8,122 research outputs found

    Onsite data processing and monitoring for the Daya Bay Experiment

    Full text link
    The Daya Bay Reactor Neutrino Experiment started running on September 23, 2011. The offline computing environment, consisting of 11 servers at Daya Bay, was built to process onsite data. With current computing ability, onsite data processing is running smoothly. The Performance Quality Monitoring system (PQM) has been developed to monitor the detector performance and data quality. Its main feature is the ability to efficiently process multi-data-stream from three experimental halls. The PQM processes raw data files from the Daya Bay data acquisition system, generates and publishes histograms via a graphical web interface by executing the user-defined algorithm modules, and saves the histograms for permanent storage. The fact that the whole process takes only around 40 minutes makes it valuable for the shift crew to monitor the running status of all the sub-detectors and the data quality

    Comparison of System Call Representations for Intrusion Detection

    Full text link
    Over the years, artificial neural networks have been applied successfully in many areas including IT security. Yet, neural networks can only process continuous input data. This is particularly challenging for security-related non-continuous data like system calls. This work focuses on four different options to preprocess sequences of system calls so that they can be processed by neural networks. These input options are based on one-hot encoding and learning word2vec or GloVe representations of system calls. As an additional option, we analyze if the mapping of system calls to their respective kernel modules is an adequate generalization step for (a) replacing system calls or (b) enhancing system call data with additional information regarding their context. However, when performing such preprocessing steps it is important to ensure that no relevant information is lost during the process. The overall objective of system call based intrusion detection is to categorize sequences of system calls as benign or malicious behavior. Therefore, this scenario is used to evaluate the different input options as a classification task. The results show, that each of the four different methods is a valid option when preprocessing input data, but the use of kernel modules only is not recommended because too much information is being lost during the mapping process.Comment: 12 pages, 1 figure, submitted to CISIS 201

    The statistical properties of galaxy morphological types in compact groups of Main galaxies from the SDSS Data Release 4

    Get PDF
    In order to explore the statistical properties of galaxy morphological types in compact groups (CGs), we construct a random group sample which has the same distributions of redshift and number of member galaxies as those of the CG sample. It turns out that the proportion of early-type galaxies in different redshift bins for the CG sample is statistically higher than that for random group sample, and with growing redshift z this kind of difference becomes more significant. This may be due to the existence of interactions and mergers within a significant fraction of SDSS CGs. We also compare statistical results of CGs with those of more compact groups and pairs, but do not observe as large statistical difference as Hickson (1982)'results.Comment: 12 pages, 9 figure

    Herschel Hi-GAL imaging of massive young stellar objects

    Get PDF
    We used Herschel Hi-GAL (Herschel infrared Galactic Plane survey) data to determine whether massive young stellar objects (MYSOs) are resolved at 70 μm and to study their envelope density distribution. Our analysis of three relatively isolated sources in the l = 30° and 59° Galactic fields show that the objects are partially resolved at 70 μm. The Herschel Hi-GAL survey data have a high scan velocity which makes unresolved and partially resolved sources appear elongated in the 70 μm images. We analysed the two scan directions separately and examine the intensity profile perpendicular to the scan direction. Spherically symmetric radiative transfer models with a power-law density distribution were used to study the circumstellar matter distribution. Single dish submm data were also included to study how different spatial information affects the fitted density distribution. The density distribution which best fits both the 70 μm intensity profile and spectral energy distribution has an average index of ∼0.5. This index is shallower than expected and is probably due to the dust emission from bipolar outflow cavity walls not accounted for in the spherical models. We conclude that 2D axisymmetric models and Herschel images at low scan speeds are needed to better constrain the matter distribution around MYSOs

    Renal impairment in a rural African antiretroviral programme

    Get PDF
    Background: There is little knowledge regarding the prevalence and nature of renal impairment in African populations initiating antiretroviral treatment, nor evidence to inform the most cost effective methods of screening for renal impairment. With the increasing availability of the potentially nephrotixic drug, tenofovir, such information is important for the planning of antiretroviral programmes Methods: (i) Retrospective review of the prevalence and risk factors for impaired renal function in 2189 individuals initiating antiretroviral treatment in a rural African setting between 2004 and 2007 (ii) A prospective study of 149 consecutive patients initiating antiretrovirals to assess the utility of urine analysis for the detection of impaired renal function. Severe renal and moderately impaired renal function were defined as an estimated GFR of ≤ 30 mls/min/1.73 m2 and 30–60 mls/min/1.73 m2 respectively. Logistic regression was used to determine odds ratio (OR) of significantly impaired renal function (combining severe and moderate impairment). Co-variates for analysis were age, sex and CD4 count at initiation. Results: (i) There was a low prevalence of severe renal impairment (29/2189, 1.3% 95% C.I. 0.8–1.8) whereas moderate renal impairment was more frequent (287/2189, 13.1% 95% C.I. 11.6–14.5) with many patients having advanced immunosuppression at treatment initiation (median CD4 120 cells/μl). In multivariable logistic regression age over 40 (aOR 4.65, 95% C.I. 3.54–6.1), male gender (aOR 1.89, 95% C.I. 1.39–2.56) and CD4<100 cells/ul (aOR 1.4, 95% C.I. 1.07–1.82) were associated with risk of significant renal impairment (ii) In 149 consecutive patients, urine analysis had poor sensitivity and specificity for detecting impaired renal function. Conclusion: In this rural African setting, significant renal impairment is uncommon in patients initiating antiretrovirals. Urine analysis alone may be inadequate for identification of those with impaired renal function where resources for biochemistry are limited

    Note on New KLT relations

    Full text link
    In this short note, we present two results about KLT relations discussed in recent several papers. Our first result is the re-derivation of Mason-Skinner MHV amplitude by applying the S_{n-3} permutation symmetric KLT relations directly to MHV amplitude. Our second result is the equivalence proof of the newly discovered S_{n-2} permutation symmetric KLT relations and the well-known S_{n-3} permutation symmetric KLT relations. Although both formulas have been shown to be correct by BCFW recursion relations, our result is the first direct check using the regularized definition of the new formula.Comment: 15 Pages; v2: minor correction
    corecore