13,134 research outputs found

    金剛石鉆進能量與花崗巖地層風化程度的關系

    Get PDF
    Based on experimental data from a drilling process monitoring system instrumented with a hydraulic rotary drill rig in fill-weathered granite formation, the diamond penetrating energy was analyzed. The result shows that the distribution of the penetrating energy in fill-weathered granite formation agrees with that in common weathered granite formation. A negative correlation between the viscous energy, kinetic energy, total penetrating energy and the weathered degree of granite existed, and a positive correlation between the thrust force energy and the weathered degree was presented, which indicates that there is a well response between the penetrating energy and the weathered degree of rock. However, the kinetic energy, thrust force energy and viscous energy are limited in identification of formation because of different effects in various drilling modes. The specific energy of diamond drilling (SEDD) increased with the weathered degree of rock and the values of SEDD can be classified into corresponding range according to the weathered degree of rock. It is shown that the SEDD in rotary drilling is apparently less than the specific energy of percussive drilling (SEPD) in both fill soil and very strongly weathered granite formation. Reversely, the SEDD is much more than the SEPD in lightly weathered hard rock.link_to_subscribed_fulltex

    Feynman rules for the rational part of the Electroweak 1-loop amplitudes

    Get PDF
    We present the complete set of Feynman rules producing the rational terms of kind R_2 needed to perform any 1-loop calculation in the Electroweak Standard Model. Our results are given both in the 't Hooft-Veltman and in the Four Dimensional Helicity regularization schemes. We also verified, by using both the 't Hooft-Feynman gauge and the Background Field Method, a huge set of Ward identities -up to 4-points- for the complete rational part of the Electroweak amplitudes. This provides a stringent check of our results and, as a by-product, an explicit test of the gauge invariance of the Four Dimensional Helicity regularization scheme in the complete Standard Model at 1-loop. The formulae presented in this paper provide the last missing piece for completely automatizing, in the framework of the OPP method, the 1-loop calculations in the SU(3) X SU(2) X U(1) Standard Model.Comment: Many thanks to Huasheng Shao for having recomputed, independently of us, all of the R2{\rm R_2} effective vertices. Thanks to his help and by comparing with an independent computation we performed in a general RξR_\xi gauge, we could fix, in the present version, the following formulae: the vertex AllˉA l \bar l in Eq. (3.6), the vertex Zϕ+ϕZ \phi^+ \phi^- in Eq. (3.8), Eqs (3.16), (3.17) and (3.18

    Statistical analysis driven optimized deep learning system for intrusion detection

    Get PDF
    Attackers have developed ever more sophisticated and intelligent ways to hack information and communication technology systems. The extent of damage an individual hacker can carry out upon infiltrating a system is well understood. A potentially catastrophic scenario can be envisaged where a nation-state intercepting encrypted financial data gets hacked. Thus, intelligent cybersecurity systems have become inevitably important for improved protection against malicious threats. However, as malware attacks continue to dramatically increase in volume and complexity, it has become ever more challenging for traditional analytic tools to detect and mitigate threat. Furthermore, a huge amount of data produced by large networks has made the recognition task even more complicated and challenging. In this work, we propose an innovative statistical analysis driven optimized deep learning system for intrusion detection. The proposed intrusion detection system (IDS) extracts optimized and more correlated features using big data visualization and statistical analysis methods (human-in-the-loop), followed by a deep autoencoder for potential threat detection. Specifically, a pre-processing module eliminates the outliers and converts categorical variables into one-hot-encoded vectors. The feature extraction module discard features with null values and selects the most significant features as input to the deep autoencoder model (trained in a greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for Cybersecurity is used as a benchmark to evaluate the feasibility and effectiveness of the proposed architecture. Simulation results demonstrate the potential of our proposed system and its outperformance as compared to existing state-of-the-art methods and recently published novel approaches. Ongoing work includes further optimization and real-time evaluation of our proposed IDS.Comment: To appear in the 9th International Conference on Brain Inspired Cognitive Systems (BICS 2018

    On BCFW shifts of integrands and integrals

    Full text link
    In this article a first step is made towards the extension of Britto-Cachazo-Feng-Witten (BCFW) tree level on-shell recursion relations to integrands and integrals of scattering amplitudes to arbitrary loop order. Surprisingly, it is shown that the large BCFW shift limit of the integrands has the same structure as the corresponding tree level amplitude in any minimally coupled Yang-Mills theory in four or more dimensions. This implies that these integrands can be reconstructed from a subset of their `single cuts'. The main tool is powercounting Feynman graphs in a special lightcone gauge choice employed earlier at tree level by Arkani-Hamed and Kaplan. The relation between shifts of integrands and shifts of its integrals is investigated explicitly at one loop. Two particular sources of discrepancy between the integral and integrand are identified related to UV and IR divergences. This is cross-checked with known results for helicity equal amplitudes at one loop. The nature of the on-shell residue at each of the single-cut singularities of the integrand is commented upon. Several natural conjectures and opportunities for further research present themselves.Comment: 43 pages, 6 figures, v2: minor improvement in exposition, typos fixed, bibliography update

    Theory and approach of identification of ground interfaces based on rock drillability index

    Get PDF
    Rock drillability index is a very key parameter in selection of drill bit type and determination of productivity in petroleum, mining and geology. Unfortunately, there are many limits in the current definition as well as experimental methods. Drillability is redefined and a new concept of drillability index is brought out from analysis. Under the new concept, the drillability index is defined as penetration rate under specific energy. Based on the coupling relationship among effective thrust, rotation speed, penetration rate and drillability index, a calculation formula is established. Besides, the sensitivity of the drillability index in identification of ground layer is analyzed and its physical signification is expatiated also. The result shows that the new index overcomes the blind area in the traditional concept and can be used in continuous identification of ground layer along borehole profile.link_to_subscribed_fulltex

    Monodromy--like Relations for Finite Loop Amplitudes

    Get PDF
    We investigate the existence of relations for finite one-loop amplitudes in Yang-Mills theory. Using a diagrammatic formalism and a remarkable connection between tree and loop level, we deduce sequences of amplitude relations for any number of external legs.Comment: 24 pages, 6 figures, v2 typos corrected, reference adde

    On the Numerical Evaluation of Loop Integrals With Mellin-Barnes Representations

    Full text link
    An improved method is presented for the numerical evaluation of multi-loop integrals in dimensional regularization. The technique is based on Mellin-Barnes representations, which have been used earlier to develop algorithms for the extraction of ultraviolet and infrared divergencies. The coefficients of these singularities and the non-singular part can be integrated numerically. However, the numerical integration often does not converge for diagrams with massive propagators and physical branch cuts. In this work, several steps are proposed which substantially improve the behavior of the numerical integrals. The efficacy of the method is demonstrated by calculating several two-loop examples, some of which have not been known before.Comment: 13 pp. LaTe

    Interface identification in weathered granite strata based on a instrumented drilling system

    Get PDF
    A hydraulic rotary drill instrumented with a drilling process monitoring system (DPM) was used for site investigation in Hong Kong weathered granite foundation engineering. The penetrating parameters such as effective thrust force, rotational speed, flushing pressure, penetrating rate and displacement of the bit were monitored in real time. A varied slope was defined as a significant index for identification of dominative and subsidiary interfaces in the granite site. The result from t-test shows that the confidence of the DPM in identification of the geotechnical interfaces is 99%. Besides, the analysis of variation of the penetrating parameters at the interfaces indicates that there are different fluctuations at the interfaces in the curves of the parameters with borehole depth. The response degree of effective thrust force and penetrating rate to the variation of rock strength at the interfaces is 81.82% alone.link_to_subscribed_fulltex

    Rational Terms in Theories with Matter

    Full text link
    We study rational remainders associated with gluon amplitudes in gauge theories coupled to matter in arbitrary representations. We find that these terms depend on only a small number of invariants of the matter-representation called indices. In particular, rational remainders can depend on the second and fourth order indices only. Using this, we find an infinite class of non-supersymmetric theories in which rational remainders vanish for gluon amplitudes. This class includes all the "next-to-simplest" quantum field theories of arXiv:0910.0930. This provides new examples of amplitudes in which rational remainders vanish even though naive power counting would suggest their presence.Comment: 10+4 pages. (v2) typos corrected, references adde
    corecore