1. |
- Moortgat-Pick, G., et al.
(författare)
-
Polarized positrons and electrons at the linear collider
- 2008
-
Ingår i: Physics reports. - : Elsevier BV. - 0370-1573 .- 1873-6270. ; 460:4-5, s. 131-243
-
Forskningsöversikt (refereegranskat)abstract
- The proposed International Linear Collider (ILC) is well-suited for discovering physics beyond the Standard Model and for precisely unraveling the structure of the underlying physics. The physics return can be maximized by the use of polarized beams. This report shows the paramount role of polarized beams and summarizes the benefits obtained from polarizing the positron beam, as well as the electron beam. The physics case for this option is illustrated explicitly by analyzing reference reactions in different physics scenarios. The results show that positron polarization, combined with the clean experimental environment provided by the linear collider, allows to improve strongly the potential of searches for new particles and the identification of their dynamics, which opens the road to resolve shortcomings of the Standard Model. The report also presents an overview of possible designs for polarizing both beams at the ILC, as well as for measuring their polarization.
|
|
2. |
- Rahmathullah, Abu Sajana, 1986, et al.
(författare)
-
A low-complexity algorithm for intrusion detection in a PIR-based Wireless Sensor Network
- 2009
-
Ingår i: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2009, Melbourne, Australia. - 9781424435173 ; , s. 337 - 342
-
Konferensbidrag (refereegranskat)abstract
- We present a low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using passive infra-red (PIR) sensors in a wireless sensor network (WSN). The algorithm is based on a combination of Haar transform (HT) and support-vector-machine (SVM) based training and was field tested in a network setting comprising of 15-20 sensing nodes. Also contained in this paper is a closed-form expression for the signal generated by an intruder moving at a constant velocity. It is shown how this expression can be exploited to determine the direction of motion information and the velocity of the intruder from the signals of three well-positioned sensors.
|
|