76 research outputs found
Supersymmetric Effects on Isospin Symmetry Breaking and Direct CP Violation in
We argue that one can search for physics beyond the standard model through
measurements of the isospin-violating quantity , its charge conjugate
, and direct CP violation in the partial decay rates of . We illustrate this by working out theoretical profiles of the
charge-conjugate averaged ratio and the CP asymmetry in the
standard model and in some variants of the minimal supersymmetric standard
model. We find that chargino contributions in the large region may
modify the magnitudes and flip the signs of and compared to their standard-model values, providing an
unmistakeable signature of supersymmetry.Comment: 10 pages, 7 figures (requires graphicx
Annihilation Contributions in B -> K_1 gamma decay in next-to-leading order in LEET and CP-asymmetry
The effect of weak annihilation and u-quark penguin contribution on the
branching ratio B -> K_1 gamma at next-to-leading order of alpha_s are
calculated using LEET approach. It is shown that the value of LEET form factor
remains the same in the range of unitarity triangle phase alpha favored by the
Standard Model. CP-asymmetry for above mentioned decay has been calculated and
its suppression due to the hard spectator correction has also been
incorporated. In addition, the sensitivity of the CP-asymmetry on the
underlying parameters has been discussed.Comment: 12 pages, 10 figure
Ransomware detection using the dynamic analysis and machine learning: A survey and research directions
Ransomware is an ill-famed malware that has received recognition because of its lethal and irrevocable effects on its victims. The irreparable loss caused due to ransomware requires the timely detection of these attacks. Several studies including surveys and reviews are conducted on the evolution, taxonomy, trends, threats, and countermeasures of ransomware. Some of these studies were specifically dedicated to IoT and android platforms. However, there is not a single study in the available literature that addresses the significance of dynamic analysis for the ransomware detection studies for all the targeted platforms. This study also provides the information about the datasets collection from its sources, which were utilized in the ransomware detection studies of the diverse platforms. This study is also distinct in terms of providing a survey about the ransomware detection studies utilizing machine learning, deep learning, and blend of both techniques while capitalizing on the advantages of dynamic analysis for the ransomware detection. The presented work considers the ransomware detection studies conducted from 2019 to 2021. This study provides an ample list of future directions which will pave the way for future research
CP-Violating Asymmetries in Charmless Non-Leptonic Decays in the Factorization Approach
We present estimates of the direct (in decay amplitudes) and indirect
(mixing- induced) CP-violating asymmetries in the non-leptonic charmless
two-body decay rates for , and decays and their
charged conjugates, where P(V) is a light pseudoscalar (vector) meson. These
estimates are based on a generalized factorization approach making use of
next-to-leading order perturbative QCD contributions which generate the
required strong phases. No soft final state interactions are included. We study
the dependence of the asymmetries on a number of input parameters and show that
there are at least two (possibly three) classes of decays in which the
asymmetries are parametrically stable in this approach. The decay modes of
particular interest are: \optbar{B^0} \to \pi^+ \pi^-, \optbar{B^0} \to
K_S^0 \pi^0, \optbar{B^0} \to K_S^0 \eta^\prime, \optbar{B^0} \to K_S^0
\eta and \optbar{B^0} \to \rho^+ \rho^-. Likewise, the CP-violating
asymmetry in the decays \optbar{B^0} \to K_S^0 h^0 with is found to be parametrically stable and large. Measurements
of these asymmetries will lead to a determination of the phases
and and we work out the relationships in these modes in the
present theoretical framework. We also show the extent of the so-called
"penguin pollution" in the rate asymmetry and of the
"tree shadow" in the asymmetry which will effect the
determination of and from the respective
measurements. CP-violating asymmetries in ,
, and are potentially interesting and are studied here.Comment: 42 pages (LaTex) including 19 figures, requires epsfig.sty; submitted
to Phys. Rev.
Double Penguins and the Contribution of Vector Meson--like States to the Decays
Using perturbative QCD, the contribution at the leading twist, leading
level, of charm and up quark loops to the decays and is presented. In the case of , the relative importance of these contributions depend
upon the unknown CKM matrix elements and .
Assuming that the ratio is bounded
between as is suggested by the Particle Data Group, the
error in extracting by these decays is estimated.Comment: 4 double column pages, revtex, 3 figures attached, 2 figures added
indicating less optimism concerning the accuracy at which
can be extracted: to appear in PR
Two body decays of the -quark: Applications to direct CP violation, searches for electro-weak penguins and new physics
A systematic experimental search for two-body hadronic decays of the b-quark
of the type b to quark + meson is proposed. These reactions have a well defined
experimental signature and they should be theoretically cleaner compared to
exclusive decays. Many modes have appreciable branching ratios and partial rate
asymmetries may also be quite large (about 8-50%) in several of them. In a few
cases electroweak penguins appear to be dominant and may be measurable. CP
violating triple correlation asymmetries provide a clean test of the Standard
Model.Comment: 12 pages 1 figure 1 tabl
Using B_s^0 Decays to Determine the CP Angles \alpha and \gamma
Dighe, Gronau and Rosner have shown that, by assuming SU(3) flavor symmetry
and first-order SU(3) breaking, it is possible to extract the CP angles \alpha
and \gamma from measurements of the decay rates of B_d^0(t) --> \pi^+\pi^-,
B_d^0 --> \pi^- K^+ and B^+ --> \pi^+ K^0, along with their charge-conjugate
processes. We extend their analysis to include the SU(3)-related decays B_s^0
--> \pi^+ K^-, B_s^0(t) --> K^+ K^- and B_s^0 --> K^0 {\bar K^0}. There are
several advantages to this extension: discrete ambiguities are removed, fewer
assumptions are necessary, and the method works even if all strong phases
vanish. In addition, we show that \gamma can be obtained cleanly, with no
penguin contamination, by using the two decays B_s^0(t) --> K^+ K^- and B_s^0
--> K^0 {\bar K^0}.Comment: 28 pages, LaTe
A Fuzzy-Based Context-Aware Misbehavior Detecting Scheme for Detecting Rogue Nodes in Vehicular Ad Hoc Network
A vehicular ad hoc network (VANET) is an emerging technology that improves road safety, traffic efficiency, and passenger comfort. VANETsâ applications rely on co-operativeness among vehicles by periodically sharing their context information, such as position speed and acceleration, among others, at a high rate due to high vehicles mobility. However, rogue nodes, which exploit the co-operativeness feature and share false messages, can disrupt the fundamental operations of any potential application and cause the loss of peopleâs lives and properties. Unfortunately, most of the current solutions cannot effectively detect rogue nodes due to the continuous context change and the inconsideration of dynamic data uncertainty during the identification. Although there are few context-aware solutions proposed for VANET, most of these solutions are data-centric. A vehicle is considered malicious if it shares false or inaccurate messages. Such a rule is fuzzy and not consistently accurate due to the dynamic uncertainty of the vehicular context, which leads to a poor detection rate. To this end, this study proposed a fuzzy-based context-aware detection model to improve the overall detection performance. A fuzzy inference system is constructed to evaluate the vehicles based on their generated information. The output of the proposed fuzzy inference system is used to build a dynamic context reference based on the proposed fuzzy inference system. Vehicles are classified into either honest or rogue nodes based on the deviation of their evaluation scores calculated using the proposed fuzzy inference system from the context reference. Extensive experiments were carried out to evaluate the proposed model. Results show that the proposed model outperforms the state-of-the-art models. It achieves a 7.88% improvement in the overall performance, while a 16.46% improvement is attained for detection rate compared to the state-of-the-art model. The proposed model can be used to evict the rogue nodes, and thus improve the safety and traffic efficiency of crewed or uncrewed vehicles designed for different environments, land, naval, or air
- âŠ