9,331 research outputs found

    Coherent Network Analysis of Gravitational Waves from Three-Dimensional Core-Collapse Supernova Models

    Full text link
    Using predictions from three-dimensional (3D) hydrodynamics simulations of core-collapse supernovae (CCSNe), we present a coherent network analysis to detection, reconstruction, and the source localization of the gravitational-wave (GW) signals. We use the {\tt RIDGE} pipeline for the analysis, in which the network of LIGO Hanford, LIGO Livingston, VIRGO, and KAGRA is considered. By combining with a GW spectrogram analysis, we show that several important hydrodynamics features in the original waveforms persist in the waveforms of the reconstructed signals. The characteristic excess in the spectrograms originates not only from rotating core-collapse, bounce and the subsequent ring down of the proto-neutron star (PNS) as previously identified, but also from the formation of magnetohydrodynamics jets and non-axisymmetric instabilities in the vicinity of the PNS. Regarding the GW signals emitted near at the rotating core bounce, the horizon distance extends up to ∼\sim 18 kpc for the most rapidly rotating 3D model in this work. Following the rotating core bounce, the dominant source of the GW emission shifts to the non-axisymmetric instabilities. The horizon distances extend maximally up to ∼\sim 40 kpc seen from the spin axis. With an increasing number of 3D models trending towards explosion recently, our results suggest that in addition to the best studied GW signals due to rotating core-collapse and bounce, the time is ripe to consider how we can do science from GWs of CCSNe much more seriously than before. Particularly the quasi-periodic signals due to the non-axisymmetric instabilities and the detectability should deserve further investigation to elucidate the inner-working of the rapidly rotating CCSNe.Comment: PRD in pres

    Data-driven modeling of the olfactory neural codes and their dynamics in the insect antennal lobe

    Get PDF
    Recordings from neurons in the insects' olfactory primary processing center, the antennal lobe (AL), reveal that the AL is able to process the input from chemical receptors into distinct neural activity patterns, called olfactory neural codes. These exciting results show the importance of neural codes and their relation to perception. The next challenge is to \emph{model the dynamics} of neural codes. In our study, we perform multichannel recordings from the projection neurons in the AL driven by different odorants. We then derive a neural network from the electrophysiological data. The network consists of lateral-inhibitory neurons and excitatory neurons, and is capable of producing unique olfactory neural codes for the tested odorants. Specifically, we (i) design a projection, an odor space, for the neural recording from the AL, which discriminates between distinct odorants trajectories (ii) characterize scent recognition, i.e., decision-making based on olfactory signals and (iii) infer the wiring of the neural circuit, the connectome of the AL. We show that the constructed model is consistent with biological observations, such as contrast enhancement and robustness to noise. The study answers a key biological question in identifying how lateral inhibitory neurons can be wired to excitatory neurons to permit robust activity patterns

    Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities

    Full text link
    The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the constructional design, structural vulnerabilities, and offer security assessments, implementation evaluations, and a particular focus on side-channel attacks. We analyze global standardization processes, evaluate their metrics in relation to real-world applications, and primarily focus on standardized PQ schemes, selected additional signature competition candidates, and PQ-secure cutting-edge schemes beyond standardization. Finally, we present visions and potential future directions for a seamless transition to the PQ era

    Measurements of the Production, Decay and Properties of the Top Quark: A Review

    Get PDF
    With the full Tevatron Run II and early LHC data samples, the opportunity for furthering our understanding of the properties of the top quark has never been more promising. Although the current knowledge of the top quark comes largely from Tevatron measurements, the experiments at the LHC are poised to probe top-quark production and decay in unprecedented regimes. Although no current top quark measurements conclusively contradict predictions from the standard model, the precision of most measurements remains statistically limited. Additionally, some measurements, most notably the forward-backward asymmetry in top quark pair production, show tantalizing hints of beyond-the-Standard-Model dynamics. The top quark sample is growing rapidly at the LHC, with initial results now public. This review examines the current status of top quark measurements in the particular light of searching for evidence of new physics, either through direct searches for beyond the standard model phenomena or indirectly via precise measurements of standard model top quark properties

    Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

    Full text link
    Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and other digital assets such as NFTs. However, these wallets are not immune to security threats, particularly from the growing risk of quantum computing. The use of traditional public-key cryptography systems in digital asset wallets makes them vulnerable to attacks from quantum computers, which may increase in the future. Moreover, current digital wallets require users to keep track of seed-phrases, which can be challenging and lead to additional security risks. To overcome these challenges, a new algorithm is proposed that uses post-quantum cryptography (PQC) and zero-knowledge proof (ZKP) to enhance the security of digital asset wallets. The research focuses on the use of the Lattice-based Threshold Secret Sharing Scheme (LTSSS), Kyber Algorithm for key generation and ZKP for wallet unlocking, providing a more secure and user-friendly alternative to seed-phrase, brain and multi-sig protocol wallets. This algorithm also includes several innovative security features such as recovery of wallets in case of downtime of the server, and the ability to rekey the private key associated with a specific username-password combination, offering improved security and usability. The incorporation of PQC and ZKP provides a robust and comprehensive framework for securing digital assets in the present and future. This research aims to address the security challenges faced by digital asset wallets and proposes practical solutions to ensure their safety in the era of quantum computing
    • …
    corecore