6,468 research outputs found
Branching Fractions and CP Asymmetries of the Quasi-Two-Body Decays in within PQCD Approach
Motivated by the first untagged decay-time-integrated amplitude analysis of
decays performed by LHCb collaboration, where the
decay amplitudes are modeled to contain the resonant contributions from
intermediate resonances , and , we
comprehensively investigate the quasi-two-body decays, and calculate the branching fractions and
the time-dependent asymmetries within the perturbative QCD approach based
on the factorization. In the quasi-two-body space region the calculated
branching fractions with the considered intermediate resonances are in good
agreement with the experimental results of LHCb by adopting proper pair
wave function, describing the interaction between the kaon and pion in the
pair. Furthermore,within the obtained branching fractions of the
quasi-two-body decays, we also calculate the branching fractions of
corresponding two-body decays, and the results consist with the LHCb
measurements and the earlier studies with errors. For these considered decays,
since the final states are not flavour-specific, the time-dependent could
be measured. We calculate six -violation observables, which can be tested
in the ongoing LHCb experiment.Comment: 20 page
Cabibbo-Kobayashi-Maskawa-favored decays to a scalar meson and a meson
Within the perturbative QCD approach, we investigated the
Cabibbo-Kobayashi-Maskawa-favored ("" denoting the
scalar meson) decays on the basis of the two-quark picture. Supposing the
scalar mesons are the ground states or the first excited states, we calculated
the the branching ratios of 72 decay modes. Most of the branching ratios are in
the range to , which can be tested in the ongoing LHCb
experiment and the forthcoming Belle-II experiment. Some decays, such as and , could be used to probe the inner structure and the character
of the scalar mesons, if the experiments are available. In addition, the ratios
between the and provide a potential way to determine the mixing
angle between and . Moreover, since in the standard model
these decays occur only through tree operators and have no asymmetries,
any deviation will be signal of the new physics beyond the standard model.Comment: 2 figures, 6 table
Beyond saliency: understanding convolutional neural networks from saliency prediction on layer-wise relevance propagation
Despite the tremendous achievements of deep convolutional neural networks
(CNNs) in many computer vision tasks, understanding how they actually work
remains a significant challenge. In this paper, we propose a novel two-step
understanding method, namely Salient Relevance (SR) map, which aims to shed
light on how deep CNNs recognize images and learn features from areas, referred
to as attention areas, therein. Our proposed method starts out with a
layer-wise relevance propagation (LRP) step which estimates a pixel-wise
relevance map over the input image. Following, we construct a context-aware
saliency map, SR map, from the LRP-generated map which predicts areas close to
the foci of attention instead of isolated pixels that LRP reveals. In human
visual system, information of regions is more important than of pixels in
recognition. Consequently, our proposed approach closely simulates human
recognition. Experimental results using the ILSVRC2012 validation dataset in
conjunction with two well-established deep CNN models, AlexNet and VGG-16,
clearly demonstrate that our proposed approach concisely identifies not only
key pixels but also attention areas that contribute to the underlying neural
network's comprehension of the given images. As such, our proposed SR map
constitutes a convenient visual interface which unveils the visual attention of
the network and reveals which type of objects the model has learned to
recognize after training. The source code is available at
https://github.com/Hey1Li/Salient-Relevance-Propagation.Comment: 35 pages, 15 figure
Collaborative Learning for Information Security Topics: A Pilot Study
Collaborative learning has seen a growing popularity in computing education with promising results. The purpose of this research study is to determine if the collaborative guided learning pedagogy is valid for the diverse information security-related topics. We have developed and tested on three security topics and learning activities, including input validation, security in operating systems, and SQL injection in the pilot study. Applied pre-test and post-test surveys to measure the effectiveness of the learning experiences. We have conducted statistical analysis and qualitative analysis to compare the pre- and post-surveys results. Furthermore, we found that team experience is helpful to research with security topics, and more time allowed for the activity could benefit the learning experience
- β¦