Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
High-resolution x-ray spectra were recorded at the National Institute of Standards and Technology electron beam ion trap (EBIT) using two Johann-type crystal spectrometers, with their dispersion planes oriented parallel and perpendicular to the beam direction. The linear polarizations of the 1s2−1s2l transitions in He-like argon ions were determined from the measured spectra at electron beam energies of 3.87 and 7.91 keV. The theoretical analysis was performed using detailed collisional-radiative modeling of the non-Maxwellian EBIT plasma with the NOMAD code modified to account for magnetic sublevel atomic kinetics. Effects influencing the polarizations of the observed 1s2−1s2l lines were investigated, including radiative cascades, the 1s2 1S0−1s2s 1S0 two-photon transition, and the charge exchange recombination of H-like argon ions. With these included, the measured polarizations of the resonance (1s2 1S0−1s2p 1P1), intercombination (1s2 1S0−1s2p 3P1), and forbidden lines (1s2 1S0−1s2s 3S1, 1s2 1S0−1s2p 3P2 ) were found to be in good agreement with the calculations.more » « less
-
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical)upon entering the workforce.We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat,and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be deterred if there is a likelihood of punishment,and the punishment is severe. The results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Grey Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension and White Hatters, the good guys, tend to be Narcissists. Thrill-seeking was moderately important for White Hat hacking and Black hat hacking. Opposition to Authority was important for Grey Hat hacking. Narcissism was not statistically significant in any of the models. The probability of being apprehended had a negative effect on Grey Hat and Black Hat hacking. Several suggestions will be made on what organizations can do to address insider threats.more » « less
-
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical)upon entering the workforce.We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat,and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be deterred if there is a likelihood of punishment,and the punishment is severe. The results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Grey Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension and White Hatters, the good guys, tend to be Narcissists. Thrill-seeking was moderately important for White Hat hacking and Black hat hacking. Opposition to Authority was important for Grey Hat hacking. Narcissism was not statistically significant in any of the models. The probability of being apprehended had a negative effect on Grey Hat and Black Hat hacking. Several suggestions will be made on what organizations can do to address insider threats.more » « less
-
Abstract Accurate extreme ultraviolet spectra of open N -shell neodymium (Nd) ions were recorded at the electron beam ion trap facility of the National Institute of Standards and Technology. The measurements were performed for nominal electron beam energies in the range of 0.90 keV to 2.31 keV. The measured spectra were then compared with the spectra simulated by a collisional-radiative model utilizing atomic data produced with a fully relativistic atomic structure code. Consequently, 59 lines from Br-like to Ni-like Nd ions were unambiguously identified, most of which were newly assigned in this study. The wavelengths of 9 known lines from Ni-, Cu- and Zn-like Nd ions were in excellent agreement with previous measurements.more » « less
-
Free, publicly-accessible full text available January 1, 2026
-
A search is presented for an extended Higgs sector with two new particles, and , in the process . Novel neural networks classify events with diphotons that are merged and determine the diphoton masses. The search uses LHC proton-proton collision data at collected with the CMS detector, corresponding to an integrated luminosity of . No evidence of such resonances is seen. Upper limits are set on the production cross section for between 300 and 3000 GeV and between 0.5% and 2.5%, representing the most sensitive search in this channel. © 2025 CERN, for the CMS Collaboration2025CERNmore » « lessFree, publicly-accessible full text available January 1, 2026
-
A<sc>bstract</sc> A measurement is performed of Higgs bosons produced with high transverse momentum (pT) via vector boson or gluon fusion in proton-proton collisions. The result is based on a data set with a center-of-mass energy of 13 TeV collected in 2016–2018 with the CMS detector at the LHC and corresponds to an integrated luminosity of 138 fb−1. The decay of a high-pTHiggs boson to a boosted bottom quark-antiquark pair is selected using large-radius jets and employing jet substructure and heavy-flavor taggers based on machine learning techniques. Independent regions targeting the vector boson and gluon fusion mechanisms are defined based on the topology of two quark-initiated jets with large pseudorapidity separation. The signal strengths for both processes are extracted simultaneously by performing a maximum likelihood fit to data in the large-radius jet mass distribution. The observed signal strengths relative to the standard model expectation are$$ {4.9}_{-1.6}^{+1.9} $$ and$$ {1.6}_{-1.5}^{+1.7} $$ for the vector boson and gluon fusion mechanisms, respectively. A differential cross section measurement is also reported in the simplified template cross section framework.more » « lessFree, publicly-accessible full text available December 1, 2025
-
Abstract Computing demands for large scientific experiments, such as the CMS experiment at the CERN LHC, will increase dramatically in the next decades. To complement the future performance increases of software running on central processing units (CPUs), explorations of coprocessor usage in data processing hold great potential and interest. Coprocessors are a class of computer processors that supplement CPUs, often improving the execution of certain functions due to architectural design choices. We explore the approach of Services for Optimized Network Inference on Coprocessors (SONIC) and study the deployment of this as-a-service approach in large-scale data processing. In the studies, we take a data processing workflow of the CMS experiment and run the main workflow on CPUs, while offloading several machine learning (ML) inference tasks onto either remote or local coprocessors, specifically graphics processing units (GPUs). With experiments performed at Google Cloud, the Purdue Tier-2 computing center, and combinations of the two, we demonstrate the acceleration of these ML algorithms individually on coprocessors and the corresponding throughput improvement for the entire workflow. This approach can be easily generalized to different types of coprocessors and deployed on local CPUs without decreasing the throughput performance. We emphasize that the SONIC approach enables high coprocessor usage and enables the portability to run workflows on different types of coprocessors.more » « lessFree, publicly-accessible full text available December 1, 2025