-
Combining AI Control Systems and Human Decision Support via Robustness and Criticality
Authors:
Walt Woods,
Alexander Grushin,
Simon Khan,
Alvaro Velasquez
Abstract:
AI-enabled capabilities are reaching the requisite level of maturity to be deployed in the real world, yet do not always make correct or safe decisions. One way of addressing these concerns is to leverage AI control systems alongside and in support of human decisions, relying on the AI control system in safe situations while calling on a human co-decider for critical situations. We extend a method…
▽ More
AI-enabled capabilities are reaching the requisite level of maturity to be deployed in the real world, yet do not always make correct or safe decisions. One way of addressing these concerns is to leverage AI control systems alongside and in support of human decisions, relying on the AI control system in safe situations while calling on a human co-decider for critical situations. We extend a methodology for adversarial explanations (AE) to state-of-the-art reinforcement learning frameworks, including MuZero. Multiple improvements to the base agent architecture are proposed. We demonstrate how this technology has two applications: for intelligent decision tools and to enhance training / learning frameworks. In a decision support context, adversarial explanations help a user make the correct decision by highlighting those contextual factors that would need to change for a different AI-recommended decision. As another benefit of adversarial explanations, we show that the learned AI control system demonstrates robustness against adversarial tampering. Additionally, we supplement AE by introducing strategically similar autoencoders (SSAs) to help users identify and understand all salient factors being considered by the AI system. In a training / learning framework, this technology can improve both the AI's decisions and explanations through human interaction. Finally, to identify when AI decisions would most benefit from human oversight, we tie this combined system to our prior art on statistically verified analyses of the criticality of decisions at any point in time.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
InfoSec.pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry
Authors:
Lukas Walter,
Clemens Sauerwein,
Daniel W. Woods
Abstract:
Security conferences are important venues at which academics and practitioners share knowledge about new attacks and state-of-the-art defenses. Despite this, researchers have not studied who shares information and about which security topics. To address this, our study characterizes the speakers, sponsors, and topics presented at the most prestigious academic and industry conferences. We collect a…
▽ More
Security conferences are important venues at which academics and practitioners share knowledge about new attacks and state-of-the-art defenses. Despite this, researchers have not studied who shares information and about which security topics. To address this, our study characterizes the speakers, sponsors, and topics presented at the most prestigious academic and industry conferences. We collect a longitudinal data set that contains 9,728 abstracts and 1,686 sponsors across 4 academic and 6 industry conferences. There is limited knowledge sharing between industry and academia. Conferences vary significantly in the equality of how talks/authorship is distributed across individuals. The topics of academic and industry abstracts display consistent coverage of techniques within the MITRE ATT&CK framework. Top tier academic conferences, as well as DEFCON and Black Hat, inconsistently address the governance, response and recovery functions of the NIST Cybersecurity Framework. Commercial InfoSec and insurance conferences (RSA, Gartner, Advisen and NetDillgience) cover the framework more consistently. Prevention and detection remain the most common topic of talks, with no clear temporal trend.
△ Less
Submitted 27 April, 2024;
originally announced April 2024.
-
Statistical Confidence in Mining Power Estimates for PoW Blockchains
Authors:
Mary Milad,
Christina Ovezik,
Dimitris Karakostas,
Daniel W. Woods
Abstract:
The security of blockchain systems depends on the distribution of mining power across participants. If sufficient mining power is controlled by one entity, they can force their own version of events. This may allow them to double spend coins, for example. For Proof of Work (PoW) blockchains, however, the distribution of mining power cannot be read directly from the blockchain and must instead be i…
▽ More
The security of blockchain systems depends on the distribution of mining power across participants. If sufficient mining power is controlled by one entity, they can force their own version of events. This may allow them to double spend coins, for example. For Proof of Work (PoW) blockchains, however, the distribution of mining power cannot be read directly from the blockchain and must instead be inferred from the number of blocks mined in a specific sample window. We introduce a framework to quantify this statistical uncertainty for the Nakamoto coefficient, which is a commonly-used measure of blockchain decentralization. We show that aggregating blocks over a day can lead to considerable uncertainty, with Bitcoin failing more than half the hypothesis tests (α = 0.05) when using a daily granularity. For these reasons, we recommend that blocks are aggregated over a sample window of at least 7 days. Instead of reporting a single value, our approach produces a range of possible Nakamoto coefficient values that have statistical support at a particular significance level α.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Emergence and dynamics of delusions and hallucinations across stages in early psychosis
Authors:
Catalina Mourgues-Codern,
David Benrimoh,
Jay Gandhi,
Emily A. Farina,
Raina Vin,
Tihare Zamorano,
Deven Parekh,
Ashok Malla,
Ridha Joober,
Martin Lepage,
Srividya N. Iyer,
Jean Addington,
Carrie E. Bearden,
Kristin S. Cadenhead,
Barbara Cornblatt,
Matcheri Keshavan,
William S. Stone,
Daniel H. Mathalon,
Diana O. Perkins,
Elaine F. Walker,
Tyrone D. Cannon,
Scott W. Woods,
Jai L. Shah,
Albert R. Powers
Abstract:
Hallucinations and delusions are often grouped together within the positive symptoms of psychosis. However, recent evidence suggests they may be driven by distinct computational and neural mechanisms. Examining the time course of their emergence may provide insights into the relationship between these underlying mechanisms. Participants from the second (N = 719) and third (N = 699) iterations of t…
▽ More
Hallucinations and delusions are often grouped together within the positive symptoms of psychosis. However, recent evidence suggests they may be driven by distinct computational and neural mechanisms. Examining the time course of their emergence may provide insights into the relationship between these underlying mechanisms. Participants from the second (N = 719) and third (N = 699) iterations of the North American Prodrome Longitudinal Study (NAPLS 2 and 3) were assessed for timing of CHR-P-level delusion and hallucination onset. Pre-onset symptom patterns in first-episode psychosis patients (FEP) from the Prevention and Early Intervention Program for Psychosis (PEPP-Montreal; N = 694) were also assessed. Symptom onset was determined at baseline assessment and the evolution of symptom patterns examined over 24 months. In all three samples, participants were more likely to report the onset of delusion-spectrum symptoms prior to hallucination-spectrum symptoms (odds ratios (OR): NAPLS 2 = 4.09; NAPLS 3 = 4.14; PEPP, Z = 7.01, P < 0.001) and to present with only delusions compared to only hallucinations (OR: NAPLS 2 = 5.6; NAPLS 3 = 11.11; PEPP = 42.75). Re-emergence of delusions after remission was also more common than re-emergence of hallucinations (Ps < 0.05), and hallucinations more often resolved first (Ps < 0.001). In both CHR-P samples, ratings of delusional ideation fell with the onset of hallucinations (P = 0.007). Delusions tend to emerge before hallucinations and may play a role in their development. Further work should examine the relationship between the mechanisms driving these symptoms and its utility for diagnosis and treatment.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Characterization of superconducting through-silicon vias as capacitive elements in quantum circuits
Authors:
Thomas M. Hazard,
Wayne Woods,
Danna Rosenberg,
Rabi Das,
Cyrus F. Hirjibehedin,
David K. Kim,
Jeffery Knecht,
Justin Mallek,
Alexander Melville,
Bethany M. Niedzielski,
Kyle Serniak,
Katrina M. Sliwa,
Donna Ruth-Yost,
Jonilyn L. Yoder,
William D. Oliver,
Mollie E. Schwartz
Abstract:
The large physical size of superconducting qubits and their associated on-chip control structures presents a practical challenge towards building a large-scale quantum computer. In particular, transmons require a high-quality-factor shunting capacitance that is typically achieved by using a large coplanar capacitor. Other components, such as superconducting microwave resonators used for qubit stat…
▽ More
The large physical size of superconducting qubits and their associated on-chip control structures presents a practical challenge towards building a large-scale quantum computer. In particular, transmons require a high-quality-factor shunting capacitance that is typically achieved by using a large coplanar capacitor. Other components, such as superconducting microwave resonators used for qubit state readout, are typically constructed from coplanar waveguides which are millimeters in length. Here we use compact superconducting through-silicon vias to realize lumped element capacitors in both qubits and readout resonators to significantly reduce the on-chip footprint of both of these circuit elements. We measure two types of devices to show that TSVs are of sufficient quality to be used as capacitive circuit elements and provide a significant reductions in size over existing approaches.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Safety Margins for Reinforcement Learning
Authors:
Alexander Grushin,
Walt Woods,
Alvaro Velasquez,
Simon Khan
Abstract:
Any autonomous controller will be unsafe in some situations. The ability to quantitatively identify when these unsafe situations are about to occur is crucial for drawing timely human oversight in, e.g., freight transportation applications. In this work, we demonstrate that the true criticality of an agent's situation can be robustly defined as the mean reduction in reward given some number of ran…
▽ More
Any autonomous controller will be unsafe in some situations. The ability to quantitatively identify when these unsafe situations are about to occur is crucial for drawing timely human oversight in, e.g., freight transportation applications. In this work, we demonstrate that the true criticality of an agent's situation can be robustly defined as the mean reduction in reward given some number of random actions. Proxy criticality metrics that are computable in real-time (i.e., without actually simulating the effects of random actions) can be compared to the true criticality, and we show how to leverage these proxy metrics to generate safety margins, which directly tie the consequences of potentially incorrect actions to an anticipated loss in overall performance. We evaluate our approach on learned policies from APE-X and A3C within an Atari environment, and demonstrate how safety margins decrease as agents approach failure states. The integration of safety margins into programs for monitoring deployed agents allows for the real-time identification of potentially catastrophic situations.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
Filtered skew derivations on simple artinian rings
Authors:
Adam Jones,
William Woods
Abstract:
Given a complete, positively filtered ring $(R,f)$ and a compatible skew derivation $(σ,δ)$, we may construct its skew power series ring $R[[x;σ,δ]]$. Due to topological obstructions, even if $δ$ is an \emph{inner} $σ$-derivation, in general we cannot ``untwist" it, i.e. reparametrise to find a filtered isomorphism $R[[x; σ, δ]] \cong R[[x'; σ]]$, as might be expected from the theory of skew polyn…
▽ More
Given a complete, positively filtered ring $(R,f)$ and a compatible skew derivation $(σ,δ)$, we may construct its skew power series ring $R[[x;σ,δ]]$. Due to topological obstructions, even if $δ$ is an \emph{inner} $σ$-derivation, in general we cannot ``untwist" it, i.e. reparametrise to find a filtered isomorphism $R[[x; σ, δ]] \cong R[[x'; σ]]$, as might be expected from the theory of skew polynomial rings; similarly when $σ$ is an inner automorphism. We find general conditions under which it is possible to untwist the multiplication data, and use this to analyse the structure of $R[[x;σ,δ]]$ in the simplest case when $R$ is a matrix ring over a (noncommutative) noetherian discrete valuation ring.
△ Less
Submitted 6 January, 2023;
originally announced January 2023.
-
LAGOON: An Analysis Tool for Open Source Communities
Authors:
Sourya Dey,
Walt Woods
Abstract:
This paper presents LAGOON -- an open source platform for understanding the complex ecosystems of Open Source Software (OSS) communities. The platform currently utilizes spatiotemporal graphs to store and investigate the artifacts produced by these communities, and help analysts identify bad actors who might compromise an OSS project's security. LAGOON provides ingest of artifacts from several com…
▽ More
This paper presents LAGOON -- an open source platform for understanding the complex ecosystems of Open Source Software (OSS) communities. The platform currently utilizes spatiotemporal graphs to store and investigate the artifacts produced by these communities, and help analysts identify bad actors who might compromise an OSS project's security. LAGOON provides ingest of artifacts from several common sources, including source code repositories, issue trackers, mailing lists and scra** content from project websites. Ingestion utilizes a modular architecture, which supports incremental updates from data sources and provides a generic identity fusion process that can recognize the same community members across disparate accounts. A user interface is provided for visualization and exploration of an OSS project's complete sociotechnical graph. Scripts are provided for applying machine learning to identify patterns within the data. While current focus is on the identification of bad actors in the Python community, the platform's reusability makes it easily extensible with new data and analyses, paving the way for LAGOON to become a comprehensive means of assessing various OSS-based projects and their communities.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Skew power series rings over a prime base ring
Authors:
Adam Jones,
William Woods
Abstract:
In this paper, we investigate the structure of skew power series rings of the form $S = R[[x;σ,δ]]$, where $R$ is a complete filtered ring and $(σ,δ)$ is a skew derivation respecting the filtration. Our main focus is on the case in which $σδ= δσ$, and we aim to use techniques in non-commutative valuation theory to address the long-standing open question: if $P$ is an invariant prime ideal of $R$,…
▽ More
In this paper, we investigate the structure of skew power series rings of the form $S = R[[x;σ,δ]]$, where $R$ is a complete filtered ring and $(σ,δ)$ is a skew derivation respecting the filtration. Our main focus is on the case in which $σδ= δσ$, and we aim to use techniques in non-commutative valuation theory to address the long-standing open question: if $P$ is an invariant prime ideal of $R$, is $PS$ a prime ideal of $S$? When $R$ has characteristic $p$, our results reduce this to a finite-index problem. We also give preliminary results in the "Iwasawa algebra" case $δ= σ- \mathrm{id}_R$ in arbitrary characteristic. A key step in our argument will be to show that for a large class of Noetherian algebras, the nilradical is "almost" $(σ,δ)$-invariant in a certain sense.
△ Less
Submitted 6 January, 2023; v1 submitted 19 December, 2021;
originally announced December 2021.
-
Conflicting Privacy Preference Signals in the Wild
Authors:
Maximilian Hils,
Daniel W. Woods,
Rainer Böhme
Abstract:
Privacy preference signals allow users to express preferences over how their personal data is processed. These signals become important in determining privacy outcomes when they reference an enforceable legal basis, as is the case with recent signals such as the Global Privacy Control and the Transparency & Consent Framework. However, the coexistence of multiple privacy preference signals creates…
▽ More
Privacy preference signals allow users to express preferences over how their personal data is processed. These signals become important in determining privacy outcomes when they reference an enforceable legal basis, as is the case with recent signals such as the Global Privacy Control and the Transparency & Consent Framework. However, the coexistence of multiple privacy preference signals creates ambiguity as users may transmit more than one signal. This paper collects evidence about ambiguity flowing from the aforementioned two signals and the historic Do Not Track signal. We provide the first empirical evidence that ambiguous signals are sent by web users in the wild. We also show that preferences stored in the browser are reliable predictors of privacy preferences expressed in web dialogs. Finally, we provide the first evidence that popular cookie dialogs are blocked by the majority of users who adopted the Do Not Track and Global Privacy Control standards. These empirical results inform forthcoming legal debates about how to interpret privacy preference signals.
△ Less
Submitted 29 September, 2021;
originally announced September 2021.
-
Anomaly Detection with Neural Parsers That Never Reject
Authors:
Alexander Grushin,
Walt Woods
Abstract:
Reinforcement learning has recently shown promise as a technique for training an artificial neural network to parse sentences in some unknown format, through a body of work known as RL-GRIT. A key aspect of the RL-GRIT approach is that rather than explicitly inferring a grammar that describes the format, the neural network learns to perform various parsing actions (such as merging two tokens) over…
▽ More
Reinforcement learning has recently shown promise as a technique for training an artificial neural network to parse sentences in some unknown format, through a body of work known as RL-GRIT. A key aspect of the RL-GRIT approach is that rather than explicitly inferring a grammar that describes the format, the neural network learns to perform various parsing actions (such as merging two tokens) over a corpus of sentences, with the goal of maximizing the estimated frequency of the resulting parse structures. This can allow the learning process to more easily explore different action choices, since a given choice may change the optimality of the parse (as expressed by the total reward), but will not result in the failure to parse a sentence. However, this also presents a limitation: because the trained neural network can successfully parse any sentence, it cannot be directly used to identify sentences that deviate from the format of the training sentences, i.e., that are anomalous. In this paper, we address this limitation by presenting procedures for extracting production rules from the neural network, and for using these rules to determine whether a given sentence is nominal or anomalous. When a sentence is anomalous, an attempt is made to identify the location of the anomaly. We empirically demonstrate that our approach is capable of grammatical inference and anomaly detection for both non-regular formats and those containing regions of high randomness/entropy. While a format with high randomness typically requires large sets of production rules, we propose a two pass grammatical inference method to generate parsimonious rule sets for such formats. By further improving parser learning, and leveraging the presented rule extraction and anomaly detection algorithms, one might begin to understand common errors, either benign or malicious, in practical formats.
△ Less
Submitted 20 May, 2022; v1 submitted 30 July, 2021;
originally announced August 2021.
-
Privacy Preference Signals: Past, Present and Future
Authors:
Maximilian Hils,
Daniel W. Woods,
Rainer Böhme
Abstract:
Privacy preference signals are digital representations of how users want their personal data to be processed. Such signals must be adopted by both the sender (users) and intended recipients (data processors). Adoption represents a coordination problem that remains unsolved despite efforts dating back to the 1990s. Browsers implemented standards like the Platform for Privacy Preferences (P3P) and D…
▽ More
Privacy preference signals are digital representations of how users want their personal data to be processed. Such signals must be adopted by both the sender (users) and intended recipients (data processors). Adoption represents a coordination problem that remains unsolved despite efforts dating back to the 1990s. Browsers implemented standards like the Platform for Privacy Preferences (P3P) and Do Not Track (DNT), but vendors profiting from personal data faced few incentives to receive and respect the expressed wishes of data subjects. In the wake of recent privacy laws, a coalition of AdTech firms published the Transparency and Consent Framework (TCF), which defines an opt-in consent signal. This paper integrates post-GDPR developments into the wider history of privacy preference signals. Our main contribution is a high-frequency longitudinal study describing how TCF signal gained dominance as of February 2021. We explore which factors correlate with adoption at the website level. Both the number of third parties on a website and the presence of Google Ads are associated with higher adoption of TCF. Further, we show that vendors acted as early adopters of TCF 2.0 and provide two case-studies describing how Consent Management Providers shifted existing customers to TCF 2.0. We sketch ways forward for a pro-privacy signal.
△ Less
Submitted 14 July, 2021; v1 submitted 4 June, 2021;
originally announced June 2021.
-
RL-GRIT: Reinforcement Learning for Grammar Inference
Authors:
Walt Woods
Abstract:
When working to understand usage of a data format, examples of the data format are often more representative than the format's specification. For example, two different applications might use very different JSON representations, or two PDF-writing applications might make use of very different areas of the PDF specification to realize the same rendered content. The complexity arising from these dis…
▽ More
When working to understand usage of a data format, examples of the data format are often more representative than the format's specification. For example, two different applications might use very different JSON representations, or two PDF-writing applications might make use of very different areas of the PDF specification to realize the same rendered content. The complexity arising from these distinct origins can lead to large, difficult-to-understand attack surfaces, presenting a security concern when considering both exfiltration and data schizophrenia. Grammar inference can aid in describing the practical language generator behind examples of a data format. However, most grammar inference research focuses on natural language, not data formats, and fails to support crucial features such as type recursion. We propose a novel set of mechanisms for grammar inference, RL-GRIT, and apply them to understanding de facto data formats. After reviewing existing grammar inference solutions, it was determined that a new, more flexible scaffold could be found in Reinforcement Learning (RL). Within this work, we lay out the many algorithmic changes required to adapt RL from its traditional, sequential-time environment to the highly interdependent environment of parsing. The result is an algorithm which can demonstrably learn recursive control structures in simple data formats, and can extract meaningful structure from fragments of the PDF format. Whereas prior work in grammar inference focused on either regular languages or constituency parsing, we show that RL can be used to surpass the expressiveness of both classes, and offers a clear path to learning context-sensitive languages. The proposed algorithm can serve as a building block for understanding the ecosystems of de facto data formats.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Spoken Digit Classification by In-Materio Reservoir Computing with Neuromorphic Atomic Switch Networks
Authors:
Sam Lilak,
Walt Woods,
Kelsey Scharnhorst,
Christopher Dunham,
Christof Teuscher,
Adam Z. Stieg,
James K. Gimzewski
Abstract:
Atomic Switch Networks (ASN) comprising silver iodide (AgI) junctions, a material previously unexplored as functional memristive elements within highly-interconnected nanowire networks, were employed as a neuromorphic substrate for physical Reservoir Computing (RC). This new class of ASN-based devices has been physically characterized and utilized to classify spoken digit audio data, demonstrating…
▽ More
Atomic Switch Networks (ASN) comprising silver iodide (AgI) junctions, a material previously unexplored as functional memristive elements within highly-interconnected nanowire networks, were employed as a neuromorphic substrate for physical Reservoir Computing (RC). This new class of ASN-based devices has been physically characterized and utilized to classify spoken digit audio data, demonstrating the utility of substrate-based device architectures where intrinsic material properties can be exploited to perform computation in-materio. This work demonstrates high accuracy in the classification of temporally analyzed Free-Spoken Digit Data (FSDD). These results expand upon the class of viable memristive materials available for the production of functional nanowire networks and bolster the utility of ASN-based devices as unique hardware platforms for neuromorphic computing applications involving memory, adaptation and learning.
△ Less
Submitted 23 March, 2021;
originally announced March 2021.
-
Fabrication of superconducting through-silicon vias
Authors:
Justin L. Mallek,
Donna-Ruth W. Yost,
Danna Rosenberg,
Jonilyn L. Yoder,
Gregory Calusine,
Matt Cook,
Rabindra Das,
Alexandra Day,
Evan Golden,
David K. Kim,
Jeffery Knecht,
Bethany M. Niedzielski,
Mollie Schwartz,
Arjan Sevi,
Corey Stull,
Wayne Woods,
Andrew J. Kerman,
William D. Oliver
Abstract:
Increasing circuit complexity within quantum systems based on superconducting qubits necessitates high connectivity while retaining qubit coherence. Classical micro-electronic systems have addressed interconnect density challenges by using 3D integration with interposers containing through-silicon vias (TSVs), but extending these integration techniques to superconducting quantum systems is challen…
▽ More
Increasing circuit complexity within quantum systems based on superconducting qubits necessitates high connectivity while retaining qubit coherence. Classical micro-electronic systems have addressed interconnect density challenges by using 3D integration with interposers containing through-silicon vias (TSVs), but extending these integration techniques to superconducting quantum systems is challenging. Here, we discuss our approach for realizing high-aspect-ratio superconducting TSVs\textemdash 10 $μ$m wide by 20 $μ$m long by 200 $μ$m deep\textemdash with densities of 100 electrically isolated TSVs per square millimeter. We characterize the DC and microwave performance of superconducting TSVs at cryogenic temperatures and demonstrate superconducting critical currents greater than 20 mA. These high-aspect-ratio, high critical current superconducting TSVs will enable high-density vertical signal routing within superconducting quantum processors.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
Adaptive multi-channel event segmentation and feature extraction for monitoring health outcomes
Authors:
Xichen She,
Yaya Zhai,
Ricardo Henao,
Christopher W. Woods,
Christopher Chiu,
Geoffrey S. Ginsburg,
Peter X. K. Song,
Alfred O. Hero
Abstract:
$\textbf{Objective}$: To develop a multi-channel device event segmentation and feature extraction algorithm that is robust to changes in data distribution. $\textbf{Methods}…
▽ More
$\textbf{Objective}$: To develop a multi-channel device event segmentation and feature extraction algorithm that is robust to changes in data distribution. $\textbf{Methods}$: We introduce an adaptive transfer learning algorithm to classify and segment events from non-stationary multi-channel temporal data. Using a multivariate hidden Markov model (HMM) and Fisher's linear discriminant analysis (FLDA) the algorithm adaptively adjusts to shifts in distribution over time. The proposed algorithm is unsupervised and learns to label events without requiring $\textit{a priori}$ information about true event states. The procedure is illustrated on experimental data collected from a cohort in a human viral challenge (HVC) study, where certain subjects have disrupted wake and sleep patterns after exposure to a H1N1 influenza pathogen. $\textbf{Results}$: Simulations establish that the proposed adaptive algorithm significantly outperforms other event classification methods. When applied to early time points in the HVC data the algorithm extracts sleep/wake features that are predictive of both infection and infection onset time. $\textbf{Conclusion}$: The proposed transfer learning event segmentation method is robust to temporal shifts in data distribution and can be used to produce highly discriminative event-labeled features for health monitoring. $\textbf{Significance}$: Our integrated multisensor signal processing and transfer learning method is applicable to many ambulatory monitoring applications.
△ Less
Submitted 19 November, 2020; v1 submitted 20 August, 2020;
originally announced August 2020.
-
Comparison of Dielectric Loss in Titanium Nitride and Aluminum Superconducting Resonators
Authors:
Alexander Melville,
Greg Calusine,
Wayne Woods,
Kyle Serniak,
Evan Golden,
Bethany M. Niedzielski,
David K. Kim,
Arjan Sevi,
Jonilyn L. Yoder,
Eric A. Dauler,
William D. Oliver
Abstract:
Lossy dielectrics are a significant source of decoherence in superconducting quantum circuits. In this report, we model and compare the dielectric loss in bulk and interfacial dielectrics in titanium nitride (TiN) and aluminum (Al) superconducting coplanar waveguide (CPW) resonators. We fabricate isotropically trenched resonators to produce a series of device geometries that accentuate a specific…
▽ More
Lossy dielectrics are a significant source of decoherence in superconducting quantum circuits. In this report, we model and compare the dielectric loss in bulk and interfacial dielectrics in titanium nitride (TiN) and aluminum (Al) superconducting coplanar waveguide (CPW) resonators. We fabricate isotropically trenched resonators to produce a series of device geometries that accentuate a specific dielectric region's contribution to resonator quality factor. While each dielectric region contributes significantly to loss in TiN devices, the metal-air interface dominates the loss in the Al devices. Furthermore, we evaluate the quality factor of each TiN resonator geometry with and without a post-process hydrofluoric (HF) etch, and find that it reduced losses from the substrate-air interface, thereby improving the quality factor.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Solid-state qubits integrated with superconducting through-silicon vias
Authors:
Donna-Ruth W. Yost,
Mollie E. Schwartz,
Justin Mallek,
Danna Rosenberg,
Corey Stull,
Jonilyn L. Yoder,
Greg Calusine,
Matt Cook,
Rabindra Das,
Alexandra L. Day,
Evan B. Golden,
David K. Kim,
Alexander Melville,
Bethany M. Niedzielski,
Wayne Woods,
Andrew J. Kerman,
Willam D. Oliver
Abstract:
As superconducting qubit circuits become more complex, addressing a large array of qubits becomes a challenging engineering problem. Dense arrays of qubits benefit from, and may require, access via the third dimension to alleviate interconnect crowding. Through-silicon vias (TSVs) represent a promising approach to three-dimensional (3D) integration in superconducting qubit arrays -- provided they…
▽ More
As superconducting qubit circuits become more complex, addressing a large array of qubits becomes a challenging engineering problem. Dense arrays of qubits benefit from, and may require, access via the third dimension to alleviate interconnect crowding. Through-silicon vias (TSVs) represent a promising approach to three-dimensional (3D) integration in superconducting qubit arrays -- provided they are compact enough to support densely-packed qubit systems without compromising qubit performance or low-loss signal and control routing. In this work, we demonstrate the integration of superconducting, high-aspect ratio TSVs -- 10 $μ$m wide by 20 $μ$m long by 200 $μ$m deep -- with superconducting qubits. We utilize TSVs for baseband control and high-fidelity microwave readout of qubits using a two-chip, bump-bonded architecture. We also validate the fabrication of qubits directly upon the surface of a TSV-integrated chip. These key 3D integration milestones pave the way for the control and readout of high-density superconducting qubit arrays using superconducting TSVs.
△ Less
Submitted 29 September, 2020; v1 submitted 23 December, 2019;
originally announced December 2019.
-
Post-Incident Audits on Cyber Insurance Discounts
Authors:
Sakshyam Panda,
Daniel W Woods,
Aron Laszka,
Andrew Fielder,
Emmanouil Panaousis
Abstract:
We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity claim. Audits can reveal fraudulent (or simply careless) policyholders not following reported security procedures, in which case the insurer…
▽ More
We introduce a game-theoretic model to investigate the strategic interaction between a cyber insurance policyholder whose premium depends on her self-reported security level and an insurer with the power to audit the security level upon receiving an indemnity claim. Audits can reveal fraudulent (or simply careless) policyholders not following reported security procedures, in which case the insurer can refuse to indemnify the policyholder. However, the insurer has to bear an audit cost even when the policyholders have followed the prescribed security procedures. As audits can be expensive, a key problem insurers face is to devise an auditing strategy to deter policyholders from misrepresenting their security levels to gain a premium discount. This decision-making problem was motivated by conducting interviews with underwriters and reviewing regulatory filings in the U.S.; we discovered that premiums are determined by security posture, yet this is often self-reported and insurers are concerned by whether security procedures are practised as reported by the policyholders.
To address this problem, we model this interaction as a Bayesian game of incomplete information and devise optimal auditing strategies for the insurers considering the possibility that the policyholder may misrepresent her security level. To the best of our knowledge, this work is the first theoretical consideration of post-incident claims management in cyber security. Our model captures the trade-off between the incentive to exaggerate security posture during the application process and the possibility of punishment for non-compliance with reported security policies. Simulations demonstrate that common sense techniques are not as efficient at providing effective cyber insurance audit decisions as the ones computed using game theory.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
3D integration and packaging for solid-state qubits
Authors:
D. Rosenberg,
S. Weber,
D. Conway,
D. Yost,
J. Mallek,
G. Calusine,
R. Das,
D. Kim,
M. Schwartz,
W. Woods,
J. L. Yoder,
W. D. Oliver
Abstract:
Develo** a packaging scheme that meets all of the requirements for operation of solid-state qubits in a cryogenic environment can be a formidable challenge. In this article, we discuss work being done in our group as well as in the broader community, focusing on the role of 3D integration and packaging in quantum processing with solid-state qubits.
Develo** a packaging scheme that meets all of the requirements for operation of solid-state qubits in a cryogenic environment can be a formidable challenge. In this article, we discuss work being done in our group as well as in the broader community, focusing on the role of 3D integration and packaging in quantum processing with solid-state qubits.
△ Less
Submitted 24 July, 2019; v1 submitted 26 June, 2019;
originally announced June 2019.
-
Microwave Packaging for Superconducting Qubits
Authors:
Benjamin Lienhard,
Jochen Braumüller,
Wayne Woods,
Danna Rosenberg,
Greg Calusine,
Steven Weber,
Antti Vepsäläinen,
Kevin O'Brien,
Terry P. Orlando,
Simon Gustavsson,
William D. Oliver
Abstract:
Over the past two decades, the performance of superconducting quantum circuits has tremendously improved. The progress of superconducting qubits enabled a new industry branch to emerge from global technology enterprises to quantum computing startups. Here, an overview of superconducting quantum circuit microwave control is presented. Furthermore, we discuss one of the persistent engineering challe…
▽ More
Over the past two decades, the performance of superconducting quantum circuits has tremendously improved. The progress of superconducting qubits enabled a new industry branch to emerge from global technology enterprises to quantum computing startups. Here, an overview of superconducting quantum circuit microwave control is presented. Furthermore, we discuss one of the persistent engineering challenges in the field, how to control the electromagnetic environment of increasingly complex superconducting circuits such that they are simultaneously protected and efficiently controllable.
△ Less
Submitted 12 June, 2019;
originally announced June 2019.
-
Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robustness
Authors:
Walt Woods,
Jack Chen,
Christof Teuscher
Abstract:
For sensitive problems, such as medical imaging or fraud detection, Neural Network (NN) adoption has been slow due to concerns about their reliability, leading to a number of algorithms for explaining their decisions. NNs have also been found vulnerable to a class of imperceptible attacks, called adversarial examples, which arbitrarily alter the output of the network. Here we demonstrate both that…
▽ More
For sensitive problems, such as medical imaging or fraud detection, Neural Network (NN) adoption has been slow due to concerns about their reliability, leading to a number of algorithms for explaining their decisions. NNs have also been found vulnerable to a class of imperceptible attacks, called adversarial examples, which arbitrarily alter the output of the network. Here we demonstrate both that these attacks can invalidate prior attempts to explain the decisions of NNs, and that with very robust networks, the attacks themselves may be leveraged as explanations with greater fidelity to the model. We show that the introduction of a novel regularization technique inspired by the Lipschitz constraint, alongside other proposed improvements, greatly improves an NN's resistance to adversarial examples. On the ImageNet classification task, we demonstrate a network with an Accuracy-Robustness Area (ARA) of 0.0053, an ARA 2.4x greater than the previous state of the art. Improving the mechanisms by which NN decisions are understood is an important direction for both establishing trust in sensitive domains and learning more about the stimuli to which NNs respond.
△ Less
Submitted 6 August, 2019; v1 submitted 7 June, 2019;
originally announced June 2019.
-
An unsupervised transfer learning algorithm for sleep monitoring
Authors:
Xichen She,
Yaya Zhai,
Ricardo Henao,
Christopher W. Woods,
Geoffrey S. Ginsburg,
Peter X. K. Song,
Alfred O. Hero
Abstract:
Objective: To develop multisensor-wearable-device sleep monitoring algorithms that are robust to health disruptions affecting sleep patterns. Methods: We develop an unsupervised transfer learning algorithm based on a multivariate hidden Markov model and Fisher's linear discriminant analysis, adaptively adjusting to sleep pattern shift by training on dynamics of sleep/wake states. The proposed algo…
▽ More
Objective: To develop multisensor-wearable-device sleep monitoring algorithms that are robust to health disruptions affecting sleep patterns. Methods: We develop an unsupervised transfer learning algorithm based on a multivariate hidden Markov model and Fisher's linear discriminant analysis, adaptively adjusting to sleep pattern shift by training on dynamics of sleep/wake states. The proposed algorithm operates, without requiring a priori information about true sleep/wake states, by establishing an initial training set with hidden Markov model and leveraging a taper window mechanism to learn the sleep pattern in an incremental fashion. Our domain-adaptation algorithm is applied to a dataset collected in a human viral challenge study to identify sleep/wake periods of both uninfected and infected participants. Results: The algorithm successfully detects sleep/wake sessions in subjects whose sleep patterns are disrupted by respiratory infection (H3N2 flu virus). Pre-symptomatic features based on the detected periods are found to be strongly predictive of both infection status (AUC = 0.844) and infection onset time (AUC = 0.885), indicating the effectiveness and usefulness of the algorithm. Conclusion: Our method can effectively detect sleep/wake states in the presence of sleep pattern shift. Significance: Utilizing integrated multisensor signal processing and adaptive training schemes, our algorithm is able to capture key sleep patterns in ambulatory monitoring, leading to better automated sleep assessment and prediction.
△ Less
Submitted 7 April, 2019;
originally announced April 2019.
-
The conjugation action in completed group rings
Authors:
William Woods
Abstract:
Let $k = \mathbb{F}_p$ or $\mathbb{Z}_p$ (or finite extensions of these). Let $G$ be a $p$-valuable group, and form its completed group algebra $kG$. By analysing the conjugation action of $G$ on itself, we prove two structural results. Firstly, we show that all inner automorphisms of $kG$ that preserve $G$ are induced from inner automorphisms of $G$. Secondly, for a closed subgroup $Γ$ of $G$, we…
▽ More
Let $k = \mathbb{F}_p$ or $\mathbb{Z}_p$ (or finite extensions of these). Let $G$ be a $p$-valuable group, and form its completed group algebra $kG$. By analysing the conjugation action of $G$ on itself, we prove two structural results. Firstly, we show that all inner automorphisms of $kG$ that preserve $G$ are induced from inner automorphisms of $G$. Secondly, for a closed subgroup $Γ$ of $G$, we calculate the $Γ$-fixed ring of $kG/I$ under the conjugation action of $Γ$, for certain ideals $I$ induced from the $G$-centraliser of $Γ$.
△ Less
Submitted 6 January, 2023; v1 submitted 7 March, 2019;
originally announced March 2019.
-
Dynamical dispersion in turbulent plumes
Authors:
Matthew M. Scase,
Andrew W. Woods
Abstract:
Experimental observations of turbulent buoyant plumes, produced by a constant source of buoyancy, have been described with great success using a horizontally averaged model for the conservation of mass, momentum and buoyancy flux. However, experimental observations of plumes with time-dependent buoyancy fluxes has proved more challenging for quantitative models. At each level in the plume, the hor…
▽ More
Experimental observations of turbulent buoyant plumes, produced by a constant source of buoyancy, have been described with great success using a horizontally averaged model for the conservation of mass, momentum and buoyancy flux. However, experimental observations of plumes with time-dependent buoyancy fluxes has proved more challenging for quantitative models. At each level in the plume, the horizontal variation in velocity leads to an along-axis shear and hence dispersive transport relative to the mean. With a time-dependent source, axial dispersion of the dynamic properties of the plume has a key role in the evolution of the flow. Using ideas of mixing length theory, we introduce a model for this axial dispersion, and test the model by comparison with experimental observations of plumes in which the buoyancy flux is suddenly decreased or suddenly increased. In both cases, we show the transition from one buoyancy flux to another is self-similar, and using the data, we find the axial dispersion may be expressed as βUb where β lies in the range 0.70-0.88 and U and b are respectively the horizontally averaged vertical velocity and radius of the plume at height z and time t. Our model also reduces to that of a classical plume when the buoyancy flux is steady.
△ Less
Submitted 14 December, 2018;
originally announced December 2018.
-
Dimension theory in iterated local skew power series rings
Authors:
William Woods
Abstract:
By analysing the structure of the associated graded ring with respect to certain filtrations, we deduce a number of good properties of iterated local skew power series rings over appropriate base rings. In particular, we calculate the Krull dimension, prime length and global dimension in well-behaved cases, obtaining lower bounds to complement the upper bounds obtained by Venjakob and Wang.
By analysing the structure of the associated graded ring with respect to certain filtrations, we deduce a number of good properties of iterated local skew power series rings over appropriate base rings. In particular, we calculate the Krull dimension, prime length and global dimension in well-behaved cases, obtaining lower bounds to complement the upper bounds obtained by Venjakob and Wang.
△ Less
Submitted 26 November, 2018;
originally announced November 2018.
-
Determining interface dielectric losses in superconducting coplanar waveguide resonators
Authors:
Wayne Woods,
Greg Calusine,
Alexander Melville,
Arjan Sevi,
Evan Golden,
David K. Kim,
Danna Rosenberg,
Jonilyn L. Yoder,
William D. Oliver
Abstract:
Superconducting quantum computing architectures comprise resonators and qubits that experience energy loss due to two-level systems (TLS) in bulk and interfacial dielectrics. Understanding these losses is critical to improving performance in superconducting circuits. In this work, we present a method for quantifying the TLS losses of different bulk and interfacial dielectrics present in supercondu…
▽ More
Superconducting quantum computing architectures comprise resonators and qubits that experience energy loss due to two-level systems (TLS) in bulk and interfacial dielectrics. Understanding these losses is critical to improving performance in superconducting circuits. In this work, we present a method for quantifying the TLS losses of different bulk and interfacial dielectrics present in superconducting coplanar waveguide (CPW) resonators. By combining statistical characterization of sets of specifically designed CPW resonators on isotropically etched silicon substrates with detailed electromagnetic modeling, we determine the separate loss contributions from individual material interfaces and bulk dielectrics. This technique for analyzing interfacial TLS losses can be used to guide targeted improvements to qubits, resonators, and their superconducting fabrication processes.
△ Less
Submitted 30 August, 2018;
originally announced August 2018.
-
Analysis and mitigation of interface losses in trenched superconducting coplanar waveguide resonators
Authors:
Greg Calusine,
Alexander Melville,
Wayne Woods,
Rabindra Das,
Corey Stull,
Vlad Bolkhovsky,
Danielle Braje,
David Hover,
David K. Kim,
Xhovalin Miloshi,
Danna Rosenberg,
Arjan Sevi,
Jonilyn L. Yoder,
Eric A. Dauler,
William D. Oliver
Abstract:
Improving the performance of superconducting qubits and resonators generally results from a combination of materials and fabrication process improvements and design modifications that reduce device sensitivity to residual losses. One instance of this approach is to use trenching into the device substrate in combination with superconductors and dielectrics with low intrinsic losses to improve quali…
▽ More
Improving the performance of superconducting qubits and resonators generally results from a combination of materials and fabrication process improvements and design modifications that reduce device sensitivity to residual losses. One instance of this approach is to use trenching into the device substrate in combination with superconductors and dielectrics with low intrinsic losses to improve quality factors and coherence times. Here we demonstrate titanium nitride coplanar waveguide resonators with mean quality factors exceeding two million and controlled trenching reaching 2.2 $μ$m into the silicon substrate. Additionally, we measure sets of resonators with a range of sizes and trench depths and compare these results with finite-element simulations to demonstrate quantitative agreement with a model of interface dielectric loss. We then apply this analysis to determine the extent to which trenching can improve resonator performance.
△ Less
Submitted 28 September, 2017;
originally announced September 2017.
-
On the catenarity of virtually nilpotent mod-$p$ Iwasawa algebras
Authors:
William Woods
Abstract:
Let $p>2$ be a prime, $k$ a finite field of characteristic $p$, and $G$ a nilpotent-by-finite compact $p$-adic analytic group. Write $kG$ for the completed group ring of $G$ over $k$. We show that $kG$ is a catenary ring.
Let $p>2$ be a prime, $k$ a finite field of characteristic $p$, and $G$ a nilpotent-by-finite compact $p$-adic analytic group. Write $kG$ for the completed group ring of $G$ over $k$. We show that $kG$ is a catenary ring.
△ Less
Submitted 21 August, 2017;
originally announced August 2017.
-
Fast and Accurate Sparse Coding of Visual Stimuli with a Simple, Ultra-Low-Energy Spiking Architecture
Authors:
Walt Woods,
Christof Teuscher
Abstract:
Memristive crossbars have become a popular means for realizing unsupervised and supervised learning techniques. In previous neuromorphic architectures with leaky integrate-and-fire neurons, the crossbar itself has been separated from the neuron capacitors to preserve mathematical rigor. In this work, we sought to simplify the design, creating a fast circuit that consumed significantly lower power…
▽ More
Memristive crossbars have become a popular means for realizing unsupervised and supervised learning techniques. In previous neuromorphic architectures with leaky integrate-and-fire neurons, the crossbar itself has been separated from the neuron capacitors to preserve mathematical rigor. In this work, we sought to simplify the design, creating a fast circuit that consumed significantly lower power at a minimal cost of accuracy. We also showed that connecting the neurons directly to the crossbar resulted in a more efficient sparse coding architecture, and alleviated the need to pre-normalize receptive fields. This work provides derivations for the design of such a network, named the Simple Spiking Locally Competitive Algorithm, or SSLCA, as well as CMOS designs and results on the CIFAR and MNIST datasets. Compared to a non-spiking model which scored 33% on CIFAR-10 with a single-layer classifier, this hardware scored 32% accuracy. When used with a state-of-the-art deep learning classifier, the non-spiking model achieved 82% and our simplified, spiking model achieved 80%, while compressing the input data by 92%. Compared to a previously proposed spiking model, our proposed hardware consumed 99% less energy to do the same work at 21x the throughput. Accuracy held out with online learning to a write variance of 3%, suitable for the often-reported 4-bit resolution required for neuromorphic algorithms; with offline learning to a write variance of 27%; and with read variance to 40%. The proposed architecture's excellent accuracy, throughput, and significantly lower energy usage demonstrate the utility of our innovations.
△ Less
Submitted 22 January, 2019; v1 submitted 19 April, 2017;
originally announced April 2017.
-
Extensions of almost faithful prime ideals in virtually nilpotent mod-$p$ Iwasawa algebras
Authors:
William Woods
Abstract:
Let $G$ be a nilpotent-by-finite compact $p$-adic analytic group for some $p>2$, and $H = \mathbf{FN}_p(G)$ its finite-by-(nilpotent $p$-valuable) radical. Fix a finite field $k$ of characteristic $p$, and write $kG$ for the completed group ring of $G$ over $k$. We show that almost faithful $G$-stable prime ideals $P$ of $kH$ extend to prime ideals $PkG$ of $kG$.
Let $G$ be a nilpotent-by-finite compact $p$-adic analytic group for some $p>2$, and $H = \mathbf{FN}_p(G)$ its finite-by-(nilpotent $p$-valuable) radical. Fix a finite field $k$ of characteristic $p$, and write $kG$ for the completed group ring of $G$ over $k$. We show that almost faithful $G$-stable prime ideals $P$ of $kH$ extend to prime ideals $PkG$ of $kG$.
△ Less
Submitted 24 April, 2017; v1 submitted 12 October, 2016;
originally announced October 2016.
-
Maximal prime homomorphic images of mod-$p$ Iwasawa algebras
Authors:
William Woods
Abstract:
Let $k$ be a finite field of characteristic $p$, and $G$ a compact $p$-adic analytic group. Write $kG$ for the completed group ring of $G$ over $k$. In this paper, we describe the structure of the ring $kG/P$, where $P$ is a minimal prime ideal of $kG$. We give an isomorphism between $kG/P$ and a matrix ring with coefficients in the ring $(k'G')_α$, where $k'/k$ is a finite field extension, $G'$ i…
▽ More
Let $k$ be a finite field of characteristic $p$, and $G$ a compact $p$-adic analytic group. Write $kG$ for the completed group ring of $G$ over $k$. In this paper, we describe the structure of the ring $kG/P$, where $P$ is a minimal prime ideal of $kG$. We give an isomorphism between $kG/P$ and a matrix ring with coefficients in the ring $(k'G')_α$, where $k'/k$ is a finite field extension, $G'$ is a large subquotient of $G$ with no finite normal subgroups, and $(-)_α$ is a "twisting" operation that preserves several desirable properties of the ring structure. We demonstrate an application of this isomorphism by setting up correspondences between certain ideals and subrings of $kG$ and those of $(k'G')_α$, and showing that these correspondences often preserve some useful properties, such as almost-faithfulness of an ideal, or control of an ideal by a closed normal subgroup.
△ Less
Submitted 29 October, 2018; v1 submitted 27 August, 2016;
originally announced August 2016.
-
On the structure of virtually nilpotent compact $p$-adic analytic groups
Authors:
William Woods
Abstract:
Let $G$ be a compact $p$-adic analytic group. We recall the well-understood finite radical $Δ^+$ and FC-centre $Δ$, and introduce a $p$-adic analogue of Roseblade's subgroup $\mathrm{nio}(G)$, the unique largest orbitally sound open normal subgroup of $G$. Further, when $G$ is nilpotent-by-finite, we introduce the finite-by-(nilpotent $p$-valuable) radical $\mathbf{FN}_p(G)$, an open characteristi…
▽ More
Let $G$ be a compact $p$-adic analytic group. We recall the well-understood finite radical $Δ^+$ and FC-centre $Δ$, and introduce a $p$-adic analogue of Roseblade's subgroup $\mathrm{nio}(G)$, the unique largest orbitally sound open normal subgroup of $G$. Further, when $G$ is nilpotent-by-finite, we introduce the finite-by-(nilpotent $p$-valuable) radical $\mathbf{FN}_p(G)$, an open characteristic subgroup of $G$ contained in $\mathrm{nio}(G)$. By relating the already well-known theory of isolators with Lazard's notion of $p$-saturations, we introduce the isolated lower central (resp. isolated derived) series of a nilpotent (resp. soluble) $p$-valuable group of finite rank, and use this to study the conjugation action of $\mathrm{nio}(G)$ on $\mathbf{FN}_p(G)$. We emerge with a structure theorem for $G$, $$1 \leq Δ^+ \leq Δ\leq \mathbf{FN}_p(G) \leq \mathrm{nio}(G) \leq G,$$ in which the various quotients of this series of groups are well understood. This sheds light on the ideal structure of the Iwasawa algebras (i.e. the completed group rings $kG$) of such groups, and will be used in future work to study the prime ideals of these rings.
△ Less
Submitted 10 August, 2016;
originally announced August 2016.
-
The Atmosphere of Pluto as Observed by New Horizons
Authors:
G. Randall Gladstone,
S. Alan Stern,
Kimberly Ennico,
Catherine B. Olkin,
Harold A. Weaver,
Leslie A. Young,
Michael E. Summers,
Darrell F. Strobel,
David P. Hinson,
Joshua A. Kammer,
Alex H. Parker,
Andrew J. Steffl,
Ivan R. Linscott,
Joel Wm. Parker,
Andrew F. Cheng,
David C. Slater,
Maarten H. Versteeg,
Thomas K. Greathouse,
Kurt D. Retherford,
Henry Throop,
Nathaniel J. Cunningham,
William W. Woods,
Kelsi N. Singer,
Constantine C. C. Tsang,
Rebecca Schindhelm
, et al. (9 additional authors not shown)
Abstract:
Observations made during the New Horizons flyby provide a detailed snapshot of the current state of Pluto's atmosphere. While the lower atmosphere (at altitudes <200 km) is consistent with ground-based stellar occultations, the upper atmosphere is much colder and more compact than indicated by pre-encounter models. Molecular nitrogen (N$_2$) dominates the atmosphere (at altitudes <1800 km or so),…
▽ More
Observations made during the New Horizons flyby provide a detailed snapshot of the current state of Pluto's atmosphere. While the lower atmosphere (at altitudes <200 km) is consistent with ground-based stellar occultations, the upper atmosphere is much colder and more compact than indicated by pre-encounter models. Molecular nitrogen (N$_2$) dominates the atmosphere (at altitudes <1800 km or so), while methane (CH$_4$), acetylene (C$_2$H$_2$), ethylene (C$_2$H$_4$), and ethane (C$_2$H$_6$) are abundant minor species, and likely feed the production of an extensive haze which encompasses Pluto. The cold upper atmosphere shuts off the anticipated enhanced-Jeans, hydrodynamic-like escape of Pluto's atmosphere to space. It is unclear whether the current state of Pluto's atmosphere is representative of its average state--over seasonal or geologic time scales.
△ Less
Submitted 18 April, 2016;
originally announced April 2016.
-
The Pluto system: Initial results from its exploration by New Horizons
Authors:
S. A. Stern,
F. Bagenal,
K. Ennico,
G. R. Gladstone,
W. M. Grundy,
W. B. McKinnon,
J. M. Moore,
C. B. Olkin,
J. R. Spencer,
H. A. Weaver,
L. A. Young,
T. Andert,
J. Andrews,
M. Banks,
B. Bauer,
J. Bauman,
O. S. Barnouin,
P. Bedini,
K. Beisser,
R. A. Beyer,
S. Bhaskaran,
R. P. Binzel,
E. Birath,
M. Bird,
D. J. Bogan
, et al. (126 additional authors not shown)
Abstract:
The Pluto system was recently explored by NASA's New Horizons spacecraft, making closest approach on 14 July 2015. Pluto's surface displays diverse landforms, terrain ages, albedos, colors, and composition gradients. Evidence is found for a water-ice crust, geologically young surface units, surface ice convection, wind streaks, volatile transport, and glacial flow. Pluto's atmosphere is highly ext…
▽ More
The Pluto system was recently explored by NASA's New Horizons spacecraft, making closest approach on 14 July 2015. Pluto's surface displays diverse landforms, terrain ages, albedos, colors, and composition gradients. Evidence is found for a water-ice crust, geologically young surface units, surface ice convection, wind streaks, volatile transport, and glacial flow. Pluto's atmosphere is highly extended, with trace hydrocarbons, a global haze layer, and a surface pressure near 10 microbars. Pluto's diverse surface geology and long-term activity raise fundamental questions about how small planets remain active many billions of years after formation. Pluto's large moon Charon displays tectonics and evidence for a heterogeneous crustal composition, its north pole displays puzzling dark terrain. Small satellites Hydra and Nix have higher albedos than expected.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
CO$_2$ dissolution in a background hydrological flow
Authors:
H. Juliette T. Unwin,
Garth N. Wells,
Andrew W. Woods
Abstract:
We investigate the long time steady-state dissolution of CO$_{2}$ in a deep saline aqquifer in the presence of a background hydrological flow. In steady-state, the distribution of CO$_2$ in the groundwater upstream of the aquifer involves a balance between three competing effects: (i) the buoyancy-driven flow of CO$_2$ saturated water; (ii) the diffusion of CO$_2$ from saturated to under-saturated…
▽ More
We investigate the long time steady-state dissolution of CO$_{2}$ in a deep saline aqquifer in the presence of a background hydrological flow. In steady-state, the distribution of CO$_2$ in the groundwater upstream of the aquifer involves a balance between three competing effects: (i) the buoyancy-driven flow of CO$_2$ saturated water; (ii) the diffusion of CO$_2$ from saturated to under-saturated water; and (iii) the advection associated with the oncoming background flow. This leads to three limiting regimes. In the limit of very slow diffusion, a nearly static intrusion of dense fluid may extend a finite distance upstream, balanced by the pressure gradient associated with the oncoming background flow. In the limit of fast diffusion relative to the flow, a gradient zone may become established in which the along aquifer diffusive flux balances the advection associated with the background flow. However, if the buoyancy-driven flow speed exceeds the background hydrological flow speed, then a third, intermediate regime may become established. In this regime, a convective recirculation develops upstream of the anticline involving the vertical diffusion of CO$_2$ from an upstream propagating flow of dense CO$_2$ saturated water into the downstream propagating flow of CO$_2$ unsaturated water. For each limiting case, we find analytical solutions for the distribution of CO$_2$ upstream of the anticline, and test our analysis with full numerical simulations. A key result is that, although there may be very different controls on the distribution and extent of CO$_2$ bearing water upstream of the anticline, in each case the dissolution rate is given by the product of the background volume flux and the difference in concentration between the CO$_2$ saturated water and the original aquifer water upstream.
△ Less
Submitted 16 October, 2015; v1 submitted 14 June, 2015;
originally announced June 2015.
-
An equivariant covering map from the upper half plane to the complex plane minus a lattice
Authors:
Marjorie Batchelor,
Polly Brownlee,
William Woods
Abstract:
This paper studies a covering map phi from the upper half plane to the complex plane with a triangular lattice excised. This map is interesting as it factorises Klein's J invariant. Its derivative has properties which are a slight generalisation of modular functions, and (phi')^6 is a modular function of weight 12. There is a homomorphism from the modular group Gamma to the affine transformations…
▽ More
This paper studies a covering map phi from the upper half plane to the complex plane with a triangular lattice excised. This map is interesting as it factorises Klein's J invariant. Its derivative has properties which are a slight generalisation of modular functions, and (phi')^6 is a modular function of weight 12. There is a homomorphism from the modular group Gamma to the affine transformations of the complex plane which preserve the excised lattice. With respect to this action phi is a map of Gamma-sets. Identification of the excised lattice with the root lattice of sl_3(C) allows functions familiar from the study of modular functions to be expressed in terms of standard constructions on representations of sl_3(C).
△ Less
Submitted 23 March, 2012;
originally announced March 2012.
-
Femtosecond Diffractive Imaging with a Soft-X-ray Free-Electron Laser
Authors:
Henry N. Chapman,
Anton Barty,
Michael J. Bogan,
Sebastien Boutet,
Matthias Frank,
Stefan P. Hau-Riege,
Stefano Marchesini,
Bruce W. Woods,
Sasa Bajt,
W. Henry Benner,
Richard A. London,
Elke Plonjes,
Marion Kuhlmann,
Rolf Treusch,
Stefan Dusterer,
Thomas Tschentscher,
Jochen R. Schneider,
Eberhard Spiller,
Thomas Moller,
Christoph Bostedt,
Matthias Hoener,
David A. Shapiro,
Keith O. Hodgson,
David van der Spoel,
Florian Burmeister
, et al. (9 additional authors not shown)
Abstract:
Theory predicts that with an ultrashort and extremely bright coherent X-ray pulse, a single diffraction pattern may be recorded from a large macromolecule, a virus, or a cell before the sample explodes and turns into a plasma. Here we report the first experimental demonstration of this principle using the FLASH soft X-ray free-electron laser. An intense 25 fs, 4 10^13 W/cm^2 pulse, containing 10…
▽ More
Theory predicts that with an ultrashort and extremely bright coherent X-ray pulse, a single diffraction pattern may be recorded from a large macromolecule, a virus, or a cell before the sample explodes and turns into a plasma. Here we report the first experimental demonstration of this principle using the FLASH soft X-ray free-electron laser. An intense 25 fs, 4 10^13 W/cm^2 pulse, containing 10^12 photons at 32 nm wavelength, produced a coherent diffraction pattern from a nano-structured non-periodic object, before destroying it at 60,000 K. A novel X-ray camera assured single photon detection sensitivity by filtering out parasitic scattering and plasma radiation. The reconstructed image, obtained directly from the coherent pattern by phase retrieval through oversampling, shows no measurable damage, and extends to diffraction-limited resolution. A three-dimensional data set may be assembled from such images when copies of a reproducible sample are exposed to the beam one by one.
△ Less
Submitted 10 October, 2006; v1 submitted 7 October, 2006;
originally announced October 2006.