-
Integrated Control of Robotic Arm through EMG and Speech: Decision-Driven Multimodal Data Fusion
Authors:
Tauheed Khan Mohd,
Ahmad Y Javaid
Abstract:
Interactions with electronic devices are changing in our daily lives. The day-to-day development brings curiosity to recent technology and challenges its use. The gadgets are becoming cumbersome, and their usage frustrates a segment of society. In specific scenarios, the user cannot use the modalities because of the challenges that bring in, e.g., the usage of touch screen devices by elderly peopl…
▽ More
Interactions with electronic devices are changing in our daily lives. The day-to-day development brings curiosity to recent technology and challenges its use. The gadgets are becoming cumbersome, and their usage frustrates a segment of society. In specific scenarios, the user cannot use the modalities because of the challenges that bring in, e.g., the usage of touch screen devices by elderly people. The idea of multimodality provides easy access to devices of daily use through various modalities. In this paper, we suggest a solution that allows the operation of a microcontroller-based device using voice and speech. The model implemented will learn from the user's behavior and decide based on prior knowledge.
△ Less
Submitted 11 March, 2024;
originally announced April 2024.
-
Engineering Optical and Mirror Bi-stability Mechanically
Authors:
Sohail Ahmed,
Asma Javaid,
Hui **g,
Farhan Saif
Abstract:
We explain optical and mirrors displacement bistability in a hybrid optomechanical system in the presence of a strong laser driving field and a weak probe field. External modulating fields are applied selectively on movable mirrors. We show that the optomechanical coupling, electromechanical Coulomb coupling and, amplitude & phase of external modulating fields are important parameters to control t…
▽ More
We explain optical and mirrors displacement bistability in a hybrid optomechanical system in the presence of a strong laser driving field and a weak probe field. External modulating fields are applied selectively on movable mirrors. We show that the optomechanical coupling, electromechanical Coulomb coupling and, amplitude & phase of external modulating fields are important parameters to control the optical and mirror displacement bistable behaviour. The parameters values are taken according to presently available experiments. The study may be applied to the realization of a tunable electro opto mechanical switch depending on the optomechanical and Coulomb coupling, frequencies, threshold power, and the amplitude and phase of external mechanical pumps.
△ Less
Submitted 7 July, 2023;
originally announced July 2023.
-
Multi-Modal Data Fusion in Enhancing Human-Machine Interaction for Robotic Applications: A Survey
Authors:
Tauheed Khan Mohd,
Nicole Nguyen,
Ahmad Y Javaid
Abstract:
Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier human-machine interaction. On the other hand, develop…
▽ More
Human-machine interaction has been around for several decades now, with new applications emerging every day. One of the major goals that remain to be achieved is designing an interaction similar to how a human interacts with another human. Therefore, there is a need to develop interactive systems that could replicate a more realistic and easier human-machine interaction. On the other hand, developers and researchers need to be aware of state-of-the-art methodologies being used to achieve this goal. We present this survey to provide researchers with state-of-the-art data fusion technologies implemented using multiple inputs to accomplish a task in the robotic application domain. Moreover, the input data modalities are broadly classified into uni-modal and multi-modal systems and their application in myriad industries, including the health care industry, which contributes to the medical industry's future development. It will help the professionals to examine patients using different modalities. The multi-modal systems are differentiated by a combination of inputs used as a single input, e.g., gestures, voice, sensor, and haptic feedback. All these inputs may or may not be fused, which provides another classification of multi-modal systems. The survey concludes with a summary of technologies in use for multi-modal systems.
△ Less
Submitted 26 December, 2022; v1 submitted 15 February, 2022;
originally announced February 2022.
-
Multi-modal data fusion of Voice and EMG data for Robotic Control
Authors:
Tauheed Khan Mohd,
Jackson Carvalho,
Ahmad Y Javaid
Abstract:
Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures Electromyography data (EMG) using myoelectric sig…
▽ More
Wearable electronic equipment is constantly evolving and is increasing the integration of humans with technology. Available in various forms, these flexible and bendable devices sense and can measure the physiological and muscular changes in the human body and may use those signals to machine control. The MYO gesture band, one such device, captures Electromyography data (EMG) using myoelectric signals and translates them to be used as input signals through some predefined gestures. Use of this device in a multi-modal environment will not only increase the possible types of work that can be accomplished with the help of such device, but it will also help in improving the accuracy of the tasks performed. This paper addresses the fusion of input modalities such as speech and myoelectric signals captured through a microphone and MYO band, respectively, to control a robotic arm. Experimental results obtained as well as their accuracies for performance analysis are also presented.
△ Less
Submitted 6 January, 2022;
originally announced January 2022.
-
TLU-Net: A Deep Learning Approach for Automatic Steel Surface Defect Detection
Authors:
Praveen Damacharla,
Achuth Rao M. V.,
Jordan Ringenberg,
Ahmad Y Javaid
Abstract:
Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automatic steel defect detection methods could be useful i…
▽ More
Visual steel surface defect detection is an essential step in steel sheet manufacturing. Several machine learning-based automated visual inspection (AVI) methods have been studied in recent years. However, most steel manufacturing industries still use manual visual inspection due to training time and inaccuracies involved with AVI methods. Automatic steel defect detection methods could be useful in less expensive and faster quality control and feedback. But preparing the annotated training data for segmentation and classification could be a costly process. In this work, we propose to use the Transfer Learning-based U-Net (TLU-Net) framework for steel surface defect detection. We use a U-Net architecture as the base and explore two kinds of encoders: ResNet and DenseNet. We compare these nets' performance using random initialization and the pre-trained networks trained using the ImageNet data set. The experiments are performed using Severstal data. The results demonstrate that the transfer learning performs 5% (absolute) better than that of the random initialization in defect classification. We found that the transfer learning performs 26% (relative) better than that of the random initialization in defect segmentation. We also found the gain of transfer learning increases as the training data decreases, and the convergence rate with transfer learning is better than that of the random initialization.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
IVACS: Intelligent Voice Assistant for Coronavirus Disease (COVID-19) Self-Assessment
Authors:
Parashar Dhakal,
Praveen Damacharla,
Ahmad Y. Javaid,
Hari K. Vege,
Vijay K. Devabhaktuni
Abstract:
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organizations have already pioneered mobile and web-bas…
▽ More
At the time of writing this paper, the world has around eleven million cases of COVID-19, scientifically known as severe acute respiratory syndrome corona-virus 2 (SARS-COV-2). One of the popular critical steps various health organizations are advocating to prevent the spread of this contagious disease is self-assessment of symptoms. Multiple organizations have already pioneered mobile and web-based applications for self-assessment of COVID-19 to reduce this global pandemic's spread. We propose an intelligent voice-based assistant for COVID-19 self-assessment (IVACS). This interactive assistant has been built to diagnose the symptoms related to COVID-19 using the guidelines provided by the Centers for Disease Control and Prevention (CDC) and the World Health Organization (WHO). The empirical testing of the application has been performed with 22 human subjects, all volunteers, using the NASA Task Load Index (TLX), and subjects performance accuracy has been measured. The results indicate that the IVACS is beneficial to users. However, it still needs additional research and development to promote its widespread application.
△ Less
Submitted 6 September, 2020;
originally announced September 2020.
-
Effects of Voice-Based Synthetic Assistant on Performance of Emergency Care Provider in Training
Authors:
Praveen Damacharla,
Parashar Dhakal,
Sebastian Stumbo,
Ahmad Y. Javaid,
Subhashini Ganapathy,
David A. Malek,
Douglas C. Hodge,
Vijay Devabhaktuni
Abstract:
As part of a perennial project, our team is actively engaged in develo** new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each trainee. Therefore, we introduced a voice-based SA…
▽ More
As part of a perennial project, our team is actively engaged in develo** new synthetic assistant (SA) technologies to assist in training combat medics and medical first responders. It is critical that medical first responders are well trained to deal with emergencies more effectively. This would require real-time monitoring and feedback for each trainee. Therefore, we introduced a voice-based SA to augment the training process of medical first responders and enhance their performance in the field. The potential benefits of SAs include a reduction in training costs and enhanced monitoring mechanisms. Despite the increased usage of voice-based personal assistants (PAs) in day-to-day life, the associated effects are commonly neglected for a study of human factors. Therefore, this paper focuses on performance analysis of the developed voice-based SA in emergency care provider training for a selected emergency treatment scenario. The research discussed in this paper follows design science in develo** proposed technology; at length, we discussed architecture and development and presented working results of voice-based SA. The empirical testing was conducted on two groups as user studies using statistical analysis tools, one trained with conventional methods and the other with the help of SA. The statistical results demonstrated the amplification in training efficacy and performance of medical responders powered by SA. Furthermore, the paper also discusses the accuracy and time of task execution (t) and concludes with the guidelines for resolving the identified problems.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Common Metrics to Benchmark Human-Machine Teams (HMT): A Review
Authors:
Praveen Damacharla,
Ahmad Y. Javaid,
Jennie J. Gallimore,
Vijay K. Devabhaktuni
Abstract:
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performance, along with the verification and validation, o…
▽ More
A significant amount of work is invested in human-machine teaming (HMT) across multiple fields. Accurately and effectively measuring system performance of an HMT is crucial for moving the design of these systems forward. Metrics are the enabling tools to devise a benchmark in any system and serve as an evaluation platform for assessing the performance, along with the verification and validation, of a system. Currently, there is no agreed-upon set of benchmark metrics for develo** HMT systems. Therefore, identification and classification of common metrics are imperative to create a benchmark in the HMT field. The key focus of this review is to conduct a detailed survey aimed at identification of metrics employed in different segments of HMT and to determine the common metrics that can be used in the future to benchmark HMTs. We have organized this review as follows: identification of metrics used in HMTs until now, and classification based on functionality and measuring techniques. Additionally, we have also attempted to analyze all the identified metrics in detail while classifying them as theoretical, applied, real-time, non-real-time, measurable, and observable metrics. We conclude this review with a detailed analysis of the identified common metrics along with their usage to benchmark HMTs.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Study on State-of-the-art Cloud Services Integration Capabilities with Autonomous Ground Vehicles
Authors:
Praveen Damacharla,
Dhwani Mehta,
Ahmad Y Javaid,
Vijay K. Devabhaktuni
Abstract:
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall performance and capabilities of the onboard system. Thi…
▽ More
Computing and intelligence are substantial requirements for the accurate performance of autonomous ground vehicles (AGVs). In this context, the use of cloud services in addition to onboard computers enhances computing and intelligence capabilities of AGVs. In addition, the vast amount of data processed in a cloud system contributes to overall performance and capabilities of the onboard system. This research study entails a qualitative analysis to gather insights on the applicability of the leading cloud service providers in AGV operations. These services include Google Cloud, Microsoft Azure, Amazon AWS, and IBM Cloud. The study begins with a brief review of AGV technical requirements that are necessary to determine the rationale for identifying the most suitable cloud service. The qualitative analysis studies and addresses the applicability of the cloud service over the proposed generalized AGV's architecture integration, performance, and manageability. Our findings conclude that a generalized AGV architecture can be supported by state-of-the-art cloud service, but there should be a clear line of separation between the primary and secondary computing needs. Moreover, our results show significant lags while using cloud services and preventing their use in real-time AGV operation.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Identification of Light Sources using Machine Learning
Authors:
Chenglong You,
Mario A. Quiroz-Juarez,
Aidan Lambert,
Narayan Bhusal,
Chao Dong,
Armando Perez-Leija,
Amir Javaid,
Roberto de J. Leon-Montiel,
Omar S. Magana-Loaiza
Abstract:
The identification of light sources represents a task of utmost importance for the development of multiple photonic technologies. Over the last decades, the identification of light sources as diverse as sunlight, laser radiation and molecule fluorescence has relied on the collection of photon statistics or the implementation of quantum state tomography. In general, this task requires an extensive…
▽ More
The identification of light sources represents a task of utmost importance for the development of multiple photonic technologies. Over the last decades, the identification of light sources as diverse as sunlight, laser radiation and molecule fluorescence has relied on the collection of photon statistics or the implementation of quantum state tomography. In general, this task requires an extensive number of measurements to unveil the characteristic statistical fluctuations and correlation properties of light, particularly in the low-photon flux regime. In this article, we exploit the self-learning features of artificial neural networks and naive Bayes classifier to dramatically reduce the number of measurements required to discriminate thermal light from coherent light at the single-photon level. We demonstrate robust light identification with tens of measurements at mean photon numbers below one. Our work demonstrates an improvement in terms of the number of measurements of several orders of magnitude with respect to conventional schemes for characterization of light sources. Our work has important implications for multiple photonic technologies such as LIDAR and microscopy.
△ Less
Submitted 23 October, 2019; v1 submitted 17 September, 2019;
originally announced September 2019.
-
Application Specific Drone Simulators: Recent Advances and Challenges
Authors:
Aakif Mairaj,
Asif I. Baba,
Ahmad Y. Javaid
Abstract:
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have…
▽ More
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have raised concerns in the recent past. Security and viability concerns in drone-based applications are growing at an alarming rate. Besides, UAV networks (UAVNets) are distinctive from other ad-hoc networks. Therefore, it is necessary to address these issues to ensure proper functioning of these UAVs while kee** their uniqueness in mind. Furthermore, adequate security and functionality require the consideration of many parameters that may include an accurate cognizance of the working mechanism of vehicles, geographical and weather conditions, and UAVNet communication. This is achievable by creating a simulator that includes these aspects. A performance evaluation through relevant drone simulator becomes indispensable procedure to test features, configurations, and designs to demonstrate superiority to comparative schemes and suitability. Thus, it becomes of paramount importance to establish the credibility of simulation results by investigating the merits and limitations of each simulator prior to selection. Based on this motivation, we present a comprehensive survey of current drone simulators. In addition, open research issues and research challenges are discussed and presented.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Upward-Pointing Cosmic-Ray-like Events Observed with ANITA
Authors:
Andres Romero-Wolf,
P. W. Gorham,
J. Nam,
S. Hoover,
P. Allison,
O. Banerjee,
L. Batten,
J. J. Beatty,
K. Belov,
D. Z. Besson,
W. R. Binns,
V. Bugaev,
P. Cao,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
B. Dailey,
C. Deaconu,
L. Cremonesi,
P. F. Dowkontt,
M. A. DuVernois,
R. C. Field,
B. D. Fox,
D. Goldstein
, et al. (51 additional authors not shown)
Abstract:
These proceedings address a recent publication by the ANITA collaboration of four upward- pointing cosmic-ray-like events observed in the first flight of ANITA. Three of these events were consistent with stratospheric cosmic-ray air showers where the axis of propagation does not inter- sect the surface of the Earth. The fourth event was consistent with a primary particle that emerges from the surf…
▽ More
These proceedings address a recent publication by the ANITA collaboration of four upward- pointing cosmic-ray-like events observed in the first flight of ANITA. Three of these events were consistent with stratospheric cosmic-ray air showers where the axis of propagation does not inter- sect the surface of the Earth. The fourth event was consistent with a primary particle that emerges from the surface of the ice suggesting a possible τ-lepton decay as the origin of this event. These proceedings follow-up on the modeling and testing of the hypothesis that this event was of τ neutrino origin.
△ Less
Submitted 30 September, 2018;
originally announced October 2018.
-
Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices
Authors:
Ashutosh Bandekar,
Ahmad Y. Javaid
Abstract:
Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the…
▽ More
Recent years have seen exponential development in wireless sensor devices and their rebirth as IoT, as well as increased popularity in wireless home devices such as bulbs, fans, and microwave. As they can be used in various fields such as medical devices, environmental studies, fire department or military application, etc., security of these low powered devices will always be a concern for all the user and security experts. Users nowadays want to control all these "smart" wireless home devices through their smartphones using an internet connection. Attacks such as distributed attacks on these devices will render the whole system vulnerable as these attacks can record and extract confidential information as well as increase resource (energy) consumption of the entire network. In this paper, we propose a cyber-attack detection algorithm and present an impact analysis of easy-to-launch cyber-attacks on a low-power mote (Z1 Zolertia) as a model IoT device. We also present detailed results of power consumption analysis with and without attack along with when the mitigation algorithm for intrusion detection is implemented.
△ Less
Submitted 31 July, 2018;
originally announced July 2018.
-
Open Source Android Vulnerability Detection Tools: A Survey
Authors:
Keyur Kulkarni,
Ahmad Y Javaid
Abstract:
Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have become a popular source of information to the publi…
▽ More
Since last decade, smartphones have become an integral part of everyone's life. Having the ability to handle many useful and attractive applications, smartphones sport flawless functionality and small sizes leading to their exponential growth. Additionally, due to the huge user base and a wide range of functionalities, these mobile platforms have become a popular source of information to the public through several Apps provided by the DHS Citizen Application Directory. Such wide audience to this platform is also making it a huge target for cyber- attacks. While Android, the most popular open source mobile platform, has its base set of permissions to protect the device and resources, it does not provide a security framework to defend against any attack. This paper surveys threat, vulnerability and security analysis tools, which are open source in nature, for the Android platform and systemizes the knowledge of Android security mechanisms. Additionally, a comparison of three popular tools is presented.
△ Less
Submitted 31 July, 2018;
originally announced July 2018.
-
On-orbit Operations and Offline Data Processing of CALET onboard the ISS
Authors:
Y. Asaoka,
S. Ozawa,
S. Torii,
O. Adriani,
Y. Akaike,
K. Asano,
M. G. Bagliesi,
G. Bigongiari,
W. R. Binns,
S. Bonechi,
M. Bongi,
P. Brogi,
J. H. Buckley,
N. Cannady,
G. Castellini,
C. Checchia,
M. L. Cherry,
G. Collazuol,
V. Di Felice,
K. Ebisawa,
H. Fuke,
T. G. Guzik,
T. Hams,
M. Hareyama,
N. Hasebe
, et al. (67 additional authors not shown)
Abstract:
The CALorimetric Electron Telescope (CALET), launched for installation on the International Space Station (ISS) in August, 2015, has been accumulating scientific data since October, 2015. CALET is intended to perform long-duration observations of high-energy cosmic rays onboard the ISS. CALET directly measures the cosmic-ray electron spectrum in the energy range of 1 GeV to 20 TeV with a 2% energy…
▽ More
The CALorimetric Electron Telescope (CALET), launched for installation on the International Space Station (ISS) in August, 2015, has been accumulating scientific data since October, 2015. CALET is intended to perform long-duration observations of high-energy cosmic rays onboard the ISS. CALET directly measures the cosmic-ray electron spectrum in the energy range of 1 GeV to 20 TeV with a 2% energy resolution above 30 GeV. In addition, the instrument can measure the spectrum of gamma rays well into the TeV range, and the spectra of protons and nuclei up to a PeV.
In order to operate the CALET onboard ISS, JAXA Ground Support Equipment (JAXA-GSE) and the Waseda CALET Operations Center (WCOC) have been established. Scientific operations using CALET are planned at WCOC, taking into account orbital variations of geomagnetic rigidity cutoff. Scheduled command sequences are used to control the CALET observation modes on orbit. Calibration data acquisition by, for example, recording pedestal and penetrating particle events, a low-energy electron trigger mode operating at high geomagnetic latitude, a low-energy gamma-ray trigger mode operating at low geomagnetic latitude, and an ultra heavy trigger mode, are scheduled around the ISS orbit while maintaining maximum exposure to high-energy electrons and other high-energy shower events by always having the high-energy trigger mode active. The WCOC also prepares and distributes CALET flight data to collaborators in Italy and the United States.
As of August 31, 2017, the total observation time is 689 days with a live time fraction of the total time of approximately 84%. Nearly 450 million events are collected with a high-energy (E>10 GeV) trigger. By combining all operation modes with the excellent-quality on-orbit data collected thus far, it is expected that a five-year observation period will provide a wealth of new and interesting results.
△ Less
Submitted 15 March, 2018;
originally announced March 2018.
-
Observation of an Unusual Upward-going Cosmic-ray-like Event in the Third Flight of ANITA
Authors:
P. W. Gorham,
B. Rotter,
P. Allison,
O. Banerjee,
L. Batten,
J. J. Beatty,
K. Bechtol,
K. Belov,
D. Z. Besson,
W. R. Binns,
V. Bugaev,
P. Cao,
C. C. Chen,
C. H. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
L. Cremonesi,
B. Dailey,
C. Deaconu,
P. F. Dowkontt,
B. D. Fox,
J. W. H. Gordon,
C. Hast,
B. Hill
, et al. (38 additional authors not shown)
Abstract:
We report on an upward traveling, radio-detected cosmic-ray-like impulsive event with characteristics closely matching an extensive air shower. This event, observed in the third flight of the Antarctic Impulsive Transient Antenna (ANITA), a NASA-sponsored long-duration balloon payload, is consistent with a similar event reported in a previous flight. These events may be produced by the atmospheric…
▽ More
We report on an upward traveling, radio-detected cosmic-ray-like impulsive event with characteristics closely matching an extensive air shower. This event, observed in the third flight of the Antarctic Impulsive Transient Antenna (ANITA), a NASA-sponsored long-duration balloon payload, is consistent with a similar event reported in a previous flight. These events may be produced by the atmospheric decay of an upward-propagating $τ$-lepton produced by a $ν_τ$ interaction, although their relatively steep arrival angles create tension with the standard model (SM) neutrino cross section. Each of the two events have $a~posteriori$ background estimates of $\lesssim 10^{-2}$ events. If these are generated by $τ$-lepton decay, then either the charged-current $ν_τ$ cross section is suppressed at EeV energies, or the events arise at moments when the peak flux of a transient neutrino source was much larger than the typical expected cosmogenic background neutrinos.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Energy Calibration of CALET Onboard the International Space Station
Authors:
Y. Asaoka,
Y. Akaike,
Y. Komiya,
R. Miyata,
S. Torii,
O. Adriani,
K. Asano,
M. G. Bagliesi,
G. Bigongiari,
W. R. Binns,
S. Bonechi,
M. Bongi,
P. Brogi,
J. H. Buckley,
N. Cannady,
G. Castellini,
C. Checchia,
M. L. Cherry,
G. Collazuol,
V. Di Felice,
K. Ebisawa,
H. Fuke,
T. G. Guzik,
T. Hams,
M. Hareyama
, et al. (69 additional authors not shown)
Abstract:
In August 2015, the CALorimetric Electron Telescope (CALET), designed for long exposure observations of high energy cosmic rays, docked with the International Space Station (ISS) and shortly thereafter began tocollect data. CALET will measure the cosmic ray electron spectrum over the energy range of 1 GeV to 20 TeV with a very high resolution of 2% above 100 GeV, based on a dedicated instrument in…
▽ More
In August 2015, the CALorimetric Electron Telescope (CALET), designed for long exposure observations of high energy cosmic rays, docked with the International Space Station (ISS) and shortly thereafter began tocollect data. CALET will measure the cosmic ray electron spectrum over the energy range of 1 GeV to 20 TeV with a very high resolution of 2% above 100 GeV, based on a dedicated instrument incorporating an exceptionally thick 30 radiation-length calorimeter with both total absorption and imaging (TASC and IMC) units. Each TASC readout channel must be carefully calibrated over the extremely wide dynamic range of CALET that spans six orders of magnitude in order to obtain a degree of calibration accuracy matching the resolution of energy measurements. These calibrations consist of calculating the conversion factors between ADC units and energy deposits, ensuring linearity over each gain range, and providing a seamless transition between neighboring gain ranges. This paper describes these calibration methods in detail, along with the resulting data and associated accuracies. The results presented in this paper show that a sufficient accuracy was achieved for the calibrations of each channel in order to obtain a suitable resolution over the entire dynamic range of the electron spectrum measurement.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Energy Spectrum of Cosmic-ray Electron and Positron from 10 GeV to 3 TeV Observed with the Calorimetric Electron Telescope on the International Space Station
Authors:
O. Adriani,
Y. Akaike,
K. Asano,
Y. Asaoka,
M. G. Bagliesi,
G. Bigongiari,
W. R. Binns,
S. Bonechi,
M. Bongi,
P. Brogi,
J. H. Buckley,
N. Cannady,
G. Castellini,
C. Checchia,
M. L. Cherry,
G. Collazuol,
V. Di Felice,
K. Ebisawa,
H. Fuke,
T. G. Guzik,
T. Hams,
M. Hareyama,
N. Hasebe,
K. Hibino,
M. Ichimura
, et al. (66 additional authors not shown)
Abstract:
First results of a cosmic-ray electron + positron spectrum, from 10 GeV to 3 TeV, is presented based upon observations with the CALET instrument on the ISS starting in October, 2015. Nearly a half million electron + positron events are included in the analysis. CALET is an all-calorimetric instrument with total vertical thickness of 30 $X_0$ and a fine imaging capability designed to achieve a larg…
▽ More
First results of a cosmic-ray electron + positron spectrum, from 10 GeV to 3 TeV, is presented based upon observations with the CALET instrument on the ISS starting in October, 2015. Nearly a half million electron + positron events are included in the analysis. CALET is an all-calorimetric instrument with total vertical thickness of 30 $X_0$ and a fine imaging capability designed to achieve a large proton rejection and excellent energy resolution well into the TeV energy region. The observed energy spectrum over 30 GeV can be fit with a single power law with a spectral index of -3.152 $\pm$ 0.016 (stat.+ syst.). Possible structure observed above 100 GeV requires further investigation with increased statistics and refined data analysis.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Using a "Study of Studies" to help statistics students assess research findings
Authors:
Azka Javaid,
Xiaofei Wang,
Nicholas J Horton
Abstract:
One learning goal of the introductory statistics course is to develop the ability to make sense of research findings in published papers. The Atlantic magazine regularly publishes a feature called "Study of Studies" that summarizes multiple articles published in a particular domain. We describe a classroom activity to develop this capacity using the "Study of Studies." In this activity, students r…
▽ More
One learning goal of the introductory statistics course is to develop the ability to make sense of research findings in published papers. The Atlantic magazine regularly publishes a feature called "Study of Studies" that summarizes multiple articles published in a particular domain. We describe a classroom activity to develop this capacity using the "Study of Studies." In this activity, students read capsule summaries of twelve research papers related to restaurants and dining that was published in April 2015. The selected papers report on topics such as how seating arrangement, server posture, plate color and size, and the use of background music relate to revenue, ambiance, and perceived food quality. The students are assigned one of the twelve papers to read and critique as part of a small group. Their group critiques are shared with the class and the instructor.
A pilot study was conducted during the 2015-2016 academic year at Amherst College. Students noted that key details were not included in the published summary. They were generally skeptical of the published conclusions. The students often provided additional summarization of information from the journal articles that better describe the results. By independently assessing and comparing the original study conclusions with the capsule summary in the "Study of Studies," students can practice develo** judgment and assessing the validity of statistical results.
△ Less
Submitted 29 January, 2017;
originally announced January 2017.
-
A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)
Authors:
Quamar Niyaz,
Weiqing Sun,
Ahmad Y Javaid
Abstract:
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardwar…
▽ More
Distributed Denial of Service (DDoS) is one of the most prevalent attacks that an organizational network infrastructure comes across nowadays. We propose a deep learning based multi-vector DDoS detection system in a software-defined network (SDN) environment. SDN provides flexibility to program network devices for different objectives and eliminates the need for third-party vendor-specific hardware. We implement our system as a network application on top of an SDN controller. We use deep learning for feature reduction of a large set of features derived from network traffic headers. We evaluate our system based on different performance metrics by applying it on traffic traces collected from different scenarios. We observe high accuracy with a low false-positive for attack detection in our proposed system.
△ Less
Submitted 22 November, 2016;
originally announced November 2016.
-
CALET Upper Limits on X-ray and Gamma-ray Counterparts of GW 151226
Authors:
O. Adriani,
Y. Akaike,
K. Asano,
Y. Asaoka,
M. G. Bagliesi,
G. Bigongiari,
W. R. Binns,
S. Bonechi,
M. Bongi,
P. Brog,
J. H. Buckley,
N. Cannady,
G. Castellini,
C. Checchia,
M. L. Cherry,
G. Collazuol,
V. Di Felice,
K. Ebisawa,
H. Fuke,
T. G. Guzik,
T. Hams,
M. Hareyama,
N. Hasebe,
K. Hibino,
M. Ichimura
, et al. (67 additional authors not shown)
Abstract:
We present upper limits in the hard X-ray and gamma-ray bands at the time of the LIGO gravitational-wave event GW 151226 derived from the CALorimetric Electron Telescope (CALET) observation. The main instrument of CALET, CALorimeter (CAL), observes gamma-rays from ~1 GeV up to 10 TeV with a field of view of ~2 sr. The CALET gamma-ray burst monitor (CGBM) views ~3 sr and ~2pi sr of the sky in the 7…
▽ More
We present upper limits in the hard X-ray and gamma-ray bands at the time of the LIGO gravitational-wave event GW 151226 derived from the CALorimetric Electron Telescope (CALET) observation. The main instrument of CALET, CALorimeter (CAL), observes gamma-rays from ~1 GeV up to 10 TeV with a field of view of ~2 sr. The CALET gamma-ray burst monitor (CGBM) views ~3 sr and ~2pi sr of the sky in the 7 keV - 1 MeV and the 40 keV - 20 MeV bands, respectively, by using two different scintillator-based instruments. The CGBM covered 32.5% and 49.1% of the GW 151226 sky localization probability in the 7 keV - 1 MeV and 40 keV - 20 MeV bands respectively. We place a 90% upper limit of 2 x 10^{-7} erg cm-2 s-1 in the 1 - 100 GeV band where CAL reaches 15% of the integrated LIGO probability (~1.1 sr). The CGBM 7 sigma upper limits are 1.0 x 10^{-6} erg cm-2 s-1 (7-500 keV) and 1.8 x 10^{-6} erg cm-2 s-1 (50-1000 keV) for one second exposure. Those upper limits correspond to the luminosity of 3-5 x 10^{49} erg s-1 which is significantly lower than typical short GRBs.
△ Less
Submitted 2 September, 2016; v1 submitted 1 July, 2016;
originally announced July 2016.
-
Characteristics of Four Upward-pointing Cosmic-ray-like Events Observed with ANITA
Authors:
P. W. Gorham,
J. Nam,
A. Romero-Wolf,
S. Hoover,
P. Allison,
O. Banerjee,
J. J. Beatty,
K. Belov,
D. Z. Besson,
W. R. Binns,
V. Bugaev,
P. Cao,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
B. Dailey,
C. Deaconu,
L. Cremonesi,
P. F. Dowkonnt,
M. A. Duvernois,
R. C. Field,
B. D. Fox,
D. Goldstein,
J. Gordon
, et al. (44 additional authors not shown)
Abstract:
We report on four radio-detected cosmic-ray (CR) or CR-like events observed with the Antarctic Impulsive Transient Antenna (ANITA), a NASA-sponsored long-duration balloon payload. Two of the four were previously identified as stratospheric CR air showers during the ANITA-I flight. A third stratospheric CR was detected during the ANITA-II flight. Here we report on characteristics these three unusua…
▽ More
We report on four radio-detected cosmic-ray (CR) or CR-like events observed with the Antarctic Impulsive Transient Antenna (ANITA), a NASA-sponsored long-duration balloon payload. Two of the four were previously identified as stratospheric CR air showers during the ANITA-I flight. A third stratospheric CR was detected during the ANITA-II flight. Here we report on characteristics these three unusual CR events, which develop nearly horizontally, 20-30~km above the surface of the Earth. In addition, we report on a fourth steeply upward-pointing ANITA-I CR-like radio event which has characteristics consistent with a primary that emerged from the surface of the ice. This suggests a possible $τ$-lepton decay as the origin of this event, but such an interpretation would require significant suppression of the Standard Model $τ$-neutrino cross section.
△ Less
Submitted 29 June, 2016; v1 submitted 16 March, 2016;
originally announced March 2016.
-
Pairwise Stability in Two Sided Market with Strictly Increasing Valuation Functions
Authors:
Yasir Ali,
Asma Javaid
Abstract:
This paper deals with two-sided matching market with two disjoint sets, i.e. the set of buyers and the set of sellers. Each seller can trade with at most with one buyer and vice versa. Money is transferred from sellers to buyers for an indivisible goods that buyers own. Valuation functions, for participants of both sides, are represented by strictly increasing functions with money considered as di…
▽ More
This paper deals with two-sided matching market with two disjoint sets, i.e. the set of buyers and the set of sellers. Each seller can trade with at most with one buyer and vice versa. Money is transferred from sellers to buyers for an indivisible goods that buyers own. Valuation functions, for participants of both sides, are represented by strictly increasing functions with money considered as discrete variable. An algorithm is devised to prove the existence of stability for this model.
△ Less
Submitted 4 April, 2017; v1 submitted 14 March, 2016;
originally announced March 2016.
-
Energy and Flux Measurements of Ultra-High Energy Cosmic Rays Observed During the First ANITA Flight
Authors:
H. Schoorlemmer,
K. Belov,
A. Romero-Wolf,
D. García-Fernández,
V. Bugaev,
S. A. Wissel,
P. Allison,
J. Alvarez-Muñiz,
S. W. Barwick,
J. J. Beatty,
D. Z. Besson,
W. R. Binns,
W. R. Carvalho Jr.,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
P. F. Dowkontt,
M. A. DuVernois,
R. C. Field,
D. Goldstein,
P. W. Gorham,
C. Hast,
C. L. Heber,
T. Huege
, et al. (33 additional authors not shown)
Abstract:
The first flight of the Antarctic Impulsive Transient Antenna (ANITA) experiment recorded 16 radio signals that were emitted by cosmic-ray induced air showers. For 14 of these events, this radiation was reflected from the ice. The dominant contribution to the radiation from the deflection of positrons and electrons in the geomagnetic field, which is beamed in the direction of motion of the air sho…
▽ More
The first flight of the Antarctic Impulsive Transient Antenna (ANITA) experiment recorded 16 radio signals that were emitted by cosmic-ray induced air showers. For 14 of these events, this radiation was reflected from the ice. The dominant contribution to the radiation from the deflection of positrons and electrons in the geomagnetic field, which is beamed in the direction of motion of the air shower. This radiation is reflected from the ice and subsequently detected by the ANITA experiment at a flight altitude of 36km. In this paper, we estimate the energy of the 14 individual events and find that the mean energy of the cosmic-ray sample is 2.9 EeV. By simulating the ANITA flight, we calculate its exposure for ultra-high energy cosmic rays. We estimate for the first time the cosmic-ray flux derived only from radio observations. In addition, we find that the Monte Carlo simulation of the ANITA data set is in agreement with the total number of observed events and with the properties of those events.
△ Less
Submitted 8 February, 2016; v1 submitted 17 June, 2015;
originally announced June 2015.
-
Investigating Quality Routing Link Metrics in Wireless Multi-hop Networks
Authors:
N. Javaid,
A. BiBi,
A. Javaid,
Z. A. Khan,
K. Latif,
M. Ishfaq
Abstract:
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution…
▽ More
In this paper, we propose a new Quality Link Metric (QLM), ``Inverse Expected Transmission Count (InvETX)'' in Optimized Link State Routing (OLSR) protocol. Then we compare performance of three existing QLMs which are based on loss probability measurements; Expected Transmission Count (ETX), Minimum Delay (MD), Minimum Loss (ML) in Static Wireless Multi-hop Networks (SWMhNs). A novel contribution of this paper is enhancement in conventional OLSR to achieve high efficiency in terms of optimized routing load and routing latency. For this purpose, first we present a mathematical framework, and then to validate this frame work, we select three performance parameters to simulate default and enhanced versions of OLSR. Three chosen performance parameters are; throughput, Normalized Routing Load and End-to-End Delay. From simulation results, we conclude that adjusting the frequencies of topological information exchange results in high efficiency.
△ Less
Submitted 15 November, 2013;
originally announced November 2013.
-
Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks
Authors:
N. Javaid,
M. Yaqoob,
M. Y. Khan,
M. A. Khan,
A. Javaid,
Z. A. Khan
Abstract:
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely send…
▽ More
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely sending of data is essential. For data to reach health care center, there must be a proper way of sending data through reliable connection and with minimum delay. In this paper transmission delay of different paths, through which data is sent from sensor to health care center over heterogeneous multi-hop wireless channel is analyzed. Data of medical related diseases is sent through three different paths. In all three paths, data from sensors first reaches ZigBee, which is the common link in all three paths. Wireless Local Area Network (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunication System (UMTS) are connected with ZigBee. Each network (WLAN, WiMAX, UMTS) is setup according to environmental conditions, suitability of device and availability of structure for that device. Data from these networks is sent to IP-Cloud, which is further connected to health care center. Delay of data reaching each device is calculated and represented graphically. Main aim of this paper is to calculate delay of each link in each path over multi-hop wireless channel.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Analyzing Medium Access Techniques in Wireless Body Area Networks
Authors:
N. Javaid,
I. Israr,
M. A. Khan,
A. Javaid,
S. H. Bouk,
Z. A. Khan
Abstract:
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are…
▽ More
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are Throughput (T), Delay (D) and Offered Load (G). The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
On Sink Mobility Trajectory in Clustering Routing Protocols in WSNs
Authors:
N. Javaid,
Q. Ain,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clusterin…
▽ More
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clustering schemes, we compare five clustering routing protocols; Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient Sensor Network (TEEN), Distributed Energy Efficient Clustering (DEEC) and two variants of TEEN which are Clustering and Multi-Hop Protocol in Threshold Sensitive Energy Efficient Sensor Network (CAMPTEEN) and Hierarchical Threshold Sensitive Energy Efficient Sensor Network (H-TEEN). The contribution of this paper is to introduce sink mobility to increase the network life time of hierarchal routing protocols. Two scenarios are discussed to compare the performances of routing protocols; in first scenario static sink is implanted and in later one mobile sink is used. We perform analytical simulations in MATLAB by using different performance metrics such as, number of alive nodes, number of dead nodes and throughput.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs
Authors:
S. Ahmed,
N. Javaid,
S. H. Bouk,
A. Javaid,
M. A. Khan,
Z. A. Khan
Abstract:
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that alloca…
▽ More
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that allocates secure keys only for short distances. While not completely secure, it offers huge advantages over traditional methods by the use of entanglement swap** and quantum teleportation. Reversible logic gates like CNOT, Toffoli, Fredkin etc. are of basic importance in Quantum Computing. In our research, we adopted a EPR-pair allocation scheme in terms of these quantum gates to overcome the susceptibility caused by malicious nodes. As the qubits stored in a sensor node can be used only once and cannot be duplicated, hence risk of information leakage reduced even if the node are compromised.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs
Authors:
N. Javaid,
M. Waseem,
Z. A. Khan,
U. Qasim,
K. Latif,
A. Javaid
Abstract:
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effec…
▽ More
This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effectively increases the efficiency of conventional clustering based protocols in terms of stability period and number of packets sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that LEACHACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better than LEACH, SEP, TEEN and DEEC respectively in terms of stability period and number of packets sent to BS. The stability period of the existing protocols prolongs by implementing ACH on them.
△ Less
Submitted 2 April, 2013;
originally announced April 2013.
-
Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
Z. A. Khan,
U. Qasim,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
U. Qasim,
Z. A. Khan,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analy…
▽ More
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of LP_models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of WMhNs, we conduct simulations using NS- 2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
Improving Network Efficiency by Removing Energy Holes in WSNs
Authors:
M. B. Rasheedl,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to…
▽ More
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to the base station. We proposedEnergy-efficient HOleRemoving Mechanism (E-HORM) technique to remove energy holes. In this technique, we use sleep and awake mechanism for sensor nodes to save energy. This approach finds the maximum distance node to calculate the maximum energy for data transmission. We considered it as a threshold energy Eth. Every node first checks its energy level for data transmission. If the energy level is less than Eth, it cannot transmit data. We also explain mathematically the energy consumption and average energy saving of sensor nodes in each round. Extensive simulations showed that when use this approach for WSNs significantly helps to extend the network lifetime and stability period.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks
Authors:
S. Faisal,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station whil…
▽ More
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station while some use clustering technique to send data to base station as in SEP. We implemented Z-SEP and compared it with traditional Low Energy adaptive clustering hierarchy (LEACH) and SEP. Simulation results showed that Z-SEP enhanced the stability period and throughput than existing protocols like LEACH and SEP.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
EAPESS: An Adaptive Transmission Scheme in Wireless Sensor Networks
Authors:
Z. Abbas,
N. Javaid,
A. Javaid,
Z. A. Khan,
M. A. Khan,
U. Qasim
Abstract:
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critica…
▽ More
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critical distance values are used against different coding gains for sake of energy saving. If distance lies below critical distance values then particular encoders are selected with respect to their particular coding gains. Coding gains are used for critical distances estimation of all encoders. This adaptive encoder and transmit power selection scheme with respect to their coding gain results in a significant energy saving in WSNs environment. Simulations provide better results of energy saving achieved by using this adaptive scheme.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Hybrid DEEC: Towards Efficient Energy Utilization in Wireless Sensor Networks
Authors:
M. Y. Khan,
N. Javaid,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy…
▽ More
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy utilization in WSNs. In H-DEEC,elected Cluster Heads (CHs) communicate the Base Station (BS) through beta elected nodes, by using multi-hop**. We logically divide the network into two parts, on the basis of the residual energy of nodes. The normal nodes with high initial and residual energy will behighlyprobable to be CHs than the nodes with lesser energy. To overcome the deficiencies of H-DEEC, we propose Multi-Edged Hybrid-DEEC (MH-DEEC). In MH-DEEC the criteria of chain construction is modified. Finally, the comparison in simulation results with other heterogeneous protocols show that, MH-DEEC and H-DEEC achieves longer stability time and network life time due to efficient energy utilization.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Maximizing the Lifetime of Multi-chain PEGASIS using Sink Mobility
Authors:
Mohsin Raza Jafri,
Nadeem Javaid,
Akmal Javaid,
Zahoor Ali Khan
Abstract:
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol…
▽ More
In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely in enhancing the network lifetime of wireless sensors. Thus, we recommend Mobile sink improved energy-efficient PEGASIS-based routing protocol (MIEEPB); a multi-chain model having a sink mobility, to achieve proficient energy utilization of wireless sensors. As the motorized movement of mobile sink is steered by petrol or current, there is a need to confine this movement within boundaries and the trajectory of mobile sink should be fixed. In our technique, the mobile sink moves along its trajectory and stays for a sojourn time at sojourn location to guarantee complete data collection. We develop an algorithm for trajectory of mobile sink. We ultimately perform wide-ranging experiments to assess the performance of the proposed method. The results reveal that the proposed way out is nearly optimal and also better than IEEPB in terms of network lifetime.
△ Less
Submitted 18 March, 2013;
originally announced March 2013.
-
Antarctic Radio Frequency Albedo and Implications for Cosmic Ray Reconstruction
Authors:
D. Z. Besson,
J. Stockham,
M. Sullivan,
P. Allison,
S. W. Barwick,
B. M. Baughman,
J. J. Beatty,
K. Belov,
S. Bevan,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
D. De Marco,
P. F. Dowkontt,
M. DuVernois,
D. Goldstein,
P. W. Gorham,
E. W. Grashorn,
B. Hill,
S. Hoover,
M. Huang,
M. H. Israel,
A. Javaid
, et al. (20 additional authors not shown)
Abstract:
From an elevation of ~38 km, the balloon-borne ANtarctic Impulsive Transient Antenna (ANITA) is designed to detect the up-coming radio frequency (RF) signal resulting from a sub-surface neutrino-nucleon collision. Although no neutrinos have been discovered thus far, ANITA is nevertheless the only experiment to self-trigger on radio frequency emissions from cosmic-ray induced atmospheric air shower…
▽ More
From an elevation of ~38 km, the balloon-borne ANtarctic Impulsive Transient Antenna (ANITA) is designed to detect the up-coming radio frequency (RF) signal resulting from a sub-surface neutrino-nucleon collision. Although no neutrinos have been discovered thus far, ANITA is nevertheless the only experiment to self-trigger on radio frequency emissions from cosmic-ray induced atmospheric air showers. In the majority of those cases, down-coming RF signals are observed via their reflection from the Antarctic ice sheet and back up to the ANITA interferometer. Estimating the energy scale of the incident cosmic rays therefore requires an estimate of the fractional power reflected at the air-ice interface. Similarly, inferring the energy of neutrinos interacting in-ice from observations of the upwards-directed signal refracting out to ANITA also requires consideration of signal coherence across the interface. By comparing the direct Solar RF signal intensity measured with ANITA to the surface-reflected Solar signal intensity, as a function of incident elevation angle relative to the surface Θ, we estimate the power reflection coefficients R(Θ). We find general consistency between our average measurements and the values of R(Θ) expected from the Fresnel equations, separately for horizontal- vs. vertical-polarizations.
△ Less
Submitted 6 October, 2014; v1 submitted 18 January, 2013;
originally announced January 2013.
-
Modeling Enhancements in DSR, FSR, OLSR under Mobility and Scalability Constraints in VANETs
Authors:
N. Javaid,
A. Bibi,
S. H. Bouk,
A. Javaid,
I. Sasase
Abstract:
Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic Source Routing (DSR), Fish-eye State Routing (FSR) a…
▽ More
Frequent topological changes due to high mobility is one of the main issues in Vehicular Ad-hoc NETworks (VANETs). In this paper, we model transmission probabilities of 802.11p for VANETs and effect of these probabilities on average transmission time. To evaluate the effect of these probabilities of VANETs in routing protocols, we select Dynamic Source Routing (DSR), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). Framework of these protocols with respect to their packet cost is also presented in this work. A novel contribution of this work is enhancement of chosen protocols to obtain efficient behavior. Extensive simulation work is done to prove and compare the efficiency in terms of high throughput of enhanced versions with default versions of protocols in NS-2. For this comparison, we choose three performance metrics; throughput, End-to-End Delay (E2ED) and Normalized Routing Load (NRL) in different mobilities and scalabilities. Finally, we deduce that enhanced DSR (DSR-mod) outperforms other protocols by achieving 16% more packet delivery for all scalabilities and 28% more throughput in selected mobilities than original version of DSR (DSR-orig).
△ Less
Submitted 29 July, 2012;
originally announced July 2012.
-
Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols
Authors:
Nadeem Javaid,
Ayesha Bibi,
Akmal Javaid,
Shahzad A. Malik
Abstract:
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor…
▽ More
In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor estimation errors affect broadcast of route requests, how reduction of broadcast overhead achieves bandwidth, how to cope with the problem of mobility and density, etc, are attempted to respond. In all of the above mentioned situations, routing overhead and delay generated by the chosen protocols can exactly be calculated from our modeled equations. Finally, we analyze the performance of selected routing protocols using our proposed framework in NS-2 by considering different performance parameters; Route REQuest (RREQ) packet generation, End-to-End Delay (E2ED) and Normalized Routing Load (NRL) with respect to varying rates of mobility and density of nodes in the underlying wireless network.
△ Less
Submitted 9 September, 2011;
originally announced September 2011.
-
Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols
Authors:
Nadeem Javaid,
Ayesha Bibi,
Akmal Javaid,
Shahzad A. Malik
Abstract:
In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of…
▽ More
In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.
△ Less
Submitted 18 August, 2011;
originally announced August 2011.
-
The First Limits on the Ultra-high Energy Neutrino Fluence from Gamma-ray Bursts
Authors:
A. G. Vieregg,
K. Palladino,
P. Allison,
B. M. Baughman,
J. J. Beatty,
K. Belov,
D. Z. Besson,
S. Bevan,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
M. Detrixhe,
D. De Marco,
P. F. Dowkontt,
M. DuVernois,
P. W. Gorham,
E. W. Grashorn,
B. Hill,
S. Hoover,
M. Huang,
M. H. Israel,
A. Javaid,
K. M. Liewer
, et al. (12 additional authors not shown)
Abstract:
We set the first limits on the ultra-high energy (UHE) neutrino fluence at energies greater than 10^9 GeV from gamma-ray bursts (GRBs) based on data from the second flight of the ANtarctic Impulsive Transient Antenna (ANITA). During the 31 day flight of ANITA-II, 26 GRBs were recorded by Swift or Fermi. Of these, we analyzed the 12 GRBs which occurred during quiet periods when the payload was away…
▽ More
We set the first limits on the ultra-high energy (UHE) neutrino fluence at energies greater than 10^9 GeV from gamma-ray bursts (GRBs) based on data from the second flight of the ANtarctic Impulsive Transient Antenna (ANITA). During the 31 day flight of ANITA-II, 26 GRBs were recorded by Swift or Fermi. Of these, we analyzed the 12 GRBs which occurred during quiet periods when the payload was away from anthropogenic activity. In a blind analysis, we observe 0 events on a total background of 0.0044 events in the combined prompt window for all 12 low-background bursts. We also observe 0 events from the remaining 14 bursts. We place a 90% confidence level limit on the E^-4 prompt neutrino fluence of 2.5x10^17 GeV^3/cm^2 between 10^8 and 10^12 GeV from GRB090107A. This is the first reported limit on the UHE neutrino fluence from GRBs above 10^9 GeV, and the strongest limit above 10^8 GeV.
△ Less
Submitted 15 February, 2011;
originally announced February 2011.
-
Performance Study of ETX based Wireless Routing Metrics
Authors:
Nadeem Javaid,
Akmal Javaid,
Imran Ali Khan,
Karim Djouani
Abstract:
Being most popular and IETF standard metric, minimum hop count is appropriately used by Ad hoc Networks, as new paths must rapidly be found in the situations where quality paths could not be found in due time due to high node mobility. There always has been a tradeoff between throughput and energy consumption, but stationary topology of WMNs and high node density of WSN's benefit the algorithms to…
▽ More
Being most popular and IETF standard metric, minimum hop count is appropriately used by Ad hoc Networks, as new paths must rapidly be found in the situations where quality paths could not be found in due time due to high node mobility. There always has been a tradeoff between throughput and energy consumption, but stationary topology of WMNs and high node density of WSN's benefit the algorithms to consider quality-aware routing to choose the best routes. In this paper, we analytically review ongoing research on wireless routing metrics which are based on ETX (Expected Transmission Count) as it performs better than minimum hop count under link availability. Performances over ETX, target platforms and design requirements of these ETX based metrics are high-lighted. Consequences of the criteria being adopted (in addition to expected link layer transmissions & retransmissions) in the form of incremental: (1) performance overheads and computational complexity causing inefficient use of network resources and instability of the routing algorithm, (2) throughput gains achieved with better utilization of wireless medium resources have been elaborated.
△ Less
Submitted 21 December, 2010;
originally announced December 2010.
-
Erratum: Observational Constraints on the Ultra-high Energy Cosmic Neutrino Flux from the Second Flight of the ANITA Experiment
Authors:
P. W. Gorham,
P. Allison,
B. M. Baughman,
J. J. Beatty,
K. Belov,
D. Z. Besson,
S. Bevan,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
M. Detrixhe,
D. De Marco,
P. F. Dowkontt,
M. DuVernois,
E. W. Grashorn,
B. Hill,
S. Hoover,
M. Huang,
M. H. Israel,
A. Javaid,
K. M. Liewer,
S. Matsuno,
B. C. Mercurio
, et al. (13 additional authors not shown)
Abstract:
This is an erratum to our paper in Physical Review D82:022004,2010, corresponding to preprint: arXiv:1003.2961 .
This is an erratum to our paper in Physical Review D82:022004,2010, corresponding to preprint: arXiv:1003.2961 .
△ Less
Submitted 22 November, 2010;
originally announced November 2010.
-
Ultra-Relativistic Magnetic Monopole Search with the ANITA-II Balloon-borne Radio Interferometer
Authors:
M. Detrixhe,
D. Besson,
P. W. Gorham,
P. Allison,
B. Baughmann,
J. J. Beatty,
K. Belov,
S. Bevan,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
D. DeMarco,
P. F. Dowkontt,
M. A. Duvernois,
C. Frankenfeld,
E. W. Grashorn,
D. P. Hogan,
N. Griffith,
B. Hill,
S. Hoover,
M. H. Israel,
A. Javaid,
K. M. Liewer
, et al. (14 additional authors not shown)
Abstract:
We have conducted a search for extended energy deposition trails left by ultra-relativistic magnetic monopoles interacting in Antarctic ice. The non-observation of any satisfactory candidates in the 31 days of accumulated ANITA-II flight data results in an upper limit on the diffuse flux of relativistic monopoles. We obtain a 90% C.L. limit of order 10^{-19}/(cm^2-s-sr) for values of Lorentz boost…
▽ More
We have conducted a search for extended energy deposition trails left by ultra-relativistic magnetic monopoles interacting in Antarctic ice. The non-observation of any satisfactory candidates in the 31 days of accumulated ANITA-II flight data results in an upper limit on the diffuse flux of relativistic monopoles. We obtain a 90% C.L. limit of order 10^{-19}/(cm^2-s-sr) for values of Lorentz boost factor 10^{10}<gamma at the anticipated energy E=10^{16} GeV. This bound is stronger than all previously published experimental limits for this kinematic range.
△ Less
Submitted 11 January, 2011; v1 submitted 6 August, 2010;
originally announced August 2010.
-
Observation of Ultra-high-energy Cosmic Rays with the ANITA Balloon-borne Radio Interferometer
Authors:
S. Hoover,
J. Nam,
P. W. Gorham,
E. Grashorn,
P. Allison,
S. W. Barwick,
J. J. Beatty,
K. Belov,
D. Z. Besson,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
P. F. Dowkontt,
M. A. DuVernois,
R. C. Field,
D. Goldstein,
A. G. Vieregg,
C. Hast,
C. L. Hebert,
M. H. Israel,
A. Javaid,
J. Kowalski,
J. G. Learned
, et al. (20 additional authors not shown)
Abstract:
We report the observation of sixteen cosmic ray events of mean energy of 1.5 x 10^{19} eV, via radio pulses originating from the interaction of the cosmic ray air shower with the Antarctic geomagnetic field, a process known as geosynchrotron emission. We present the first ultra-wideband, far-field measurements of the radio spectral density of geosynchrotron emission in the range from 300-1000 MHz.…
▽ More
We report the observation of sixteen cosmic ray events of mean energy of 1.5 x 10^{19} eV, via radio pulses originating from the interaction of the cosmic ray air shower with the Antarctic geomagnetic field, a process known as geosynchrotron emission. We present the first ultra-wideband, far-field measurements of the radio spectral density of geosynchrotron emission in the range from 300-1000 MHz. The emission is 100% linearly polarized in the plane perpendicular to the projected geomagnetic field. Fourteen of our observed events are seen to have a phase-inversion due to reflection of the radio beam off the ice surface, and two additional events are seen directly from above the horizon.
△ Less
Submitted 11 May, 2010; v1 submitted 30 April, 2010;
originally announced May 2010.
-
Observational Constraints on the Ultra-high Energy Cosmic Neutrino Flux from the Second Flight of the ANITA Experiment
Authors:
The ANITA Collaboration,
P. W. Gorham,
P. Allison,
B. M. Baughman,
J. J. Beatty,
K. Belov,
D. Z. Besson,
S. Bevan,
W. R. Binns,
C. Chen,
P. Chen,
J. M. Clem,
A. Connolly,
M. Detrixhe,
D. De Marco,
P. F. Dowkontt,
M. DuVernois,
E. W. Grashorn,
B. Hill,
S. Hoover,
M. Huang,
M. H. Israel,
A. Javaid,
K. M. Liewer,
S. Matsuno
, et al. (13 additional authors not shown)
Abstract:
The Antarctic Impulsive Transient Antenna (ANITA) completed its second long-duration balloon flight in January 2009, with 31 days aloft (28.5 live days) over Antarctica. ANITA searches for impulsive coherent radio Cherenkov emission from 200 to 1200 MHz, arising from the Askaryan charge excess in ultra-high energy neutrino-induced cascades within Antarctic ice. This flight included significant imp…
▽ More
The Antarctic Impulsive Transient Antenna (ANITA) completed its second long-duration balloon flight in January 2009, with 31 days aloft (28.5 live days) over Antarctica. ANITA searches for impulsive coherent radio Cherenkov emission from 200 to 1200 MHz, arising from the Askaryan charge excess in ultra-high energy neutrino-induced cascades within Antarctic ice. This flight included significant improvements over the first flight in the payload sensitivity, efficiency, and a flight trajectory over deeper ice. Analysis of in-flight calibration pulses from surface and sub-surface locations verifies the expected sensitivity. In a blind analysis, we find 2 surviving events on a background, mostly anthropogenic, of 0.97+-0.42 events. We set the strongest limit to date for 1-1000 EeV cosmic neutrinos, excluding several current cosmogenic neutrino models.
△ Less
Submitted 18 May, 2010; v1 submitted 15 March, 2010;
originally announced March 2010.