Charming penguins and lepton universality violation in $$\varvec{b \rightarrow s \ell ^+ \ell ^-}$$ decays

نویسندگان

چکیده

Abstract The LHCb experiment has recently presented new results on Lepton Universality Violation (LUV) in $$B \rightarrow K^{(*)} \ell ^+ ^-$$ B → K ( ∗ ) ℓ + - decays involving $$K_S$$ S the final state, which strengthen recent evidence of LUV obtained $$B^+ K^{+} and previous measurements K^{*0} 0 . While observables Standard Model are theoretically clean, their predictions New Physics scenarios sensitive to details hadronic dynamics, particular charming penguin contribution. In this work, we show how a conservative treatment uncertainties is crucial not only assess significance deviations from but also obtain picture responsible for LUV. Adopting very general parameterization penguins, find that: (i) current data hint at sizable $$q^2$$ q 2 helicity dependence charm loop amplitudes; (ii) NP solutions B anomalies favour left-handed or an axial lepton coupling rather than vector one.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Charming Penguins in B Decays

Full expressions of the B0 d → π+π− and B0 d → π0π0 amplitudes, given in terms of matrix elements of operators of the effective weak Hamiltonian, are used to study the dependence of the relevant branching ratios on the different contributions. The uncertainty in the extraction of the weak phase α from the measurement of the timedependent asymmetry in B0 d → π+π− decays is also analyzed. We find...

متن کامل

A $2\ell k$ Kernel for $\ell$-Component Order Connectivity

In the `-Component Order Connectivity problem (` ∈ N), we are given a graph G on n vertices, m edges and a non-negative integer k and asks whether there exists a set of vertices S ⊆ V (G) such that |S| ≤ k and the size of the largest connected component in G−S is at most `. In this paper, we give a kernel for `-Component Order Connectivity with at most 2`k vertices that takes nO(`) time for eve...

متن کامل

Rethinking $(k,\ell)$-anonymity in social graphs: $(k,\ell)$-adjacency anonymity and $(k,\ell)$-(adjacency) anonymous transformations

This paper treats the privacy-preserving publication of social graphs in the presence of active adversaries, that is, adversaries with the ability to introduce sybil nodes in the graph prior to publication and leverage them to create unique fingerprints for a set of victim nodes and re-identify them after publication. Stemming from the notion of (k, l)-anonymity, we introduce (k, l)-anonymous t...

متن کامل

Charming penguin and direct CP-violation in charmless B decays

In the study of two-body charmlessB decays as a mean of looking for direct CP-violation and measuring the CKM mixing parameters in the Standard Model, the short-distance penguin contribution with its absorptive part generated by charm quark loop seems capable of producing sufficient B → Kπ decays rates, as obtained in factorization and QCD-improved factorization models. However there are also l...

متن کامل

Lepton Universality, Rare Decays and Split Fermions

We investigate the constraint on the split fermions in extra dimensions by considering the universality ofW leptonic decaysW → liνi, the charged lepton decays li → ljνiν̄j, and the lepton flavor violating process li → l̄jlklh where li = e, μ or τ . For the Standard Model (SM) background of W → liνi, we extended the one loop quantum correction to include effects of order ml /M 2 W and the Higgs ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: European Physical Journal C

سال: 2023

ISSN: ['1434-6044', '1434-6052']

DOI: https://doi.org/10.1140/epjc/s10052-023-11191-w