Feeds

Is the Higgs boson an imposter?

Signature could be forged, suggest Argonne boffins

High performance access to file storage

A group of Argonne National Laboratory researchers has suggested that last week’s CERN data, fanfared to the world as the discovery of the elusive Higgs-Boson, might actually point to even more exotic creatures.

Their Arxiv-posted paper suggests that CERN’s data could have identified either “a generic Higgs doublet” or a “triplet imposter”. They do, however, borrow the Hitchhiker’s Guide’s “Don’t Panic”, noting that “a Standard Model Higgs boson gives a slightly better overall fit” with the current LHC data.

The analysis, conducted by Ian Low, Joseph Lykken and Gabe Shaughnessy, focuses not on the mass resonance revealed in the LHC data (125 GeV), but on the electroweak quantum numbers of the discovered particle. Their paper speculates that this analysis gives rise to different interpretations of the same data.

As noted by Technology Review, the prediction by Peter Higgs (and to be fair, other physicists working at the same time) merely stated that the boson now carrying his name should be massive, and would decay extremely quickly.

The combination of mass and extremely fast decay is what made the particle so hard to detect: it needs very high energy to come into existence, and can only be spotted by analyzing the particles it decays into (W and Z bosons, or photon pairs, for example).

The Argonne researchers note that the resonance LHC has identified at 125 GeV has a good fit with the Standard Model Higgs boson – but also matches the resonance predicted in more exotic theories (the doublet or triplet imposter). These theories posit that there isn’t just one Higgs boson, but a family of particles which together give rise to the Higgs field that bestows mass on W and Z bosons.

It’s even feasible, they write, that the Higgs boson data could reveal an imposter particle breaking electroweak symmetry in a “warped extra dimension”, although this is strongly disfavoured by the LHC data.

It’s only a few days since some writers were proclaiming the “end of physics”. Perhaps the end is in sight – but only after researchers finish the long job of identifying exactly what the LHC (and the Tevatron) found, and characterizing all the properties of the Higgs particle/s. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.