13,615 research outputs found

    Quasi-two-body decays Bβ†’Ξ·c(1S,2S)β€…β€Š[ρ(770),ρ(1450),ρ(1700)β†’]β€…β€ŠΟ€Ο€B \to \eta_c {(1S ,2S)}\;[\rho(770),\rho(1450),\rho(1700) \to ]\; \pi\pi in the perturbative QCD approach

    Full text link
    In this paper, we calculated the branching ratios of the quasi-two-body decays Bβ†’Ξ·c(1S,2S)B \to \eta_c (1S ,2S) [ρ(770),ρ(1450),ρ(1700)β†’]ππ[\rho(770), \rho(1450),\rho(1700)\to ] \pi\pi by employing the perturbative QCD (PQCD) approach. The contributions from the PP-wave resonances ρ(770)\rho(770), ρ(1450)\rho(1450) and ρ(1700)\rho(1700) were taken into account. The two-pion distribution amplitude ΦππP\Phi_{\pi\pi}^{\rm P} is parameterized by the vector current time-like form factor FΟ€F_{\pi} to study the considered decay modes. We found that (a) the PQCD predictions for the branching ratios of the considered quasi-two-body decays are in the order of 10βˆ’7∼10βˆ’610^{-7} \sim 10^{-6}, while the two-body decay rates B(Bβ†’Ξ·c(1S,2S)(ρ(1450),ρ(1700))){\cal B}(B \to \eta_c{(1S,2S)} (\rho(1450),\rho(1700))) are extracted from those for the corresponding quasi-two-body decays; (b) the whole pattern of the pion form factor-squared ∣FΟ€βˆ£2|F_\pi|^2 measured by the BABAR Collaboration could be understood based on our theoretical results; (c) the general expectation based on the similarity between Bβ†’Ξ·cππB \to \eta_c \pi\pi and Bβ†’J/ΟˆΟ€Ο€B \to J/\psi \pi\pi decays are confirmed: R2(Ξ·c)β‰ˆ0.45R_2(\eta_c)\approx 0.45 is consistent with the measured R2(J/ψ)β‰ˆ0.56Β±0.09R_2(J/\psi)\approx 0.56\pm 0.09 within errors; and (d) new ratios R3(Ξ·c(1S))R_3(\eta_c(1S)) and R4(Ξ·c(2S))R_4(\eta_c(2S)) among the branching ratios of the considered decay modes are defined and could be tested by future experiments.Comment: 10 pages, 3 figure

    Quasi-two-body decays Bβ†’DKβˆ—(892)β†’DKΟ€B \to D K^*(892) \to D K \pi in the perturbative QCD approach

    Full text link
    We study the quasi-two-body decays Bβ†’DKβˆ—(892)β†’DKΟ€B\to D K^*(892) \to D K\pi by employing the perturbative QCD approach. The two-meson distribution amplitudes \Phi_{K\pi}^{\text{P-wave}} are adopted to describe the final state interactions of the kaon-pion pair in the resonance region. The resonance line shape for the PP-wave KΟ€K\pi component Kβˆ—(892)K^*(892) in the time-like form factor FKΟ€(s)F_{K\pi}(s) is parameterized by the relativistic Breit-Wigner function. For most considered decay modes, the theoretical predictions for their branching ratios are consistent with currently available experimental measurements within errors. We also disscuss some ratios of the branching fractions of the concerned decay processes. More precise data from LHCb and Belle-II are expected to test our predictions.Comment: 10 pages, 3 figures and 2 tables.To be published in EPJ

    Flavor Asymmetry of Nucleon Sea from Detailed Balance

    Full text link
    In this study, the proton is taken as an ensemble of quark-gluon Fock states. Using the principle of detailed balance, we find dΛ‰βˆ’uΛ‰β‰ˆ0.124\bar{d}-\bar{u} \approx 0.124, which is in surprisingly agreement with the experimental observation.Comment: 4 pages and no figures. Talk presented at the Third Circum-Pan-Pacific Symposium on "High Energy Spin Physics", Oct. 8-13, 2001, Beijing, Chin

    Data Poisoning Attacks in Contextual Bandits

    Full text link
    We study offline data poisoning attacks in contextual bandits, a class of reinforcement learning problems with important applications in online recommendation and adaptive medical treatment, among others. We provide a general attack framework based on convex optimization and show that by slightly manipulating rewards in the data, an attacker can force the bandit algorithm to pull a target arm for a target contextual vector. The target arm and target contextual vector are both chosen by the attacker. That is, the attacker can hijack the behavior of a contextual bandit. We also investigate the feasibility and the side effects of such attacks, and identify future directions for defense. Experiments on both synthetic and real-world data demonstrate the efficiency of the attack algorithm.Comment: GameSec 201
    • …
    corecore