-
Elliptic Reconstruction and A Posteriori Error Estimates for Parabolic Variational Inequalities
Authors:
Harbir Antil,
Rohit Khandelwal
Abstract:
Elliptic reconstruction property, originally introduced by Makridakis and Nochetto for linear parabolic problems, is a well-known tool to derive optimal a posteriori error estimates. No such results are known for nonlinear and nonsmooth problems such as parabolic variational inequalities (VIs). This article establishes the elliptic reconstruction property for parabolic VIs and derives a posteriori…
▽ More
Elliptic reconstruction property, originally introduced by Makridakis and Nochetto for linear parabolic problems, is a well-known tool to derive optimal a posteriori error estimates. No such results are known for nonlinear and nonsmooth problems such as parabolic variational inequalities (VIs). This article establishes the elliptic reconstruction property for parabolic VIs and derives a posteriori error estimates in $L^{\infty}(0,T;L^{2}(Ω))$. The estimator consists of discrete complementarity terms and standard residual. As an application, the residual-type error estimates are presented.
△ Less
Submitted 27 May, 2024; v1 submitted 27 February, 2024;
originally announced February 2024.
-
Supremum norm A Posteriori Error control of Quadratic Finite Element Method for the Signorini problem
Authors:
Rohit Khandelwal,
Kamana Porwal,
Tanvi Wadhawan
Abstract:
In this paper, we develop a new residual-based pointwise a posteriori error estimator of the quadratic finite element method for the Signorini problem. The supremum norm a posteriori error estimates enable us to locate the singularities locally to control the pointwise errors. In the analysis the discrete counterpart of contact force density is constructed suitably to exhibit the desired sign prop…
▽ More
In this paper, we develop a new residual-based pointwise a posteriori error estimator of the quadratic finite element method for the Signorini problem. The supremum norm a posteriori error estimates enable us to locate the singularities locally to control the pointwise errors. In the analysis the discrete counterpart of contact force density is constructed suitably to exhibit the desired sign property. We employ a priori estimates for the standard Green's matrix for the divergence type operator and introduce the upper and lower barriers functions by appropriately modifying the discrete solution. Finally, we present numerical experiments that illustrate the excellent performance of the proposed error estimator.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Pointwise A posteriori error control of quadratic Discontinuous Galerkin Methods for the unilateral contact problem
Authors:
Rohit Khandelwal,
Kamana Porwal,
Tanvi Wadhawan
Abstract:
An a posteriori error bound for the pointwise error of the quadratic discontinuous Galerkin method for the unilateral contact problem on polygonal domain is presented. The pointwise a posteriori error analysis is based on the direct use of a priori estimates of the Green's matrix for the divergence type operators and the suitable construction of the discrete contact force density $\bσ_h$ and barri…
▽ More
An a posteriori error bound for the pointwise error of the quadratic discontinuous Galerkin method for the unilateral contact problem on polygonal domain is presented. The pointwise a posteriori error analysis is based on the direct use of a priori estimates of the Green's matrix for the divergence type operators and the suitable construction of the discrete contact force density $\bσ_h$ and barrier functions for the continuous solution. Several numerical experiments (in two dimension) are presented to illustrate the reliability and efficiency properties of the proposed aposteriori error estimator.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
A Discontinuous Galerkin Method for Optimal Control of the Obstacle Problem
Authors:
Harbir Antil,
Rohit Khandelwal,
Umarkhon Rakhimov
Abstract:
This article provides quasi-optimal a priori error estimates for an optimal control problem constrained by an elliptic obstacle problem where the finite element discretization is carried out using the symmetric interior penalty discontinuous Galerkin method. The main proofs are based on the improved $L^2$-error estimates for the obstacle problem, the discrete maximum principle, and a well-known qu…
▽ More
This article provides quasi-optimal a priori error estimates for an optimal control problem constrained by an elliptic obstacle problem where the finite element discretization is carried out using the symmetric interior penalty discontinuous Galerkin method. The main proofs are based on the improved $L^2$-error estimates for the obstacle problem, the discrete maximum principle, and a well-known quadratic growth property. The standard (restrictive) assumptions on mesh are not assumed here.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields
Authors:
Asmit Nayak,
Rishabh Khandelwal,
Kassem Fawaz
Abstract:
In this work, we perform a comprehensive analysis of the security of text input fields in web browsers. We find that browsers' coarse-grained permission model violates two security design principles: least privilege and complete mediation. We further uncover two vulnerabilities in input fields, including the alarming discovery of passwords in plaintext within the HTML source code of the web page.…
▽ More
In this work, we perform a comprehensive analysis of the security of text input fields in web browsers. We find that browsers' coarse-grained permission model violates two security design principles: least privilege and complete mediation. We further uncover two vulnerabilities in input fields, including the alarming discovery of passwords in plaintext within the HTML source code of the web page. To demonstrate the real-world impact of these vulnerabilities, we design a proof-of-concept extension, leveraging techniques from static and dynamic code injection attacks to bypass the web store review process. Our measurements and case studies reveal that these vulnerabilities are prevalent across various websites, with sensitive user information, such as passwords, exposed in the HTML source code of even high-traffic sites like Google and Cloudflare. We find that a significant percentage (12.5\%) of extensions possess the necessary permissions to exploit these vulnerabilities and identify 190 extensions that directly access password fields. Finally, we propose two countermeasures to address these risks: a bolt-on JavaScript package for immediate adoption by website developers allowing them to protect sensitive input fields, and a browser-level solution that alerts users when an extension accesses sensitive input fields. Our research highlights the urgent need for improved security measures to protect sensitive user information online.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section
Authors:
Rishabh Khandelwal,
Asmit Nayak,
Paul Chung,
Kassem Fawaz
Abstract:
Google has mandated developers to use Data Safety Sections (DSS) to increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Data Safety Section (DSS) using both quantitative and qualitative methods. We conduct the first large-scale measurement study of DSS using apps from Android Play store (n=1.1M). We find that there are inte…
▽ More
Google has mandated developers to use Data Safety Sections (DSS) to increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Data Safety Section (DSS) using both quantitative and qualitative methods. We conduct the first large-scale measurement study of DSS using apps from Android Play store (n=1.1M). We find that there are internal inconsistencies within the reported practices. We also find trends of both over and under-reporting practices in the DSSs.
Next, we conduct a longitudinal study of DSS to explore how the reported practices evolve over time, and find that the developers are still adjusting their practices. To contextualize these findings, we conduct a developer study, uncovering the process that app developers undergo when working with DSS. We highlight the challenges faced and strategies employed by developers for DSS submission, and the factors contributing to changes in the DSS. Our research contributes valuable insights into the complexities of implementing and maintaining privacy labels, underlining the need for better resources, tools, and guidelines to aid developers. This understanding is crucial as the accuracy and reliability of privacy labels directly impact their effectiveness.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
The Overview of Privacy Labels and their Compatibility with Privacy Policies
Authors:
Rishabh Khandelwal,
Asmit Nayak,
Paul Chung,
Kassem Fawaz
Abstract:
Privacy nutrition labels provide a way to understand an app's key data practices without reading the long and hard-to-read privacy policies. Recently, the app distribution platforms for iOS(Apple) and Android(Google) have implemented mandates requiring app developers to fill privacy nutrition labels highlighting their privacy practices such as data collection, data sharing, and security practices.…
▽ More
Privacy nutrition labels provide a way to understand an app's key data practices without reading the long and hard-to-read privacy policies. Recently, the app distribution platforms for iOS(Apple) and Android(Google) have implemented mandates requiring app developers to fill privacy nutrition labels highlighting their privacy practices such as data collection, data sharing, and security practices. These privacy labels contain very fine-grained information about the apps' data practices such as the data types and purposes associated with each data type. This provides us with a unique vantage point from which we can understand apps' data practices at scale.
△ Less
Submitted 24 April, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Supremum-norm a posteriori error control of quadratic discontinuous Galerkin methods for the obstacle problem
Authors:
Rohit Khandelwal,
Kamana Porwal,
Ritesh Singla
Abstract:
We perform a posteriori error analysis in the supremum norm for the quadratic discontinuous Galerkin method for the elliptic obstacle problem. We define two discrete sets (motivated by Gaddam, Gudi and Kamana [1]), one set having integral constraints and other one with the nodal constraints at the quadrature points, and discuss the pointwise reliability and efficiency of the proposed a posteriori…
▽ More
We perform a posteriori error analysis in the supremum norm for the quadratic discontinuous Galerkin method for the elliptic obstacle problem. We define two discrete sets (motivated by Gaddam, Gudi and Kamana [1]), one set having integral constraints and other one with the nodal constraints at the quadrature points, and discuss the pointwise reliability and efficiency of the proposed a posteriori error estimator. In the analysis, we employ a linear averaging function to transfer DG finite element space to standard conforming finite element space and exploit the sharp bounds on the Green's function of the Poisson's problem. Moreover, the upper and the lower barrier functions corresponding to continuous solution u are constructed by modifying the conforming part of the discrete solution uh appropriately. Finally, numerical experiments are presented to complement the theoretical results.
△ Less
Submitted 11 September, 2022;
originally announced September 2022.
-
Adaptive quadratic finite element method for the unilateral contact problem
Authors:
Rohit Khandelwal,
Kamana Porwal,
Tanvi Wadhawan
Abstract:
In this paper, we present and analyze a posteriori error estimates in the energy norm of a quadratic finite element method for the frictionless unilateral contact problem. The reliability and the efficiency of a posteriori error estimator is discussed. The suitable decomposition of the discrete space $\b{V^h}$ and a discrete space $\b{Q^h}$, where the discrete counterpart of the contact force dens…
▽ More
In this paper, we present and analyze a posteriori error estimates in the energy norm of a quadratic finite element method for the frictionless unilateral contact problem. The reliability and the efficiency of a posteriori error estimator is discussed. The suitable decomposition of the discrete space $\b{V^h}$ and a discrete space $\b{Q^h}$, where the discrete counterpart of the contact force density is defined, play crucial role in deriving a posteriori error estimates. Numerical results are presented exhibiting the reliability and the efficiency of the proposed error estimator.
△ Less
Submitted 11 September, 2022;
originally announced September 2022.
-
CookieEnforcer: Automated Cookie Notice Analysis and Enforcement
Authors:
Rishabh Khandelwal,
Asmit Nayak,
Hamza Harkous,
Kassem Fawaz
Abstract:
Online websites use cookie notices to elicit consent from the users, as required by recent privacy regulations like the GDPR and the CCPA. Prior work has shown that these notices use dark patterns to manipulate users into making website-friendly choices which put users' privacy at risk. In this work, we develop CookieEnforcer, a new system for automatically discovering cookie notices and deciding…
▽ More
Online websites use cookie notices to elicit consent from the users, as required by recent privacy regulations like the GDPR and the CCPA. Prior work has shown that these notices use dark patterns to manipulate users into making website-friendly choices which put users' privacy at risk. In this work, we develop CookieEnforcer, a new system for automatically discovering cookie notices and deciding on the options that result in disabling all non-essential cookies. In order to achieve this, we first build an automatic cookie notice detector that utilizes the rendering pattern of the HTML elements to identify the cookie notices. Next, CookieEnforcer analyzes the cookie notices and predicts the set of actions required to disable all unnecessary cookies. This is done by modeling the problem as a sequence-to-sequence task, where the input is a machine-readable cookie notice and the output is the set of clicks to make. We demonstrate the efficacy of CookieEnforcer via an end-to-end accuracy evaluation, showing that it can generate the required steps in 91% of the cases. Via a user study, we show that CookieEnforcer can significantly reduce the user effort. Finally, we use our system to perform several measurements on the top 5k websites from the Tranco list (as accessed from the US and the UK), drawing comparisons and observations at scale.
△ Less
Submitted 14 April, 2022; v1 submitted 8 April, 2022;
originally announced April 2022.
-
Constraints on the Diffuse Flux of Ultra-High Energy Neutrinos from Four Years of Askaryan Radio Array Data in Two Stations
Authors:
ARA Collaboration,
P. Allison,
S. Archambault,
J. J. Beatty,
M. Beheler-Amass,
D. Z. Besson,
M. Beydler,
C. C. Chen,
C. H. Chen,
P. Chen,
B. A. Clark,
W. Clay,
A. Connolly,
L. Cremonesi,
J. Davies,
S. de Kockere,
K. D. de Vries,
C. Deaconu,
M. Duvernois,
E. Friedman,
R. Gaior,
J. Hanson,
K. Hanson,
K. D. Hoffman,
B. Hokanson-Fasig
, et al. (49 additional authors not shown)
Abstract:
The Askaryan Radio Array (ARA) is an ultra-high energy (UHE, $>10^{17}$ eV) neutrino detector designed to observe neutrinos by searching for the radio waves emitted by the relativistic products of neutrino-nucleon interactions in Antarctic ice. In this paper, we present constraints on the diffuse flux of ultra-high energy neutrinos between $10^{16}-10^{21}$ eV resulting from a search for neutrinos…
▽ More
The Askaryan Radio Array (ARA) is an ultra-high energy (UHE, $>10^{17}$ eV) neutrino detector designed to observe neutrinos by searching for the radio waves emitted by the relativistic products of neutrino-nucleon interactions in Antarctic ice. In this paper, we present constraints on the diffuse flux of ultra-high energy neutrinos between $10^{16}-10^{21}$ eV resulting from a search for neutrinos in two complementary analyses, both analyzing four years of data (2013-2016) from the two deep stations (A2, A3) operating at that time. We place a 90 % CL upper limit on the diffuse all flavor neutrino flux at $10^{18}$ eV of $EF(E)=5.6\times10^{-16}$ $\textrm{cm}^{-2}$$\textrm{s}^{-1}$$\textrm{sr}^{-1}$. This analysis includes four times the exposure of the previous ARA result, and represents approximately 1/5 the exposure expected from operating ARA until the end of 2022.
△ Less
Submitted 20 July, 2020; v1 submitted 2 December, 2019;
originally announced December 2019.
-
Probe Of Sterile Neutrinos Using Astrophysical Neutrino Flavor
Authors:
Carlos A. Argüelles,
Kareem Farrag,
Teppei Katori,
Rishabh Khandelwal,
Shivesh Mandalia,
Jordi Salvado
Abstract:
In this paper, we study the effect of active-neutrino-sterile-neutrino mixing in the expected high-energy astrophysical neutrino flavor content. Non-unitarity in the measurement of the three active neutrinos can be due to the existence of sterile neutrino states. We introduce the concept of the four-flavor tetrahedron in order to visualize the lack of unitarity in the astrophysical neutrino three-…
▽ More
In this paper, we study the effect of active-neutrino-sterile-neutrino mixing in the expected high-energy astrophysical neutrino flavor content. Non-unitarity in the measurement of the three active neutrinos can be due to the existence of sterile neutrino states. We introduce the concept of the four-flavor tetrahedron in order to visualize the lack of unitarity in the astrophysical neutrino three-flavor triangle. We demonstrate that active-sterile neutrino mixings modify the allowed region of the astrophysical flavor ratio from the standard case. However, a projection of the four-flavor tetrahedron has restrictions of phase space similar to the three-flavor triangle. On the other hand, the initial presence of astrophysical sterile neutrinos drastically changes the scenario, and it allows an apparent unitarity violation in the three-flavor triangle space. Using current global fit constraints including the non-unitarity case, we also illustrate the allowed astrophysical neutrino flavor ratios. Thus, the measurement of the high-energy astrophyscal neutrino flavor content allows us to explore sterile neutrinos independently of the sterile neutrino mass scale. These are topics of investigation for current and future neutrino telescopes.
△ Less
Submitted 12 February, 2020; v1 submitted 11 September, 2019;
originally announced September 2019.
-
Long-baseline horizontal radio-frequency transmission through polar ice
Authors:
P. Allison,
S. Archambault,
J. J. Beatty,
D. Z. Besson,
C. C. Chen,
C. H. Chen,
P. Chen,
A. Christenson,
B. A. Clark,
W. Clay,
A. Connolly,
L. Cremonesi,
C. Deaconu,
M. Duvernois,
L. Friedman,
R. Gaior,
J. Hanson,
K. Hanson,
J. Haugen,
K. D. Hoffman,
E. Hong,
S. Y. Hsu,
L. Hu,
J. J. Huang,
A. M. -H. Huang
, et al. (41 additional authors not shown)
Abstract:
We report on analysis of englacial radio-frequency (RF) pulser data received over horizontal baselines of 1--5 km, based on broadcasts from two sets of transmitters deployed to depths of up to 1500 meters at the South Pole. First, we analyze data collected usingtwo RF bicone transmitters 1400 meters below the ice surface, and frozen into boreholes drilled for the IceCube experiment in 2011. Additi…
▽ More
We report on analysis of englacial radio-frequency (RF) pulser data received over horizontal baselines of 1--5 km, based on broadcasts from two sets of transmitters deployed to depths of up to 1500 meters at the South Pole. First, we analyze data collected usingtwo RF bicone transmitters 1400 meters below the ice surface, and frozen into boreholes drilled for the IceCube experiment in 2011. Additionally, in Dec., 2018, a fat-dipole antenna, fed by one of three high-voltage (~1 kV), fast (~(1-5 ns)) signal generators was lowered into the 1700-m deep icehole drilled for the South Pole Ice Core Experiment (SPICE), approximately 3 km from the geographic South Pole. Signals from transmitters were recorded on the five englacial multi-receiver ARA stations, with receiver depths between 60--200 m. We confirm the long, >1 km RF electric field attenuation length, test our observed signal arrival timing distributions against models, and measure birefringent asymmetries at the 0.15% level.
△ Less
Submitted 19 January, 2021; v1 submitted 28 August, 2019;
originally announced August 2019.
-
Recent Results from The Askaryan Radio Array
Authors:
ARA Collaboration,
P. Allison,
S. Archambault,
R. Bard,
J. J. Beatty,
M. Beheler-Amass,
D. Z. Besson,
M. Beydler,
C. -C. Chen,
C. -H. Chen,
P. Chen,
B. Clark,
A. Clough,
A. Connolly,
J. Davies,
C. Deaconu,
M. A. DuVernois,
C. Fender,
E. Friedman,
J. Hanson,
K. Hanson,
J. Haugen,
K. D. Hoffman,
E. Hong,
S. -Y. Hsu
, et al. (39 additional authors not shown)
Abstract:
The Askaryan Radio Array (ARA) is an ultra-high energy (UHE) neutrino telescope at the South Pole consisting of an array of radio antennas aimed at detecting the Askaryan radiation produced by neutrino interactions in the ice. Currently, the experiment has five stations in operation that have been deployed in stages since 2012. This contribution focuses on the development of a search for a diffuse…
▽ More
The Askaryan Radio Array (ARA) is an ultra-high energy (UHE) neutrino telescope at the South Pole consisting of an array of radio antennas aimed at detecting the Askaryan radiation produced by neutrino interactions in the ice. Currently, the experiment has five stations in operation that have been deployed in stages since 2012. This contribution focuses on the development of a search for a diffuse flux of neutrinos in two ARA stations (A2 and A3) from 2013-2016. A background of $\sim 0.01-0.02$ events is expected in one station in each of two search channels in horizontal- and vertical-polarizations. The expected new constraints on the flux of ultra-high energy neutrinos based on four years of analysis with two stations improve on the previous limits set by ARA by a factor of about two. The projected sensitivity of ARA's five-station dataset is beginning to be competitive with other neutrino telescopes at high energies near $10^{10.5}\,$GeV.
△ Less
Submitted 24 July, 2019;
originally announced July 2019.
-
The Privacy Policy Landscape After the GDPR
Authors:
Thomas Linden,
Rishabh Khandelwal,
Hamza Harkous,
Kassem Fawaz
Abstract:
The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online. We conduct the first longitudinal, in-depth, and at-scale assessment of privacy policies before and after the GDPR. We gauge the complete consumption cycle of these policie…
▽ More
The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online. We conduct the first longitudinal, in-depth, and at-scale assessment of privacy policies before and after the GDPR. We gauge the complete consumption cycle of these policies, from the first user impressions until the compliance assessment. We create a diverse corpus of two sets of 6,278 unique English-language privacy policies from inside and outside the EU, covering their pre-GDPR and the post-GDPR versions. The results of our tests and analyses suggest that the GDPR has been a catalyst for a major overhaul of the privacy policies inside and outside the EU. This overhaul of the policies, manifesting in extensive textual changes, especially for the EU-based websites, comes at mixed benefits to the users. While the privacy policies have become considerably longer, our user study with 470 participants on Amazon MTurk indicates a significant improvement in the visual representation of privacy policies from the users' perspective for the EU websites. We further develop a new workflow for the automated assessment of requirements in privacy policies. Using this workflow, we show that privacy policies cover more data practices and are more consistent with seven compliance requirements post the GDPR. We also assess how transparent the organizations are with their privacy practices by performing specificity analysis. In this analysis, we find evidence for positive changes triggered by the GDPR, with the specificity level improving on average. Still, we find the landscape of privacy policies to be in a transitional phase; many policies still do not meet several key GDPR requirements or their improved coverage comes with reduced specificity.
△ Less
Submitted 24 June, 2019; v1 submitted 22 September, 2018;
originally announced September 2018.
-
Design and Performance of an Interferometric Trigger Array for Radio Detection of High-Energy Neutrinos
Authors:
P. Allison,
S. Archambault,
R. Bard,
J. J. Beatty,
M. Beheler-Amass,
D. Z. Besson,
M. Beydler,
M. Bogdan,
C. -C. Chen,
C. -H. Chen,
P. Chen,
B. A. Clark,
A. Clough,
A. Connolly,
L. Cremonesi,
J. Davies,
C. Deaconu,
M. A. DuVernois,
E. Friedman,
J. Hanson,
K. Hanson,
J. Haugen,
K. D. Hoffman,
B. Hokanson-Fasig,
E. Hong
, et al. (47 additional authors not shown)
Abstract:
Ultra-high energy neutrinos are detectable through impulsive radio signals generated through interactions in dense media, such as ice. Subsurface in-ice radio arrays are a promising way to advance the observation and measurement of astrophysical high-energy neutrinos with energies above those discovered by the IceCube detector ($\geq$1 PeV) as well as cosmogenic neutrinos created in the GZK proces…
▽ More
Ultra-high energy neutrinos are detectable through impulsive radio signals generated through interactions in dense media, such as ice. Subsurface in-ice radio arrays are a promising way to advance the observation and measurement of astrophysical high-energy neutrinos with energies above those discovered by the IceCube detector ($\geq$1 PeV) as well as cosmogenic neutrinos created in the GZK process ($\geq$100 PeV). Here we describe the $\textit{NuPhase}$ detector, which is a compact receiving array of low-gain antennas deployed 185 m deep in glacial ice near the South Pole. Signals from the antennas are digitized and coherently summed into multiple beams to form a low-threshold interferometric phased array trigger for radio impulses. The NuPhase detector was installed at an Askaryan Radio Array (ARA) station during the 2017/18 Austral summer season. $\textit{In situ}$ measurements with an impulsive, point-source calibration instrument show a 50% trigger efficiency on impulses with voltage signal-to-noise ratios (SNR) of $\le$2.0, a factor of $\sim$1.8 improvement in SNR over the standard ARA combinatoric trigger. Hardware-level simulations, validated with $\textit{in situ}$ measurements, predict a trigger threshold of an SNR as low as 1.6 for neutrino interactions that are in the far field of the array. With the already-achieved NuPhase trigger performance included in ARASim, a detector simulation for the ARA experiment, we find the trigger-level effective detector volume is increased by a factor of 1.8 at neutrino energies between 10 and 100 PeV compared to the currently used ARA combinatoric trigger. We also discuss an achievable near term path toward lowering the trigger threshold further to an SNR of 1.0, which would increase the effective single-station volume by more than a factor of 3 in the same range of neutrino energies.
△ Less
Submitted 21 October, 2018; v1 submitted 12 September, 2018;
originally announced September 2018.
-
Observation of Reconstructable Radio Emission Coincident with an X-Class Solar Flare in the Askaryan Radio Array Prototype Station
Authors:
P. Allison,
S. Archambault,
J. Auffenberg,
R. Bard,
J. J. Beatty,
M. Beheler-Amass,
D. Z. Besson,
M. Beydler,
C. Bora,
C. -C. Chen,
C. -H. Chen,
P. Chen,
B. A. Clark,
A. Clough,
A. Connolly,
J. Davies,
C. Deaconu,
M. A. DuVernois,
E. Friedman,
B. Fox,
P. W. Gorham,
J. Hanson,
K. Hanson,
J. Haugen,
B. Hill
, et al. (52 additional authors not shown)
Abstract:
The Askaryan Radio Array (ARA) reports an observation of radio emission coincident with the "Valentine's Day" solar flare on Feb. 15$^{\rm{th}}$, 2011 in the prototype "Testbed" station. We find $\sim2000$ events that passed our neutrino search criteria during the 70 minute period of the flare, all of which reconstruct to the location of the sun. A signal analysis of the events reveals them to be…
▽ More
The Askaryan Radio Array (ARA) reports an observation of radio emission coincident with the "Valentine's Day" solar flare on Feb. 15$^{\rm{th}}$, 2011 in the prototype "Testbed" station. We find $\sim2000$ events that passed our neutrino search criteria during the 70 minute period of the flare, all of which reconstruct to the location of the sun. A signal analysis of the events reveals them to be consistent with that of bright thermal noise correlated across antennas. This is the first natural source of radio emission reported by ARA that is tightly reconstructable on an event-by-event basis. The observation is also the first for ARA to point radio from individual events to an extraterrestrial source on the sky. We comment on how the solar flares, coupled with improved systematic uncertainties in reconstruction algorithms, could aid in a map** of any above-ice radio emission, such as that from cosmic-ray air showers, to astronomical locations on the sky.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
Measurement of the real dielectric permittivity epsilon_r of glacial ice
Authors:
P. Allison,
S. Archambault,
J. Auffenberg,
R. Bard,
J. J. Beatty,
M. Beheler-Amass,
D. Z. Besson,
M. Beydler,
C. Brabec,
C. -C. Chen,
C. -H. Chen,
P. Chen,
A. Christenson,
B. A. Clark,
A. Connolly,
L. Cremonesi,
C. Deaconu,
M. Duvernois,
L. Friedman,
R. Gaior,
P. W. Gorham,
J. Hanson,
K. Hanson,
J. Haugen,
K. D. Hoffman
, et al. (44 additional authors not shown)
Abstract:
Using data collected by the Askaryan Radio Array (ARA) experiment at the South Pole, we have used long-baseline propagation of radio-frequency signals to extract information on the radio-frequency index-of-refraction in South Polar ice. Owing to the increasing ice density over the upper 150--200 meters, rays are observed along two, nearly parallel paths, one of which is direct and a second which r…
▽ More
Using data collected by the Askaryan Radio Array (ARA) experiment at the South Pole, we have used long-baseline propagation of radio-frequency signals to extract information on the radio-frequency index-of-refraction in South Polar ice. Owing to the increasing ice density over the upper 150--200 meters, rays are observed along two, nearly parallel paths, one of which is direct and a second which refracts through an inflection point, with differences in both arrival time and arrival angle that can be used to constrain the neutrino properties. We also observe indications, for the first time, of radio-frequency ice birefringence for signals propagating along predominantly horizontal trajectories, corresponding to an asymmetry of order 0.1% between the ordinary and extra-ordinary paths, numerically compatible with previous measurements of birefringent asymmetries for vertically-propagating radio-frequency signals at South Pole. Taken together, these effects offer the possibility of redundantly measuring the range from receiver to a neutrino interaction in Antarctic ice, if receiver antennas are deployed at shallow (25 m<z<100 m) depths. Such range information is essential in determining both the neutrino energy, as well as the incident neutrino direction.
△ Less
Submitted 14 January, 2019; v1 submitted 8 December, 2017;
originally announced December 2017.
-
Smart Radio Spectrum Management for Cognitive Radio
Authors:
Partha Pratim Bhattacharya,
Ronak Khandelwal,
Rishita Gera,
Anjali Agarwal
Abstract:
Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception par…
▽ More
Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. In this work, a fuzzy logic based system for spectrum management is proposed where the radio can share unused spectrum depending on some parameters like distance, signal strength, node velocity and availability of unused spectrum. The system is simulated and is found to give satisfactory results.
△ Less
Submitted 5 August, 2011;
originally announced September 2011.