5,544 research outputs found

    Detection of Exotic Massive Hadrons in Ultra High Energy Cosmic Ray Telescopes

    Full text link
    We investigate the detection of exotic massive strongly interacting hadrons (uhecrons) in ultra high energy cosmic ray telescopes. The conclusion is that experiments such as the Pierre Auger Observatory have the potential to detect these particles. It is shown that uhecron showers have clear distinctive features when compared to proton and nuclear showers. The simulation of uhecron air showers, and its detection and reconstruction by fluorescence telescopes is described. We determine basic cuts in observables that will separate uhecrons from the cosmic ray bulk, assuming this is composed by protons. If these are composed by heavier nucleus the separation will be much improved. We also discuss photon induced showers. The complementarity between uhecron detection in accelerator experiments is discussed.Comment: 9 page 9 figure

    Anisotropic Lifshitz Point at O(ϵL2)O(\epsilon_L^2)

    Full text link
    We present the critical exponents νL2\nu_{L2}, ηL2\eta_{L2} and γL\gamma_{L} for an mm-axial Lifshitz point at second order in an ϵL\epsilon_{L} expansion. We introduced a constraint involving the loop momenta along the mm-dimensional subspace in order to perform two- and three-loop integrals. The results are valid in the range 0m<d0 \leq m < d. The case m=0m=0 corresponds to the usual Ising-like critical behavior.Comment: 10 pages, Revte

    Geographic patterns of vertebrate diversity and identification of relevant areas for conservation in Europe

    Get PDF
    The ‘EU Council conclusions on biodiversity post–2010′ re–enforced Europe’s commitment to halt biodiversity loss by 2020. Identifying areas of high–value for biodiversity conservation is an important issue to meet this target. We investigated the geographic pattern of terrestrial vertebrate diversity status in Europe by assessing the species richness, rarity, vulnerability (according to IUCN criteria), and a combined index of the three former for the amphibians, reptiles, bird and mammals of this region. We also correlated the value of all indices with climate and human influence variables. Overall, clear geographic gradients of species diversity were found. The combined biodiversity index indicated that high–value biodiversity areas were mostly located in the Mediterranean basin and the highest vulnerability was found in the Iberian peninsula for most taxa. Across all indexes, the proportion of variance explained by climate and human influence factors was moderate to low. The results obtained in this study have the potential to provide valuable support for nature conservation policies in Europe and, consequently, might contribute to mitigate biodiversity decline in this region

    Sifu - a cybersecurity awareness platform with challenge assessment and intelligent coach

    Get PDF
    Software vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic consequences. Proper handling of software vulnerabilities is essential in the industrial context, particularly when the software is deployed in critical infrastructures. Therefore, several industrial standards mandate secure coding guidelines and industrial software developers’ training, as software quality is a significant contributor to secure software. CyberSecurity Challenges (CSC) form a method that combines serious game techniques with cybersecurity and secure coding guidelines to raise secure coding awareness of software developers in the industry. These cybersecurity awareness events have been used with success in industrial environments. However, until now, these coached events took place on-site. In the present work, we briefly introduce cybersecurity challenges and propose a novel platform that allows these events to take place online. The introduced cybersecurity awareness platform, which the authors call Sifu, performs automatic assessment of challenges in compliance to secure coding guidelines, and uses an artificial intelligence method to provide players with solution-guiding hints. Furthermore, due to its characteristics, the Sifu platform allows for remote (online) learning, in times of social distancing. The CyberSecurity Challenges events based on the Sifu platform were evaluated during four online real-life CSC events. We report on three surveys showing that the Sifu platform’s CSC events are adequate to raise industry software developers awareness on secure coding.info:eu-repo/semantics/publishedVersio

    Neutrino Telescopes as a Direct Probe of Supersymmetry Breaking

    Full text link
    We consider supersymmetric models where the scale of supersymmetry breaking lies between 5 ×106\times 10^6 GeV and 5 ×108\times 10^8 GeV. In this class of theories, which includes models of gauge mediated supersymmetry breaking, the lightest supersymmetric particle is the gravitino. The next to lightest supersymmetric particle is typically a long lived charged slepton with a lifetime between a microsecond and a second, depending on its mass. Collisions of high energy neutrinos with nucleons in the earth can result in the production of a pair of these sleptons. Their very high boost means they typically decay outside the earth. We investigate the production of these particles by the diffuse flux of high energy neutrinos, and the potential for their observation in large ice or water Cerenkov detectors. The relatively small cross-section for the production of supersymmetric particles is partially compensated for by the very long range of heavy particles. The signal in the detector consists of two parallel charged tracks emerging from the earth about 100 meters apart, with very little background. A detailed calculation using the Waxman-Bahcall limit on the neutrino flux and realistic spectra shows that km3^3 experiments could see as many as 4 events a year. We conclude that neutrino telescopes will complement collider searches in the determination of the supersymmetry breaking scale, and may even give the first evidence for supersymmetry at the weak scale.Comment: 4 pages, 3 figure

    Efeito de retardadores de crescimento no tamanho dos ramos da cultivar de videira festival.

    Get PDF
    Com o bjetivo de controlar o crescimento dos ramos da cultivar Festival, como resposta ao uso dos retardadores de crescimento Chlormequat e Paclobutrazol 25%, realizou-se um experimento em condições de campo em Petrolina-P

    CyberSecurity challenges for software developer awareness training in industrial environments

    Get PDF
    Awareness of cybersecurity topics facilitates software developers to produce secure code. This awareness is especially important in industrial environments for the products and services in critical infrastructures. In this work, we address how to raise awareness of software developers on the topic of secure coding. We propose the “CyberSecurity Challenges”, a serious game designed to be used in an industrial environment and address software developers’ needs. Our work distills the experience gained in conducting these CyberSecurity Challenges in an industrial setting. The main contributions are the design of the CyberSecurity Challenges events, the analysis of the perceived benefits, and practical advice for practitioners who wish to design or refine these games.info:eu-repo/semantics/acceptedVersio

    Raising awareness about cloud security in industry through a board game

    Get PDF
    Today, many products and solutions are provided on the cloud; however, the amount and financial losses due to cloud security incidents illustrate the critical need to do more to protect cloud assets adequately. A gap lies in transferring what cloud and security standards recommend and require to industry practitioners working in the front line. It is of paramount importance to raise awareness about cloud security of these industrial practitioners. Under the guidance of design science paradigm, we introduce a serious game to help participants understand the inherent risks, understand the different roles, and encourage proactive defensive thinking in defending cloud assets. In our game, we designed and implemented an automated evaluator as a novel element. We invite the players to build defense plans and attack plans for which the evaluator calculates success likelihoods. The primary target group is industry practitioners, whereas people with limited background knowledge about cloud security can also participate in and benefit from the game. We design the game and organize several trial runs in an industrial setting. Observations of the trial runs and collected feedback indicate that the game ideas and logic are useful and provide help in raising awareness of cloud security in industry. Our preliminary results share insight into the design of the serious game and are discussed in this paper.info:eu-repo/semantics/publishedVersio
    corecore