5,143 research outputs found

    R-Hadron and long lived particle searches at the LHC

    Get PDF
    If long lived charged particles exist, and produced at the LHC, they may travel with velocity significantly slower than the speed of light. This unique signature was not considered during the design of the LHC experiments, ATLAS and CMS. As a result, hardware and trigger capabilities need to be evaluated. Model independent approaches for finding long lived particles with the LHC experiments are introduced. They are tested using two bench marks, one in GMSB and one in Split SUSY. The focus is on hardware and trigger issues, as well as reconstruction methods developed by ATLAS and CMS. Both experiments suggest time of flight (TOF) based methods. However, the implementation is different. In ATLAS a first beta estimation is done already at the trigger level. CMS also uses dE/dx to estimate beta.Comment: Submitted for the SUSY07 proceedings, 4 pages, LaTeX, 7 eps figure

    Artificial Intelligence: Increasing Business Profits at the Cost of Consumer Privacy

    Get PDF
    Artificial Intelligence may be the most significant technological breakthrough since the development of computers. The promise of greater efficiency and effectiveness is very appealing, especially as that translates into more profitable businesses. The potential applications appear almost endless, crossing every industry and every form of business activity. The potential results cannot even be estimated. Artificial Intelligence can assist in detecting misinformation, but it can also assist in spreading misinformation when faulty algorithms collect incorrect data. An example of this occurs when customer demographic data mixes information from consumers with the same names. Persons who frequently relocate may also be more likely to have faulty consumer data collected by business research companies. However, in our rush to be the first and the best, we must ask ourselves how much of our privacy we are willing to give up? In this paper, the authors examine this fascinating emerging technology with a preview of the technology’s business potential

    New Tactics for the Rapidly Changing Business Environment: How Cognitive Flexibility Can Help Small Business Withstand the Next Storm

    Get PDF
    Emotional intelligence is often touted as one of the most important leadership skills, and with good reason. According to Goleman, emotional intelligence refers to the ability to identify, understand, and manage emotions in oneself and others. Researchers John Mayer and Peter Salovey initially coined the term “emotional intelligence” in 1990 (Salovey & Mayer, 1990) but became popularized later in 2005 by psychologist Daniel Goleman (Goleman, 2005). Researchers today define emotional intelligence as the ability to understand and manage your own emotions, as well as recognize and influence the emotions of those around you. Research, however, increasingly points to the importance of cognitive flexibility during rapidly changing conditions, such as the COVID-19 pandemic. Cognitive flexibility provides us with the ability to adapt our behavior to achieve goals under new environmental conditions. In this paper, the authors introduce cognitive flexibility as a critical business skill and offer ways to implement cognitive flexibility in your business or organization

    The Thin Gap Chambers database experience in test beam and preparations for ATLAS

    Full text link
    Thin gap chambers (TGCs) are used for the muon trigger system in the forward region of the LHC experiment ATLAS. The TGCs are expected to provide a trigger signal within 25 ns of the bunch spacing. An extensive system test of the ATLAS muon spectrometer has been performed in the H8 beam line at the CERN SPS during the last few years. A relational database was used for storing the conditions of the tests as well as the configuration of the system. This database has provided the detector control system with the information needed for configuration of the front end electronics. The database is used to assist the online operation and maintenance. The same database is used to store the non event condition and configuration parameters needed later for the offline reconstruction software. A larger scale of the database has been produced to support the whole TGC system. It integrates all the production, QA tests and assembly information. A 1/12th model of the whole TGC system is currently in use for testing the performance of this database in configuring and tracking the condition of the system. A prototype of the database was first implemented during the H8 test beams. This paper describes the database structure, its interface to other systems and its operational performance.Comment: Proceedings IEEE, Nuclear Science Symposium 2005, Stockholm, Sweeden, May 200

    VICAR-DIGITAL image processing system

    Get PDF
    Computer program corrects various photometic, geometric and frequency response distortions in pictures. The program converts pictures to a number of elements, with each elements optical density quantized to a numerical value. The translated picture is recorded on magnetic tape in digital form for subsequent processing and enhancement by computer

    From Fraudsters to Scammers and Cyber-Villains, Tech-Savvy Criminals Are Out to Steal Your Money

    Get PDF
    Today, more than ever before, criminals are out to steal from your business. However, today, criminals not only use organized shoplifting gangs and engage in armed robberies, but they now also use computers and the internet. Bernie Madoff and Sam Bankman-Fried have joined the lengthy list of well-known criminals before Charles Ponzi. The Fraud Triangle (Cressey, 1973) is based upon Opportunity, Incentive, and Rationalization. The COVID-19 pandemic created a perfect storm of opportunity for would-be scammers. The federal government fueled opportunity with 800billioninCOVIDrelieffundingforthePaycheckProtectionProgramandupto800 billion in COVID relief funding for the Paycheck Protection Program and up to 400 billion for COVID unemployment relief. According to the Association of Certified Fraud Examiners (ACFE) small businesses are often targeted as they tend to have fewer safeguards in place to prevent fraud. The ACFE reports that the average loss for a small business fraud is $100,000 and an average of five percent of annual revenue. In this paper, the authors provide an overview of current fraud activities and a study of the Traits of Sympathy survey to help examine whether a relationship exists between one’s rationalization and sympathy in their decision to commit fraud in the pre-fraud state. We present research findings and offer recommendations

    Scanning Tunneling Microscopy Study of InAs epitaxy on GaAs(001)

    Get PDF
    corecore