8,619 research outputs found

    Searching for anomalous quartic gauge couplings at muon colliders using principle component analysis

    Full text link
    Searching for new physics~(NP) is one of the areas of high-energy physics that requires the most processing of large amounts of data. At the same time, quantum computing has huge potential advantages when dealing with large amounts of data. The principal component analysis~(PCA) algorithm may be one of the bridges connecting these two aspects. On the one hand, it can be used for anomaly detection, and on the other hand, there are corresponding quantum algorithms for PCA. In this paper, we investigate how to use PCA to search for NP. Taking the example of anomalous quartic gauge couplings in the tri-photon process at muon colliders, we find that PCA can be used to search for NP. Compared with the traditional event selection strategy, the expected constraints on the operator coefficients obtained by PCA based event selection strategy are even better.Comment: 14 pages, 6 figure

    Thermomechanical property of rice kernels studied by DMA

    Get PDF
    The thermomechanical property of the rice kernels was investigated using a dynamic mechanical analyzer (DMA). The length change of rice kernels with a loaded constant force along the major axis direction was detected during temperature scanning. The thermomechanical transition occurred in rice kernels when heated. The transition temperatures were determined as 47°C, 50°C and 56°C for the medium-grain rice with the moisture contents of 18.1%, 16.0% and 12.5% (wet basis), respectively. Length change of the rice kernels increased with the increase of the temperature and moisture content. Among the four rice varieties investigated, the results showed that the thermomechanical property was not significantly affected by variety

    Linux Kernel Vulnerabilities: State-of-the-Art Defenses and Open Problems

    Get PDF
    Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base. This paper evaluates the current state-of-the-art with respect to kernel protection techniques, by presenting two case studies of Linux kernel vulnerabilities. First, this paper presents data on 141 Linux kernel vulnerabilities discovered from January 2010 to March 2011, and second, this paper examines how well state-of-the-art techniques address these vulnerabilities. The main findings are that techniques often protect against certain exploits of a vulnerability but leave other exploits of the same vulnerability open, and that no effective techniques exist to handle semantic vulnerabilities---violations of high-level security invariants.United States. Defense Advanced Research Projects Agency. Clean-slate design of Resilient, Adaptive, Secure Hosts (Contract #N66001-10-2-4089
    • …
    corecore