-
LLM-jp: A Cross-organizational Project for the Research and Development of Fully Open Japanese LLMs
Authors:
LLM-jp,
:,
Akiko Aizawa,
Eiji Aramaki,
Bowen Chen,
Fei Cheng,
Hiroyuki Deguchi,
Rintaro Enomoto,
Kazuki Fujii,
Kensuke Fukumoto,
Takuya Fukushima,
Namgi Han,
Yuto Harada,
Chikara Hashimoto,
Tatsuya Hiraoka,
Shohei Hisada,
Sosuke Hosokawa,
Lu Jie,
Keisuke Kamata,
Teruhito Kanazawa,
Hiroki Kanezashi,
Hiroshi Kataoka,
Satoru Katsumata,
Daisuke Kawahara,
Seiya Kawano
, et al. (57 additional authors not shown)
Abstract:
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its…
▽ More
This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its activities, and technical reports on the LLMs developed by LLM-jp. For the latest activities, visit https://llm-jp.nii.ac.jp/en/.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Preliminary Investigation of SSL for Complex Work Activity Recognition in Industrial Domain via MoIL
Authors:
Qingxin Xia,
Takuya Maekawa,
Jaime Morales,
Takahiro Hara,
Hirotomo Oshima,
Masamitsu Fukuda,
Yasuo Namioka
Abstract:
In this study, we investigate a new self-supervised learning (SSL) approach for complex work activity recognition using wearable sensors. Owing to the cost of labeled sensor data collection, SSL methods for human activity recognition (HAR) that effectively use unlabeled data for pretraining have attracted attention. However, applying prior SSL to complex work activities such as packaging works is…
▽ More
In this study, we investigate a new self-supervised learning (SSL) approach for complex work activity recognition using wearable sensors. Owing to the cost of labeled sensor data collection, SSL methods for human activity recognition (HAR) that effectively use unlabeled data for pretraining have attracted attention. However, applying prior SSL to complex work activities such as packaging works is challenging because the observed data vary considerably depending on situations such as the number of items to pack and the size of the items in the case of packaging works. In this study, we focus on sensor data corresponding to characteristic and necessary actions (sensor data motifs) in a specific activity such as a stretching packing tape action in an assembling a box activity, and \textcolor{black}{try} to train a neural network in self-supervised learning so that it identifies occurrences of the characteristic actions, i.e., Motif Identification Learning (MoIL). The feature extractor in the network is used in the downstream task, i.e., work activity recognition, enabling precise activity recognition containing characteristic actions with limited labeled training data. The MoIL approach was evaluated on real-world work activity data and it achieved state-of-the-art performance under limited training labels.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
A Summarized History-based Dialogue System for Amnesia-Free Prompt Updates
Authors:
Hye** Hong,
Hibiki Kawano,
Takuto Maekawa,
Naoki Yoshimaru,
Takamasa Iio,
Kenji Hatano
Abstract:
In today's society, information overload presents challenges in providing optimal recommendations. Consequently, the importance of dialogue systems that can discern and provide the necessary information through dialogue is increasingly recognized. However, some concerns existing dialogue systems rely on pre-trained models and need help to cope with real-time or insufficient information. To address…
▽ More
In today's society, information overload presents challenges in providing optimal recommendations. Consequently, the importance of dialogue systems that can discern and provide the necessary information through dialogue is increasingly recognized. However, some concerns existing dialogue systems rely on pre-trained models and need help to cope with real-time or insufficient information. To address these concerns, models that allow the addition of missing information to dialogue robots are being proposed. Yet, maintaining the integrity of previous conversation history while integrating new data remains a formidable challenge. This paper presents a novel system for dialogue robots designed to remember user-specific characteristics by retaining past conversation history even as new information is added.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Collect and Connect Data Leaves to Feature Concepts: Interactive Graph Generation Toward Well-being
Authors:
Yukio Ohsawa,
Tomohide Maekawa,
Hiroki Yamaguchi,
Hiro Yoshida,
Kaira Sekiguchi
Abstract:
Feature concepts and data leaves have been invented using datasets to foster creative thoughts for creating well-being in daily life. The idea, simply put, is to attach selected and collected data leaves that are summaries of event flows to be discovered from corresponding datasets, on the target feature concept representing the well-being aimed. A graph of existing or expected datasets to be atta…
▽ More
Feature concepts and data leaves have been invented using datasets to foster creative thoughts for creating well-being in daily life. The idea, simply put, is to attach selected and collected data leaves that are summaries of event flows to be discovered from corresponding datasets, on the target feature concept representing the well-being aimed. A graph of existing or expected datasets to be attached to a feature concept is generated semi-automatically. Rather than sheer automated generative AI, our work addresses the process of generative artificial and natural intelligence to create the basis for data use and reuse.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Unsupervised Human Activity Recognition through Two-stage Prompting with ChatGPT
Authors:
Qingxin Xia,
Takuya Maekawa,
Takahiro Hara
Abstract:
Wearable sensor devices, which offer the advantage of recording daily objects used by a person while performing an activity, enable the feasibility of unsupervised Human Activity Recognition (HAR). Unfortunately, previous unsupervised approaches using the usage sequence of objects usually require a proper description of activities manually prepared by humans. Instead, we leverage the knowledge emb…
▽ More
Wearable sensor devices, which offer the advantage of recording daily objects used by a person while performing an activity, enable the feasibility of unsupervised Human Activity Recognition (HAR). Unfortunately, previous unsupervised approaches using the usage sequence of objects usually require a proper description of activities manually prepared by humans. Instead, we leverage the knowledge embedded in a Large Language Model (LLM) of ChatGPT. Because the sequence of objects robustly characterizes the activity identity, it is possible that ChatGPT already learned the association between activities and objects from existing contexts. However, previous prompt engineering for ChatGPT exhibits limited generalization ability when dealing with a list of words (i.e., sequence of objects) due to the similar weighting assigned to each word in the list. In this study, we propose a two-stage prompt engineering, which first guides ChatGPT to generate activity descriptions associated with objects while emphasizing important objects for distinguishing similar activities; then outputs activity classes and explanations for enhancing the contexts that are helpful for HAR. To the best of our knowledge, this is the first study that utilizes ChatGPT to recognize activities using objects in an unsupervised manner. We conducted our approach on three datasets and demonstrated the state-of-the-art performance.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
A benchmark for computational analysis of animal behavior, using animal-borne tags
Authors:
Benjamin Hoffman,
Maddie Cusimano,
Vittorio Baglione,
Daniela Canestrari,
Damien Chevallier,
Dominic L. DeSantis,
Lorène Jeantet,
Monique A. Ladds,
Takuya Maekawa,
Vicente Mata-Silva,
Víctor Moreno-González,
Eva Trapote,
Outi Vainio,
Antti Vehkaoja,
Ken Yoda,
Katherine Zacarian,
Ari Friedlaender
Abstract:
Animal-borne sensors ('bio-loggers') can record a suite of kinematic and environmental data, which can elucidate animal ecophysiology and improve conservation efforts. Machine learning techniques are used for interpreting the large amounts of data recorded by bio-loggers, but there exists no common framework for comparing the different machine learning techniques in this domain. To address this, w…
▽ More
Animal-borne sensors ('bio-loggers') can record a suite of kinematic and environmental data, which can elucidate animal ecophysiology and improve conservation efforts. Machine learning techniques are used for interpreting the large amounts of data recorded by bio-loggers, but there exists no common framework for comparing the different machine learning techniques in this domain. To address this, we present the Bio-logger Ethogram Benchmark (BEBE), a collection of datasets with behavioral annotations, as well as a modeling task and evaluation metrics. BEBE is to date the largest, most taxonomically diverse, publicly available benchmark of this type, and includes 1654 hours of data collected from 149 individuals across nine taxa. In addition, using BEBE, we test a novel self-supervised learning approach to identifying animal behaviors based on bio-logger data, using a deep neural network pre-trained with self-supervision on data collected from human wrist-worn accelerometers. We show that this approach out-performs common alternatives, especially in a setting with a low amount of training data. Datasets, models, and evaluation code are made publicly available at https://github.com/earthspecies/BEBE, to enable community use of BEBE as a point of comparison in methods development.
△ Less
Submitted 10 April, 2024; v1 submitted 18 May, 2023;
originally announced May 2023.
-
OpenPack: A Large-scale Dataset for Recognizing Packaging Works in IoT-enabled Logistic Environments
Authors:
Naoya Yoshimura,
Jaime Morales,
Takuya Maekawa,
Takahiro Hara
Abstract:
Unlike human daily activities, existing publicly available sensor datasets for work activity recognition in industrial domains are limited by difficulties in collecting realistic data as close collaboration with industrial sites is required. This also limits research on and development of methods for industrial applications. To address these challenges and contribute to research on machine recogni…
▽ More
Unlike human daily activities, existing publicly available sensor datasets for work activity recognition in industrial domains are limited by difficulties in collecting realistic data as close collaboration with industrial sites is required. This also limits research on and development of methods for industrial applications. To address these challenges and contribute to research on machine recognition of work activities in industrial domains, in this study, we introduce a new large-scale dataset for packaging work recognition called OpenPack. OpenPack contains 53.8 hours of multimodal sensor data, including acceleration data, keypoints, depth images, and readings from IoT-enabled devices (e.g., handheld barcode scanners), collected from 16 distinct subjects with different levels of packaging work experience. We apply state-of-the-art human activity recognition techniques to the dataset and provide future directions of complex work activity recognition studies in the pervasive computing community based on the results. We believe that OpenPack will contribute to the sensor-based action/activity recognition community by providing challenging tasks. The OpenPack dataset is available at https://open-pack.github.io.
△ Less
Submitted 20 April, 2024; v1 submitted 10 December, 2022;
originally announced December 2022.
-
Data Leaves: Scenario-oriented Metadata for Data Federative Innovation
Authors:
Yukio Ohsawa,
Kaira Sekiguchi,
Tomohide Maekawa,
Hiroki Yamaguchi,
Son Yeon Hyuk,
Sae Kondo
Abstract:
A method for representing the digest information of each dataset is proposed, oriented to the aid of innovative thoughts and the communication of data users who attempt to create valuable products, services, and business models using or combining datasets. Compared with methods for connecting datasets via shared attributes (i.e., variables), this method connects datasets via events, situations, or…
▽ More
A method for representing the digest information of each dataset is proposed, oriented to the aid of innovative thoughts and the communication of data users who attempt to create valuable products, services, and business models using or combining datasets. Compared with methods for connecting datasets via shared attributes (i.e., variables), this method connects datasets via events, situations, or actions in a scenario that is supposed to be active in the real world. This method reflects the consideration of the fitness of each metadata to the feature concept, which is an abstract of the information or knowledge expected to be acquired from data; thus, the users of the data acquire practical knowledge that fits the requirements of real businesses and real life, as well as grounds for realistic application of AI technologies to data.
△ Less
Submitted 7 August, 2022;
originally announced August 2022.
-
The supremum principle selects simple, transferable models
Authors:
Cody Petrie,
Christian Anderson,
Casie Maekawa,
Travis Maekawa,
Mark K. Transtrum
Abstract:
We consider how mathematical models enable predictions for conditions that are qualitatively different from the training data. We propose techniques based on information topology to find models that can apply their learning in regimes for which there is no data. The first step is to use the Manifold Boundary Approximation Method to construct simple, reduced models of target phenomena in a data-dri…
▽ More
We consider how mathematical models enable predictions for conditions that are qualitatively different from the training data. We propose techniques based on information topology to find models that can apply their learning in regimes for which there is no data. The first step is to use the Manifold Boundary Approximation Method to construct simple, reduced models of target phenomena in a data-driven way. We consider the set of all such reduced models and use the topological relationships among them to reason about model selection for new, unobserved phenomena. Given minimal models for several target behaviors, we introduce the supremum principle as a criterion for selecting a new, transferable model. The supremal model, i.e., the least upper bound, is the simplest model that reduces to each of the target behaviors. We illustrate how to discover supremal models with several examples; in each case, the supremal model unifies causal mechanisms to transfer successfully to new target domains. We use these examples to motivate a general algorithm that has formal connections to theories of analogical reasoning in cognitive psychology.
△ Less
Submitted 25 May, 2022; v1 submitted 21 September, 2021;
originally announced September 2021.
-
Using Social Media Background to Improve Cold-start Recommendation Deep Models
Authors:
Yihong Zhang,
Takuya Maekawa,
Takahiro Hara
Abstract:
In recommender systems, a cold-start problem occurs when there is no past interaction record associated with the user or item. Typical solutions to the cold-start problem make use of contextual information, such as user demographic attributes or product descriptions. A group of works have shown that social media background can help predicting temporal phenomenons such as product sales and stock pr…
▽ More
In recommender systems, a cold-start problem occurs when there is no past interaction record associated with the user or item. Typical solutions to the cold-start problem make use of contextual information, such as user demographic attributes or product descriptions. A group of works have shown that social media background can help predicting temporal phenomenons such as product sales and stock price movements. In this work, our goal is to investigate whether social media background can be used as extra contextual information to improve recommendation models. Based on an existing deep neural network model, we proposed a method to represent temporal social media background as embeddings and fuse them as an extra component in the model. We conduct experimental evaluations on a real-world e-commerce dataset and a Twitter dataset. The results show that our method of fusing social media background with the existing model does generally improve recommendation performance. In some cases the recommendation accuracy measured by hit-rate@K doubles after fusing with social media background. Our findings can be beneficial for future recommender system designs that consider complex temporal information representing social interests.
△ Less
Submitted 4 June, 2021;
originally announced June 2021.
-
Solenoid-free current drive via ECRH in EXL-50 spherical torus plasmas
Authors:
Yuejiang Shi,
Bing Liu,
Shaodong Song,
Yunyang Song,
Xianming Song,
Bowei Tong,
Shikui Cheng,
Wenjun Liu,
Minyuan Wang,
Tiantian Sun,
Dong Guo,
Songjian Li,
Yingying Li,
Bin Chen,
Xiang Gu,
Jianqing Cai,
Di Luo,
Debabrata Banerjee,
Xin Zhao,
Yuanming Yang,
Wenwu Luo,
Peihai Zhou,
Yu Wang,
A. Ishida,
T. Maekawa
, et al. (3 additional authors not shown)
Abstract:
As a new spherical tokamak (ST) designed to simplify engineering requirements of a possible future fusion power source, the EXL-50 experiment features a low aspect ratio (A) vacuum vessel (VV), encircling a central post assembly containing the toroidal field coil conductors without a central solenoid. Multiple electron cyclotron resonance heating (ECRH) resonances are located within the VV to impr…
▽ More
As a new spherical tokamak (ST) designed to simplify engineering requirements of a possible future fusion power source, the EXL-50 experiment features a low aspect ratio (A) vacuum vessel (VV), encircling a central post assembly containing the toroidal field coil conductors without a central solenoid. Multiple electron cyclotron resonance heating (ECRH) resonances are located within the VV to improve current drive effectiveness. Copious energetic electrons are produced and measured with hard X-ray detectors, carry the bulk of the plasma current ranging from 50kA to 150kA, which is maintained for more than 1s duration. It is observed that over one Ampere current can be maintained per Watt of ECRH power issued from the 28-GHz gyrotrons. The plasma current reaches Ip>80kA for high density (>5e18me-2) discharge with 150kW ECHR heating. An analysis was carried out combining reconstructed multi-fluid equilibrium, guiding-center orbits of energetic electrons, and resonant heating mechanisms. It is verified that in EXL-50 a broadly distributed current of energetic electrons creates smaller closed magnetic-flux surfaces of low aspect ratio that in turn confine the thermal plasma electrons and ions and participate in maintaining the equilibrium force-balance.
△ Less
Submitted 30 March, 2022; v1 submitted 30 April, 2021;
originally announced April 2021.
-
Convolutional Neural Networks for Estimation of Myelin Maturation in Infant Brain
Authors:
Akihiko Wada,
Yuya Saito,
Ryusuke Irie,
Koji Kamagata,
Tomoko Maekawa,
Shohei Fujita,
Akifumi Hagiwara,
Kanako Kumamaru,
Michimasa Suzuki,
Atsushi Nakanishi,
Masaaki Hori,
Toshiaki Shimizu,
Shigeki Aoki
Abstract:
Myelination plays an important role in the neurological development of infant brain and MRI can visualize the myelination extension as T1 high and T2 low signal intensity at white matter. We tried to construct a convolutional neural network machine learning model to estimate the myelination. Eight layers CNN architecture was constructed to estimate the subjects age with T1 and T2 weighted image at…
▽ More
Myelination plays an important role in the neurological development of infant brain and MRI can visualize the myelination extension as T1 high and T2 low signal intensity at white matter. We tried to construct a convolutional neural network machine learning model to estimate the myelination. Eight layers CNN architecture was constructed to estimate the subjects age with T1 and T2 weighted image at 5 levels associated with myelin maturation in 119 subjects up to 24 months. CNN model learned with all age dataset revealed a strong correlation between the estimated age and the corrected age and the coefficient of correlation, root mean square error and mean absolute error was 0. 81, 3. 40 and 2. 28. Moreover, the adaptation of ensemble learning models with two datasets 0 to 16 months and 8 to 24 months improved that to 0. 93, 2. 12 and 1. 34. Deep learning can be adaptable to myelination estimation in infant brain.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation
Authors:
Takahiro Maekawa,
Ayana Kawamura,
Takayuki Nakachi,
Hitoshi Kiya
Abstract:
A privacy-preserving support vector machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as the unauthorized use of cloud services, data leaks, and privacy being compromised. Accordingly, we consider privacy-preserving SVM computing. We focus on protecting visual \red{in…
▽ More
A privacy-preserving support vector machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as the unauthorized use of cloud services, data leaks, and privacy being compromised. Accordingly, we consider privacy-preserving SVM computing. We focus on protecting visual \red{information} of images by using a random unitary transformation. Some properties of the protected images are discussed. The proposed scheme enables us not only to protect images, but also to have the same performance as that of unprotected images even when using typical kernel functions such as the linear kernel, radial basis function(RBF) kernel and polynomial kernel. Moreover, it can be directly carried out by using well-known SVM algorithms, without preparing any algorithms specialized for secure SVM computing. In an experiment, the proposed scheme is applied to a face-based authentication algorithm with SVM classifiers to confirm the effectiveness.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain
Authors:
Warit Sirichotedumrong,
Takahiro Maekawa,
Yuma Kinoshita,
Hitoshi Kiya
Abstract:
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that enables us not to only apply images without visual information to DNNs for both training and testing but to also consider data augmentation in the encrypted domain for the first time. In this paper, a novel pixel-based image encryption method is first proposed for privacy-preserving DNNs. In addition, a novel adaptat…
▽ More
We present a novel privacy-preserving scheme for deep neural networks (DNNs) that enables us not to only apply images without visual information to DNNs for both training and testing but to also consider data augmentation in the encrypted domain for the first time. In this paper, a novel pixel-based image encryption method is first proposed for privacy-preserving DNNs. In addition, a novel adaptation network is considered that reduces the influence of image encryption. In an experiment, the proposed method is applied to a well-known network, ResNet-18, for image classification. The experimental results demonstrate that conventional privacy-preserving machine learning methods including the state-of-the-arts cannot be applied to data augmentation in the encrypted domain and that the proposed method outperforms them in terms of classification accuracy.
△ Less
Submitted 6 May, 2019;
originally announced May 2019.
-
Privacy-Preserving SVM Computing by Using Random Unitary Transformation
Authors:
Takahiro Maekawa,
Takayuki Nakachi,
Sayaka Shiota,
Hitoshi Kiya
Abstract:
A privacy-preserving Support Vector Machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as unauthorized use and leak of data, and privacy compromise. We focus on templates protected by using a random unitary transformation, and consider some properties of the protected…
▽ More
A privacy-preserving Support Vector Machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as unauthorized use and leak of data, and privacy compromise. We focus on templates protected by using a random unitary transformation, and consider some properties of the protected templates for secure SVM computing, where templates mean features extracted from data. The proposed scheme enables us not only to protect templates, but also to have the same performance as that of unprotected templates under some useful kernel functions. Moreover, it can be directly carried out by using well-known SVM algorithms, without preparing any algorithms specialized for secure SVM computing. In the experiments, the proposed scheme is applied to a face-based authentication algorithm with SVM classifiers to confirm the effectiveness.
△ Less
Submitted 19 September, 2018;
originally announced September 2018.
-
Machine learning with systematic density-functional theory calculations: Application to melting temperatures of single and binary component solids
Authors:
Atsuto Seko,
Tomoya Maekawa,
Koji Tsuda,
Isao Tanaka
Abstract:
A combination of systematic density functional theory (DFT) calculations and machine learning techniques has a wide range of potential applications. This study presents an application of the combination of systematic DFT calculations and regression techniques to the prediction of the melting temperature for single and binary compounds. Here we adopt the ordinary least-squares regression (OLSR), pa…
▽ More
A combination of systematic density functional theory (DFT) calculations and machine learning techniques has a wide range of potential applications. This study presents an application of the combination of systematic DFT calculations and regression techniques to the prediction of the melting temperature for single and binary compounds. Here we adopt the ordinary least-squares regression (OLSR), partial least-squares regression (PLSR), support vector regression (SVR) and Gaussian process regression (GPR). Among the four kinds of regression techniques, the SVR provides the best prediction. In addition, the inclusion of physical properties computed by the DFT calculation to a set of predictor variables makes the prediction better. Finally, a simulation to find the highest melting temperature toward the efficient materials design using kriging is demonstrated. The kriging design finds the compound with the highest melting temperature much faster than random designs. This result may stimulate the application of kriging to efficient materials design for a broad range of applications.
△ Less
Submitted 6 February, 2014; v1 submitted 6 October, 2013;
originally announced October 2013.
-
Computational Topology for Regular Closed Sets
Authors:
The I-TANGO project,
:,
T. J. Peters,
J. Bisceglio,
D. R. Ferguson,
C. M. Hoffmann,
T. Maekawa,
N. M. Patrikalakis,
T. Sakkalis,
N. F. Stewart
Abstract:
The Boolean algebra of regular closed sets is prominent in topology, particularly as a dual for the Stone-Cech compactification. This algebra is also central for the theory of geometric computation, as a representation for combinatorial operations on geometric sets. However, the issue of computational approximation introduces unresolved subtleties that do not occur within "pure" topology. One ma…
▽ More
The Boolean algebra of regular closed sets is prominent in topology, particularly as a dual for the Stone-Cech compactification. This algebra is also central for the theory of geometric computation, as a representation for combinatorial operations on geometric sets. However, the issue of computational approximation introduces unresolved subtleties that do not occur within "pure" topology. One major effort towards reconciling this mathematical theory with computational practice is our ongoing I-TANGO project. The acronym I-TANGO is an abbreviation for "Intersections - Topology, Accuracy and Numerics for Geometric Objects". The long-range goals and initial progress of the I-TANGO team in development of computational topology are presented.
△ Less
Submitted 26 February, 2004;
originally announced February 2004.
-
On relation between unitary gauge and gauge given by $ξ$-limiting process
Authors:
T. Kiyan,
T. Maekawa,
M. Masuda,
H. Taira
Abstract:
It is shown that in general the gauge given by the limit of $ξ\to 0$ in $R_ξ$ gauge does not necessarily agree with the unitary gauge by examining the symmetry breaking of two steps from ${\rm SU(3) \otimes U(1)}_N$ to ${\rm SU(2) \otimes U(1)}_Y$ and then to ${\rm U(1)}_{em}$.
It is shown that in general the gauge given by the limit of $ξ\to 0$ in $R_ξ$ gauge does not necessarily agree with the unitary gauge by examining the symmetry breaking of two steps from ${\rm SU(3) \otimes U(1)}_N$ to ${\rm SU(2) \otimes U(1)}_Y$ and then to ${\rm U(1)}_{em}$.
△ Less
Submitted 5 November, 2002;
originally announced November 2002.
-
On Nature of Right-Handed Singlet in 331 Model and Anomalies before and after SSB
Authors:
T. Kiyan,
T. Maekawa,
M. Masuda,
H. Taira
Abstract:
The gauge invariant and anomaly-free 331 model is studied with $R_ξ$ gauges in order to see which of the right-handed singlet between the case (i), assigning the bosonic singlet to the counterpart of 3 and $\bar 3$ representations, and the case (ii), assigning fermionic siglet to the counterpart of the left-handed 3 representation and assigning the antifermionic singlet to that of the left-hande…
▽ More
The gauge invariant and anomaly-free 331 model is studied with $R_ξ$ gauges in order to see which of the right-handed singlet between the case (i), assigning the bosonic singlet to the counterpart of 3 and $\bar 3$ representations, and the case (ii), assigning fermionic siglet to the counterpart of the left-handed 3 representation and assigning the antifermionic singlet to that of the left-handed $\bar 3$ representaion, should be assigned in physics but not mathematics to the counterparts of the left-handed fundamental 3 representation and the left-handed complex conjugate $\bar 3$ representation. It is shown that through an effect on the Yukawa interaction of the transformation property of the singlet it depends on the choices of the case (i) or the case (ii) whether the anomaly coefficients even after the spontaneous symmetry breaking (SSB) vanish or not, and the coefficients vanish only in the case (ii) but do not in the case (i). Furthermore, it is pointed out that the BRS invariance after the SSB holds for the case (ii) and (i-b) of two possibilities in the choice for the mass eigenstates in the case (i) and thus the BRS invariance does not necessarily ensure renormalizability of the theory though the inverse of it holds.
△ Less
Submitted 21 June, 2002; v1 submitted 19 June, 2002;
originally announced June 2002.
-
Note on Triangle Anomalies and Assignment of Singlet in 331-like Model
Authors:
T. Kiyan,
T. Maekawa,
S. Yokoi
Abstract:
It is pointed out that in the $331-$like model which uses both fundamental and complex conjugate representations for an assignment of the representations to the left-handed quarks and the scalar representation to their corresponding right-handed counterparts, the nature of the scalar should be taken into account in order to make the fermion triangle anomalies in the theory anomaly-free, i.e. ren…
▽ More
It is pointed out that in the $331-$like model which uses both fundamental and complex conjugate representations for an assignment of the representations to the left-handed quarks and the scalar representation to their corresponding right-handed counterparts, the nature of the scalar should be taken into account in order to make the fermion triangle anomalies in the theory anomaly-free, i.e. renormalizable in a sense with no anomalies, even after the spontaneous symmetry breaking.
△ Less
Submitted 22 September, 2002; v1 submitted 3 June, 2002;
originally announced June 2002.