399 research outputs found
Low scale B-L extension of the Standard Model at the LHC
The fact that neutrinos are massive indicates that the Standard Model (SM)
requires extension. We propose a low energy (<TeV) B-L extension of the SM,
which is based on the gauge group SU(3)_C x SU(2)_L x U(1)_Y x U(1)_{B-L}. We
show that this model provides a natural explanation for the presence of three
right-handed neutrinos in addition to an extra gauge boson and a new scalar
Higgs. Therefore, it can lead to very interesting phenomenological implications
different from the SM results which can be tested at the LHC. Also we analyze
the muon anomalous magnetic moment in this class of models. We show that
one-loop with exchange Z' may give dominant new contribution ~ few x 10^{-11}.Comment: 12 page
Recommended from our members
Anonymisation of geographical distance matrices via Lipschitz embedding
BACKGROUND: Anonymisation of spatially referenced data has received increasing attention in recent years. Whereas the research focus has been on the anonymisation of point locations, the disclosure risk arising from the publishing of inter-point distances and corresponding anonymisation methods have not been studied systematically.
METHODS: We propose a new anonymisation method for the release of geographical distances between records of a microdata file-for example patients in a medical database. We discuss a data release scheme in which microdata without coordinates and an additional distance matrix between the corresponding rows of the microdata set are released. In contrast to most other approaches this method preserves small distances better than larger distances. The distances are modified by a variant of Lipschitz embedding.
RESULTS: The effects of the embedding parameters on the risk of data disclosure are evaluated by linkage experiments using simulated data. The results indicate small disclosure risks for appropriate embedding parameters.
CONCLUSION: The proposed method is useful if published distance information might be misused for the re-identification of records. The method can be used for publishing scientific-use-files and as an additional tool for record-linkage studies
Muon Anomalous Magnetic Moment and mu -> e gamma in B-L Model with Inverse Seesaw
We study the anomalous magnetic moment of the muon, a_\mu, and lepton flavor
violating decay \mu -> e \gamma in TeV scale B-L extension of the Standard
Model (SM) with inverse seesaw mechanism. We show that the B-L contributions to
a_\mu are severely constrained, therefore the SM contribution remains intact.
We also emphasize that the current experimental limit of BR(\mu -> e \gamma)
can be satisfied for a wide range of parameter space and it can be within the
reach of MEG experiment.Comment: 10 pages, 4 Figure
Uncoupled excitons in semiconductor microcavities detected in resonant Raman scattering
We present an outgoing resonant Raman-scattering study of a GaAs/AlGaAs based microcavity embedded in a p-i-n junction. The p-i-n junction allows the vertical electric field to be varied, permitting control of exciton-photon detuning and quenching of photoluminescence which otherwise obscures the inelastic light scattering signals. Peaks corresponding to the upper and lower polariton branches are observed in the resonant Raman cross sections, along with a third peak at the energy of uncoupled excitons. This third peak, attributed to disorder activated Raman scattering, provides clear evidence for the existence of uncoupled exciton reservoir states in microcavities in the strong-coupling regime
Mutation of DNA and RNA sequences through the application of topological spaces
Topology is branch of modern mathematics that plays an important role in applications of biology. The aim of this paper is to study DNA sequence mutations using multisets, relations, metric functions, topology and association indices. Moreover, we use association indices to study the similarity between DNA sequences. These different ways of identifying a mutation help biologists to make a decision. A decision of mutation that depends on metrics between two sequences of genes and the topological structure produced by their relationship is presented
Routes for breaching and protecting genetic privacy
We are entering the era of ubiquitous genetic information for research,
clinical care, and personal curiosity. Sharing these datasets is vital for
rapid progress in understanding the genetic basis of human diseases. However,
one growing concern is the ability to protect the genetic privacy of the data
originators. Here, we technically map threats to genetic privacy and discuss
potential mitigation strategies for privacy-preserving dissemination of genetic
data.Comment: Draft for comment
Observation of Parity Nonconservation in Moller Scattering
We report a measurement of the parity-violating asymmetry in fixed target
electron-electron (Moller) scattering: A_PV = -175 +/- 30 (stat.) +/- 20
(syst.) parts per billion. This first direct observation of parity
nonconservation in Moller scattering leads to a measurement of the electron's
weak charge at low energy Q^e_W = -0.053 +/- 0.011. This is consistent with the
Standard Model expectation at the current level of precision:
sin^2\theta_W(M_Z)_MSbar = 0.2293 +/- 0.0024 (stat.) +/- 0.0016 (syst.) +/-
0.0006 (theory).Comment: Version 3 is the same as version 2. These versions contain minor text
changes from referee comments and a change in the extracted value of Q^e_W
and sin^2\theta_W due to a change in the theoretical calculation of the
bremsstrahulung correction (ref. 16
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
Background
Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step.
Methods
We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network.
Results
The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N − 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem.
Conclusions
The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians
TeV Scale Leptogenesis in B-L Model with Alternative Cosmologies
In TeV scale B-L extension of the standard model with inverse seesaw, the
Yukawa coupling of right-handed neutrinos can be of order one. This implies
that the out of equilibrium condition for leptogenesis within standard
cosmology is not satisfied. We provide two scenarios for overcoming this
problem and generating the desired value of the baryon asymmetry of the
Universe. The first scenario is based on extra-dimensional braneworld effects
that modify the Friedman equation. We show that in this case the value of the
baryon asymmetry of the Universe constrains the five-dimensional Planck mass to
be of order O(100) TeV. In the second scenario a non-thermal right-handed
neutrino produced by the decay of inflaton is assumed. We emphasize that in
this case, it is possible to generate the required baryon asymmetry of the
Universe for TeV scale right-handed neutrinos.Comment: 13 pages, 2 figure
- …