-
Low Particulates Nitrogen Purge and Backfill During Prototype HB650 Cryomodule String Assembly
Authors:
T. Ring,
M. Quinlan,
G. Wu
Abstract:
A low particulate vacuum and purging system was developed to support PIP-II cryomodule string assembly. The overpressure can be controlled at a precision of 1 mbar above the atmospheric pressure regardless of the cavity or string assembly air volume. The system minimized the risk of uncontrolled nitrogen flow during the string assembly. Design features are presented.
A low particulate vacuum and purging system was developed to support PIP-II cryomodule string assembly. The overpressure can be controlled at a precision of 1 mbar above the atmospheric pressure regardless of the cavity or string assembly air volume. The system minimized the risk of uncontrolled nitrogen flow during the string assembly. Design features are presented.
△ Less
Submitted 18 July, 2023;
originally announced November 2023.
-
The aesthetics of cyber security: How do users perceive them?
Authors:
Mark Quinlan,
Aaron Cross,
Andrew Simpson
Abstract:
While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perc…
▽ More
While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perceive the visual assets that accompany cyber security information, and how these visual assets and user perceptions underwrite a distinct \emph{cyber security aesthetic}. We ask, (1) What constitutes cyber security aesthetics, from the perspective of an individual user? and (2) How might these aesthetics affect users' perceived self-efficacy as they informally learn cyber security precepts? To begin answering these questions, we compile an image-set from cyber security web articles and analyse the distinct visual properties and sentiments of these images.
△ Less
Submitted 13 June, 2023;
originally announced June 2023.
-
Deep RL at Scale: Sorting Waste in Office Buildings with a Fleet of Mobile Manipulators
Authors:
Alexander Herzog,
Kanishka Rao,
Karol Hausman,
Yao Lu,
Paul Wohlhart,
Mengyuan Yan,
Jessica Lin,
Montserrat Gonzalez Arenas,
Ted Xiao,
Daniel Kappler,
Daniel Ho,
Jarek Rettinghouse,
Yevgen Chebotar,
Kuang-Huei Lee,
Keerthana Gopalakrishnan,
Ryan Julian,
Adrian Li,
Chuyuan Kelly Fu,
Bob Wei,
Sangeetha Ramesh,
Khem Holden,
Kim Kleiven,
David Rendleman,
Sean Kirmani,
Jeff Bingham
, et al. (15 additional authors not shown)
Abstract:
We describe a system for deep reinforcement learning of robotic manipulation skills applied to a large-scale real-world task: sorting recyclables and trash in office buildings. Real-world deployment of deep RL policies requires not only effective training algorithms, but the ability to bootstrap real-world training and enable broad generalization. To this end, our system combines scalable deep RL…
▽ More
We describe a system for deep reinforcement learning of robotic manipulation skills applied to a large-scale real-world task: sorting recyclables and trash in office buildings. Real-world deployment of deep RL policies requires not only effective training algorithms, but the ability to bootstrap real-world training and enable broad generalization. To this end, our system combines scalable deep RL from real-world data with bootstrap** from training in simulation, and incorporates auxiliary inputs from existing computer vision systems as a way to boost generalization to novel objects, while retaining the benefits of end-to-end training. We analyze the tradeoffs of different design decisions in our system, and present a large-scale empirical validation that includes training on real-world data gathered over the course of 24 months of experimentation, across a fleet of 23 robots in three office buildings, with a total training set of 9527 hours of robotic experience. Our final validation also consists of 4800 evaluation trials across 240 waste station configurations, in order to evaluate in detail the impact of the design decisions in our system, the scaling effects of including more real-world data, and the performance of the method on novel objects. The projects website and videos can be found at \href{http://rl-at-scale.github.io}{rl-at-scale.github.io}.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
The efficacy potential of cyber security advice as presented in news articles
Authors:
Mark Quinlan,
Aaron Ceross,
Andrew Simpson
Abstract:
Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice genera…
▽ More
Cyber security advice is a broad church: it is thematically expansive, comprising expert texts, user-generated data consumed by individual users via informal learning, and much in-between. While there is evidence that cyber security news articles play a role in disseminating cyber security advice, the nature and extent of that role are not clear. We present a corpus of cyber security advice generated from mainstream news articles. The work was driven by two research objectives. The first objective was to ascertain what kind of actionable advice is being disseminated; the second was to explore ways of determining the efficacy potential of news-mediated security advice. The results show an increase in the generation of cyber security news articles, together with increases in vocabulary complexity and reading difficulty. We argue that these could present challenges for vulnerable users. We believe that this corpus and the accompanying analysis have the potential to inform future efforts to quantify and improve the efficacy potential of security advice dissemination.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Disconnected from Reality: Do the core concepts of the metaverse exclude disabled individuals?
Authors:
Mark Quinlan
Abstract:
Commercially-driven metaverse development has been driven by philosophical and science fiction concepts. Through translating these concepts into products, the developers may have inadvertently excluded individuals with disabilities from this new expanded reality. This ideologically-driven development is presented in this paper through a brief background of what we see as the most influential of th…
▽ More
Commercially-driven metaverse development has been driven by philosophical and science fiction concepts. Through translating these concepts into products, the developers may have inadvertently excluded individuals with disabilities from this new expanded reality. This ideologically-driven development is presented in this paper through a brief background of what we see as the most influential of these concepts, and explain how these might affect disabled individuals wishing to engage with said products. It is our hope that these ideas prompt conversation on future inclusivity access from the concept stage of future metaverse development.
△ Less
Submitted 9 November, 2023; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Connected Vehicles: A Privacy Analysis
Authors:
Mark Quinlan,
Jun Zhao,
Andrew Simpson
Abstract:
Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile's transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. Th…
▽ More
Just as the world of consumer devices was forever changed by the introduction of computer controlled solutions, the introduction of the engine control unit (ECU) gave rise to the automobile's transformation from a transportation product to a technology platform. A modern car is capable of processing, analysing and transmitting data in ways that could not have been foreseen only a few years ago. These cars often incorporate telematics systems, which are used to provide navigation and internet connectivity over cellular networks, as well as data-recording devices for insurance and product development purposes. We examine the telematics system of a production vehicle, and aim to ascertain some of the associated privacy-related threats. We also consider how this analysis might underpin further research.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Self-similar diffuse boundary method for phase boundary driven flow
Authors:
Emma M. Schmidt,
J. Matt Quinlan,
Brandon Runnels
Abstract:
Interactions between an evolving solid and inviscid flow can result in substantial computational complexity, particularly in circumstances involving varied boundary conditions between the solid and fluid phases. Examples of such interactions include melting, sublimation, and deflagration, all of which exhibit bidirectional coupling, mass/heat transfer, and topological change of the solid-fluid int…
▽ More
Interactions between an evolving solid and inviscid flow can result in substantial computational complexity, particularly in circumstances involving varied boundary conditions between the solid and fluid phases. Examples of such interactions include melting, sublimation, and deflagration, all of which exhibit bidirectional coupling, mass/heat transfer, and topological change of the solid-fluid interface. The diffuse interface method is a powerful technique that has been used to describe a wide range of solid-phase interface-driven phenomena. The implicit treatment of the interface eliminates the need for cumbersome interface tracking, and advances in adaptive mesh refinement have provided a way to sufficiently resolve diffuse interfaces without excessive computational cost. However, the general scale-invariant coupling of these techniques to flow solvers has been relatively unexplored. In this work, a robust method is presented for treating diffuse solid-fluid interfaces with arbitrary boundary conditions. Source terms defined over the diffuse region mimic boundary conditions at the solid-fluid interface, and it is demonstrated that the diffuse length scale has no adverse effects. To show the efficacy of the method, a one-dimensional implementation is introduced and tested for three types of boundaries: mass flux through the boundary, a moving boundary, and passive interaction of the boundary with an incident acoustic wave. These demonstrate expected behavior in all cases. Convergence analysis is also performed and compared against the sharp-interface solution, and linear convergence is observed. This method lays the groundwork for the extension to viscous flow, and the solution of problems involving time-varying mass-flux boundaries.
△ Less
Submitted 2 September, 2022; v1 submitted 27 May, 2022;
originally announced May 2022.
-
Evidence for a Novel Reaction Mechanism of a Prompt Shock-Induced Fission Following the Fusion of 78Kr and 40Ca Nuclei at E/A =10 MeV
Authors:
E. Henry,
J. Toke,
S. Nyibule,
M. Quinlan,
W. U. Schroder,
G. Ademard,
F. Amorini,
L. Auditore,
C. Beck,
I. Berceanu,
E. Bonnet,
B. Borderie,
G. Cardella,
A. Chbihi,
M. Colonna,
E. De Filippo,
A. DOnofrio,
J. D. Frankland,
E. Geraci,
E. La Guidara,
M. La Commara,
G. Lanzalone,
P. Lautesse,
D. Lebhertz,
N. Le Neindre
, et al. (18 additional authors not shown)
Abstract:
An analysis of experimental data from the inverse-kinematics ISODEC experiment on 78Kr+40Ca reaction at a bombarding energy of 10 AMeV has revealed signatures of a hitherto unknown reaction mechanism, intermediate between the classical damped binary collisions and fusion-fission, but also substantially different from what is being termed in the literature as fast fission or quasi fission. These si…
▽ More
An analysis of experimental data from the inverse-kinematics ISODEC experiment on 78Kr+40Ca reaction at a bombarding energy of 10 AMeV has revealed signatures of a hitherto unknown reaction mechanism, intermediate between the classical damped binary collisions and fusion-fission, but also substantially different from what is being termed in the literature as fast fission or quasi fission. These signatures point to a scenario where the system fuses transiently while virtually equilibrating mass asymmetry and energy and, yet, kee** part of the energy stored in a collective shock-imparted and, possibly, angular momentum bearing form of excitation. Subsequently the system fissions dynamically along the collision or shock axis with the emerging fragments featuring a broad mass spectrum centered around symmetric fission, relative velocities somewhat higher along the fission axis than in transverse direction, and virtually no intrinsic spin. The class of massasymmetric fission events shows a distinct preference for the more massive fragments to proceed along the beam direction, a characteristic reminiscent of that reported earlier for dynamic fragmentation of projectile-like fragments alone and pointing to the memory of the initial mass and velocity distribution.
△ Less
Submitted 14 April, 2014;
originally announced April 2014.
-
A Real-Time Model-Based Reinforcement Learning Architecture for Robot Control
Authors:
Todd Hester,
Michael Quinlan,
Peter Stone
Abstract:
Reinforcement Learning (RL) is a method for learning decision-making tasks that could enable robots to learn and adapt to their situation on-line. For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time. Existing model-based RL methods learn in relatively few actions, but typically take too much time betw…
▽ More
Reinforcement Learning (RL) is a method for learning decision-making tasks that could enable robots to learn and adapt to their situation on-line. For an RL algorithm to be practical for robotic control tasks, it must learn in very few actions, while continually taking those actions in real-time. Existing model-based RL methods learn in relatively few actions, but typically take too much time between each action for practical on-line learning. In this paper, we present a novel parallel architecture for model-based RL that runs in real-time by 1) taking advantage of sample-based approximate planning methods and 2) parallelizing the acting, model learning, and planning processes such that the acting process is sufficiently fast for typical robot control cycles. We demonstrate that algorithms using this architecture perform nearly as well as methods using the typical sequential architecture when both are given unlimited time, and greatly out-perform these methods on tasks that require real-time actions such as controlling an autonomous vehicle.
△ Less
Submitted 21 May, 2011; v1 submitted 9 May, 2011;
originally announced May 2011.
-
Common Signatures of Statistical Coulomb Fragmentation of Highly Excited Nuclei and Phase Transitions in Confined Microcanonical Systems
Authors:
J. Tõke,
M. J. Quinlan,
I. Pawelczak,
W. U. Schröder
Abstract:
Characteristic signatures of statistical Coulomb fragmentation of highly excited nuclear systems were analyzed. It was found that in some important aspects, they coincide with perceived signatures of phase transitions in confined hypothetical pseudo-microcanonical systems, thus potentially giving rise to a false interpretation of experimental observations in terms of phase transitions. It is dem…
▽ More
Characteristic signatures of statistical Coulomb fragmentation of highly excited nuclear systems were analyzed. It was found that in some important aspects, they coincide with perceived signatures of phase transitions in confined hypothetical pseudo-microcanonical systems, thus potentially giving rise to a false interpretation of experimental observations in terms of phase transitions. It is demonstrated that the heat capacity as derived based on experimental observations may show domains of faux negative heat capacity for the same fundamental reason a faux negative heat capacity appears in constrained numerical modeling of phase transitions in excited nuclear matter, the reason being an effective truncation of the microcanonical phase space. Similarly, selected experimental data may exhibit bimodality apparently in accordance with the truncated pseudo-microcanonical (but not the true microcanonical) calculations for confined systems.
△ Less
Submitted 29 April, 2008;
originally announced April 2008.
-
A Simple Method for Rise-Time Discrimination of Slow Pulses from Charge-Sensitive Preamplifiers
Authors:
Jan Tõke,
Michael J. Quinlan,
Wojtek Gawlikowicz,
W. Udo Schröder
Abstract:
Performance of a simple method of particle identification via pulse rise time discrimination is demonstrated for slow pulses from charge-sensitive preamplifiers with rise times ranging from 10 ns to 500 ns. The method is based on a comparison of the amplitudes of two pulses, derived from each raw preamplifier pulse with two amplifiers with largely differing sha** times, using a fast peak-sensi…
▽ More
Performance of a simple method of particle identification via pulse rise time discrimination is demonstrated for slow pulses from charge-sensitive preamplifiers with rise times ranging from 10 ns to 500 ns. The method is based on a comparison of the amplitudes of two pulses, derived from each raw preamplifier pulse with two amplifiers with largely differing sha** times, using a fast peak-sensing ADC. For the injected charges corresponding to energy deposits in silicon detectors of a few tens of MeV, a rise time resolution of the order of 1 ns can be achieved. The identification method is applicable in particle experiments involving large-area silicon detectors, but is easily adaptable to other detectors with a response corresponding to significantly different pulse rise times for different particle species.
△ Less
Submitted 29 April, 2008;
originally announced April 2008.
-
c-Axis Infrared Conductivity of a d_{x^2-y^2}-Wave Superconductor with Impurity and Spin-Fluctuation Scattering
Authors:
P. J. Hirschfeld,
S. M. Quinlan,
D. J. Scalapino
Abstract:
Results of a calculation of the c-axis infrared conductivity sigma_c for a d_{x^2-y^2}-wave superconductor which include both elastic impurity and inelastic spin-fluctuation scattering are presented and compared with the ab-plane conductivity sigma_{ab} in the same model. In this model,the interlayer c-axis coupling is taken to be weak and diffusive. While in clean systems, inelastic scattering…
▽ More
Results of a calculation of the c-axis infrared conductivity sigma_c for a d_{x^2-y^2}-wave superconductor which include both elastic impurity and inelastic spin-fluctuation scattering are presented and compared with the ab-plane conductivity sigma_{ab} in the same model. In this model,the interlayer c-axis coupling is taken to be weak and diffusive. While in clean systems, inelastic scattering leads to a peak at omega = 4*Delta_0 in sigma_{ab} for T < T_c, it has little effect on the corresponding sigma_c, which exhibits structure only at omega = 2*Delta_0 and is directly related to the single-particle density of states N(omega). The c-axis penetration depth lambda_c in the same model is predicted to vary as T^3 at low temperatures in clean samples. We discuss recent optical experiments on the cuprates and compare with these predictions.
△ Less
Submitted 9 August, 1996;
originally announced August 1996.
-
Infrared conductivity of a d_{x^2-y^2}-wave superconductor with impurity and spin-fluctuation scattering
Authors:
S. M. Quinlan,
P. J. Hirschfeld,
D. J. Scalapino
Abstract:
Calculations are presented of the in-plane far-infrared conductivity of a d_{x^2-y^2}-wave superconductor, incorporating elastic scattering due to impurities and inelastic scattering due to spin fluctuations. The impurity scattering is modeled by short-range potential scattering with arbitrary phase shift, while scattering due to spin fluctuations is calculated within a weak-coupling Hubbard mod…
▽ More
Calculations are presented of the in-plane far-infrared conductivity of a d_{x^2-y^2}-wave superconductor, incorporating elastic scattering due to impurities and inelastic scattering due to spin fluctuations. The impurity scattering is modeled by short-range potential scattering with arbitrary phase shift, while scattering due to spin fluctuations is calculated within a weak-coupling Hubbard model picture. The conductivity is characterized by a low-temperature residual Drude feature whose height and weight are controlled by impurity scattering, as well as a broad peak centered at 4 Delta_0 arising from clean-limit inelastic processes. Results are in qualitative agreement with experiment despite missing spectral weight at high energies.
△ Less
Submitted 23 October, 1995;
originally announced October 1995.
-
Neutron scattering in a d_{x^2-y^2}-wave superconductor with strong impurity scattering and Coulomb correlations
Authors:
S. M. Quinlan,
D. J. Scalapino
Abstract:
We calculate the spin susceptibility at and below T_c for a d_{x^2-y^2}-wave superconductor with resonant impurity scattering and Coulomb correlations. Both the impurity scattering and the Coulomb correlations act to maintain peaks in the spin susceptibility, as a function of momentum, at the Brillouin zone edge. These peaks would otherwise be suppressed by the superconducting gap. The predicted…
▽ More
We calculate the spin susceptibility at and below T_c for a d_{x^2-y^2}-wave superconductor with resonant impurity scattering and Coulomb correlations. Both the impurity scattering and the Coulomb correlations act to maintain peaks in the spin susceptibility, as a function of momentum, at the Brillouin zone edge. These peaks would otherwise be suppressed by the superconducting gap. The predicted amount of suppression of the spin susceptibility in the superconducting state compared to the normal state is in qualitative agreement with results from recent magnetic neutron scattering experiments on La_{1.86}Sr_{0.14}CuO_4 for momentum values at the zone edge and along the zone diagonal. The predicted peak widths in the superconducting state, however, are narrower than those in the normal state, a narrowing which has not been observed experimentally.
△ Less
Submitted 1 July, 1994;
originally announced July 1994.