-
Terahertz and gigahertz magneto-ratchets in graphene-based 2D metamaterials
Authors:
Marcel Hild,
Erwin Mönch,
Leonid E. Golub,
Ivan A. Dmitriev,
Ivan Yahniuk,
Katharina Amann,
Julia Amann,
Jonathan Eroms,
Jörg Wunderlich,
Dieter Weiss,
Christophe Consejo,
Cedric Bray,
Kenneth Maussang,
Frederic Teppe,
Joanna Gumenjuk-Sichevska,
Kenji Watanabe,
Takashi Taniguchi,
Sergey D. Ganichev
Abstract:
We report on the observation and study of the magneto-ratchet effect in a graphene-based two-dimensional metamaterial formed by a graphite gate that is placed below a graphene monolayer and patterned with an array of triangular antidots. We demonstrate that terahertz/gigahertz excitation of the metamaterial leads to sign-alternating magneto-oscillations with an amplitude that exceeds the ratchet c…
▽ More
We report on the observation and study of the magneto-ratchet effect in a graphene-based two-dimensional metamaterial formed by a graphite gate that is placed below a graphene monolayer and patterned with an array of triangular antidots. We demonstrate that terahertz/gigahertz excitation of the metamaterial leads to sign-alternating magneto-oscillations with an amplitude that exceeds the ratchet current at zero magnetic field by orders of magnitude. The oscillations are shown to be related to the Shubnikov-de Haas effect. In addition to the giant ratchet current oscillations we detect resonant ratchet currents caused by the cyclotron and electron spin resonances. The results are well described by the developed theory considering the magneto-ratchet effect caused by the interplay of the near-field radiation and the nonuniform periodic electrostatic potential of the metamaterial controlled by the gate voltages.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
Circular THz ratchets in a 2D-modulated Dirac system
Authors:
M. Hild,
I. Yahniuk,
L. E. Golub,
J. Amann,
J. Eroms,
D. Weiss,
K. Watanabe,
T. Taniguchi,
S. D. Ganichev
Abstract:
We report on the observation of the circular ratchet effect excited by terahertz laser radiation in a specially designed two-dimensional metamaterial consisting of a graphene monolayer deposited on a graphite gate patterned with an array of triangular antidots. We show that a periodically driven Dirac fermion system with spatial asymmetry converts the a.c. power into a d.c. current, whose directio…
▽ More
We report on the observation of the circular ratchet effect excited by terahertz laser radiation in a specially designed two-dimensional metamaterial consisting of a graphene monolayer deposited on a graphite gate patterned with an array of triangular antidots. We show that a periodically driven Dirac fermion system with spatial asymmetry converts the a.c. power into a d.c. current, whose direction reverses when the radiation helicity is switched. The circular ratchet effect is demonstrated for room temperature and a radiation frequency of 2.54 THz. It is shown that the ratchet current magnitude can be controllably tuned by the patterned and uniform back gate voltages. The results are analyzed in the light of the developed microscopic theory considering electronic and plasmonic mechanisms of the ratchet current formation.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Terahertz ratchet in graphene 2D metamaterial formed by a patterned gate with an antidot arrayd
Authors:
I. Yahniuk,
M. Hild,
L. E. Golub,
J. Amann,
J. Eroms,
D. Weiss,
Wun-Hao Kang,
Ming-Hao Liu,
K. Watanabe,
T. Taniguchi,
S. D. Ganichev
Abstract:
We report the observation of the terahertz-induced ratchet effect in graphene-based two-dimensional (2D) metamaterials. The metamaterial consists of a graphite gate patterned with an array of triangular antidots placed under a graphene monolayer. We show that the ratchet current appears due to the noncentrosymmetry of the periodic structure unit cell. The ratchet current is generated owing to the…
▽ More
We report the observation of the terahertz-induced ratchet effect in graphene-based two-dimensional (2D) metamaterials. The metamaterial consists of a graphite gate patterned with an array of triangular antidots placed under a graphene monolayer. We show that the ratchet current appears due to the noncentrosymmetry of the periodic structure unit cell. The ratchet current is generated owing to the combined action of a spatially periodic in-plane electrostatic potential and a periodically modulated radiation electric field caused by near-field diffraction. The magnitude and direction of the ratchet current are shown to be controlled by voltages applied to both back and patterned gates, which change the lateral asymmetry, carrier type and density. The phenomenological and microscopic theories of ratchet effects in graphene-based 2D metamaterials are developed. The experimental data are discussed in the light of the theory based on the solution of the Boltzmann kinetic equation and the calculated electrostatic potential profile. The theory describes well all the experimental results and shows that the observed ratchet current consists of the Seebeck thermoratchet contribution as well as the linear contribution, which is sensitive to the orientation of the radiation electric field vector with respect to the triangles.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
How to Assess Trustworthy AI in Practice
Authors:
Roberto V. Zicari,
Julia Amann,
Frédérick Bruneault,
Megan Coffee,
Boris Düdder,
Eleanore Hickman,
Alessio Gallucci,
Thomas Krendl Gilbert,
Thilo Hagendorff,
Irmhild van Halem,
Elisabeth Hildt,
Sune Holm,
Georgios Kararigas,
Pedro Kringen,
Vince I. Madai,
Emilie Wiinblad Mathez,
Jesmin Jahan Tithi,
Dennis Vetter,
Magnus Westerlund,
Renee Wurth
Abstract:
This report is a methodological reflection on Z-Inspection$^{\small{\circledR}}$. Z-Inspection$^{\small{\circledR}}$ is a holistic process used to evaluate the trustworthiness of AI-based technologies at different stages of the AI lifecycle. It focuses, in particular, on the identification and discussion of ethical issues and tensions through the elaboration of socio-technical scenarios. It uses t…
▽ More
This report is a methodological reflection on Z-Inspection$^{\small{\circledR}}$. Z-Inspection$^{\small{\circledR}}$ is a holistic process used to evaluate the trustworthiness of AI-based technologies at different stages of the AI lifecycle. It focuses, in particular, on the identification and discussion of ethical issues and tensions through the elaboration of socio-technical scenarios. It uses the general European Union's High-Level Expert Group's (EU HLEG) guidelines for trustworthy AI. This report illustrates for both AI researchers and AI practitioners how the EU HLEG guidelines for trustworthy AI can be applied in practice. We share the lessons learned from conducting a series of independent assessments to evaluate the trustworthiness of AI systems in healthcare. We also share key recommendations and practical suggestions on how to ensure a rigorous trustworthy AI assessment throughout the life-cycle of an AI system.
△ Less
Submitted 28 June, 2022; v1 submitted 20 June, 2022;
originally announced June 2022.
-
KUCST@LT-EDI-ACL2022: Detecting Signs of Depression from Social Media Text
Authors:
Manex Agirrezabal,
Janek Amann
Abstract:
In this paper we present our approach for detecting signs of depression from social media text. Our model relies on word unigrams, part-of-speech tags, readabilitiy measures and the use of first, second or third person and the number of words. Our best model obtained a macro F1-score of 0.439 and ranked 25th, out of 31 teams. We further take advantage of the interpretability of the Logistic Regres…
▽ More
In this paper we present our approach for detecting signs of depression from social media text. Our model relies on word unigrams, part-of-speech tags, readabilitiy measures and the use of first, second or third person and the number of words. Our best model obtained a macro F1-score of 0.439 and ranked 25th, out of 31 teams. We further take advantage of the interpretability of the Logistic Regression model and we make an attempt to interpret the model coefficients with the hope that these will be useful for further research on the topic.
△ Less
Submitted 9 April, 2022;
originally announced April 2022.
-
From meaning to perception -- exploring the space between word and odor perception embeddings
Authors:
Janek Amann,
Manex Agirrezabal
Abstract:
In this paper we propose the use of the Word2vec algorithm in order to obtain odor perception embeddings (or smell embeddings), only using publicly available perfume descriptions. Besides showing meaningful similarity relationships among each other, these embeddings also demonstrate to possess some shared information with their respective word embeddings. The meaningfulness of these embeddings sug…
▽ More
In this paper we propose the use of the Word2vec algorithm in order to obtain odor perception embeddings (or smell embeddings), only using publicly available perfume descriptions. Besides showing meaningful similarity relationships among each other, these embeddings also demonstrate to possess some shared information with their respective word embeddings. The meaningfulness of these embeddings suggests that aesthetics might provide enough constraints for using algorithms motivated by distributional semantics on non-randomly combined data. Furthermore, they provide possibilities for new ways of classifying odors and analyzing perfumes. We have also employed the embeddings in an attempt to understand the aesthetic nature of perfumes, based on the difference between real and randomly generated perfumes. In an additional tentative experiment we explore the possibility of a mapping between the word embedding space and the odor perception embedding space by fitting a regressor on the shared vocabulary and then predict the odor perception embeddings of words without an a priori associated smell, such as night or sky.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring
Authors:
Florian Wilkens,
Steffen Haas,
Johanna Amann,
Mathias Fischer
Abstract:
Internet traffic is increasingly encrypted. While this protects the confidentiality and integrity of communication, it prevents network monitoring systems (NMS) and intrusion detection systems (IDSs) from effectively analyzing the now encrypted payloads. Therefore, many enterprise networks have deployed man-in-the-middle (MitM) proxies that intercept TLS connections at the network border to examin…
▽ More
Internet traffic is increasingly encrypted. While this protects the confidentiality and integrity of communication, it prevents network monitoring systems (NMS) and intrusion detection systems (IDSs) from effectively analyzing the now encrypted payloads. Therefore, many enterprise networks have deployed man-in-the-middle (MitM) proxies that intercept TLS connections at the network border to examine packet payloads and thus retain some visibility. However, recent studies have shown that TLS interception often reduces connection security and potentially introduces additional attack vectors to the network. In this paper, we present a cooperative approach in which end-hosts as cryptographic endpoints selectively provide TLS key material to NMS for decryption. This enables endpoints to control who can decrypt which content and lets users retain privacy for chosen connections. We implement a prototype based on the Zeek NMS that is able to receive key material from hosts, decrypt TLS connections and perform analyzes on the cleartext. The patch is freely available and we plan to upstream our changes to Zeek once they are mature enough. In our evaluation, we discuss how our approach conceptually requires significantly less computational resources compared to the commonly deployed MitM proxies. Our experimental results indicate, that TLS decryption increases a runtime overhead of about 2.5 times of the original runtime on cleartext. Additionally, we show that the latency for transmitting keys between hosts and the NMS can be effectively addressed by buffering traffic at the NMS for at least 40ms, allowing successful decryption of 99.99% of all observed TLS connections.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Counterintuitive gate dependence of weak antilocalization in bilayer graphene/WSe$_2$ heterostructures
Authors:
Julia Amann,
Tobias Völkl,
Tobias Rockinger,
Denis Kochan,
Kenji Watanabe,
Takashi Taniguchi,
Jaroslav Fabian,
Dieter Weiss,
Jonathan Eroms
Abstract:
Strong gate control of proximity-induced spin-orbit coupling was recently predicted in bilayer graphene/transition metal dichalcogenides (BLG/TMDC) heterostructures, as charge carriers can easily be shifted between the two graphene layers, and only one of them is in close contact to the TMDC. The presence of spin-orbit coupling can be probed by weak antilocalization (WAL) in low field magnetotrans…
▽ More
Strong gate control of proximity-induced spin-orbit coupling was recently predicted in bilayer graphene/transition metal dichalcogenides (BLG/TMDC) heterostructures, as charge carriers can easily be shifted between the two graphene layers, and only one of them is in close contact to the TMDC. The presence of spin-orbit coupling can be probed by weak antilocalization (WAL) in low field magnetotransport measurements. When the spin-orbit splitting in such a heterostructure increases with the out of plane electric displacement field $\bar D$, one intuitively expects a concomitant increase of WAL visibility. Our experiments show that this is not the case. Instead, we observe a maximum of WAL visibility around $\bar D=0$. This counterintuitive behaviour originates in the intricate dependence of WAL in graphene on symmetric and antisymmetric spin lifetimes, caused by the valley-Zeeman and Rashba terms, respectively. Our observations are confirmed by calculating spin precession and spin lifetimes from an $8\times 8$ model Hamiltonian of BLG/TMDC.
△ Less
Submitted 18 March, 2022; v1 submitted 10 December, 2020;
originally announced December 2020.
-
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
Authors:
Jens Hiller,
Johanna Amann,
Oliver Hohlfeld
Abstract:
Public Key Infrastructures (PKIs) with their trusted Certificate Authorities (CAs) provide the trust backbone for the Internet: CAs sign certificates which prove the identity of servers, applications, or users. To be trusted by operating systems and browsers, a CA has to undergo lengthy and costly validation processes. Alternatively, trusted CAs can cross-sign other CAs to extend their trust to th…
▽ More
Public Key Infrastructures (PKIs) with their trusted Certificate Authorities (CAs) provide the trust backbone for the Internet: CAs sign certificates which prove the identity of servers, applications, or users. To be trusted by operating systems and browsers, a CA has to undergo lengthy and costly validation processes. Alternatively, trusted CAs can cross-sign other CAs to extend their trust to them. In this paper, we systematically analyze the present and past state of cross-signing in the Web PKI. Our dataset (derived from passive TLS monitors and public CT logs) encompasses more than 7 years and 225 million certificates with 9.3 billion trust paths. We show benefits and risks of cross-signing. We discuss the difficulty of revoking trusted CA certificates where, worrisome, cross-signing can result in valid trust paths to remain after revocation; a problem for non-browser software that often blindly trusts all CA certificates and ignores revocations. However, cross-signing also enables fast bootstrapping of new CAs, e.g., Let's Encrypt, and achieves a non-disruptive user experience by providing backward compatibility. In this paper, we propose new rules and guidance for cross-signing to preserve its positive potential while mitigating its risks.
△ Less
Submitted 18 September, 2020;
originally announced September 2020.
-
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web
Authors:
Ralph Holz,
Diego Perino,
Matteo Varvello,
Johanna Amann,
Andrea Continella,
Nate Evans,
Ilias Leontiadis,
Christopher Natoli,
Quirin Scheitle
Abstract:
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code and developed defenses. However, previous work did not establish how many users were really exposed to the identified mining sites and whether there was a real ri…
▽ More
In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code and developed defenses. However, previous work did not establish how many users were really exposed to the identified mining sites and whether there was a real risk given common user browsing behavior. In this paper, we present a retroactive analysis to close this research gap. We pool large-scale, longitudinal data from several vantage points, gathered during the prime time of illicit cryptomining, to measure the impact on web users. We leverage data from passive traffic monitoring of university networks and a large European ISP, with suspected mining sites identified in previous active scans. We corroborate our results with data from a browser extension with a large user base that tracks site visits. We also monitor open HTTP proxies and the Tor network for malicious injection of code. We find that the risk for most Web users was always very low, much lower than what deployment scans suggested. Any exposure period was also very brief. However, we also identify a previously unknown and exploited attack vector on mobile devices.
△ Less
Submitted 25 June, 2020; v1 submitted 27 April, 2020;
originally announced April 2020.
-
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods
Authors:
Ralph Holz,
Johanna Amann,
Abbas Razaghpanah,
Narseo Vallina-Rodriguez
Abstract:
TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic primitives, and new features to improve performance, among other things. In this paper, we conduct the first study of TLS 1.3 deployment and use since its standardization by the IETF. We use active scans to measure…
▽ More
TLS 1.3 marks a significant departure from previous versions of the Transport Layer Security protocol (TLS). The new version offers a simplified protocol flow, more secure cryptographic primitives, and new features to improve performance, among other things. In this paper, we conduct the first study of TLS 1.3 deployment and use since its standardization by the IETF. We use active scans to measure deployment across more than 275M domains, including nearly 90M country-code top-level domains. We establish and investigate the critical contribution that hosting services and CDNs make to the fast, initial uptake of the protocol. We use passive monitoring at two positions on the globe to determine the degree to which users profit from the new protocol and establish the usage of its new features. Finally, we exploit data from a widely deployed measurement app in the Android ecosystem to analyze the use of TLS 1.3 in mobile networks and in mobile browsers. Our study shows that TLS 1.3 enjoys enormous support even in its early days, unprecedented for any TLS version. However, this is strongly related to very few global players pushing it into the market and sustaining its growth.
△ Less
Submitted 6 August, 2019; v1 submitted 30 July, 2019;
originally announced July 2019.
-
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
Authors:
Quirin Scheitle,
Oliver Gasser,
Theodor Nolte,
Johanna Amann,
Lexi Brent,
Georg Carle,
Ralph Holz,
Thomas C. Schmidt,
Matthias Wählisch
Abstract:
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment o…
▽ More
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
Authors:
Ralph Holz,
Johanna Amann,
Olivier Mehani,
Matthias Wachs,
Mohamed Ali Kaafar
Abstract:
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable fashion. These protocols can be secured by providing encryption with the use of TLS---directly or via the STARTTLS extension---and leverage X.509 PKIs…
▽ More
The majority of electronic communication today happens either via email or chat. Thanks to the use of standardised protocols electronic mail (SMTP, IMAP, POP3) and instant chat (XMPP, IRC) servers can be deployed in a decentralised but interoperable fashion. These protocols can be secured by providing encryption with the use of TLS---directly or via the STARTTLS extension---and leverage X.509 PKIs or ad hoc methods to authenticate communication peers. However, many combination of these mechanisms lead to insecure deployments.
We present the largest study to date that investigates the security of the email and chat infrastructures. We used active Internet-wide scans to determine the amount of secure service deployments, and passive monitoring to investigate if user agents actually use this opportunity to secure their communications. We addressed both the client-to-server interactions as well as server-to-server forwarding mechanisms that these protocols offer, and the use of encryption and authentication methods in the process.
Our findings shed light on an insofar unexplored area of the Internet. The truly frightening result is that most of our communication is poorly secured in transit.
△ Less
Submitted 24 January, 2016; v1 submitted 1 November, 2015;
originally announced November 2015.
-
Present status and first results of the final focus beam line at the KEK Accelerator Test Facility
Authors:
P. Bambade,
M. Alabau Pons,
J. Amann,
D. Angal-Kalinin,
R. Apsimon,
S. Araki,
A. Aryshev,
S. Bai,
P. Bellomo,
D. Bett,
G. Blair,
B. Bolzon,
S. Boogert,
G. Boorman,
P. N. Burrows,
G. Christian,
P. Coe,
B. Constance,
Jean-Pierre Delahaye,
L. Deacon,
E. Elsen,
A. Faus-Golfe,
M. Fukuda,
J. Gao,
N. Geffroy
, et al. (69 additional authors not shown)
Abstract:
ATF2 is a final-focus test beam line which aims to focus the low emittance beam from the ATF damping ring to a vertical size of about 37 nm and to demonstrate nanometer level beam stability. Several advanced beam diagnostics and feedback tools are used. In December 2008, construction and installation were completed and beam commissioning started, supported by an international team of Asian, Europe…
▽ More
ATF2 is a final-focus test beam line which aims to focus the low emittance beam from the ATF damping ring to a vertical size of about 37 nm and to demonstrate nanometer level beam stability. Several advanced beam diagnostics and feedback tools are used. In December 2008, construction and installation were completed and beam commissioning started, supported by an international team of Asian, European, and U.S. scientists. The present status and first results are described.
△ Less
Submitted 5 July, 2012;
originally announced July 2012.
-
Analysis of large-scale anisotropy of ultra-high energy cosmic rays in HiRes data
Authors:
R. U. Abbasi,
T. Abu-Zayyad,
M. Allen,
J. F. Amann,
G. Archbold,
K. Belov,
J. W. Belz,
D. R. Bergman,
S. A. Blake,
O. A. Brusova,
G. W. Burt,
C. Cannon,
Z. Cao,
W. Deng,
Y. Fedorova,
J. Findlay,
C. B. Finley,
R. C. Gray,
W. F. Hanlon,
C. M. Hoffman,
M. H. Holzscheiter,
G. Hughes,
P. Hüntemeyer,
D. Ivanov,
B. F Jones
, et al. (37 additional authors not shown)
Abstract:
Stereo data collected by the HiRes experiment over a six year period are examined for large-scale anisotropy related to the inhomogeneous distribution of matter in the nearby Universe. We consider the generic case of small cosmic-ray deflections and a large number of sources tracing the matter distribution. In this matter tracer model the expected cosmic ray flux depends essentially on a single…
▽ More
Stereo data collected by the HiRes experiment over a six year period are examined for large-scale anisotropy related to the inhomogeneous distribution of matter in the nearby Universe. We consider the generic case of small cosmic-ray deflections and a large number of sources tracing the matter distribution. In this matter tracer model the expected cosmic ray flux depends essentially on a single free parameter, the typical deflection angle theta. We find that the HiRes data with threshold energies of 40 EeV and 57 EeV are incompatible with the matter tracer model at a 95% confidence level unless theta is larger than 10 degrees and are compatible with an isotropic flux. The data set above 10 EeV is compatible with both the matter tracer model and an isotropic flux.
△ Less
Submitted 7 February, 2010;
originally announced February 2010.
-
Measurement of the Flux of Ultra High Energy Cosmic Rays by the Stereo Technique
Authors:
R. U. Abbasi,
T. Abu-Zayyad,
M. Al-Seady,
M. Allen,
J. F. Amann,
G. Archbold,
K. Belov,
J. W. Belz,
D. R. Bergman,
S. A. Blake,
O. A. Brusova,
G. W. Burt,
C. Cannon,
Z. Cao,
W. Deng,
Y. Fedorova,
J. Findlay,
C. B. Finley,
R. C. Gray,
W. F. Hanlon,
C. M. Hoffman,
M. H. Holzscheiter,
G. Hughes,
P. Huntemeyer,
D. Ivanov
, et al. (38 additional authors not shown)
Abstract:
The High Resolution Fly's Eye experiment has measured the flux of ultrahigh energy cosmic rays using the stereoscopic air fluorescence technique. The HiRes experiment consists of two detectors that observe cosmic ray showers via the fluorescence light they emit. HiRes data can be analyzed in monocular mode, where each detector is treated separately, or in stereoscopic mode where they are conside…
▽ More
The High Resolution Fly's Eye experiment has measured the flux of ultrahigh energy cosmic rays using the stereoscopic air fluorescence technique. The HiRes experiment consists of two detectors that observe cosmic ray showers via the fluorescence light they emit. HiRes data can be analyzed in monocular mode, where each detector is treated separately, or in stereoscopic mode where they are considered together. Using the monocular mode the HiRes collaboration measured the cosmic ray spectrum and made the first observation of the Greisen-Zatsepin-Kuzmin cutoff. In this paper we present the cosmic ray spectrum measured by the stereoscopic technique. Good agreement is found with the monocular spectrum in all details.
△ Less
Submitted 28 April, 2009;
originally announced April 2009.
-
An upper limit on the electron-neutrino flux from the HiRes detector
Authors:
R. U. Abbasi,
T. Abu-Zayyad,
M. Allen,
J. F. Amann,
G. Archbold,
K. Belov,
J. W. Belz,
S. Y. Ben Zvi,
D. R. Bergman,
A. Biesiadecka,
S. A. Blake,
J. H. Boyer,
O. A. Brusova,
G. W. Burt,
C. Cannon,
Z. Cao,
W. Deng,
Y. Fedorova,
J. Findlay,
C. B. Finley,
R. C. Gray,
W. F. Hanlon,
C. M. Hoffman,
M. H. Holzscheiter,
G. Hughes
, et al. (42 additional authors not shown)
Abstract:
Air-fluorescence detectors such as the High Resolution Fly's Eye (HiRes) detector are very sensitive to upward-going, Earth-skimming ultrahigh energy electron-neutrino-induced showers. This is due to the relatively large interaction cross sections of these high-energy neutrinos and to the Landau-Pomeranchuk-Migdal (LPM) effect. The LPM effect causes a significant decrease in the cross sections f…
▽ More
Air-fluorescence detectors such as the High Resolution Fly's Eye (HiRes) detector are very sensitive to upward-going, Earth-skimming ultrahigh energy electron-neutrino-induced showers. This is due to the relatively large interaction cross sections of these high-energy neutrinos and to the Landau-Pomeranchuk-Migdal (LPM) effect. The LPM effect causes a significant decrease in the cross sections for bremsstrahlung and pair production, allowing charged-current electron-neutrino-induced showers occurring deep in the Earth's crust to be detectable as they exit the Earth into the atmosphere. A search for upward-going neutrino-induced showers in the HiRes-II monocular dataset has yielded a null result. From an LPM calculation of the energy spectrum of charged particles as a function of primary energy and depth for electron-induced showers in rock, we calculate the shape of the resulting profile of these showers in air. We describe a full detector Monte Carlo simulation to determine the detector response to upward-going electron-neutrino-induced cascades and present an upper limit on the flux of electron-neutrinos.
△ Less
Submitted 3 June, 2008; v1 submitted 4 March, 2008;
originally announced March 2008.