SHiP (Search for Hidden Particles) is a new general-purpose experiment at the SPS ring at CERN, aimed at searching for hidden particles proposed by numerous theories beyond the Standard
Model. An important element of the experiment is muon shield. On one hand, it must provide good background suppression, and on the other hand, it should not be too heavy. The Muon shield configurations was...
The momentum anisotropy of particles produced in heavy-ion collisions serves as a sensitive probe of the matter formed in the collision overlap region. While detector effects can significantly distort the measured values of this observable, techniques exist to correct for acceptance non-uniformities and non-flow correlations. Developing an experiment-independent framework for anisotropic flow...
Multi-Purpose Detector (MPD) is aimed at the extensive investigation of
the properties of dense QCD matter created in heavy ion collisions. The
forward tracking detector would extend available rapidity range from
$|y| < 1.2$ to $|y| < 2.5$, which is critical for the studies of various
observables that can be used to probe the properties of the produced
matter. The main challenges for the...
Particle identification (PID) is an essential step in the data analysis workflow of high-energy physics experiments. Machine learning approaches have become widely used in high-energy physics problems in general, and in PID in particular for the last ten years. Due to the fact that conventional algorithms of PID have poor performance in the high momentum range. However, due to the absence of...
This work shows the application of logistic regression model for particle identification task in Multi Purpose Detector (MPD) experiment on Nuclotron based Ion Collider fAcility (NICA) at Joint Institute for Nuclear Research. The model has been tried on Monte-Carlo dataset provided by MPDRoot software package and compared against n-sigma method, included in MPDRoot, and XGBoost gradient...
The SPD is a planned spin physics experiment at the NICA collider. The main goal of the experiment is to test the fundamentals of QCD. Sampo is a new SPD software, which is currently under development to support the physics research program and to prepare for future data processing. Detector description is one of the main components of Sampo. It is required for simulation, reconstruction, and...
The triple GEM detector is one of the basic components of the hybrid tracking system in the BM@N experiment. It consists of gas chambers located along the beam axis, designed to register particles passing through matter in the form of responses on a microstrip readout plane. The presented work describes the features of detector response simulation and considers a method for this simulation...
Nowadays, the simplex method and the method of interior points remain the most popular methods for solving LP problems. The main issue with these methods is their limited scalability when solving large LP problems. The presentation is devoted to a new linear programming method called AlEMANN (Along Edges Movement with Artificial Neural Network), which uses an artificial neural network when...
Compressed representations of input data are used to solve many problems in the natural sciences, in particular in the field of cosmic rays. Conventionally, the input data are mapped to a low-dimensional vector, which is a set of physically motivated parameters. For example, for images of extensive air showers (EAS) recorded by Cherenkov telescopes, the so-called Hillas parameters are used,...
Studying the fluxes of gamma quanta (gamma rays) of various energies generated in the vicinity of galactic and metagalactic sources is one of the most promising ways to study the sources themselves, and hence the important processes occurring in the Universe. The fact is that charged cosmic rays (elementary particles and atomic nuclei) are significantly influenced by galactic and intergalactic...
The FITTER_WEB application is designed to solve the problem of fitting experimental data obtained in various physical experiments, and is deployed in the JINR cloud infrastructure. It uses the computing power of the ROOT package and provides a web interface for fitting data with theoretical models based on the resolution function. However, creating custom models required writing code manually,...
We present a new fast vertexing software for determination of the
primary vertex. The software is relying on the linear extrapolation
of tracks near the beamline, as the curvature of the track is negligible
for short distances. The method treats tracks as infinitely extended
ellipsoids, thereby transforming the vertex-finding problem into a
proximity one - between points with ellipsoidal...
The unfolding of neutron spectra from Bonner multi-sphere spectrometer (BSS) measurements is an important task in radiation dosimetry. This study investigates the application of an Automated Machine Learning (AutoML) framework for neutron spectrum unfolding. To train and validate the model, a dataset of 5ร10โต synthetic spectra was generated as weighted combinations of four spectral components:...
Large Language Models (LLMs) such as GPT, LLaMA and Qwen are powerful tools capable of performing a wide range of tasks, including text generation, data analysis, machine translation and more. However, specialised tasks, such as analysing medical texts or working with legal documents, require adapting the model to a specific context.
The article investigates methods of LLM training on...
Modeling the dynamics of a dissipative system of interacting fuel elements of the new-generation NEPTUN pulse reactor is considered from the standpoint of Hamiltonian formalism. An exact analytical expression is obtained within the โzeroโ approximation, it describes the evolution of the phase portraits of the system and allows for an efficient numerical implementation on the architecture of...
This work introduces a novel architecture for progressive growing of quantum generative adversarial networks (PQGAN), designed to enhance image synthesis at high resolutions. Our implementation integrates a quantum-enhanced generator implemented as parameterized quantum circuits (PQC) utilizing data re-uploading strategies alongside strongly entangling layers for efficient representation...
This paper is dedicated to the description of the application of a neural network approach to the numerical integration of single and double integrals and its implementation as a Python programming language library โSkuldโ. The essence of the approach is to train a neural network model to approximate the integrand and then to use the parameters of the model to numerically calculate the value...
Modern distributed machine-learning pipelines must juggle three conflicting goals: compact storage, reliable data delivery, and strong security assurances across many independent sites. Traditional approaches achieve only two of the three, typically sacrificing either space efficiency (through triple replication) or verifiability (by trusting storage nodes). We introduce a lightweight overlay...
User authentication is one of the core components of any secure distributed computing system. Traditional methods typically rely on static, one-time verification steps (e.g., password entry at login), which leaves active sessions vulnerable to takeovers. In response to this challenge, the concept of continuous authentication (CA) has gained traction โ an approach where user identity is...
ะ ะฐะทะฒะธัะธะต ัะพะฒัะตะผะตะฝะฝัั ะผะฐัะตะผะฐัะธัะตัะบะธั ัะพะฟัะพัะตััะพัะพะฒ ัะฐะบะธั , ะบะฐะบ ะฒะธะดะตะพะบะฐััั NVIDIA ะธ AMD, ะฟัะธะฒะตะปะพ ะบ ัะธัะพะบะพะผั ะฒะฝะตะดัะตะฝะธั ะฝะตะนัะพะฝะฝัั ัะตัะตะน ะฒ ะฝะฐััะฝัะต ะฒััะธัะปะตะฝะธั. ะ ัะฐััะฝะพััะธ, ะฝะฐ ะพัะฝะพะฒะต ะผะฐัะธะฝะฝะพ-ะพะฑััะฐะตะผัั ะผะตะถะฐัะพะผะฝัั ะฟะพัะตะฝัะธะฐะปะพะฒ ะฟัะตะดะปะพะถะตะฝั ะฑะพะปะตะต ัััะตะบัะธะฒะฝัะต ะผะตัะพะดั ะผะพะปะตะบัะปััะฝะพ-ะดะธะฝะฐะผะธัะตัะบะพะณะพ ะผะพะดะตะปะธัะพะฒะฐะฝะธั ั ะธัะฟะพะปัะทะพะฒะฐะฝะธะตะผ ะฟัะตะธะผััะตััะฒ ะณะธะฑัะธะดะฝะพะน ะฐัั ะธัะตะบัััั ัะพะฒัะตะผะตะฝะฝัั ััะฟะตัะบะพะผะฟัััะตัะพะฒ.
ะะฐะฝะฝัะน ะฟะพะดั ะพะด...
At present, Bonner multi-sphere spectrometers are considered reliable devices for assessing radiation conditions at high-energy physics facilities. However, the unfolding of the neutron spectral density function from the results of such measurements, from a mathematical point of view, belongs to the class of ill-posed inverse problems requiring various regularization methods. As such a method,...
Network steganography, often referred to as a network covert channel, represents a discreet method of communication that leverages the redundancies within network protocols to clandestinely transmit confidential data. The retransmission steganography (RSTEG) technique involves concealing classified information within the payload segment of retransmission packets, which are intentionally...