5,242 research outputs found

    Higgs production at future e+eβˆ’e^+e^- colliders in the Georgi-Machacek model

    Full text link
    We study how the dominant single and double SM-like Higgs (hh) production at future e+eβˆ’e^+e^- colliders is modified in the Georgi-Machacek (GM) model. On imposing theoretical, indirect and direct constraints, significant deviations of hh-couplings from their SM values are still possible; for instance, the Higgs-gauge coupling coupling can be corrected by a factor ΞΊhVV∈[0.93,1.15]\kappa_{hVV}\in[0.93,1.15] in the allowed parameter space. For the Higgs-strahlung e+eβˆ’β†’hZe^+e^-\to hZ and vector boson fusion processes e+eβˆ’β†’hΞ½Ξ½Λ‰,Β he+eβˆ’e^+e^-\to h\nu\bar{\nu},~he^+e^-, the cross section could increase by 32%32\% or decrease by 13%13\%. In the case of associated production with a top quark pair e+eβˆ’β†’httΛ‰e^+e^-\to ht\bar{t}, the cross section can be enhanced up to several times when the custodial triplet scalar H30H_3^0 is resonantly produced. In the meanwhile, the double Higgs production e+eβˆ’β†’hhZΒ (hhΞ½Ξ½Λ‰)e^+e^-\to hhZ~(hh\nu\bar{\nu}) can be maximally enhanced by one order of magnitude at the resonant H1,30H_{1,3}^0 production. We also include exclusion limits expected from future LHC runs at higher energy and luminosity and discuss their further constraints on the relevant model parameters. We find that the GM model can result in likely measurable deviations of Higgs production from the SM at future e+eβˆ’e^+e^- colliders.Comment: 31 pages, 17 figures, published in JHE

    A quantum secret sharing scheme with verifiable function

    Full text link
    In the (t,n)\left( {t,n} \right) threshold quantum secret sharing scheme, it is difficult to ensure that internal participants are honest. In this paper, a verifiable (t,n)\left( {t,n} \right) threshold quantum secret sharing scheme is designed combined with classical secret sharing scheme. First of all, the distributor uses the asymmetric binary polynomials to generate the shares and sends them to each participant. Secondly, the distributor sends the initial quantum state with the secret to the first participant, and each participant performs unitary operation that using the mutually unbiased bases on the obtained dd dimension single bit quantum state (dd is a large odd prime number). In this process, distributor can randomly check the participants, and find out the internal fraudsters by unitary inverse operation gradually upward. Then the secret is reconstructed after all other participants simultaneously public transmission. Security analysis show that this scheme can resist both external and internal attacks

    Hunting for Heavy Majorana Neutrinos with Lepton Number Violating Signatures at LHC

    Full text link
    The neutrinophilic two-Higgs-doublet model (Ξ½\nu2HDM) provides a natural way to generate tiny neutrino mass from interactions with the new doublet scalar Φν\Phi_\nu (HΒ±,Β H,Β AH^\pm,~H,~A) and singlet neutrinos NRN_R of TeV scale. In this paper, we perform detailed simulations for the lepton number violating (LNV) signatures at LHC arising from cascade decays of the new scalars and neutrinos with the mass order mNR<mΦνm_{N_R}<m_{\Phi_\nu}. Under constraints from lepton flavor violating processes and direct collider searches, their decay properties are explored and lead to three types of LNV signatures: 2β„“Β±4j+ET2\ell^\pm 4j+\cancel{E}_T, 3β„“Β±4j+ET3\ell^\pm 4j+\cancel{E}_T, and 3β„“Β±β„“βˆ“4j3\ell^\pm\ell^\mp 4j. We find that the same-sign trilepton signature 3β„“Β±4j+ET3\ell^\pm4j+\cancel{E}_T is quite unique and is the most promising discovery channel at the high-luminosity LHC. Our analysis also yields the 95%95\% C.L. exclusion limits in the plane of the Φν\Phi_\nu and NRN_R masses at 13 (14) TeV LHC with an integrated luminosity of 100~(3000)/fb.Comment: 31 pages, 17 figures, 6 tables; v2: added a few refs and updated one ref, without other change

    EASYFLOW: Keep Ethereum Away From Overflow

    Full text link
    While Ethereum smart contracts enabled a wide range of blockchain applications, they are extremely vulnerable to different forms of security attacks. Due to the fact that transactions to smart contracts commonly involve cryptocurrency transfer, any successful attacks can lead to money loss or even financial disorder. In this paper, we focus on the overflow attacks in Ethereum , mainly because they widely rooted in many smart contracts and comparatively easy to exploit. We have developed EASYFLOW , an overflow detector at Ethereum Virtual Machine level. The key insight behind EASYFLOW is a taint analysis based tracking technique to analyze the propagation of involved taints. Specifically, EASYFLOW can not only divide smart contracts into safe contracts, manifested overflows, well-protected overflows and potential overflows, but also automatically generate transactions to trigger potential overflows. In our preliminary evaluation, EASYFLOW managed to find potentially vulnerable Ethereum contracts with little runtime overhead.Comment: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings. IEEE Press, 201

    No-Service Rail Surface Defect Segmentation via Normalized Attention and Dual-scale Interaction

    Full text link
    No-service rail surface defect (NRSD) segmentation is an essential way for perceiving the quality of no-service rails. However, due to the complex and diverse outlines and low-contrast textures of no-service rails, existing natural image segmentation methods cannot achieve promising performance in NRSD images, especially in some unique and challenging NRSD scenes. To this end, in this paper, we propose a novel segmentation network for NRSDs based on Normalized Attention and Dual-scale Interaction, named NaDiNet. Specifically, NaDiNet follows the enhancement-interaction paradigm. The Normalized Channel-wise Self-Attention Module (NAM) and the Dual-scale Interaction Block (DIB) are two key components of NaDiNet. NAM is a specific extension of the channel-wise self-attention mechanism (CAM) to enhance features extracted from low-contrast NRSD images. The softmax layer in CAM will produce very small correlation coefficients which are not conducive to low-contrast feature enhancement. Instead, in NAM, we directly calculate the normalized correlation coefficient between channels to enlarge the feature differentiation. DIB is specifically designed for the feature interaction of the enhanced features. It has two interaction branches with dual scales, one for fine-grained clues and the other for coarse-grained clues. With both branches working together, DIB can perceive defect regions of different granularities. With these modules working together, our NaDiNet can generate accurate segmentation map. Extensive experiments on the public NRSD-MN dataset with man-made and natural NRSDs demonstrate that our proposed NaDiNet with various backbones (i.e., VGG, ResNet, and DenseNet) consistently outperforms 10 state-of-the-art methods. The code and results of our method are available at https://github.com/monxxcn/NaDiNet.Comment: 10 pages, 6 figures, Accepted by IEEE Transactions on Instrumentation and Measurement 202

    Iterated residue, toric forms and Witten genus

    Full text link
    We introduce the notion of {\em iterated residue} to study generalized Bott manifolds. When applying the iterated residues to compute the Borisov-Gunnells toric form and the Witten genus of certain toric varieties as well as complete intersections, we obtain interesting vanishing results and some theta function identities, one of which is a twisted version of a classical Rogers-Ramanujan type formula.Comment: 19 page

    Singularities and Accumulation of Singularities of Ο€\piN Scattering amplitudes

    Full text link
    It is demonstrated that for the isospin I=1/2I=1/2 Ο€\piN scattering amplitude, TI=1/2(s,t)T^{I=1/2}(s,t), s=(mN2βˆ’mΟ€2)2/mN2s={(m_N^2-m_\pi^2)^2}/{m_N^2} and s=mN2+2mΟ€2s=m_N^2+2m_\pi^2 are two accumulation points of poles on the second sheet of complex ss plane, and are hence accumulation of singularities of TI=1/2(s,t)T^{I=1/2}(s,t). For TI=3/2(s,t)T^{I=3/2}(s,t), s=(mN2βˆ’mΟ€2)2/mN2s={(m_N^2-m_\pi^2)^2}/{m_N^2} is the accumulation point of poles on the second sheet of complex ss plane. The proof is valid up to all orders of chiral expansions.Comment: 6 pages, one reference added, a bug removed, major conclusions remain unchange

    Solving Einstein equations using deep learning

    Full text link
    Einstein field equations are notoriously challenging to solve due to their complex mathematical form, with few analytical solutions available in the absence of highly symmetric systems or ideal matter distribution. However, accurate solutions are crucial, particularly in systems with strong gravitational field such as black holes or neutron stars. In this work, we use neural networks and auto differentiation to solve the Einstein field equations numerically inspired by the idea of physics-informed neural networks (PINNs). By utilizing these techniques, we successfully obtain the Schwarzschild metric and the charged Schwarzschild metric given the energy-momentum tensor of matter. This innovative method could open up a different way for solving space-time coupled Einstein field equations and become an integral part of numerical relativity.Comment: 18 pages, 4 figure
    • …
    corecore