B. Hahn

B. Hahn
Are you B. Hahn?

Claim your profile, edit publications, add additional information:

Contact Details

Name
B. Hahn
Affiliation
Location

Pubs By Year

Pub Categories

 
Nuclear Experiment (4)
 
Computer Science - Cryptography and Security (3)
 
Quantitative Biology - Quantitative Methods (1)
 
High Energy Physics - Experiment (1)
 
Quantitative Biology - Populations and Evolution (1)
 
Computer Science - Databases (1)
 
Mathematics - Analysis of PDEs (1)
 
Mathematics - Numerical Analysis (1)

Publications Authored By B. Hahn

The charge and magnetic form factors, FC and FM, of 3He have been extracted in the kinematic range 25 fm-2 < Q2 < 61 fm-2 from elastic electron scattering by detecting 3He recoil nuclei and electrons in coincidence with the High Resolution Spectrometers of the Hall A Facility at Jefferson Lab. The measurements are indicative of a second diffraction minimum for the magnetic form factor, which was predicted in the Q2 range of this experiment, and of a continuing diffractive structure for the charge form factor. The data are in qualitative agreement with theoretical calculations based on realistic interactions and accurate methods to solve the three-body nuclear problem. Read More

In this paper, we use microlocal analysis to understand what X-ray tomographic data acquisition does to singularities of an object which changes during the measuring process. Depending on the motion model, we study which singularities are detected by the measured data. In particular, this analysis shows that, due to the dynamic behavior, not all singularities might be detected, even if the radiation source performs a complete turn around the object. Read More

Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Read More

Access to network traffic records is an integral part of recognizing and addressing network security breaches. Even with the increasing sophistication of network attacks, basic network events such as connections between two IP addresses play an important role in any network defense. Given the duration of current attacks, long-term data archival is critical but typically very little of the data is ever accessed. Read More

Within-host genetic sequencing from samples collected over time provides a dynamic view of how viruses evade host immunity. Immune-driven mutations might stimulate neutralization breadth by selecting antibodies adapted to cycles of immune escape that generate within-subject epitope diversity. Comprehensive identification of immune-escape mutations is experimentally and computationally challenging. Read More

The Internet has become a critical communication infrastructure for citizens to organize protests and express dissatisfaction with their governments. This fact has not gone unnoticed, with governments clamping down on this medium via censorship, and circumvention researchers working to stay one step ahead. In this paper, we explore a promising new avenue for covert channels: real-time strategy-video games. Read More

New results are reported from a measurement of $\pi^0$ electroproduction near threshold using the $p(e,e^{\prime} p)\pi^0$ reaction. The experiment was designed to determine precisely the energy dependence of $s-$ and $p-$wave electromagnetic multipoles as a stringent test of the predictions of Chiral Perturbation Theory (ChPT). The data were taken with an electron beam energy of 1192 MeV using a two-spectrometer setup in Hall A at Jefferson Lab. Read More

The charge form factor of $^$4He has been extracted in the range 29 fm$^{-2}$ $\le Q^2 \le 77$ fm$^{-2}$ from elastic electron scattering, detecting $^4$He nuclei and electrons in coincidence with the High Resolution Spectrometers of the Hall A Facility of Jefferson Lab. The results are in qualitative agreement with realistic meson-nucleon theoretical calculations. The data have uncovered a second diffraction minimum, which was predicted in the $Q^2$ range of this experiment, and rule out conclusively long-standing predictions of dimensional scaling of high-energy amplitudes using quark counting. Read More