-
Optimizing Secrecy Codes Using Gradient Descent
Authors:
David Hunn,
Willie K. Harrison
Abstract:
Recent theoretical developments in coset coding theory have provided continuous-valued functions which give the equivocation and maximum likelihood (ML) decoding probability of coset secrecy codes. In this work, we develop a method for incorporating these functions, along with a complex set of constraints, into a gradient descent optimization algorithm. This algorithm employs a movement cost funct…
▽ More
Recent theoretical developments in coset coding theory have provided continuous-valued functions which give the equivocation and maximum likelihood (ML) decoding probability of coset secrecy codes. In this work, we develop a method for incorporating these functions, along with a complex set of constraints, into a gradient descent optimization algorithm. This algorithm employs a movement cost function and trigonometric update step to ensure that the continuous-valued code definition vector ultimately reaches a value which yields a realizable coset code. This algorithm is used to produce coset codes with blocklength up to a few thousand. These codes were compared against published codes, including both short-blocklength and capacity-achieving constructions. For most code sizes, codes generated using gradient descent outperformed all others, especially capacity-achieving constructions, which performed significantly worse than randomly-generated codes at short blocklength.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming
Authors:
Ali Nikkhah,
Morteza Shoushtari,
Bahareh Akhbari,
Willie K. Harrison
Abstract:
In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation for a wiretap channel where the main channel is noiseless, and the wiretap channel is a binary symmetric channel (BSC). Using this technique, we present an analytical limit for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional fundamental limits. We also pr…
▽ More
In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation for a wiretap channel where the main channel is noiseless, and the wiretap channel is a binary symmetric channel (BSC). Using this technique, we present an analytical limit for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional fundamental limits. We also propose a secrecy coding technique that outperforms random binning codes. When there is one overhead bit, this coding technique is optimum and achieves the analytical limit. For cases with additional bits of overhead, our coding scheme can achieve equivocation rates close to the new limit. Furthermore, we evaluate the patterns of the generator matrix and the parity-check matrix for linear codes and we present binning techniques for both linear and non-linear codes using two different approaches: recursive and non-recursive. To our knowledge, this is the first optimization solution for secrecy coding obtained through linear programming.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Collective neutrino oscillations on a quantum computer with hybrid quantum-classical algorithm
Authors:
Pooja Siwach,
Kaytlin Harrison,
A. Baha Balantekin
Abstract:
We simulate the time evolution of collective neutrino oscillations in two-flavor settings on a quantum computer. We explore the generalization of Trotter-Suzuki approximation to time-dependent Hamiltonian dynamics. The trotterization steps are further optimized using the Cartan decomposition of two-qubit unitary gates U $\in$ SU (4) in the minimum number of controlled-NOT (CNOT) gates making the a…
▽ More
We simulate the time evolution of collective neutrino oscillations in two-flavor settings on a quantum computer. We explore the generalization of Trotter-Suzuki approximation to time-dependent Hamiltonian dynamics. The trotterization steps are further optimized using the Cartan decomposition of two-qubit unitary gates U $\in$ SU (4) in the minimum number of controlled-NOT (CNOT) gates making the algorithm more resilient to the hardware noise. A more efficient hybrid quantum-classical algorithm is also explored to solve the problem on noisy intermediate-scale quantum (NISQ) devices.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Raman Study of Layered Breathing Kagome Lattice Semiconductor Nb3Cl8
Authors:
Dylan A. Jeff,
Favian Gonzalez,
Kamal Harrison,
Yuzhou Zhao,
Tharindu Fernando,
Sabin Regmi,
Zhaoyu Liu,
Humberto R. Gutierrez,
Madhab Neupane,
Jihui Yang,
Jiun-Haw Chu,
Xiaodong Xu,
Ting Cao,
Saiful I. Khondaker
Abstract:
Niobium chloride (Nb3Cl8) is a layered 2D semiconducting material with many exotic properties including a breathing kagome lattice, a topological flat band in its band structure, and a crystal structure that undergoes a structural and magnetic phase transition at temperatures below 90 K. Despite being a remarkable material with fascinating new physics, the understanding of its phonon properties is…
▽ More
Niobium chloride (Nb3Cl8) is a layered 2D semiconducting material with many exotic properties including a breathing kagome lattice, a topological flat band in its band structure, and a crystal structure that undergoes a structural and magnetic phase transition at temperatures below 90 K. Despite being a remarkable material with fascinating new physics, the understanding of its phonon properties is at its infancy. In this study, we investigate the phonon dynamics of Nb3Cl8 in bulk and few layer flakes using polarized Raman spectroscopy and density functional theory (DFT) analysis to determine the material's vibrational modes, as well as their symmetrical representations and atomic displacements. We experimentally resolved 12 phonon modes, 5 of which are A1g modes while the remaining 7 are Eg modes, which is in strong agreement with our DFT calculation. Layer-dependent results suggest that the Raman peak positions are mostly insensitive to changes in layer thickness, while peak intensity and FWHM are affected. Raman measurements as a function of excitation wavelength (473-785 nm) show a significant increase of the peak intensities when using a 473 nm excitation source, suggesting a near resonant condition. Temperature-dependent Raman experiments carried out above and below the transition temperature did not show any change in the symmetries of the phonon modes, suggesting that the structural phase transition is likely from the high temperature P3m1 phase to the low-temperature R3m phase. Magneto-Raman measurements carried out at 140 and 2 K between -2 to 2 T show that the Raman modes are not magnetically coupled. Overall, our study presented here significantly advances the fundamental understanding of layered Nb3Cl8 material which can be further exploited for future applications.
△ Less
Submitted 25 October, 2023; v1 submitted 20 June, 2023;
originally announced June 2023.
-
The long-term spectral changes of eta Carinae: are they caused by a dissipating occulter as indicated by CMFGEN models?
Authors:
A. Damineli,
D. J. Hillier,
F. Navarete,
A. F. J. Moffat,
G. Weigelt,
M. F. Corcoran,
T. R. Gull,
N. D. Richardson,
T. P. Ho,
T. I. Madura,
D. Espinoza-Galeas,
H. Hartman,
P. Morris,
C. S. Pickett,
I. R. Stevens,
C. M. P. Russell,
K. Hamaguchi,
F. J. Jablonski,
M. Teodoro,
P. McGee,
P. Cacella,
B. Heathcote,
K. Harrison,
M. Johnston,
T. Bohlsen
, et al. (1 additional authors not shown)
Abstract:
Eta Carinae ($η$\,Car) exhibits a unique set of P Cygni profiles with both broad and narrow components. Over many decades, the spectrum has changed -- there has been an increase in observed continuum fluxes and a decrease in FeII and HI emission line equivalent widths. The spectrum is evolving towards that of a P Cygni star such as P~Cygni itself and HDE~316285. The spectral evolution has been att…
▽ More
Eta Carinae ($η$\,Car) exhibits a unique set of P Cygni profiles with both broad and narrow components. Over many decades, the spectrum has changed -- there has been an increase in observed continuum fluxes and a decrease in FeII and HI emission line equivalent widths. The spectrum is evolving towards that of a P Cygni star such as P~Cygni itself and HDE~316285. The spectral evolution has been attributed to intrinsic variations such as a decrease in the mass-loss rate of the primary star or differential evolution in a latitudinal-dependent stellar wind. However intrinsic wind changes conflict with three observational results: the steady long-term bolometric luminosity; the repeating X-ray light curve over the binary period; and the constancy of the dust-scattered spectrum from the Homunculus. We extend previous work that showed a secular strengthening of P~Cygni absorptions by adding more orbital cycles to overcome temporary instabilities and by examining more atomic transitions. {\sc cmfgen} modeling of the primary wind shows that a time-decreasing mass-loss rate is not the best explanation for the observations. However, models with a `small' dissipating absorber in our line-of-site can explain both the increase in brightness and changes in the emission and P Cygni absorption profiles. If the spectral evolution is caused by the dissipating circumstellar medium, and not by intrinsic changes in the binary, the dynamical timescale to recover from the Great Eruption is much less than a century, different from previous suggestions.
△ Less
Submitted 7 July, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Ultra-Low Temperature Li/CFx Batteries Enabled by Fast-transport and Anion-pairing Liquefied Gas Electrolytes
Authors:
Yijie Yin,
John Holoubek,
Alex Liu,
Baharak Sayahpour,
Ganesh Raghavendran,
Guorui Cai,
Bing Han,
Matthew Mayer,
Noah B. Schorr,
Timothy N. Lambert,
Katharine L. Harrison,
Weikang Li,
Zheng Chen,
Y. Shirley Meng
Abstract:
Lithium fluorinated carbon is one of the most promising chemistries for high-energy-density primary energy storage systems in applications where rechargeability is not required. Though Li/CFx demonstrates high energy density under ambient conditions, achieving such a high energy density when exposed to subzero temperatures remains a challenge, particularly under high current density. Here, we repo…
▽ More
Lithium fluorinated carbon is one of the most promising chemistries for high-energy-density primary energy storage systems in applications where rechargeability is not required. Though Li/CFx demonstrates high energy density under ambient conditions, achieving such a high energy density when exposed to subzero temperatures remains a challenge, particularly under high current density. Here, we report a liquefied gas electrolyte with an anion-pair solvation structure based on dimethyl ether with a low melting point and low viscosity, leading to high ionic conductivity between a wide temperature range. Besides that, through systematic X-ray photoelectron spectroscopy integrated with transmission electron microscopy characterizations, we evaluate the interface of CFx for low-temperature performance. We conclude that the fast transport and anion-pairing solvation structure of the electrolyte bring about reduced charge transfer resistance at low temperatures, which resulted in significantly enhanced performance of Li/CFx cells. Utilizing 50 mg/cm2 loading electrodes, the Li/CFx still displayed 1530 Wh/kg at reduced temperature. This work provides insights into the electrolyte design that may overcome the operational limits of batteries in extreme environments.
△ Less
Submitted 1 September, 2022;
originally announced September 2022.
-
Galvanic Corrosion and Electric Field in Lithium Anode Passivation Films: Effects on Self-Discharge
Authors:
Kevin Leung,
Laura C. Merrill,
Katharine L. Harrison
Abstract:
Battery interfaces help govern rate capability, safety/stability, cycle life, and self-discharge, but significant gaps remain in our understanding at atomic length scales that can be exploited to improve interfacial properties. In particular, Li partially plated on copper current collectors, relevant to the anodeless, lithium metal cell which is a holy grail of high density energy battery research…
▽ More
Battery interfaces help govern rate capability, safety/stability, cycle life, and self-discharge, but significant gaps remain in our understanding at atomic length scales that can be exploited to improve interfacial properties. In particular, Li partially plated on copper current collectors, relevant to the anodeless, lithium metal cell which is a holy grail of high density energy battery research, has recently been reported to undergo galvanic corrosion and exhibit short shelf lives. We apply large scale Density Functional Theory (DFT) calculations and X-ray photoelectron spectroscopy to examine the reaction between the electrolyte and Li|Cu junctions coated with thin, uniform electrolyte interphase (SEI) passivating films at two applied voltages. These novel DFT galvanic corrosion simulations show that electrolyte degradation preferentially occurs on Li-plated regions and should lead to thicker SEI films. Our simulations reveal similarities but also fundamental differences between traditional metal localized pitting and Li-corrosion mechanisms. Furthermore, using the recently proposed, highly reactive lithium hydride (LiH) component SEI as example, we distinguish between electrochemical and chemical degradation pathways which are partially responsible for self-discharge, with the chemical pathway found to exhibit slow kinetics. We also predict that electric fields should in general exist across natural SEI components like LiH, and across artificial SEI films like LiI and LiAlO(2) often applied to improve battery cycling. Underlying and unifying these predictions is a framework of DFT voltage/overpotential definitions which we have derived from electrochemistry disciplines like structural metal corrosion studies; our analysis can only be made using the correct electronic voltage definitions.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
Edge-Propagation Discharge Mechanism in CFx Batteries -- a First Principles and Experimental Study
Authors:
Kevin Leung,
Noah B. Schorr,
Matthew Mayer,
Timothy N. Lambert,
Y. Shirley Meng,
K. L. Harrison
Abstract:
Graphite fluoride (CFx) cathodes coupled with lithium anodes yield one of the highest theoretical energy densities (>860 Wh/g) among primary batteries. In practice, the observed discharge voltage (~2.5 V) is significantly lower than thermodynamic limits (>4.5 V), the discharge rate is low, and so far Li/CFx has only been used in primary batteries. Understanding the discharge mechanism at atomic le…
▽ More
Graphite fluoride (CFx) cathodes coupled with lithium anodes yield one of the highest theoretical energy densities (>860 Wh/g) among primary batteries. In practice, the observed discharge voltage (~2.5 V) is significantly lower than thermodynamic limits (>4.5 V), the discharge rate is low, and so far Li/CFx has only been used in primary batteries. Understanding the discharge mechanism at atomic length scales will improve practical CFx energy density, rate capability, and rechargeability. So far, purely experimental techniques have not identified the correct discharge mechanism or explained the discharge voltage. We apply Density Functional Theory calculations to demonstrate that a CFx-edge propagation discharge mechanism based on lithium insertion at the CF/C boundary in partially discharged CFx exhibits a voltage range of 2.5 to 2.9 V -- depending on whether solvent molecules are involved. The voltages and solvent dependence agrees with our discharge and galvanostatic intermittent titration technique measurements. The predicted discharge kinetics are consistent with CFx operations. Finally, we predict Li/CFx rechargeability under the application of high potentials, along a charging pathway different from that of discharge. Our work represents a general, quasi-kinetic framework to understand the discharge of conversion cathodes, circumventing the widely used phase diagram approach which most likely does not apply to Li/CFx because equilibrium conditions are not attained in this system.
△ Less
Submitted 2 July, 2021;
originally announced July 2021.
-
Quantum Theory of Measurement
Authors:
Alan K. Harrison
Abstract:
We describe a quantum mechanical measurement as a variational principle including interaction between the system under measurement and the measurement apparatus. Augmenting the action with a nonlocal term (a double integration over the duration of the interaction) results in a theory capable of describing both the measurement process (agreement between system state and pointer state) and the colla…
▽ More
We describe a quantum mechanical measurement as a variational principle including interaction between the system under measurement and the measurement apparatus. Augmenting the action with a nonlocal term (a double integration over the duration of the interaction) results in a theory capable of describing both the measurement process (agreement between system state and pointer state) and the collapse of both systems into a single eigenstate (or superposition of degenerate eigenstates) of the relevant operator. In the absence of the interaction, a superposition of states is stable, and the theory agrees with the predictions of standard quantum theory. Because the theory is nonlocal, the resulting wave equation is an integrodifferential equation (IDE). We demonstrate these ideas using a simple Lagrangian for both systems, as proof of principle. The variational principle is time-symmetric and retrocausal, so the solution for the measurement process is determined by boundary conditions at both initial and final times; the initial condition is determined by the experimental preparation and the final condition is the natural boundary condition of variational calculus. We hypothesize that one or more hidden variables (not ruled out by Bell's Theorem, due both to the retrocausality and the nonlocality of the theory) influence the outcome of the measurement, and that distributions of the hidden variables that arise plausibly in a typical ensemble of experimental realizations give rise to outcome frequencies consistent with Born's rule. We outline steps in a theoretical validation of the hypothesis. We discuss the role of both initial and final conditions to determine a solution at intermediate times, the mechanism by which a system responds to measurement, time symmetry of the new theory, causality concerns, and issues surrounding solution of the IDE.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
Supervised Neural Networks for RFI Flagging
Authors:
Kyle Harrison,
Amit Kumar Mishra
Abstract:
Neural network (NN) based methods are applied to the detection of radio frequency interference (RFI) in post-correlation,post-calibration time/frequency data. While calibration doesaffect RFI for the sake of this work a reduced dataset inpost-calibration is used. Two machine learning approachesfor flagging real measurement data are demonstrated usingthe existing RFI flagging technique AOFlagger as…
▽ More
Neural network (NN) based methods are applied to the detection of radio frequency interference (RFI) in post-correlation,post-calibration time/frequency data. While calibration doesaffect RFI for the sake of this work a reduced dataset inpost-calibration is used. Two machine learning approachesfor flagging real measurement data are demonstrated usingthe existing RFI flagging technique AOFlagger as a groundtruth. It is shown that a single layer fully connects networkcan be trained using each time/frequency sample individuallywith the magnitude and phase of each polarization and Stokesvisibilities as features. This method was able to predict aBoolean flag map for each baseline to a high degree of accuracy achieving a Recall of 0.69 and Precision of 0.83 and anF1-Score of 0.75.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Image-Based Benchmarking and Visualization for Large-Scale Global Optimization
Authors:
Kyle Robert Harrison,
Azam Asilian Bidgoli,
Shahryar Rahnamayan,
Kalyanmoy Deb
Abstract:
In the context of optimization, visualization techniques can be useful for understanding the behaviour of optimization algorithms and can even provide a means to facilitate human interaction with an optimizer. Towards this goal, an image-based visualization framework, without dimension reduction, that visualizes the solutions to large-scale global optimization problems as images is proposed. In th…
▽ More
In the context of optimization, visualization techniques can be useful for understanding the behaviour of optimization algorithms and can even provide a means to facilitate human interaction with an optimizer. Towards this goal, an image-based visualization framework, without dimension reduction, that visualizes the solutions to large-scale global optimization problems as images is proposed. In the proposed framework, the pixels visualize decision variables while the entire image represents the overall solution quality. This framework affords a number of benefits over existing visualization techniques including enhanced scalability (in terms of the number of decision variables), facilitation of standard image processing techniques, providing nearly infinite benchmark cases, and explicit alignment with human perception. Furthermore, image-based visualization can be used to visualize the optimization process in real-time, thereby allowing the user to ascertain characteristics of the search process as it is progressing. To the best of the authors' knowledge, this is the first realization of a dimension-preserving, scalable visualization framework that embeds the inherent relationship between decision space and objective space. The proposed framework is utilized with 10 different map** schemes on an image-reconstruction problem that encompass continuous, discrete, binary, combinatorial, constrained, dynamic, and multi-objective optimization. The proposed framework is then demonstrated on arbitrary benchmark problems with known optima. Experimental results elucidate the flexibility and demonstrate how valuable information about the search process can be gathered via the proposed visualization framework.
△ Less
Submitted 23 July, 2020;
originally announced July 2020.
-
Nest algebras in an arbitrary vector space
Authors:
Don Hadwin,
K. J. Harrison
Abstract:
We examine the properties of algebras of linear transformations that leave invariant all subspaces in a totally ordered lattice of subspaces of an arbitrary vector space. We compare our results with those that apply for the corresponding algebras of bounded operators that act on a Hilbert space.
We examine the properties of algebras of linear transformations that leave invariant all subspaces in a totally ordered lattice of subspaces of an arbitrary vector space. We compare our results with those that apply for the corresponding algebras of bounded operators that act on a Hilbert space.
△ Less
Submitted 12 February, 2019;
originally announced February 2019.
-
Physical-Layer Security: Does it Work in a Real Environment?
Authors:
Benjamin Jensen,
Bradford Clark,
Dakota Flanary,
Kalin Norman,
Michael Rice,
Willie K. Harrison
Abstract:
This paper applies channel sounding measurements to enable physical-layer security coding. The channel measurements were acquired in an indoor environment and used to assess the secrecy capacity as a function of physical location. A variety of Reed-Muller wiretap codes were applied to the channel measurements to determine the most effective code for the environment. The results suggest that deploy…
▽ More
This paper applies channel sounding measurements to enable physical-layer security coding. The channel measurements were acquired in an indoor environment and used to assess the secrecy capacity as a function of physical location. A variety of Reed-Muller wiretap codes were applied to the channel measurements to determine the most effective code for the environment. The results suggest that deploying physical-layer security coding is a three-point design process, where channel sounding data guides 1) the physical placement of the antennas, 2) the power settings of the transmitter, and 3) the selection of wiretap coding.
△ Less
Submitted 15 November, 2018;
originally announced November 2018.
-
Quantifying Equivocation for Finite Blocklength Wiretap Codes
Authors:
Jack Pfister,
Marco A. C. Gomes,
Joao P. Vilela,
Willie K. Harrison
Abstract:
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap…
▽ More
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap codes, and make several comparisons of different code families at small and medium blocklengths. Our results indicate that there are security advantages to using specific codes when using small to medium blocklengths.
△ Less
Submitted 19 January, 2017;
originally announced January 2017.
-
Using impact exsolution to link the Chicxulub collision and Deccan volcanism
Authors:
Kevin G. Harrison
Abstract:
Observations suggest that impactors and volcanism are connected, but the mechanism that links these events is unknown. This research proposes the impact exsolution hypothesis to explain how planetary scale collisions trigger volcanism. This hypothesis says that when large objects such as asteroids or comets hit planets, they generate seismic waves that cause exsolution in magma, which initiates er…
▽ More
Observations suggest that impactors and volcanism are connected, but the mechanism that links these events is unknown. This research proposes the impact exsolution hypothesis to explain how planetary scale collisions trigger volcanism. This hypothesis says that when large objects such as asteroids or comets hit planets, they generate seismic waves that cause exsolution in magma, which initiates eruptions. Observations of the Chicxulub impact and Deccan volcanism support this hypothesis. These observations include changes in feeder dike orientations, changes in isotope geochemistry, and changes in lava flow dynamics following the Chicxulub impact.
△ Less
Submitted 29 January, 2017; v1 submitted 17 January, 2017;
originally announced January 2017.
-
Stability of Solid Electrolyte Interphase Components on Lithium Metal and Reactive Anode Material Surfaces
Authors:
Kevin Leung,
Fernando Soto,
Kie Hankins,
Perla B. Balbuena,
Katharine L. Harrison
Abstract:
Lithium ion batteries (LIB) can feature reactive anodes that operate at low potentials, such as lithium metal or silicon, passivated by solid electrolyte interphase (SEI) films. SEI is known to evolve over time as cycling proceeds. In this modeling work, we focus on the stability of two main SEI components, lithium carbonate (Li2CO3) and lithium ethylene dicarbonate (LEDC). Both components are ele…
▽ More
Lithium ion batteries (LIB) can feature reactive anodes that operate at low potentials, such as lithium metal or silicon, passivated by solid electrolyte interphase (SEI) films. SEI is known to evolve over time as cycling proceeds. In this modeling work, we focus on the stability of two main SEI components, lithium carbonate (Li2CO3) and lithium ethylene dicarbonate (LEDC). Both components are electrochemically stable but thermodynamically unstable near the equilibrium Li+/Li(s) potential. Interfacial reactions represent one way to trigger the intrinsic thermodynamic instability. Both Li(2)CO(3) and LEDC are predicted to exhibit exothermic reactions on lithium metal surfaces, and the barriers are sufficiently low to permit reactions on battery operation time scales. LEDC also readily decomposes on high Li-content Li(x)Si surfaces. Our studies suggest that the innermost SEI layer on lithium metal surfaces should be a thin layer of Li(2)O -- the only thermodynamically and kinetically stable component (in the absence of a fluoride source). This work should also be relevant to inadvertant lithium plating during battery cycling, and SEI evolution on Li(x)Si surfaces.
△ Less
Submitted 23 May, 2016;
originally announced May 2016.
-
Inflight Radiometric Calibration of New Horizons' Multispectral Visible Imaging Camera (MVIC)
Authors:
C. J. A. Howett,
A. H. Parker,
C. B. Olkin,
D. C. Reuter,
K. Ennico,
W. M Grundy,
A. L. Graps,
K. P. Harrison,
H. B. Throop,
M. W. Buie,
J. R. Lovering,
S. B. Porter,
H. A. Weaver,
L. A. Young,
S. A. Stern,
R. A. Beyer,
R. P. Binzell,
B. J. Buratti,
A. F. Cheng,
J. C. Cook,
D. P. Cruikshank,
C. M. Dalle Ore,
A. M. Earle,
D. E. Jennings,
I. R. Linscott
, et al. (13 additional authors not shown)
Abstract:
We discuss two semi-independent calibration techniques used to determine the in-flight radiometric calibration for the New Horizons' Multi-spectral Visible Imaging Camera (MVIC). The first calibration technique compares the observed stellar flux to modeled values. The difference between the two provides a calibration factor that allows the observed flux to be adjusted to the expected levels for al…
▽ More
We discuss two semi-independent calibration techniques used to determine the in-flight radiometric calibration for the New Horizons' Multi-spectral Visible Imaging Camera (MVIC). The first calibration technique compares the observed stellar flux to modeled values. The difference between the two provides a calibration factor that allows the observed flux to be adjusted to the expected levels for all observations, for each detector. The second calibration technique is a channel-wise relative radiometric calibration for MVIC's blue, near-infrared and methane color channels using observations of Charon and scaling from the red channel stellar calibration. Both calibration techniques produce very similar results (better than 7% agreement), providing strong validation for the techniques used. Since the stellar calibration can be performed without a color target in the field of view and covers all of MVIC's detectors, this calibration was used to provide the radiometric keywords delivered by the New Horizons project to the Planetary Data System (PDS). These keywords allow each observation to be converted from counts to physical units; a description of how these keywords were generated is included. Finally, mitigation techniques adopted for the gain drift observed in the near-infrared detector and one of the panchromatic framing cameras is also discussed.
△ Less
Submitted 29 March, 2016;
originally announced March 2016.
-
Analysis of Short Blocklength Codes for Secrecy
Authors:
Willie K. Harrison,
Dinis Sarmento,
João P. Vilela,
Marco Gomes
Abstract:
In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy…
▽ More
In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy decoder. Our techniques are especially useful in cases where application of traditional information-theoretic security measures is either impractical or simply not yet understood. The metrics can aid both practical system analysis, and practical system design for physical-layer security codes. Furthermore, these new measures fill a void in the current landscape of practical security measures for physical-layer security coding, and may assist in the wide-scale adoption of physical-layer techniques for security in real-world systems. We also show how the new metrics provide techniques for reducing realistic channel models to simpler discrete memoryless wiretap channel equivalents over which existing secrecy code designs may achieve information-theoretic security.
△ Less
Submitted 23 September, 2015;
originally announced September 2015.
-
Electronic Visualisation in Chemistry: From Alchemy to Art
Authors:
Karl Harrison,
Jonathan P. Bowen,
Alice M. Bowen
Abstract:
Chemists now routinely use software as part of their work. For example, virtual chemistry allows chemical reactions to be simulated. In particular, a selection of software is available for the visualisation of complex 3-dimensional molecular structures. Many of these are very beautiful in their own right. As well as being included as illustrations in academic papers, such visualisations are often…
▽ More
Chemists now routinely use software as part of their work. For example, virtual chemistry allows chemical reactions to be simulated. In particular, a selection of software is available for the visualisation of complex 3-dimensional molecular structures. Many of these are very beautiful in their own right. As well as being included as illustrations in academic papers, such visualisations are often used on the covers of chemistry journals as artistically decorative and attractive motifs. Chemical images have also been used as the basis of artworks in exhibitions. This paper explores the development of the relationship of chemistry, art, and IT. It covers some of the increasingly sophisticated software used to generate these projections (e.g., UCSF Chimera) and their progressive use as a visual art form.
△ Less
Submitted 24 July, 2013;
originally announced July 2013.
-
Quantum communication without the necessity of quantum memories
Authors:
W. J. Munro,
A. M. Stephens,
S. J. Devitt,
K. A. Harrison,
Kae Nemoto
Abstract:
Quantum physics is known to allow for completely new ways to create, manipulate and store information. Quantum communication - the ability to transmit quantum information - is a primitive necessary for any quantum internet. At its core, quantum communication generally requires the formation of entangled links between remote locations. The performance of these links is limited by the classical sign…
▽ More
Quantum physics is known to allow for completely new ways to create, manipulate and store information. Quantum communication - the ability to transmit quantum information - is a primitive necessary for any quantum internet. At its core, quantum communication generally requires the formation of entangled links between remote locations. The performance of these links is limited by the classical signaling time between such locations - necessitating the need for long lived quantum memories. Here we present the design of a communications network which neither requires the establishment of entanglement between remote locations nor the use of long-lived quantum memories. The rate at which quantum data can be transmitted along the network is only limited by the time required to perform efficient local gate operations. Our scheme thus potentially provides higher communications rates than previously thought possible.
△ Less
Submitted 18 June, 2013;
originally announced June 2013.
-
Storage Workload Modelling by Hidden Markov Models: Application to FLASH Memory
Authors:
P. G. Harrison,
S. K. Harrison,
N. M. Patel,
S. Zertal
Abstract:
A workload analysis technique is presented that processes data from operation type traces and creates a Hidden Markov Model (HMM) to represent the workload that generated those traces. The HMM can be used to create representative traces for performance models, such as simulators, avoiding the need to repeatedly acquire suitable traces. It can also be used to estimate directly the transition probab…
▽ More
A workload analysis technique is presented that processes data from operation type traces and creates a Hidden Markov Model (HMM) to represent the workload that generated those traces. The HMM can be used to create representative traces for performance models, such as simulators, avoiding the need to repeatedly acquire suitable traces. It can also be used to estimate directly the transition probabilities and rates of a Markov modulated arrival process, for use as input to an analytical performance model of Flash memory. The HMMs obtained from industrial workloads are validated by comparing their autocorrelation functions and other statistics with those of the corresponding monitored time series. Further, the performance model applications are illustrated by numerical examples.
△ Less
Submitted 14 September, 2012;
originally announced September 2012.
-
Calculation of the electron two-slit experiment using a quantum mechanical variational principle
Authors:
Alan K. Harrison
Abstract:
A nonlocal relativistic variational principle (VP) has recently been proposed as an alternative to the Dirac wave equation of standard quantum mechanics. We apply that principle to the electron two-slit experiment. The detection system is modelled as a screen made of atoms, any one of which can be excited by the incident electron, but we avoid restricting the detection mechanism further. The VP is…
▽ More
A nonlocal relativistic variational principle (VP) has recently been proposed as an alternative to the Dirac wave equation of standard quantum mechanics. We apply that principle to the electron two-slit experiment. The detection system is modelled as a screen made of atoms, any one of which can be excited by the incident electron, but we avoid restricting the detection mechanism further. The VP is shown to predict that, at the time the electron reaches the screen, its wavefunction will be localized to the neighborhood of a single atom, resulting in a position-type measurement. In an ensemble of such experiments ("identically prepared" except that the initial phase of the wavefunction--the hidden variable in the VP formulation--is sampled over the expected uniform distribution), the distribution of measured positions will reproduce the interference pattern predicted by the Dirac equation. We also demonstrate that with a detection system designed fundamentally to detect the electron's transverse wavelength rather than its position, the VP predicts that one such mode will be detected, that is, a wavelength measurement will result. Finally, it is shown that these results are unchanged in the "delayed choice" variant of the experiment.
△ Less
Submitted 2 August, 2012;
originally announced August 2012.
-
Wavefunction collapse via a nonlocal relativistic variational principle
Authors:
Alan K. Harrison
Abstract:
We propose, as an alternative theory of quantum mechanics, a relativistically covariant variational principle (VP) capable of describing both wavefunction collapse and, as an appropriate limiting case, evolution of the wavefunction according to the standard quantum mechanical (SQM) wave equation. This results in a nonlinear, nonlocal, time-symmetric hidden-variable theory; the hidden variable is t…
▽ More
We propose, as an alternative theory of quantum mechanics, a relativistically covariant variational principle (VP) capable of describing both wavefunction collapse and, as an appropriate limiting case, evolution of the wavefunction according to the standard quantum mechanical (SQM) wave equation. This results in a nonlinear, nonlocal, time-symmetric hidden-variable theory; the hidden variable is the phase of the wavefunction, which affects the dynamics via zitterbewegung.
The VP is δ(A_1 + εA_2) = 0, in which A_1 and A_2 are positive definite integrals (over all spacetime) of functions of the wavefunction ψ. A_1 is quadratic in deviations of the wavefunction from compliance with the SQM wave equation. A_2 is a measure of the uncertainty of the wavefunction, driving collapse by penalizing certain kinds of superpositions. We also show that A_1 limits the rate of collapse, and that it enforces the Born rule, with suitable assumptions and approximations.
Since the VP optimizes a function ψ of both space and time, the theory is not "causal" in the usual sense. Because it is not clear how Nature solves the optimization problem (e.g., whether a global or a local minimum is sought), we cannot yet say whether it is deterministic.
△ Less
Submitted 17 April, 2012;
originally announced April 2012.
-
Physical-Layer Security over Correlated Erasure Channels
Authors:
W. K. Harrison,
J. Almeida,
S. W. McLaughlin,
J. Barros
Abstract:
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p…
▽ More
We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent packet erasure channels for the legitimate receiver and an eavesdropper. In this paper, we go beyond the state-of-the-art by addressing correlated erasure events across the two communication channels. The resulting security enhancement is presented as a function of the correlation coefficient and the erasure probabilities for both channels. It is shown that security improvements are achievable by means of judicious physical-layer design even when the eavesdropper has a better channel than the legitimate receiver. The only case in which this assertion may not hold is when erasures are highly correlated across channels. However, we are able to prove that correlation cannot nullify the expected security enhancement if the channel quality of the legitimate receiver is strictly better than that of the eavesdropper.
△ Less
Submitted 17 February, 2011;
originally announced February 2011.
-
Coding for Cryptographic Security Enhancement using Stop** Sets
Authors:
W. K. Harrison,
J. Almeida,
S. W. McLaughlin,
J. Barros
Abstract:
In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff…
▽ More
In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the difficulty of cryptographic attacks. The system setup is the wiretap channel model where transmitted data traverse through independent packet erasure channels with public feedback for authenticated ARQ (Automatic Repeat reQuest). The code design relies on puncturing nonsystematic low-density parity-check codes with the intent of inflicting an eavesdropper with stop** sets in the decoder. Furthermore, the design amplifies errors when stop** sets occur such that a receiver must guess all the channel-erased bits correctly to avoid an expected error rate of one half in the ciphertext. We extend previous results on the coding scheme by giving design criteria that reduces the effectiveness of a maximum-likelihood attack to that of a message-passing attack. We further extend security analysis to models with multiple receivers and collaborative attackers. Cryptographic security is enhanced in all these cases by exploiting properties of the physical-layer. The enhancement is accurately presented as a function of the degrees of freedom in the eavesdropper's knowledge of the ciphertext, and is even shown to be present when eavesdroppers have better channel quality than legitimate receivers.
△ Less
Submitted 15 February, 2011;
originally announced February 2011.
-
Information propagation for interacting particle systems
Authors:
Norbert Schuch,
Sarah K. Harrison,
Tobias J. Osborne,
Jens Eisert
Abstract:
We show that excitations of interacting quantum particles in lattice models always propagate with a finite speed of sound. Our argument is simple yet general and shows that by focusing on the physically relevant observables one can generally expect a bounded speed of information propagation. The argument applies equally to quantum spins, bosons such as in the Bose-Hubbard model, fermions, anyons,…
▽ More
We show that excitations of interacting quantum particles in lattice models always propagate with a finite speed of sound. Our argument is simple yet general and shows that by focusing on the physically relevant observables one can generally expect a bounded speed of information propagation. The argument applies equally to quantum spins, bosons such as in the Bose-Hubbard model, fermions, anyons, and general mixtures thereof, on arbitrary lattices of any dimension. It also pertains to dissipative dynamics on the lattice, and generalizes to the continuum for quantum fields. Our result can be seen as a meaningful analogue of the Lieb-Robinson bound for strongly correlated models.
△ Less
Submitted 27 January, 2011; v1 submitted 21 October, 2010;
originally announced October 2010.
-
From quantum fusiliers to high-performance networks
Authors:
W. J. Munro,
K. A. Harrison,
A. M. Stephens,
S. J. Devitt,
Kae Nemoto
Abstract:
Our objective was to design a quantum repeater capable of achieving one million entangled pairs per second over a distance of 1000km. We failed, but not by much. In this letter we will describe the series of developments that permitted us to approach our goal. We will describe a mechanism that permits the creation of entanglement between two qubits, connected by fibre, with probability arbitrari…
▽ More
Our objective was to design a quantum repeater capable of achieving one million entangled pairs per second over a distance of 1000km. We failed, but not by much. In this letter we will describe the series of developments that permitted us to approach our goal. We will describe a mechanism that permits the creation of entanglement between two qubits, connected by fibre, with probability arbitrarily close to one and in constant time. This mechanism may be extended to ensure that the entanglement has high fidelity without compromising these properties. Finally, we describe how this may be used to construct a quantum repeater that is capable of creating a linear quantum network connecting two distant qubits with high fidelity. The creation rate is shown to be a function of the maximum distance between two adjacent quantum repeaters.
△ Less
Submitted 21 October, 2009;
originally announced October 2009.
-
Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis
Authors:
Willie K Harrison,
Steven W. McLaughlin
Abstract:
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both…
▽ More
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both channel and cryptographic codes under the wiretap channel model in a way that enhances the \emph{information-theoretic} security for the friendly parties by kee** the information transfer to the eavesdropper small. We consider a secret-key cryptographic system with a linear feedback shift register (LFSR)-based keystream generator and observe the mutual information between an LFSR-generated sequence and the received noise-corrupted ciphertext sequence under a known-plaintext scenario. The effectiveness of a noniterative fast correlation attack, which reduces the search time in a brute-force attack, is shown to be correlated with this mutual information. For an iterative fast correlation attack on this cryptographic system, it is shown that an EXIT chart and mutual information are very good predictors of decoding success and failure by a passive eavesdropper.
△ Less
Submitted 4 May, 2009;
originally announced May 2009.
-
Ganga: a tool for computational-task management and easy access to Grid resources
Authors:
J. T. Mościcki,
F. Brochu,
J. Ebke,
U. Egede,
J. Elmsheuser,
K. Harrison,
R. W. L. Jones,
H. C. Lee,
D. Liko,
A. Maier,
A. Muraru,
G. N. Patrick,
K. Pajchel,
W. Reece,
B. H. Samset,
M. W. Slater,
A. Soroko,
C. L. Tan,
D. C. Vanderster,
M. Williams
Abstract:
In this paper, we present the computational task-management tool Ganga, which allows for the specification, submission, bookkee** and post-processing of computational tasks on a wide set of distributed resources. Ganga has been developed to solve a problem increasingly common in scientific projects, which is that researchers must regularly switch between different processing systems, each with…
▽ More
In this paper, we present the computational task-management tool Ganga, which allows for the specification, submission, bookkee** and post-processing of computational tasks on a wide set of distributed resources. Ganga has been developed to solve a problem increasingly common in scientific projects, which is that researchers must regularly switch between different processing systems, each with its own command set, to complete their computational tasks. Ganga provides a homogeneous environment for processing data on heterogeneous resources. We give examples from High Energy Physics, demonstrating how an analysis can be developed on a local system and then transparently moved to a Grid system for processing of all available data. Ganga has an API that can be used via an interactive interface, in scripts, or through a GUI. Specific knowledge about types of tasks or computational resources is provided at run-time through a plugin system, making new developments easy to integrate. We give an overview of the Ganga architecture, give examples of current use, and demonstrate how Ganga can be used in many different areas of science.
△ Less
Submitted 9 June, 2009; v1 submitted 16 February, 2009;
originally announced February 2009.
-
Physical-Layer Security: Combining Error Control Coding and Cryptography
Authors:
Willie K Harrison,
Steven W. McLaughlin
Abstract:
In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi…
▽ More
In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wiretap model addresses this scenario. Using this model, we show the security of a common cryptographic primitive, i.e. a keystream generator based on linear feedback shift registers (LFSR), can be strengthened by exploiting properties of the physical layer. A passive eavesdropper can be made to experience greater difficulty in cracking an LFSR-based cryptographic system insomuch that the computational complexity of discovering the secret key increases by orders of magnitude, or is altogether infeasible. This result is shown for two fast correlation attacks originally presented by Meier and Staffelbach, in the context of channel errors due to the wiretap channel model.
△ Less
Submitted 16 April, 2009; v1 submitted 2 January, 2009;
originally announced January 2009.
-
Backlund-Transformation-Related Recursion Operators: Application to the Self-Dual Yang-Mills Equation
Authors:
C. J. Papachristou,
B. Kent Harrison
Abstract:
By using the self-dual Yang-Mills (SDYM) equation as an example, we study a method for relating symmetries and recursion operators of two partial differential equations connected to each other by a non-auto-Backlund transformation. We prove the Lie-algebra isomorphism between the symmetries of the SDYM equation and those of the potential SDYM (PSDYM) equation, and we describe the construction of t…
▽ More
By using the self-dual Yang-Mills (SDYM) equation as an example, we study a method for relating symmetries and recursion operators of two partial differential equations connected to each other by a non-auto-Backlund transformation. We prove the Lie-algebra isomorphism between the symmetries of the SDYM equation and those of the potential SDYM (PSDYM) equation, and we describe the construction of the recursion operators for these two systems. Using certain known aspects of the PSDYM symmetry algebra, we draw conclusions regarding the Lie algebraic structure of the "potential symmetries" of the SDYM equation.
△ Less
Submitted 20 June, 2023; v1 submitted 5 September, 2008;
originally announced September 2008.
-
A Method for Constructing a Lax Pair for the Ernst Equation
Authors:
C. J. Papachristou,
B. Kent Harrison
Abstract:
A systematic construction of a Lax pair and an infinite set of conservation laws for the Ernst equation is described. The matrix form of this equation is rewritten as a differential ideal of gl(2,R)-valued differential forms, and its symmetry condition is expressed as an exterior equation which is linear in the symmetry characteristic and has the form of a conservation law. By means of a recursi…
▽ More
A systematic construction of a Lax pair and an infinite set of conservation laws for the Ernst equation is described. The matrix form of this equation is rewritten as a differential ideal of gl(2,R)-valued differential forms, and its symmetry condition is expressed as an exterior equation which is linear in the symmetry characteristic and has the form of a conservation law. By means of a recursive process, an infinite collection of such laws is then obtained, and the conserved "charges" are used to derive a linear exterior equation whose components constitute a Lax pair.
△ Less
Submitted 26 October, 2009; v1 submitted 9 May, 2008;
originally announced May 2008.
-
Low Cost and Compact Quantum Cryptography
Authors:
J. L. Duligall,
M. S. Godfrey,
K. A. Harrison,
W. J. Munro,
J. G. Rarity
Abstract:
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is sho…
▽ More
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad and authentication protocols.
△ Less
Submitted 3 October, 2006; v1 submitted 28 August, 2006;
originally announced August 2006.
-
The Differential Form Method for Finding Symmetries
Authors:
B. Kent Harrison
Abstract:
This article reviews the use of differential forms and Lie derivatives to find symmetries of differential equations, as originally presented by Harrison and Estabrook, J. Math. Phys., 12 (1971), 653. An outline of the method is given, followed by examples and references to recent papers using the method.
This article reviews the use of differential forms and Lie derivatives to find symmetries of differential equations, as originally presented by Harrison and Estabrook, J. Math. Phys., 12 (1971), 653. An outline of the method is given, followed by examples and references to recent papers using the method.
△ Less
Submitted 18 October, 2005;
originally announced October 2005.
-
GANGA: a user-Grid interface for Atlas and LHCb
Authors:
K. Harrison,
W. T. L. P. Lavrijsen,
P. Mato,
A. Soroko,
C. L. Tan,
C. E. Tull,
N. Brook,
R. W. L. Jones
Abstract:
The Gaudi/Athena and Grid Alliance (GANGA) is a front-end for the configuration, submission, monitoring, bookkee**, output collection, and reporting of computing jobs run on a local batch system or on the grid. In particular, GANGA handles jobs that use applications written for the Gaudi software framework shared by the Atlas and LHCb experiments. GANGA exploits the commonality of Gaudi-based…
▽ More
The Gaudi/Athena and Grid Alliance (GANGA) is a front-end for the configuration, submission, monitoring, bookkee**, output collection, and reporting of computing jobs run on a local batch system or on the grid. In particular, GANGA handles jobs that use applications written for the Gaudi software framework shared by the Atlas and LHCb experiments. GANGA exploits the commonality of Gaudi-based computing jobs, while insulating against grid-, batch- and framework-specific technicalities, to maximize end-user productivity in defining, configuring, and executing jobs. Designed for a python-based component architecture, GANGA has a modular underpinning and is therefore well placed for contributing to, and benefiting from, work in related projects. Its functionality is accessible both from a scriptable command-line interface, for expert users and automated tasks, and through a graphical interface, which simplifies the interaction with GANGA for beginning and c1asual users.
This paper presents the GANGA design and implementation, the development of the underlying software bus architecture, and the functionality of the first public GANGA release.
△ Less
Submitted 13 June, 2003;
originally announced June 2003.
-
DIRAC - Distributed Infrastructure with Remote Agent Control
Authors:
N. Brook,
A. Bogdanchikov,
A. Buckley,
J. Closier,
U. Egede,
M. Frank,
D. Galli,
M. Gandelman,
V. Garonne,
C. Gaspar,
R. Graciani Diaz,
K. Harrison,
E. van Herwijnen,
A. Khan,
S. Klous,
I. Korolko,
G. Kuznetsov,
F. Loverre,
U. Marconi,
J. P. Palacios,
G. N. Patrick,
A. Pickford,
S. Ponce,
V. Romanovski,
J. J. Saborido
, et al. (5 additional authors not shown)
Abstract:
This paper describes DIRAC, the LHCb Monte Carlo production system. DIRAC has a client/server architecture based on: Compute elements distributed among the collaborating institutes; Databases for production management, bookkee** (the metadata catalogue) and software configuration; Monitoring and cataloguing services for updating and accessing the databases. Locally installed software agents im…
▽ More
This paper describes DIRAC, the LHCb Monte Carlo production system. DIRAC has a client/server architecture based on: Compute elements distributed among the collaborating institutes; Databases for production management, bookkee** (the metadata catalogue) and software configuration; Monitoring and cataloguing services for updating and accessing the databases. Locally installed software agents implemented in Python monitor the local batch queue, interrogate the production database for any outstanding production requests using the XML-RPC protocol and initiate the job submission. The agent checks and, if necessary, installs any required software automatically. After the job has processed the events, the agent transfers the output data and updates the metadata catalogue. DIRAC has been successfully installed at 18 collaborating institutes, including the DataGRID, and has been used in recent Physics Data Challenges. In the near to medium term future we must use a mixed environment with different types of grid middleware or no middleware. We describe how this flexibility has been achieved and how ubiquitously available grid middleware would improve DIRAC.
△ Less
Submitted 12 June, 2003;
originally announced June 2003.
-
The Host Galaxy of GRB 990123
Authors:
J. S. Bloom,
S. C. Odewahn,
S. G. Djorgovski,
S. R. Kulkarni F. A. Harrison,
C. Koresko,
G. Neugebauer,
L. Armus,
D. A. Frail,
R. R. Gal,
R. Sari,
G. Squires,
G. Illingworth,
D. Kelson,
F. Chaffee,
R. Goodrich,
M. Feroci,
E. Costa,
L. Piro,
F. Frontera,
S. Mao,
C. Akerlof,
T. A. McKay
Abstract:
We present deep images of the field of gamma-ray burst (GRB) 990123 obtained in a broad-band UV/visible bandpass with the Hubble Space Telescope, and deep near-infrared images obtained with the Keck-I 10-m telescope. Both the HST and Keck images show that the optical transient (OT) is clearly offset by 0.6 arcsec from an extended object, presumably the host galaxy. This galaxy is the most likely…
▽ More
We present deep images of the field of gamma-ray burst (GRB) 990123 obtained in a broad-band UV/visible bandpass with the Hubble Space Telescope, and deep near-infrared images obtained with the Keck-I 10-m telescope. Both the HST and Keck images show that the optical transient (OT) is clearly offset by 0.6 arcsec from an extended object, presumably the host galaxy. This galaxy is the most likely source of the metallic-line absorption at z = 1.6004 seen in the spectrum of the OT. With magnitudes V_{C} ~ 24.6 +/- 0.2 and K = 21.65 +/- 0.30 mag this corresponds to an L ~ 0.7 L_* galaxy, assuming that it is located at z = 1.6. The estimated unobscured star formation rate is SFR ~ 6 M_sun/yr, which is not unusually high for normal galaxies at comparable redshifts. The strength of the observed metallic absorption lines is suggestive of a relatively high metallicity of the gas, and thus of a chemically evolved system which may be associated with a massive galaxy. It is also indicative of a high column density of the gas, typical of damped Ly-alpha systems at high redshifts. We conclude that this is the host galaxy of GRB 990123. No other obvious galaxies are detected within the same projected radius from the OT. There is thus no evidence for strong gravitational lensing magnification of this burst, and some alternative explanation for its remarkable energetics may be required. The observed offset of the OT from the center of its apparent host galaxy, 5.5 +/- 0.9 proper kpc (projected) in the galaxy's rest-frame, both refutes the possibility that GRBs are related to galactic nuclear activity and supports models of GRBs which involve the death and/or merger of massive stars. Further, the HST image suggests an intimate connection of GRB 990123 and a star-forming region.
△ Less
Submitted 12 February, 1999; v1 submitted 11 February, 1999;
originally announced February 1999.