157 research outputs found

    Human user authentication based on mouse dynamics: a feasibility study

    Get PDF
    Security problems have been discussed for a long time in the past recent decades in many fields such as communication, networking and user authentication. Security and authentication methods have also been explored for a long time by many researchers, and many ecient ways have been developed and used in modern society. Password and fingerprint based user authentication methods are most common user authentication methods being used in our daily lives. With computers and smart phones population growing vastly, we need to put more attention on the security methods. However, those traditional authentication methods are not safe and ecient enough. Passwords are stolen and revealed to hackers, while fingerprint can be easily got from an authenticated person. We moved our eyes on another way of security and authentication- biometric kinesiology. The muscle in our body can remember the movement if we practiced an action a lot, and that memory is built in the body, not in our brain memory, which means that we cannot forget a practiced action in the way we forget a password. We proposed to use the action with mouse from an authenticated user as the password of a system, in which only the user perform right action can be regarded as an authenticated user. Otherwise the system will reject the user. This movement is hard to mimic unless the hacker do a lot of practice of that certain movement and do exactly the same as an authenticated user. This is very difficult because we modified the normal mouse and the mouse will not move as the hacker expect. What’s more, only the authenticated user knows how was the mouse be modified and how to act to adjust to that modification. In this way our proposed approach is much safer than the above traditional security and authentication methods. However, this is a feasibility study and more experiment will be done to prove our proposal and we will discuss it in the future work chapter

    Study on the large area MCP-PMT glass radioactivity reduction

    Full text link
    The Jiangmen Underground Neutrino Observatory (JUNO) will install about 18,000 20-inch Photomultiplier Tubes (PMTs) in the center detector to achieve 3%/sqrt(E(MeV)) energy resolution. From the full detector Monte Carlo (MC) simulation, besides the liquid scitillator (LS) and Acrylic nodes, PMT glass has the largest contribution to the natural radioactive background. Various technologies have been developed in the Chinese industry to control the environment and to improve the production process. We have monitored the glass production for more than two months, and the radioactivity in glass was measured using a low background gamma ray spectrometer equipped with a high resolution HPGe detector. The 238U, 232Th and 40K of the glass bulb are reduced by a factor of 2, 9 and 15 respectively, and now they can reach 2.5 Bq/kg for 238U, 0.5 Bq/kg for 232Th and 0.5 Bq/kg for 40K

    Real-time Monitoring for the Next Core-Collapse Supernova in JUNO

    Full text link
    Core-collapse supernova (CCSN) is one of the most energetic astrophysical events in the Universe. The early and prompt detection of neutrinos before (pre-SN) and during the SN burst is a unique opportunity to realize the multi-messenger observation of the CCSN events. In this work, we describe the monitoring concept and present the sensitivity of the system to the pre-SN and SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), which is a 20 kton liquid scintillator detector under construction in South China. The real-time monitoring system is designed with both the prompt monitors on the electronic board and online monitors at the data acquisition stage, in order to ensure both the alert speed and alert coverage of progenitor stars. By assuming a false alert rate of 1 per year, this monitoring system can be sensitive to the pre-SN neutrinos up to the distance of about 1.6 (0.9) kpc and SN neutrinos up to about 370 (360) kpc for a progenitor mass of 30M⊙M_{\odot} for the case of normal (inverted) mass ordering. The pointing ability of the CCSN is evaluated by using the accumulated event anisotropy of the inverse beta decay interactions from pre-SN or SN neutrinos, which, along with the early alert, can play important roles for the followup multi-messenger observations of the next Galactic or nearby extragalactic CCSN.Comment: 24 pages, 9 figure

    JUNO Sensitivity to Invisible Decay Modes of Neutrons

    Full text link
    We explore the bound neutrons decay into invisible particles (e.g., n→3νn\rightarrow 3 \nu or nn→2νnn \rightarrow 2 \nu) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: n→inv n \rightarrow { inv} and nn→inv nn \rightarrow { inv} . The invisible decays of ss-shell neutrons in 12C^{12}{\rm C} will leave a highly excited residual nucleus. Subsequently, some de-excitation modes of the excited residual nuclei can produce a time- and space-correlated triple coincidence signal in the JUNO detector. Based on a full Monte Carlo simulation informed with the latest available data, we estimate all backgrounds, including inverse beta decay events of the reactor antineutrino νˉe\bar{\nu}_e, natural radioactivity, cosmogenic isotopes and neutral current interactions of atmospheric neutrinos. Pulse shape discrimination and multivariate analysis techniques are employed to further suppress backgrounds. With two years of exposure, JUNO is expected to give an order of magnitude improvement compared to the current best limits. After 10 years of data taking, the JUNO expected sensitivities at a 90% confidence level are τ/B(n→inv)>5.0×1031 yr\tau/B( n \rightarrow { inv} ) > 5.0 \times 10^{31} \, {\rm yr} and τ/B(nn→inv)>1.4×1032 yr\tau/B( nn \rightarrow { inv} ) > 1.4 \times 10^{32} \, {\rm yr}.Comment: 28 pages, 7 figures, 4 table

    Study of energetic particle physics with advanced ECEI system on the HL-2A tokamak

    Full text link
    Understanding the physics of energetic particles (EP) is crucial for the burning plasmas in next generation fusion devices such as ITER. In this work, three types of internal kink modes (a saturated internal kink mode (SK), a resonant internal kink mode (RK), and a double e-fishbone) excited by energetic particles in the low density discharges during ECRH/ECCD heating have been studied by the newly developed 24(poloidal) Ă— 16(radial) = 384 channel ECEI system on the HL-2A tokamak. The SK and RK rotate in the electron diamagnetic direction poloidally and are destabilized by the energetic trapped electrons. The SK is destabilized in the case of qmin > 1, while the RK is destabilized in the case of qmin < 1. The double e-fishbone, which has two m/n = 1/1 modes propagating in the opposite directions poloidally, has been observed during plasma current ramp-up with counter-ECCD. Strong thermal transfer and mode coupling between the two m/n = 1/1 modes have been studied

    Detection of the Diffuse Supernova Neutrino Background with JUNO

    Get PDF
    As an underground multi-purpose neutrino detector with 20 kton liquid scintillator, Jiangmen Underground Neutrino Observatory (JUNO) is competitive with and complementary to the water-Cherenkov detectors on the search for the diffuse supernova neutrino background (DSNB). Typical supernova models predict 2-4 events per year within the optimal observation window in the JUNO detector. The dominant background is from the neutral-current (NC) interaction of atmospheric neutrinos with 12C nuclei, which surpasses the DSNB by more than one order of magnitude. We evaluated the systematic uncertainty of NC background from the spread of a variety of data-driven models and further developed a method to determine NC background within 15\% with {\it{in}} {\it{situ}} measurements after ten years of running. Besides, the NC-like backgrounds can be effectively suppressed by the intrinsic pulse-shape discrimination (PSD) capabilities of liquid scintillators. In this talk, I will present in detail the improvements on NC background uncertainty evaluation, PSD discriminator development, and finally, the potential of DSNB sensitivity in JUNO

    Potential of Core-Collapse Supernova Neutrino Detection at JUNO

    Get PDF
    JUNO is an underground neutrino observatory under construction in Jiangmen, China. It uses 20kton liquid scintillator as target, which enables it to detect supernova burst neutrinos of a large statistics for the next galactic core-collapse supernova (CCSN) and also pre-supernova neutrinos from the nearby CCSN progenitors. All flavors of supernova burst neutrinos can be detected by JUNO via several interaction channels, including inverse beta decay, elastic scattering on electron and proton, interactions on C12 nuclei, etc. This retains the possibility for JUNO to reconstruct the energy spectra of supernova burst neutrinos of all flavors. The real time monitoring systems based on FPGA and DAQ are under development in JUNO, which allow prompt alert and trigger-less data acquisition of CCSN events. The alert performances of both monitoring systems have been thoroughly studied using simulations. Moreover, once a CCSN is tagged, the system can give fast characterizations, such as directionality and light curve

    EOS 2023 Workshop

    No full text
    The EOS system serving as a grid storage element at IHEP, CAS started since 2021, working for JUNO experiment. A CTA with its EOS SE buffer also started its service for JUNO since 2023. In this talk, we would like to share our experiences and thoughts about the SE operations, including deployment, monitoring, data transfer performance, authentication management with VOMS and Sci-token, etc. Meanwhile, as EOS SE will replace the DPM as our new Beijing-T2 site storage system, this talk will also share our plan and status about EOS upgrading. The Beijing LHCb T1 site storage construction status will also be included in this talk

    Human user authentication based on mouse dynamics: a feasibility study

    Get PDF
    Security problems have been discussed for a long time in the past recent decades in many fields such as communication, networking and user authentication. Security and authentication methods have also been explored for a long time by many researchers, and many ecient ways have been developed and used in modern society. Password and fingerprint based user authentication methods are most common user authentication methods being used in our daily lives. With computers and smart phones population growing vastly, we need to put more attention on the security methods. However, those traditional authentication methods are not safe and ecient enough. Passwords are stolen and revealed to hackers, while fingerprint can be easily got from an authenticated person. We moved our eyes on another way of security and authentication- biometric kinesiology. The muscle in our body can remember the movement if we practiced an action a lot, and that memory is built in the body, not in our brain memory, which means that we cannot forget a practiced action in the way we forget a password. We proposed to use the action with mouse from an authenticated user as the password of a system, in which only the user perform right action can be regarded as an authenticated user. Otherwise the system will reject the user. This movement is hard to mimic unless the hacker do a lot of practice of that certain movement and do exactly the same as an authenticated user. This is very difficult because we modified the normal mouse and the mouse will not move as the hacker expect. What’s more, only the authenticated user knows how was the mouse be modified and how to act to adjust to that modification. In this way our proposed approach is much safer than the above traditional security and authentication methods. However, this is a feasibility study and more experiment will be done to prove our proposal and we will discuss it in the future work chapter.</p
    • …
    corecore