Using a nested anomaly detection machine learning algorithm to study the neutral triple gauge couplings at an e+e? collider

نویسندگان

چکیده

Anomaly detection algorithms have been proved to be useful in the search of new physics beyond Standard Model. However, a prerequisite for using an anomaly algorithm is that signal sought indeed anomalous. This does not always hold true, example when interference between and Model becomes important. In this case, no longer detection. To overcome difficulty, we propose nested algorithm, which appears study neutral triple gauge couplings at CEPC, ILC FCC-ee. Our approach inherits advantages nested, while same time, it algorithm. As complement algorithms, can achieve better results on problems are

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MEASUREMENT OF TRIPLE GAUGE BOSON COUPLINGS AT AN eγ - COLLIDER

If no light Higgs boson exists, the interaction among the gauge bosons becomes strong at high energies (∼ 1TeV). The effects of strong electroweak symmetry breaking (SEWSB) could manifest themselves indirectly as anomalous couplings before they give rise to new physical states like resonances. Here a study of the measurement of trilinear gauge couplings is presented looking at the hadronic deca...

متن کامل

Study of Trilinear Gauge Boson Couplings at the Tevatron Collider

We review studies of the trilinear gauge boson couplings at the Tevatron proton-antiproton collider from data collected by the CDF and DØ collaborations during the period 1992–1996. The gauge boson couplings are a fundamental prediction of the standard model, resulting from the non-Abelian nature of the theory. Therefore, experimental tests of the couplings are of foremost importance. We introd...

متن کامل

Behaviour Based Anomaly Detection for Smartphones Using Machine Learning Algorithm

Since the first handheld cellular phone was introduced in 1973, the mobile phones have evolved into immensely popular smartphones. These devices provide all-in-one expediency by integrating traditional mobile phones with handheld computing devices making them more open and general purpose. Smartphones have become hosts for sensitive or personal data and applications. However many smartphones ar...

متن کامل

A Study of Anomaly Intrusion Detection Using Machine Learning Techniques

In the era of information systems and internet there is more concern rising towards information security in daya to day life, along with the availability of the vulnerability assessment mechanisms to identifying the electronic attacks.Anomaly detection is the process of attempting to identify instances of attacks by comparing current activity against the expected actions of intruder. Machine le...

متن کامل

A Machine Learning Approach to Anomaly Detection

Much of the intrusion detection research focuses on signature (misuse) detection, where models are built to recognize known attacks. However, signature detection, by its nature, cannot detect novel attacks. Anomaly detection focuses on modeling the normal behavior and identifying significant deviations, which could be novel attacks. In this paper we explore two machine learning methods that can...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nuclear Physics B

سال: 2022

ISSN: ['1873-1562', '0550-3213']

DOI: https://doi.org/10.1016/j.nuclphysb.2022.115735