783 research outputs found
Sneutrino Higgs models explain lepton non-universality in CMS excesses
Recent searches for first-generation leptoquarks and heavy right-handed
bosons have seen excesses in final states with electrons and jets. A bizarre
property of these excesses is that they appear to violate lepton universality.
With these results in mind, we study the phenomenology of supersymmetric models
in which the Higgs arises as the sneutrino in an electron supermultiplet. Since
the electron is singled out in this approach, one can naturally account for the
lepton flavor structure of the excesses. In this work, we show that in such a
framework, one can significantly alleviate the tension between the Standard
Model and the data and yet evade current constraints from other searches.
Lastly we point out that correlated excesses are expected to be seen in future
multilepton searches.Comment: 17 pages, 7 figure
Probing a slepton Higgs on all frontiers
We study several aspects of supersymmetric models with a symmetry
where the Higgs doublet is identified with the superpartner of a lepton. We
derive new, stronger bounds on the gaugino masses based on current
measurements, and also propose ways to probe the model up to scales of
at future colliders. Since the
symmetry cannot be exact, we analyze the effects of -symmetry
breaking on neutrino masses and proton decay. In particular, we find that
getting the neutrino mixing angles to agree with experiments in a minimal model
requires a UV cutoff for the theory at around .Comment: 33 pages, 5 figures; v2: added reference. Matches version published
in JHE
Design and first operation of a supersonic gas jet based beam profile monitor
Noninterceptive beam profile monitors are of great importance for many particle accelerators worldwide. Extra challenges are posed by high energy, high intensity machines and low energy low intensity accelerators. For these applications, existing diagnostics are no longer suitable due to the high power of the beam or the very low intensity. In addition, many other accelerators, from medical to industrial will benefit from a noninvasive, real time beam profile monitor. In this paper we present a new beam profile monitor with a novel design for the nozzle and skimmer configuration to generate a supersonic gas jet meeting ultrahigh vacuum conditions and we describe the first results for such a beam profile monitor at the Cockcroft Institute. This monitor is able to measure two-dimensional profiles of the particle beam while causing negligible disturbance to the beam or to the accelerator vacuum. The ultimate goal for this diagnostic is to provide a versatile and universal beam profile monitor suitable for measuring any beams
Spectropolarimetry of the Classical T Tauri Star TW Hydrae
We present high resolution (R ~ 60,000) circular spectropolarimetry of the
classical T Tauri star TW Hydrae. We analyze 12 photospheric absorption lines
and measure the net longitudinal magnetic field for 6 consecutive nights. While
no net polarization is detected the first five nights, a significant
photospheric field of Bz = 149 \pm 33 G is found on the sixth night. To rule
out spurious instrumental polarization, we apply the same analysis technique to
several non-magnetic telluric lines, detecting no significant polarization. We
further demonstrate the reality of this field detection by showing that the
splitting between right and left polarized components in these 12 photospheric
lines shows a linear trend with Lande g-factor times wavelength squared, as
predicted by the Zeeman effect. However, this longitudinal field detection is
still much lower than that which would result if a pure dipole magnetic
geometry is responsible for the mean magnetic field strength of 2.6 kG
previously reported for TW Hya. We also detect strong circular polarization in
the He I 5876 and the Ca II 8498 emission lines, indicating a strong field in
the line formation region of these features. The polarization of the Ca II line
is substantially weaker than that of the He I line, which we interpret as due
to a larger contribution to the Ca II line from chromospheric emission in which
the polarization signals cancel. However, the presence of polarization in the
Ca II line indicates that accretion shocks on Classical T Tauri stars do
produce narrow emission features in the infrared triplet lines of Calcium.Comment: One tar file. The paper has 22 pages, 5 figures. Accepted by AJ on
Sep 10, 200
Operative Intervention Does Not Change Pain Perception in Patients With Diabetic Foot Ulcers
Researchers investigated pain perception in patients with diabetic foot ulcers (DFUs) by analyzing pre- and postoperative physical function (PF), pain interference (PI), and depression domains of the Patient-Reported Outcome Measurement Information System (PROMIS). They hypothesized that 1) because of painful diabetic peripheral neuropathy (DPN), a majority of patients with DFUs would have high PROMIS PI scores unchanged by operative intervention, and 2) the initially assessed PI, PF, and depression levels would be correlated with ïŹnal outcomes. Seventy-ïŹve percent of patients with DFUs reported pain, most likely because of painful DPN. Those who reported high PI and low PF were likely to report depression. PF, PI, and depression levels were unchanged after operative intervention or healing of DFUs
Verifying Real-Time Systems using Explicit-time Description Methods
Timed model checking has been extensively researched in recent years. Many
new formalisms with time extensions and tools based on them have been
presented. On the other hand, Explicit-Time Description Methods aim to verify
real-time systems with general untimed model checkers. Lamport presented an
explicit-time description method using a clock-ticking process (Tick) to
simulate the passage of time together with a group of global variables for time
requirements. This paper proposes a new explicit-time description method with
no reliance on global variables. Instead, it uses rendezvous synchronization
steps between the Tick process and each system process to simulate time. This
new method achieves better modularity and facilitates usage of more complex
timing constraints. The two explicit-time description methods are implemented
in DIVINE, a well-known distributed-memory model checker. Preliminary
experiment results show that our new method, with better modularity, is
comparable to Lamport's method with respect to time and memory efficiency
Measuring the Magnetic Field on the Classical T Tauri Star TW Hydrae
We present infrared (IR) and optical echelle spectra of the Classical T Tauri
star TW Hydrae. Using the optical data, we perform detailed spectrum synthesis
to fit atomic and molecular absorption lines and determine key stellar
parameters: Teff = 4126 \pm 24 K, log g = 4.84 \pm 0.16, [M/H] = -0.10 \pm
0.12, vsini = 5.8 \pm 0.6 km/s. The IR spectrum is used to look for Zeeman
broadening of photospheric absorption lines. We fit four Zeeman sensitive Ti I
lines near 2.2 microns and find the average value of the magnetic field over
the entire surface is 2.61 \pm 0.23 kG. In addition, several nearby
magnetically insensitive CO lines show no excess broadening above that produced
by stellar rotation and instrumental broadening, reinforcing the magnetic
interpretation for the width of the Ti I lines. We carry out extensive tests to
quantify systematic errors in our analysis technique which may result from
inaccurate knowledge of the effective temperature or gravity, finding that
reasonable errors in these quantities produce a 10% uncertainty in the mean
field measurement.Comment: The tar file includes one Tex file and four .eps figures. The paper
is accepted and tentatively scheduled for the ApJ 1 December 2005, v634, 2
issue. ApJ manuscript submission # 6310
Tumor-Specific Expression and Detection of a CEST Reporter Gene
Purpose To develop an imaging tool that enables the detection of malignant tissue with enhanced specificity using the exquisite spatial resolution of MRI. Methods Two mammalian gene expression vectors were created for the expression of the lysine-rich protein (LRP) under the control of the cytomegalovirus (CMV) promoter and the progression elevated gene-3 promoter (PEG-3 promoter) for constitutive and tumor-specific expression of LRP, respectively. Using those vectors, stable cell lines of rat 9L glioma, 9LCMV-LRP and 9LPEG-LRP, were established and tested for CEST contrast in vitro and in vivo. Results 9LPEG-LRP cells showed increased CEST contrast compared with 9L cells in vitro. Both 9LCMV-LRP and 9LPEG-LRP cells were capable of generating tumors in the brains of mice, with a similar growth rate to tumors derived from wild-type 9L cells. An increase in CEST contrast was clearly visible in tumors derived from both 9LCMV-LRP and 9LPEG-LRP cells at 3.4 ppm. Conclusion The PEG-3 promoter:LRP system can be used as a cancer-specific, molecular-genetic imaging reporter system in vivo. Because of the ubiquity of MR imaging in clinical practice, sensors of this class can be used to translate molecular-genetic imaging rapidly
Evaluation of Gene Association Methods for Coexpression Network Construction and Biological Knowledge Discovery
Background
Constructing coexpression networks and performing network analysis using large-scale gene expression data sets is an effective way to uncover new biological knowledge; however, the methods used for gene association in constructing these coexpression networks have not been thoroughly evaluated. Since different methods lead to structurally different coexpression networks and provide different information, selecting the optimal gene association method is critical. Methods and Results
In this study, we compared eight gene association methods â Spearman rank correlation, Weighted Rank Correlation, Kendall, Hoeffding\u27s D measure, Theil-Sen, Rank Theil-Sen, Distance Covariance, and Pearson â and focused on their true knowledge discovery rates in associating pathway genes and construction coordination networks of regulatory genes. We also examined the behaviors of different methods to microarray data with different properties, and whether the biological processes affect the efficiency of different methods. Conclusions
We found that the Spearman, Hoeffding and Kendall methods are effective in identifying coexpressed pathway genes, whereas the Theil-sen, Rank Theil-Sen, Spearman, and Weighted Rank methods perform well in identifying coordinated transcription factors that control the same biological processes and traits. Surprisingly, the widely used Pearson method is generally less efficient, and so is the Distance Covariance method that can find gene pairs of multiple relationships. Some analyses we did clearly show Pearson and Distance Covariance methods have distinct behaviors as compared to all other six methods. The efficiencies of different methods vary with the data properties to some degree and are largely contingent upon the biological processes, which necessitates the pre-analysis to identify the best performing method for gene association and coexpression network construction
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that
resulting from incomplete or incorrect input sanitization. Learning the
structure of attack vectors could enrich the variety of manifestations in
generated XSS attacks. In this study, we focus on generating more threatening
XSS attacks for the state-of-the-art detection approaches that can find
potential XSS vulnerabilities in Web applications, and propose a mechanism for
structural learning of attack vectors with the aim of generating mutated XSS
attacks in a fully automatic way. Mutated XSS attack generation depends on the
analysis of attack vectors and the structural learning mechanism. For the
kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the
structure of the attack vector model to capture the implicit manner of the
attack vector, and this manner is benefited from the syntax meanings that are
labeled by the proposed tokenizing mechanism. Bayes theorem is used to
determine the number of hidden states in the model for generalizing the
structure model. The paper has the contributions as following: (1)
automatically learn the structure of attack vectors from practical data
analysis to modeling a structure model of attack vectors, (2) mimic the manners
and the elements of attack vectors to extend the ability of testing tool for
identifying XSS vulnerabilities, (3) be helpful to verify the flaws of
blacklist sanitization procedures of Web applications. We evaluated the
proposed mechanism by Burp Intruder with a dataset collected from public XSS
archives. The results show that mutated XSS attack generation can identify
potential vulnerabilities.Comment: In Proceedings TAV-WEB 2010, arXiv:1009.330
- âŠ