616 research outputs found

    Narrow Trans-TeV Higgs Bosons and H→hhH\to hh Decays: Two LHC Search Paths for a Hidden Sector Higgs Boson

    Get PDF
    We consider the addition of a condensing singlet scalar field to the Standard Model. Such a scenario may be motivated by any number of theoretical ideas, including the common result in string-inspired model building of singlet scalar fields charged under some hidden sector gauge symmetry. For concreteness, we specify an example model of this type, and consider the relevant constraints on Higgs physics, such as triviality, perturbative unitarity and precision electroweak analysis. We then show that there are two unique features of the phenomenology that present opportunities for discovery at the Large Hadron Collider (LHC). First, it is possible to identify and discover a narrow trans-TeV Higgs boson in this scenario -- a mass scale that is well above the scale at which it is meaningful to discuss a SM Higgs boson. Second, the decays of the heavier scalar state into the lighter Higgs bosons can proceed at a high rate and may be the first discovery mode in the Higgs sector.Comment: 21 pages, 5 figure

    Generalized Kitaev Spin Liquid model and Emergent Twist Defect

    Full text link
    The Kitaev spin liquid model on honeycomb lattice offers an intriguing feature that encapsulates both Abelian and non-Abelian anyons. Recent studies suggest that the comprehensive phase diagram of possible generalized Kitaev model largely depends on the specific details of the discrete lattice, which somewhat deviates from the traditional understanding of "topological" phases. In this paper, we propose an adapted version of the Kitaev spin liquid model on arbitrary planar lattices. Our revised model recovers the toric code model under certain parameter selections within the Hamiltonian terms. Our research indicates that changes in parameters can initiate the emergence of holes, domain walls, or twist defects. Notably, the twist defect, which presents as a lattice dislocation defect, exhibits non-Abelian braiding statistics upon tuning the coefficients of the Hamiltonian on a standard translationally invariant lattice. Additionally, we illustrate that the creation, movement, and fusion of these defects can be accomplished through natural time evolution by linearly interpolating the static Hamiltonian. These defects demonstrate the Ising anyon fusion rule as anticipated. Our findings hint at possible implementation in actual physical materials owing to a more realistically achievable two-body interaction

    Securing Cyber-Physical Social Interactions on Wrist-worn Devices

    Get PDF
    Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this article, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel key generation system, which harvests motion data during user handshaking from the wrist-worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn’t involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed key generation system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to different types of attacks including impersonate mimicking attacks, impersonate passive attacks, or eavesdropping attacks. Specifically, for real-time impersonate mimicking attacks, in our experiments, the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed key generation system can be extremely lightweight and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption

    Ribbon operators in the generalized Kitaev quantum double model based on Hopf algebras

    Full text link
    Kitaev's quantum double model is a family of exactly solvable lattice models that realize two dimensional topological phases of matter. Originally it is based on finite groups, and is later generalized to semi-simple Hopf algebras. We rigorously define and study ribbon operators in the generalized Kitaev quantum double model. These ribbon operators are important tools to understand quasi-particle excitations. It turns out that there are some subtleties in defining the operators in contrast to what one would naively think. In particular, one has to distinguish two classes of ribbons which we call locally clockwise and locally counterclockwise ribbons. Moreover, this issue already exists in the original model based on finite non-Abelian groups. We show how certain properties would fail even in the original model if we do not distinguish these two classes of ribbons. Perhaps not surprisingly, under the new definitions ribbon operators satisfy all properties that are expected. For instance, they create quasi-particle excitations only at the end of the ribbon, and the types of the quasi-particles correspond to irreducible representations of the Drinfeld double of the input Hopf algebra. However, the proofs of these properties are much more complicated than those in the case of finite groups. This is partly due to the complications in dealing with general Hopf algebras rather than just group algebras.Comment: 39 page

    Phononic transport in 1T prime-MoTe2: anisotropic structure with an isotropic lattice thermal conductivity

    Full text link
    Molybdenum ditelluride (MoTe2) is an unique transition metal dichalcogenide owing to its energetically comparable 1H and 1T prime phases. This implies a high chance of coexistence of 1H-1T prime heterostructures which poses great complexity in the measurement of the intrinsic lattice thermal conductivities (kappa). In this work, via first-principles calculations, we examine the lattice-wave propagation and thermal conduction in this highly structurally anisotropic 1T prime MoTe2. Our calculation shows that the 1T prime phase has a sound velocity of 2.13 km/s (longitudinal acoustic wave), much lower than that of the 1H phase (4.05 km /s), indicating a staggered transmission of lattice waves across the boundary from 1H to 1T prime phase. Interestingly, the highly anisotropic 1T prime MoTe2 shows nearly isotropic and limited kappa_L of 13.02 W/mK, owing to a large Gruneisen parameter of acoustic flexural mode, heavy masses of Mo and Te elements and a low phonon group velocity. Accumulative kappa_L as a function of mean free path (MFP) indicates phonons with MFP less than ~300 nm contribute 80% of kappa_L and an inflection point at ~600 nm. Our results will be critical for understanding of the size dependent kappa_L of nanostructured 1T prime MoTe2

    Molecular game theory for a toxin-dominant food chain model

    Get PDF
    Animal toxins that are used to subdue prey and deter predators act as the key drivers in natural food chains and ecosystems. However, the predators of venomous animals may exploit feeding adaptation strategies to overcome toxins their prey produce. Much remains unknown about the genetic and molecular game process in the toxin-dominant food chain model. Here, we show an evolutionary strategy in different trophic levels of scorpion-eating amphibians, scorpions and insects, representing each predation relationship in habitats dominated by the paralytic toxins of scorpions. For scorpions preying on insects, we found that the scorpion α-toxins irreversibly activate the skeletal muscle sodium channel of their prey (insect, BgN

    Climate policies under dynamic international economic cycles: a heterogeneous countries DSGE model

    Get PDF
    In light of increased economic integration and global warming, addressing critical issues such as the role of multilateral climate policies and the strategic interaction of countries in climate negotiations becomes paramount. We thus established for this paper an open economy environmental dynamic stochastic general equilibrium model with heterogeneous production sectors, bilateral climate policies, asymmetric economies, and asymmetric stochastic shocks, using China and the EU as case studies in order to analyze the interaction and linking of international carbon markets under dynamic international economic cycles. This led us to some major conclusions. First, with various methods we verified that, due to deadweight loss, the efficiency of the separate carbon market is lower than that of the joint carbon market. Second, the intensity of the spillover effects depends partly on different climate policies. This means that, in terms of supply-side shocks, the EU's economy in a joint carbon market is more sensitive because its cross-border spillover effects are enhanced, while demand-side shocks have a stronger impact on the EU's economy under a separate carbon market. Third, the Ramsey policy rule revealed that both China's and the EU's emission quotas should be adjusted pro-cyclically under separate carbon markets. The cross-border spillover effects of the joint carbon market, however can change the pro-cyclical characteristics of foreign (EU's) optimal quotas

    Label Enhanced Event Detection with Heterogeneous Graph Attention Networks

    Full text link
    Event Detection (ED) aims to recognize instances of specified types of event triggers in text. Different from English ED, Chinese ED suffers from the problem of word-trigger mismatch due to the uncertain word boundaries. Existing approaches injecting word information into character-level models have achieved promising progress to alleviate this problem, but they are limited by two issues. First, the interaction between characters and lexicon words is not fully exploited. Second, they ignore the semantic information provided by event labels. We thus propose a novel architecture named Label enhanced Heterogeneous Graph Attention Networks (L-HGAT). Specifically, we transform each sentence into a graph, where character nodes and word nodes are connected with different types of edges, so that the interaction between words and characters is fully reserved. A heterogeneous graph attention networks is then introduced to propagate relational message and enrich information interaction. Furthermore, we convert each label into a trigger-prototype-based embedding, and design a margin loss to guide the model distinguish confusing event labels. Experiments on two benchmark datasets show that our model achieves significant improvement over a range of competitive baseline methods
    • …
    corecore