197 research outputs found

    How heavy can dark matter be? Constraining colourful unitarity with SARAH

    Full text link
    We describe the automation of the calculation of perturbative unitarity constraints including scalars that have colour charges, and its release in SARAH 4.14.4. We apply this, along with vacuum stability constraints, to a simple dark matter model with colourful mediators and interesting decays, and show how it leads to a bound on a thermal relic dark matter mass well below the classic Griest-Kamionkowski limit.Comment: 21 pages, 4 figure

    A Highly-Sensitive Global-Shutter CMOS Image Sensor with On-Chip Memory For Hundreds of Kilo-Frames Per Second Scientific Experiments

    Full text link
    In this work, a highly-sensitive global-shutter CMOS image sensor with on-chip memory that can capture up to 16 frames at speeds higher than 200kfps is presented. The sensor fabricated and tested is a 100 x 100 pixel sensor, and was designed to be expandable to a 1000 x 1000 pixel sensor using the same building blocks and similar architecture. The heart of the sensor is the pixel. The pixel consists of 11 transistors (11T) and 2 MOSFET capacitors. A 6T front-end is followed by a Correlated Double Sampling (CDS) circuitry that includes 2 capacitors and a reset switch. The 4T back-end circuitry consists of a source follower, in-pixel current source and 2 switches. The pixel design is unique because of the following. In a relatively small area, 15.1um x 15.1um, it performs CDS that limits the noise stored in the pixel memories to less than 0.33mV rms and allows the stored value to be read in a single readout. Moreover, it has in-pixel current source, which can be turned OFF when not in use, to remove the dependency of its output voltage to its location in the sensor. Furthermore, the in-pixel capacitors are MOSFET capacitors and do not utilize any space in the upper metal layers, therefore, they can be used exclusively for routing. And at the same time it has a fill factor greater than 40%, which important for high sensitivity. Each pixel is connected to a dedicated memory, which is outside the pixel array and consists of 16 MOSFET capacitors and their access switches (1T1C design). Fifty pixels share a line for their connection to their dedicated memory blocks, and, therefore, the transfer of all the stored pixel values to the on-chip memories happens within 50 clock cycles. This allows capturing consecutive frames at speeds higher than 200 kfps. The total rms noise stored in the memories is 0.4 mV

    Controlled anisotropic dynamics of tightly bound skyrmions in a synthetic ferrimagnet due to skyrmion-deformation mediated by induced uniaxial in-plane anisotropy

    Full text link
    We study speed and skew deflection-angle dependence on skyrmion deformations of a tightly bound two-skyrmion state in a synthetic ferrimagnet. We condsider here, an in-plane uniaxial magnetocrystalline anisotropy-term in order to induce lateral shape distortions and an overall size modulation of the skyrmions due to a reduction of the effective out-of-plane anisotropy, thus affecting the skyrmion speed, skew-deflection and inducing anisotropy in these quantities with respect to the driving current-angle. Because of frustrated dipolar interactions in a synthetic ferrimagnet, sizeable skyrmion deformations can be induced with relatively small induced anisotropy constants and thus a wide range of tuneability can be achieved. We also show analytically, that a consequence of the skyrmion deformation can, under certain conditions cause a skyrmion deflection with respect to driving-current angles, unrelated to the topological charge. Results are analyzed by a combination of micromagnetic simulations and a compound particle description within the Thiele-formalism from which an over-all mobility tensor is constructed. This work offers an additional path towards in-situ tuning of skyrmion dynamics

    Membership Inference Attacks: Threat Analysis

    Get PDF
    Στην σύγχρονη εποχή, οι εταιρίες και οι οργανισμοί σε όλο τον κόσμο, χρησιμοποιούν υπηρεσίες μοντέλων μηχανικής μάθησης, ως ένα εργαλείο για την βελτίωση της ζωής των πελατών τους. Αλγόριθμοι συστάσεων ταινιών, παιχνιδιών και τάσεων, μηχανές αναζήτη- σης, αλλά και ενδοεταιρικές υπηρεσίες σε φαρμακευτικούς, στρατιωτικούς οργανισμούς, λειτουργούν βασιζόμενοι σε μια συνεχή ροή δεδομένων, η οποία συνεχώς αυξάνεται σε όγκο και πλήθος. Οι χρήστες αγνοώντας το πως οι πάροχοι χρησιμοποιούν τα δεδομένα τους , συννενούν να παραδώσουν το δικαίωμα της ιδιωτικότητας των δεδομένων τους, βασιζόμενοι στον εκαστοτε οργανισμό για την διατήρηση της ανωνυμίας και της ιδιοτικότητας των ευαίσθη- των πληροφοριών τους. Απο την άλλη πλευρά, οι πάροχοι κατευνάζουν τις όποιες ανη- συχίες των χρηστών υποσχόμενοι πως χρησιμοποιούν τις τελευταίες τεχνολογίες ιδιοτι- κοποίησης δεδομένων, αγνοόντας το γεγονός ό,τι τα μοντέλα μηχανικής μάθησης, που τοσο πασχίζουν να βγάλουν στην παραγωγή, διαθέτουν ευπάθιες, οι οποίες διακιβεύουν τα ευαίσθητα, προσωπικά δεδομένα των χρηστών τους. Επιθέσεις, τετοιου τύπου ονομάζονται Population Inference attacks και συγκεκριμένα εμείς θα ασχοληθούμε με τα Membership Inference Attacks. Σε αυτές τις επιθέσεις, το μοντέλο θύμα, εκπαιδεύεται πάνω σε ένα κρυφό συνολο δεδομέ- νων, που αποτελεί τον στόχο. Ο κακόβουλος χρήστης από τη δικιά του πλευρά, προσπαθεί να συμπαιράνει αν κάποιοι χρήστες-στόχοι ανήκουν μέσα στο παραπάνω σύνολο εκπαί- δευσης. Ως προς της επίδειξη του κινδύνου μια τέτοιας επίθεσης σκεφτήκε ενα σενάριο όπου, ο επιτιθέμενος γνωρίζει πως τα κλινικά δεδομένα ενός χρήστη, χρησιμοποιήθηκαν για την εκπάιδευση ενός μοντέλου προβλεψεων σχετικών με μία ασθένεια. Ο επιτιθέμενος, γνωρίζει πλέον αν το θύμα έχει την ασθένεια ή όχι, εφόσον το μοντέλο του έχει εκθέσει τις προσωπικές πληροφορίες του θύματος. Η εργασίας αυτή έχει ως στόχο ο αναγνώστης να εξετάσει, αναλύσει και κατανοήσει τον τρόπο λειτουργίας των Membership Inference Attacks, καθώς και τις επιπτώσεις τους και τις διάφορετικές άμυνες που μπορεί κανείς να λάβει για να αποφευχθεί η διαρροή δεδο- μένων κατά την εκπάιδευση μοντέλων μηχανικής μάθησης. Για την καλύτερη κατανόηση και ενίσχυση των επιχειρημάτων που ακολουθούν, παρέ- χουμε διαγράμματα και πίνακες ως οπτίκά βοηθήματα.In the new era of data, companies and organizations around the world offer Machine Learning Services as a tool for enhancing people’s lives. Recommendation algorithms, search engine’s, intra-orgranization usage in medicine, military etc. Αll of the above are working on top of continuous data streams which are getting larger and more rich on user data, day by day. Users, unaware how their data are being used, accept terms and conditions, giving away the right of data privacy, participating in various machine learning experiments with the promise of each vendor’s data anonymity process. The vendors are reassuring users that their data are safe and completely anonymized, ignoring the fact that the machine learning models, they so much strive to incorporate to their product flow, suffers from subtle vulnerabilities, which can be used to expose and identify users, along with their, otherwise, private data. These types of attacks are called Population Inference Attacks and we are, specifically, going to deepen our knowledge and analyze with detail the so-called Membership Infer- ence Attack. In these attacks, the target uses a machine learning model trained on a secret ’target’ dataset. On the other hand the attacker, tries to inference whether some user-victim is a member of this dataset. To display the danger posed by this attack consider the scenario where an attacker knows that the clinical records of a user-victim are part of a disease- related-model’s training set, then the attacker can infer if the person has the disease with high certainty, leading to a serious privacy breach. The goal of this thesis is to further examine, analyze and understand the mechanism, reasoning behind membership inference attacks against machine learning models, as well as the effect and the various ways we could prevent data leakage during training of ML models. Throughout this thesis, a plethora of plots and boards will be provided to the reader, to enhance his/her understanding of this study via experiments

    Skyrmion Logic System for Large-Scale Reversible Computation

    Full text link
    Computational reversibility is necessary for quantum computation and inspires the development of computing systems in which information carriers are conserved as they flow through a circuit. While conservative logic provides an exciting vision for reversible computing with no energy dissipation, the large dimensions of information carriers in previous realizations detract from the system efficiency, and nanoscale conservative logic remains elusive. We therefore propose a non-volatile reversible computing system in which the information carriers are magnetic skyrmions, topologically-stable magnetic whirls. These nanoscale quasiparticles interact with one another via the spin-Hall and skyrmion-Hall effects as they propagate through ferromagnetic nanowires structured to form cascaded conservative logic gates. These logic gates can be directly cascaded in large-scale systems that perform complex logic functions, with signal integrity provided by clocked synchronization structures. The feasibility of the proposed system is demonstrated through micromagnetic simulations of Boolean logic gates, a Fredkin gate, and a cascaded full adder. As skyrmions can be transported in a pipelined and non-volatile manner at room temperature without the motion of any physical particles, this skyrmion logic system has the potential to deliver scalable high-speed low-power reversible Boolean and quantum computing.Comment: 24 pages, 7 figures, 3 table

    O new physics, where art thou? A global search in the top sector

    Get PDF
    We provide a comprehensive global analysis of Run II top measurements at the LHC in terms of dimension-6 operators. A distinctive feature of the top sector as compared to the Higgs-electroweak sector is the large number of four-quark operators. We discuss in detail how they can be tested and how quadratic terms lead to a stable limit on each individual Wilson coecient. Predictions for all observables are computed at NLO in QCD. Our SFitter analysis framework features a detailed error treatment, including correlations between uncertainties
    corecore