3,870 research outputs found

    Latino Youth and the Pathway to College

    Get PDF
    Outlines the pathway to and through postsecondary education for Latinos, and looks at a number of variables that offer insight into how motivated and prepared these students are for postsecondary work

    New techniques for chargino-neutralino detection at LHC

    Get PDF
    The recent LHC discovery of a Higgs-like boson at 126 GeV has important consequences for SUSY, pushing the spectrum of strong-interacting supersymmetric particles to high energies, very difficult to probe at the LHC. This gives extra motivation to study the direct production of electroweak particles, as charginos and neutralinos, which are presently very poorly constrained. The aim of this work is to improve the analysis of chargino-neutralino pair production at LHC, focusing on the kinematics of the processes. We propose a new method based on the study of the poles of a certain kinematical variable. This complements other approaches, giving new information about the spectrum and improving the signal-to-background ratio. We illustrate the method in particular SUSY models, and show that working with the LHC at 100/fb luminosity one would be able to distinguish the SUSY signal from the Standard Model background.Comment: accepted for publication in JHE

    MSSM Forecast for the LHC

    Get PDF
    We perform a forecast of the MSSM with universal soft terms (CMSSM) for the LHC, based on an improved Bayesian analysis. We do not incorporate ad hoc measures of the fine-tuning to penalize unnatural possibilities: such penalization arises from the Bayesian analysis itself when the experimental value of MZM_Z is considered. This allows to scan the whole parameter space, allowing arbitrarily large soft terms. Still the low-energy region is statistically favoured (even before including dark matter or g-2 constraints). Contrary to other studies, the results are almost unaffected by changing the upper limits taken for the soft terms. The results are also remarkable stable when using flat or logarithmic priors, a fact that arises from the larger statistical weight of the low-energy region in both cases. Then we incorporate all the important experimental constrains to the analysis, obtaining a map of the probability density of the MSSM parameter space, i.e. the forecast of the MSSM. Since not all the experimental information is equally robust, we perform separate analyses depending on the group of observables used. When only the most robust ones are used, the favoured region of the parameter space contains a significant portion outside the LHC reach. This effect gets reinforced if the Higgs mass is not close to its present experimental limit and persits when dark matter constraints are included. Only when the g-2 constraint (based on e+e−e^+e^- data) is considered, the preferred region (for μ>0\mu>0) is well inside the LHC scope. We also perform a Bayesian comparison of the positive- and negative-μ\mu possibilities.Comment: 42 pages: added figures and reference

    Kinect as an access device for people with cerebral palsy: A preliminary study

    Get PDF
    Cerebral palsy (CP) describes a group of disorders affecting the development of movement and posture, causingactivity limitation. Access to technology can alleviate some of these limitations. Many studies have used vision- based movement capture systems to overcome problems related to discomfort and fear of wearing devices. Incontrast, there has been no research assessing the behavior of vision-based movement capture systems in peoplewith involuntary movements. In this paper, we look at the potential of the Kinect sensor as an assistive technologyfor people with cerebral palsy. We developed a serious game, called KiSens Números, to study the behavior ofKinect in this context and eighteen subjects with cerebral palsy used it to complete a set of sessions. The resultsof the experiments show that Kinect filters some of peoples involuntary movements, confirming the potential ofKinect as an assistive technology for people with motor disabilities

    On the security of embedded systems against side-channel attacks

    Get PDF
    Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). On the other hand, perform the "right- fitting" cryptographic code for the IoT is a highly challenging task due to the reduced resource constraints of must of the IoT devices and the variety of cryptographic algorithms on disposal. An important criterion to assess the suitability of a light-weight cipher implementation, with respect to the SCA point of view, is the amount of energy leakage available to an adversary. In this thesis, the efficiency of a selected function that is commonly used in AES implementations in the perspective of Correlation Power Analysis (CPA) attacks are analyzed, leading to focus on the very common situation where the exact time of the sensitive processing is drowned in a large number of leakage points. In the particular case of statistical attacks, much of the existing literature essentially develop the theory under the assumption that the exact sensitive time is known and cannot be directly applied when the latter assumption is relaxed, being such a particular aspect for the simple Differential Power Analysis (DPA) in contrast with the CPA. To deal with this issue, an improvement that makes the statistical attack a real alternative compared with the simple DPA has been proposed. For the power consumption model (Hamming Weight model), and by rewriting the simple DPA attacks in terms of correlation coefficients between Boolean functions. Exhibiting properties of S-boxes relied on CPA attacks and showing that these properties are opposite to the non-linearity criterion and to the propagation criterion assumed for the former DPA. In order to achieve this goal, the study has been illustrated by various attack experiments performed on several copies implementations of the light-weight AES chipper in a well-known micro-controller educative platform within an 8-bit processor architecture deployed on a 350 nanometers CMOS technology. The Side-channel attacks presented in this work have been set in ideal conditions to capture the full complexity of an attack performed in real-world conditions, showing that certain implementation aspects can influence the leakage levels. On the other side, practical improvements are proposed for specific contexts by exploring the relationship between the non-linearity of the studied selection function and the measured leakages, with the only pretension to bridge the gap between the theory and the practice. The results point to new enlightenment on the resilience of basic operations executed by common light-weight ciphers implementations against CPA attacks
    • …
    corecore