97 research outputs found

    Daisy: Data analysis integrated software system for X-ray experiments

    Full text link
    Daisy (Data Analysis Integrated Software System) has been designed for the analysis and visualization of the X-ray experiments. To address an extensive range of Chinese radiation facilities community's requirements from purely algorithmic problems to scientific computing infrastructure, Daisy sets up a cloud-native platform to support on-site data analysis services with fast feedback and interaction. The plugs-in based application is convenient to process the expected high throughput data flow in parallel at next-generation facilities such as the High Energy Photon Source (HEPS). The objectives, functionality and architecture of Daisy are described in this article

    A High-Speed Asynchronous Data I/O Method for HEPS

    Get PDF
    The High Energy Photon Source (HEPS) is expected to produce a substantial volume of data, lead to immense data I/O pressure during computing. Inefficient data I/O can significantly impact computing performance. To address this challenge, firstly, we have developed a data I/O framework for HEPS. This framework consists of three layers: data channel layer, distributed memory management layer, and I/O interface layer. It mask the underlying data differences in formats and sources, while implementing efficient I/O methods. Additionally, it supports both stream computing and batch computing. Secondly, we have designed a data processing pipeline scheme aimed at reducing I/O latency and optimizing I/O bandwidth utilization during the processing of high-throughput data. This involves breaking down the computing task into several stages, including data loading, data pre-processing, data processing, and data writing, which are executed asynchronously and in parallel. Finally, we introduce the design of stream data I/O process. The primary objective of stream data I/O is to enable real-time online processing of raw data, avoiding I/O bottlenecks caused by disk storage. This approach ensures the stability of data transmission and integrates distributed memory management to guarantee data integrity in memory

    Two distinct superconducting states controlled by orientation of local wrinkles in LiFeAs

    Full text link
    We observe two types of superconducting states controlled by orientations of local wrinkles on the surface of LiFeAs. Using scanning tunneling microscopy/spectroscopy, we find type-I wrinkles enlarge the superconducting gaps and enhance the transition temperature, whereas type-II wrinkles significantly suppress the superconducting gaps. The vortices on wrinkles show a C2 symmetry, indicating the strain effects on the wrinkles. A discontinuous switch of superconductivity occurs at the border between two different wrinkles. Our results demonstrate that the local strain effect could affect superconducting order parameter of LiFeAs with a possible Lifshitz transition, by alternating crystal structure in different directions.Comment: 21 pages, 9 figure

    Real-time Monitoring for the Next Core-Collapse Supernova in JUNO

    Full text link
    Core-collapse supernova (CCSN) is one of the most energetic astrophysical events in the Universe. The early and prompt detection of neutrinos before (pre-SN) and during the SN burst is a unique opportunity to realize the multi-messenger observation of the CCSN events. In this work, we describe the monitoring concept and present the sensitivity of the system to the pre-SN and SN neutrinos at the Jiangmen Underground Neutrino Observatory (JUNO), which is a 20 kton liquid scintillator detector under construction in South China. The real-time monitoring system is designed with both the prompt monitors on the electronic board and online monitors at the data acquisition stage, in order to ensure both the alert speed and alert coverage of progenitor stars. By assuming a false alert rate of 1 per year, this monitoring system can be sensitive to the pre-SN neutrinos up to the distance of about 1.6 (0.9) kpc and SN neutrinos up to about 370 (360) kpc for a progenitor mass of 30M⊙M_{\odot} for the case of normal (inverted) mass ordering. The pointing ability of the CCSN is evaluated by using the accumulated event anisotropy of the inverse beta decay interactions from pre-SN or SN neutrinos, which, along with the early alert, can play important roles for the followup multi-messenger observations of the next Galactic or nearby extragalactic CCSN.Comment: 24 pages, 9 figure

    Potential of Core-Collapse Supernova Neutrino Detection at JUNO

    Get PDF
    JUNO is an underground neutrino observatory under construction in Jiangmen, China. It uses 20kton liquid scintillator as target, which enables it to detect supernova burst neutrinos of a large statistics for the next galactic core-collapse supernova (CCSN) and also pre-supernova neutrinos from the nearby CCSN progenitors. All flavors of supernova burst neutrinos can be detected by JUNO via several interaction channels, including inverse beta decay, elastic scattering on electron and proton, interactions on C12 nuclei, etc. This retains the possibility for JUNO to reconstruct the energy spectra of supernova burst neutrinos of all flavors. The real time monitoring systems based on FPGA and DAQ are under development in JUNO, which allow prompt alert and trigger-less data acquisition of CCSN events. The alert performances of both monitoring systems have been thoroughly studied using simulations. Moreover, once a CCSN is tagged, the system can give fast characterizations, such as directionality and light curve

    Detection of the Diffuse Supernova Neutrino Background with JUNO

    Get PDF
    As an underground multi-purpose neutrino detector with 20 kton liquid scintillator, Jiangmen Underground Neutrino Observatory (JUNO) is competitive with and complementary to the water-Cherenkov detectors on the search for the diffuse supernova neutrino background (DSNB). Typical supernova models predict 2-4 events per year within the optimal observation window in the JUNO detector. The dominant background is from the neutral-current (NC) interaction of atmospheric neutrinos with 12C nuclei, which surpasses the DSNB by more than one order of magnitude. We evaluated the systematic uncertainty of NC background from the spread of a variety of data-driven models and further developed a method to determine NC background within 15\% with {\it{in}} {\it{situ}} measurements after ten years of running. Besides, the NC-like backgrounds can be effectively suppressed by the intrinsic pulse-shape discrimination (PSD) capabilities of liquid scintillators. In this talk, I will present in detail the improvements on NC background uncertainty evaluation, PSD discriminator development, and finally, the potential of DSNB sensitivity in JUNO

    Security Mechanism for user access to Single SSID WLAN

    Get PDF
    Wireless local area network (WLAN) technology is widely used in various enterprises and institutions. In order to facilitate the use of users, they often provide a single SSID access point, resulting in different identities of users authenticated and authorized can connect to the wireless network anytime, anywhere as needed and obtain the same accessible network resources such as bandwidth, access control (ACL) and so on. Multiple SSID can solve the problem but it will be confused to users who don’t know which SSID can be connected. Although we could prevent visitors from accessing intranet resources by isolating the wireless network from the internal network, this would make it impossible for users to use the wireless network for internal office work. In this paper, we propose an access control system that grouping users according to the different identities and users authenticated and authorized can access different network resources because a wireless access point dynamically maps an SSID provided by a mobile station to a BSSID based on a VLAN assignment. The deployment experiment of the solution proves that users of different identities accessing the same wireless network can set different access policies, which effectively improves the security of the wireless network and simplifies the management of the wireless network

    Cyber security detection and monitoring at IHEP private cloud for web services

    No full text
    To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats

    Wander of a Gaussian-Beam Wave Propagating through Kolmogorov and Non-Kolmogorov Turbulence along Laser-Satellite Communication Uplink

    No full text
    It is accepted that there exists two kinds of atmospheric turbulence in the Earth’s aerosphere—Kolmogorov and non-Kolmogorov turbulence; therefore, it is important to research their combined impacts on laser-satellite communications. In this paper, the exponential power spectra of refractive-index fluctuations for non-Kolmogorov turbulence in the free troposphere and stratosphere are proposed, respectively. Based on these two spectra, using the Markov approximation, beam wander displacement variances of a Gaussian-beam wave are derived, respectively, which are valid under weak turbulent fluctuations condition. On this basis, using a three-layer altitude-dependent turbulent spectrum model for vertical/slant path, the combined influence of a three-layer atmospheric turbulence on wander of a Gaussian-beam wave as the carrier wave in laser-satellite communication is studied. This three-layer spectrum is more accurate than a two-layer model. Moreover, the variations of beam wander displacement with beam radius, zenith angles, and nominal value of the refractive-index structure parameter on the ground are estimated. The theory of optical wave propagation through non-Kolmogorov atmospheric turbulence is further enriched and a theoretical model of a three-layer atmospheric turbulence beam wander for a satellite-ground laser communication uplink is established
    • …
    corecore