期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
CEPC Technical Design Report 被引量:1
1
作者 Waleed Abdallah Tiago Carlos Adorno de Freitas +110 位作者 Konstantin Afanaciev Shakeel Ahmad Ijaz Ahmed Xiaocong Ai Abid Aleem Wolfgang Altmannshofer Fabio Alves Weiming An Rui An Daniele Paolo Anderle Stefan Antusch Yasuo Arai Andrej Arbuzov Abdesslam Arhrib Mustafa Ashry Sha Bai Yu Bai Yang Bai Vipul Bairathi Csaba Balazs Philip Bambade Yong Ban Tripamo Bandyopadhyay Shou-Shan Bao Desmond P.Barber Ayse Bat Varvara Batozskaya Subash Chandra Behera Alexander Belyaev Michele Bertucci Xiao-Jun Bi Yuanjie Bi Tianjian Bian Fabrizio Bianchi Thomas Biekotter Michela Biglietti Shalva Bilanishvili Deng Binglin Denis Bodrov Anton Bogomyagkov Serge Bondarenko Stewart Boogert Maarten Boonekamp Marcello Borri Angelo Bosotti Vincent Boudry Mohammed Boukidi Igor Boyko Ivanka Bozovic Giuseppe Bozzi Jean-Claude Brient Anastasiia Budzinskaya Masroor Bukhari Vladimir Bytev Giacomo Cacciapaglia Hua Cai Wenyong Cai Wujun Cai Yijian Cai Yizhou Cai Yuchen Cai Haiying Cai Huacheng Cai Lorenzo Calibbi Junsong Cang Guofu Cao Jianshe Cao Antoine Chance Xuejun Chang Yue Chang Zhe Chang Xinyuan Chang Wei Chao Auttakit Chatrabhuti Yimin Che Yuzhi Che Bin Chen Danping Chen Fuqing Chen Fusan Chen Gang Chen Guoming Chen Hua-Xing Chen Huirun Chen Jinhui Chen Ji-Yuan Chen Kai Chen Mali Chen Mingjun Chen Mingshui Chen Ning Chen Shanhong Chen Shanzhen Chen Shao-Long Chen Shaomin Chen Shiqiang Chen Tianlu Chen Wei Chen Xiang Chen Xiaoyu Chen Xin Chen Xun Chen Xurong Chen Ye Chen Ying Chen Yukai Chen Zelin Chen Zilin Chen Gang Chen Boping Chen Chunhui Chen 《Radiation Detection Technology and Methods》 CSCD 2024年第1期I0003-I0016,1-1091,共1105页
The Circular Electron Positron Collider(CEPC)is a large scientific project initiated and hosted by China,fostered through extensive collaboration with international partners.The complex comprises four accelerators:a 3... The Circular Electron Positron Collider(CEPC)is a large scientific project initiated and hosted by China,fostered through extensive collaboration with international partners.The complex comprises four accelerators:a 30 GeV Linac,a 1.1 GeV Damping Ring,a Booster capable of achieving energies up to 180 GeV,and a Collider operating at varying energy modes(Z,W,H,and tt).The Linac and Damping Ring are situated on the surface,while the subterranean Booster and Collider are housed in a 100 km circumference underground tunnel,strategically accommodating future expansion with provisions for a potential Super Proton Proton Collider(SPPC).The CEPC primarily serves as a Higgs factory.In its baseline design with synchrotron radiation(SR)power of 30 MW per beam,it can achieve a luminosity of 5×10^(34)cm^(-2)s^(-1)per interaction point(IP),resulting in an integrated luminosity of 13 ab^(-1)for two IPs over a decade,producing 2.6 million Higgs bosons.Increasing the SR power to 50 MW per beam expands the CEPC's capability to generate 4.3 million Higgs bosons,facilitating precise measurements of Higgs coupling at sub-percent levels,exceeding the precision expected from the HL-LHC by an order of magnitude.This Technical Design Report(TDR)follows the Preliminary Conceptual Design Report(Pre-CDR,2015)and the Conceptual Design Report(CDR,2018),comprehensively detailing the machine's layout,performance metrics,physical design and analysis,technical systems design,R&D and prototyping efforts,and associated civil engineering aspects.Additionally,it includes a cost estimate and a preliminary construction timeline,establishing a framework for forthcoming engineering design phase and site selection procedures.Construction is anticipated to begin around 2027-2028,pending government approval,with an estimated duration of 8 years.The commencement of experiments and data collection could potentially be initiated in the mid-2030s. 展开更多
关键词 initiated EXCEEDING PRECISE
原文传递
Formal methods, statistical debugging and exploratory analysis in support of system development: Towards a verification and validation calculator tool
2
作者 Saikou Y.Diallo Ross Gore +1 位作者 Christopher J.Lynch Jose J.Padilla 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2016年第1期120-141,共22页
In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator to... In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator tool that takes as input a set of statements that capture the requirements,internal conditions of the system and expected outputs of the real system and produces as output whether the simulation satisfies the requirements,faithfully represents the internal conditions of the system and produces the expected outputs.We provide a use case to show how subject matter experts can apply the tool. 展开更多
关键词 Verification and validation formal methods modeling and simulation
原文传递
Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey
3
作者 Asmah Muallem Sachin Shetty +2 位作者 Jan Wei Pan Juan Zhao Biswajit Biswal 《Journal of Information Security》 2017年第4期339-361,共23页
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoe... This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions within this paper and were selected based on their relation to streaming data and the flexibility of their techniques for use within different domains of streaming data. We discuss the relevance of how combining the techniques of the proposed research works within these compositions can be used to address the anomaly detection problem in streaming cyber datasets. The goal is to show how a combination of techniques from different compositions can solve a prominent problem, anomaly detection. 展开更多
关键词 Hoeffding Trees Distributed ENSEMBLES ANOMALY Detection Machine Learning SPARK
下载PDF
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
4
作者 Agbotiname L. Imoize Taiwo Oyedare +1 位作者 Michael E. Otuokere Sachin Shetty 《Communications and Network》 2018年第4期211-229,共19页
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation;a package for computing the int... In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation;a package for computing the intrusion detection capability of intrusion detection system (IDS), given certain input parameters is developed using Java. In order to determine the expected cost at each IDS operating point, the decision tree method of analysis is employed, and plots of expected cost and intrusion detection capability against false positive rate were generated. The point of intersection between the maximum intrusion detection capability and the expected cost is selected as the optimal operating point. Considering an IDS in the context of its intrinsic ability to detect intrusions at the least expected cost, findings revealed that the optimal operating point is the most suitable for the given IDS. The cost-based extension is used to select optimal operating point, calculate expected cost, and compare two actual intrusion detectors. The proposed cost-based extension of intrusion detection capability will be very useful to information technology (IT), telecommunication firms, and financial institutions, for making proper decisions in evaluating the suitability of an IDS for a specific operational environment. 展开更多
关键词 INTRUSION DETECTION System INTRUSION DETECTION CAPABILITY (CID) Information Theory SOFTWARE INTRUSION DETECTION EVALUATION System (SIDES)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部