998 research outputs found
Fast simulation of the CEPC detector with Delphes
Fast simulation tools are highly appreciated in particle physics
phenomenology studies, especially in the exploration of the physics potential
of future experimental facilities. The Circular Electron Positron Collider is a
proposed Higgs and Z factory that can precisely measure the Higgs boson
properties and the electroweak precision observables. A fast-simulation toolkit
dedicated to the CEPC detector has been developed using Delphes. The comparison
shows that this fast simulation tool is highly consistent with the full
simulation, on a set of benchmark distributions. Therefore, we recommend this
fast simulation toolkit for CEPC phenomenological investigations
at CEPC: ISR effect with MadGraph
The Circular Electron Positron Collider (CEPC) is a future Higgs factory
proposed by the Chinese high energy physics community. It will operate at a
center-of-mass energy of 240-250 GeV. The CEPC will accumulate an integrated
luminosity of 5 ab in ten years' operation. With GEANT4-based full
simulation samples for CEPC, Higgs boson decaying into electron pair is studied
at the CEPC. The upper limit of could reach
0.024\% at 95\% confidence level. The signal process is generated by MadGraph,
with Initial State Radiation (ISR) implemented, as a first step to adjust
MadGraph for a electron positron Collider.Comment: Accepted version by J.P.
Sapiens Chain: A Blockchain-based Cybersecurity Framework
Recently, cybersecurity becomes more and more important due to the rapid
development of Internet. However, existing methods are in reality highly
sensitive to attacks and are far more vulnerable than expected, as they are
lack of trustable measures. In this paper, to address the aforementioned
problems, we propose a blockchain-based cybersecurity framework, termed as
Sapiens Chain, which can protect the privacy of the anonymous users and ensure
that the transactions are immutable by providing decentralized and trustable
services. Integrating semantic analysis, symbolic execution, and routing
learning methods into intelligent auditing, this framework can achieve good
accuracy for detecting hidden vulnerabilities. In addition, a revenue incentive
mechanism, which aims to donate participants, is built. The practical results
demonstrate the effectiveness of the proposed framework
3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models
3D point cloud models are widely applied in safety-critical scenes, which
delivers an urgent need to obtain more solid proofs to verify the robustness of
models. Existing verification method for point cloud model is time-expensive
and computationally unattainable on large networks. Additionally, they cannot
handle the complete PointNet model with joint alignment network (JANet) that
contains multiplication layers, which effectively boosts the performance of 3D
models. This motivates us to design a more efficient and general framework to
verify various architectures of point cloud models. The key challenges in
verifying the large-scale complete PointNet models are addressed as dealing
with the cross-non-linearity operations in the multiplication layers and the
high computational complexity of high-dimensional point cloud inputs and added
layers. Thus, we propose an efficient verification framework, 3DVerifier, to
tackle both challenges by adopting a linear relaxation function to bound the
multiplication layer and combining forward and backward propagation to compute
the certified bounds of the outputs of the point cloud models. Our
comprehensive experiments demonstrate that 3DVerifier outperforms existing
verification algorithms for 3D models in terms of both efficiency and accuracy.
Notably, our approach achieves an orders-of-magnitude improvement in
verification efficiency for the large network, and the obtained certified
bounds are also significantly tighter than the state-of-the-art verifiers. We
release our tool 3DVerifier via https://github.com/TrustAI/3DVerifier for use
by the community
Variational Learning for the Inverted Beta-Liouville Mixture Model and Its Application to Text Categorization
he finite invert Beta-Liouville mixture model (IBLMM) has recently gained some attention due to its positive data modeling capability. Under the conventional variational inference (VI) framework, the analytically tractable solution to the optimization of the variational posterior distribution cannot be obtained, since the variational object function involves evaluation of intractable moments. With the recently proposed extended variational inference (EVI) framework, a new function is proposed to replace the original variational object function in order to avoid intractable moment computation, so that the analytically tractable solution of the IBLMM can be derived in an effective way. The good performance of the proposed approach is demonstrated by experiments with both synthesized data and a real-world application namely text categorization
QuantumEyes: Towards Better Interpretability of Quantum Circuits
Quantum computing offers significant speedup compared to classical computing,
which has led to a growing interest among users in learning and applying
quantum computing across various applications. However, quantum circuits, which
are fundamental for implementing quantum algorithms, can be challenging for
users to understand due to their underlying logic, such as the temporal
evolution of quantum states and the effect of quantum amplitudes on the
probability of basis quantum states. To fill this research gap, we propose
QuantumEyes, an interactive visual analytics system to enhance the
interpretability of quantum circuits through both global and local levels. For
the global-level analysis, we present three coupled visualizations to delineate
the changes of quantum states and the underlying reasons: a Probability Summary
View to overview the probability evolution of quantum states; a State Evolution
View to enable an in-depth analysis of the influence of quantum gates on the
quantum states; a Gate Explanation View to show the individual qubit states and
facilitate a better understanding of the effect of quantum gates. For the
local-level analysis, we design a novel geometrical visualization Dandelion
Chart to explicitly reveal how the quantum amplitudes affect the probability of
the quantum state. We thoroughly evaluated QuantumEyes as well as the novel
QuantumEyes integrated into it through two case studies on different types of
quantum algorithms and in-depth expert interviews with 12 domain experts. The
results demonstrate the effectiveness and usability of our approach in
enhancing the interpretability of quantum circuits
Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method
In recent years, blockchain-based techniques have been widely used in
cybersecurity, owing to the decentralization, anonymity, credibility and not be
tampered properties of the blockchain. As one of the decentralized framework,
Sapiens Chain was proposed to protect cybersecurity by scheduling the
computational resources dynamically, which were owned by Computational
Resources Owners (CROs). However, when CROs in the same pool attack each other,
all CROs will earn less. In this paper, we tackle the problem of prisoner's
dilemma from the perspective of CROs. We first define a game that a CRO
infiltrates another pool and perform an attack. In such game, the honest CRO
can control the payoffs and increase its revenue. By simulating this game, we
propose to apply Zero Determinant (ZD) strategy on strategy decision, which can
be categorized into cooperation and defecting. Our experimental results
demonstrate the effectiveness of the proposed strategy decision method
Recommended from our members
Gut stem cell aging is driven by mTORC1 via a p38 MAPK-p53 pathway.
Nutrients are absorbed solely by the intestinal villi. Aging of this organ causes malabsorption and associated illnesses, yet its aging mechanisms remain unclear. Here, we show that aging-caused intestinal villus structural and functional decline is regulated by mTORC1, a sensor of nutrients and growth factors, which is highly activated in intestinal stem and progenitor cells in geriatric mice. These aging phenotypes are recapitulated in intestinal stem cell-specific Tsc1 knockout mice. Mechanistically, mTORC1 activation increases protein synthesis of MKK6 and augments activation of the p38 MAPK-p53 pathway, leading to decreases in the number and activity of intestinal stem cells as well as villus size and density. Targeting p38 MAPK or p53 prevents or rescues ISC and villus aging and nutrient absorption defects. These findings reveal that mTORC1 drives aging by augmenting a prominent stress response pathway in gut stem cells and identify p38 MAPK as an anti-aging target downstream of mTORC1
- …