10,454 research outputs found

    Implications of symmetries in the scalar sector

    Get PDF
    Symmetries play a very important r\^ole in Particle Physics. In extended scalar sectors, the existence of symmetries may permit the models to comply with the experimental constraints in a natural way, and at the same time reduce the number of free parameters. There is a strong interplay among internal symmetries of the scalar potential, its CP properties and mass degeneracies of the physical scalars. Some of these aspects were discussed in this talk.Comment: 8 pages, to be published in the Proceedings of DISCRETE2018: 6th Symposium on Prospects in the Physics of Discrete Symmetries, 26-30 Nov 2018. Vienna, Austri

    Symmetries and Mass Degeneracies in the Scalar Sector

    Get PDF
    We explore some aspects of models with two and three SU(2) scalar doublets that lead to mass degeneracies among some of the physical scalars. In Higgs sectors with two scalar doublets, the exact degeneracy of scalar masses, without an artificial fine-tuning of the scalar potential parameters, is possible only in the case of the inert doublet model (IDM), where the scalar potential respects a global U(1) symmetry that is not broken by the vacuum. In the case of three doublets, we introduce and analyze the replicated inert doublet model, which possesses two inert doublets of scalars. We then generalize this model to obtain a scalar potential, first proposed by Ivanov and Silva, with a CP4 symmetry that guarantees the existence of pairwise degenerate scalar states among two pairs of neutral scalars and two pairs of charged scalars. Here, CP4 is a generalized CP symmetry with the property that (CP4)n({\rm CP}4)^n is the identity operator only for integer nn values that are multiples of 4. The form of the CP4-symmetric scalar potential is simplest when expressed in the Higgs basis, where the neutral scalar field vacuum expectation value resides entirely in one of the scalar doublet fields. The symmetries of the model permit a term in the scalar potential with a complex coefficient that cannot be removed by any redefinition of the scalar fields within the class of Higgs bases (in which case, we say that no real Higgs basis exists). A striking feature of the CP4-symmetric model is that it preserves CP even in the absence of a real Higgs basis, as illustrated by the cancellation of the contributions to the CP violating form factors of the effective ZZZ and ZWW vertices.Comment: 52 pages, 2 figures, second revised version with new material, as published by JHE

    The CP-conserving 2HDM after the 8 TeV run

    Full text link
    We confront the most common CP-conserving 2HDM with the LHC data analysed so far while taking into account all previously available experimental data. A special allowed corner of the parameter space is analysed - the so-called wrong-sign scenario where the Higgs coupling to down-type quarks changes sign relative to the Standard Model while the coupling to the massive vector bosons does not.Comment: 6 pages, 2 figures, to appear in the proceedings of the 22nd International Workshop on Deep-Inelastic Scattering and Related Subjects (DIS 2014), 28 April - 2 May 2014 Warsaw (Poland

    The Wrong Sign limit in the 2HDM

    Full text link
    A sign change in the Higgs couplings to fermions and massive gauge bosons is still allowed in the framework of two-Higgs doublet models (2HDM). In this work we discuss the possible sign changes in the Higgs couplings to fermions and gauge bosons, while reviewing the status of the 8-parameter CP-conserving 2HDM after the Large Hadron Collider 8 TeV run.Comment: 6 pages, 3 figures. Proceedings of the Second Annual Conference on Large Hadron Collider Physics, Columbia University, New York, U.S.A, June 2-7, 2014. arXiv admin note: text overlap with arXiv:1407.439

    Diagnostic criteria for problematic Internet use among U.S. university students: A mixed-methods evaluation

    Get PDF
    Empirical studies have identified increasing rates of problematic Internet use worldwide and a host of related negative consequences. However, researchers disagree as to whether problematic Internet use is a subtype of behavioral addiction. Thus, there are not yet widely accepted and validated diagnostic criteria for problematic Internet use. To address this gap, we used mixed-methods to examine the extent to which signs and symptoms of problematic Internet use mirror DSM-5 diagnostic criteria for substance use disorder, gambling disorder, and Internet gaming disorder. A total of 27 university students, who self-identified as intensive Internet users and who reported Internet-use-associated health and/or psychosocial problems were recruited. Students completed two measures that assess problematic Internet use (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring their experiences with problematic Internet use. Results of standardized measures and focus group discussions indicated substantial overlap between students’ experiences of problematic Internet use and the signs and symptoms reflected in the DSM-5 criteria for substance use disorder, gambling disorder, and Internet gaming disorder. These signs and symptoms included: a) use Internet longer than intended, b) preoccupation with the Internet, c) withdrawal symptoms when unable to access the Internet, d) unsuccessful attempts to stop or reduce Internet use, e) craving, f) loss of interest in hobbies or activities other than the Internet, g) excessive Internet use despite the knowledge of related problems, g) use of the Internet to escape or relieve a negative mood, and h) lying about Internet use. Tolerance, withdrawal symptoms, and recurrent Internet use in hazardous situations were uniquely manifested in the context of problematic Internet use. Implications for research and practice are discussed

    The Effect of U.S. University Students\u27 Problematic Internet Use on Family Relationships: A Mixed-Methods Investigation

    Get PDF
    This is the first study to investigate how college students in the U.S. with problematic Internet use perceive the role the Internet plays within their families of origin. The sample included 27 U.S. university students who self-identified as excessive Internet users. Participants reported spending more than 25 hours a week on the Internet on non-school or non-work-related activities and reported Internet-associated health and/or psychosocial problems. This study provides descriptive statistics from participants\u27 completion of two problematic Internet use measures (i.e., Young\u27s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and reports findings from four focus groups. Three themes emerged from the focus groups: (1) family connectedness, (2) family conflict/family disconnection, and (3) family Internet overuse. The findings of this study are a first step toward the design of effective interventions for problematic Internet use among U.S. college students and serve to inform clinical practice and health policy in this area

    Hurrah For The Red, White And Blue

    Get PDF
    Sailor and soldier shaking hands and Uncle Sam with hand shoulder of sailor and soldier; American flaghttps://scholarsjunction.msstate.edu/cht-sheet-music/11467/thumbnail.jp

    Characteristics of Internet addiction/pathological Internet use in U.S. university students: A mixed-methods investigation

    Get PDF
    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students’ self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants’ lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research

    The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach

    Get PDF
    Part 2: Software Security EducationInternational audienceDuring software development, security is often dealt with as an add-on. This means that security considerations are not necessarily seen as an integral part of the overall solution and might even be left out of a design. For many security problems, the approach towards secure development has recurring elements. Software design patterns are often used to address a commonly occurring problem through a “generic” approach towards this problem. The design pattern provides a conceptual model of a best-practices solution, which in turn is used by developers to create a concrete implementation for their specific problem. Most software design patterns do not include security best-practices as part of the generic solution towards the commonly occurring problem. This paper proposes an extension to the widely used MVC pattern that includes current security principles in order to teach secure software design in an integrated fashion
    • …
    corecore