8,619 research outputs found
Searching for anomalous quartic gauge couplings at muon colliders using principle component analysis
Searching for new physics~(NP) is one of the areas of high-energy physics
that requires the most processing of large amounts of data. At the same time,
quantum computing has huge potential advantages when dealing with large amounts
of data. The principal component analysis~(PCA) algorithm may be one of the
bridges connecting these two aspects. On the one hand, it can be used for
anomaly detection, and on the other hand, there are corresponding quantum
algorithms for PCA. In this paper, we investigate how to use PCA to search for
NP. Taking the example of anomalous quartic gauge couplings in the tri-photon
process at muon colliders, we find that PCA can be used to search for NP.
Compared with the traditional event selection strategy, the expected
constraints on the operator coefficients obtained by PCA based event selection
strategy are even better.Comment: 14 pages, 6 figure
Thermomechanical property of rice kernels studied by DMA
The thermomechanical property of the rice kernels was investigated using a dynamic mechanical analyzer (DMA). The length change of rice kernels with a loaded constant force along the major axis direction was detected during temperature scanning. The thermomechanical transition occurred in rice kernels when heated. The transition temperatures were determined as 47°C, 50°C and 56°C for the medium-grain rice with the moisture contents of 18.1%, 16.0% and 12.5% (wet basis), respectively. Length change of the rice kernels increased with the increase of the temperature and moisture content. Among the four rice varieties investigated, the results showed that the thermomechanical property was not significantly affected by variety
Linux Kernel Vulnerabilities: State-of-the-Art Defenses and Open Problems
Avoiding kernel vulnerabilities is critical to achieving security of many systems, because the kernel is often part of the trusted computing base. This paper evaluates the current state-of-the-art with respect to kernel protection techniques, by presenting two case studies of Linux kernel vulnerabilities. First, this paper presents data on 141 Linux kernel vulnerabilities discovered from January 2010 to March 2011, and second, this paper examines how well state-of-the-art techniques address these vulnerabilities. The main findings are that techniques often protect against certain exploits of a vulnerability but leave other exploits of the same vulnerability open, and that no effective techniques exist to handle semantic vulnerabilities---violations of high-level security invariants.United States. Defense Advanced Research Projects Agency. Clean-slate design of Resilient, Adaptive, Secure Hosts (Contract #N66001-10-2-4089
- …