616 research outputs found
Narrow Trans-TeV Higgs Bosons and Decays: Two LHC Search Paths for a Hidden Sector Higgs Boson
We consider the addition of a condensing singlet scalar field to the Standard
Model. Such a scenario may be motivated by any number of theoretical ideas,
including the common result in string-inspired model building of singlet scalar
fields charged under some hidden sector gauge symmetry. For concreteness, we
specify an example model of this type, and consider the relevant constraints on
Higgs physics, such as triviality, perturbative unitarity and precision
electroweak analysis. We then show that there are two unique features of the
phenomenology that present opportunities for discovery at the Large Hadron
Collider (LHC). First, it is possible to identify and discover a narrow
trans-TeV Higgs boson in this scenario -- a mass scale that is well above the
scale at which it is meaningful to discuss a SM Higgs boson. Second, the decays
of the heavier scalar state into the lighter Higgs bosons can proceed at a high
rate and may be the first discovery mode in the Higgs sector.Comment: 21 pages, 5 figure
Generalized Kitaev Spin Liquid model and Emergent Twist Defect
The Kitaev spin liquid model on honeycomb lattice offers an intriguing
feature that encapsulates both Abelian and non-Abelian anyons. Recent studies
suggest that the comprehensive phase diagram of possible generalized Kitaev
model largely depends on the specific details of the discrete lattice, which
somewhat deviates from the traditional understanding of "topological" phases.
In this paper, we propose an adapted version of the Kitaev spin liquid model on
arbitrary planar lattices. Our revised model recovers the toric code model
under certain parameter selections within the Hamiltonian terms. Our research
indicates that changes in parameters can initiate the emergence of holes,
domain walls, or twist defects. Notably, the twist defect, which presents as a
lattice dislocation defect, exhibits non-Abelian braiding statistics upon
tuning the coefficients of the Hamiltonian on a standard translationally
invariant lattice. Additionally, we illustrate that the creation, movement, and
fusion of these defects can be accomplished through natural time evolution by
linearly interpolating the static Hamiltonian. These defects demonstrate the
Ising anyon fusion rule as anticipated. Our findings hint at possible
implementation in actual physical materials owing to a more realistically
achievable two-body interaction
Securing Cyber-Physical Social Interactions on Wrist-worn Devices
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this article, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel key generation system, which harvests motion data during user handshaking from the wrist-worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn’t involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed key generation system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to different types of attacks including impersonate mimicking attacks, impersonate passive attacks, or eavesdropping attacks. Specifically, for real-time impersonate mimicking attacks, in our experiments, the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed key generation system can be extremely lightweight and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption
Ribbon operators in the generalized Kitaev quantum double model based on Hopf algebras
Kitaev's quantum double model is a family of exactly solvable lattice models
that realize two dimensional topological phases of matter. Originally it is
based on finite groups, and is later generalized to semi-simple Hopf algebras.
We rigorously define and study ribbon operators in the generalized Kitaev
quantum double model. These ribbon operators are important tools to understand
quasi-particle excitations. It turns out that there are some subtleties in
defining the operators in contrast to what one would naively think. In
particular, one has to distinguish two classes of ribbons which we call locally
clockwise and locally counterclockwise ribbons. Moreover, this issue already
exists in the original model based on finite non-Abelian groups. We show how
certain properties would fail even in the original model if we do not
distinguish these two classes of ribbons. Perhaps not surprisingly, under the
new definitions ribbon operators satisfy all properties that are expected. For
instance, they create quasi-particle excitations only at the end of the ribbon,
and the types of the quasi-particles correspond to irreducible representations
of the Drinfeld double of the input Hopf algebra. However, the proofs of these
properties are much more complicated than those in the case of finite groups.
This is partly due to the complications in dealing with general Hopf algebras
rather than just group algebras.Comment: 39 page
Phononic transport in 1T prime-MoTe2: anisotropic structure with an isotropic lattice thermal conductivity
Molybdenum ditelluride (MoTe2) is an unique transition metal dichalcogenide
owing to its energetically comparable 1H and 1T prime phases. This implies a
high chance of coexistence of 1H-1T prime heterostructures which poses great
complexity in the measurement of the intrinsic lattice thermal conductivities
(kappa). In this work, via first-principles calculations, we examine the
lattice-wave propagation and thermal conduction in this highly structurally
anisotropic 1T prime MoTe2. Our calculation shows that the 1T prime phase has a
sound velocity of 2.13 km/s (longitudinal acoustic wave), much lower than that
of the 1H phase (4.05 km /s), indicating a staggered transmission of lattice
waves across the boundary from 1H to 1T prime phase. Interestingly, the highly
anisotropic 1T prime MoTe2 shows nearly isotropic and limited kappa_L of 13.02
W/mK, owing to a large Gruneisen parameter of acoustic flexural mode, heavy
masses of Mo and Te elements and a low phonon group velocity. Accumulative
kappa_L as a function of mean free path (MFP) indicates phonons with MFP less
than ~300 nm contribute 80% of kappa_L and an inflection point at ~600 nm. Our
results will be critical for understanding of the size dependent kappa_L of
nanostructured 1T prime MoTe2
Molecular game theory for a toxin-dominant food chain model
Animal toxins that are used to subdue prey and deter predators act as the key drivers in natural food chains and ecosystems. However, the predators of venomous animals may exploit feeding adaptation strategies to overcome toxins their prey produce. Much remains unknown about the genetic and molecular game process in the toxin-dominant food chain model. Here, we show an evolutionary strategy in different trophic levels of scorpion-eating amphibians, scorpions and insects, representing each predation relationship in habitats dominated by the paralytic toxins of scorpions. For scorpions preying on insects, we found that the scorpion α-toxins irreversibly activate the skeletal muscle sodium channel of their prey (insect, BgN
Climate policies under dynamic international economic cycles: a heterogeneous countries DSGE model
In light of increased economic integration and global warming, addressing critical issues such as the role of multilateral climate policies and the strategic interaction of countries in climate negotiations becomes paramount. We thus established for this paper an open economy environmental dynamic stochastic general equilibrium model with heterogeneous production sectors, bilateral climate policies, asymmetric economies, and asymmetric stochastic shocks, using China and the EU as case studies in order to analyze the interaction and linking of international carbon markets under dynamic international economic cycles. This led us to some major conclusions. First, with various methods we verified that, due to deadweight loss, the efficiency of the separate carbon market is lower than that of the joint carbon market. Second, the intensity of the spillover effects depends partly on different climate policies. This means that, in terms of supply-side shocks, the EU's economy in a joint carbon market is more sensitive because its cross-border spillover effects are enhanced, while demand-side shocks have a stronger impact on the EU's economy under a separate carbon market. Third, the Ramsey policy rule revealed that both China's and the EU's emission quotas should be adjusted pro-cyclically under separate carbon markets. The cross-border spillover effects of the joint carbon market, however can change the pro-cyclical characteristics of foreign (EU's) optimal quotas
Label Enhanced Event Detection with Heterogeneous Graph Attention Networks
Event Detection (ED) aims to recognize instances of specified types of event
triggers in text. Different from English ED, Chinese ED suffers from the
problem of word-trigger mismatch due to the uncertain word boundaries. Existing
approaches injecting word information into character-level models have achieved
promising progress to alleviate this problem, but they are limited by two
issues. First, the interaction between characters and lexicon words is not
fully exploited. Second, they ignore the semantic information provided by event
labels. We thus propose a novel architecture named Label enhanced Heterogeneous
Graph Attention Networks (L-HGAT). Specifically, we transform each sentence
into a graph, where character nodes and word nodes are connected with different
types of edges, so that the interaction between words and characters is fully
reserved. A heterogeneous graph attention networks is then introduced to
propagate relational message and enrich information interaction. Furthermore,
we convert each label into a trigger-prototype-based embedding, and design a
margin loss to guide the model distinguish confusing event labels. Experiments
on two benchmark datasets show that our model achieves significant improvement
over a range of competitive baseline methods
- …