3,870 research outputs found
Latino Youth and the Pathway to College
Outlines the pathway to and through postsecondary education for Latinos, and looks at a number of variables that offer insight into how motivated and prepared these students are for postsecondary work
New techniques for chargino-neutralino detection at LHC
The recent LHC discovery of a Higgs-like boson at 126 GeV has important
consequences for SUSY, pushing the spectrum of strong-interacting
supersymmetric particles to high energies, very difficult to probe at the LHC.
This gives extra motivation to study the direct production of electroweak
particles, as charginos and neutralinos, which are presently very poorly
constrained. The aim of this work is to improve the analysis of
chargino-neutralino pair production at LHC, focusing on the kinematics of the
processes. We propose a new method based on the study of the poles of a certain
kinematical variable. This complements other approaches, giving new information
about the spectrum and improving the signal-to-background ratio. We illustrate
the method in particular SUSY models, and show that working with the LHC at
100/fb luminosity one would be able to distinguish the SUSY signal from the
Standard Model background.Comment: accepted for publication in JHE
MSSM Forecast for the LHC
We perform a forecast of the MSSM with universal soft terms (CMSSM) for the
LHC, based on an improved Bayesian analysis. We do not incorporate ad hoc
measures of the fine-tuning to penalize unnatural possibilities: such
penalization arises from the Bayesian analysis itself when the experimental
value of is considered. This allows to scan the whole parameter space,
allowing arbitrarily large soft terms. Still the low-energy region is
statistically favoured (even before including dark matter or g-2 constraints).
Contrary to other studies, the results are almost unaffected by changing the
upper limits taken for the soft terms. The results are also remarkable stable
when using flat or logarithmic priors, a fact that arises from the larger
statistical weight of the low-energy region in both cases. Then we incorporate
all the important experimental constrains to the analysis, obtaining a map of
the probability density of the MSSM parameter space, i.e. the forecast of the
MSSM. Since not all the experimental information is equally robust, we perform
separate analyses depending on the group of observables used. When only the
most robust ones are used, the favoured region of the parameter space contains
a significant portion outside the LHC reach. This effect gets reinforced if the
Higgs mass is not close to its present experimental limit and persits when dark
matter constraints are included. Only when the g-2 constraint (based on
data) is considered, the preferred region (for ) is well inside
the LHC scope. We also perform a Bayesian comparison of the positive- and
negative- possibilities.Comment: 42 pages: added figures and reference
Kinect as an access device for people with cerebral palsy: A preliminary study
Cerebral palsy (CP) describes a group of disorders affecting the development of movement and posture, causingactivity limitation. Access to technology can alleviate some of these limitations. Many studies have used vision- based movement capture systems to overcome problems related to discomfort and fear of wearing devices. Incontrast, there has been no research assessing the behavior of vision-based movement capture systems in peoplewith involuntary movements. In this paper, we look at the potential of the Kinect sensor as an assistive technologyfor people with cerebral palsy. We developed a serious game, called KiSens Números, to study the behavior ofKinect in this context and eighteen subjects with cerebral palsy used it to complete a set of sessions. The resultsof the experiments show that Kinect filters some of peoples involuntary movements, confirming the potential ofKinect as an assistive technology for people with motor disabilities
Recommended from our members
A measure of job satisfaction among child protective service workers in the County of San Bernardino: A comparative analysis of two district offices
On the security of embedded systems against side-channel attacks
Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). On the other hand, perform the "right- fitting" cryptographic code for the IoT is a highly challenging task due to the reduced resource constraints of must of the IoT devices and the variety of cryptographic algorithms on disposal. An important criterion to assess the suitability of a light-weight cipher implementation, with respect to the SCA point of view, is the amount of energy leakage available to an adversary. In this thesis, the efficiency of a selected function that is commonly used in AES implementations in the perspective of Correlation Power Analysis (CPA) attacks are analyzed, leading to focus on the very common situation where the exact time of the sensitive processing is drowned in a large number of leakage points. In the particular case of statistical attacks, much of the existing literature essentially develop the theory under the assumption that the exact sensitive time is known and cannot be directly applied when the latter assumption is relaxed, being such a particular aspect for the simple Differential Power Analysis (DPA) in contrast with the CPA. To deal with this issue, an improvement that makes the statistical attack a real alternative compared with the simple DPA has been proposed. For the power consumption model (Hamming Weight model), and by rewriting the simple DPA attacks in terms of correlation coefficients between Boolean functions. Exhibiting properties of S-boxes relied on CPA attacks and showing that these properties are opposite to the non-linearity criterion and to the propagation criterion assumed for the former DPA. In order to achieve this goal, the study has been illustrated by various attack experiments performed on several copies implementations of the light-weight AES chipper in a well-known micro-controller educative platform within an 8-bit processor architecture deployed on a 350 nanometers CMOS technology. The Side-channel attacks presented in this work have been set in ideal conditions to capture the full complexity of an attack performed in real-world conditions, showing that certain implementation aspects can influence the leakage levels. On the other side, practical improvements are proposed for specific contexts by exploring the relationship between the non-linearity of the studied selection function and the measured leakages, with the only pretension to bridge the gap between the theory and the practice. The results point to new enlightenment on the resilience of basic operations executed by common light-weight ciphers implementations against CPA attacks
- …