Jarvis,
R. Mukherjee,
K. Ragan,
R. A. Scalzo,
D. A. Williams,
J. Zweerink
Abstract:
Markarian 421 (Mrk 421) was the first blazar detected at gamma-ray energies above 300 GeV, and it remains one of only twelve TeV blazars detected to date. TeV gamma-ray measurements of its flaring activity and spectral variability have placed constraints on models of the high-energy emission from blazars. However, observations between 50 and 300 GeV are rare, and the high-energy peak of the spec…
▽ More
Markarian 421 (Mrk 421) was the first blazar detected at gamma-ray energies above 300 GeV, and it remains one of only twelve TeV blazars detected to date. TeV gamma-ray measurements of its flaring activity and spectral variability have placed constraints on models of the high-energy emission from blazars. However, observations between 50 and 300 GeV are rare, and the high-energy peak of the spectral energy distribution (SED), predicted to be in this range, has never been directly detected. We present a detection of Mrk 421 above 100 GeV as made by the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) during a multiwavelength campaign in early 2004. STACEE is a ground-based atmospheric Cherenkov telescope using the wavefront sampling technique to detect gamma rays at lower energies than achieved by most imaging Cherenkov telescopes. We also outline a method for reconstructing gamma-ray energies using a solar heliostat telescope. This technique was applied to the 2004 data, and we present the differential energy spectrum of Mrk 421 above 130 GeV. Assuming a differential photon flux dN/dE proportional to E^-a, we measure a spectral index a = 2.1 +/- 0.2 (statistical) +0.2/-0.1 (systematic). Finally, we discuss the STACEE spectrum in the context of the multiwavelength results from the same epoch.
△ Less
Submitted 19 December, 2006;
originally announced December 2006.
-
The STACEE Ground-Based Gamma-Ray Detector
Authors:
STACEE Collaboration,
D. M. Gingrich,
L. M. Boone,
D. Bramel,
J. Carson,
C. E. Covault,
P. Fortin,
D. S. Hanna,
J. A. Hinton,
A. Jarvis,
J. Kildea,
T. Lindner,
C. Mueller,
R. Mukherjee,
R. A. Ong,
K. Ragan,
R. A. Scalzo,
C. G. Theoret,
D. A. Williams,
J. A. Zweerink
Abstract:
We describe the design and performance of the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) in its complete configuration. STACEE uses the heliostats of a solar energy research facility to collect and focus the Cherenkov photons produced in gamma-ray induced air showers. The light is concentrated onto an array of photomultiplier tubes located near the top of a tower. The large Che…
▽ More
We describe the design and performance of the Solar Tower Atmospheric Cherenkov Effect Experiment (STACEE) in its complete configuration. STACEE uses the heliostats of a solar energy research facility to collect and focus the Cherenkov photons produced in gamma-ray induced air showers. The light is concentrated onto an array of photomultiplier tubes located near the top of a tower. The large Cherenkov photon collection area of STACEE results in a gamma-ray energy threshold below that of previous ground-based detectors. STACEE is being used to observe pulsars, supernova remnants, active galactic nuclei, and gamma-ray bursts.
△ Less
Submitted 24 June, 2005;
originally announced June 2005.