226 research outputs found

    The μeγ\mu\to e\gamma decay in an EW-scale non-sterile RH neutrino model

    Full text link
    We study in this research the phenomenology of μeγ\mu\to e\gamma decay in a scenario of the class of extended models with non-sterile right-handed (RH) neutrino at electroweak (EW) scale proposed by P.Q. Hung. Field content of the standard model (SM) is enlarged by introducing for each SM fermion a corresponding mirror partner with the same quantum numbers beside opposite chirality. Light neutrino masses are generated via the type-I see-saw mechanism and it is also proved to be relevant with low energy within the EW scale of the RH neutrino masses. We introduce the model and derive branching ratio of the μeγ\mu\to e\gamma decay at one-loop approximation with the participation of W gauge boson, neutral and singly charged Higgs scalars. After that we set constraints on relevant parameters and predict the sensitivities of the decay channel under the present and future experiments.Comment: 19 pages, 8 figure

    System for Configuring Modular Telemetry Transponders

    Get PDF
    A system for configuring telemetry transponder cards uses a database of error checking protocol data structures, each containing data to implement at least one CCSDS protocol algorithm. Using a user interface, a user selects at least one telemetry specific error checking protocol from the database. A compiler configures an FPGA with the data from the data structures to implement the error checking protocol

    Deep Technology Tracing for High-tech Companies

    Full text link
    Technological change and innovation are vitally important, especially for high-tech companies. However, factors influencing their future research and development (R&D) trends are both complicated and various, leading it a quite difficult task to make technology tracing for high-tech companies. To this end, in this paper, we develop a novel data-driven solution, i.e., Deep Technology Forecasting (DTF) framework, to automatically find the most possible technology directions customized to each high-tech company. Specially, DTF consists of three components: Potential Competitor Recognition (PCR), Collaborative Technology Recognition (CTR), and Deep Technology Tracing (DTT) neural network. For one thing, PCR and CTR aim to capture competitive relations among enterprises and collaborative relations among technologies, respectively. For another, DTT is designed for modeling dynamic interactions between companies and technologies with the above relations involved. Finally, we evaluate our DTF framework on real-world patent data, and the experimental results clearly prove that DTF can precisely help to prospect future technology emphasis of companies by exploiting hybrid factors.Comment: 6 pages, 7 figure

    Muon anomalous magnetic dipole moment in a low scale type I see-saw model

    Full text link
    Recent experimental results on muon anomalous magnetic dipole moment have shown a 4.2σ4.2\sigma tension with the SM prediction, which has blown a fresh wind into the elementary particle physics community. The problem is believed to be explained only by physics beyond the standard model. Current work considers the anomalous moment in a scenario of models with mirror symmetry and type I see-saw mechanism at low energy scale of electroweak interactions. After a brief introduction to the model, a detailed numerical analysis of muon anomalous phenomenology will be carefully performed.Comment: 15 pages, 2 tables, 5 figue

    Tris(dicyclo­hexyl­ammonium) hydrogen [1-hy­droxy-2-(1H-imidazol-1-yl)-1-phospho­natoethane]­phospho­nate ethanol monosolvate mono­hydrate

    Get PDF
    In the title compound, 3C12H24N+·C5H7N2O7P2 3−·C2H6O·H2O, the zoledronic acid mol­ecule is singly protonated and stabilized by an intra­molecular O—H⋯O inter­action. The three-dimensional crystal structure is stabilized by inter­molecular O—H⋯O, O—H⋯N and N—H⋯O inter­actions. The ethanol solvent mol­ecule is disordered over two positions; the site-occupancy factor of the major component is 0.510 (4)

    Secure Communication Using Non-systematic Error Control Codes

    Get PDF
    A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply a non-systematic error correcting code (NS ECC) to a message, thus producing encoded bits with no clear message bits; and a transceiver (720) configured to transmit the encoded bits over a main channel to a receiver. A method for secure communication includes: encoding a message with an NS ECC to produce an encoded message carrying no message bits in the clear; and transmitting the encoded message over a main channel (120). The NS ECC characteristics result in an eavesdropper channel error probability under a security threshold (320) and a main channel error probability over a reliability threshold (310), whenever an eavesdropper (140) listening on an eavesdropper channel (150) is more than distance Z (220) from the transmitter. Unreliable bits in the encoded bits render the eavesdropper unable to reliably decode messages on the main channel.Georgia Tech Research CorporationKorea Advanced Institute Of Science And Technolog

    Reconfigurable Sensor Monitoring System

    Get PDF
    A reconfigurable sensor monitoring system includes software tunable filters, each of which is programmable to condition one type of analog signal. A processor coupled to the software tunable filters receives each type of analog signal so-conditioned

    Minimal Power Latch for Single-Slope ADCs

    Get PDF
    A latch circuit that uses two interoperating latches. The latch circuit has the beneficial feature that it switches only a single time during a measurement that uses a stair step or ramp function as an input signal in an analog to digital converter. This feature minimizes the amount of power that is consumed in the latch and also minimizes the amount of high frequency noise that is generated by the latch. An application using a plurality of such latch circuits in a parallel decoding ADC for use in an image sensor is given as an example

    Asymptotics of input-constrained binary symmetric channel capacity

    Get PDF
    We study the classical problem of noisy constrained capacity in the case of the binary symmetric channel (BSC), namely, the capacity of a BSC whose inputs are sequences chosen from a constrained set. Motivated by a result of Ordentlich and Weissman [In Proceedings of IEEE Information Theory Workshop (2004) 117--122], we derive an asymptotic formula (when the noise parameter is small) for the entropy rate of a hidden Markov chain, observed when a Markov chain passes through a BSC. Using this result, we establish an asymptotic formula for the capacity of a BSC with input process supported on an irreducible finite type constraint, as the noise parameter tends to zero.Comment: Published in at http://dx.doi.org/10.1214/08-AAP570 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Non-sterile electroweak-scale right-handed neutrinos and the dual nature of the 125-GeV scalar

    Get PDF
    Can, and under which conditions, the 125-\gev SM-like scalar with the signal strengths for its decays into W+WW^{+}W^{-}, ZZZZ, γγ\gamma \gamma, bbˉb \bar{b} and ττˉ\tau \bar{\tau} being consistent with experiments be accommodated in models that go beyond the Standard Model? Is it truly what it appears to be, namely the SM Higgs boson, or could it be quite different? A minimal extension of the original electroweak-scale right-handed neutrino model, in which right-handed neutrinos naturally obtain electroweak-scale masses, shows a scalar spectrum which includes either the 125-\gev SM-like scalar or a scalar which is quite {\em unlike} that of the Standard Model, both of which possessing signal strengths compatible with experiment. In other words, the 125-\gev scalar could be an {\em impostor}.Comment: 36 double-column pages, 13 Figures, 9 Tables. Typos corrected. Version to appear in Nuclear Physics
    corecore