SlideShare a Scribd company logo
Supersymmetric Dark
Matter in IceCube




                                       Hamish Silverwood
                                   Department of Physics and Astronomy
                                               University of Canterbury
Image Source: NASA/ESA
                         MSc Supervisors: Jenni Adams and Anthony Brown
Rotational
                       Velocity




                                            Radial Distance




Image Source: Wikimedia and NASA/ESA
                                       Dark Matter
Candidates must be
1. Stable
2. Electrically Neutral
3. Uncoloured




Image Source: Wikimedia and NASA/ESA
                                       Dark Matter
Supersymmetry
Particles                     Sparticles

Light                              Heavy

R-Parity                          R-Parity
PR = 1                             PR = -1


 R-Parity Conservation is necessary for
            Proton Stability.
Lightest
Supersymmetric
Particle
L
S
P
L     LSP     Particles



S
P   PR = -1   PR = 1x1 =1
L     LSP     Particles



S
P   PR = -1   PR = 1x1 =1
L   Neutralino
    1.   Stable
                                ~0
                                χ
S
    2.   Electrically Neutral
    3.   Uncoloured
    4.   Interacts via
           Weak Force &

P          Gravity
Neutralinos are Dark
Matter Candidates




Image Source: NASA/ESA
                         Dark Matter
Neutralino Accumulation
LSP          Particles




PR =(-1)x(-1)   PR = 1x1
   =1              =1
LSP          Particles



                                    ν
                            ▪

                            ▪

                            ▪
                                Neutrinos




PR =(-1)x(-1)   PR = 1x1
   =1              =1
ICECUBE
NEUTRINO
OBSERVATORY
Detector Optical Module
Minimally
Supersymmetric
Standard
Model
M   MSSM: 120 Free Parameters
S
S   MSSM-25: 25 Free Parameters


M
Scanning the MSSM-25
Parameter Space
                            ●LSP Type
                            ●LSP Mass

                            ●Relic Density

                            ●Capture Rate

                            ●Annihilation


                                Rate
           DarkSUSY
                                   ▪
                                   ▪
           Modifed by HS           ▪
           to run with 25
            Parameters      ●   IceCube events,
                                   rates, and
                                   likelihoods
Scanning the MSSM-25
Parameter Space
                                 ●LSP Type
                                 ●LSP Mass

                                 ●   Relic Density
                                 ●Capture Rate
                                 ●Annihilation


                                    Rate
                DarkSUSY
                                        ▪
                                        ▪
                Modifed by HS           ▪
                to run with 25
                 Parameters      ●   IceCube events,
                                        rates, and
                                        likelihoods

    Fitness Criteria is Relic Density;
optimizing towards WMAP measurement.
Scanning the MSSM-25
Parameter Space
Scanning the MSSM-25
Parameter Space
Scanning the MSSM-25
Parameter Space
Scanning the MSSM-25
Parameter Space
Final Goal of Parameter Scans

                   IceCube Event
                     Simulations
Final Goal of Parameter Scans

                   IceCube Event
                     Simulations
The Gritty Details

●Monte Carlo methods used to
scan parameter space.

●Currently running scans based
on the VEGAS algorithm.
Conclusion
●SUSY supplies us with a Dark Matter
candidate particle: the neutralino.

●IceCube can potentially detect the
annihilation of these neutralinos in the
Sun.

●Scans of the MSSM-25 parameter
space will help us interpret results from
IceCube.
Questions

More Related Content

Viewers also liked

God's Ultimate Intention (PPT2016)
God's Ultimate Intention (PPT2016)God's Ultimate Intention (PPT2016)
God's Ultimate Intention (PPT2016)David Frazier
 
Higgs boson
Higgs bosonHiggs boson
Higgs boson
Abhijeet Das
 
The Higgs Boson by Rohit Agrawal
The Higgs Boson by Rohit AgrawalThe Higgs Boson by Rohit Agrawal
The Higgs Boson by Rohit Agrawal
Rohit Agrawal
 
Higgs Boson
Higgs BosonHiggs Boson
God particle
God particle God particle
God particle
Vikram raja
 
Presentation for higgs boson
Presentation for higgs bosonPresentation for higgs boson
Presentation for higgs boson
Aditi Podder
 
The God Particle
The God ParticleThe God Particle
The God Particle
gibran siddiqui
 
Boson de higgs
Boson de higgsBoson de higgs

Viewers also liked (9)

God's Ultimate Intention (PPT2016)
God's Ultimate Intention (PPT2016)God's Ultimate Intention (PPT2016)
God's Ultimate Intention (PPT2016)
 
Higgs boson
Higgs bosonHiggs boson
Higgs boson
 
The Higgs Boson by Rohit Agrawal
The Higgs Boson by Rohit AgrawalThe Higgs Boson by Rohit Agrawal
The Higgs Boson by Rohit Agrawal
 
Higgs Boson
Higgs BosonHiggs Boson
Higgs Boson
 
God particle
God particle God particle
God particle
 
Presentation for higgs boson
Presentation for higgs bosonPresentation for higgs boson
Presentation for higgs boson
 
Higgs Boson
Higgs BosonHiggs Boson
Higgs Boson
 
The God Particle
The God ParticleThe God Particle
The God Particle
 
Boson de higgs
Boson de higgsBoson de higgs
Boson de higgs
 

More from NZIP

14.25 o14 i islah u-din
14.25 o14 i islah u-din14.25 o14 i islah u-din
14.25 o14 i islah u-din
NZIP
 
14.04 o14 r millane
14.04 o14 r millane14.04 o14 r millane
14.04 o14 r millane
NZIP
 
13.15 o14.2 m elbohouty
13.15 o14.2 m elbohouty13.15 o14.2 m elbohouty
13.15 o14.2 m elbohouty
NZIP
 
12.45 o14 s hendy
12.45 o14 s hendy12.45 o14 s hendy
12.45 o14 s hendy
NZIP
 
14.25 o15 b ingham
14.25 o15 b ingham14.25 o15 b ingham
14.25 o15 b ingham
NZIP
 
14.05 o15 g willmott
14.05 o15 g willmott14.05 o15 g willmott
14.05 o15 g willmott
NZIP
 
13.45 o15 n winch
13.45 o15 n winch13.45 o15 n winch
13.45 o15 n winch
NZIP
 
12.45 o15 m bartle
12.45 o15 m bartle12.45 o15 m bartle
12.45 o15 m bartle
NZIP
 
16.20 o11 b mallett
16.20 o11 b mallett16.20 o11 b mallett
16.20 o11 b mallett
NZIP
 
15.30 o11 m reid
15.30 o11 m reid15.30 o11 m reid
15.30 o11 m reid
NZIP
 
16.40 o10 d wiltshire
16.40 o10 d wiltshire16.40 o10 d wiltshire
16.40 o10 d wiltshire
NZIP
 
14.40 o8 s wimbush
14.40 o8 s wimbush14.40 o8 s wimbush
14.40 o8 s wimbush
NZIP
 
16.20 o10 p chote
16.20 o10 p chote16.20 o10 p chote
16.20 o10 p chote
NZIP
 
15.30 o10 p cottrell
15.30 o10 p cottrell15.30 o10 p cottrell
15.30 o10 p cottrell
NZIP
 
14.20 o8 c gaedtke
14.20 o8 c gaedtke14.20 o8 c gaedtke
14.20 o8 c gaedtke
NZIP
 
14.00 o8 j stephen
14.00 o8 j stephen14.00 o8 j stephen
14.00 o8 j stephen
NZIP
 
13.00 o8 g williams
13.00 o8 g williams13.00 o8 g williams
13.00 o8 g williams
NZIP
 
14.40 o7 d sullivan
14.40 o7 d sullivan14.40 o7 d sullivan
14.40 o7 d sullivan
NZIP
 
14.20 o7 r davies
14.20 o7 r davies14.20 o7 r davies
14.20 o7 r davies
NZIP
 
13.30 o7 b trompetter
13.30 o7 b trompetter13.30 o7 b trompetter
13.30 o7 b trompetter
NZIP
 

More from NZIP (20)

14.25 o14 i islah u-din
14.25 o14 i islah u-din14.25 o14 i islah u-din
14.25 o14 i islah u-din
 
14.04 o14 r millane
14.04 o14 r millane14.04 o14 r millane
14.04 o14 r millane
 
13.15 o14.2 m elbohouty
13.15 o14.2 m elbohouty13.15 o14.2 m elbohouty
13.15 o14.2 m elbohouty
 
12.45 o14 s hendy
12.45 o14 s hendy12.45 o14 s hendy
12.45 o14 s hendy
 
14.25 o15 b ingham
14.25 o15 b ingham14.25 o15 b ingham
14.25 o15 b ingham
 
14.05 o15 g willmott
14.05 o15 g willmott14.05 o15 g willmott
14.05 o15 g willmott
 
13.45 o15 n winch
13.45 o15 n winch13.45 o15 n winch
13.45 o15 n winch
 
12.45 o15 m bartle
12.45 o15 m bartle12.45 o15 m bartle
12.45 o15 m bartle
 
16.20 o11 b mallett
16.20 o11 b mallett16.20 o11 b mallett
16.20 o11 b mallett
 
15.30 o11 m reid
15.30 o11 m reid15.30 o11 m reid
15.30 o11 m reid
 
16.40 o10 d wiltshire
16.40 o10 d wiltshire16.40 o10 d wiltshire
16.40 o10 d wiltshire
 
14.40 o8 s wimbush
14.40 o8 s wimbush14.40 o8 s wimbush
14.40 o8 s wimbush
 
16.20 o10 p chote
16.20 o10 p chote16.20 o10 p chote
16.20 o10 p chote
 
15.30 o10 p cottrell
15.30 o10 p cottrell15.30 o10 p cottrell
15.30 o10 p cottrell
 
14.20 o8 c gaedtke
14.20 o8 c gaedtke14.20 o8 c gaedtke
14.20 o8 c gaedtke
 
14.00 o8 j stephen
14.00 o8 j stephen14.00 o8 j stephen
14.00 o8 j stephen
 
13.00 o8 g williams
13.00 o8 g williams13.00 o8 g williams
13.00 o8 g williams
 
14.40 o7 d sullivan
14.40 o7 d sullivan14.40 o7 d sullivan
14.40 o7 d sullivan
 
14.20 o7 r davies
14.20 o7 r davies14.20 o7 r davies
14.20 o7 r davies
 
13.30 o7 b trompetter
13.30 o7 b trompetter13.30 o7 b trompetter
13.30 o7 b trompetter
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

16.00 o10 h silverwood