-
Leveraging LLM Inconsistency to Boost Pass@k Performance
Authors:
Uri Dalal,
Meirav Segal,
Zvika Ben-Haim,
Dan Lahav,
Omer Nevo
Abstract:
Large language models (LLMs) achieve impressive abilities in numerous domains, but exhibit inconsistent performance in response to minor input changes. Rather than view this as a drawback, in this paper we introduce a novel method for leveraging models' inconsistency to boost Pass@k performance. Specifically, we present a "Variator" agent that generates k variants of a given task and submits one c…
▽ More
Large language models (LLMs) achieve impressive abilities in numerous domains, but exhibit inconsistent performance in response to minor input changes. Rather than view this as a drawback, in this paper we introduce a novel method for leveraging models' inconsistency to boost Pass@k performance. Specifically, we present a "Variator" agent that generates k variants of a given task and submits one candidate solution for each one. Our variant generation approach is applicable to a wide range of domains as it is task agnostic and compatible with free-form inputs. We demonstrate the efficacy of our agent theoretically using a probabilistic model of the inconsistency effect, and show empirically that it outperforms the baseline on the APPS dataset. Furthermore, we establish that inconsistency persists even in frontier reasoning models across coding and cybersecurity domains, suggesting our method is likely to remain relevant for future model generations.
△ Less
Submitted 20 May, 2025; v1 submitted 19 May, 2025;
originally announced May 2025.
-
What Makes an Evaluation Useful? Common Pitfalls and Best Practices
Authors:
Gil Gekker,
Meirav Segal,
Dan Lahav,
Omer Nevo
Abstract:
Following the rapid increase in Artificial Intelligence (AI) capabilities in recent years, the AI community has voiced concerns regarding possible safety risks. To support decision-making on the safe use and development of AI systems, there is a growing need for high-quality evaluations of dangerous model capabilities. While several attempts to provide such evaluations have been made, a clear defi…
▽ More
Following the rapid increase in Artificial Intelligence (AI) capabilities in recent years, the AI community has voiced concerns regarding possible safety risks. To support decision-making on the safe use and development of AI systems, there is a growing need for high-quality evaluations of dangerous model capabilities. While several attempts to provide such evaluations have been made, a clear definition of what constitutes a "good evaluation" has yet to be agreed upon. In this practitioners' perspective paper, we present a set of best practices for safety evaluations, drawing on prior work in model evaluation and illustrated through cybersecurity examples. We first discuss the steps of the initial thought process, which connects threat modeling to evaluation design. Then, we provide the characteristics and parameters that make an evaluation useful. Finally, we address additional considerations as we move from building specific evaluations to building a full and comprehensive evaluation suite.
△ Less
Submitted 30 March, 2025;
originally announced March 2025.
-
Provable Imbalanced Point Clustering
Authors:
David Denisov,
Dan Feldman,
Shlomi Dolev,
Michael Segal
Abstract:
We suggest efficient and provable methods to compute an approximation for imbalanced point clustering, that is, fitting $k$-centers to a set of points in $\mathbb{R}^d$, for any $d,k\geq 1$. To this end, we utilize \emph{coresets}, which, in the context of the paper, are essentially weighted sets of points in $\mathbb{R}^d$ that approximate the fitting loss for every model in a given set, up to a…
▽ More
We suggest efficient and provable methods to compute an approximation for imbalanced point clustering, that is, fitting $k$-centers to a set of points in $\mathbb{R}^d$, for any $d,k\geq 1$. To this end, we utilize \emph{coresets}, which, in the context of the paper, are essentially weighted sets of points in $\mathbb{R}^d$ that approximate the fitting loss for every model in a given set, up to a multiplicative factor of $1\pm\varepsilon$. We provide [Section 3 and Section E in the appendix] experiments that show the empirical contribution of our suggested methods for real images (novel and reference), synthetic data, and real-world data. We also propose choice clustering, which by combining clustering algorithms yields better performance than each one separately.
△ Less
Submitted 12 March, 2025; v1 submitted 26 August, 2024;
originally announced August 2024.
-
Epidemiology, Trajectories and Outcomes of Acute Kidney Injury Among Hospitalized Patients: A Retrospective Multicenter Large Cohort Study
Authors:
Esra Adiyeke,
Yuanfang Ren,
Shmuel Fogel,
Parisa Rashidi,
Mark Segal,
Elizabeth A. Shenkman,
Azra Bihorac,
Tezcan Ozrazgat-Baslanti
Abstract:
Background: Acute kidney injury (AKI) is a clinical syndrome affecting almost one fifth of hospitalized patients, as well as more than half of the patients who are admitted to the intensive care unit (ICU). Stratifying AKI patients into groups based on severity and duration would facilitate more targeted efforts for treating AKI. Methods: In a retrospective, multicenter and longitudinal cohort stu…
▽ More
Background: Acute kidney injury (AKI) is a clinical syndrome affecting almost one fifth of hospitalized patients, as well as more than half of the patients who are admitted to the intensive care unit (ICU). Stratifying AKI patients into groups based on severity and duration would facilitate more targeted efforts for treating AKI. Methods: In a retrospective, multicenter and longitudinal cohort study of 935,679 patients who were admitted between 2012 and 2020 to health centers included in OneFlorida+ Network, we analyzed the impact of AKI trajectories which are rapidly reversed AKI, persistent AKI with renal recovery, and persistent AKI without renal recovery on patients' clinical outcomes, including hospital, 30-day, 1-year, and 3-year mortality, kidney replacement therapy, new chronic kidney disease (CKD) within 90 days or 1-year of discharge, CKD progression within 1-year of discharge, resource utilization, hospital disposition, and major complications during hospitalization. As analytical approaches, Kaplan-Meier estimators and survival curves, Cox proportional-hazards regression model, logistic regression model, Kruskal-Wallis test, analysis of variance, chi-square, Fisher's exact test were used. Results: Among 2,187,254 encounters, 14% had AKI, of which 63%, 21%, and 16% had Stage 1, 2, and 3, respectively, as the worst AKI stage. Fraction of patients with persistent AKI was 31%. Patients with AKI had worse clinical outcomes and increased resource utilization compared to patients without the condition. One-year mortality was 5 times greater for patients with persistent AKI compared to those without AKI. Conclusions: Persistent AKI was associated with prolonged hospitalization, increased ICU admission and mortality compared to the other groups. This may emphasize the critical need for devising strategies targeting effective management of AKI and prevention of persisting AKI.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Uncertainty-aware predictions of molecular X-ray absorption spectra using neural network ensembles
Authors:
Animesh Ghose,
Mikhail Segal,
Fanchen Meng,
Zhu Liang,
Mark S. Hybertsen,
Xiaohui Qu,
Eli Stavitski,
Shinjae Yoo,
Deyu Lu,
Matthew R. Carbone
Abstract:
As machine learning (ML) methods continue to be applied to a broad scope of problems in the physical sciences, uncertainty quantification is becoming correspondingly more important for their robust application. Uncertainty aware machine learning methods have been used in select applications, but largely for scalar properties. In this work, we showcase an exemplary study in which neural network ens…
▽ More
As machine learning (ML) methods continue to be applied to a broad scope of problems in the physical sciences, uncertainty quantification is becoming correspondingly more important for their robust application. Uncertainty aware machine learning methods have been used in select applications, but largely for scalar properties. In this work, we showcase an exemplary study in which neural network ensembles are used to predict the X-ray absorption spectra of small molecules, as well as their point-wise uncertainty, from local atomic environments. The performance of the resulting surrogate clearly demonstrates quantitative correlation between errors relative to ground truth and the predicted uncertainty estimates. Significantly, the model provides an upper bound on the expected error. Specifically, an important quality of this uncertainty-aware model is that it can indicate when the model is predicting on out-of-sample data. This allows for its integration with large scale sampling of structures together with active learning or other techniques for structure refinement. Additionally, our models can be generalized to larger molecules than those used for training, and also successfully track uncertainty due to random distortions in test molecules. While we demonstrate this workflow on a specific example, ensemble learning is completely general. We believe it could have significant impact on ML-enabled forward modeling of a broad array of molecular and materials properties.
△ Less
Submitted 21 January, 2023; v1 submitted 1 October, 2022;
originally announced October 2022.
-
Opinion Spam Detection: A New Approach Using Machine Learning and Network-Based Algorithms
Authors:
Kiril Danilchenko,
Michael Segal,
Dan Vilenchik
Abstract:
E-commerce is the fastest-growing segment of the economy. Online reviews play a crucial role in helping consumers evaluate and compare products and services. As a result, fake reviews (opinion spam) are becoming more prevalent and negatively impacting customers and service providers. There are many reasons why it is hard to identify opinion spammers automatically, including the absence of reliable…
▽ More
E-commerce is the fastest-growing segment of the economy. Online reviews play a crucial role in helping consumers evaluate and compare products and services. As a result, fake reviews (opinion spam) are becoming more prevalent and negatively impacting customers and service providers. There are many reasons why it is hard to identify opinion spammers automatically, including the absence of reliable labeled data. This limitation precludes an off-the-shelf application of a machine learning pipeline. We propose a new method for classifying reviewers as spammers or benign, combining machine learning with a message-passing algorithm that capitalizes on the users' graph structure to compensate for the possible scarcity of labeled data. We devise a new way of sampling the labels for the training step (active learning), replacing the typical uniform sampling. Experiments on three large real-world datasets from Yelp.com show that our method outperforms state-of-the-art active learning approaches and also machine learning methods that use a much larger set of labeled data for training.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
A user-friendly tool to convert photon counting data to the open-source Photon-HDF5 file format
Authors:
Donald Ferschweiler,
Maya Segal,
Shimon Weiss,
Xavier Michalet
Abstract:
Photon-HDF5 is an open-source and open file format for storing photon-counting data from single molecule microscopy experiments, introduced to simplify data exchange and increase the reproducibility of data analysis. Part of the Photon-HDF5 ecosystem, is phconvert, an extensible python library that allows converting proprietary formats into Photon-HDF5 files. However, its use requires some profici…
▽ More
Photon-HDF5 is an open-source and open file format for storing photon-counting data from single molecule microscopy experiments, introduced to simplify data exchange and increase the reproducibility of data analysis. Part of the Photon-HDF5 ecosystem, is phconvert, an extensible python library that allows converting proprietary formats into Photon-HDF5 files. However, its use requires some proficiency with command line instructions, the python programming language, and the YAML markup format. This creates a significant barrier for potential users without that expertise, but who want to benefit from the advantages of releasing their files in an open format. In this work, we present a GUI that lowers this barrier, thus simplifying the use of Photon-HDF5. This tool uses the phconvert python library to convert data files originally saved in proprietary data formats to Photon-HDF5 files, without users having to write a single line of code. Because reproducible analyses depend on essential experimental information, such as laser power or sample description, the GUI also includes (currently limited) functionality to associate valid metadata with the converted file, without having to write any YAML. Finally, the GUI includes several productivity-enhancing features such as whole-directory batch conversion and the ability to re-run a failed batch, only converting the files that could not be converted in the previous run.
△ Less
Submitted 18 March, 2022;
originally announced March 2022.
-
On Meritocracy in Optimal Set Selection
Authors:
Thomas Kleine Buening,
Meirav Segal,
Debabrota Basu,
Christos Dimitrakakis,
Anne-Marie George
Abstract:
Typically, merit is defined with respect to some intrinsic measure of worth. We instead consider a setting where an individual's worth is \emph{relative}: when a Decision Maker (DM) selects a set of individuals from a population to maximise expected utility, it is natural to consider the \emph{Expected Marginal Contribution} (EMC) of each person to the utility. We show that this notion satisfies a…
▽ More
Typically, merit is defined with respect to some intrinsic measure of worth. We instead consider a setting where an individual's worth is \emph{relative}: when a Decision Maker (DM) selects a set of individuals from a population to maximise expected utility, it is natural to consider the \emph{Expected Marginal Contribution} (EMC) of each person to the utility. We show that this notion satisfies an axiomatic definition of fairness for this setting. We also show that for certain policy structures, this notion of fairness is aligned with maximising expected utility, while for linear utility functions it is identical to the Shapley value. However, for certain natural policies, such as those that select individuals with a specific set of attributes (e.g. high enough test scores for college admissions), there is a trade-off between meritocracy and utility maximisation. We analyse the effect of constraints on the policy on both utility and fairness in extensive experiments based on college admissions and outcomes in Norwegian universities.
△ Less
Submitted 9 September, 2022; v1 submitted 23 February, 2021;
originally announced February 2021.
-
Construction and Maintenance of Swarm Drones
Authors:
Kiril Danilchenko,
Michael Segal
Abstract:
In this paper we study the dynamic version of the covering problem motivated by the coverage of drones' swarm: Let $S$ be a set of $n$ non-negative weighted points in the plane representing users. Also, consider a set $P$ of $m$ disks that correspond to the covering radius of each drone. We want to place (and maintain) set $P$ such that the sum of the weights of the points in $S$ covered by disks…
▽ More
In this paper we study the dynamic version of the covering problem motivated by the coverage of drones' swarm: Let $S$ be a set of $n$ non-negative weighted points in the plane representing users. Also, consider a set $P$ of $m$ disks that correspond to the covering radius of each drone. We want to place (and maintain) set $P$ such that the sum of the weights of the points in $S$ covered by disks from $P$ is maximized. We present a data structure that maintains a small constant factor approximate solution efficiently, under insertions and deletions of points to/from $S$ where each update operation can be performed $O(\log n)$ time.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
Learning a faceted customer segmentation for discovering new business opportunities at Intel
Authors:
Itay Lieder,
Meirav Segal,
Eran Avidan,
Asaf Cohen,
Tom Hope
Abstract:
For sales and marketing organizations within large enterprises, identifying and understanding new markets, customers and partners is a key challenge. Intel's Sales and Marketing Group (SMG) faces similar challenges while growing in new markets and domains and evolving its existing business. In today's complex technological and commercial landscape, there is need for intelligent automation supporti…
▽ More
For sales and marketing organizations within large enterprises, identifying and understanding new markets, customers and partners is a key challenge. Intel's Sales and Marketing Group (SMG) faces similar challenges while growing in new markets and domains and evolving its existing business. In today's complex technological and commercial landscape, there is need for intelligent automation supporting a fine-grained understanding of businesses in order to help SMG sift through millions of companies across many geographies and languages and identify relevant directions. We present a system developed in our company that mines millions of public business web pages, and extracts a faceted customer representation. We focus on two key customer aspects that are essential for finding relevant opportunities: industry segments (ranging from broad verticals such as healthcare, to more specific fields such as 'video analytics') and functional roles (e.g., 'manufacturer' or 'retail'). To address the challenge of labeled data collection, we enrich our data with external information gleaned from Wikipedia, and develop a semi-supervised multi-label, multi-lingual deep learning model that parses customer website texts and classifies them into their respective facets. Our system scans and indexes companies as part of a large-scale knowledge graph that currently holds tens of millions of connected entities with thousands being fetched, enriched and connected to the graph by the hour in real time, and also supports knowledge and insight discovery. In experiments conducted in our company, we are able to significantly boost the performance of sales personnel in the task of discovering new customers and commercial partnership opportunities.
△ Less
Submitted 27 November, 2019;
originally announced December 2019.
-
THAAD: Efficient Matching Queries under Temporal Abstraction for Anomaly Detection
Authors:
Roni Mateless,
Michael Segal,
Robert Moskovitch
Abstract:
In this paper we present a novel algorithm and efficient data structure for anomaly detection based on temporal data. Time-series data are represented by a sequence of symbolic time intervals, describing increasing and decreasing trends, in a compact way using gradient temporal abstraction technique. Then we identify unusual subsequences in the resulting sequence using dynamic data structure based…
▽ More
In this paper we present a novel algorithm and efficient data structure for anomaly detection based on temporal data. Time-series data are represented by a sequence of symbolic time intervals, describing increasing and decreasing trends, in a compact way using gradient temporal abstraction technique. Then we identify unusual subsequences in the resulting sequence using dynamic data structure based on the geometric observations supporting polylogarithmic update and query times. Moreover, we introduce a new parameter to control the pairwise difference between the corresponding symbols in addition to a distance metric between the subsequences. Experimental results on a public DNS network traffic dataset show the superiority of our approach compared to the baselines.
△ Less
Submitted 4 November, 2019; v1 submitted 1 November, 2019;
originally announced November 2019.
-
Improved solution to data gathering with mobile mule
Authors:
Yoad Zur,
Michael Segal
Abstract:
In this work we study the problem of collecting protected data in ad-hoc sensor network using a mobile entity called MULE. The objective is to increase information survivability in the network. Sensors from all over the network, route their sensing data through a data gathering tree, towards a particular node, called the $sink$. In case of a failed sensor, all the aggregated data from the sensor a…
▽ More
In this work we study the problem of collecting protected data in ad-hoc sensor network using a mobile entity called MULE. The objective is to increase information survivability in the network. Sensors from all over the network, route their sensing data through a data gathering tree, towards a particular node, called the $sink$. In case of a failed sensor, all the aggregated data from the sensor and from its children is lost. In order to retrieve the lost data, the MULE is required to travel among all the children of the failed sensor and to re-collect the data. There is a cost to travel between two points in the plane. We aim to minimize the MULE traveling cost, given that any sensor can fail. In order to reduce the traveling cost, it is necessary to find the optimal data gathering tree and the MULE location. We are considering the problem for the unit disk graphs (UDG) and Euclidean distance cost function. We propose a primal-dual algorithm that produces a $\left(20+\varepsilon\right)$-approximate solution for the problem, where $\varepsilon\rightarrow0$ as the sensor network spreads over a larger area. The algorithm requires $O\left(n^{3}\cdot\varDelta\left(G\right)\right)$ time to construct a gathering tree and to place the MULE, where $\varDelta\left(G\right)$ is the maximum degree in the graph and $n$ is the number of nodes.
△ Less
Submitted 20 October, 2019;
originally announced October 2019.
-
Privacy Vulnerabilities of Dataset Anonymization Techniques
Authors:
Eyal Nussbaum,
Michael Segal
Abstract:
Vast amounts of information of all types are collected daily about people by governments, corporations and individuals. The information is collected when users register to or use on-line applications, receive health related services, use their mobile phones, utilize search engines, or perform common daily activities. As a result, there is an enormous quantity of privately-owned records that descri…
▽ More
Vast amounts of information of all types are collected daily about people by governments, corporations and individuals. The information is collected when users register to or use on-line applications, receive health related services, use their mobile phones, utilize search engines, or perform common daily activities. As a result, there is an enormous quantity of privately-owned records that describe individuals' finances, interests, activities, and demographics. These records often include sensitive data and may violate the privacy of the users if published. The common approach to safeguarding user information, or data in general, is to limit access to the storage (usually a database) by using and authentication and authorization protocol. This way, only users with legitimate permissions can access the user data. In many cases though, the publication of user data for statistical analysis and research can be extremely beneficial for both academic and commercial uses, such as statistical research and recommendation systems. To maintain user privacy when such a publication occurs many databases employ anonymization techniques, either on the query results or the data itself. In this paper we examine variants of 2 such techniques, "data perturbation" and "query-set-size control" and discuss their vulnerabilities. Data perturbation deals with changing the values of records in the dataset while maintaining a level of accuracy over the resulting queries. We focus on a relatively new data perturbation method called NeNDS to show a possible partial knowledge attack on its privacy. The query-set-size control allows publication of a query result dependent on having a minimum set size, k, of records satisfying the query parameters. We show some query types relying on this method may still be used to extract hidden information, and prove others maintain privacy even when using multiple queries.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
Approximate String Matching for DNS Anomaly Detection
Authors:
Roni Mateless,
Michael Segal
Abstract:
In this paper we propose a novel approach to identify anomalies in DNS traffic. The traffic time-points data is transformed to a string, which is used by new fast appproximate string matching algorithm to detect anomalies. Our approach is generic in its nature and allows fast adaptation to different types of traffic. We evaluate the approach on a large public dataset of DNS traffic based on 10 day…
▽ More
In this paper we propose a novel approach to identify anomalies in DNS traffic. The traffic time-points data is transformed to a string, which is used by new fast appproximate string matching algorithm to detect anomalies. Our approach is generic in its nature and allows fast adaptation to different types of traffic. We evaluate the approach on a large public dataset of DNS traffic based on 10 days, discovering more than order of magnitude DNS attacks in comparison to auto-regression as a baseline. Moreover, the additional comparison has been made including other common regressors such as Linear Regression, Lasso, Random Forest and KNN, all of them showing the superiority of our approach.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Development and validation of computable Phenotype to Identify and Characterize Kidney Health in Adult Hospitalized Patients
Authors:
Tezcan Ozrazgat-Baslanti,
Amir Motaei,
Rubab Islam,
Haleh Hashemighouchani,
Matthew Ruppert,
R. W. M. A. Madushani,
Mark S. Segal,
Gloria Lipori,
Azra Bihorac,
Charles Hobson
Abstract:
Background: Acute kidney injury (AKI) is a common complication in hospitalized patients and a common cause for chronic kidney disease (CKD) and increased hospital cost and mortality. By timely detection of AKI and AKI progression, effective preventive or therapeutic measures could be offered. This study aims to develop and validate an electronic phenotype to identify patients with CKD and AKI. Met…
▽ More
Background: Acute kidney injury (AKI) is a common complication in hospitalized patients and a common cause for chronic kidney disease (CKD) and increased hospital cost and mortality. By timely detection of AKI and AKI progression, effective preventive or therapeutic measures could be offered. This study aims to develop and validate an electronic phenotype to identify patients with CKD and AKI. Methods: A database with electronic health records data from a retrospective study cohort of 84,352 hospitalized adults was created. This repository includes demographics, comorbidities, vital signs, laboratory values, medications, diagnoses and procedure codes for all index admission, 12 months prior and 12 months follow-up encounters. We developed algorithms to identify CKD and AKI based on the Kidney Disease: Improving Global Outcomes (KDIGO) criteria. To measure diagnostic performance of the algorithms, clinician experts performed clinical adjudication of AKI and CKD on 300 selected cases. Results: Among 149,136 encounters, identified CKD by medical history was 12% which increased to 16% using creatinine criteria. Among 130,081 encounters with sufficient data for AKI phenotyping 21% had AKI. The comparison of CKD phenotyping algorithm to manual chart review yielded PPV of 0.87, NPV of 0.99, sensitivity of 0.99, and specificity of 0.89. The comparison of AKI phenotyping algorithm to manual chart review yielded PPV of 0.99, NPV of 0.95 , sensitivity 0.98, and specificity 0.98. Conclusions: We developed phenotyping algorithms that yielded very good performance in identification of patients with CKD and AKI in validation cohort. This tool may be useful in identifying patients with kidney disease in a large population, in assessing the quality and value of care in such patients.
△ Less
Submitted 26 March, 2019; v1 submitted 7 March, 2019;
originally announced March 2019.
-
Breaching the privacy of connected vehicles network
Authors:
Vladimir Kaplun,
Michael Segal
Abstract:
Connected Vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e.…
▽ More
Connected Vehicles network is designed to provide a secure and private method for drivers to use the most efficiently the roads in certain area. When dealing with the scenario of car to access points connectivity (Wi-Fi, 3G, LTE), the vehicles are connected by central authority like cloud. Thus, they can be monitored and analyzed by the cloud which can provide certain services to the driver, i.e. usage based insurance (UBI), entertainment services, navigation etc. The main objective of this work is to show that by analyzing the information about a driver which is provided to the usage based insurance companies, it is possible to get additional private data, even if the basic data in first look, seems not so harmful. In this work, we present an analysis of a novel approach for reconstructing the path of driver from other driving attributes, such as cornering events, average speed and total driving time. We show that, in some cases, it is possible to reconstruct the path of driver, while not knowing the target point of the trip.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
Coordination of Mobile Mules via Facility Location Strategies
Authors:
Danny Hermelin,
Michael Segal,
Harel Yedidsion
Abstract:
In this paper, we study the problem of wireless sensor network (WSN) maintenance using mobile entities called mules. The mules are deployed in the area of the WSN in such a way that would minimize the time it takes them to reach a failed sensor and fix it. The mules must constantly optimize their collective deployment to account for occupied mules. The objective is to define the optimal deployment…
▽ More
In this paper, we study the problem of wireless sensor network (WSN) maintenance using mobile entities called mules. The mules are deployed in the area of the WSN in such a way that would minimize the time it takes them to reach a failed sensor and fix it. The mules must constantly optimize their collective deployment to account for occupied mules. The objective is to define the optimal deployment and task allocation strategy for the mules, so that the sensors' downtime and the mules' traveling distance are minimized. Our solutions are inspired by research in the field of computational geometry and the design of our algorithms is based on state of the art approximation algorithms for the classical problem of facility location. Our empirical results demonstrate how cooperation enhances the team's performance, and indicate that a combination of k-Median based deployment with closest-available task allocation provides the best results in terms of minimizing the sensors' downtime but is inefficient in terms of the mules' travel distance. A k-Centroid based deployment produces good results in both criteria.
△ Less
Submitted 14 February, 2017;
originally announced February 2017.
-
Vehicle to Vehicle Authentication
Authors:
Shlomi Dolev,
Lukasz Krzywiecki,
Nisha Panwar,
Michael Segal
Abstract:
In recent future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Vehicles will exchange warning messages over the wireless radio channel through Dedicated Short Range Communication (IEEE 1609) over the Wireless Access in Vehicular Environment (802.11p). Unfortunately, the wireless communication among vehicles is vulnerable to s…
▽ More
In recent future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Vehicles will exchange warning messages over the wireless radio channel through Dedicated Short Range Communication (IEEE 1609) over the Wireless Access in Vehicular Environment (802.11p). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. Therefore, the warning messages being exchanged must incorporate an authentic factor such that recipient is willing to verify and accept the message in a timely manner
△ Less
Submitted 6 August, 2015;
originally announced August 2015.
-
Vehicle Authentication via Monolithically Certified Public Key and Attributes
Authors:
Shlomi Dolev,
Łukasz Krzywiecki,
Nisha Panwar,
Michael Segal
Abstract:
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for coping with Man-in-the-Middle attacks. Conventionally, Public Key…
▽ More
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for coping with Man-in-the-Middle attacks. Conventionally, Public Key Infrastructure (PKI) is utilized for a secure communication with the pre-certified public key. However, a secure vehicle-to-vehicle communication requires additional means of verification in order to avoid impersonation attacks. To the best of our knowledge, this is the first work that proposes to certify both the public key and out-of-band sense-able static attributes to enable mutual authentication of the communicating vehicles. Vehicle owners are bound to preprocess (periodically) a certificate for both a public key and a list of fixed unchangeable attributes of the vehicle. Furthermore, the proposed approach is shown to be adaptable with regards to the existing authentication protocols. We illustrate the security verification of the proposed protocol using a detailed proof in Spi calculus.
△ Less
Submitted 16 July, 2015;
originally announced July 2015.
-
Cooling Techniques for Trapped Ions
Authors:
Daniel M. Segal,
Christof Wunderlich
Abstract:
This book chapter gives an introduction to, and an overview of, methods for cooling trapped ions. The main addressees are researchers entering the field. It is not intended as a comprehensive survey and historical account of the extensive literature on this topic. We present the physical ideas behind several cooling schemes, outline their mathematical description, and point to relevant literature…
▽ More
This book chapter gives an introduction to, and an overview of, methods for cooling trapped ions. The main addressees are researchers entering the field. It is not intended as a comprehensive survey and historical account of the extensive literature on this topic. We present the physical ideas behind several cooling schemes, outline their mathematical description, and point to relevant literature useful for a more in-depth study of this topic.
△ Less
Submitted 24 September, 2014;
originally announced September 2014.
-
Resolved-sideband laser cooling in a Penning trap
Authors:
J. F. Goodwin,
G. Stutter,
R. C. Thompson,
D. M. Segal
Abstract:
We report the laser cooling of a single $^{40}\text{Ca}^+$ ion in a Penning trap to the motional ground state in one dimension. Cooling is performed in the strong binding limit on the 729-nm electric quadrupole $S_{1/2}\leftrightarrow D_{5/2}$ transition, broadened by a quench laser coupling the $D_{5/2}$ and $P_{3/2}$ levels. We find the final ground state occupation to be $98\pm1\%$. We measure…
▽ More
We report the laser cooling of a single $^{40}\text{Ca}^+$ ion in a Penning trap to the motional ground state in one dimension. Cooling is performed in the strong binding limit on the 729-nm electric quadrupole $S_{1/2}\leftrightarrow D_{5/2}$ transition, broadened by a quench laser coupling the $D_{5/2}$ and $P_{3/2}$ levels. We find the final ground state occupation to be $98\pm1\%$. We measure the heating rate of the trap to be very low with $\dot{\bar{n}}\approx 0.3\pm0.2\textrm{s}^{-1}$ for trap frequencies from $150-400\textrm{kHz}$, consistent with the large ion-electrode distance.
△ Less
Submitted 1 March, 2016; v1 submitted 23 July, 2014;
originally announced July 2014.
-
Message and time efficient multi-broadcast schemes
Authors:
Liron Levin,
Dariusz R. Kowalski,
Michael Segal
Abstract:
We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of transmissions and total time until all rumors arrive to their destination. Under centralized settings, we introduce a novel approximation algorithm that prov…
▽ More
We consider message and time efficient broadcasting and multi-broadcasting in wireless ad-hoc networks, where a subset of nodes, each with a unique rumor, wish to broadcast their rumors to all destinations while minimizing the total number of transmissions and total time until all rumors arrive to their destination. Under centralized settings, we introduce a novel approximation algorithm that provides almost optimal results with respect to the number of transmissions and total time, separately. Later on, we show how to efficiently implement this algorithm under distributed settings, where the nodes have only local information about their surroundings. In addition, we show multiple approximation techniques based on the network collision detection capabilities and explain how to calibrate the algorithms' parameters to produce optimal results for time and messages.
△ Less
Submitted 18 October, 2013;
originally announced October 2013.
-
Laser cooling of externally produced Mg ions in a Penning trap for sympathetic cooling of highly charged ions
Authors:
Z. Andelkovic,
R. Cazan,
W. Nörtershäuser,
S. Bharadia,
D. M. Segal,
R. C. Thompson,
R. Jöhren,
J. Vollbrecht,
V. Hannen,
M. Vogel
Abstract:
We have performed laser cooling of Mg ions confined in a Penning trap. The externally produced ions were captured in flight, stored and laser cooled. Laser-induced fluorescence was observed perpendicular to the cooling laser axis. Optical detection down to the single ion level together with electronic detection of the ion oscillations inside the Penning trap have been used to acquire information o…
▽ More
We have performed laser cooling of Mg ions confined in a Penning trap. The externally produced ions were captured in flight, stored and laser cooled. Laser-induced fluorescence was observed perpendicular to the cooling laser axis. Optical detection down to the single ion level together with electronic detection of the ion oscillations inside the Penning trap have been used to acquire information on the ion storage time, ion number and ion temperature. Evidence for formation of ion crystals has been observed. These investigations are an important prerequisite for sympathetic cooling of simultaneously stored highly-charged ions and precision laser spectroscopy of forbidden transitions in these.
△ Less
Submitted 2 April, 2013; v1 submitted 9 November, 2012;
originally announced November 2012.
-
Balancing Work and Size with Bounded Buffers
Authors:
Kirill Kogan,
Alejandro Lopez-Ortiz,
Sergey I. Nikolenko,
Gabriel Scalosub,
Michael Segal
Abstract:
We consider the fundamental problem of managing a bounded size queue buffer where traffic consists of packets of varying size, where each packet requires several rounds of processing before it can be transmitted from the queue buffer. The goal in such an environment is to maximize the overall size of packets that are successfully transmitted. This model is motivated by the ever-growing ubiquity of…
▽ More
We consider the fundamental problem of managing a bounded size queue buffer where traffic consists of packets of varying size, where each packet requires several rounds of processing before it can be transmitted from the queue buffer. The goal in such an environment is to maximize the overall size of packets that are successfully transmitted. This model is motivated by the ever-growing ubiquity of network processors architectures, which must deal with heterogeneously-sized traffic, with heterogeneous processing requirements. Our work addresses the tension between two conflicting algorithmic approaches in such settings: the tendency to favor packets with fewer processing requirements, thus leading to fast contributions to the accumulated throughput, as opposed to preferring packets of larger size, which imply a large increase in throughput at each step. We present a model for studying such systems, and present competitive algorithms whose performance depend on the maximum size a packet may have, and maximum amount of processing a packet may require. We further provide lower bounds on algorithms performance in such settings.
△ Less
Submitted 5 September, 2013; v1 submitted 26 February, 2012;
originally announced February 2012.
-
Diffusion, thermalization and optical pumping of YbF molecules in a cold buffer gas cell
Authors:
S. M. Skoff,
R. J. Hendricks,
C. D. J. Sinclair,
J. J. Hudson,
D. M. Segal,
B. E. Sauer,
E. A. Hinds,
M. R. Tarbutt
Abstract:
We produce YbF molecules with a density of 10^18 m^-3 using laser ablation inside a cryogenically-cooled cell filled with a helium buffer gas. Using absorption imaging and absorption spectroscopy we study the formation, diffusion, thermalization and optical pumping of the molecules. The absorption images show an initial rapid expansion of molecules away from the ablation target followed by a much…
▽ More
We produce YbF molecules with a density of 10^18 m^-3 using laser ablation inside a cryogenically-cooled cell filled with a helium buffer gas. Using absorption imaging and absorption spectroscopy we study the formation, diffusion, thermalization and optical pumping of the molecules. The absorption images show an initial rapid expansion of molecules away from the ablation target followed by a much slower diffusion to the cell walls. We study how the time constant for diffusion depends on the helium density and temperature, and obtain values for the YbF-He diffusion cross-section at two different temperatures. We measure the translational and rotational temperatures of the molecules as a function of time since formation, obtain the characteristic time constant for the molecules to thermalize with the cell walls, and elucidate the process responsible for limiting this thermalization rate. Finally, we make a detailed study of how the absorption of the probe laser saturates as its intensity increases, showing that the saturation intensity is proportional to the helium density. We use this to estimate collision rates and the density of molecules in the cell.
△ Less
Submitted 25 February, 2011; v1 submitted 26 September, 2010;
originally announced September 2010.
-
Doppler-free laser spectroscopy of buffer gas cooled molecular radicals
Authors:
S. M. Skoff,
R. J. Hendricks,
C. D. J. Sinclair,
M. R. Tarbutt,
J. J. Hudson,
D. M. Segal,
B. E. Sauer,
E. A. Hinds
Abstract:
We demonstrate Doppler-free saturated absorption spectroscopy of cold molecular radicals formed by laser ablation inside a cryogenic buffer gas cell. By lowering the temperature, congested regions of the spectrum can be simplified, and by using different temperatures for different regions of the spectrum a wide range of rotational states can be studied optimally. We use the technique to study th…
▽ More
We demonstrate Doppler-free saturated absorption spectroscopy of cold molecular radicals formed by laser ablation inside a cryogenic buffer gas cell. By lowering the temperature, congested regions of the spectrum can be simplified, and by using different temperatures for different regions of the spectrum a wide range of rotational states can be studied optimally. We use the technique to study the optical spectrum of YbF radicals with a resolution of 30 MHz, measuring the magnetic hyperfine parameters of the electronic ground state. The method is suitable for high resolution spectroscopy of a great variety of molecules at controlled temperature and pressure, and is particularly well-suited to those that are difficult to produce in the gas phase.
△ Less
Submitted 2 December, 2009; v1 submitted 30 September, 2009;
originally announced September 2009.
-
Deaf, Dumb, and Chatting Robots, Enabling Distributed Computation and Fault-Tolerance Among Stigmergic Robot
Authors:
Yoann Dieudonné,
Shlomi Dolev,
Franck Petit,
Michael Segal
Abstract:
We investigate ways for the exchange of information (explicit communication) among deaf and dumb mobile robots scattered in the plane. We introduce the use of movement-signals (analogously to flight signals and bees waggle) as a mean to transfer messages, enabling the use of distributed algorithms among the robots. We propose one-to-one deterministic movement protocols that implement explicit co…
▽ More
We investigate ways for the exchange of information (explicit communication) among deaf and dumb mobile robots scattered in the plane. We introduce the use of movement-signals (analogously to flight signals and bees waggle) as a mean to transfer messages, enabling the use of distributed algorithms among the robots. We propose one-to-one deterministic movement protocols that implement explicit communication. We first present protocols for synchronous robots. We begin with a very simple coding protocol for two robots. Based on on this protocol, we provide one-to-one communication for any system of n \geq 2 robots equipped with observable IDs that agree on a common direction (sense of direction). We then propose two solutions enabling one-to-one communication among anonymous robots. Since the robots are devoid of observable IDs, both protocols build recognition mechanisms using the (weak) capabilities offered to the robots. The first protocol assumes that the robots agree on a common direction and a common handedness (chirality), while the second protocol assumes chirality only. Next, we show how the movements of robots can provide implicit acknowledgments in asynchronous systems. We use this result to design asynchronous one-to-one communication with two robots only. Finally, we combine this solution with the schemes developed in synchronous settings to fit the general case of asynchronous one-to-one communication among any number of robots. Our protocols enable the use of distributing algorithms based on message exchanges among swarms of Stigmergic robots. Furthermore, they provides robots equipped with means of communication to overcome faults of their communication device.
△ Less
Submitted 20 February, 2009;
originally announced February 2009.
-
Fast shuttling of ions in a scalable Penning trap array
Authors:
D. R. Crick,
S. Donnellan,
S. Ananthamurthy,
R. C. Thompson,
D. M. Segal
Abstract:
We report on the design and testing of an array of Penning ion traps made from printed circuit board. The system enables fast shuttling of ions from one trapping zone to another, which could be of use in quantum information processing. We describe simulations carried out to determine the optimal potentials to be applied to the trap electrodes for enabling this movement. The results of a prelimin…
▽ More
We report on the design and testing of an array of Penning ion traps made from printed circuit board. The system enables fast shuttling of ions from one trapping zone to another, which could be of use in quantum information processing. We describe simulations carried out to determine the optimal potentials to be applied to the trap electrodes for enabling this movement. The results of a preliminary experiment with a cloud of laser cooled calcium ions demonstrate a round-trip shuttling efficiency of up to 75%.
△ Less
Submitted 18 January, 2009;
originally announced January 2009.
-
Dynamics of axialized laser-cooled ions in a Penning trap
Authors:
E. S. Phillips,
R. J. Hendricks,
A. M. Abdulla,
H. Ohadi,
D. Crick,
K. Koo,
D. M. Segal,
R. C. Thompson
Abstract:
We report the experimental characterization of axialization - a method of reducing the magnetron motion of a small number of ions stored in a Penning trap. This is an important step in the investigation of the suitability of Penning traps for quantum information processing. The magnetron motion was coupled to the laser-cooled modified cyclotron motion by the application of a near-resonant oscill…
▽ More
We report the experimental characterization of axialization - a method of reducing the magnetron motion of a small number of ions stored in a Penning trap. This is an important step in the investigation of the suitability of Penning traps for quantum information processing. The magnetron motion was coupled to the laser-cooled modified cyclotron motion by the application of a near-resonant oscillating quadrupole potential (the "axialization drive"). Measurement of cooling rates of the radial motions of the ions showed an order-of-magnitude increase in the damping rate of the magnetron motion with the axialization drive applied. The experimental results are in good qualitative agreement with a recent theoretical study. In particular, a classical avoided crossing was observed in the motional frequencies as the axialization drive frequency was swept through the optimum value, proving that axialization is indeed a resonant effect.
△ Less
Submitted 24 October, 2007;
originally announced October 2007.
-
Laser cooling in the Penning trap: an analytical model for cooling rates in the presence of an axializing field
Authors:
R. J. Hendricks,
E. S. Phillips,
D. M. Segal,
R. C. Thompson
Abstract:
Ions stored in Penning traps may have useful applications in the field of quantum information processing. There are, however, difficulties associated with the laser cooling of one of the radial motions of ions in these traps, namely the magnetron motion. The application of a small radio-frequency quadrupolar electric potential resonant with the sum of the two radial motional frequencies has been…
▽ More
Ions stored in Penning traps may have useful applications in the field of quantum information processing. There are, however, difficulties associated with the laser cooling of one of the radial motions of ions in these traps, namely the magnetron motion. The application of a small radio-frequency quadrupolar electric potential resonant with the sum of the two radial motional frequencies has been shown to couple these motions and to lead to more efficient laser cooling. We present an analytical model that enables us to determine laser cooling rates in the presence of such an 'axializing' field. It is found that this field leads to an averaging of the laser cooling rates for the two motions and hence improves the overall laser cooling efficiency. The model also predicts shifts in the motional frequencies due to the axializing field that are in qualitative agreement with those measured in recent experiments. It is possible to determine laser cooling rates experimentally by studying the phase response of the cooled ions to a near resonant excitation field. Using the model developed in this paper, we study the expected phase response when an axializing field is present.
△ Less
Submitted 24 September, 2007;
originally announced September 2007.
-
Chess, Chance and Conspiracy
Authors:
Mark R. Segal
Abstract:
Chess and chance are seemingly strange bedfellows. Luck and/or randomness have no apparent role in move selection when the game is played at the highest levels. However, when competition is at the ultimate level, that of the World Chess Championship (WCC), chess and conspiracy are not strange bedfellows, there being a long and colorful history of accusations levied between participants. One such…
▽ More
Chess and chance are seemingly strange bedfellows. Luck and/or randomness have no apparent role in move selection when the game is played at the highest levels. However, when competition is at the ultimate level, that of the World Chess Championship (WCC), chess and conspiracy are not strange bedfellows, there being a long and colorful history of accusations levied between participants. One such accusation, frequently repeated, was that all the games in the 1985 WCC (Karpov vs Kasparov) were fixed and prearranged move by move. That this claim was advanced by a former World Champion, Bobby Fischer, argues that it ought be investigated. That the only published, concrete basis for this claim consists of an observed run of particular moves, allows this investigation to be performed using probabilistic and statistical methods. In particular, we employ imbedded finite Markov chains to evaluate run statistic distributions. Further, we demonstrate how both chess computers and game data bases can be brought to bear on the problem.
△ Less
Submitted 29 August, 2007;
originally announced August 2007.
-
Laser spectroscopy of hyperfine structure in highly-charged ions: a test of QED at high fields
Authors:
D. F. A. Winters,
M. Vogel,
D. M. Segal,
R. C. Thompson,
W. Noertershaeuser
Abstract:
An overview is presented of laser spectroscopy experiments with cold, trapped, highly-charged ions, which will be performed at the HITRAP facility at GSI in Darmstadt (Germany). These high-resolution measurements of ground state hyperfine splittings will be three orders of magnitude more precise than previous measurements. Moreover, from a comparison of measurements of the hyperfine splittings i…
▽ More
An overview is presented of laser spectroscopy experiments with cold, trapped, highly-charged ions, which will be performed at the HITRAP facility at GSI in Darmstadt (Germany). These high-resolution measurements of ground state hyperfine splittings will be three orders of magnitude more precise than previous measurements. Moreover, from a comparison of measurements of the hyperfine splittings in hydrogen- and lithium-like ions of the same isotope, QED effects at high electromagnetic fields can be determined within a few percent. Several candidate ions suited for these laser spectroscopy studies are presented.
△ Less
Submitted 26 April, 2007; v1 submitted 4 April, 2007;
originally announced April 2007.
-
Electronic detection of charged particle effects in a Penning trap
Authors:
D. F. A. Winters,
M. Vogel,
D. M. Segal,
R. C. Thompson
Abstract:
We present a thorough analysis of the electronic detection of charged particles, confined in a Penning trap, via image charges induced in the trap electrodes. Trapping of charged particles in an electrode structure leads to frequency shifts, which are due to image charge and space charge effects. These effects are of importance for Penning trap experiments which involve high charge densities or…
▽ More
We present a thorough analysis of the electronic detection of charged particles, confined in a Penning trap, via image charges induced in the trap electrodes. Trapping of charged particles in an electrode structure leads to frequency shifts, which are due to image charge and space charge effects. These effects are of importance for Penning trap experiments which involve high charge densities or require high precision in the motional frequencies. Our analysis of image charges shows that only (higher order) odd powers of the particle displacement lead to induced charge differences, giving rise to a signal. This implies that, besides the centre-of-mass frequency of a trapped particle cloud, also higher order individual particle frequencies induce a signal, which can be picked up by an electronic detection circuit attached to the trap electrodes. We also derive analytic expressions for the image charge and space charge induced frequency shifts and perform simulations of space charge effects. In relation to this, we discuss the consequences of the shifted particle frequencies for resistive cooling of the particle motion.
△ Less
Submitted 4 August, 2006;
originally announced August 2006.
-
Novel designs for Penning ion traps
Authors:
J. R. Castrejon-Pita,
H. Ohadi,
D. R. Crick,
D. F. A. Winters,
D. M. Segal,
R. C. Thompson
Abstract:
We present a number of alternative designs for Penning ion traps suitable for quantum information processing (QIP) applications with atomic ions. The first trap design is a simple array of long straight wires which allows easy optical access. A prototype of this trap has been built to trap Ca+ and a simple electronic detection scheme has been employed to demonstrate the operation of the trap. An…
▽ More
We present a number of alternative designs for Penning ion traps suitable for quantum information processing (QIP) applications with atomic ions. The first trap design is a simple array of long straight wires which allows easy optical access. A prototype of this trap has been built to trap Ca+ and a simple electronic detection scheme has been employed to demonstrate the operation of the trap. Another trap design consists of a conducting plate with a hole in it situated above a continuous conducting plane. The final trap design is based on an array of pad electrodes. Although this trap design lacks the open geometry of the traps described above, the pad design may prove useful in a hybrid scheme in which information processing and qubit storage take place in different types of trap. The behaviour of the pad traps is simulated numerically and techniques for moving ions rapidly between traps are discussed. Future experiments with these various designs are discussed. All of the designs lend themselves to the construction of multiple trap arrays, as required for scalable ion trap QIP.
△ Less
Submitted 22 March, 2006;
originally announced March 2006.
-
Proposed precision laser spectrometer for trapped, highly charged ions
Authors:
M. Vogel,
D. F. A. Winters,
D. M. Segal,
R. C. Thompson
Abstract:
We propose a novel type of precision laser spectrometer for trapped, highly charged ions nearly at rest. It consists of a cylindrical open-endcap Penning trap in which an externally produced bunch of highly charged ions can be confined and investigated by means of laser spectroscopy. The combination of confinement, cooling and compression of a dense ion cloud will allow the ground state hyperfin…
▽ More
We propose a novel type of precision laser spectrometer for trapped, highly charged ions nearly at rest. It consists of a cylindrical open-endcap Penning trap in which an externally produced bunch of highly charged ions can be confined and investigated by means of laser spectroscopy. The combination of confinement, cooling and compression of a dense ion cloud will allow the ground state hyperfine splitting in highly charged ions to be measured with an accuracy three orders of magnitude better than in any previous experiment. A systematic study of different charge states and different isotopes of the same element allows for highly sensitive tests of bound-state QED and for a precision determination of nuclear properties. Apart from stable isotopes, also radioactive species with half-lives longer than about one hour can be investigated.
△ Less
Submitted 21 October, 2005;
originally announced October 2005.
-
Plans for laser spectroscopy of trapped cold hydrogen-like HCI
Authors:
D. F. A. Winters,
A. M. Abdulla,
J. R. Castrejon Pita,
A. de Lange,
D. M. Segal,
R. C. Thompson
Abstract:
Laser spectroscopy studies are being prepared to measure the 1s ground state hyperfine splitting in trapped cold highly charged ions. The purpose of such experiments is to test quantum electrodynamics in the strong electric field regime. These experiments form part of the HITRAP project at GSI. A brief review of the planned experiments is presented.
Laser spectroscopy studies are being prepared to measure the 1s ground state hyperfine splitting in trapped cold highly charged ions. The purpose of such experiments is to test quantum electrodynamics in the strong electric field regime. These experiments form part of the HITRAP project at GSI. A brief review of the planned experiments is presented.
△ Less
Submitted 19 January, 2005;
originally announced January 2005.
-
Improvement of Laser Cooling of Ions in a Penning Trap by use of the Axialisation Technique
Authors:
H. F. Powell,
S. R. de Echaniz,
E. S. Phillips,
D. M. Segal,
R. C. Thompson
Abstract:
We report a study of the axialisation and laser cooling of single ions and small clouds of ions in a Penning trap. A weak radiofrequency signal applied to a segmented ring electrode couples the magnetron motion to the cyclotron motion, which results in improved laser cooling of the magnetron motion. This allows us to approach the trapping conditions of a Paul trap, but without any micromotion. U…
▽ More
We report a study of the axialisation and laser cooling of single ions and small clouds of ions in a Penning trap. A weak radiofrequency signal applied to a segmented ring electrode couples the magnetron motion to the cyclotron motion, which results in improved laser cooling of the magnetron motion. This allows us to approach the trapping conditions of a Paul trap, but without any micromotion. Using an ICCD camera we show that the motion of a single ion can be confined to dimensions of the order of 10 $μ$m. We have measured increased magnetron cooling rates using an rf-photon correlation technique. For certain laser cooling conditions, the magnetron motion of the centre of mass of the cloud grows and stabilises at a large value. This results in the ions orbiting the centre of the trap together in a small cloud, as confirmed by photon-photon correlation measurements.
△ Less
Submitted 23 January, 2003; v1 submitted 5 November, 2002;
originally announced November 2002.
-
Intensity-dependent dispersion under conditions of electromagnetically induced transparency in coherently prepared multi-state atoms
Authors:
Andrew D. Greentree,
Derek Richards,
J. A. Vaccaro,
A. V. Durrant,
S. R. de Echaniz,
D. M. Segal,
J. P. Marangos
Abstract:
Interest in lossless nonlinearities has focussed on the the dispersive properties of $Λ$ systems under conditions of electromagnetically induced transparency (EIT). We generalize the lambda system by introducing further degenerate states to realize a `Chain $ Λ$' atom where multiple coupling of the probe field significantly enhances the intensity dependent dispersion without compromising the EIT…
▽ More
Interest in lossless nonlinearities has focussed on the the dispersive properties of $Λ$ systems under conditions of electromagnetically induced transparency (EIT). We generalize the lambda system by introducing further degenerate states to realize a `Chain $ Λ$' atom where multiple coupling of the probe field significantly enhances the intensity dependent dispersion without compromising the EIT condition.
△ Less
Submitted 18 March, 2003; v1 submitted 9 September, 2002;
originally announced September 2002.
-
Resonant and off-resonant transients in electromagnetically induced transparency: turn-on and turn-off dynamics
Authors:
Andrew D. Greentree,
T. B. Smith,
S. R. de Echaniz,
A. V. Durrant,
J. P. Marangos,
D. M. Segal,
J. A. Vaccaro
Abstract:
This paper presents a wide-ranging theoretical and experimental study of non-adiabatic transient phenomena in a $Λ$ EIT system when a strong coupling field is rapidly switched on or off. The theoretical treatment uses a Laplace transform approach to solve the time-dependent density matrix equation. The experiments are carried out in a Rb$^{87}$ MOT. The results show transient probe gain in param…
▽ More
This paper presents a wide-ranging theoretical and experimental study of non-adiabatic transient phenomena in a $Λ$ EIT system when a strong coupling field is rapidly switched on or off. The theoretical treatment uses a Laplace transform approach to solve the time-dependent density matrix equation. The experiments are carried out in a Rb$^{87}$ MOT. The results show transient probe gain in parameter regions not previously studied, and provide insight into the transition dynamics between bare and dressed states.
△ Less
Submitted 19 September, 2001;
originally announced September 2001.
-
Observation of transient gain without population inversion in a laser-cooled rubidium lambda system
Authors:
S. R. de Echaniz,
Andrew D. Greentree,
A. V. Durrant,
D. M. Segal,
J. P. Marangos,
J. A. Vaccaro
Abstract:
We have observed clear Rabi oscillations of a weak probe in a strongly driven three-level lambda system in laser-cooled rubidium for the first time. When the coupling field is non-adiabatically switched on using a Pockels cell, transient probe gain without population inversion is obtained in the presence of uncoupled absorptions. Our results are supported by three-state computations.
We have observed clear Rabi oscillations of a weak probe in a strongly driven three-level lambda system in laser-cooled rubidium for the first time. When the coupling field is non-adiabatically switched on using a Pockels cell, transient probe gain without population inversion is obtained in the presence of uncoupled absorptions. Our results are supported by three-state computations.
△ Less
Submitted 17 May, 2001;
originally announced May 2001.
-
Observations of a doubly driven V system probed to a fourth level in laser-cooled rubidium
Authors:
S. R. de Echaniz,
Andrew D. Greentree,
A. V. Durrant,
D. M. Segal,
J. P. Marangos,
J. A. Vaccaro
Abstract:
Observations of a doubly driven V system probed to a fourth level in an N configuration are reported. A dressed state analysis is also presented. The expected three-peak spectrum is explored in a cold rubidium sample in a magneto-optic trap. Good agreement is found between the dressed state theory and the experimental spectra once light shifts and uncoupled absorptions in the rubidium system are…
▽ More
Observations of a doubly driven V system probed to a fourth level in an N configuration are reported. A dressed state analysis is also presented. The expected three-peak spectrum is explored in a cold rubidium sample in a magneto-optic trap. Good agreement is found between the dressed state theory and the experimental spectra once light shifts and uncoupled absorptions in the rubidium system are taken into account.
△ Less
Submitted 4 May, 2001; v1 submitted 20 February, 2001;
originally announced February 2001.
-
Comparing Cosmic Microwave Background Datasets
Authors:
L. Knox,
J. R. Bond,
A. H. Jaffe,
M. Segal,
D. Charbonneau
Abstract:
To extract reliable cosmic parameters from cosmic microwave background datasets, it is essential to show that the data are not contaminated by residual non-cosmological signals. We describe general statistical approaches to this problem, with an emphasis on the case in which there are two datasets that can be checked for consistency. A first visual step is the Wiener filter mapping from one set…
▽ More
To extract reliable cosmic parameters from cosmic microwave background datasets, it is essential to show that the data are not contaminated by residual non-cosmological signals. We describe general statistical approaches to this problem, with an emphasis on the case in which there are two datasets that can be checked for consistency. A first visual step is the Wiener filter mapping from one set of data onto the pixel basis of another. For more quantitative analyses we develop and apply both Bayesian and frequentist techniques. We define the ``contamination parameter'' and advocate the calculation of its probability distribution as a means of examining the consistency of two datasets. The closely related ``probability enhancement factor'' is shown to be a useful statistic for comparison; it is significantly better than a number of chi-squared quantities we consider. Our methods can be used: internally (between different subsets of a dataset) or externally (between different experiments); for observing regions that completely overlap, partially overlap or overlap not at all; and for observing strategies that differ greatly.
We apply the methods to check the consistency (internal and external) of the MSAM92, MSAM94 and Saskatoon Ring datasets. From comparing the two MSAM datasets, we find that the most probable level of contamination is 12%, with no contamination only 1.05 times less probable, and 100% contamination strongly ruled out at over 2 X 10^5 times less probable. From comparing the 1992 MSAM flight with the Saskatoon data we find the most probable level of contamination to be 50%, with no contamination only 1.6 times less probable and 100% contamination 13 times less probable. [Truncated]
△ Less
Submitted 23 March, 1998;
originally announced March 1998.