148 research outputs found

    Higgs-flavon mixing and LHC phenomenology in a simplified model of broken flavor symmetry

    Full text link
    The LHC phenomenology of a low-scale gauged flavor symmetry model with inverted hierarchy is studied, through introduction of a simplified model of broken flavor symmetry. A new scalar (a flavon) and a new neutral top-philic massive gauge boson emerge with mass in the TeV range along with a new heavy fermion associated with the standard model top quark. After checking constraints from electroweak precision observables, we investigate the influence of the model on Higgs boson physics, notably on its production cross section and decay branching fractions. Limits on the flavon φ\varphi from heavy Higgs boson searches at the LHC at 7 and 8 TeV are presented. The branching fractions of the flavon are computed as a function of the flavon mass and the Higgs-flavon mixing angle. We also explore possible discovery of the flavon at 14 TeV, particularly via the φZ0Z0\varphi \rightarrow Z^0Z^0 decay channel in the 222\ell2\ell' final state, and through standard model Higgs boson pair production φhh\varphi \rightarrow hh in the bbˉγγb\bar{b}\gamma\gamma final state. We conclude that the flavon mass range up to 500500 GeV could probed down to quite small values of the Higgs-flavon mixing angle with 100 fb1^{-1} of integrated luminosity at 14 TeV.Comment: 17 pages, 14 figure

    A general framework to realize an abstract machine as an ILP processor with application to java

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Emergency Management System for Sudden Water Pollution Accidents

    Get PDF
    The emergency management system for sudden water pollution accidents of the main canal is the integrated application of the aforesaid three key technologies and is the key to verify the effect of practical application of these technologies. The emergency management system is formed by integrating basic information, measured data, and professional models through the communication mode of network transmission. The system can provide support for emergency response in case of emergency conditions including sudden water pollution accidents and technical support for security operations of the MRP

    Generative Machine Learning for Detector Response Modeling with a Conditional Normalizing Flow

    Full text link
    In this paper, we explore the potential of generative machine learning models as an alternative to the computationally expensive Monte Carlo (MC) simulations commonly used by the Large Hadron Collider (LHC) experiments. Our objective is to develop a generative model capable of efficiently simulating detector responses for specific particle observables, focusing on the correlations between detector responses of different particles in the same event and accommodating asymmetric detector responses. We present a conditional normalizing flow model (CNF) based on a chain of Masked Autoregressive Flows, which effectively incorporates conditional variables and models high-dimensional density distributions. We assess the performance of the \cnf model using a simulated sample of Higgs boson decaying to diphoton events at the LHC. We create reconstruction-level observables using a smearing technique. We show that conditional normalizing flows can accurately model complex detector responses and their correlation. This method can potentially reduce the computational burden associated with generating large numbers of simulated events while ensuring that the generated events meet the requirements for data analyses.Comment: 16 pages, 6 figure

    Parton Labeling without Matching: Unveiling Emergent Labelling Capabilities in Regression Models

    Full text link
    Parton labeling methods are widely used when reconstructing collider events with top quarks or other massive particles. State-of-the-art techniques are based on machine learning and require training data with events that have been matched using simulations with truth information. In nature, there is no unique matching between partons and final state objects due to the properties of the strong force and due to acceptance effects. We propose a new approach to parton labeling that circumvents these challenges by recycling regression models. The final state objects that are most relevant for a regression model to predict the properties of a particular top quark are assigned to said parent particle without having any parton-matched training data. This approach is demonstrated using simulated events with top quarks and outperforms the widely-used χ2\chi^2 method.Comment: 6 pages, 4 figure

    Progress in the seasonal variations of blood lipids: a mini-review.

    Get PDF
    The seasonal variations of blood lipids have recently gained increasing interest in this field of lipid metabolism. Elucidating the seasonal patterns of blood lipids is particularly helpful for the prevention and treatment of cardiovascular and cerebrovascular diseases. However, the previous results remain controversial and the underlying mechanisms are still unclear. This mini-review is focused on summarizing the literature relevant to the seasonal variability of blood lipid parameters, as well as on discussing its significance in clinical diagnoses and management decisions

    Automated vulnerability discovery and exploitation in the internet of things

    Get PDF
    Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our Anti-Driller technique to mitigate the “path explosion” problem. This approach first generates a specific input proceeding from symbolic execution based on a Control Flow Graph (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework
    corecore