Skip to main content

Showing 1–6 of 6 results for author: Bedi, R

.
  1. arXiv:2402.09361  [pdf, other

    hep-ph

    Small instanton-induced flavor invariants and the axion potential

    Authors: Ravneet Bedi, Tony Gherghetta, Christophe Grojean, Guilherme Guedes, Jonathan Kley, Pham Ngoc Hoa Vuong

    Abstract: Small instantons which increase the axion mass due to an appropriate modification of QCD at a UV scale $Λ_{\rm SI}$, can also enhance the effect of CP-violating operators to shift the axion potential minimum by an amount, $θ_{\rm ind}$, proportional to the flavorful couplings in the SMEFT. Since physical observables must be flavor basis independent, we construct a basis of determinant-like flavor… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 49 pages, 4 figures

    Report number: CERN-TH-2024-022, DESY-24-019, HU-EP-24/05, UMN--TH--4313/24

  2. arXiv:2208.01436  [pdf, other

    cs.LG

    Predicting Future Mosquito Larval Habitats Using Time Series Climate Forecasting and Deep Learning

    Authors: Christopher Sun, Jay Nimbalkar, Ravnoor Bedi

    Abstract: Mosquito habitat ranges are projected to expand due to climate change. This investigation aims to identify future mosquito habitats by analyzing preferred ecological conditions of mosquito larvae. After assembling a data set with atmospheric records and larvae observations, a neural network is trained to predict larvae counts from ecological inputs. Time series forecasting is conducted on these va… ▽ More

    Submitted 7 October, 2022; v1 submitted 1 August, 2022; originally announced August 2022.

    Comments: 2022 MIT IEEE Undergraduate Research Technology Conference

  3. Enhanced EDMs from Small Instantons

    Authors: Ravneet S. Bedi, Tony Gherghetta, Maxim Pospelov

    Abstract: We show that models in which the strong $CP$ problem is solved by introducing an axion field with a mass enhanced by non-QCD UV dynamics at a scale $Λ_{\rm SI}$ exhibit enhanced sensitivity to external sources of $CP$ violation. In the presence of higher-dimensional $CP$-odd sources at a scale $Λ_{\rm CP}$, the same mechanisms that enhance the axion mass also modify the axion potential, shifting t… ▽ More

    Submitted 4 August, 2022; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: 21 pages, 4 figures; v2: version published in PRD

    Report number: UMN-TH-4122/22, FTPI-MINN-22/13

    Journal ref: Phys. Rev. D 106 (2022) 1, 015030

  4. arXiv:1807.01297  [pdf, other

    q-bio.BM cs.LG stat.ML

    End-to-End Learning on 3D Protein Structure for Interface Prediction

    Authors: Raphael J. L. Townshend, Rishi Bedi, Patricia A. Suriana, Ron O. Dror

    Abstract: Despite an explosion in the number of experimentally determined, atomically detailed structures of biomolecules, many critical tasks in structural biology remain data-limited. Whether performance in such tasks can be improved by using large repositories of tangentially related structural data remains an open question. To address this question, we focused on a central problem in biology: predicting… ▽ More

    Submitted 26 December, 2019; v1 submitted 3 July, 2018; originally announced July 2018.

    Comments: NeurIPS 2019

  5. arXiv:1402.6497  [pdf

    cs.CR

    Authentication Mechanism for Resistance to Password Stealing and Reuse Attack

    Authors: Sharayu A. Aghav, RajneeshKaur Bedi

    Abstract: Considering computer systems, security is the major concern with usability. Security policies need to be developed to protect information from unauthorized access. Passwords and secrete codes used between users and information systems for secure user authentication with the system. Playing a vital role in security, easily guessed passwords are links to vulnerability. They allow invader to put syst… ▽ More

    Submitted 26 February, 2014; originally announced February 2014.

    Comments: 6 pages, 3 figures, Third Post Graduate Symposium for Computer Engineering cPGCON 2014, 28-29 March, 2014, Nashik, India

  6. arXiv:1205.2738  [pdf

    cs.CR

    Analysis of Different Privacy Preserving Cloud Storage Frameworks

    Authors: Rajeev Bedi, Mohit Marwaha, Ta**der Singh, Harwinder Singh, Amritpal Singh

    Abstract: Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It… ▽ More

    Submitted 14 January, 2012; originally announced May 2012.