157 research outputs found
Human user authentication based on mouse dynamics: a feasibility study
Security problems have been discussed for a long time in the past recent decades in many fields such as communication, networking and user authentication. Security and authentication methods have also been explored for a long time by many researchers, and many ecient ways have been developed and used in modern society. Password and fingerprint based user authentication methods are most common user authentication methods being used in our daily lives. With computers and smart phones population growing vastly, we need to put more attention on the security methods. However, those traditional authentication methods are not safe and ecient enough. Passwords are stolen and revealed to hackers, while fingerprint can be easily got from an authenticated person. We moved our eyes on another way of security and authentication- biometric kinesiology. The muscle in our body can remember the movement if we practiced an action a lot, and that memory is built in the body, not in our brain memory, which means that we cannot forget a practiced action in the way we forget a password. We proposed to use the action with mouse from an authenticated user as the password of a system, in which only the user perform right action can be regarded as an authenticated user. Otherwise the system will reject the user. This movement is hard to mimic unless the hacker do a lot of practice of that certain movement and do exactly the same as an authenticated user. This is very difficult because we modified the normal mouse and the mouse will not move as the hacker expect. What’s more, only the authenticated user knows how was the mouse be modified and how to act to adjust to that modification. In this way our proposed approach is much safer than the above traditional security and authentication methods. However, this is a feasibility study and more experiment will be done to prove our proposal and we will discuss it in the future work chapter
Recommended from our members
Comparison of affordable housing financing policies between China and the US
China and the United States, as the two largest economies in the world, are facing the shortage of affordable housing, and the key to solving affordable housing is adequate funding. China and the United States differ greatly in the financing of affordable housing. This article talks about a comparative study of affordable housing financing policies between China and the United States, summarizes the differences between the two, explores the reasons for this difference, and compares the advantages and disadvantages of the policies of the two countries
Study on the large area MCP-PMT glass radioactivity reduction
The Jiangmen Underground Neutrino Observatory (JUNO) will install about
18,000 20-inch Photomultiplier Tubes (PMTs) in the center detector to achieve
3%/sqrt(E(MeV)) energy resolution. From the full detector Monte Carlo (MC)
simulation, besides the liquid scitillator (LS) and Acrylic nodes, PMT glass
has the largest contribution to the natural radioactive background. Various
technologies have been developed in the Chinese industry to control the
environment and to improve the production process. We have monitored the glass
production for more than two months, and the radioactivity in glass was
measured using a low background gamma ray spectrometer equipped with a high
resolution HPGe detector. The 238U, 232Th and 40K of the glass bulb are reduced
by a factor of 2, 9 and 15 respectively, and now they can reach 2.5 Bq/kg for
238U, 0.5 Bq/kg for 232Th and 0.5 Bq/kg for 40K
Real-time Monitoring for the Next Core-Collapse Supernova in JUNO
Core-collapse supernova (CCSN) is one of the most energetic astrophysical
events in the Universe. The early and prompt detection of neutrinos before
(pre-SN) and during the SN burst is a unique opportunity to realize the
multi-messenger observation of the CCSN events. In this work, we describe the
monitoring concept and present the sensitivity of the system to the pre-SN and
SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), which is
a 20 kton liquid scintillator detector under construction in South China. The
real-time monitoring system is designed with both the prompt monitors on the
electronic board and online monitors at the data acquisition stage, in order to
ensure both the alert speed and alert coverage of progenitor stars. By assuming
a false alert rate of 1 per year, this monitoring system can be sensitive to
the pre-SN neutrinos up to the distance of about 1.6 (0.9) kpc and SN neutrinos
up to about 370 (360) kpc for a progenitor mass of 30 for the case
of normal (inverted) mass ordering. The pointing ability of the CCSN is
evaluated by using the accumulated event anisotropy of the inverse beta decay
interactions from pre-SN or SN neutrinos, which, along with the early alert,
can play important roles for the followup multi-messenger observations of the
next Galactic or nearby extragalactic CCSN.Comment: 24 pages, 9 figure
JUNO Sensitivity to Invisible Decay Modes of Neutrons
We explore the bound neutrons decay into invisible particles (e.g.,
or ) in the JUNO liquid scintillator
detector. The invisible decay includes two decay modes: and . The invisible decays of -shell neutrons in
will leave a highly excited residual nucleus. Subsequently, some
de-excitation modes of the excited residual nuclei can produce a time- and
space-correlated triple coincidence signal in the JUNO detector. Based on a
full Monte Carlo simulation informed with the latest available data, we
estimate all backgrounds, including inverse beta decay events of the reactor
antineutrino , natural radioactivity, cosmogenic isotopes and
neutral current interactions of atmospheric neutrinos. Pulse shape
discrimination and multivariate analysis techniques are employed to further
suppress backgrounds. With two years of exposure, JUNO is expected to give an
order of magnitude improvement compared to the current best limits. After 10
years of data taking, the JUNO expected sensitivities at a 90% confidence level
are and
.Comment: 28 pages, 7 figures, 4 table
Study of energetic particle physics with advanced ECEI system on the HL-2A tokamak
Understanding the physics of energetic particles (EP) is crucial for the burning plasmas in next generation fusion devices such as ITER. In this work, three types of internal kink modes (a saturated internal kink mode (SK), a resonant internal kink mode (RK), and a double e-fishbone) excited by energetic particles in the low density discharges during ECRH/ECCD heating have been studied by the newly developed 24(poloidal) Ă— 16(radial) = 384 channel ECEI system on the HL-2A tokamak. The SK and RK rotate in the electron diamagnetic direction poloidally and are destabilized by the energetic trapped electrons. The SK is destabilized in the case of qmin > 1, while the RK is destabilized in the case of qmin < 1. The double e-fishbone, which has two m/n = 1/1 modes propagating in the opposite directions poloidally, has been observed during plasma current ramp-up with counter-ECCD. Strong thermal transfer and mode coupling between the two m/n = 1/1 modes have been studied
Detection of the Diffuse Supernova Neutrino Background with JUNO
As an underground multi-purpose neutrino detector with 20 kton liquid scintillator, Jiangmen Underground Neutrino Observatory (JUNO) is competitive with and complementary to the water-Cherenkov detectors on the search for the diffuse supernova neutrino background (DSNB). Typical supernova models predict 2-4 events per year within the optimal observation window in the JUNO detector. The dominant background is from the neutral-current (NC) interaction of atmospheric neutrinos with 12C nuclei, which surpasses the DSNB by more than one order of magnitude. We evaluated the systematic uncertainty of NC background from the spread of a variety of data-driven models and further developed a method to determine NC background within 15\% with {\it{in}} {\it{situ}} measurements after ten years of running. Besides, the NC-like backgrounds can be effectively suppressed by the intrinsic pulse-shape discrimination (PSD) capabilities of liquid scintillators. In this talk, I will present in detail the improvements on NC background uncertainty evaluation, PSD discriminator development, and finally, the potential of DSNB sensitivity in JUNO
Potential of Core-Collapse Supernova Neutrino Detection at JUNO
JUNO is an underground neutrino observatory under construction in Jiangmen, China. It uses 20kton liquid scintillator as target, which enables it to detect supernova burst neutrinos of a large statistics for the next galactic core-collapse supernova (CCSN) and also pre-supernova neutrinos from the nearby CCSN progenitors. All flavors of supernova burst neutrinos can be detected by JUNO via several interaction channels, including inverse beta decay, elastic scattering on electron and proton, interactions on C12 nuclei, etc. This retains the possibility for JUNO to reconstruct the energy spectra of supernova burst neutrinos of all flavors. The real time monitoring systems based on FPGA and DAQ are under development in JUNO, which allow prompt alert and trigger-less data acquisition of CCSN events. The alert performances of both monitoring systems have been thoroughly studied using simulations. Moreover, once a CCSN is tagged, the system can give fast characterizations, such as directionality and light curve
EOS 2023 Workshop
The EOS system serving as a grid storage element at IHEP, CAS started since 2021, working for JUNO experiment. A CTA with its EOS SE buffer also started its service for JUNO since 2023. In this talk, we would like to share our experiences and thoughts about the SE operations, including deployment, monitoring, data transfer performance, authentication management with VOMS and Sci-token, etc.
Meanwhile, as EOS SE will replace the DPM as our new Beijing-T2 site storage system, this talk will also share our plan and status about EOS upgrading.
The Beijing LHCb T1 site storage construction status will also be included in this talk
Human user authentication based on mouse dynamics: a feasibility study
Security problems have been discussed for a long time in the past recent decades in many fields such as communication, networking and user authentication. Security and authentication methods have also been explored for a long time by many researchers, and many ecient ways have been developed and used in modern society. Password and fingerprint based user authentication methods are most common user authentication methods being used in our daily lives. With computers and smart phones population growing vastly, we need to put more attention on the security methods. However, those traditional authentication methods are not safe and ecient enough. Passwords are stolen and revealed to hackers, while fingerprint can be easily got from an authenticated person. We moved our eyes on another way of security and authentication- biometric kinesiology. The muscle in our body can remember the movement if we practiced an action a lot, and that memory is built in the body, not in our brain memory, which means that we cannot forget a practiced action in the way we forget a password. We proposed to use the action with mouse from an authenticated user as the password of a system, in which only the user perform right action can be regarded as an authenticated user. Otherwise the system will reject the user. This movement is hard to mimic unless the hacker do a lot of practice of that certain movement and do exactly the same as an authenticated user. This is very difficult because we modified the normal mouse and the mouse will not move as the hacker expect. What’s more, only the authenticated user knows how was the mouse be modified and how to act to adjust to that modification. In this way our proposed approach is much safer than the above traditional security and authentication methods. However, this is a feasibility study and more experiment will be done to prove our proposal and we will discuss it in the future work chapter.</p
- …