4,619 research outputs found

    The Top Quark Production Asymmetries AFBtA_{FB}^t and AFBâ„“A_{FB}^{\ell}

    Full text link
    A large forward-backward asymmetry is seen in both the top quark rapidity distribution AFBtA_{FB}^t and in the rapidity distribution of charged leptons AFBâ„“A_{FB}^\ell from top quarks produced at the Tevatron. We study the kinematic and dynamic aspects of the relationship of the two observables arising from the spin correlation between the charged lepton and the top quark with different polarization states. We emphasize the value of both measurements, and we conclude that a new physics model which produces more right-handed than left-handed top quarks is favored by the present data.Comment: accepted for publication in Physical Review Letter

    Influence Robustness of Nodes in Multiplex Networks against Attacks

    Full text link
    Recent advances have focused mainly on the resilience of the monoplex network in attacks targeting random nodes or links, as well as the robustness of the network against cascading attacks. However, very little research has been done to investigate the robustness of nodes in multiplex networks against targeted attacks. In this paper, we first propose a new measure, MultiCoreRank, to calculate the global influence of nodes in a multiplex network. The measure models the influence propagation on the core lattice of a multiplex network after the core decomposition. Then, to study how the structural features can affect the influence robustness of nodes, we compare the dynamics of node influence on three types of multiplex networks: assortative, neutral, and disassortative, where the assortativity is measured by the correlation coefficient of the degrees of nodes across different layers. We found that assortative networks have higher resilience against attack than neutral and disassortative networks. The structure of disassortative networks tends to break down quicker under attack

    Positivity from J-Basis Operators in the Standard Model Effective Field Theory

    Full text link
    In the effective field theory (EFT), the positivity bound on dim-8 effective operators tells us that the s2s^2 contribution in the scattering amplitude of 2-to-2 process geometrically corresponds to the convex cone composed of the ultraviolet (UV) states as the external rays. The J-Basis method can provide a complete group theory decomposition of the scattering amplitude on the direct product of the gauge group and the Lorentz group, thus to search for all UV states. Compared to previous methods, which can only perform direct product decomposition on the gauge groups, the J-Basis method greatly improves the strictness of the restrictions and also provides a systematic scheme for calculating the positivity bounds of the dim-8 operators.Comment: 49 pages, 7 figures, 15 table

    The effects of large extra dimensions on associated ttˉh0t\bar{t} h^0 production at linear colliders

    Full text link
    In the framework of the large extra dimensions (LED) model, the effects of LED on the processes \rrtth and \eetth at future linear colliders are investigated in both polarized and unpolarized collision modes. The results show that the virtual Kaluza-Klein (KK) graviton exchange can significantly modify the standard model expectations for these processes with certain polarizations of initial states. The process \rrtth with s=3.5TeV\sqrt{s}=3.5 TeV allows the effective scale ΛT\Lambda_T to be probed up to 7.8 and 8.6 TeV in the unpolarized and Pγ=0.9P_{\gamma} = 0.9, J=2 polarized γγ\gamma \gamma collision modes, respectively. For the \eetth process with s=3.5TeV\sqrt{s}=3.5 TeV, the upper limits of ΛT\Lambda_T to be observed can be 6.7 and 7.0 TeV in the unpolarized and Pe+=0.6P_{e^+} = 0.6, Pe−=0.8P_{e^-} = 0.8, −+-+ polarized e+e−e^+e^- collision modes, respectively. We find the \rrtth channel in J=2 polarized photon collision mode provides a possibility to improve the sensitivity to the graviton tower exchange.Comment: To be appeard in Physical Review

    A complete tree-level dictionary between simplified BSM models and SMEFT (d ≤\leq 7) operators

    Full text link
    Finding all possible UV resonances of effective operators is an important task in the bottom-up approach of effective field theory. We present all the tree-level UV resonances for the dimension-5, -6 and -7 operators in the Standard Model effective field theory (SMEFT), and then obtain the correspondence between the UV resonances and the effective operators from the relations among their Wilson coefficients, through the functional matching and operator reduction procedure. This provides a cross-dimension UV/IR dictionary for the SMEFT at tree-level, and the methods used here, especially the on-shell construction of general UV Lagrangian and the systematic reduction of operators, are extendable for UV resonances of d≥8d \geq 8 operators in SMEFT and other EFTs.Comment: 55 pages, 1 figure, 12 table

    BcBIM: A Blockchain-Based Big Data Model for BIM Modification Audit and Provenance in Mobile Cloud

    Get PDF
    Building Information Modeling (BIM) is envisioned as an indispensable opportunity in the architecture, engineering, and construction (AEC) industries as a revolutionary technology and process. Smart construction relies on BIM for manipulating information flow, data flow, and management flow. Currently, BIM model has been explored mainly for information construction and utilization, but rare works pay efforts to information security, e.g., critical model audit and sensitive model exposure. Moreover, few BIM systems are proposed to chase after upcoming computing paradigms, such as mobile cloud computing, big data, blockchain, and Internet of Things. In this paper, we make the first attempt to propose a novel BIM system model called bcBIM to tackle information security in mobile cloud architectures. More specifically, bcBIM is proposed to facilitate BIM data audit for historical modifications by blockchain in mobile cloud with big data sharing. The proposed bcBIM model can guide the architecture design for further BIM information management system, especially for integrating BIM cloud as a service for further big data sharing. We propose a method of BIM data organization based on blockchains and discuss it based on private and public blockchain. It guarantees to trace, authenticate, and prevent tampering with BIM historical data. At the same time, it can generate a unified format to support future open sharing, data audit, and data provenance
    • …
    corecore