Results for "Mohsin Munir"

total 164took 0.12s
Novel Higgs-to-125 GeV Higgs boson decays in the complex NMSSMOct 30 2013May 05 2014In the Next-to-Minimal Supersymmetric Standard Model (NMSSM) a variety of parameter configurations yields a Higgs boson consistent with the one observed at the LHC. Additionally, the Higgs sector of the model can contain explicit CP-violating phases even ... More
Demystifying Benjamin Franklin's other 8-squareOct 10 2015In this article, we reveal how Benjamin Franklin constructed his second $8 \times 8$ magic square. We also construct two new $8 \times 8$ Franklin squares.
A Study of Cosmic Expansion Generated by Non-conservation of Matter in the Framework of Brans-Dicke TheoryApr 25 2016The present study, on the expansion of universe, is based on an assumption regarding the possibility of inter-conversion between matter and dark energy, through some interaction of matter with the scalar field in the framework of Brans-Dicke theory. The ... More
The intricate labyrinth of Collatz sequencesFeb 04 2016In a previous article, we reduced the unsolved problem of the convergence of Collatz sequences, to convergence of Collatz sequences of odd numbers, that are divisible by 3. In this article, we further reduce this set to odd numbers that are congruent ... More
Unraveling the secret of Benjamin Franklin: Constructing Franklin squares of higher orderSep 23 2015Benjamin Franklin constructed three squares which have amazing properties, and his method of construction has been a mystery to date. In this article, we divulge his secret and show how to construct such squares for any order.
Magic graphs and the faces of the Birkhoff polytopeMay 11 2004Magic labelings of graphs are studied in great detail by Stanley and Stewart. In this article, we construct and enumerate magic labelings of graphs using Hilbert bases of polyhedral cones and Ehrhart quasi-polynomials of polytopes. We define polytopes ... More
A window to the Convergence of a Collatz SequenceOct 01 2015In this article, we reduce the unsolved problem of convergence of Collatz sequences to convergence of Collatz sequences of odd numbers that are divisible by 3. We give an elementary proof of the fact that a Collatz sequence does not increase monotonically. ... More
Concealing IMSI in 5G Network Using Identity Based EncryptionAug 06 2017Subscription privacy of a user has been a historical concern with all the previous generation mobile networks, namely, GSM, UMTS,and LTE. While a little improvement have been achieved in securing the privacy of the long-term identity of a subscriber, ... More
TSViz: Demystification of Deep Learning Models for Time-Series AnalysisFeb 08 2018Dec 13 2018This paper presents a novel framework for demystification of convolutional deep learning models for time-series analysis. This is a step towards making informed/explainable decisions in the domain of time-series, powered by deep learning. There have been ... More
TSXplain: Demystification of DNN Decisions for Time-Series using Natural Language and Statistical FeaturesMay 15 2019Neural networks (NN) are considered as black-boxes due to the lack of explainability and transparency of their decisions. This significantly hampers their deployment in environments where explainability is essential along with the accuracy of the system. ... More
Analyzing Self-Driving Cars on TwitterApr 05 2018This paper studies users' perception regarding a controversial product, namely self-driving (autonomous) cars. To find people's opinion regarding this new technology, we used an annotated Twitter dataset, and extracted the topics in positive and negative ... More
AES and SNOW 3G are Feasible Choices for a 5G Phone from Energy PerspectiveMar 28 2017The aspirations for a 5th generation (5G) mobile network are high. It has a vision of unprecedented data-rate and extremely pervasive connectivity. To cater such aspirations in a mobile phone, many existing efficiency aspects of a mobile phone need to ... More
A Platonic basis of IntegersApr 03 2019In this article, we prove that every integer can be written as an integer combination of exactly 4 tetrahedral numbers. Moreover, we compute the modular periodicity of platonic numbers.
TSViz: Demystification of Deep Learning Models for Time-Series AnalysisFeb 08 2018This paper presents a novel framework for demystification of convolutional deep learning models for time series analysis. This is a step towards making informed/explainable decisions in the domain of time series, powered by deep learning. There have been ... More
Two Higgs bosons near 125 GeV in the complex NMSSM and the LHC Run-I dataMay 04 2015Aug 01 2015We analyse the impact of explicit CP-violation in the Higgs sector of the Next-to-Minimal Supersymmetric Standard Model (NMSSM) on its consistency with the Higgs boson data from the Large Hadron Collider (LHC). Through detailed scans of the parameter ... More
Secure Debit Card Device ModelFeb 02 2014The project envisages the implementation of an e-payment system utilizing FIPS-201 Smart Card. The system combines hardware and software modules. The hardware module takes data insertions (e.g. currency notes), processes the data and then creates connection ... More
Di-photon Higgs signals at the LHC in the Next-to-Minimal Supersymmetric Standard ModelMar 10 2006The NMSSM contains a Higgs singlet in addition to the two Higgs doublets typical of the MSSM, thus resulting in a total of seven physical Higgs mass states. Therefore, the phenomenology of the NMSSM Higgs sector can vary considerably from that of the ... More
Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous VehiclesJun 04 2018With the rapidly growing interest in autonomous navigation, the body of research on motion planning and collision avoidance techniques has enjoyed an accelerating rate of novel proposals and developments. However, the complexity of new techniques and ... More
Whatever Does Not Kill Deep Reinforcement Learning, Makes It StrongerDec 23 2017Recent developments have established the vulnerability of deep Reinforcement Learning (RL) to policy manipulation attacks via adversarial perturbations. In this paper, we investigate the robustness and resilience of deep RL to training-time and test-time ... More
Quantile Mechanics 3: Series Representations and Approximation of some Quantile Functions appearing in FinanceMar 26 2012Apr 01 2012It has long been agreed by academics that the inversion method is the method of choice for generating random variates, given the availability of the quantile function. However for several probability distributions arising in practice a satisfactory method ... More
The Faults in Our Pi Stars: Security Issues and Open Challenges in Deep Reinforcement LearningOct 23 2018Since the inception of Deep Reinforcement Learning (DRL) algorithms, there has been a growing interest in both research and industrial communities in the promising potentials of this paradigm. The list of current and envisioned applications of deep RL ... More
Exploration of TCP Parameters for Enhanced Performance in a Datacenter EnvironmentMay 03 2019May 24 2019TCP parameters in most of the operating systems are optimized for generic home and office environments having low latencies in their internal networks. However, this arrangement invariably results in a compromized network performance when same parameters ... More
Energy and Angular Momentum Dependent Potentials with Closed OrbitsMar 08 2019The Bertrand theorem concluded that; the Kepler potential, and the isotropic harmonic oscillator potential are the only systems under which all the orbits are closed. It was never stressed enough in the physical or mathematical literature that this is ... More
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space NoiseJun 04 2018Recent developments have established the vulnerability of deep reinforcement learning to policy manipulation attacks via intentionally perturbed inputs, known as adversarial examples. In this work, we propose a technique for mitigation of such attacks ... More
Models and Framework for Adversarial Attacks on Complex Adaptive SystemsSep 13 2017We introduce the paradigm of adversarial attacks that target the dynamics of Complex Adaptive Systems (CAS). To facilitate the analysis of such attacks, we present multiple approaches to the modeling of CAS as dynamical, data-driven, and game-theoretic ... More
Convective heat transfer to Sisko fluid over a rotating diskAug 25 2016This article deals with study of the steady flow and heat transfer characteristics of Sisko fluid over a rotating infinite disk. The flow and heat transfer aspects are thoroughly investigated encompassing highly shear thinning/thickening Sisko fluids. ... More
Vulnerability of Deep Reinforcement Learning to Policy Induction AttacksJan 16 2017Deep learning classifiers are known to be inherently vulnerable to manipulation by intentionally perturbed inputs, named adversarial examples. In this work, we establish that reinforcement learning techniques based on Deep Q-Networks (DQNs) are also vulnerable ... More
Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaksNov 18 2017Social media has changed the ways of communication, where everyone is equipped with the power to express their opinions to others in online discussion platforms. Previously, a number of stud- ies have been presented to identify opinion leaders in online ... More
An Extensive Review on Spectral Imaging in Biometric Systems: Challenges and AdvancementsJul 16 2018May 29 2019Spectral imaging has recently gained traction for face recognition in biometric systems. We investigate the merits of spectral imaging for face recognition and the current challenges that hamper the widespread deployment of spectral sensors for face recognition. ... More
An Extensive Review on Spectral Imaging in Biometric Systems: Challenges and AdvancementsJul 16 2018Spectral imaging has recently gained traction for face recognition in biometric systems. We investigate the merits of spectral imaging for face recognition and the current challenges that hamper the widespread deployment of spectral sensors for face recognition. ... More
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle ModelsJun 17 2015Apr 08 2016The amount of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. The effectiveness of current tools relies on the app model as well as the ... More
Semionic resonating valence bond statesJul 29 2014Aug 06 2014The nature of the kagome Heisenberg antiferromagnet (HAFM) is under ongoing debate. While recent evidence points towards a Z_2 topological spin liquid, the exact nature of the topological phase is still unclear. In this paper, we introduce semionic Resonating ... More
Study of anyon condensation and topological phase transitions from a $\mathbb{Z}_4$ topological phase using Projected Entangled Pair StatesDec 11 2017We use Projected Entangled Pair States (PEPS) to study topological quantum phase transitions. The local description of topological order in the PEPS formalism allows us to set up order parameters which measure condensation and deconfinement of anyons, ... More
Classification of compact homogeneous spaces with invariant $G_2$-structuresDec 01 2009Dec 20 2010In this note we classify all homogeneous spaces $G/H$ admitting a $G$-invariant $G_2$-structure, assuming that $G$ is a compact Lie group and $G$ acts effectively on $G/H$. They include a subclass of all homogeneous spaces $G/H$ with a $G$-invariant $\tilde ... More
Molybdenum-Rhenium superconducting suspended nanostructuresJun 03 2014Suspended superconducting nanostructures of MoRe $50\%/50\%$ by weight are fabricated employing commonly used fabrication steps in micro- and nano-meter scale devices followed by wet-etching with Hydro-fluoric acid of a SiO$_2$ sacrificial layer. Suspended ... More
Wind speed prediction using different computing techniquesFeb 15 2014Wind is slated to become one of the most sought after source of energy in future. Both onshore as well as offshore wind farms are getting deployed rapidly over the world. This paper evaluates a neural network based time series approach to predict wind ... More
$b\to ss{\bar d} $ decay in Randall-Sundrum modelsJul 26 2016The extremely small branching ratio of $b\to ss{\bar d}$ decay in the Standard Model makes it a suitable channel to explore new physics through various extensions of the Standard Model. We study this $\Delta S=2$ process in Randall-Sundrum models, including ... More
Simultaneous enhancement in gamma.gamma, b.b-bar and tau+.tau- rates in the NMSSM with nearly degenerate scalar and pseudoscalar Higgs bosonsMay 02 2013Nov 01 2013We propose an experimental test of a scenario in the Next-to-Minimal Supersymmetric Standard Model in which both the lightest scalar and the lightest pseudoscalar Higgs bosons have masses around 125 GeV. The pseudoscalar can contribute significantly to ... More
Emergence of Addictive Behaviors in Reinforcement Learning AgentsNov 14 2018This paper presents a novel approach to the technical analysis of wireheading in intelligent agents. Inspired by the natural analogues of wireheading and their prevalent manifestations, we propose the modeling of such phenomenon in Reinforcement Learning ... More
Development of a Large-scale Neuroimages and Clinical Variables Data Atlas in the neuGRID4You (N4U) projectNov 29 2015Exceptional growth in the availability of large-scale clinical imaging datasets has led to the development of computational infrastructures offering scientists access to image repositories and associated clinical variables data. The EU FP7 neuGRID and ... More
Search for New Physics Signals via Doubly Weak B DecaysMay 14 2019The doubly weak $b\to dd{\bar s}$ and $b\to ss{\bar d}$ processes are highly suppressed in the standard model that offer the unique opportunity to explore new physics signals. The wrong sign decay $\smash{\overline B}^0\to K^+\pi^-$ mediated by the $b\to ... More
125 GeV Higgs Boson signal within the complex NMSSMMay 01 2013May 14 2014While the properties of the 125 GeV Higgs boson-like particle observed by the ATLAS and CMS collaborations are largely compatible with those predicted for the Standard Model state, significant deviations are present in some cases. We, therefore, test ... More
Using Cloud-Aware Provenance to Reproduce Scientific Workflow Execution on CloudNov 29 2015Provenance has been thought of a mechanism to verify a workflow and to provide workflow reproducibility. This provenance of scientific workflows has been effectively carried out in Grid based scientific workflow systems. However, recent adoption of Cloud-based ... More
Polarized forward-backward asymmetries of lepton pair in $B\rightarrow K_{1}\ell^{+}\ell^{-}$ decay in the presence of New physicsNov 22 2015Double polarized forward-backward asymmetries in $B\rightarrow K_{1}(1270,1400)\ell^{+}\ell^{-}$ with $\ell=\mu , \tau$ decays are studied, using most general non-standard local four-fermi interactions, where the mass eigenstates $K_{1}(1270)$ and $K_{1}(1400)$ ... More
Efficient Equalization Method for Cyclic Prefix-Free Coarsely Quantized Massive MIMO SystemsApr 24 2018The use of low resolution Analog to Digital Converters (ADCs) can significantly reduce the power consumption for massive Multiple Input Multiple Output (MIMO) systems. The existing literature on quantized massive MIMO systems deals with Cyclic Prefix ... More
Another step towards a no-lose theorem for NMSSM Higgs discovery at the LHCAug 21 2006Oct 06 2006We show how the LHC potential to detect a rather light CP-even Higgs boson of the NMSSM, H1 or H2, decaying into CP-odd Higgs states, A1A1, can be improved if Higgs-strahlung off W bosons and (more marginally) off top-antitop pairs are employed alongside ... More
Explicit CP Violation in the MSSM Through Higgs --> gamma.gammaFeb 23 2007The MSSM with explicit CP violation is studied through the di-photon decay channel of the lightest neutral Higgs boson. Through the leading one-loop order H1 --> gammar.gamma is affected by a large number of Higgs-sparticle couplings, which could be complex. ... More
A Psychopathological Approach to Safety Engineering in AI and AGIMay 23 2018The complexity of dynamics in AI techniques is already approaching that of complex adaptive systems, thus curtailing the feasibility of formal controllability and reachability analysis in the context of AI safety. It follows that the envisioned instances ... More
Analysis of Big Data Maturity Stage in Hospitality IndustrySep 17 2017Big data analytics has an extremely significant impact on many areas in all businesses and industries including hospitality. This study aims to guide information technology (IT) professionals in hospitality on their big data expedition. In particular, ... More
$β$-decay properties of waiting point nuclei for astrophysical applicationsMar 18 2017We report microscopic calculation of key $\beta$-decay properties for some of the crucial waiting point species having neutron closed magic shells 50 and 82. Our calculation bear astrophysical significance vis-\'{a}-vis speeding of the $r$-process. The ... More
Continuous chain-ladder with paid dataApr 02 2019We introduce a model where $iid$ payments generate the traditional paid run-off triangle. Recent literature explains how claim counts data can be embedded into a continuous chain-ladder model. However, when outstanding claim amounts are to be calculated ... More
Convective flow of sisko fluid over a bidirectional stretching sheetMay 30 2014The present investigation discusses the flow and heat transfer characteristics of a steady three dimensional Sisko fluid. The flow is induced due to bidirectional stretching sheet. The influence of power-law index and stretching ratio on flow and heat ... More
Concatenated LDPC-Polar Codes Decoding Through Belief PropagationMar 16 2017Owing to their capacity-achieving performance and low encoding and decoding complexity, polar codes have drawn much research interests recently. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two common approaches for ... More
Low Complexity Belief Propagation Polar Code DecodersMay 19 2015Aug 25 2015Since its invention, polar code has received a lot of attention because of its capacity-achieving performance and low encoding and decoding complexity. Successive cancellation decoding (SCD) and belief propagation decoding (BPD) are two of the most popular ... More
Detecting subsystem symmetry-protected topological order via entanglement entropyApr 20 2019Subsystem symmetry-protected topological (SSPT) order is a type of quantum order that is protected by symmetries acting on lower-dimensional subsystems of the entire system. In this paper, we show how SSPT order can be characterized and detected by a ... More
Stochastic Battery Model for Aggregation of Thermostatically Controlled LoadsJan 27 2016The potential of demand side as a frequency reserve proposes interesting opportunity in handling imbalances due to intermittent renewable energy sources. This paper proposes a novel approach for computing the parameters of a stochastic battery model representing ... More
Stability of Granular TunnelFeb 22 2018We demonstrated the stability of tunnels made of granular matters is strongly dependent on the grain size, tunnel diameter, and water content in the granules. Larger tunnel radius, larger grain size, and too much water content tend to destabilize the ... More
Ontology Assisted Query Reformulation Using Semantic and Assertion Capabilities of OWL-DL OntologiesDec 15 2008End users of recent biomedical information systems are often unaware of the storage structure and access mechanisms of the underlying data sources and can require simplified mechanisms for writing domain specific complex queries. This research aims to ... More
Phase distance mapping: a phase-based cache tuning methodology for embedded systemsFeb 14 2016Networked embedded systems typically leverage a collection of low-power embedded systems (nodes) to collaboratively execute applications spanning diverse application domains (e.g., video, image processing, communication, etc.) with diverse application ... More
TrolleyMod v1.0: An Open-Source Simulation and Data-Collection Platform for Ethical Decision Making in Autonomous VehiclesNov 14 2018This paper presents TrolleyMod v1.0, an open-source platform based on the CARLA simulator for the collection of ethical decision-making data for autonomous vehicles. This platform is designed to facilitate experiments aiming to observe and record human ... More
Convergence and Next Generation NetworksDec 12 2010The communications sector is undergoing significant changes, with the emergence of a number of platforms available to provide a different range of services. Some of these platforms are complementary to each other, while others are competitive, or can ... More
A Comparative Quantitative Analysis of Contemporary Big Data Clustering Algorithms for Market Segmentation in Hospitality IndustrySep 18 2017The hospitality industry is one of the data-rich industries that receives huge Volumes of data streaming at high Velocity with considerably Variety, Veracity, and Variability. These properties make the data analysis in the hospitality industry a big data ... More
$b\to ss{\bar d} $ decay in Randall-Sundrum modelsJul 26 2016Dec 10 2016The extremely small branching ratio of $b\to ss{\bar d}$ decay in the Standard Model makes it a suitable channel to explore new-physics signals. We study this $\Delta S=2$ process in Randall-Sundrum models, including the custodially protected and the ... More
Defeating the Downgrade Attack on Identity Privacy in 5GNov 06 20183GPP Release 15, the first 5G standard, includes protection of user identity privacy against IMSI catchers. These protection mechanisms are based on public key encryption. Despite this protection, IMSI catching is still possible in LTE networks which ... More
Maximizing the Lifetime of Multi-chain PEGASIS using Sink MobilityMar 18 2013In this paper, we propose the mobility of a sink in improved energy efficient PEGASIS-based protocol (IEEPB) to advance the network lifetime of Wireless Sensor Networks (WSNs). The multi-head chain, multi-chain concept and the sink mobility affects largely ... More
A Review of Routing Protocol Selection for Wireless Sensor Networks in Smart CitiesFeb 24 2019Today, the advancements in urban technology have transformed into the concept of smart cities. These smart cities are envisioned to be heavily dependent on wireless sensor networks and internet of things. In this context, a number of routing protocols ... More
Entanglement phases as holographic duals of anyon condensatesFeb 27 2017Anyon condensation forms a mechanism which allows to relate different topological phases. We study anyon condensation in the framework of Projected Entangled Pair States (PEPS) where topological order is characterized through local symmetries of the entanglement. ... More
Z' Bosons from E(6): Collider and Electroweak ConstraintsAug 02 2011Many models beyond the Standard Electroweak Theory, top-down or bottom-up, contain extensions of the gauge symmetry group by extra U(1)' factors which can be understood or treated as subgroups of E(6). A brief overview of such models is followed by a ... More
Constraints on the mass and mixing of Z' bosonsOct 01 2009Oct 07 2009We tested several models in which the Standard Model (SM) gauge group is extended by an additional U(1) gauge symmetry, against available electroweak precision data to impose limits on the mass of the neutral Z' boson, M_Z', predicted in all such models, ... More
Two Higgs bosons near 125 GeV in the NMSSM: beyond the narrow width approximationApr 10 2017Aug 17 2017In the next-to-minimal supersymmetric (NMS) Standard Model (SM), it is possible for either one of the additional singlet-like scalar and pseudoscalar Higgs bosons to be almost degenerate in mass with the ~125 GeV SM-like Higgs state. In the real NMSSM ... More
A light NMSSM pseudoscalar Higgs boson at the LHC Run 2Feb 20 2015We revisit the light pseudoscalar $A_1$ in the Next-to-Minimal Supersymmetric Standard Model (NMSSM) with partial universality at some high unification scale in order to delineate the parameter space regions consistent with up-to-date theoretical and ... More
Revisiting a light NMSSM pseudoscalar at the LHCDec 18 2014Feb 18 2015The discovery of a light, singlet-like pseudoscalar Higgs boson, $A_1$, of the Next-to-Minimal Supersymmetric Standard Model (NMSSM) could provide a hallmark signature of non-minimal supersymmetry. We review here the potential of the LHC to probe such ... More
Signatures of the Type-I 2HDM at the LHCDec 20 2018Dec 30 2018One of the simplest extensions of the Standard Model (SM) is the two-Higgs-doublet model (2HDM), which contains two neutral Higgs bosons, in addition to a 125 GeV one, and a charged pair. At the Large Hadron Collider (LHC), gluon-induced processes are ... More
Channel Estimation and Data Equalization in Frequency-Selective MIMO Systems with One-Bit QuantizationSep 15 2016This paper addresses channel estimation and data equalization on frequency-selective 1-bit quantized Multiple Input-Multiple Output (MIMO) systems. No joint processing or Channel State Information is assumed at the transmitter, and therefore our findings ... More
Accessing the core of naturalness, nearly degenerate higgsinos, at the LHCFeb 12 2015Apr 20 2015The presence of two light higgsinos nearly degenerate in mass is one of the important characteristics of suspersymmetric models meeting the naturalness criteria. Probing such higgsinos at the LHC is very challenging, in particular when the mass-splitting ... More
Non-Smooth Backfitting for Excess Risk Additive Regression Model with Two Survival Time-ScalesApr 02 2019We present a new backfitting algorithm estimating the complex structured non-parametric survival model of Scheike (2001) without having to use smoothing. The considered model is a non-parametric survival model with two time-scales that are equivalent ... More
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian CountriesDec 11 2009The paper includes Public Key Infrastructure (PKI), its need and requirements and introduction of some renowned PKI products. However, the major thrust of this work is that how PKI can enhance security of various systems. The paper is intended to serve ... More
Usage and Impact of ICT in Education Sector; A Study of PakistanJun 22 2012Sep 21 2012In many countries, information and communication technology (ICT) has a lucid impact on the development of educational curriculum. This is the era of Information Communication Technology, so to perk up educational planning it is indispensable to implement ... More
Explicit CP violation in the MSSM Higgs sectorOct 01 2009Oct 07 2009We analysed the sensitivity of the process gg to H_1 to gamma-gamma to the explicitly CP-violating phases phi_mu and phi_{A_f} in the Minimal Supersymmetric Standard Model (MSSM) at the Large Hadron Collider (LHC), where H_1 is the lightest Supersymmetric ... More
Charged Higgs boson in the $W^\pm$ Higgs channel at the Large Hadron ColliderDec 18 2014Feb 14 2015In light of the recent discovery of a neutral Higgs boson, $H_{\rm obs}$, with a mass near 125 GeV, we reassess the LHC discovery potential of a charged Higgs boson, $H^\pm$, in the $W^\pm H_{\rm obs}$ decay channel. This decay channel can be particularly ... More
The $Λ_b \to Λ (\to p π^-)μ^+μ^-$ decay in the $\text{RS}_{c}$ modelMay 03 2018Nov 17 2018We study the four body decay $\Lambda_b \rightarrow \Lambda ( \rightarrow p \pi^-) \mu^{+} \mu^{-}$ in the Randall-Sundrum model with custodial protection $(\text{RS}_c)$. By considering the constraints coming from the direct searches of the lightest ... More
A light NMSSM pseudoscalar Higgs boson at the LHC reduxSep 30 2014Feb 14 2015The Next-to-Minimal Supersymmetric Standard Model (NMSSM) contains a singlet-like pseudoscalar Higgs boson in addition to the doublet-like pseudoscalar of the Minimal Supersymmetric Standard Model. This new pseudoscalar can have a very low mass without ... More
Social Interactive Media Tools and Knowledge Sharing: A Case StudySep 07 2013Purpose: Social Media Tools (SMT) have provided new opportunities for libraries and librarians in the world. In academic libraries, we can use of them as a powerful tool for communication. This study is to determine the use of the social interactive media ... More
MOMOS-MT: Mobile Monophonic System for Music TranscriptionNov 22 2016Music holds a significant cultural role in social identity and in the encouragement of socialization. Technology, by the destruction of physical and cultural distance, has lead to many changes in musical themes and the complete loss of forms. Yet, it ... More
Di-photon Higgs Decay in SUSY with CP ViolationOct 25 2007Dec 08 2007Physical Higgs particles in the Minimal Supersymmetric Standard Model (MSSM) with explicit CP violation are CP mixed states. The decay of these Higgs particles can be analysed to study the CP properties of the MSSM. In the present work we consider the ... More
Exploring the Di-Photon Decay of a Light Higgs Boson in the MSSM With Explicit CP ViolationJun 28 2007Dec 07 2007The di-photon decay channel of the lightest Higgs boson is considerd as a probe to explore CP violation in the Minimal Supersymmetric Standard Model (MSSM). The scalar/pseudo-scalar mixing is considered along with CP violation entering through the Higgs-sfermion-sfermion ... More
CP-violating Higgs sector of the MSSM through gluon.gluon --> H1 --> gamma.gammaMar 23 2011We study the effect of explicit CP violation in the Higgs sectors of the MSSM in the di-photon decay of the lightest CP-mixed Higgs state. Further it is shown that the gluon fusion production mechanism along with the di-photon decay enhances CP-violating ... More
Semantic Information Retrieval from Distributed Heterogeneous Data SourcesJul 05 2007Information retrieval from distributed heterogeneous data sources remains a challenging issue. As the number of data sources increases more intelligent retrieval techniques, focusing on information content and semantics, are required. Currently ontologies ... More
Quantum interference among heavy NMSSM Higgs bosonsApr 27 2018Sep 13 2018In the Next-to-Minimal Supersymmetric Standard Model (NMSSM), it is possible to have strong mass degeneracies between the new singlet-like scalar and the heavy doublet-like scalar, as well as between the singlet-like and doublet-like pseudoscalar Higgs ... More
Di-photon Higgs decay in the MSSM with explicit CP violationOct 01 2007Dec 08 2007The Minimal Supersymmetric Standard Model (MSSM) with explicit CP violation is studied with the help of the di-photon decay channel of the lightest neutral Higgs boson. Effects of CP violation, entering via the scalar/pseudo-scalar mixing at higher order ... More
Scientific Workflow Repeatability through Cloud-Aware ProvenanceFeb 05 2015The transformations, analyses and interpretations of data in scientific workflows are vital for the repeatability and reliability of scientific workflows. This provenance of scientific workflows has been effectively carried out in Grid based scientific ... More
Electroweak production of light scalar-pseudoscalar pairs from extended Higgs sectorsMay 09 2016In models with extended Higgs sectors, it is possible that the Higgs boson discovered at the LHC is not the lightest one. We show that in a realistic model (the Type I 2-Higgs Doublet Model), when the sum of the masses of a light scalar and a pseudoscalar ... More
Explicit CP violation in the MSSM through gg-->H1-->gamma.gammaMar 04 2009Nov 11 2010We prove the strong sensitivity of the gg --> H1 --> gamma.gamma cross section at the Large Hadron Collider on the explicitly CP-violating phases of the Minimal Supersymmetric Standard Model, where H1 is the lightest Supersymmetric Higgs boson.
Threads free falling as a macroscopic replica of random walk phenomena and crystallization process in one dimensional spaceMar 21 2018We observed the conformation of threads that free released from different altitudes. We also explore the effect of wetting liquid on the conformation developed. When released from an altitude, the thread conformation changes when free falling and reaches ... More
Object Oriented Model for Evaluation of On-Chip NetworksMar 23 2013The Network on Chip (NoC) paradigm is rapidly replacing bus based System on Chip (SoC) designs due to their inherent disadvantages such as non-scalability, saturation and congestion. Currently very few tools are available for the simulation and evaluation ... More
$\mathcal{O}$(1) GeV dark matter in SUSY and a very light pseudoscalar at the LHCApr 20 2015Jul 03 2015We analyze the prospects of the detection of a $\mathcal{O}(1)$ GeV neutralino dark matter, $\widetilde{\chi}^0_{1}$, in the Next-to-Minimal Supersymmetric Standard Model at the 14 TeV LHC. We perform dedicated scans of the relevant parameter space of ... More
$H^\pm$ in the $W^\pm h$ channel at the LHC Run 2Jun 14 2015We analyse the discovery prospects of the charged Higgs boson, $H^\pm$, via its decay in the $W^\pm h$ channel in the minimal supersymmetric Standard Model (MSSM) as well as several 2-Higgs Doublet Models (2HDMs). $h$, the lightest scalar Higgs boson ... More
Search for Charged Higgs bosons via decays to $W^\pm$ and a 125 GeV Higgs at the Large Hadron ColliderFeb 10 2015The recent observation of a 125 GeV neutral Higgs boson ($H_{\rm obs}$) provides additional input for charged Higgs boson searches in the $H^\pm \to W^\pm H_{\rm obs}$ decay channel at the Large Hadron Collider (LHC). We reassess the discovery potential ... More
Traceability and Provenance in Big Data Medical SystemsNov 29 2015Providing an appropriate level of accessibility to and tracking of data or process elements in large volumes of medical data, is an essential requirement in the Big Data era. Researchers require systems that provide traceability of information through ... More
LHC phenomenology of light pseudoscalars in the NMSSMOct 09 2015After the discovery of the 125 GeV Higgs boson, the Next-to-Minimal Supersymmetric Standard Model (NMSSM) has become more interesting as a model for new physics since new tree-level contributions to the Higgs mass makes it easier to accommodate the relatively ... More