Skip to main content

Top quark wiki

The top quark, also known as the t quark (from its symbol, t) or truth quark, is an elementary particle and a fundamental constituent of matter. Like all quarks, the top quark is an elementary fermion with spin -1/2, and experiences all four fundamental interactions: gravitation, electromagnetism, weak interactions, and strong interactions. It has an electric charge of +2/3 e,[2] and is the most massive of all observed elementary particles (the Higgs boson, which may be nearly as massive, has not yet been experimentally observed). It has a mass of 172.9±1.5 GeV/c2,[1] which is about the same mass as an atom of tungsten. The antiparticle of the top quark is the top antiquark (sometimes called antitop quark or simply antitop), which differs from it only in that some of its properties have equal magnitude but opposite sign.

The top quark interacts primarily by the strong interaction but can only decay through the weak force. It almost exclusively decays to a W boson and a bottom quark, but it can also sometimes decay into a strange quark, and on the rarest of occasions, into a down quark. The Standard Model predicts its mean lifetime to be roughly 5×10^-25 s.[3] This is about 20 times shorter than the timescale for strong interactions, and therefore it does not form hadrons, giving physicists a unique opportunity to study a "bare" quark. (All other quarks hadronize, meaning they can only be found in hadrons.) Because it is so massive, the properties of the top quark allow predictions to be made of the mass of the Higgs boson under certain extensions of the Standard Model (see Mass and coupling to the Higgs boson below). As such, it is extensively studied as a means to discriminate between competing theories.

Its existence (and that of the bottom quark) was postulated in 1973 by Makoto Kobayashi and Toshihide Maskawa to explain the observed CP violations in kaon decay,[4] and was discovered in 1995 by the CDF[5] and DØ[6] experiments at Fermilab. Kobayashi and Maskawa won the 2008 Nobel Prize in Physics for the prediction of the top and bottom quark, which together form the third generation of quarks.[7]

Properties:

# At the current Tevatron energy of 1.96 TeV, top/anti-top pairs are produced with a cross section of about 7 picobarns (pb).[21] The Standard Model prediction (at next-to-leading order with mt = 175 GeV/c2) is 6.7-7.5 pb.
# The W bosons from top quark decays carry polarization from the parent particle, hence pose themselves as a unique probe to top polarization.
# In the Standard Model, the top quark is predicted to have a spin quantum number of 1/2 and electric charge +2/3. A first measurement of the top quark charge has been published, resulting in approximately 90% confidence limit that the top quark charge is indeed +2/3.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...