Skip to main content

Top quark telescope looks for something new

DZero physicists use the behavior of the single top quark like a telescope to look for new physics beyond the Standard Model.

Cranking up the energy of colliding particles isn’t the only way to search for new physics. The Standard Model predicts very specific behavior from each particle that we’ve observed and strictly defines the ways those particles interact. Precision tests of that behavior allow us to probe for physics beyond the Standard Model.

In that search, top quarks are particularly interesting to study because their high mass may imply they have a special role in new physics. The rare production of single top quarks, which happens about half as often as top quark pairs are made, presents a unique opportunity for studies that might help us see new physics.

At the Tevatron, there are two major ways of producing a single top quark. Scientists at DZero recently analyzed the rate of production in both of these channels independently. Certain models of new physics would affect one production channel more than the other, so determining the independent rates of the channels puts constraints on these new models while simultaneously testing the prediction of the Standard Model. In the end, this analysis has produced the most precise measurement of the larger single top quark production channel. The scientists also found a ratio of production rates that is consistent with the Standard Model.

Another recent analysis at DZero focuses on the way top quarks interact with W bosons. In nature, particle interactions can be different depending on the alignment of the intrinsic spins of the particles involved. We call such a preference handedness. The Standard Model predicts that W bosons only interact in a left-handed manner, which would lead to specific behavior in single top quark decay. DZero physicists tested whether single top quark decays were consistent with an exclusively left-handed W boson or if there were signs of either right-handed or more complicated couplings. Ultimately, they found that single top quark decays were consistent with the Standard Model and produced the most stringent constraints on anomalous couplings to date.

—Mike Cooke

http://www.fnal.gov/pub/today/archive_2011/today11-11-03.html

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...