61,790 research outputs found

    Momentum Kick Model Description of the Ridge in (Delta-phi)-(Delta eta) Correlation in pp Collisions at 7 TeV

    Full text link
    The near-side ridge structure in the (Delta phi)-(Delta eta) correlation observed by the CMS Collaboration for pp collisions at 7 TeV at LHC can be explained by the momentum kick model in which the ridge particles are medium partons that suffer a collision with the jet and acquire a momentum kick along the jet direction. Similar to the early medium parton momentum distribution obtained in previous analysis for nucleus-nucleus collisions at 0.2 TeV, the early medium parton momentum distribution in pp collisions at 7 TeV exhibits a rapidity plateau as arising from particle production in a flux tube.Comment: Talk presented at Workshop on High-pT Probes of High-Density QCD at the LHC, Palaiseau, May 30-June2, 201

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    Odontoameloblastoma with extensive chondroid matrix deposition in a guinea pig

    Get PDF
    Odontoameloblastomas (previously incorporated within ameloblastic odontomas) are matrix-producing odontogenic mixed tumors and are closely related in histologic appearance to the 2 other types of matrix-producing odontogenic mixed tumors: odontomas and ameloblastic fibro-odontomas. The presence or absence of intralesional, induced non-neoplastic tissue must be accounted for in the diagnosis. Herein we describe a naturally occurring odontoameloblastoma with extensive chondroid cementum deposition in a guinea pig (Cavia porcellus). Microscopically, the mass featured palisading neoplastic odontogenic epithelium closely apposed to ribbons and rings of a pink dental matrix (dentinoid), alongside extensive sheets and aggregates of chondroid cementum. The final diagnosis was an odontoameloblastoma given the abundance of odontogenic epithelium in association with dentinoid but a paucity of pulp ectomesenchyme. Chondroid cementum is an expected anatomical feature of cavies, and its presence within the odontoameloblastoma was interpreted as a response of the ectomesenchyme of the dental follicle to the described neoplasm. Our case illustrates the inductive capabilities of odontoameloblastomas while highlighting species-specific anatomy that has resulted in a histologic appearance unique to cavies and provides imaging and histologic data to aid diagnosis of these challenging lesions

    Review of finite fields: Applications to discrete Fourier, transforms and Reed-Solomon coding

    Get PDF
    An attempt is made to provide a step-by-step approach to the subject of finite fields. Rigorous proofs and highly theoretical materials are avoided. The simple concepts of groups, rings, and fields are discussed and developed more or less heuristically. Examples are used liberally to illustrate the meaning of definitions and theories. Applications include discrete Fourier transforms and Reed-Solomon coding
    corecore