5,143 research outputs found
R-Hadron and long lived particle searches at the LHC
If long lived charged particles exist, and produced at the LHC, they may
travel with velocity significantly slower than the speed of light. This unique
signature was not considered during the design of the LHC experiments, ATLAS
and CMS. As a result, hardware and trigger capabilities need to be evaluated.
Model independent approaches for finding long lived particles with the LHC
experiments are introduced. They are tested using two bench marks, one in GMSB
and one in Split SUSY. The focus is on hardware and trigger issues, as well as
reconstruction methods developed by ATLAS and CMS. Both experiments suggest
time of flight (TOF) based methods. However, the implementation is different.
In ATLAS a first beta estimation is done already at the trigger level. CMS also
uses dE/dx to estimate beta.Comment: Submitted for the SUSY07 proceedings, 4 pages, LaTeX, 7 eps figure
Artificial Intelligence: Increasing Business Profits at the Cost of Consumer Privacy
Artificial Intelligence may be the most significant technological breakthrough since the development of computers. The promise of greater efficiency and effectiveness is very appealing, especially as that translates into more profitable businesses. The potential applications appear almost endless, crossing every industry and every form of business activity. The potential results cannot even be estimated.
Artificial Intelligence can assist in detecting misinformation, but it can also assist in spreading misinformation when faulty algorithms collect incorrect data. An example of this occurs when customer demographic data mixes information from consumers with the same names. Persons who frequently relocate may also be more likely to have faulty consumer data collected by business research companies. However, in our rush to be the first and the best, we must ask ourselves how much of our privacy we are willing to give up? In this paper, the authors examine this fascinating emerging technology with a preview of the technology’s business potential
New Tactics for the Rapidly Changing Business Environment: How Cognitive Flexibility Can Help Small Business Withstand the Next Storm
Emotional intelligence is often touted as one of the most important leadership skills, and with good reason. According to Goleman, emotional intelligence refers to the ability to identify, understand, and manage emotions in oneself and others. Researchers John Mayer and Peter Salovey initially coined the term “emotional intelligence” in 1990 (Salovey & Mayer, 1990) but became popularized later in 2005 by psychologist Daniel Goleman (Goleman, 2005). Researchers today define emotional intelligence as the ability to understand and manage your own emotions, as well as recognize and influence the emotions of those around you. Research, however, increasingly points to the importance of cognitive flexibility during rapidly changing conditions, such as the COVID-19 pandemic. Cognitive flexibility provides us with the ability to adapt our behavior to achieve goals under new environmental conditions. In this paper, the authors introduce cognitive flexibility as a critical business skill and offer ways to implement cognitive flexibility in your business or organization
The Thin Gap Chambers database experience in test beam and preparations for ATLAS
Thin gap chambers (TGCs) are used for the muon trigger system in the forward
region of the LHC experiment ATLAS. The TGCs are expected to provide a trigger
signal within 25 ns of the bunch spacing. An extensive system test of the ATLAS
muon spectrometer has been performed in the H8 beam line at the CERN SPS during
the last few years. A relational database was used for storing the conditions
of the tests as well as the configuration of the system. This database has
provided the detector control system with the information needed for
configuration of the front end electronics. The database is used to assist the
online operation and maintenance. The same database is used to store the non
event condition and configuration parameters needed later for the offline
reconstruction software. A larger scale of the database has been produced to
support the whole TGC system. It integrates all the production, QA tests and
assembly information. A 1/12th model of the whole TGC system is currently in
use for testing the performance of this database in configuring and tracking
the condition of the system. A prototype of the database was first implemented
during the H8 test beams. This paper describes the database structure, its
interface to other systems and its operational performance.Comment: Proceedings IEEE, Nuclear Science Symposium 2005, Stockholm, Sweeden,
May 200
VICAR-DIGITAL image processing system
Computer program corrects various photometic, geometric and frequency response distortions in pictures. The program converts pictures to a number of elements, with each elements optical density quantized to a numerical value. The translated picture is recorded on magnetic tape in digital form for subsequent processing and enhancement by computer
From Fraudsters to Scammers and Cyber-Villains, Tech-Savvy Criminals Are Out to Steal Your Money
Today, more than ever before, criminals are out to steal from your business. However, today, criminals not only use organized shoplifting gangs and engage in armed robberies, but they now also use computers and the internet. Bernie Madoff and Sam Bankman-Fried have joined the lengthy list of well-known criminals before Charles Ponzi.
The Fraud Triangle (Cressey, 1973) is based upon Opportunity, Incentive, and Rationalization. The COVID-19 pandemic created a perfect storm of opportunity for would-be scammers. The federal government fueled opportunity with 400 billion for COVID unemployment relief.
According to the Association of Certified Fraud Examiners (ACFE) small businesses are often targeted as they tend to have fewer safeguards in place to prevent fraud. The ACFE reports that the average loss for a small business fraud is $100,000 and an average of five percent of annual revenue.
In this paper, the authors provide an overview of current fraud activities and a study of the Traits of Sympathy survey to help examine whether a relationship exists between one’s rationalization and sympathy in their decision to commit fraud in the pre-fraud state. We present research findings and offer recommendations
- …