-
Small instanton-induced flavor invariants and the axion potential
Authors:
Ravneet Bedi,
Tony Gherghetta,
Christophe Grojean,
Guilherme Guedes,
Jonathan Kley,
Pham Ngoc Hoa Vuong
Abstract:
Small instantons which increase the axion mass due to an appropriate modification of QCD at a UV scale $Λ_{\rm SI}$, can also enhance the effect of CP-violating operators to shift the axion potential minimum by an amount, $θ_{\rm ind}$, proportional to the flavorful couplings in the SMEFT. Since physical observables must be flavor basis independent, we construct a basis of determinant-like flavor…
▽ More
Small instantons which increase the axion mass due to an appropriate modification of QCD at a UV scale $Λ_{\rm SI}$, can also enhance the effect of CP-violating operators to shift the axion potential minimum by an amount, $θ_{\rm ind}$, proportional to the flavorful couplings in the SMEFT. Since physical observables must be flavor basis independent, we construct a basis of determinant-like flavor invariants that arise from instanton calculations containing the effects of dimension-six CP-odd operators at the scale $\require{cancel}Λ_{\cancel{\rm CP}}$. This new basis provides a more reliable estimate of the shift $θ_{\rm ind}$, that is severely constrained by neutron electric dipole moment experiments. In particular, for the case of four-quark, semi-leptonic and gluon dipole operators, these invariants are then used to provide improved limits on the ratio of scales $\require{cancel}Λ_{\rm SI}/Λ_{\cancel{\rm CP}}$ for different flavor scenarios. The CP-odd flavor invariants also provide a classification of the leading effects from Wilson coefficients, and as an example, we show that a semi-leptonic four-fermion operator is subdominant compared to the four-quark operators. More generally, the flavor invariants, together with an instanton NDA, can be used to more accurately estimate small instanton effects in the axion potential that arise from any SMEFT operator.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Predicting Future Mosquito Larval Habitats Using Time Series Climate Forecasting and Deep Learning
Authors:
Christopher Sun,
Jay Nimbalkar,
Ravnoor Bedi
Abstract:
Mosquito habitat ranges are projected to expand due to climate change. This investigation aims to identify future mosquito habitats by analyzing preferred ecological conditions of mosquito larvae. After assembling a data set with atmospheric records and larvae observations, a neural network is trained to predict larvae counts from ecological inputs. Time series forecasting is conducted on these va…
▽ More
Mosquito habitat ranges are projected to expand due to climate change. This investigation aims to identify future mosquito habitats by analyzing preferred ecological conditions of mosquito larvae. After assembling a data set with atmospheric records and larvae observations, a neural network is trained to predict larvae counts from ecological inputs. Time series forecasting is conducted on these variables and climate projections are passed into the initial deep learning model to generate location-specific larvae abundance predictions. The results support the notion of regional ecosystem-driven changes in mosquito spread, with high-elevation regions in particular experiencing an increase in susceptibility to mosquito infestation.
△ Less
Submitted 7 October, 2022; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Enhanced EDMs from Small Instantons
Authors:
Ravneet S. Bedi,
Tony Gherghetta,
Maxim Pospelov
Abstract:
We show that models in which the strong $CP$ problem is solved by introducing an axion field with a mass enhanced by non-QCD UV dynamics at a scale $Λ_{\rm SI}$ exhibit enhanced sensitivity to external sources of $CP$ violation. In the presence of higher-dimensional $CP$-odd sources at a scale $Λ_{\rm CP}$, the same mechanisms that enhance the axion mass also modify the axion potential, shifting t…
▽ More
We show that models in which the strong $CP$ problem is solved by introducing an axion field with a mass enhanced by non-QCD UV dynamics at a scale $Λ_{\rm SI}$ exhibit enhanced sensitivity to external sources of $CP$ violation. In the presence of higher-dimensional $CP$-odd sources at a scale $Λ_{\rm CP}$, the same mechanisms that enhance the axion mass also modify the axion potential, shifting the potential minimum by a factor $\proptoΛ^2_{\rm SI}/Λ^2_{\rm CP}$. This phenomenon of $CP$-violation enhancement, which puts stringent constraints on the scale of new physics, is explicitly demonstrated within a broad class of "small instanton" models with $CP$-odd sources arising from the dimension-six Weinberg gluonic and four-fermion operators. We find that for heavy axion masses $\gtrsim 100$MeV, arising from new dynamics at $Λ_{\rm SI}\lesssim 10^{10}$GeV, $CP$ violation generated up to the Planck scale can be probed by future electric dipole moment experiments.
△ Less
Submitted 4 August, 2022; v1 submitted 16 May, 2022;
originally announced May 2022.
-
End-to-End Learning on 3D Protein Structure for Interface Prediction
Authors:
Raphael J. L. Townshend,
Rishi Bedi,
Patricia A. Suriana,
Ron O. Dror
Abstract:
Despite an explosion in the number of experimentally determined, atomically detailed structures of biomolecules, many critical tasks in structural biology remain data-limited. Whether performance in such tasks can be improved by using large repositories of tangentially related structural data remains an open question. To address this question, we focused on a central problem in biology: predicting…
▽ More
Despite an explosion in the number of experimentally determined, atomically detailed structures of biomolecules, many critical tasks in structural biology remain data-limited. Whether performance in such tasks can be improved by using large repositories of tangentially related structural data remains an open question. To address this question, we focused on a central problem in biology: predicting how proteins interact with one another---that is, which surfaces of one protein bind to those of another protein. We built a training dataset, the Database of Interacting Protein Structures (DIPS), that contains biases but is two orders of magnitude larger than those used previously. We found that these biases significantly degrade the performance of existing methods on gold-standard data. Hypothesizing that assumptions baked into the hand-crafted features on which these methods depend were the source of the problem, we developed the first end-to-end learning model for protein interface prediction, the Siamese Atomic Surfacelet Network (SASNet). Using only spatial coordinates and identities of atoms, SASNet outperforms state-of-the-art methods trained on gold-standard structural data, even when trained on only 3% of our new dataset. Code and data available at https://github.com/drorlab/DIPS.
△ Less
Submitted 26 December, 2019; v1 submitted 3 July, 2018;
originally announced July 2018.
-
Authentication Mechanism for Resistance to Password Stealing and Reuse Attack
Authors:
Sharayu A. Aghav,
RajneeshKaur Bedi
Abstract:
Considering computer systems, security is the major concern with usability. Security policies need to be developed to protect information from unauthorized access. Passwords and secrete codes used between users and information systems for secure user authentication with the system. Playing a vital role in security, easily guessed passwords are links to vulnerability. They allow invader to put syst…
▽ More
Considering computer systems, security is the major concern with usability. Security policies need to be developed to protect information from unauthorized access. Passwords and secrete codes used between users and information systems for secure user authentication with the system. Playing a vital role in security, easily guessed passwords are links to vulnerability. They allow invader to put system resources significantly closer to access them, other accounts on nearby machines and possibly even administrative privileges with different threats and vulnerabilities (e.g., phishing, key logging and malwares). The purpose of this system is to introduce the concept and methodology which helps organization and users to implement stronger password policies. This paper studies a password stealing and reuse issues of password based authentication systems. Techniques and concepts of authentication are discussed which gives rise to a novel approach of two-factor authentication. Avoiding password reuse is a crucial issue in information systems which can at some extent contribute to password stealing issue also. In the proposed system, each participating website possesses a user's unique phone number, telecommunication services in registration and recovery phases and a long-term password used to generate one-time password for each login session on all websites.
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
Analysis of Different Privacy Preserving Cloud Storage Frameworks
Authors:
Rajeev Bedi,
Mohit Marwaha,
Ta**der Singh,
Harwinder Singh,
Amritpal Singh
Abstract:
Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It…
▽ More
Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework is realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks, running overhead of the system and the privacy security of the frameworks.
△ Less
Submitted 14 January, 2012;
originally announced May 2012.