The Circular Electron Positron Collider(CEPC)is a large scientific project initiated and hosted by China,fostered through extensive collaboration with international partners.The complex comprises four accelerators:a 3...The Circular Electron Positron Collider(CEPC)is a large scientific project initiated and hosted by China,fostered through extensive collaboration with international partners.The complex comprises four accelerators:a 30 GeV Linac,a 1.1 GeV Damping Ring,a Booster capable of achieving energies up to 180 GeV,and a Collider operating at varying energy modes(Z,W,H,and tt).The Linac and Damping Ring are situated on the surface,while the subterranean Booster and Collider are housed in a 100 km circumference underground tunnel,strategically accommodating future expansion with provisions for a potential Super Proton Proton Collider(SPPC).The CEPC primarily serves as a Higgs factory.In its baseline design with synchrotron radiation(SR)power of 30 MW per beam,it can achieve a luminosity of 5×10^(34)cm^(-2)s^(-1)per interaction point(IP),resulting in an integrated luminosity of 13 ab^(-1)for two IPs over a decade,producing 2.6 million Higgs bosons.Increasing the SR power to 50 MW per beam expands the CEPC's capability to generate 4.3 million Higgs bosons,facilitating precise measurements of Higgs coupling at sub-percent levels,exceeding the precision expected from the HL-LHC by an order of magnitude.This Technical Design Report(TDR)follows the Preliminary Conceptual Design Report(Pre-CDR,2015)and the Conceptual Design Report(CDR,2018),comprehensively detailing the machine's layout,performance metrics,physical design and analysis,technical systems design,R&D and prototyping efforts,and associated civil engineering aspects.Additionally,it includes a cost estimate and a preliminary construction timeline,establishing a framework for forthcoming engineering design phase and site selection procedures.Construction is anticipated to begin around 2027-2028,pending government approval,with an estimated duration of 8 years.The commencement of experiments and data collection could potentially be initiated in the mid-2030s.展开更多
In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator to...In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator tool that takes as input a set of statements that capture the requirements,internal conditions of the system and expected outputs of the real system and produces as output whether the simulation satisfies the requirements,faithfully represents the internal conditions of the system and produces the expected outputs.We provide a use case to show how subject matter experts can apply the tool.展开更多
This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoe...This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions within this paper and were selected based on their relation to streaming data and the flexibility of their techniques for use within different domains of streaming data. We discuss the relevance of how combining the techniques of the proposed research works within these compositions can be used to address the anomaly detection problem in streaming cyber datasets. The goal is to show how a combination of techniques from different compositions can solve a prominent problem, anomaly detection.展开更多
In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation;a package for computing the int...In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation;a package for computing the intrusion detection capability of intrusion detection system (IDS), given certain input parameters is developed using Java. In order to determine the expected cost at each IDS operating point, the decision tree method of analysis is employed, and plots of expected cost and intrusion detection capability against false positive rate were generated. The point of intersection between the maximum intrusion detection capability and the expected cost is selected as the optimal operating point. Considering an IDS in the context of its intrinsic ability to detect intrusions at the least expected cost, findings revealed that the optimal operating point is the most suitable for the given IDS. The cost-based extension is used to select optimal operating point, calculate expected cost, and compare two actual intrusion detectors. The proposed cost-based extension of intrusion detection capability will be very useful to information technology (IT), telecommunication firms, and financial institutions, for making proper decisions in evaluating the suitability of an IDS for a specific operational environment.展开更多
基金support from diverse funding sources,including the National Key Program for S&T Research and Development of the Ministry of Science and Technology(MOST),Yifang Wang's Science Studio of the Ten Thousand Talents Project,the CAS Key Foreign Cooperation Grant,the National Natural Science Foundation of China(NSFC)Beijing Municipal Science&Technology Commission,the CAS Focused Science Grant,the IHEP Innovation Grant,the CAS Lead Special Training Programthe CAS Center for Excellence in Particle Physics,the CAS International Partnership Program,and the CAS/SAFEA International Partnership Program for Creative Research Teams.
文摘The Circular Electron Positron Collider(CEPC)is a large scientific project initiated and hosted by China,fostered through extensive collaboration with international partners.The complex comprises four accelerators:a 30 GeV Linac,a 1.1 GeV Damping Ring,a Booster capable of achieving energies up to 180 GeV,and a Collider operating at varying energy modes(Z,W,H,and tt).The Linac and Damping Ring are situated on the surface,while the subterranean Booster and Collider are housed in a 100 km circumference underground tunnel,strategically accommodating future expansion with provisions for a potential Super Proton Proton Collider(SPPC).The CEPC primarily serves as a Higgs factory.In its baseline design with synchrotron radiation(SR)power of 30 MW per beam,it can achieve a luminosity of 5×10^(34)cm^(-2)s^(-1)per interaction point(IP),resulting in an integrated luminosity of 13 ab^(-1)for two IPs over a decade,producing 2.6 million Higgs bosons.Increasing the SR power to 50 MW per beam expands the CEPC's capability to generate 4.3 million Higgs bosons,facilitating precise measurements of Higgs coupling at sub-percent levels,exceeding the precision expected from the HL-LHC by an order of magnitude.This Technical Design Report(TDR)follows the Preliminary Conceptual Design Report(Pre-CDR,2015)and the Conceptual Design Report(CDR,2018),comprehensively detailing the machine's layout,performance metrics,physical design and analysis,technical systems design,R&D and prototyping efforts,and associated civil engineering aspects.Additionally,it includes a cost estimate and a preliminary construction timeline,establishing a framework for forthcoming engineering design phase and site selection procedures.Construction is anticipated to begin around 2027-2028,pending government approval,with an estimated duration of 8 years.The commencement of experiments and data collection could potentially be initiated in the mid-2030s.
文摘In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator tool that takes as input a set of statements that capture the requirements,internal conditions of the system and expected outputs of the real system and produces as output whether the simulation satisfies the requirements,faithfully represents the internal conditions of the system and produces the expected outputs.We provide a use case to show how subject matter experts can apply the tool.
文摘This survey aims to deliver an extensive and well-constructed overview of using machine learning for the problem of detecting anomalies in streaming datasets. The objective is to provide the effectiveness of using Hoeffding Trees as a machine learning algorithm solution for the problem of detecting anomalies in streaming cyber datasets. In this survey we categorize the existing research works of Hoeffding Trees which can be feasible for this type of study into the following: surveying distributed Hoeffding Trees, surveying ensembles of Hoeffding Trees and surveying existing techniques using Hoeffding Trees for anomaly detection. These categories are referred to as compositions within this paper and were selected based on their relation to streaming data and the flexibility of their techniques for use within different domains of streaming data. We discuss the relevance of how combining the techniques of the proposed research works within these compositions can be used to address the anomaly detection problem in streaming cyber datasets. The goal is to show how a combination of techniques from different compositions can solve a prominent problem, anomaly detection.
文摘In this paper, we consider a cost-based extension of intrusion detection capability (CID). An objective metric motivated by information theory is presented and based on this formulation;a package for computing the intrusion detection capability of intrusion detection system (IDS), given certain input parameters is developed using Java. In order to determine the expected cost at each IDS operating point, the decision tree method of analysis is employed, and plots of expected cost and intrusion detection capability against false positive rate were generated. The point of intersection between the maximum intrusion detection capability and the expected cost is selected as the optimal operating point. Considering an IDS in the context of its intrinsic ability to detect intrusions at the least expected cost, findings revealed that the optimal operating point is the most suitable for the given IDS. The cost-based extension is used to select optimal operating point, calculate expected cost, and compare two actual intrusion detectors. The proposed cost-based extension of intrusion detection capability will be very useful to information technology (IT), telecommunication firms, and financial institutions, for making proper decisions in evaluating the suitability of an IDS for a specific operational environment.