898 research outputs found

    TOP-INDUCED ELECTROWEAK BREAKING IN THE MINIMAL SUPERSYMMETRIC STANDARD MODEL

    Get PDF
    Severe constraints on parameters of the minimal supersymmetric standard model follow from a dynamical electroweak symmetry breaking mechanism dominated by top and stop loops. In particular, the lightest Higgs boson mass is expected to be smaller than 100 GeV.Comment: 10 pages, Latex, 6 Postcript Figure

    User's manual for a TEACH computer program for the analysis of turbulent, swirling reacting flow in a research combustor

    Get PDF
    Described is a computer program for the analysis of the subsonic, swirling, reacting turbulent flow in an axisymmetric, bluff-body research combustor. The program features an improved finite-difference procedure designed to reduce the effects of numerical diffusion and a new algorithm for predicting the pressure distribution within the combustor. A research version of the computer program described in the report was supplied to United Technologies Research Center by Professor A. D. Gosman and his students, R. Benodeker and R. I. Issa, of Imperial College, London. The Imperial College staff also supplied much of the program documentation. Presented are a description of the mathematical model for flow within an axisymmetric bluff-body combustor, the development of the finite-difference procedure used to represent the system of equations, an outline of the algorithm for determining the static pressure distribution within the combustor, a description of the computer program including its input format, and the results for representative test cases

    HERA prospects on Compositeness and New Vector Bosons

    Get PDF
    The absence of deviations from the Standard Model for the differential cross section dσ/dQ2{d\sigma}/{dQ^2} at HERA is used to set limits on electron quark compositeness scale and on new vector bosons, especially the hadrophilic one recently introduced as a possible explanation for LEP/SLC and CDF anomalies.Comment: Latex file, 7 pages and 1 ps fig, few comments on others experiments are added, results are unchanged. To appear in Phys. Let.

    Modeling of premixing-prevaporizing fuel-air mixing passages

    Get PDF
    The development of a computer program for the analytical prediction of the distribution of liquid and vapor fuel in the premixing-prevaporizing passage by the direct injection method is described. The technical approach adopted for this program is to separate the problem into three parts each with its own computer code. These three parts are: calculation of the two-dimensional or axisymmetric air flow; calculation of the three-dimensional fuel droplet evaporation; and calculation of the fuel vapor diffusion. This method of approach is justified because premixing passages operate at lean equivalence ratios. Hence, a weak interaction assumption can be made wherein the airflow can affect the fuel droplet behavior but the fuel droplet behavior does not affect the airflow

    Analytical modeling of operating characteristics of premixing-prevaporizing fuel-air mixing passages. Volume 2: User's manual

    Get PDF
    A user's manual describing the operation of three computer codes (ADD code, PTRAK code, and VAPDIF code) is presented. The general features of the computer codes, the input/output formats, run streams, and sample input cases are described

    Improved version of the eikonal model for absorbing spherical particles

    Get PDF
    We present a new expression of the scattering amplitude, valid for spherical absorbing objects, which leads to an improved version of the eikonal method outside the diffraction region. Limitations of this method are discussed and numerical results are presented and compared successfully with the Mie theory.Comment: 7 pages, postscript figures available on cpt.univ-mrs.fr, to appear in J. Mod. Optic

    PerfWeb: How to Violate Web Privacy with Hardware Performance Events

    Full text link
    The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of regular users but in particular of whistleblowers and dissidents. Yet, in this work we show how a malicious application can infer opened websites from Google Chrome in Incognito mode and from Tor Browser by exploiting hardware performance events (HPEs). In particular, we analyze the browsers' microarchitectural footprint with the help of advanced Machine Learning techniques: k-th Nearest Neighbors, Decision Trees, Support Vector Machines, and in contrast to previous literature also Convolutional Neural Networks. We profile 40 different websites, 30 of the top Alexa sites and 10 whistleblowing portals, on two machines featuring an Intel and an ARM processor. By monitoring retired instructions, cache accesses, and bus cycles for at most 5 seconds, we manage to classify the selected websites with a success rate of up to 86.3%. The results show that hardware performance events can clearly undermine the privacy of web users. We therefore propose mitigation strategies that impede our attacks and still allow legitimate use of HPEs
    corecore