602 research outputs found

    The STAR MAPS-based PiXeL detector

    Get PDF
    The PiXeL detector (PXL) for the Heavy Flavor Tracker (HFT) of the STAR experiment at RHIC is the first application of the state-of-the-art thin Monolithic Active Pixel Sensors (MAPS) technology in a collider environment. Custom built pixel sensors, their readout electronics and the detector mechanical structure are described in detail. Selected detector design aspects and production steps are presented. The detector operations during the three years of data taking (2014-2016) and the overall performance exceeding the design specifications are discussed in the conclusive sections of this paper

    Effect of Tuned Parameters on a LSA MCQ Answering Model

    Full text link
    This paper presents the current state of a work in progress, whose objective is to better understand the effects of factors that significantly influence the performance of Latent Semantic Analysis (LSA). A difficult task, which consists in answering (French) biology Multiple Choice Questions, is used to test the semantic properties of the truncated singular space and to study the relative influence of main parameters. A dedicated software has been designed to fine tune the LSA semantic space for the Multiple Choice Questions task. With optimal parameters, the performances of our simple model are quite surprisingly equal or superior to those of 7th and 8th grades students. This indicates that semantic spaces were quite good despite their low dimensions and the small sizes of training data sets. Besides, we present an original entropy global weighting of answers' terms of each question of the Multiple Choice Questions which was necessary to achieve the model's success.Comment: 9 page

    Machine learning based IoT Intrusion Detection System:an MQTT case study (MQTT-IoT-IDS2020 Dataset)

    Get PDF
    The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general-purpose Intrusion Detection Systems (IDS) to be deployed for special purpose networks usage. Numerous lightweight protocols are being proposed for IoT devices communication usage. One of the distinguishable IoT machine-to-machine communication protocols is Message Queuing Telemetry Transport (MQTT) protocol. However, as per the authors best knowledge, there are no available IDS datasets that include MQTT benign or attack instances and thus, no IDS experimental results available. In this paper, the effectiveness of six Machine Learning (ML) techniques to detect MQTT-based attacks is evaluated. Three abstraction levels of features are assessed, namely, packet-based, unidirectional flow, and bidirectional flow features. An MQTT simulated dataset is generated and used for the training and evaluation processes. The dataset is released with an open access licence to help the research community further analyse the accompanied challenges. The experimental results demonstrated the adequacy of the proposed ML models to suit MQTT-based networks IDS requirements. Moreover, the results emphasise on the importance of using flow-based features to discriminate MQTT-based attacks from benign traffic, while packet-based features are sufficient for traditional networking attacks

    Aerodynamics of a stay cable with helical fillets - Part II:Fluctuating load and wake characteristics

    Get PDF
    This paper presents the fluctuating load and wake characteristics of a bridge stay cable model with helical fillets in smooth flow at high Reynolds numbers. Over the Reynolds numbers tested, the frequency content of the lift coefficient in individual pressure tap rings, was dominated by low frequencies. At lower Reynolds numbers, these were caused by single separation bubble instabilities. At smaller spectral magnitudes, a vortex shedding process was observed, with a local Strouhal number dependent on the angular position of the helical fillet nearly normal to flow. For the average over the four rings, the low frequencies cancelled out, and left a high frequency vortex shedding process with a Strouhal number of 0.19 as the prominent load. The Strouhal number was maintained throughout the Reynolds number range tested. In dynamic tests, the pressure distribution was found to periodically rotate relative to the cable circumference at the natural frequency of the cable. Also, when observing the velocity components in the wake, a periodic motion of the wake synchronized with the cable motion was revealed. In static tests, the wake field instantly displaced towards the same side as the lift force generated by the asymmetric pressure distribution during boundary layer instabilities.Peer reviewed: YesNRC publication: Ye

    Solving order constraints in logarithmic space.

    Get PDF
    We combine methods of order theory, finite model theory, and universal algebra to study, within the constraint satisfaction framework, the complexity of some well-known combinatorial problems connected with a finite poset. We identify some conditions on a poset which guarantee solvability of the problems in (deterministic, symmetric, or non-deterministic) logarithmic space. On the example of order constraints we study how a certain algebraic invariance property is related to solvability of a constraint satisfaction problem in non-deterministic logarithmic space

    Aerodynamics of a stay cable with helical fillets - Part I:Stability and load characteristics

    Get PDF
    The aerodynamic behaviour of a bridge stay cable with helical fillets in smooth flow at high Reynolds numbers is presented in this paper. The cable response and related sectional load characteristics were studied experimentally on a 1:1 scale cable section model. The studies showed that a cable with helical fillets inclined 60\ub0 to the flow could experience large amplitude wind induced vibrations and that the occurrence of vibrations were highly dependent on cable surface irregularities. The ambition is not to explain fully the excitation mechanism, but to present global and local influences of the helical fillets on the flow field. It was revealed that the flow field around the cable shifted between semi-stable transition states which took place when the transition from laminar to turbulent flow propagated from the free shear layers to the boundary layer. The transitions would form locally and spread along the cable axis. The helical fillet appeared to dominate the local flow structures when located at an angular position between 40\ub0 and 130\ub0 from the stagnation region. In the stagnation and base regions, the surface irregularities appeared to dominate. Furthermore, the helical fillets displaced the mean stagnation line. The application of quasi-steady theory with the measurement data available appeared not to be able to explain the vibrations.Peer reviewed: YesNRC publication: Ye

    Synthetic RNA modules for fine-tuning gene expression levels in yeast by modulating RNase III activity

    Get PDF
    The design of synthetic gene networks requires an extensive genetic toolbox to control the activities and levels of protein components to achieve desired cellular functions. Recently, a novel class of RNA-based control modules, which act through post-transcriptional processing of transcripts by directed RNase III (Rnt1p) cleavage, were shown to provide predictable control over gene expression and unique properties for manipulating biological networks. Here, we increase the regulatory range of the Rnt1p control elements, by modifying a critical region for enzyme binding to its hairpin substrates, the binding stability box (BSB). We used a high throughput, cell-based selection strategy to screen a BSB library for sequences that exhibit low fluorescence and thus high Rnt1p processing efficiencies. Sixteen unique BSBs were identified that cover a range of protein expression levels, due to the ability of the sequences to affect the hairpin cleavage rate and to form active cleavable complexes with Rnt1p. We further demonstrated that the activity of synthetic Rnt1p hairpins can be rationally programmed by combining the synthetic BSBs with a set of sequences located within a different region of the hairpin that directly modulate cleavage rates, providing a modular assembly strategy for this class of RNA-based control elements

    Challenging the other: exploring the role of opponent gender in digital game competition for female players

    Get PDF
    The present study investigated the effect of opponent gender on the game experience of female players. Concretely, it looked into skill perception and player emotions of women in same-gender and cross-gender game competition. We set up a 2 (male vs. female opponent) x 2 (low vs. high competitive women) x 2 (lost vs. won game) experimental design in which women were instructed to play against a proclaimed male and female competitor. Unknowingly, participants played against an AI, however, which was configured to produce a winning and a losing condition for each opponent by manipulating difficulty. Results indicated that opponent gender only had an effect on perceived stress, which was higher with male opponents. Moreover, players evaluated their own gaming skills as lower when they thought they were playing against men and the skills of presumed male opponents as higher. Importantly our results also showed that the above described pattern for self-perceived skills and perceived opponent skills was modulated by trait competitiveness with a larger effect size for low competitive women. Overall, this study illustrates that gender dynamics affect the play experience of women in cross-gender gaming competition. Implications and suggestions for future research are discussed
    corecore