6 research outputs found

    The use the a high intensity neutrino beam from the ESS proton linac for measurement of neutrino CP violation and mass hierarchy

    Get PDF
    It is proposed to complement the ESS proton linac with equipment that would enable the production, concurrently with the production of the planned ESS beam used for neutron production, of a 5 MW beam of 1023^{23} 2.5 GeV protons per year in microsecond short pulses to produce a neutrino Super Beam, and to install a megaton underground water Cherenkov detector in a mine to detect νe\nu_e appearance in the produced νΟ\nu_\mu beam. Results are presented of preliminary calculations of the sensitivity to neutrino CP violation and the mass hierarchy as a function of the neutrino baseline. The results indicate that, with 8 years of data taking with an antineutrino beam and 2 years with a neutrino beam and a baseline distance of around 400 km, CP violation could be discovered at 5 σ\sigma (3 σ\sigma) confidence level in 48% (73%) of the total CP violation angular range. With the same baseline, the neutrino mass hierarchy could be determined at 3 σ\sigma level over most of the total CP violation angular range. There are several underground mines with a depth of more than 1000 m, which could be used for the creation of the underground site for the neutrino detector and which are situated within or near the optimal baseline range

    Phenomenology Tools on Cloud Infrastructures using OpenStack

    Get PDF
    We present a new environment for computations in particle physics phenomenology employing recent developments in cloud computing. On this environment users can create and manage “virtual” machines on which the phenomenology codes/tools can be deployed easily in an automated way. We analyze the performance of this environment based on “virtual” machines versus the utilization of physical hardware. In this way we provide a qualitative result for the influence of the host operating system on the performance of a representative set of applications for phenomenology calculations.Peer Reviewe

    Perceptions and experiences on language anxiety on EEGAFI senior high school students’ English speaking classes: SY 2022-2023

    Get PDF
    English language is one of the most challenging languages to learn, and students often struggle with it, especially in English-speaking Classes. Additionally, English is widely used throughout the world, which has put second language learners on a difficult path to acquiring excellent communication skills (Lababidi, 2015). In fact, not all students can easily achieve their goals of learning English and follow the language learning process well. In this study, researchers aim to investigate and determine the perceptions and experiences on Language Anxiety of EEGAFI Senior High School Students in English speaking classes. The design selected for this study was quantitative research in natures using interviews. Furthermore, the data has been collected from (n=115) respondents of EEGAFI Senior High School Students. Researchers used simple random sampling method in collecting participants. In this study, it was found out that these five factors (i.e., lack of confidence, poor quality teaching, fear of making mistakes, fear of evaluation, and communication apprehension) are causes of Language Anxiety. In addition, the researchers found that students would feel less anxious when they have lack of confidence and positive thinking, since students selected these as their preferred easing techniques in reducing Language anxiety (see bar graph 1.0). However, students also send some tips on how to reduce language anxiety (see table 1.0)

    Goal Modelling for Security Problem Matching and Pattern Enforcement

    Get PDF
    Earlier detection of security problems and implementation of solutions would be a cost- effective approach for developing secure software systems. Developing, gathering and sharing similar repeatable programming knowledge and solutions has led to the introduction of Patterns in the 90’s. The same concept has been adopted to realise recurring security knowledge and hence security patterns. Detecting a security problem using the patterns in requirements models may lead to its early prevention. In this paper, we have provided an overview of security patterns in the past two decades, followed by a summary of i*/Tropos goal modelling framework. Section 2 outlines model-driven development, meta-models and model transformation, within the context of requirements engineering. We have summarised security access control types, and formally described role-based access control (RBAC) in particular as a pattern that may occur in the stakeholder requirements models. Then we have used the i* modelling language and some elements from its constructs - model-driven queries and transformations - to describe the pattern enforcement. Applied to a number of requirements models within literature, the pattern-based transformation tool we designed has automated the detection and resolution of this security pattern in several goal-oriented stakeholder requirements. Finally, the paper also reflects on a variety of existing applications and future work
    corecore