7,910 research outputs found

    New results on the spectroscopy of XYZ states from LHC experiments

    Full text link
    The main results from LHC experiments on XYZ charmonium-like candidates are summarized.Comment: to appear in the proceedings of The 5th International Workshop on Charm Physics (Charm 2012

    INTERRELATED BANK STRATEGIES, FINANCIAL FRAGILITY AND CREDIT EXPANSION: A POST KEYNESIAN APPROACH

    Get PDF
    This paper aims at clarifying the relationship between individual bank and banking industry behavior in credit expansion. We argue that the balance sheet structure of an individual bank is only partially determined by its management decision about how aggressively to expand credit; it is also determined by the balance sheet positions of other banks. This relationship is explicitly shown by a disaggregation of the variable that enters into the simple money multiplier. The approach developed here opens a way to integrating the micro and macro levels in a Keynesian banking-system analysis.

    Amplitude analysis of four-body decays using a massively-parallel fitting framework

    Full text link
    The GooFit Framework is designed to perform maximum-likelihood fits for arbitrary functions on various parallel back ends, for example a GPU. We present an extension to GooFit which adds the functionality to perform time-dependent amplitude analyses of pseudoscalar mesons decaying into four pseudoscalar final states. Benchmarks of this functionality show a significant performance increase when utilizing a GPU compared to a CPU. Furthermore, this extension is employed to study the sensitivity on the D0−Dˉ0D^0 - \bar{D}^0 mixing parameters xx and yy in a time-dependent amplitude analysis of the decay D0→K+π−π+π−D^0 \rightarrow K^+\pi^-\pi^+\pi^-. Studying a sample of 50 000 events and setting the central values to the world average of x=(0.49±0.15)%x = (0.49 \pm0.15) \% and y=(0.61±0.08)%y = (0.61 \pm0.08) \%, the statistical sensitivities of xx and yy are determined to be σ(x)=0.019%\sigma(x) = 0.019 \% and σ(y)=0.019%\sigma(y) = 0.019 \%.Comment: Proceedings of the 22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 201

    Effect of biofertilizers and neem oil on the entomopathogenic fungi beauveria bassiana (Bals.) vuill. and metarhizium anisopliae (Metsch.) sorok.

    Get PDF
    The in vitro fungitoxic effect of three biofertilizers, E.M.-4, Multibion Ô and Supermagro used in organic agriculture and the neem oil (Azadirachta indica A. Juss) on the entomopathogenic fungi Metarhizium anisopliae and Beauveria bassiana was studied. These products were mixed in a medium where the two fungi were inoculated, and germination, vegetative growth and conidiogenesis were assessed. The biofertilizers Supermagro and E.M.- 4 showed to be less toxic for the two fungi whereas MultibionÔ caused major inhibition on M. anisopliae, with reductions in germination (-37.74%), colony diameter (-30.26%) and conidiogenesis (-42.62%). Neem oil promoted a larger negative effect on B. bassiana, inhibiting germination (-45.27%), colony diameter (-36.62%) and conidiogenesis (-84.93%)

    Benchmarking the Security Protocol and Data Model (SPDM) for component authentication

    Full text link
    Efforts to secure computing systems via software traditionally focus on the operating system and application levels. In contrast, the Security Protocol and Data Model (SPDM) tackles firmware level security challenges, which are much harder (if at all possible) to detect with regular protection software. SPDM includes key features like enabling peripheral authentication, authenticated hardware measurements retrieval, and secure session establishment. Since SPDM is a relatively recent proposal, there is a lack of studies evaluating its performance impact on real-world applications. In this article, we address this gap by: (1) implementing the protocol on a simple virtual device, and then investigating the overhead introduced by each SDPM message; and (2) creating an SPDM-capable virtual hard drive based on VirtIO, and comparing the resulting read/write performance with a regular, unsecured implementation. Our results suggest that SPDM bootstrap time takes the order of tens of milliseconds, while the toll of introducing SPDM on hard drive communication highly depends on specific workload patterns. For example, for mixed random read/write operations, the slowdown is negligible in comparison to the baseline unsecured setup. Conversely, for sequential read or write operations, the data encryption process becomes the bottleneck, reducing the performance indicators by several orders of magnitude.Comment: 10 pages, 8 figure
    • …
    corecore