783 research outputs found

    Sneutrino Higgs models explain lepton non-universality in CMS excesses

    Full text link
    Recent searches for first-generation leptoquarks and heavy right-handed WRW_R bosons have seen excesses in final states with electrons and jets. A bizarre property of these excesses is that they appear to violate lepton universality. With these results in mind, we study the phenomenology of supersymmetric models in which the Higgs arises as the sneutrino in an electron supermultiplet. Since the electron is singled out in this approach, one can naturally account for the lepton flavor structure of the excesses. In this work, we show that in such a framework, one can significantly alleviate the tension between the Standard Model and the data and yet evade current constraints from other searches. Lastly we point out that correlated excesses are expected to be seen in future multilepton searches.Comment: 17 pages, 7 figure

    Probing a slepton Higgs on all frontiers

    Get PDF
    We study several aspects of supersymmetric models with a U(1)RU(1)_R symmetry where the Higgs doublet is identified with the superpartner of a lepton. We derive new, stronger bounds on the gaugino masses based on current measurements, and also propose ways to probe the model up to scales of O(10 TeV)\mathcal{O}(10\, \textrm{TeV}) at future e+e−e^+e^- colliders. Since the U(1)RU(1)_R symmetry cannot be exact, we analyze the effects of RR-symmetry breaking on neutrino masses and proton decay. In particular, we find that getting the neutrino mixing angles to agree with experiments in a minimal model requires a UV cutoff for the theory at around 10 TeV 10 \text{ TeV} .Comment: 33 pages, 5 figures; v2: added reference. Matches version published in JHE

    Design and first operation of a supersonic gas jet based beam profile monitor

    Get PDF
    Noninterceptive beam profile monitors are of great importance for many particle accelerators worldwide. Extra challenges are posed by high energy, high intensity machines and low energy low intensity accelerators. For these applications, existing diagnostics are no longer suitable due to the high power of the beam or the very low intensity. In addition, many other accelerators, from medical to industrial will benefit from a noninvasive, real time beam profile monitor. In this paper we present a new beam profile monitor with a novel design for the nozzle and skimmer configuration to generate a supersonic gas jet meeting ultrahigh vacuum conditions and we describe the first results for such a beam profile monitor at the Cockcroft Institute. This monitor is able to measure two-dimensional profiles of the particle beam while causing negligible disturbance to the beam or to the accelerator vacuum. The ultimate goal for this diagnostic is to provide a versatile and universal beam profile monitor suitable for measuring any beams

    Spectropolarimetry of the Classical T Tauri Star TW Hydrae

    Get PDF
    We present high resolution (R ~ 60,000) circular spectropolarimetry of the classical T Tauri star TW Hydrae. We analyze 12 photospheric absorption lines and measure the net longitudinal magnetic field for 6 consecutive nights. While no net polarization is detected the first five nights, a significant photospheric field of Bz = 149 \pm 33 G is found on the sixth night. To rule out spurious instrumental polarization, we apply the same analysis technique to several non-magnetic telluric lines, detecting no significant polarization. We further demonstrate the reality of this field detection by showing that the splitting between right and left polarized components in these 12 photospheric lines shows a linear trend with Lande g-factor times wavelength squared, as predicted by the Zeeman effect. However, this longitudinal field detection is still much lower than that which would result if a pure dipole magnetic geometry is responsible for the mean magnetic field strength of 2.6 kG previously reported for TW Hya. We also detect strong circular polarization in the He I 5876 and the Ca II 8498 emission lines, indicating a strong field in the line formation region of these features. The polarization of the Ca II line is substantially weaker than that of the He I line, which we interpret as due to a larger contribution to the Ca II line from chromospheric emission in which the polarization signals cancel. However, the presence of polarization in the Ca II line indicates that accretion shocks on Classical T Tauri stars do produce narrow emission features in the infrared triplet lines of Calcium.Comment: One tar file. The paper has 22 pages, 5 figures. Accepted by AJ on Sep 10, 200

    Operative Intervention Does Not Change Pain Perception in Patients With Diabetic Foot Ulcers

    Full text link
    Researchers investigated pain perception in patients with diabetic foot ulcers (DFUs) by analyzing pre- and postoperative physical function (PF), pain interference (PI), and depression domains of the Patient-Reported Outcome Measurement Information System (PROMIS). They hypothesized that 1) because of painful diabetic peripheral neuropathy (DPN), a majority of patients with DFUs would have high PROMIS PI scores unchanged by operative intervention, and 2) the initially assessed PI, PF, and depression levels would be correlated with ïŹnal outcomes. Seventy-ïŹve percent of patients with DFUs reported pain, most likely because of painful DPN. Those who reported high PI and low PF were likely to report depression. PF, PI, and depression levels were unchanged after operative intervention or healing of DFUs

    Verifying Real-Time Systems using Explicit-time Description Methods

    Get PDF
    Timed model checking has been extensively researched in recent years. Many new formalisms with time extensions and tools based on them have been presented. On the other hand, Explicit-Time Description Methods aim to verify real-time systems with general untimed model checkers. Lamport presented an explicit-time description method using a clock-ticking process (Tick) to simulate the passage of time together with a group of global variables for time requirements. This paper proposes a new explicit-time description method with no reliance on global variables. Instead, it uses rendezvous synchronization steps between the Tick process and each system process to simulate time. This new method achieves better modularity and facilitates usage of more complex timing constraints. The two explicit-time description methods are implemented in DIVINE, a well-known distributed-memory model checker. Preliminary experiment results show that our new method, with better modularity, is comparable to Lamport's method with respect to time and memory efficiency

    Measuring the Magnetic Field on the Classical T Tauri Star TW Hydrae

    Full text link
    We present infrared (IR) and optical echelle spectra of the Classical T Tauri star TW Hydrae. Using the optical data, we perform detailed spectrum synthesis to fit atomic and molecular absorption lines and determine key stellar parameters: Teff = 4126 \pm 24 K, log g = 4.84 \pm 0.16, [M/H] = -0.10 \pm 0.12, vsini = 5.8 \pm 0.6 km/s. The IR spectrum is used to look for Zeeman broadening of photospheric absorption lines. We fit four Zeeman sensitive Ti I lines near 2.2 microns and find the average value of the magnetic field over the entire surface is 2.61 \pm 0.23 kG. In addition, several nearby magnetically insensitive CO lines show no excess broadening above that produced by stellar rotation and instrumental broadening, reinforcing the magnetic interpretation for the width of the Ti I lines. We carry out extensive tests to quantify systematic errors in our analysis technique which may result from inaccurate knowledge of the effective temperature or gravity, finding that reasonable errors in these quantities produce a 10% uncertainty in the mean field measurement.Comment: The tar file includes one Tex file and four .eps figures. The paper is accepted and tentatively scheduled for the ApJ 1 December 2005, v634, 2 issue. ApJ manuscript submission # 6310

    Tumor-Specific Expression and Detection of a CEST Reporter Gene

    Get PDF
    Purpose To develop an imaging tool that enables the detection of malignant tissue with enhanced specificity using the exquisite spatial resolution of MRI. Methods Two mammalian gene expression vectors were created for the expression of the lysine-rich protein (LRP) under the control of the cytomegalovirus (CMV) promoter and the progression elevated gene-3 promoter (PEG-3 promoter) for constitutive and tumor-specific expression of LRP, respectively. Using those vectors, stable cell lines of rat 9L glioma, 9LCMV-LRP and 9LPEG-LRP, were established and tested for CEST contrast in vitro and in vivo. Results 9LPEG-LRP cells showed increased CEST contrast compared with 9L cells in vitro. Both 9LCMV-LRP and 9LPEG-LRP cells were capable of generating tumors in the brains of mice, with a similar growth rate to tumors derived from wild-type 9L cells. An increase in CEST contrast was clearly visible in tumors derived from both 9LCMV-LRP and 9LPEG-LRP cells at 3.4 ppm. Conclusion The PEG-3 promoter:LRP system can be used as a cancer-specific, molecular-genetic imaging reporter system in vivo. Because of the ubiquity of MR imaging in clinical practice, sensors of this class can be used to translate molecular-genetic imaging rapidly

    Evaluation of Gene Association Methods for Coexpression Network Construction and Biological Knowledge Discovery

    Get PDF
    Background Constructing coexpression networks and performing network analysis using large-scale gene expression data sets is an effective way to uncover new biological knowledge; however, the methods used for gene association in constructing these coexpression networks have not been thoroughly evaluated. Since different methods lead to structurally different coexpression networks and provide different information, selecting the optimal gene association method is critical. Methods and Results In this study, we compared eight gene association methods – Spearman rank correlation, Weighted Rank Correlation, Kendall, Hoeffding\u27s D measure, Theil-Sen, Rank Theil-Sen, Distance Covariance, and Pearson – and focused on their true knowledge discovery rates in associating pathway genes and construction coordination networks of regulatory genes. We also examined the behaviors of different methods to microarray data with different properties, and whether the biological processes affect the efficiency of different methods. Conclusions We found that the Spearman, Hoeffding and Kendall methods are effective in identifying coexpressed pathway genes, whereas the Theil-sen, Rank Theil-Sen, Spearman, and Weighted Rank methods perform well in identifying coordinated transcription factors that control the same biological processes and traits. Surprisingly, the widely used Pearson method is generally less efficient, and so is the Distance Covariance method that can find gene pairs of multiple relationships. Some analyses we did clearly show Pearson and Distance Covariance methods have distinct behaviors as compared to all other six methods. The efficiencies of different methods vary with the data properties to some degree and are largely contingent upon the biological processes, which necessitates the pre-analysis to identify the best performing method for gene association and coexpression network construction

    Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Full text link
    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1) automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2) mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3) be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.Comment: In Proceedings TAV-WEB 2010, arXiv:1009.330
    • 

    corecore