306,576 research outputs found

    Realistic Gluino Axion Model Consistent with Supersymmetry Breaking at the TeV Scale

    Get PDF
    The recently proposed model of using the dynamical phase of the gluino to solve the strong CP problem is shown to admit a specific realization in terms of fundamental singlet superfields, such that the breaking of supersymmetry occurs only at the TeV scale, despite the large axion scale of 10^{9} to 10^{12} GeV. Phenomenological implications are discussed.Comment: 12 pp, 2 fig

    Operating theatre photography for orthopaedics and aesthetic surgery.

    Get PDF
    The aim of this paper is to examine the author's personal experience and practice in operating theatre photography. The ways of working are personal to the author but hopefully will help others in undertaking this type of work

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Analysis of security protocols using finite-state machines

    Get PDF
    This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay

    Biometric identity-based cryptography for e-Government environment

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Criticality and Continuity of Explosive Site Percolation in Random Networks

    Full text link
    This Letter studies the critical point as well as the discontinuity of a class of explosive site percolation in Erd\"{o}s and R\'{e}nyi (ER) random network. The class of the percolation is implemented by introducing a best-of-m rule. Two major results are found: i). For any specific mm, the critical percolation point scales with the average degree of the network while its exponent associated with mm is bounded by -1 and 0.5\sim-0.5. ii). Discontinuous percolation could occur on sparse networks if and only if mm approaches infinite. These results not only generalize some conclusions of ordinary percolation but also provide new insights to the network robustness.Comment: 5 pages, 5 figure

    Reexamining the "finite-size" effects in isobaric yield ratios using a statistical abrasion-ablation model

    Full text link
    The "finite-size" effects in the isobaric yield ratio (IYR), which are shown in the standard grand-canonical and canonical statistical ensembles (SGC/CSE) method, is claimed to prevent obtaining the actual values of physical parameters. The conclusion of SGC/CSE maybe questionable for neutron-rich nucleus induced reaction. To investigate whether the IYR has "finite-size" effects, the IYR for the mirror nuclei [IYR(m)] are reexamined using a modified statistical abrasion-ablation (SAA) model. It is found when the projectile is not so neutron-rich, the IYR(m) depends on the isospin of projectile, but the size dependence can not be excluded. In reactions induced by the very neutron-rich projectiles, contrary results to those of the SGC/CSE models are obtained, i.e., the dependence of the IYR(m) on the size and the isospin of the projectile is weakened and disappears both in the SAA and the experimental results.Comment: 5 pages and 4 figure

    Decay of Z into Three Pseudoscalar Bosons

    Get PDF
    We consider the decay of the ZZ boson into three pseudoscalar bosons in a general two-Higgs-doublet model. Assuming mAm_A to be very small, and that of the two physical neutral scalar bosons h1h_1 and h2h_2, AA only couples to ZZ through h1h_1, we find the ZAAAZ \to A A A branching fraction to be negligible for moderate values of tanβv2/v1\tan \beta \equiv v_2/v_1, if there is no λ5(Φ1Φ2)2+h.c.\lambda_5 (\Phi_1^\dagger \Phi_2)^2 + h.c. term in the Higgs potential; otherwise there is no absolute bound but very large quartic couplings (beyond the validity of perturbation theory) are needed for it to be observable.Comment: 8 pages including 1 fi
    corecore