961 research outputs found

    Fast simulation of the CEPC detector with Delphes

    Full text link
    Fast simulation tools are highly appreciated in particle physics phenomenology studies, especially in the exploration of the physics potential of future experimental facilities. The Circular Electron Positron Collider is a proposed Higgs and Z factory that can precisely measure the Higgs boson properties and the electroweak precision observables. A fast-simulation toolkit dedicated to the CEPC detector has been developed using Delphes. The comparison shows that this fast simulation tool is highly consistent with the full simulation, on a set of benchmark distributions. Therefore, we recommend this fast simulation toolkit for CEPC phenomenological investigations

    H→e+e−H \rightarrow e^+ e^- at CEPC: ISR effect with MadGraph

    Full text link
    The Circular Electron Positron Collider (CEPC) is a future Higgs factory proposed by the Chinese high energy physics community. It will operate at a center-of-mass energy of 240-250 GeV. The CEPC will accumulate an integrated luminosity of 5 ab−1^{\rm{-1}} in ten years' operation. With GEANT4-based full simulation samples for CEPC, Higgs boson decaying into electron pair is studied at the CEPC. The upper limit of B(H→e+e−){\cal B}(H \rightarrow e^+ e^-) could reach 0.024\% at 95\% confidence level. The signal process is generated by MadGraph, with Initial State Radiation (ISR) implemented, as a first step to adjust MadGraph for a electron positron Collider.Comment: Accepted version by J.P.

    Sapiens Chain: A Blockchain-based Cybersecurity Framework

    Full text link
    Recently, cybersecurity becomes more and more important due to the rapid development of Internet. However, existing methods are in reality highly sensitive to attacks and are far more vulnerable than expected, as they are lack of trustable measures. In this paper, to address the aforementioned problems, we propose a blockchain-based cybersecurity framework, termed as Sapiens Chain, which can protect the privacy of the anonymous users and ensure that the transactions are immutable by providing decentralized and trustable services. Integrating semantic analysis, symbolic execution, and routing learning methods into intelligent auditing, this framework can achieve good accuracy for detecting hidden vulnerabilities. In addition, a revenue incentive mechanism, which aims to donate participants, is built. The practical results demonstrate the effectiveness of the proposed framework

    3DVerifier: Efficient Robustness Verification for 3D Point Cloud Models

    Full text link
    3D point cloud models are widely applied in safety-critical scenes, which delivers an urgent need to obtain more solid proofs to verify the robustness of models. Existing verification method for point cloud model is time-expensive and computationally unattainable on large networks. Additionally, they cannot handle the complete PointNet model with joint alignment network (JANet) that contains multiplication layers, which effectively boosts the performance of 3D models. This motivates us to design a more efficient and general framework to verify various architectures of point cloud models. The key challenges in verifying the large-scale complete PointNet models are addressed as dealing with the cross-non-linearity operations in the multiplication layers and the high computational complexity of high-dimensional point cloud inputs and added layers. Thus, we propose an efficient verification framework, 3DVerifier, to tackle both challenges by adopting a linear relaxation function to bound the multiplication layer and combining forward and backward propagation to compute the certified bounds of the outputs of the point cloud models. Our comprehensive experiments demonstrate that 3DVerifier outperforms existing verification algorithms for 3D models in terms of both efficiency and accuracy. Notably, our approach achieves an orders-of-magnitude improvement in verification efficiency for the large network, and the obtained certified bounds are also significantly tighter than the state-of-the-art verifiers. We release our tool 3DVerifier via https://github.com/TrustAI/3DVerifier for use by the community

    Variational Learning for the Inverted Beta-Liouville Mixture Model and Its Application to Text Categorization

    Get PDF
    he finite invert Beta-Liouville mixture model (IBLMM) has recently gained some attention due to its positive data modeling capability. Under the conventional variational inference (VI) framework, the analytically tractable solution to the optimization of the variational posterior distribution cannot be obtained, since the variational object function involves evaluation of intractable moments. With the recently proposed extended variational inference (EVI) framework, a new function is proposed to replace the original variational object function in order to avoid intractable moment computation, so that the analytically tractable solution of the IBLMM can be derived in an effective way. The good performance of the proposed approach is demonstrated by experiments with both synthesized data and a real-world application namely text categorization

    QuantumEyes: Towards Better Interpretability of Quantum Circuits

    Full text link
    Quantum computing offers significant speedup compared to classical computing, which has led to a growing interest among users in learning and applying quantum computing across various applications. However, quantum circuits, which are fundamental for implementing quantum algorithms, can be challenging for users to understand due to their underlying logic, such as the temporal evolution of quantum states and the effect of quantum amplitudes on the probability of basis quantum states. To fill this research gap, we propose QuantumEyes, an interactive visual analytics system to enhance the interpretability of quantum circuits through both global and local levels. For the global-level analysis, we present three coupled visualizations to delineate the changes of quantum states and the underlying reasons: a Probability Summary View to overview the probability evolution of quantum states; a State Evolution View to enable an in-depth analysis of the influence of quantum gates on the quantum states; a Gate Explanation View to show the individual qubit states and facilitate a better understanding of the effect of quantum gates. For the local-level analysis, we design a novel geometrical visualization Dandelion Chart to explicitly reveal how the quantum amplitudes affect the probability of the quantum state. We thoroughly evaluated QuantumEyes as well as the novel QuantumEyes integrated into it through two case studies on different types of quantum algorithms and in-depth expert interviews with 12 domain experts. The results demonstrate the effectiveness and usability of our approach in enhancing the interpretability of quantum circuits

    Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method

    Full text link
    In recent years, blockchain-based techniques have been widely used in cybersecurity, owing to the decentralization, anonymity, credibility and not be tampered properties of the blockchain. As one of the decentralized framework, Sapiens Chain was proposed to protect cybersecurity by scheduling the computational resources dynamically, which were owned by Computational Resources Owners (CROs). However, when CROs in the same pool attack each other, all CROs will earn less. In this paper, we tackle the problem of prisoner's dilemma from the perspective of CROs. We first define a game that a CRO infiltrates another pool and perform an attack. In such game, the honest CRO can control the payoffs and increase its revenue. By simulating this game, we propose to apply Zero Determinant (ZD) strategy on strategy decision, which can be categorized into cooperation and defecting. Our experimental results demonstrate the effectiveness of the proposed strategy decision method
    • …
    corecore