2,938 research outputs found

    Linking Light Scalar Modes with A Small Positive Cosmological Constant in String Theory

    Full text link
    Based on the studies in Type IIB string theory phenomenology, we conjecture that a good fraction of the meta-stable de Sitter vacua in the cosmic stringy landscape tend to have a very small cosmological constant Λ\Lambda when compared to either the string scale MSM_S or the Planck scale MPM_P, i.e., Λ≪MS4≪MP4\Lambda \ll M_S^4 \ll M_P^4. These low lying de Sitter vacua tend to be accompanied by very light scalar bosons/axions. Here we illustrate this phenomenon with the bosonic mass spectra in a set of Type IIB string theory flux compactification models. We conjecture that small Λ\Lambda with light bosons is generic among de Sitter solutions in string theory; that is, the smallness of Λ\Lambda and the existence of very light bosons (may be even the Higgs boson) are results of the statistical preference for such vacua in the landscape. We also discuss a scalar field ϕ3/ϕ4\phi^3/\phi^4 model to illustrate how this statistical preference for a small Λ\Lambda remains when quantum loop corrections are included, thus bypassing the radiative instability problem.Comment: 35 pages, 7 figures; added subsection: Finite Temperature and Phase Transitio

    Man-in-the-Middle Attacks on MQTT based IoT networks

    Get PDF
    “The use of Internet-of-Things (IoT) devices has increased a considerable amount in recent years due to decreasing cost and increasing availability of transistors, semiconductor, and other components. Examples can be found in daily life through smart cities, consumer security cameras, agriculture sensors, and more. However, Cyber Security in these IoT devices are often an afterthought making these devices susceptible to easy attacks. This can be due to multiple factors. An IoT device is often in a smaller form factor and must be affordable to buy in large quantities; as a result, IoT devices have less resources than a typical computer. This includes less processing power, battery power, and random access memory (RAM). This limits the possibilities of traditional security in IoT devices. To help evaluate the state of IoT devices and further enforce them, we present an easy to use program that requires little to no prior knowledge of the target infrastructure. The process is a Man-in-the-Middle (MITM) attack that hijacks packets sent between IoT devices using the popular MQTT protocol. We do this by using a WiFi Pineapple from Hak5, in the device’s raw form, is a WiFi access point with specific offensive capabilities installed as software. We then pass these packets into a custom General Adversarial Network (GAN) that utilizes a Natural Language Processing (NLP) model to generate a malicious message. Once malicious messages are generated, the messages are passed back to the WiFI Pineapple and sent as a legitimate packet among the network. We then look at the efficiency of these malicious messages through different NLP algorithms. In this particular work, we analyze an array of BERT variants and GPT-2”--Abstract, page iv

    Atomic ionization by sterile-to-active neutrino conversion and constraints on dark matter sterile neutrinos with germanium detectors

    Get PDF
    The transition magnetic moment of a sterile-to-active neutrino conversion gives rise to not only radiative decay of a sterile neutrino, but also its non-standard interaction (NSI) with matter. For sterile neutrinos of keV-mass as dark matter candidates, their decay signals are actively searched for in cosmic X-ray spectra. In this work, we consider the NSI that leads to atomic ionization, which can be detected by direct dark matter experiments. It is found that this inelastic scattering process for a nonrelativistic sterile neutrino has a pronounced enhancement in the differential cross section at energy transfer about half of its mass, manifesting experimentally as peaks in the measurable energy spectra. The enhancement effects gradually smear out as the sterile neutrino becomes relativistic. Using data taken with germanium detectors that have fine energy resolution in keV and sub-keV regimes, constraints on sterile neutrino mass and its transition magnetic moment are derived and compared with those from astrophysical observations
    • …
    corecore