يعرض 1 - 10 نتائج من 50 نتيجة بحث عن '"Arindam Bhattacharya"', وقت الاستعلام: 1.55s تنقيح النتائج
  1. 1
    دورية أكاديمية

    المصدر: Journal of High Energy Physics, Vol 2023, Iss 11, Pp 1-53 (2023)

    الوصف: Abstract The heavy jet mass event shape has large perturbative logarithms near the leading order kinematic threshold at ρ = 1 3 $$ \rho =\frac{1}{3} $$ . Catani and Webber named these logarithms Sudakov shoulders and resummed them at double-logarithmic level. A resummation to next-to-leading logarithmic level was achieved recently. Here, we extend the resummation using an effective field theory framework to next-to-next-to-leading logarithmic order and show how to combine it with the resummation of dijet logarithms. We also solve the open problem of an unphysical singularity in the resummed momentum space distribution, in a way similar to how it is resolved in the Drell-Yan q T spectrum: through a careful analysis of the kinematics and scale-setting in position space. The heavy jet mass Sudakov shoulder is the first observable that does not involve transverse momentum for which position space resummation is critical. These advances may lead to a more precise extraction of the strong coupling constant from e + e − data.

    وصف الملف: electronic resource

  2. 2
    دورية أكاديمية

    المصدر: Journal of High Energy Physics, Vol 2023, Iss 10, Pp 1-47 (2023)

    الوصف: Abstract When the Froggatt-Nielsen mechanism is used to explain the Standard Model flavor hierarchy, new physics couplings are also determined by the horizontal symmetry. However, additional symmetries or dynamics in the UV can sometimes lead to a departure from this naïve scaling for the new physics couplings. We show that an effective way to keep track of these changes is by using the new spurions of the U(3)5 global flavor symmetry, where we parameterize extra suppression or enhancement factors, referred to as wrinkles, using the same power counting parameter as in the original Froggatt-Nielsen model. As a concrete realization, we consider two flavor spurions of the S 1 leptoquark, and demonstrate that wrinkles can be used to make an enhanced value of BR B + → K + ν ν ¯ $$ \textrm{BR}\left({B}^{+}\to {K}^{+}\nu \overline{\nu}\right) $$ consistent with other flavor observables. We also present example UV models that realize wrinkles, and comment on choosing consistent charges in ordinary Froggatt-Nielsen models without the typical monotonicity condition.

    وصف الملف: electronic resource

  3. 3
    دورية أكاديمية

    المصدر: Journal of Pure and Applied Microbiology, Vol 17, Iss 2, Pp 732-748 (2023)

    الوصف: Keratin is a fibrous and recalcitrant protein found in feathers, nails, horns, hooves, and the epidermis of the skin. The presence of the high degree of disulfide bonds, hydrogen bonds, and hydrophobic interactions makes them resistant to mechanical stress and are not degraded by common proteases such as trypsin, pepsin, and papain. Due to the slow degradation of keratinous protein, accumulation of solid wastes from the poultry, slaughterhouse, textile, and leather industries leads to solid waste problems and other environmental and health related problems. In this review, efficient biodegradation of keratinous wastes by microorganisms, as a low-cost, environmentally friendly strategy has been discussed. Keratinases are the microbial proteases and hydrolyze the hard keratin. The decomposition of keratin by keratinases maintains the original structure of the final products, including short peptides, amino acids, and organic nitrogen which are deteriorated when traditional or chemical method is implemented. In this article, the role of keratinases producing bacterial and fungal species and their attributes has been elaborated, along with the biochemical characteristics of keratinases, and further, protein engineering approaches has been discussed, with the prospects to enhance keratinases activity for their biotechnological applications.

    وصف الملف: electronic resource

  4. 4
    دورية أكاديمية

    المصدر: Journal of High Energy Physics, Vol 2022, Iss 2, Pp 1-37 (2022)

    الوصف: Abstract At small momentum transfer, the quark-gluon scattering cross section dσ/dt has a power-law divergence in the backward scattering region where the outgoing quark is nearly collinear to the incoming gluon. In this Regge limit |t| ≪ s, the leading behavior of the 2 → 2 amplitude can be described by the exchange of Glauber quarks. In Soft-Collinear Effective Theory (SCET) at leading power, Glauber quark exchange is given by five non-local Glauber quark operators, of which only one is generated at tree-level. We show that at leading power the QCD amplitude for quark-gluon backscattering at one-loop can be exactly reproduced by SCET using the tree-level Glauber operator. The agreement between QCD and SCET of the ultraviolet, infrared, and rapidity divergences as well as all logarithms, Glauber phases and finite parts for all polarizations of the external gluons is a strong check on the effective theory. We find that the entire one-loop matching vanishes — there is no correction to the operator generated at tree-level, and the coefficients of the other four operators remain zero at one-loop. This suggests that SCET with Glauber operators may be useful for uncovering new aspects of Regge physics in a systematically improvable way.

    وصف الملف: electronic resource

  5. 5
    دورية أكاديمية

    المصدر: Journal of Ayurveda and Integrative Medicine, Vol 14, Iss 1, Pp 100671- (2023)

    مصطلحات موضوعية: Miscellaneous systems and treatments, RZ409.7-999

    الوصف: Study background: Increasing prevalence of type 2 diabetes has shifted the focus of world from its management to prevention. Life style modifications programs related to diabetes prevention are found to delay the progress of prediabetes into diabetes. Reaching out to community with diabetes prevention program however is still a challenge to meet. Objective: Of the study: This study proposed to retrospectively screen the presence of prediabetes symptoms depicted in Ayurveda literature in a newly diagnosed diabetic population and to compare this prevalence with non-diabetic and healthy population. The idea is to put weightage upon prediabetes symptoms as a disease predictor if these are available early in the course of the disease. Material and methods: A questionnaire based upon detailed literature survey of three Ayurveda classics from the subject area of prameha (identical to diabetes) identified 22 features under the class of prediabetes. A questionnaire was developed to find the presence of these features in selected diabetic population retrospectively before the onset of diabetes. 141 newly diagnosed diabetics were selected on the basis of a defined inclusion and exclusion criteria and surveyed for chronological presence of prediabetes features as identified through the literature search and validated through a validation process. This feature prevalence was further compared with non-diabetic and healthy population. Results: A significant difference (p

    وصف الملف: electronic resource

  6. 6
    دورية أكاديمية

    المصدر: Journal of Ayurveda and Integrative Medicine, Vol 12, Iss 4, Pp 733-738 (2021)

    الوصف: Continued rise in incidence and prevalence of diabetes globally warrants an effective strategy for its prevention and control. Prevention of diabetes seems more logical to attempt seeing its health care burden, long dormancy, systemic affliction and poor general awareness.Pre-diabetes is the intermediate state of erratic glucose metabolism without overt features of diabetes. This state seems to be a crossroad having a possibility to either convert into clinical diabetes, remain dormant or return to normal glucose control depending upon the efforts made. Unfortunately, due to the paucity of apparent clinical symptoms, this state embedded with reversal possibility, remains unexplored. Ayurveda account of prameha purvarupa (subclinical features of diabetes) may be proposed as the foundation upon which clinic-based pre-diabetes identification and subsequent prevention may be explored. Knowing the symptoms for their reliable proximity with upcoming diabetes may turn to be sensible sensitizers prompting the people to abort the disease process in an effective and timely manner. Considering diabetes from its purvarupa to complications as disease continuum and exploring the opportunities to intervene in order to prevent, or manage the disease on the basis of shada kriyaa kaala therefore, has a huge translational potential warrants an urgent exploration.

    وصف الملف: electronic resource

  7. 7
    دورية أكاديمية

    المصدر: Journal of High Energy Physics, Vol 2019, Iss 5, Pp 1-31 (2019)

    الوصف: Abstract The factorization of multi-leg gauge theory amplitudes in the soft and collinear limits provides strong constraints on the structure of amplitudes, and enables efficient calculations of multi-jet observables at the LHC. There is significant interest in extending this understanding to include subleading powers in the soft and collinear limits. While this has been achieved for low point amplitudes, for higher point functions there is a proliferation of variables and more complicated phase space, making the analysis more challenging. By combining the subleading power expansion of spinor-helicity variables in collinear limits with consistency relations derived from the soft collinear effective theory, we show how to efficiently extract the subleading power leading logarithms of N-jet event shape observables directly from known spinor-helicity amplitudes. At subleading power, we observe the presence of power law singularities arising solely from the expansion of the amplitudes, which for hadron collider event shapes lead to the presence of derivatives of parton distributions. The techniques introduced here can be used to efficiently compute the power corrections for N-jettiness subtractions for processes involving jets at the LHC.

    وصف الملف: electronic resource

  8. 8

    المصدر: Proceedings of the VLDB Endowment. 15:1924-1936

    مصطلحات موضوعية: General Engineering

    الوصف: In many applications of Bloom filters, it is possible to exploit the patterns present in the inserted and non-inserted keys to achieve more compression than the standard Bloom filter. A new class of Bloom filters called Learned Bloom filters use machine learning models to exploit these patterns in the data. In practice, these methods and their variants raise many questions: the choice of machine learning models, the training paradigm to achieve the desired results, the choice of thresholds, the number of partitions in case multiple partitions are used, and other such design decisions. In this paper, we present a simple partitioned Bloom filter that works as follows: we partition the Bloom filter into segments, each of which uses a simple projection-based hash function computed using the data. We also provide a theoretical analysis that provides a principled way to select the design parameters of our method: number of hash functions and number of bits per partition. We perform empirical evaluations of our methods on various real-world datasets spanning several applications. We show that it can achieve an improvement in false positive rates of up to two orders of magnitude over standard Bloom filters for the same memory usage, and upto 50% better compression (bytes used per key) for same FPR, and, consistently beats the existing variants of learned Bloom filters.

  9. 9
  10. 10

    المؤلفون: Arindam Bhattacharya

    مصطلحات موضوعية: FOS: Computer and information sciences

    الوصف: The Domain Name System (DNS) is a key part of the system of Internet. It works like a phone book for the web. But DNS has become more and more appealing to hackers who want to take advantage of security holes for bad reasons. This study paper looks at recent DNS attacks and how they have affected businesses and people. The paper looks at the role that DNS security plays in reducing cyber risks and suggests ways to improve DNS security. The first part of the paper talks about current DNS attacks, such as DNS cache poisoning, DDoS attacks, and DNS hijacking. The analysis of these attacks shows how they affect the security and stability of the internet and how they have the potential to disrupt key infrastructure and do a lot of damage to the economy. The paper then looks at the different ways to protect DNS, such as DNSSEC, DNS-over-TLS, and DNS-over-HTTPS. The pros and cons of each method are talked about, as well as how likely they are to be widely used. Lastly, the paper suggests a multi-layered approach to DNS security that combines technical solutions with organizational rules and practices. The suggested strategies include the use of DNSSEC and other DNS security protocols, the use of network monitoring and threat detection tools, and the creation of backup plans for DNS-based attacks. Overall, this study paper shows how important DNS security is for protecting the internet from cyber threats and keeping it honest and reliable. The suggested strategies can help both organizations and people keep their online actions safe and reduce the risk of DNS-based attacks.