-
Workflow Mini-Apps: Portable, Scalable, Tunable & Faithful Representations of Scientific Workflows
Authors:
Ozgur Ozan Kilic,
Tianle Wang,
Matteo Turilli,
Mikhail Titov,
Andre Merzky,
Line Pouchard,
Shantenu Jha
Abstract:
Workflows are critical for scientific discovery. However, the sophistication, heterogeneity, and scale of workflows make building, testing, and optimizing them increasingly challenging. Furthermore, their complexity and heterogeneity make performance reproducibility hard. In this paper, we propose workflow mini-apps as a tool to address the challenges in building and testing workflows while contro…
▽ More
Workflows are critical for scientific discovery. However, the sophistication, heterogeneity, and scale of workflows make building, testing, and optimizing them increasingly challenging. Furthermore, their complexity and heterogeneity make performance reproducibility hard. In this paper, we propose workflow mini-apps as a tool to address the challenges in building and testing workflows while controlling the fidelity of representing realworld workflows. Workflow mini-apps are deployed and run on various HPC systems and architectures without workflow-specific constraints. We offer insight into their design and implementation, providing an analysis of their performance and reproducibility. Workflow mini-apps thus advance the science of workflows by providing simple, portable, and managed (fidelity) representations of otherwise complex and difficult-to-control real workflows.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Design and Implementation of an Analysis Pipeline for Heterogeneous Data
Authors:
Arup Kumar Sarker,
Aymen Alsaadi,
Niranda Perera,
Mills Staylor,
Gregor von Laszewski,
Matteo Turilli,
Ozgur Ozan Kilic,
Mikhail Titov,
Andre Merzky,
Shantenu Jha,
Geoffrey Fox
Abstract:
Managing and preparing complex data for deep learning, a prevalent approach in large-scale data science can be challenging. Data transfer for model training also presents difficulties, impacting scientific fields like genomics, climate modeling, and astronomy. A large-scale solution like Google Pathways with a distributed execution environment for deep learning models exists but is proprietary. In…
▽ More
Managing and preparing complex data for deep learning, a prevalent approach in large-scale data science can be challenging. Data transfer for model training also presents difficulties, impacting scientific fields like genomics, climate modeling, and astronomy. A large-scale solution like Google Pathways with a distributed execution environment for deep learning models exists but is proprietary. Integrating existing open-source, scalable runtime tools and data frameworks on high-performance computing (HPC) platforms is crucial to address these challenges. Our objective is to establish a smooth and unified method of combining data engineering and deep learning frameworks with diverse execution capabilities that can be deployed on various high-performance computing platforms, including cloud and supercomputers. We aim to support heterogeneous systems with accelerators, where Cylon and other data engineering and deep learning frameworks can utilize heterogeneous execution. To achieve this, we propose Radical-Cylon, a heterogeneous runtime system with a parallel and distributed data framework to execute Cylon as a task of Radical Pilot. We thoroughly explain Radical-Cylon's design and development and the execution process of Cylon tasks using Radical Pilot. This approach enables the use of heterogeneous MPI-communicators across multiple nodes. Radical-Cylon achieves better performance than Bare-Metal Cylon with minimal and constant overhead. Radical-Cylon achieves (4~15)% faster execution time than batch execution while performing similar join and sort operations with 35 million and 3.5 billion rows with the same resources. The approach aims to excel in both scientific and engineering research HPC systems while demonstrating robust performance on cloud infrastructures. This dual capability fosters collaboration and innovation within the open-source scientific research community.
△ Less
Submitted 7 April, 2024; v1 submitted 23 March, 2024;
originally announced March 2024.
-
Sleep Quality Prediction from Wearables using Convolution Neural Networks and Ensemble Learning
Authors:
Ozan Kılıç,
Berrenur Saylam,
Özlem Durmaz İncel
Abstract:
Sleep is among the most important factors affecting one's daily performance, well-being, and life quality. Nevertheless, it became possible to measure it in daily life in an unobtrusive manner with wearable devices. Rather than camera recordings and extraction of the state from the images, wrist-worn devices can measure directly via accelerometer, heart rate, and heart rate variability sensors. So…
▽ More
Sleep is among the most important factors affecting one's daily performance, well-being, and life quality. Nevertheless, it became possible to measure it in daily life in an unobtrusive manner with wearable devices. Rather than camera recordings and extraction of the state from the images, wrist-worn devices can measure directly via accelerometer, heart rate, and heart rate variability sensors. Some measured features can be as follows: time to bed, time out of bed, bedtime duration, minutes to fall asleep, and minutes after wake-up. There are several studies in the literature regarding sleep quality and stage prediction. However, they use only wearable data to predict or focus on the sleep stage. In this study, we use the NetHealth dataset, which is collected from 698 college students' via wearables, as well as surveys. Recently, there has been an advancement in deep learning algorithms, and they generally perform better than conventional machine learning techniques. Among them, Convolutional Neural Networks (CNN) have high performances. Thus, in this study, we apply different CNN architectures that have already performed well in the human activity recognition domain and compare their results. We also apply Random Forest (RF) since it performs best among the conventional methods. In future studies, we will compare them with other deep learning algorithms.
△ Less
Submitted 8 March, 2023;
originally announced March 2023.
-
MAEVI: Motion Aware Event-Based Video Frame Interpolation
Authors:
Ahmet Akman,
Onur Selim Kılıç,
A. Aydın Alatan
Abstract:
Utilization of event-based cameras is expected to improve the visual quality of video frame interpolation solutions. We introduce a learning-based method to exploit moving region boundaries in a video sequence to increase the overall interpolation quality.Event cameras allow us to determine moving areas precisely; and hence, better video frame interpolation quality can be achieved by emphasizing t…
▽ More
Utilization of event-based cameras is expected to improve the visual quality of video frame interpolation solutions. We introduce a learning-based method to exploit moving region boundaries in a video sequence to increase the overall interpolation quality.Event cameras allow us to determine moving areas precisely; and hence, better video frame interpolation quality can be achieved by emphasizing these regions using an appropriate loss function. The results show a notable average \textit{PSNR} improvement of $1.3$ dB for the tested data sets, as well as subjectively more pleasing visual results with less ghosting and blurry artifacts.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
E-VFIA : Event-Based Video Frame Interpolation with Attention
Authors:
Onur Selim Kılıç,
Ahmet Akman,
A. Aydın Alatan
Abstract:
Video frame interpolation (VFI) is a fundamental vision task that aims to synthesize several frames between two consecutive original video images. Most algorithms aim to accomplish VFI by using only keyframes, which is an ill-posed problem since the keyframes usually do not yield any accurate precision about the trajectories of the objects in the scene. On the other hand, event-based cameras provi…
▽ More
Video frame interpolation (VFI) is a fundamental vision task that aims to synthesize several frames between two consecutive original video images. Most algorithms aim to accomplish VFI by using only keyframes, which is an ill-posed problem since the keyframes usually do not yield any accurate precision about the trajectories of the objects in the scene. On the other hand, event-based cameras provide more precise information between the keyframes of a video. Some recent state-of-the-art event-based methods approach this problem by utilizing event data for better optical flow estimation to interpolate for video frame by war**. Nonetheless, those methods heavily suffer from the ghosting effect. On the other hand, some of kernel-based VFI methods that only use frames as input, have shown that deformable convolutions, when backed up with transformers, can be a reliable way of dealing with long-range dependencies. We propose event-based video frame interpolation with attention (E-VFIA), as a lightweight kernel-based method. E-VFIA fuses event information with standard video frames by deformable convolutions to generate high quality interpolated frames. The proposed method represents events with high temporal resolution and uses a multi-head self-attention mechanism to better encode event-based information, while being less vulnerable to blurring and ghosting artifacts; thus, generating crispier frames. The simulation results show that the proposed technique outperforms current state-of-the-art methods (both frame and event-based) with a significantly smaller model size.
△ Less
Submitted 1 March, 2023; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Asynchronous Execution of Heterogeneous Tasks in ML-driven HPC Workflows
Authors:
Vincent R. Pascuzzi,
Ozgur O. Kilic,
Matteo Turilli,
Shantenu Jha
Abstract:
Heterogeneous scientific workflows consist of numerous types of tasks that require executing on heterogeneous resources. Asynchronous execution of those tasks is crucial to improve resource utilization, task throughput and reduce workflows' makespan. Therefore, middleware capable of scheduling and executing different task types across heterogeneous resources must enable asynchronous execution of t…
▽ More
Heterogeneous scientific workflows consist of numerous types of tasks that require executing on heterogeneous resources. Asynchronous execution of those tasks is crucial to improve resource utilization, task throughput and reduce workflows' makespan. Therefore, middleware capable of scheduling and executing different task types across heterogeneous resources must enable asynchronous execution of tasks. In this paper, we investigate the requirements and properties of the asynchronous task execution of machine learning (ML)-driven high performance computing (HPC) workflows. We model the degree of asynchronicity permitted for arbitrary workflows and propose key metrics that can be used to determine qualitative benefits when employing asynchronous execution. Our experiments represent relevant scientific drivers, we perform them at scale on Summit, and we show that the performance enhancements due to asynchronous execution are consistent with our model.
△ Less
Submitted 27 June, 2023; v1 submitted 23 August, 2022;
originally announced August 2022.
-
WAKU-RLN-RELAY: Privacy-Preserving Peer-to-Peer Economic Spam Protection
Authors:
Sanaz Taheri-Boshrooyeh,
Oskar Thorén,
Barry Whitehat,
Wei Jie Koh,
Onur Kilic,
Kobi Gurkan
Abstract:
In this paper, we propose WAKU-RLN-RELAY as a spam-protected gossip-based routing protocol that can run in heterogeneous networks. It features a privacy-preserving peer-to-peer (p2p) economic spam protection mechanism. WAKU-RLN-RELAY addresses the performance and privacy issues of the state-of-the-art p2p spam prevention techniques including peer scoring utilized by libp2p, and proof-of-work used…
▽ More
In this paper, we propose WAKU-RLN-RELAY as a spam-protected gossip-based routing protocol that can run in heterogeneous networks. It features a privacy-preserving peer-to-peer (p2p) economic spam protection mechanism. WAKU-RLN-RELAY addresses the performance and privacy issues of the state-of-the-art p2p spam prevention techniques including peer scoring utilized by libp2p, and proof-of-work used by e.g., Whisper, the p2p messaging layer of Ethereum. In WAKU-RLN-RELAY, spam protection works by limiting the messaging rate of each network participant. Rate violation is disincentivized since it results in financial punishment where the punishment is cryptographically guaranteed. Peers who identify spammers are also rewarded. To enforce the rate limit, we adopt the suggested framework of Semaphore and its extended version, however, we modify that framework to properly address the unique requirements of a network of p2p resource-restricted users. The current work dives into the end-to-end integration of Semaphore into WAKU-RLN-RELAY, the modifications required to make it suitable for resource-limited users, and the open problems and future research directions. We also provide a proof-of-concept open-source implementation of WAKU-RLN-RELAY, and its specifications together with a rough performance evaluation.
△ Less
Submitted 30 June, 2022;
originally announced July 2022.
-
Privacy-Preserving Spam-Protected Gossip-Based Routing
Authors:
Sanaz Taheri-Boshrooyeh,
Oskar Thorén,
Barry Whitehat,
Wei Jie Koh,
Onur Kilic,
Kobi Gurkan
Abstract:
WAKU-RLN-RELAY is an anonymous peer-to-peer gossip-based routing protocol that features a privacy-preserving spam-protection with cryptographically guaranteed economic incentives. While being an anonymous routing protocol where routed messages are not attributable to their origin, it allows global identification and removal of spammers. It addresses the performance and privacy issues of its counte…
▽ More
WAKU-RLN-RELAY is an anonymous peer-to-peer gossip-based routing protocol that features a privacy-preserving spam-protection with cryptographically guaranteed economic incentives. While being an anonymous routing protocol where routed messages are not attributable to their origin, it allows global identification and removal of spammers. It addresses the performance and privacy issues of its counterparts including proof-of-work and reputation-based schemes. Its light computational overhead makes it suitable for resource-limited environments. The spam protection works by limiting the messaging rate of each network participant where rate violation results in financial punishment. We deploy the novel construct of rate-limiting nullifier to enforce the message rate limit. We provide a proof-of-concept implementation of WAKU-RLN-RELAY to prove the efficiency and feasibility of our solution.
△ Less
Submitted 30 June, 2022;
originally announced July 2022.
-
Neurosymbolic Systems of Perception & Cognition: The Role of Attention
Authors:
Hugo Latapie,
Ozkan Kilic,
Kristinn R. Thorisson,
Pei Wang,
Patrick Hammer
Abstract:
A cognitive architecture aimed at cumulative learning must provide the necessary information and control structures to allow agents to learn incrementally and autonomously from their experience. This involves managing an agent's goals as well as continuously relating sensory information to these in its perception-cognition information stack. The more varied the environment of a learning agent is,…
▽ More
A cognitive architecture aimed at cumulative learning must provide the necessary information and control structures to allow agents to learn incrementally and autonomously from their experience. This involves managing an agent's goals as well as continuously relating sensory information to these in its perception-cognition information stack. The more varied the environment of a learning agent is, the more general and flexible must be these mechanisms to handle a wider variety of relevant patterns, tasks, and goal structures. While many researchers agree that information at different levels of abstraction likely differs in its makeup and structure and processing mechanisms, agreement on the particulars of such differences is not generally shared in the research community. A binary processing architecture (often referred to as System-1 and System-2) has been proposed as a model of cognitive processing for low- and high-level information, respectively. We posit that cognition is not binary in this way and that knowledge at any level of abstraction involves what we refer to as neurosymbolic information, meaning that data at both high and low levels must contain both symbolic and subsymbolic information. Further, we argue that the main differentiating factor between the processing of high and low levels of data abstraction can be largely attributed to the nature of the involved attention mechanisms. We describe the key arguments behind this view and review relevant evidence from the literature.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
A Metamodel and Framework for Artificial General Intelligence From Theory to Practice
Authors:
Hugo Latapie,
Ozkan Kilic,
Gaowen Liu,
Yan Yan,
Ramana Kompella,
Pei Wang,
Kristinn R. Thorisson,
Adam Lawrence,
Yuhong Sun,
Jayanth Srinivasa
Abstract:
This paper introduces a new metamodel-based knowledge representation that significantly improves autonomous learning and adaptation. While interest in hybrid machine learning / symbolic AI systems leveraging, for example, reasoning and knowledge graphs, is gaining popularity, we find there remains a need for both a clear definition of knowledge and a metamodel to guide the creation and manipulatio…
▽ More
This paper introduces a new metamodel-based knowledge representation that significantly improves autonomous learning and adaptation. While interest in hybrid machine learning / symbolic AI systems leveraging, for example, reasoning and knowledge graphs, is gaining popularity, we find there remains a need for both a clear definition of knowledge and a metamodel to guide the creation and manipulation of knowledge. Some of the benefits of the metamodel we introduce in this paper include a solution to the symbol grounding problem, cumulative learning, and federated learning. We have applied the metamodel to problems ranging from time series analysis, computer vision, and natural language understanding and have found that the metamodel enables a wide variety of learning mechanisms ranging from machine learning, to graph network analysis and learning by reasoning engines to interoperate in a highly synergistic way. Our metamodel-based projects have consistently exhibited unprecedented accuracy, performance, and ability to generalize. This paper is inspired by the state-of-the-art approaches to AGI, recent AGI-aspiring work, the granular computing community, as well as Alfred Korzybski's general semantics. One surprising consequence of the metamodel is that it not only enables a new level of autonomous learning and optimal functioning for machine intelligences, but may also shed light on a path to better understanding how to improve human cognition.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
A Metamodel and Framework for AGI
Authors:
Hugo Latapie,
Ozkan Kilic
Abstract:
Can artificial intelligence systems exhibit superhuman performance, but in critical ways, lack the intelligence of even a single-celled organism? The answer is clearly 'yes' for narrow AI systems. Animals, plants, and even single-celled organisms learn to reliably avoid danger and move towards food. This is accomplished via a physical knowledge preserving metamodel that autonomously generates usef…
▽ More
Can artificial intelligence systems exhibit superhuman performance, but in critical ways, lack the intelligence of even a single-celled organism? The answer is clearly 'yes' for narrow AI systems. Animals, plants, and even single-celled organisms learn to reliably avoid danger and move towards food. This is accomplished via a physical knowledge preserving metamodel that autonomously generates useful models of the world. We posit that preserving the structure of knowledge is critical for higher intelligences that manage increasingly higher levels of abstraction, be they human or artificial. This is the key lesson learned from applying AGI subsystems to complex real-world problems that require continuous learning and adaptation. In this paper, we introduce the Deep Fusion Reasoning Engine (DFRE), which implements a knowledge-preserving metamodel and framework for constructing applied AGI systems. The DFRE metamodel exhibits some important fundamental knowledge preserving properties such as clear distinctions between symmetric and antisymmetric relations, and the ability to create a hierarchical knowledge representation that clearly delineates between levels of abstraction. The DFRE metamodel, which incorporates these capabilities, demonstrates how this approach benefits AGI in specific ways such as managing combinatorial explosion and enabling cumulative, distributed and federated learning. Our experiments show that the proposed framework achieves 94% accuracy on average on unsupervised object detection and recognition. This work is inspired by the state-of-the-art approaches to AGI, recent AGI-aspiring work, the granular computing community, as well as Alfred Korzybski's general semantics.
△ Less
Submitted 6 September, 2020; v1 submitted 28 August, 2020;
originally announced August 2020.
-
A recursion-free functional approximation for the dynamic inventory problem
Authors:
Onur A. Kilic,
S. Armagan Tarim
Abstract:
We consider the dynamic inventory problem with non-stationary demands. It has long been known that non-stationary (s, S) policies are optimal for this problem. However, finding optimal policy parameters remains a computational challenge as it requires solving a large-scale stochastic dynamic program. To address this, we devise a recursion-free approximation for the optimal cost function of the pro…
▽ More
We consider the dynamic inventory problem with non-stationary demands. It has long been known that non-stationary (s, S) policies are optimal for this problem. However, finding optimal policy parameters remains a computational challenge as it requires solving a large-scale stochastic dynamic program. To address this, we devise a recursion-free approximation for the optimal cost function of the problem. This enables us to compute policy parameters heuristically, without resorting to a stochastic dynamic program. The heuristic is easy-to-understand and -use since it follows by elementary methods of convex minimization and shortest paths, yet it is very effective and outperforms earlier heuristics.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Near-Optimal Distributed Estimation for a Network of Sensing Units Operating Under Communication Constraints
Authors:
Abolfazl Hashemi,
Osman Fatih Kilic,
Haris Vikalo
Abstract:
We study the problem of distributed state estimation in a network of sensing units that can exchange their measurements but the rate of communication between the units is constrained. The units collect noisy, possibly only partial observations of the unknown state; they are assisted by a relay center which can communicate at a higher rate and schedules the exchange of measurements between the unit…
▽ More
We study the problem of distributed state estimation in a network of sensing units that can exchange their measurements but the rate of communication between the units is constrained. The units collect noisy, possibly only partial observations of the unknown state; they are assisted by a relay center which can communicate at a higher rate and schedules the exchange of measurements between the units. We consider the task of minimizing the total mean-square estimation error of the network while promoting balance between the individual units' performances. This problem is formulated as the maximization of a monotone objective function subject to a cardinality constraint. By leveraging the notion of weak submodularity, we develop an efficient greedy algorithm for the proposed formulation and show that the greedy algorithm achieves a constant factor approximation of the optimal objective. Our extensive simulation studies illustrate the efficacy of the proposed formulation and the greedy algorithm.
△ Less
Submitted 19 July, 2018;
originally announced July 2018.
-
A comparison of non-stationary stochastic lot-sizing strategies
Authors:
Gozdem Dural-Selcuk,
Onur A. Kilic,
S. Armagan Tarim,
Roberto Rossi
Abstract:
We consider the non-stationary stochastic lot sizing problem with backorder costs and make a cost comparison among different lot-sizing strategies. We initially provide an overview of the strategies and some corresponding solution approaches in the literature. We then compare the cost performances of the lot-sizing strategies on a common test bed while taking into account the added value of realiz…
▽ More
We consider the non-stationary stochastic lot sizing problem with backorder costs and make a cost comparison among different lot-sizing strategies. We initially provide an overview of the strategies and some corresponding solution approaches in the literature. We then compare the cost performances of the lot-sizing strategies on a common test bed while taking into account the added value of realized demand information. The results of this numerical experience enable us to derive novel insights about the cost performance of different stochastic lot-sizing strategies under re-planning with respect to demand realization.
△ Less
Submitted 29 July, 2016;
originally announced July 2016.
-
A unified modeling approach for the static-dynamic uncertainty strategy in stochastic lot-sizing
Authors:
Roberto Rossi,
Onur A. Kilic,
S. Armagan Tarim
Abstract:
In this paper, we develop mixed integer linear programming models to compute near-optimal policy parameters for the non-stationary stochastic lot sizing problem under Bookbinder and Tan's static-dynamic uncertainty strategy. Our models build on piecewise linear upper and lower bounds of the first order loss function. We discuss different formulations of the stochastic lot sizing problem, in which…
▽ More
In this paper, we develop mixed integer linear programming models to compute near-optimal policy parameters for the non-stationary stochastic lot sizing problem under Bookbinder and Tan's static-dynamic uncertainty strategy. Our models build on piecewise linear upper and lower bounds of the first order loss function. We discuss different formulations of the stochastic lot sizing problem, in which the quality of service is captured by means of backorder penalty costs, non-stockout probability, or fill rate constraints. These models can be easily adapted to operate in settings in which unmet demand is backordered or lost. The proposed approach has a number of advantages with respect to existing methods in the literature: it enables seamless modelling of different variants of the above problem, which have been previously tackled via ad-hoc solution methods; and it produces an accurate estimation of the expected total cost, expressed in terms of upper and lower bounds. Our computational study demonstrates the effectiveness and flexibility of our models.
△ Less
Submitted 4 February, 2014; v1 submitted 23 July, 2013;
originally announced July 2013.
-
A note on Tempelmeier's β-service measure under non-stationary stochastic demand
Authors:
Roberto Rossi,
S. Armagan Tarim,
Onur A. Kilic
Abstract:
Tempelmeier (2007) considers the problem of computing replenishment cycle policy parameters under non-stationary stochastic demand and service level constraints. He analyses two possible service level measures: the minimum no stock-out probability per period (α-service level) and the so called "fill rate", that is the fraction of demand satisfied immediately from stock on hand (β-service level). F…
▽ More
Tempelmeier (2007) considers the problem of computing replenishment cycle policy parameters under non-stationary stochastic demand and service level constraints. He analyses two possible service level measures: the minimum no stock-out probability per period (α-service level) and the so called "fill rate", that is the fraction of demand satisfied immediately from stock on hand (β-service level). For each of these possible measures, he presents a mixed integer programming (MIP) model to determine the optimal replenishment cycles and corresponding order-up-to levels minimizing the expected total setup and holding costs. His approach is essentially based on imposing service level dependent lower bounds on cycle order-up-to levels. In this note, we argue that Tempelmeier's strategy, in the β-service level case, while being an interesting option for practitioners, does not comply with the standard definition of "fill rate". By means of a simple numerical example we demonstrate that, as a consequence, his formulation might yield sub-optimal policies.
△ Less
Submitted 18 April, 2011; v1 submitted 7 March, 2011;
originally announced March 2011.
-
Miniature photonic-crystal hydrophone optimized for ocean acoustics
Authors:
Onur Kilic,
Michel J. F. Digonnet,
Gordon S. Kino,
Olav Solgaard
Abstract:
This work reports on an optical hydrophone that is insensitive to hydrostatic pressure, yet capable of measuring acoustic pressures as low as the background noise in the ocean in a frequency range of 1 Hz to 100 kHz. The miniature hydrophone consists of a Fabry-Perot interferometer made of a photonic-crystal reflector interrogated with a single-mode fiber, and is compatible with existing fiber-opt…
▽ More
This work reports on an optical hydrophone that is insensitive to hydrostatic pressure, yet capable of measuring acoustic pressures as low as the background noise in the ocean in a frequency range of 1 Hz to 100 kHz. The miniature hydrophone consists of a Fabry-Perot interferometer made of a photonic-crystal reflector interrogated with a single-mode fiber, and is compatible with existing fiber-optic technologies. Three sensors with different acoustic power ranges placed within a sub-wavelength sized hydrophone head allow a high dynamic range in the excess of 160 dB with a low harmonic distortion of better than -30 dB. A method for suppressing cross coupling between sensors in the same hydrophone head is also proposed. A prototype was fabricated, assembled, and tested. The sensitivity was measured from 100 Hz to 100 kHz, demonstrating a minimum detectable pressure down to 12 μPa (1-Hz noise bandwidth), a flatband wider than 10 kHz, and very low distortion.
△ Less
Submitted 12 December, 2010; v1 submitted 15 April, 2010;
originally announced April 2010.