-
A Novel Approach to Fast Calculation of High-Order Q-Cumulants
Authors:
L. Nađđerđ,
J. Milošević,
D. Devetak,
F. Wang,
X. Zhu
Abstract:
The method of Q-cumulants has been shown as a powerful tool to study the fine details of the azimuthal anisotropies in high-energy nucleus-nucleus collisions. A new method for the fast calculation of arbitrary order Q-cumulant v_{n}\{2k\} values, based on the partition of a non-negative integer l $\le$ m for calculation of the 2m-particle azimuthal correlations is presented in this paper. Unlike t…
▽ More
The method of Q-cumulants has been shown as a powerful tool to study the fine details of the azimuthal anisotropies in high-energy nucleus-nucleus collisions. A new method for the fast calculation of arbitrary order Q-cumulant v_{n}\{2k\} values, based on the partition of a non-negative integer l $\le$ m for calculation of the 2m-particle azimuthal correlations is presented in this paper. Unlike the standard Q-cumulants method in which the calculation of high-order multi-particle calculations is impractical, the newly proposed method enables easy calculation. The validity of the method is proven via a toy model that uses the elliptic power distribution to simulate anisotropic emission of particles. The method enables the study of fine details of the v_{2} distribution, such as higher-order central moments of the v_{2} distribution, as well as the hydrodynamic behavior of the Quark-Gluon Plasma.
△ Less
Submitted 31 May, 2025;
originally announced June 2025.
-
The $v^{1/3}_{3}/v^{1/2}_{2}$ ratio in PbAu collisions at $\sqrt{s_{\mathrm{NN}}} = $ 17.3 GeV: a hint of a hydrodynamic behavior
Authors:
D. Adamová,
G. Agakishiev,
A. Andronic,
D. Antończyk,
H. Appelshäuser,
V. Belaga,
J. Bielčíková,
P. Braun-Munzinger,
O. Busch,
A. Cherlin,
S. Damjanović,
T. Dietel,
L. Dietrich,
A. Drees,
W. Dubitzky,
S. I. Esumi,
K. Filimonov,
K. Fomenko,
Z. Fraenkel,
C. Garabatos,
P. Glässel,
G. Hering,
J. Holeczek,
M. Kalisky,
G. Krobath
, et al. (28 additional authors not shown)
Abstract:
The Fourier harmonics, $v_2$ and $v_3$ of negative pions are measured at center-of-mass energy per nucleon pair of $\sqrt{s_{\mathrm{NN}}}$= 17.3 GeV around midrapidity by the CERES/NA45 experiment at the CERN SPS in 0--30\% central PbAu collisions with a mean centrality of 5.5\%. The analysis is performed in two centrality bins as a function of the transverse momentum $\mathrm{p_{\mathrm{T}}}$ fr…
▽ More
The Fourier harmonics, $v_2$ and $v_3$ of negative pions are measured at center-of-mass energy per nucleon pair of $\sqrt{s_{\mathrm{NN}}}$= 17.3 GeV around midrapidity by the CERES/NA45 experiment at the CERN SPS in 0--30\% central PbAu collisions with a mean centrality of 5.5\%. The analysis is performed in two centrality bins as a function of the transverse momentum $\mathrm{p_{\mathrm{T}}}$ from 0.05 GeV/$c$ to more than 2 GeV/$c$. This is the first measurement of the $v^{1/3}_{3}/v^{1/2}_{2}$ ratio as a function of transverse momentum at SPS energies, that reveals, independently of the hydrodynamic models, hydrodynamic behavior of the formed system. For $\mathrm{p_{\mathrm{T}}}$ above 0.5 GeV/$c$, the ratio is nearly flat in accordance with the hydrodynamic prediction and as previously observed by the ATLAS and ALICE experiments at the much higher LHC energies. The results are also compared with the SMASH-vHLLE hybrid model predictions, as well as with the SMASH model applied alone.
△ Less
Submitted 7 November, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Strategic Monitoring of Networked Systems with Heterogeneous Security Levels
Authors:
Jezdimir Milosevic,
Mathieu Dahan,
Saurabh Amin,
Henrik Sandberg
Abstract:
We consider a strategic network monitoring problem involving the operator of a networked system and an attacker. The operator aims to randomize the placement of multiple protected sensors to monitor and protect components that are vulnerable to attacks. We account for the heterogeneity in the components' security levels and formulate a large-scale maximin optimization problem. After analyzing its…
▽ More
We consider a strategic network monitoring problem involving the operator of a networked system and an attacker. The operator aims to randomize the placement of multiple protected sensors to monitor and protect components that are vulnerable to attacks. We account for the heterogeneity in the components' security levels and formulate a large-scale maximin optimization problem. After analyzing its structure, we propose a three-step approach to approximately solve the problem. First, we solve a generalized covering set problem and run a combinatorial algorithm to compute an approximate solution. Then, we compute approximation bounds by solving a nonlinear set packing problem. To evaluate our solution approach, we implement two classical solution methods based on column generation and multiplicative weights updates, and test them on real-world water distribution and power systems. Our numerical analysis shows that our solution method outperforms the classical methods on large-scale networks, as it efficiently generates solutions that achieve a close to optimal performance and that are simple to implement in practice.
△ Less
Submitted 8 April, 2023;
originally announced April 2023.
-
Decomposition of multi-particle azimuthal correlations in Q-cumulant analysis
Authors:
L. Nadderd,
J. Milosevic,
D. Devetak,
F. Wang
Abstract:
The method of Q-cumulants is a powerful tool to study the fine details of azimuthal anisotropies in high energy nuclear collisions. This paper presents a new method, based on mathematical induction, to evaluate the analytical form of the high-order Q-cumulants. The ability of this method is demonstrated via a toy model that uses the elliptic power distribution to simulate anisotropic emission of p…
▽ More
The method of Q-cumulants is a powerful tool to study the fine details of azimuthal anisotropies in high energy nuclear collisions. This paper presents a new method, based on mathematical induction, to evaluate the analytical form of the high-order Q-cumulants. The ability of this method is demonstrated via a toy model that uses the elliptic power distribution to simulate anisotropic emission of particles, quantified in terms of Fourier flow harmonics v_{n}. The method can help in studying the large amount of event statistics that can be collected in the future, and to allow measurements of very high central moments of the v_{2} distribution. This can in turn facilitate progress in understanding the initial geometry, input to hydrodynamic calculations of medium expansion in high energy nuclear collisions, as well as constraints on it.
△ Less
Submitted 30 August, 2023; v1 submitted 23 December, 2022;
originally announced December 2022.
-
Statistical uncertainties of the $v_{n}\{2k\}$ harmonics from Q-cumulants
Authors:
L. Nadderd,
J. Milosevic,
F. Wang
Abstract:
Analytic formulas to calculate statistical uncertainties of $v_{n}\{2k\}$ harmonics extracted from the Q-cumulants are presented. The Q-cumulants are multivariate polynomial functions of the weighted means of $2m$-particle azimuthal correlations, $\llangle 2m \rrangle$. Variances and covariances of the $\llangle 2m \rrangle$ are included in the analytic formulas of the uncertainties that can be ca…
▽ More
Analytic formulas to calculate statistical uncertainties of $v_{n}\{2k\}$ harmonics extracted from the Q-cumulants are presented. The Q-cumulants are multivariate polynomial functions of the weighted means of $2m$-particle azimuthal correlations, $\llangle 2m \rrangle$. Variances and covariances of the $\llangle 2m \rrangle$ are included in the analytic formulas of the uncertainties that can be calculated simultaneously with the calculations of the $v_{n}\{2k\}$ harmonics. The calculations are performed using a simple toy model which roughly simulates elliptic flow azimuthal anisotropy with magnitudes around 0.05. The results are compared with the results obtained by the many data sub-sets, and by the bootstrapping method. The first one is a common way of estimation of the statistical uncertainties of the $v_{n}\{2k\}$ harmonics in a real experiment. In order to increase precision in the measurement of the $v_{n}\{2k\}$ harmonics, a large number of 15000 sub-sets and the same number of the re-sampling in the bootstrap method is used. A very good agreement in the comparison with the proposed way of the analytic calculation of the $v_{n}\{2k\}$ statistical uncertainties is found. Additionally, a recurrence equation for Q-cumulants calculation is also presented.
△ Less
Submitted 18 September, 2021; v1 submitted 1 April, 2021;
originally announced April 2021.
-
Algebraic proof methods for identities of matrices and operators: improvements of Hartwig's triple reverse order law
Authors:
Dragana S. Cvetković-Ilić,
Clemens Hofstadler,
Jamal Hossein Poor,
Jovana Milošević,
Clemens G. Raab,
Georg Regensburger
Abstract:
When improving results about generalized inverses, the aim often is to do this in the most general setting possible by eliminating superfluous assumptions and by simplifying some of the conditions in statements. In this paper, we use Hartwig's well-known triple reverse order law as an example for showing how this can be done using a recent framework for algebraic proofs and the software package Op…
▽ More
When improving results about generalized inverses, the aim often is to do this in the most general setting possible by eliminating superfluous assumptions and by simplifying some of the conditions in statements. In this paper, we use Hartwig's well-known triple reverse order law as an example for showing how this can be done using a recent framework for algebraic proofs and the software package OperatorGB. Our improvements of Hartwig's result are proven in rings with involution and we discuss computer-assisted proofs that show these results in other settings based on the framework and a single computation with noncommutative polynomials.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.
-
Actuator Security Index for Structured Systems
Authors:
Sebin Gracy,
Jezdimir Milosevic,
Henrik Sandberg
Abstract:
Given a network with the set of vulnerable actuators (and sensors), the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised so as to conduct a perfectly undetectable attack using the said actuator. This paper deals with the problem of computing actuator security indices for discrete-time LTI network systems. Firstly, we show that, under a s…
▽ More
Given a network with the set of vulnerable actuators (and sensors), the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised so as to conduct a perfectly undetectable attack using the said actuator. This paper deals with the problem of computing actuator security indices for discrete-time LTI network systems. Firstly, we show that, under a structured systems framework, the actuator security index is generic. Thereafter, we provide graph-theoretic conditions for computing the structural actuator security index. The said conditions are in terms of existence of linkings on appropriately-defined directed (sub)graphs. Based on these conditions, we present an algorithm for computing the structural index.
△ Less
Submitted 12 March, 2020;
originally announced March 2020.
-
Correlations between azimuthal anisotropy Fourier harmonics in PbPb collisions at $\sqrt{s_{_{\mathrm{NN}}}}=2.76$ TeV in the HYDJET++ and AMPT models
Authors:
M. Dordevic,
J. Milosevic,
L. Nadderd,
M. Stojanovic,
F. Wang,
X. Zhu
Abstract:
Correlations between azimuthal anisotropy Fourier harmonics $v_{n}$ ($n = 2, 3, 4$) are studied using the events from PbPb collisions at $\sqrt{s_{_{\mathrm{NN}}}}=2.76$ TeV generated by the HYDJET++ and AMPT models, and compared to the corresponding experimental results obtained by the ATLAS Collaboration. The Fourier harmonics $v_{n}$ are measured over a wide centrality range using the two-parti…
▽ More
Correlations between azimuthal anisotropy Fourier harmonics $v_{n}$ ($n = 2, 3, 4$) are studied using the events from PbPb collisions at $\sqrt{s_{_{\mathrm{NN}}}}=2.76$ TeV generated by the HYDJET++ and AMPT models, and compared to the corresponding experimental results obtained by the ATLAS Collaboration. The Fourier harmonics $v_{n}$ are measured over a wide centrality range using the two-particle azimuthal correlation method. The slopes of the $v_{2}$--$v_{3}$ correlation from both models are in a good agreement with the ATLAS data. The HYDJET++ model predicts a stronger slope for the $v_{2}$--$v_{4}$ and $v_{3}$--$v_{4}$ correlations than the ones experimentally measured, while the results from the AMPT model are in a rather good agreement with the experimental results. In contrast to the HYDJET++ predictions, the AMPT model predicts a boomerang-like shape in the structure of the correlations as found in the experimental data.
△ Less
Submitted 2 March, 2020; v1 submitted 11 July, 2019;
originally announced July 2019.
-
Skewness of the elliptic flow distribution in $\sqrt{s_{_{\mathrm{NN}}}}$ = 5.02~TeV PbPb collisions from HYDJET++ model
Authors:
P. Cirkovic,
J. Milosevic,
L. Nadderd,
F. Wang,
X. Zhu
Abstract:
The elliptic flow ($v_{2}$) event-by-event fluctuations in PbPb collisions at 5.02~TeV are analyzed within the HYDJET++ model. Using the multi-particle, so called Q-cumulant method, $v_{2}\{2\}$, $v_{2}\{4\}$, $v_{2}\{6\}$ and $v_{2}\{8\}$ are calculated and used to study their ratios and to construct skewness ($γ^{exp}_{1}$) as a measure of the asymmetry of the elliptic flow distribution. Additio…
▽ More
The elliptic flow ($v_{2}$) event-by-event fluctuations in PbPb collisions at 5.02~TeV are analyzed within the HYDJET++ model. Using the multi-particle, so called Q-cumulant method, $v_{2}\{2\}$, $v_{2}\{4\}$, $v_{2}\{6\}$ and $v_{2}\{8\}$ are calculated and used to study their ratios and to construct skewness ($γ^{exp}_{1}$) as a measure of the asymmetry of the elliptic flow distribution. Additionally, in order to check if there is a hydrodynamics nature in the elliptic collectivity generated by the HYDJET++ model, the ratio of $v_{2}\{6\} - v_{2}\{8\}$ and $v_{2}\{4\} - v_{2}\{6\}$ distribution is calculated. The analysis is performed as a function of the collision centrality. In order to check the HYDJET++ model responses, the results of this analysis are compared to the corresponding experimental measurements by CMS. A good qualitative and rather good quantitative agreement is found.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
A Network Monitoring Game with Heterogeneous Component Criticality Levels
Authors:
Jezdimir Milosevic,
Mathieu Dahan,
Saurabh Amin,
Henrik Sandberg
Abstract:
We consider an attacker-operator game for monitoring a large-scale network that is comprised on components that differ in their criticality levels. In this zero-sum game, the operator seeks to position a limited number of sensors to monitor the network against an attacker who strategically targets a network component. The operator (resp. attacker) seeks to minimize (resp. maximize) the network los…
▽ More
We consider an attacker-operator game for monitoring a large-scale network that is comprised on components that differ in their criticality levels. In this zero-sum game, the operator seeks to position a limited number of sensors to monitor the network against an attacker who strategically targets a network component. The operator (resp. attacker) seeks to minimize (resp. maximize) the network loss. To study the properties of mixed-strategy Nash Equilibria of this game, we first study two simple instances: (i) When component sets monitored by individual sensor locations are mutually disjoint; (ii) When only a single sensor is positioned, but with possibly overlapping monitoring component sets. Our analysis reveals new insights on how criticality levels impact the players equilibrium strategies. Next, we extend a previously known approach to obtain an approximate Nash equilibrium for the general case of the game. This approach uses solutions to minimum set cover and maximum set packing problems to construct an approximate Nash equilibrium. Finally, we implement a column generation procedure to improve this solution and numerically evaluate the performance of our approach.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems
Authors:
Jezdimir Milosevic,
Henrik Sandberg,
Karl Henrik Johansson
Abstract:
Risk assessment is an inevitable step in implementation of a cyber-defense strategy. An important part of this assessment is to reason about the impact of possible attacks. In this paper, we propose a framework for estimating the impact of cyber-attacks in stochastic linear control systems. The framework can be used to estimate the impact of denial of service, rerouting, sign alternation, replay,…
▽ More
Risk assessment is an inevitable step in implementation of a cyber-defense strategy. An important part of this assessment is to reason about the impact of possible attacks. In this paper, we propose a framework for estimating the impact of cyber-attacks in stochastic linear control systems. The framework can be used to estimate the impact of denial of service, rerouting, sign alternation, replay, false data injection, and bias injection attacks. For the stealthiness constraint, we adopt the Kullback-Leibler divergence between residual sequences during the attack. Two impact metrics are considered: (1) The probability that some of the critical states leave a safety region; and (2) The expected value of the infinity norm of the critical states. For the first metric, we prove that the impact estimation problem can be reduced to a set of convex optimization problems. Thus, the exact solution can be found efficiently. For the second metric, we derive an efficient to calculate lower bound. Finally, we demonstrate how the framework can be used for risk assessment on an example.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement
Authors:
Jezdimir Milosevic,
Andre Teixeira,
Henrik Sandberg,
Karl Henrik Johansson
Abstract:
This paper proposes an actuator security index based on the definition of perfect undetectability. This index can help a control system operator to localize the most vulnerable actuators in the networked control system, which can then be secured. Particularly, the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised, such that a perfectly un…
▽ More
This paper proposes an actuator security index based on the definition of perfect undetectability. This index can help a control system operator to localize the most vulnerable actuators in the networked control system, which can then be secured. Particularly, the security index of an actuator equals the minimum number of sensors and actuators that needs to be compromised, such that a perfectly undetectable attack against that actuator can be conducted. A method for computing the index for small scale networked control systems is derived, and it is shown that the index can potentially be increased by placing additional sensors. The difficulties that appear once the system is of a large scale are then outlined: the problem of calculating the index is NP--hard, the index is vulnerable to system variations, and it is based on the assumption that the attacker knows the entire model of the system. To overcome these difficulties, a robust security index is introduced. The robust index can be calculated in polynomial time, it is unaffected by the system variations, and it can be related to both limited and full model knowledge attackers. Additionally, we analyze two sensor placement problems with the objective to increase the robust indices. We show that both of these problems have submodular structures, so their suboptimal solutions with performance guarantees can be obtained in polynomial time. Finally, the theoretical developments are illustrated through numerical examples.
△ Less
Submitted 15 February, 2019; v1 submitted 11 July, 2018;
originally announced July 2018.
-
It All Matters: Reporting Accuracy, Inference Time and Power Consumption for Face Emotion Recognition on Embedded Systems
Authors:
Jelena Milosevic,
Dexmont Pena,
Andrew Forembsky,
David Moloney,
Miroslaw Malek
Abstract:
While several approaches to face emotion recognition task are proposed in literature, none of them reports on power consumption nor inference time required to run the system in an embedded environment. Without adequate knowledge about these factors it is not clear whether we are actually able to provide accurate face emotion recognition in the embedded environment or not, and if not, how far we ar…
▽ More
While several approaches to face emotion recognition task are proposed in literature, none of them reports on power consumption nor inference time required to run the system in an embedded environment. Without adequate knowledge about these factors it is not clear whether we are actually able to provide accurate face emotion recognition in the embedded environment or not, and if not, how far we are from making it feasible and what are the biggest bottlenecks we face.
The main goal of this paper is to answer these questions and to convey the message that instead of reporting only detection accuracy also power consumption and inference time should be reported as real usability of the proposed systems and their adoption in human computer interaction strongly depends on it. In this paper, we identify the state-of-the art face emotion recognition methods that are potentially suitable for embedded environment and the most frequently used datasets for this task. Our study shows that most of the performed experiments use datasets with posed expressions or in a particular experimental setup with special conditions for image collection. Since our goal is to evaluate the performance of the identified promising methods in the realistic scenario, we collect a new dataset with non-exaggerated emotions and we use it, in addition to the publicly available datasets, for the evaluation of detection accuracy, power consumption and inference time on three frequently used embedded devices with different computational capabilities. Our results show that gray images are still more suitable for embedded environment than color ones and that for most of the analyzed systems either inference time or energy consumption or both are limiting factor for their adoption in real-life embedded applications.
△ Less
Submitted 29 June, 2018;
originally announced July 2018.
-
Time series kernel similarities for predicting Paroxysmal Atrial Fibrillation from ECGs
Authors:
Filippo Maria Bianchi,
Lorenzo Livi,
Alberto Ferrante,
Jelena Milosevic,
Miroslaw Malek
Abstract:
We tackle the problem of classifying Electrocardiography (ECG) signals with the aim of predicting the onset of Paroxysmal Atrial Fibrillation (PAF). Atrial fibrillation is the most common type of arrhythmia, but in many cases PAF episodes are asymptomatic. Therefore, in order to help diagnosing PAF, it is important to design procedures for detecting and, more importantly, predicting PAF episodes.…
▽ More
We tackle the problem of classifying Electrocardiography (ECG) signals with the aim of predicting the onset of Paroxysmal Atrial Fibrillation (PAF). Atrial fibrillation is the most common type of arrhythmia, but in many cases PAF episodes are asymptomatic. Therefore, in order to help diagnosing PAF, it is important to design procedures for detecting and, more importantly, predicting PAF episodes. We propose a method for predicting PAF events whose first step consists of a feature extraction procedure that represents each ECG as a multi-variate time series. Successively, we design a classification framework based on kernel similarities for multi-variate time series, capable of handling missing data. We consider different approaches to perform classification in the original space of the multi-variate time series and in an embedding space, defined by the kernel similarity measure. We achieve a classification accuracy comparable with state of the art methods, with the additional advantage of detecting the PAF onset up to 15 minutes in advance.
△ Less
Submitted 4 April, 2018; v1 submitted 21 January, 2018;
originally announced January 2018.
-
New results on collectivity with CMS
Authors:
Jovan Milosevic
Abstract:
Nonlinear response coefficients of higher-order anisotropy harmonics for charged particles are measured in PbPb collisions at 2.76 and 5.02 TeV as a function of transverse momentum and collision centrality. The nonlinear response coefficients are obtained from $v_{n}$ harmonics measured with respect to their own plane and the mixed harmonics. Additionally, at 5.02 TeV PbPb collisions, a significan…
▽ More
Nonlinear response coefficients of higher-order anisotropy harmonics for charged particles are measured in PbPb collisions at 2.76 and 5.02 TeV as a function of transverse momentum and collision centrality. The nonlinear response coefficients are obtained from $v_{n}$ harmonics measured with respect to their own plane and the mixed harmonics. Additionally, at 5.02 TeV PbPb collisions, a significant negative skewness is observed by a fine splitting between $v_{2}\{4\}$ and $v_{2}\{6\}$ cumulants. The elliptic flow skewness is measured up to 60\% centrality. The results are compared with hydrodynamic models with different shear viscosity to entropy density ratios and initial conditions.
△ Less
Submitted 31 August, 2017;
originally announced August 2017.
-
Sub-leading flow modes in PbPb collisions at $\sqrt{s_{NN}}$ = 2.76 TeV from HYDJET++ model
Authors:
P. Cirkovic,
D. Devetak,
M. Dordevic,
J. Milosevic,
M. Stojanovic
Abstract:
Recent LHC results on the appearance of sub-leading flow modes in PbPb collisions at 2.76~TeV, related to initial-state fluctuations, are analyzed and interpreted within the HYDJET++ model. Using the newly introduced Principal Component Analysis (PCA) method applied to two-particle azimuthal correlations extracted from the model calculations, the leading and the sub-leading flow modes are studied…
▽ More
Recent LHC results on the appearance of sub-leading flow modes in PbPb collisions at 2.76~TeV, related to initial-state fluctuations, are analyzed and interpreted within the HYDJET++ model. Using the newly introduced Principal Component Analysis (PCA) method applied to two-particle azimuthal correlations extracted from the model calculations, the leading and the sub-leading flow modes are studied as a function of the transverse momentum ($p_{T}$) over a wide centrality range. The leading modes of the elliptic ($v^{(1)}_{2}$) and triangular ($v^{(1)}_{3}$) flow calculated within the HYDJET++ model reproduce rather well the $v_{2}\{2\}$ and $v_{3}\{2\}$ coefficients experimentally measured using the two-particle correlations. Within the $p_{T} \le $~3~GeV/c range where hydrodynamics dominates, the sub-leading flow effects are greatest at the highest $p_{T}$ of around 3~GeV/c. The sub-leading elliptic flow mode ($v^{(2)}_{2}$), which corresponds to $n = 2$ harmonic, has a small non-zero value and slowly increases from central to peripheral collisions, while the sub-leading triangular flow mode ($v^{(2)}_{3}$), which corresponds to $n = 3$ harmonic, is even smaller and does not depend on centrality. For $n = $~2, the relative magnitude of the effect measured with respect to the leading flow mode shows a shallow minimum for semi-central collisions and increases for very central and for peripheral collisions. For $n = $~3 case, there is no centrality dependence. The sub-leading flow mode results obtained from the HYDJET++ model are in a rather good agreement with the experimental measurements of the CMS Collaboration.
△ Less
Submitted 31 March, 2017; v1 submitted 20 November, 2016;
originally announced November 2016.
-
Optimal State Estimation with Measurements Corrupted by Laplace Noise
Authors:
Farhad Farokhi,
Jezdimir Milosevic,
Henrik Sandberg
Abstract:
Optimal state estimation for linear discrete-time systems is considered. Motivated by the literature on differential privacy, the measurements are assumed to be corrupted by Laplace noise. The optimal least mean square error estimate of the state is approximated using a randomized method. The method relies on that the Laplace noise can be rewritten as Gaussian noise scaled by Rayleigh random varia…
▽ More
Optimal state estimation for linear discrete-time systems is considered. Motivated by the literature on differential privacy, the measurements are assumed to be corrupted by Laplace noise. The optimal least mean square error estimate of the state is approximated using a randomized method. The method relies on that the Laplace noise can be rewritten as Gaussian noise scaled by Rayleigh random variable. The probability of the event that the distance between the approximation and the best estimate is smaller than a constant is determined as function of the number of parallel Kalman filters that is used in the randomized method. This estimator is then compared with the optimal linear estimator, the maximum a posteriori (MAP) estimate of the state, and the particle filter.
△ Less
Submitted 1 September, 2016;
originally announced September 2016.
-
Triangular flow of negative pions emitted in PbAu collisions at $\sqrt{s_{NN}} = $ 17.3 GeV
Authors:
Jovan Milosevic
Abstract:
Differential triangular flow, $v_3(p_T)$, of negative pions is measured at $\sqrt{s_{NN}}$= 17.3 GeV around midrapidity by the CERES/NA45 experiment at CERN in central PbAu collisions in the range 0-30\% with a mean centrality of 5.5\%. This is the first measurement as a function of transverse momentum of the triangular flow at SPS energies. The $p_T$ range extends from about 0.05 GeV/c to more th…
▽ More
Differential triangular flow, $v_3(p_T)$, of negative pions is measured at $\sqrt{s_{NN}}$= 17.3 GeV around midrapidity by the CERES/NA45 experiment at CERN in central PbAu collisions in the range 0-30\% with a mean centrality of 5.5\%. This is the first measurement as a function of transverse momentum of the triangular flow at SPS energies. The $p_T$ range extends from about 0.05 GeV/c to more than 2 GeV/c. The triangular flow magnitude, corrected for the HBT effects, is smaller by a factor of about 2 than the one measured by the PHENIX experiment at RHIC and the ALICE experiment at the LHC. Within the analyzed range of central collisions no significant centrality dependence is observed. The data are found to be well described by a viscous hydrodynamic calculation combined with an UrQMD cascade model for the late stages.
△ Less
Submitted 12 August, 2016; v1 submitted 25 April, 2016;
originally announced April 2016.
-
A general practitioner or a specialist for your infected smartphone?
Authors:
Jelena Milosevic,
Alberto Ferrante,
Miroslaw Malek
Abstract:
With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector tha…
▽ More
With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector that would be able to detect different malware families with high accuracy, being at the same time lightweight enough not to drain battery quickly and fast enough to give results of detection promptly. The proposed approach to mobile malware detection is analogous to general practitioner versus specialist approach to dealing with a medical problem. Similarly to a general practitioner that, based on indicative symptoms identifies potential illnesses and sends the patient to an appropriate specialist, our detection system distinguishes among symptoms representing different malware families and, once the symptoms are detected, it triggers specific analyses. A system monitoring application operates in the same way as a general practitioner. It is able to distinguish between different symptoms and trigger appropriate detection mechanisms. As an analogy to different specialists, an ensemble of detectors, each of which specifically trained for a particular malware family, is used. The main challenge of the approach is to define representative symptoms of different malware families and train detectors accordingly to them. The main goal of the poster is to foster discussion on the most representative symptoms of different malware families and to discuss initial results in this area obtained by using Malware Genome project dataset.
△ Less
Submitted 13 May, 2015;
originally announced May 2015.
-
Observation of the rare $B^0_s\toμ^+μ^-$ decay from the combined analysis of CMS and LHCb data
Authors:
The CMS,
LHCb Collaborations,
:,
V. Khachatryan,
A. M. Sirunyan,
A. Tumasyan,
W. Adam,
T. Bergauer,
M. Dragicevic,
J. Erö,
M. Friedl,
R. Frühwirth,
V. M. Ghete,
C. Hartl,
N. Hörmann,
J. Hrubec,
M. Jeitler,
W. Kiesenhofer,
V. Knünz,
M. Krammer,
I. Krätschmer,
D. Liko,
I. Mikulec,
D. Rabady,
B. Rahbaran
, et al. (2807 additional authors not shown)
Abstract:
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six sta…
▽ More
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six standard deviations, and the best measurement of its branching fraction so far. Furthermore, evidence for the $B^0\toμ^+μ^-$ decay is obtained with a statistical significance of three standard deviations. The branching fraction measurements are statistically compatible with SM predictions and impose stringent constraints on several theories beyond the SM.
△ Less
Submitted 17 August, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Masses of constituent quarks confined in open bottom hadrons
Authors:
V. Borka Jovanović,
D. Borka,
P. Jovanović,
J. Milošević,
S. R. Ignjatović
Abstract:
We apply color-spin and flavor-spin quark-quark interactions to the meson and baryon constituent quarks, and calculate constituent quark masses, as well as the coupling constants of these interactions. The main goal of this paper was to determine constituent quark masses from light and open bottom hadron masses, using the fitting method we have developed and clustering of hadron groups. We use col…
▽ More
We apply color-spin and flavor-spin quark-quark interactions to the meson and baryon constituent quarks, and calculate constituent quark masses, as well as the coupling constants of these interactions. The main goal of this paper was to determine constituent quark masses from light and open bottom hadron masses, using the fitting method we have developed and clustering of hadron groups. We use color-spin Fermi-Breit (FB) and flavor-spin Glozman-Riska (GR) hyperfine interaction (HFI) to determine constituent quark masses (especially $b$ quark mass). Another aim was to discern between the FB and GR HFI because our previous findings had indicated that both interactions were satisfactory. Our improved fitting procedure of constituent quark masses showed that on average color-spin (Fermi-Breit) hyperfine interaction yields better fits. The method also shows the way how the constituent quark masses and the strength of the interaction constants appear in different hadron environments.
△ Less
Submitted 3 December, 2014; v1 submitted 28 May, 2014;
originally announced May 2014.
-
Inclusive J/psi production in pp collisions at sqrt(s) = 2.76 TeV
Authors:
ALICE Collaboration,
B. Abelev,
J. Adam,
D. Adamova,
A. M. Adare,
M. M. Aggarwal,
G. Aglieri Rinella,
A. G. Agocs,
A. Agostinelli,
S. Aguilar Salazar,
Z. Ahammed,
A. Ahmad Masoodi,
N. Ahmad,
S. U. Ahn,
A. Akindinov,
D. Aleksandrov,
B. Alessandro,
R. Alfaro Molina,
A. Alici,
A. Alkin,
E. Almaraz Avina,
J. Alme,
T. Alt,
V. Altini,
S. Altinpinar
, et al. (948 additional authors not shown)
Abstract:
The ALICE Collaboration has measured inclusive J/psi production in pp collisions at a center of mass energy sqrt(s)=2.76 TeV at the LHC. The results presented in this Letter refer to the rapidity ranges |y|<0.9 and 2.5<y<4 and have been obtained by measuring the electron and muon pair decay channels, respectively. The integrated luminosities for the two channels are L^e_int=1.1 nb^-1 and L^mu_int=…
▽ More
The ALICE Collaboration has measured inclusive J/psi production in pp collisions at a center of mass energy sqrt(s)=2.76 TeV at the LHC. The results presented in this Letter refer to the rapidity ranges |y|<0.9 and 2.5<y<4 and have been obtained by measuring the electron and muon pair decay channels, respectively. The integrated luminosities for the two channels are L^e_int=1.1 nb^-1 and L^mu_int=19.9 nb^-1, and the corresponding signal statistics are N_J/psi^e+e-=59 +/- 14 and N_J/psi^mu+mu-=1364 +/- 53. We present dsigma_J/psi/dy for the two rapidity regions under study and, for the forward-y range, d^2sigma_J/psi/dydp_t in the transverse momentum domain 0<p_t<8 GeV/c. The results are compared with previously published results at sqrt(s)=7 TeV and with theoretical calculations.
△ Less
Submitted 6 November, 2012; v1 submitted 16 March, 2012;
originally announced March 2012.
-
Two Particle Azimuthal Correlations in 4.2A GeV C+Ta Collisions
Authors:
Lj. Simic,
O. Jotanovic,
J. Milosevic,
I. Mendas
Abstract:
Two particle azimuthal correlations are studied in 4.2A GeV C+Ta collisions observed with the 2-m propane bubble chamber exposed at JINR Dubna Synchrophasotron. The correlations are analyzed both for protons and negative pions, and their dependence on the collision centrality, rapidity and rapidity difference is investigated. It is found that protons show a weak back-to-back correlations, while…
▽ More
Two particle azimuthal correlations are studied in 4.2A GeV C+Ta collisions observed with the 2-m propane bubble chamber exposed at JINR Dubna Synchrophasotron. The correlations are analyzed both for protons and negative pions, and their dependence on the collision centrality, rapidity and rapidity difference is investigated. It is found that protons show a weak back-to-back correlations, while a side-by-side correlations are observed for negative pions. Restricting both protons to the target or projectile fragmentation region, the side-by-side correlations are observed for protons also. Using the two particle correlation function, the flow analysis is performed and intensity of directed flow is determined without event-by event estimation of the reaction plane.
△ Less
Submitted 2 July, 2008;
originally announced July 2008.
-
Azimuthal dependence of pion source radii in Pb+Au collisions at 158 A GeV
Authors:
CERES Collaboration,
D. Adamova,
G. Agakichiev,
A. Andronic,
D. Antonczyk,
H. Appelshaeuser,
V. Belaga,
J. Bielcikova,
P. Braun-Munzinger,
O. Busch,
A. Cherlin,
S. Damjanovic,
T. Dietel,
L. Dietrich,
A. Drees,
W. Dubitzky,
S. I. Esumi,
K. Filimonov,
K. Fomenko,
Z. Fraenkel,
C. Garabatos,
P. Glaessel,
G. Hering,
J. Holeczek,
M. Kalisky
, et al. (32 additional authors not shown)
Abstract:
We present results of a two-pion correlation analysis performed with the Au+Pb collision data collected by the upgraded CERES experiment in the fall of 2000. The analysis was done in bins of the reaction centrality and the pion azimuthal emission angle with respect to the reaction plane. The pion source, deduced from the data, is slightly elongated in the direction perpendicular to the reaction…
▽ More
We present results of a two-pion correlation analysis performed with the Au+Pb collision data collected by the upgraded CERES experiment in the fall of 2000. The analysis was done in bins of the reaction centrality and the pion azimuthal emission angle with respect to the reaction plane. The pion source, deduced from the data, is slightly elongated in the direction perpendicular to the reaction plane, similarly as was observed at the AGS and at RHIC.
△ Less
Submitted 16 May, 2008;
originally announced May 2008.
-
Strange Particle Production and Elliptic Flow from CERES
Authors:
Jovan Milosevic
Abstract:
Elliptic flow measurements as a function of p_T of charged (pi^+- and low-p_T protons) and strange (Lambda and K^0_S) particles from Pb+Au collisions at 158 AGeV/c are presented, together with measurements of phi and K^0_S meson production. A mass ordering effect was observed. Scaling to the number of constituent quarks and transverse rapidity y^fs_T scaling are presented. The results are compar…
▽ More
Elliptic flow measurements as a function of p_T of charged (pi^+- and low-p_T protons) and strange (Lambda and K^0_S) particles from Pb+Au collisions at 158 AGeV/c are presented, together with measurements of phi and K^0_S meson production. A mass ordering effect was observed. Scaling to the number of constituent quarks and transverse rapidity y^fs_T scaling are presented. The results are compared with results from the NA49 and STAR experiments and with hydrodynamical calculations. For the first time in heavy-ion collisions, phi mesons were reconstructed in the same experiment both in the K^+K^- and in the e^+e^- decay channels. The obtained transverse mass distributions of phi mesons are compared with results from the NA49 and NA50 experiments. The yield and the inverse slope parameter of the K^0_S mesons were reconstructed from two independent analyses. Our results are compared with those from the NA49 and NA57 experiments.
△ Less
Submitted 14 June, 2006;
originally announced June 2006.
-
Strange and charged particle elliptic flow in Pb+Au collisions at 158 AGeV/c
Authors:
J. Milosevic
Abstract:
We present $Λ$ and $π$ elliptic flow measurements from Pb+Au collisions at the highest SPS energy. The data, collected by the CERES experiment which covers $η=2.05,2.70$ with full azimuthal coverage and wide $p_{T}$ sensitivity up to 3.5 GeV/c, can be used to test hydrodynamical models and show sensitivity to the EoS. The value of $v_{2}$ as a function of centrality and $p_{T}$ is presented. Val…
▽ More
We present $Λ$ and $π$ elliptic flow measurements from Pb+Au collisions at the highest SPS energy. The data, collected by the CERES experiment which covers $η=2.05,2.70$ with full azimuthal coverage and wide $p_{T}$ sensitivity up to 3.5 GeV/c, can be used to test hydrodynamical models and show sensitivity to the EoS. The value of $v_{2}$ as a function of centrality and $p_{T}$ is presented. Values of $v_{2}$ observed by STAR at RHIC are larger by about 1/3. Our measurements are compared to results from other SPS experiments and to hydrodynamical calculations. Huge statistics allows for a precise measurement of the differential pion elliptic flow.
△ Less
Submitted 20 October, 2005;
originally announced October 2005.
-
Anisotropic flow in 4.2A GeV/c C+Ta collisions
Authors:
Lj. Simic,
J. Milosevic
Abstract:
Anisotropic flow of protons and negative pions in 4.2A GeV/c C+Ta collisions is studied using the Fourier analysis of azimuthal distributions. The protons exhibit pronounced directed flow. Directed flow of pions is positive in the entire rapidity interval and indicates that the pions are preferentially emitted in the reaction plane from the target to the projectile. The elliptic flow of protons…
▽ More
Anisotropic flow of protons and negative pions in 4.2A GeV/c C+Ta collisions is studied using the Fourier analysis of azimuthal distributions. The protons exhibit pronounced directed flow. Directed flow of pions is positive in the entire rapidity interval and indicates that the pions are preferentially emitted in the reaction plane from the target to the projectile. The elliptic flow of protons and negative pions is close to zero. Comparison with the quark-gluon-string model (QGSM) and relativistic transport model (ART 1.0) show that they both yield a flow signature similar to the experimental data.
△ Less
Submitted 16 December, 2002;
originally announced December 2002.
-
Event anisotropy in 4.2A GeV/c C+C collisions
Authors:
Lj. Simic,
J. Milosevic
Abstract:
The directed and elliptic flow of protons and negative pions in 4.2A GeV/c C+C collisions is studied using the Fourier analysis of azimuthal distributions. It is found that the protons exhibit pronounced directed flow, while the flow of pions is either non existent or too weak to be detected experimentally. Also, it is found that in the entire rapidity interval the elliptic flow is very small if…
▽ More
The directed and elliptic flow of protons and negative pions in 4.2A GeV/c C+C collisions is studied using the Fourier analysis of azimuthal distributions. It is found that the protons exhibit pronounced directed flow, while the flow of pions is either non existent or too weak to be detected experimentally. Also, it is found that in the entire rapidity interval the elliptic flow is very small if not zero. These results are confirmed by the Quark-Gluon-String Model (QGSM) and the relativistic transport model (ART 1.0), except that these models predict very weak antiflow of pions. The more detailed comparison with the QGSM suggests that the decay of resonances and rescattering of secondaries dominantly determine the proton and negative pion flow at this energy.
△ Less
Submitted 20 June, 2001; v1 submitted 17 June, 2001;
originally announced June 2001.