306,576 research outputs found
Realistic Gluino Axion Model Consistent with Supersymmetry Breaking at the TeV Scale
The recently proposed model of using the dynamical phase of the gluino to
solve the strong CP problem is shown to admit a specific realization in terms
of fundamental singlet superfields, such that the breaking of supersymmetry
occurs only at the TeV scale, despite the large axion scale of 10^{9} to
10^{12} GeV. Phenomenological implications are discussed.Comment: 12 pp, 2 fig
Operating theatre photography for orthopaedics and aesthetic surgery.
The aim of this paper is to examine the author's personal experience and practice in operating theatre photography. The ways of working are personal to the author but hopefully will help others in undertaking this type of work
Modelling and simulation of a biometric identity-based cryptography
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
Analysis of security protocols using finite-state machines
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay
Biometric identity-based cryptography for e-Government environment
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
Criticality and Continuity of Explosive Site Percolation in Random Networks
This Letter studies the critical point as well as the discontinuity of a
class of explosive site percolation in Erd\"{o}s and R\'{e}nyi (ER) random
network. The class of the percolation is implemented by introducing a best-of-m
rule. Two major results are found: i). For any specific , the critical
percolation point scales with the average degree of the network while its
exponent associated with is bounded by -1 and . ii).
Discontinuous percolation could occur on sparse networks if and only if
approaches infinite. These results not only generalize some conclusions of
ordinary percolation but also provide new insights to the network robustness.Comment: 5 pages, 5 figure
Reexamining the "finite-size" effects in isobaric yield ratios using a statistical abrasion-ablation model
The "finite-size" effects in the isobaric yield ratio (IYR), which are shown
in the standard grand-canonical and canonical statistical ensembles (SGC/CSE)
method, is claimed to prevent obtaining the actual values of physical
parameters. The conclusion of SGC/CSE maybe questionable for neutron-rich
nucleus induced reaction. To investigate whether the IYR has "finite-size"
effects, the IYR for the mirror nuclei [IYR(m)] are reexamined using a modified
statistical abrasion-ablation (SAA) model. It is found when the projectile is
not so neutron-rich, the IYR(m) depends on the isospin of projectile, but the
size dependence can not be excluded. In reactions induced by the very
neutron-rich projectiles, contrary results to those of the SGC/CSE models are
obtained, i.e., the dependence of the IYR(m) on the size and the isospin of the
projectile is weakened and disappears both in the SAA and the experimental
results.Comment: 5 pages and 4 figure
Decay of Z into Three Pseudoscalar Bosons
We consider the decay of the boson into three pseudoscalar bosons in a
general two-Higgs-doublet model. Assuming to be very small, and that of
the two physical neutral scalar bosons and , only couples to
through , we find the branching fraction to be negligible
for moderate values of , if there is no term in the Higgs potential; otherwise there
is no absolute bound but very large quartic couplings (beyond the validity of
perturbation theory) are needed for it to be observable.Comment: 8 pages including 1 fi
- …