11,067 research outputs found

    Light-Cone Sum Rules Analysis of ΞQQ′q→ΛQ′\Xi_{QQ^{\prime}q}\to\Lambda_{Q^{\prime}} Weak Decays

    Full text link
    We analyze the weak decay of doubly-heavy baryon decays into anti-triplets ΛQ\Lambda_Q with light-cone sum rules. To calculate the decay form factors, both bottom and charmed anti-triplets Λb\Lambda_b and Λc\Lambda_c are described by the same set of leading twist light-cone distribution functions. With the obtained form factors, we perform a phenomenology study on the corresponding semi-leptonic decays. The decay widths are calculated and the branching ratios given in this work are expected to be tested by future experimental data, which will help us to understand the underlying dynamics in doubly-heavy baryon decays.Comment: 19 pages, 3 figures, 7 table

    SU(3) analysis of fully-light tetraquarks in heavy meson weak decays

    Full text link
    We perform a SU(3) analysis for both semi-leptonic and non-leptonic heavy meson weak decays into a pseudoscalar meson and a fully-light tetraquark in 10 or 27 representation. A reduction of the SU(3) representation tensor for the fully-light tetraquarks is produced and all the flavor components for each representation tensor are listed. The decay channels we analysis include B/D→U/T P lνB/D \to U/T~P~l\nu, B/D→U/T PB/D \to U/T~P and Bc→U/T P/DB_c \to U/T~P/D, with U/TU/T represents a fully-light tetraquark in 10 or 27 representation and PP is a pseudoscalar meson. Finally, among these results we list all the golden decay channels which are expected to have more possibilities to be observed in experiments.Comment: 32 pages, 5 figure

    QCD Sum Rules Analysis of Weak Decays of Doubly-Heavy Baryons

    Full text link
    We calculate the weak decay form factors of doubly-heavy baryons using three-point QCD sum rules. The Cutkosky rules are used to derive the double dispersion relations. We include perturbative contributions and condensation contributions up to dimension five, and point out that the perturbative contributions and condensates with lowest dimensions dominate. An estimate of part of gluon-gluon condensates show that it plays a less important role. With these form factors at hand, we present a phenomenological study of semileptonic decays. The future experimental facilities can test these predictions, and deepen our understanding of the dynamics in decays of doubly-heavy baryons.Comment: 30 pages, 8 figures. Version accepted in The European Physical Journal

    Anomalous dimensions for the interpolating currents of baryons

    Full text link
    The anomalous dimensions for the interpolating currents of baryons are indispensable inputs in a serious analysis of baryon QCD sum rules. However, the results in the literature are vague. In view of this, in this work, we investigate the one-loop anomalous dimensions for some interpolating currents such as those of ΛQ\Lambda_{Q} and proton. This work has more significance in pedagogy.Comment: 5 pages, 1 figur

    MicroTEE: Designing TEE OS Based on the Microkernel Architecture

    Full text link
    ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE) for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In such designs, device drivers, kernel services and kernel modules all run in the kernel, which results in large size of the kernel. It is difficult to guarantee that all components of the kernel have no security vulnerabilities in the monolithic kernel architecture, such as the integer overflow vulnerability in Qualcomm QSEE TrustZone and the TZDriver vulnerability in HUAWEI Hisilicon TEE architecture. This paper presents MicroTEE, a TEE OS based on the microkernel architecture. In MicroTEE, the microkernel provides strong isolation for TEE OS's basic services, such as crypto service and platform key management service. The kernel is only responsible for providing core services such as address space management, thread management, and inter-process communication. Other fundamental services, such as crypto service and platform key management service are implemented as applications at the user layer. Crypto Services and Key Management are used to provide Trusted Applications (TAs) with sensitive information encryption, data signing, and platform attestation functions. Our design avoids the compromise of the whole TEE OS if only one kernel service is vulnerable. A monitor has also been added to perform the switch between the secure world and the normal world. Finally, we implemented a MicroTEE prototype on the Freescale i.MX6Q Sabre Lite development board and tested its performance. Evaluation results show that the performance of cryptographic operations in MicroTEE is better than it in Linux when the size of data is small.Comment: 8 pages, 8 figure
    • …
    corecore