226 research outputs found
The decay in an EW-scale non-sterile RH neutrino model
We study in this research the phenomenology of decay in a
scenario of the class of extended models with non-sterile right-handed (RH)
neutrino at electroweak (EW) scale proposed by P.Q. Hung. Field content of the
standard model (SM) is enlarged by introducing for each SM fermion a
corresponding mirror partner with the same quantum numbers beside opposite
chirality. Light neutrino masses are generated via the type-I see-saw mechanism
and it is also proved to be relevant with low energy within the EW scale of the
RH neutrino masses. We introduce the model and derive branching ratio of the
decay at one-loop approximation with the participation of W
gauge boson, neutral and singly charged Higgs scalars. After that we set
constraints on relevant parameters and predict the sensitivities of the decay
channel under the present and future experiments.Comment: 19 pages, 8 figure
System for Configuring Modular Telemetry Transponders
A system for configuring telemetry transponder cards uses a database of error checking protocol data structures, each containing data to implement at least one CCSDS protocol algorithm. Using a user interface, a user selects at least one telemetry specific error checking protocol from the database. A compiler configures an FPGA with the data from the data structures to implement the error checking protocol
Deep Technology Tracing for High-tech Companies
Technological change and innovation are vitally important, especially for
high-tech companies. However, factors influencing their future research and
development (R&D) trends are both complicated and various, leading it a quite
difficult task to make technology tracing for high-tech companies. To this end,
in this paper, we develop a novel data-driven solution, i.e., Deep Technology
Forecasting (DTF) framework, to automatically find the most possible technology
directions customized to each high-tech company. Specially, DTF consists of
three components: Potential Competitor Recognition (PCR), Collaborative
Technology Recognition (CTR), and Deep Technology Tracing (DTT) neural network.
For one thing, PCR and CTR aim to capture competitive relations among
enterprises and collaborative relations among technologies, respectively. For
another, DTT is designed for modeling dynamic interactions between companies
and technologies with the above relations involved. Finally, we evaluate our
DTF framework on real-world patent data, and the experimental results clearly
prove that DTF can precisely help to prospect future technology emphasis of
companies by exploiting hybrid factors.Comment: 6 pages, 7 figure
Muon anomalous magnetic dipole moment in a low scale type I see-saw model
Recent experimental results on muon anomalous magnetic dipole moment have
shown a tension with the SM prediction, which has blown a fresh
wind into the elementary particle physics community. The problem is believed to
be explained only by physics beyond the standard model. Current work considers
the anomalous moment in a scenario of models with mirror symmetry and type I
see-saw mechanism at low energy scale of electroweak interactions. After a
brief introduction to the model, a detailed numerical analysis of muon
anomalous phenomenology will be carefully performed.Comment: 15 pages, 2 tables, 5 figue
Tris(dicyclohexylammonium) hydrogen [1-hydroxy-2-(1H-imidazol-1-yl)-1-phosphonatoethane]phosphonate ethanol monosolvate monohydrate
In the title compound, 3C12H24N+·C5H7N2O7P2
3−·C2H6O·H2O, the zoledronic acid molecule is singly protonated and stabilized by an intramolecular O—H⋯O interaction. The three-dimensional crystal structure is stabilized by intermolecular O—H⋯O, O—H⋯N and N—H⋯O interactions. The ethanol solvent molecule is disordered over two positions; the site-occupancy factor of the major component is 0.510 (4)
Secure Communication Using Non-systematic Error Control Codes
A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply a non-systematic error correcting code (NS ECC) to a message, thus producing encoded bits with no clear message bits; and a transceiver (720) configured to transmit the encoded bits over a main channel to a receiver. A method for secure communication includes: encoding a message with an NS ECC to produce an encoded message carrying no message bits in the clear; and transmitting the encoded message over a main channel (120). The NS ECC characteristics result in an eavesdropper channel error probability under a security threshold (320) and a main channel error probability over a reliability threshold (310), whenever an eavesdropper (140) listening on an eavesdropper channel (150) is more than distance Z (220) from the transmitter. Unreliable bits in the encoded bits render the eavesdropper unable to reliably decode messages on the main channel.Georgia Tech Research CorporationKorea Advanced Institute Of Science And Technolog
Reconfigurable Sensor Monitoring System
A reconfigurable sensor monitoring system includes software tunable filters, each of which is programmable to condition one type of analog signal. A processor coupled to the software tunable filters receives each type of analog signal so-conditioned
Minimal Power Latch for Single-Slope ADCs
A latch circuit that uses two interoperating latches. The latch circuit has the beneficial feature that it switches only a single time during a measurement that uses a stair step or ramp function as an input signal in an analog to digital converter. This feature minimizes the amount of power that is consumed in the latch and also minimizes the amount of high frequency noise that is generated by the latch. An application using a plurality of such latch circuits in a parallel decoding ADC for use in an image sensor is given as an example
Asymptotics of input-constrained binary symmetric channel capacity
We study the classical problem of noisy constrained capacity in the case of
the binary symmetric channel (BSC), namely, the capacity of a BSC whose inputs
are sequences chosen from a constrained set. Motivated by a result of
Ordentlich and Weissman [In Proceedings of IEEE Information Theory Workshop
(2004) 117--122], we derive an asymptotic formula (when the noise parameter is
small) for the entropy rate of a hidden Markov chain, observed when a Markov
chain passes through a BSC. Using this result, we establish an asymptotic
formula for the capacity of a BSC with input process supported on an
irreducible finite type constraint, as the noise parameter tends to zero.Comment: Published in at http://dx.doi.org/10.1214/08-AAP570 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org
Non-sterile electroweak-scale right-handed neutrinos and the dual nature of the 125-GeV scalar
Can, and under which conditions, the 125-\gev SM-like scalar with the signal
strengths for its decays into , , ,
and being consistent with experiments be accommodated in
models that go beyond the Standard Model? Is it truly what it appears to be,
namely the SM Higgs boson, or could it be quite different? A minimal extension
of the original electroweak-scale right-handed neutrino model, in which
right-handed neutrinos naturally obtain electroweak-scale masses, shows a
scalar spectrum which includes either the 125-\gev SM-like scalar or a scalar
which is quite {\em unlike} that of the Standard Model, both of which
possessing signal strengths compatible with experiment. In other words, the
125-\gev scalar could be an {\em impostor}.Comment: 36 double-column pages, 13 Figures, 9 Tables. Typos corrected.
Version to appear in Nuclear Physics
- …