3,686 research outputs found

    Surveying the Scope of the SU(2)_L Scalar Septet Sector

    Get PDF
    Extending the Standard Model by adding a scalar field transforming as a septet under SU(2)LSU(2)_L preserves the ρ\rho parameter at tree level and can satisfy experimental constraints on the electroweak parameters SS and TT. This work presents the first fully general phenomenological study of such an extension. We examine constraints on the septet model couplings based on electroweak and Higgs observables, and use LHC searches for new physics to bound the mass of the septet to be above 400\sim 400 GeV at a 95%95\% CL.Comment: pdfLateX, 17 pages, 6 figures, reference added. Version published in JHE

    Dirac Triplet Extension of the MSSM

    Full text link
    In this paper we explore extensions of the Minimal Supersymmetric Standard Model involving two SU(2)LSU(2)_L triplet chiral superfields that share a superpotential Dirac mass yet only one of which couples to the Higgs fields. This choice is motivated by recent work using two singlet superfields with the same superpotential requirements. We find that, as in the singlet case, the Higgs mass in the triplet extension can easily be raised to 125GeV125\,\text{GeV} without introducing large fine-tuning. For triplets that carry hypercharge, the regions of least fine tuning are characterized by small contributions to the T\mathcal T parameter, and light stop squarks, mt~1300450GeVm_{\tilde t_1} \sim 300-450\,\text{GeV}; the latter is a result of the tanβ\tan\beta dependence of the triplet contribution to the Higgs mass. Despite such light stop masses, these models are viable provided the stop-electroweakino spectrum is sufficiently compressed.Comment: 26 pages, 4 figure

    Effects of Corn and Selected Weed Species on Feeding Behavior of the Stalk Borer, \u3ci\u3ePapaipema Nebris\u3c/i\u3e (Lepidoptera: Noctuidae)

    Get PDF
    Experiments were conducted in an outdoor insectary to examine behavioral interactions between fifth instar stalk borers, Papaiperna nebris, and potential host plant species. Plants tested included 6- and 8-leaf stage corn, Zea mays, and ten weed species (six broadleaf and four grass) commonly associated with corn production in southern Wisconsin. Broadleaf plants found to be acceptable hosts included Ambrosia trifida, Arnaranthus retroflexus, Rumex crispus, and Chenopodium album; Asclepias syriaca and Abutilon theophrasti were not acceptable as host plants. Corn and the other grass species (Agropyron repens, Bromus inermis, Dactylis glomerata, and Setaria faberi) were found to be acceptable hosts. All acceptable plants also supported larval development to the pupal stage, though on 6-leaf stage corn and the small-stemmed grasses the majority of larvae dispersed before completing development. Larvae developing on corn, A. triftda, and A. retroflexus pupated within the plant stem, whereas larvae developing on the other plants pupated in the soil near the plant on which they fed. Stalk borer larvae required substantially less time to bore into corn stalks than into the stems of the broadleaf plants. In a limited preference experiment, corn was clearly preferred as a host plant over the three broadleaf and one small-stemmed grass species tested

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    AGO2: A New Argonaute Compromising Plant Virus Accumulation

    Get PDF
    Plant viruses use several strategies to transport their nucleic acid genomes throughout the plants. Regardless of the movement mechanism, a universal major block to uninterrupted viral trafficking is the induction of antiviral silencing that degrades viral RNA. To counteract this defense, viruses encode suppressors that block certain steps in the RNA silencing pathway, and consequently these proteins allow viral spread to proceed. There is a constant battle between plants and viruses and sometimes viruses will succeed and invade the plants and in other cases the RNA silencing mechanism will override the virus. A key role in the silencing versus suppression conflict between plants and viruses is played by one or more members of the Argonaute protein (AGO) family encoded by plants. Here we review the mechanisms and effects of antiviral silencing with an emphasis on the contribution of AGOs, especially the recently discovered role of AGO2

    Improved BER performance of hard-decision staircase code via geometric shaping

    Get PDF
    Staircase codes (SCCs) with hard decision (HD) decoding have attracted much attention in the optical communication community due to their outstanding performance and low decoding complexity [1]. Recently, an implementation agreement has been reached for using an SCC as an outer code in the baseline draft of 400G ZR [2]. To achieve high spectral efficiencies, forward error correction is typically combined with high order modulation formats. Additional gains can be obtained if regular quadrature amplitude modulation (QAM) constellations are replaced by constellations with geometric shaping (GS). In this paper, we consider GS with HD-SCC and analyze the post-SCC bit error rate (BER) performance of constellations with 64 points. Bose- Chaudhuri-Hocquenghem (BCH) codes are used as SCC component codes. The location of the constellation points is optimized by maximizing the achievable information rate. The simulation results show that the shaped constellations yield around 0.24 dB gains at a BER of 1e-6 when compared to regular 64QAM for different coding rates
    corecore