2,864 research outputs found

    Study of Λb→Λ(ϕ,η(′))\Lambda_b\to \Lambda (\phi,\eta^{(\prime)}) and Λb→ΛK+K−\Lambda_b\to \Lambda K^+K^- decays

    Full text link
    We study the charmless two-body Λb→Λ(ϕ,η(′))\Lambda_b\to \Lambda (\phi,\eta^{(\prime)}) and three-body Λb→ΛK+K−\Lambda_b\to \Lambda K^+K^- decays. We obtain B(Λb→Λϕ)=(3.53±0.24)×10−6{\cal B}(\Lambda_b\to \Lambda\phi)=(3.53\pm 0.24)\times 10^{-6} to agree with the recent LHCb measurement. However, we find that B(Λb→Λ(ϕ→)K+K−)=(1.71±0.12)×10−6{\cal B}(\Lambda_b\to \Lambda(\phi\to)K^+ K^-)=(1.71\pm 0.12)\times 10^{-6} is unable to explain the LHCb observation of B(Λb→ΛK+K−)=(15.9±1.2±1.2±2.0)×10−6{\cal B}(\Lambda_b\to\Lambda K^+ K^-)=(15.9\pm 1.2\pm 1.2\pm 2.0)\times 10^{-6}, which implies the possibility for other contributions, such as that from the resonant Λb→K−N∗, N∗→ΛK+\Lambda_b\to K^- N^*,\,N^*\to\Lambda K^+ decay with N∗N^* as a higher-wave baryon state. For Λb→Λη(′)\Lambda_b\to \Lambda \eta^{(\prime)}, we show that B(Λb→Λη, Λη′)=(1.47±0.35,1.83±0.58)×10−6{\cal B}(\Lambda_b\to \Lambda\eta,\,\Lambda\eta^\prime)= (1.47\pm 0.35,1.83\pm 0.58)\times 10^{-6}, which are consistent with the current data of (9.3−5.3+7.3,<3.1)×10−6(9.3^{+7.3}_{-5.3},<3.1)\times 10^{-6}, respectively. Our results also support the relation of B(Λb→Λη)≃B(Λb→Λη′){\cal B}(\Lambda_b\to \Lambda\eta) \simeq {\cal B}(\Lambda_b\to\Lambda\eta^\prime), given by the previous study.Comment: 8 pages, 1 figure, revised version accepted by EPJ

    Non-leptonic two-body weak decays of Λc(2286)\Lambda_c(2286)

    Full text link
    We study the non-leptonic two-body weak decays of Λc+(2286)→BnM\Lambda_c^+(2286)\to {\bf B}_n M with Bn{\bf B}_n (MM) representing as the baryon (meson) states. Based on the SU(3)SU(3) flavor symmetry, we can describe most of the data reexamined by the BESIII Collaboration with higher precisions. However, our result of B(Λc+→pπ0)=(5.6±1.5)×10−4{\cal B}(\Lambda_c^+ \to p\pi^0)=(5.6\pm 1.5)\times 10^{-4} is larger than the current experimental limit of 3×10−43\times10^{-4} (90\% C.L.) by BESIII. In addition, we find that B(Λc+→Σ+K0)=(8.0±1.6)×10−4{\cal B}(\Lambda_c^+ \to \Sigma^+ K^0)=(8.0\pm 1.6)\times 10^{-4}, B(Λc+→Σ+η′)=(1.0−0.8+1.6)×10−2{\cal B}(\Lambda_c^+ \to \Sigma^+ \eta^\prime)=(1.0^{+1.6}_{-0.8})\times 10^{-2}, and B(Λc+→pη′)=(12.2−   8.7+14.3)×10−4{\cal B}(\Lambda_c^+ \to p \eta^\prime)=(12.2^{+14.3}_{-\,\,\,8.7})\times 10^{-4}, which are accessible to the BESIII experiments.Comment: 12 pages, 1 figure, revised version accepted by PL

    Internet Privacy Information Propagation Model

    Get PDF
    With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-Infected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy

    Identifying the attack sources of botnets for a renewable energy management system by using a revised locust swarm optimisation scheme

    Get PDF
    Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets and adopt controlled zombies for flooding a victim’s network over the Internet. Analysing the multiple sources of DDoS attacks typically involves reconstructing attack paths between the victim and attackers by using Internet protocol traceback (IPTBK) schemes. In general, traditional route-searching algorithms, such as particle swarm optimisation (PSO), have a high convergence speed for IPTBK, but easily fall into the local optima. This paper proposes an IPTBK analysis scheme for multimodal optimisation problems by applying a revised locust swarm optimisation (LSO) algorithm to the reconstructed attack path in order to identify the most probable attack paths. For evaluating the effectiveness of the DDoS control centres, networks with a topology size of 32 and 64 nodes were simulated using the ns-3 tool. The average accuracy of the LS-PSO algorithm reached 97.06 for the effects of dynamic traffic in two experimental networks (number of nodes = 32 and 64). Compared with traditional PSO algorithms, the revised LSO algorithm exhibited a superior searching performance in multimodal optimisation problems and increased the accuracy in traceability analysis for IPTBK problems

    Enhancing the efficiency of a PCR using gold nanoparticles

    Get PDF
    We found that the PCR could be dramatically enhanced by Au nanoparticles. With the addition of 0.7 nM of 13 nm Au nanoparticles into the PCR reagent, the PCR efficiency was increased. Especially when maintaining the same or higher amplification yields, the reaction time could be shortened, and the heating/cooling rates could be increased. The excellent heat transfer property of the nanoparticles should be the major factor in improving the PCR efficiency. Different PCR systems, DNA polymerases, DNA sizes and complex samples were compared in this study. Our results demonstrated that Au nanoparticles increase the sensitivity of PCR detection 5- to 10-fold in a slower PCR system (i.e. conventional PCR) and at least 10(4)-fold in a quicker PCR system (i.e. real-time PCR). After the PCR time was shortened by half, the 100 copies/µl DNA were detectable in real-time PCR with gold colloid added, however, at least 10(6) copies/µl of DNA were needed to reach a detectable signal level using the PCR reagent without gold colloid. This innovation could improve the PCR efficiency using non-expensive polymerases, and general PCR reagent. It is a new viewpoint in PCR, that nanoparticles can be used to enhance PCR efficiency and shorten reaction times
    • …
    corecore