Measurements of neutrino oscillations using the disappearance of muon neutrinos from the Fermilab NuMI neutrino beam as observed by the two MINOS detectors are reported. New analysis methods have ...been applied to an enlarged data sample from an exposure of 7.25×10(20) protons on target. A fit to neutrino oscillations yields values of |Δm(2)|=(2.32(-0.08)(+0.12))×10(-3) eV(2) for the atmospheric mass splitting and sin(2)(2θ)>0.90 (90% C.L.) for the mixing angle. Pure neutrino decay and quantum decoherence hypotheses are excluded at 7 and 9 standard deviations, respectively.
The magnetized steel and scintillator calorimeters of the MINOS experiment Allison, W.W.M.; Andreopoulos, C.; Ayres, D.S. ...
Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment,
11/2008, Letnik:
596, Številka:
2
Journal Article
Recenzirano
Odprti dostop
The Main Injector Neutrino Oscillation Search (MINOS) experiment uses an accelerator-produced neutrino beam to perform precision measurements of the neutrino oscillation parameters in the ...“atmospheric neutrino” sector associated with muon neutrino disappearance. This long-baseline experiment measures neutrino interactions in Fermilab's NuMI neutrino beam with a near detector at Fermilab and again 735
km downstream with a far detector in the Soudan Underground Laboratory in northern Minnesota. The two detectors are magnetized steel-scintillator tracking calorimeters. They are designed to be as similar as possible in order to ensure that differences in detector response have minimal impact on the comparisons of event rates, energy spectra and topologies that are essential to MINOS measurements of oscillation parameters. The design, construction, calibration and performance of the far and near detectors are described in this paper.
This Letter reports the first direct observation of muon antineutrino disappearance. The MINOS experiment has taken data with an accelerator beam optimized for ν(μ) production, accumulating an ...exposure of 1.71 × 10²⁰ protons on target. In the Far Detector, 97 charged current ν(μ) events are observed. The no-oscillation hypothesis predicts 156 events and is excluded at 6.3σ. The best fit to oscillation yields |Δm²| = 3.36(-0.40)(+0.46)(stat) ± 0.06(syst) × 10⁻³ eV², sin²(2θ) = 0.86(-0.12)(+0.11)(stat) ± 0.01(syst). The MINOS ν(μ) and ν(μ) measurements are consistent at the 2.0% confidence level, assuming identical underlying oscillation parameters.
This Letter reports on a search for nu(mu) --> nu(e) transitions by the MINOS experiment based on a 3.14x10(20) protons-on-target exposure in the Fermilab NuMI beam. We observe 35 events in the Far ...Detector with a background of 27+/-5(stat)+/-2(syst) events predicted by the measurements in the Near Detector. If interpreted in terms of nu(mu) --> nu(e) oscillations, this 1.5sigma excess of events is consistent with sin2(2theta(13)) comparable to the CHOOZ limit when |Delta m2|=2.43x10(-3) eV2 and sin2(2theta(23))=1.0 are assumed.
We report the first detailed comparisons of the rates and spectra of neutral-current neutrino interactions at two widely separated locations. A depletion in the rate at the far site would indicate ...mixing between nu(mu) and a sterile particle. No anomalous depletion in the reconstructed energy spectrum is observed. Assuming oscillations occur at a single mass-squared splitting, a fit to the neutral- and charged-current energy spectra limits the fraction of nu(mu) oscillating to a sterile neutrino to be below 0.68 at 90% confidence level. A less stringent limit due to a possible contribution to the measured neutral-current event rate at the far site from nu(e) appearance at the current experimental limit is also presented.
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing cryptographic hash functions. An internal function in the “Sponge” scheme ...is a fixed-length transformation or permutation that operates on a fixed number of bits that make up the internal state of the function. There are various constructive approaches to functiondesign. The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal function using the generalized AES design methodology. This methodology makes it easy to design block ciphers to encrypt large blocks of plaintext with small components, representing the processed data as multidimensional arrays. The internal function is a block cipher that processes 2048 bits, represented as a 9-dimensional array of 512 4-bit elements with size 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2. Each round of encryption consists of three transformations (S-blocks, linear transformation, and permutation), similar to the three round transformations of AES SubBytes, MixColumns, and ShiftRows. The constructed function can be used as an internal function in the modified “Sponge” schemefor constructing cryptographic hash functions.
In this paper, a new version of the cryptographic hash function based on the modified Sponge scheme is considered. According to this scheme, a function f is selected from a given set of internal ...functions using a selection function. The constructed algorithm uses three different internal functions. The first internal function builds on the generalised AES design methodology. This methodology makes it easy to design block ciphers to encrypt large blocks of plaintext with small components, exposing the processed data as multidimensional arrays. The internal function is a block cipher that processes 2048 bits, represented as a 9-dimensional array of 512 4-bit elements of size 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2. Each round of encryption consists of three transformations (S-boxes, linear transformation and permutation), similar to the three round transformations of AES SubBytes, MixColumns and ShiftRows. The second internal function is based on the use of word ring feedback with carry shift registers. The third internal function is similar to the Keccak permutation, but with a few major differences. The internal function operates on a 2048-bit state S, which can be thought of as a 4 × 8 × 64 three-dimensional bitmap. This internal function uses an 8-bit one instead of a 5-bit S-box. In this regard, the parameters of the three-dimensional representation of the state have been changed. Instead of a linear feedback shift register, a word ring feedback with carry shift register is used to generate round constants.
The two-step mechanism of interaction of thiamine diphosphate (ThDP) with transketolase (TK) has been studied: TK + ThDP <--> TK...ThDP <--> TK*-ThDP. The scheme involves the formation of inactive ...intermediate complex TK...ThDP followed by its transformation into catalytically active holoenzyme, TK*-ThDP. The dissociation and kinetic constants for individual stages of this process have been determined. The values of forward and backward rate constants change in the presence of the donor substrate hydroxypyruvate. This finally leads to an increase in the overall affinity of the coenzyme to TK.
In 2010 and 2011, the ATLAS experiment successfully recorded data from LHC collisions with high efficiency and excellent data quality. ATLAS employs a three-level trigger system to select events of ...interest for physics analyzes and detector commissioning. The trigger system consists of a custom-designed hardware trigger at level-1 and software algorithms at the two higher levels. The trigger selection is defined by a trigger menu which consists of more than 300 individual trigger signatures, such as electrons, muons, particle jets, etc. An execution of a trigger signature incurs computing and data storage costs. The composition of the deployed trigger menu depends on the instantaneous LHC luminosity, the experiment's goals for the recorded data, and the limits imposed by the available computing power, network bandwidth and storage space. This paper describes a trigger monitoring framework for assigning computing costs for individual trigger signatures and trigger menus as a whole. These costs can be extrapolated to higher luminosity allowing development of trigger menus for a higher LHC collision rate than currently achievable.
An example of an internal function for the SPONGE scheme Ospanov, Ruslan M.; Seitkulov, Yerzhan N.; Sissenov, Nurbek M. ...
Vestnik of Saint Petersburg University. Applied Mathematics. Computer Science. Control Processes,
2021, Letnik:
17, Številka:
3
Journal Article
Recenzirano
Odprti dostop
The article discusses a new version of the internal function underlying the perspective modern scheme for constructing cryptographic hash functions Sponge (cryptographic sponge). The considered ...example of an internal function is similar to the Keccak permutation, but it has a number of main differences. The inner function operates on a 2048-bit state S, which can be viewed as a three-dimensional bit array of 4 x 8 x 64 size. The structure of the internal function is made up of 5 transformations similar to Keccak. However, firstly, in this example, instead of a 5-bit S-box, an 8-bit one is used. In this regard, the parameters of the three-dimensional representation of the state have been changed. Secondly, instead of a linear feedback shift register, a dictionary shift register with ring carry feedback is used to generate round constants. The properties of these transformations are analyzed in the work.