A bstract We present a next-to-next-to-leading order (NNLO) QCD calculation of the bottom-induced contributions to the production of a Higgs boson plus a jet, i.e. the process pp → H + j to $$ \mathcal{O}\left({y}_b^2{\alpha}_s^3\right) $$ O y b 2 α s 3 . We work in the five-flavor scheme (5FS) in which the bottom quark mass is retained only in the coupling to the Higgs boson. Our calculation uses N -jettiness slicing to regulate infrared divergences, allowing for fully-differential predictions for collider observables. After extensively validating the methodology, we present results for the 13 TeV LHC. Our NNLO predictions show a marked improvement in the overall renormalization and factorization scale dependence, the latter of which proves to be particularly troublesome for 5FS calculations at lower orders. In addition, using the same methodology we present a NNLO computation of $$ b\overline{b} $$ b b ¯ → H . Our results are implemented into MCFM.
more »
« less
Parity-Violating Møller Scattering at Next-to-Next-to-Leading Order: Closed Fermion Loops
- Award ID(s):
- 1820760
- PAR ID:
- 10283692
- Date Published:
- Journal Name:
- Physical Review Letters
- Volume:
- 126
- Issue:
- 13
- ISSN:
- 0031-9007
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
A<sc>bstract</sc> We present a calculation of pseudoscalar Higgs production in association with a jet at Next-to-Next-to Leading Order (NNLO) accuracy in QCD. We work in an effective field theory in whichmt→ ∞ resulting in effective operators which couple the pseudoscalar to gluons and (massless) quarks. We have calculated all of the relevant amplitudes for the two-loop, one-loop and tree-level contributions. As a cross-check of our calculation we have re-calculated all of the scalar Higgs plus parton amplitudes and perform a detailed comparison to the literature. In order to regulate the infra-red singularities present at this order we employ theN-jettiness slicing method. In addition to a detailed validation of our calculation at this order we investigate LHC phenomenology for a selection of pseudoscalar Higgs masses. Our results are implemented into the parton-level Monte Carlo code MCFM.more » « less
-
Evolving threats against cryptographic systems and the increasing diversity of computing platforms enforce teaching cryptographic engineering to a wider audience. This paper describes the development of a new graduate course on hardware security taught at North Carolina State University. The course targets an audience with no background on cryptography or hardware vulnerabilities. The course focuses especially on post-quantum cryptosystems—the next-generation cryptosystems mitigating quantum computer attacks—and evolves into designing specialized hardware accelerators for post-quantum cryptography, executing sophisticated implementation attacks (e.g., side-channel and fault attacks), and building countermeasures on such hardware designs. We discuss the curriculum design, hands-on assignment’s development, final research project outcome, and the results obtained from the course together with the associated challenges. Our experience shows that such a course is feasible, can achieve its goals, and liked by the students, but there is room for improvement.more » « less
An official website of the United States government

