285 research outputs found
Extensive Air Shower Radio Detection: Recent Results and Outlook
A prototype system for detecting radio pulses associated with extensive
cosmic ray air showers is described. Sensitivity is compared with that in
previous experiments, and lessons are noted for future studies.Comment: 17 pages, LaTeX, 7 figures, invited talk presented by J. Rosner at
RADHEP-2000 Conference, UCLA, Nov. 16-18, 2000, Proceedings published by AIP.
Some figures and text changed; one reference update
A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers
The development of a system to detect the radio-frequency (RF) pulse
associated with extensive air showers of cosmic rays is described. This work
was performed at the CASA/MIA array in Utah, with the intention of designing
equipment that can be used in conjunction with the Auger Giant Array. A small
subset of data (less than 40 out of a total of 600 hours of running time),
taken under low-noise conditions, permitted upper limits to be placed on the
rate for pulses accompanying showers of energies around eV.Comment: 53 pages, LaTeX, 19 figures, published in Nuclear Instruments and
Methods. Revised version; some references update
The B -> pi K Puzzle and New Physics
The present B -> pi K data is studied in the context of the standard model
(SM) and with new physics (NP). We confirm that the SM has difficulties
explaining the B -> pi K measurements. By adopting an effective-lagrangian
parametrization of NP effects, we are able to rule out several classes of NP.
Our model-independent analysis shows that the B -> pi K data can be
accommodated by NP in the electroweak penguin sector.Comment: 4 pages (revtex
Synchrotron Radiation at Radio Frequencies from Cosmic Ray Air Showers
We review some of the properties of extensive cosmic ray air showers and
describe a simple model of the radio-frequency radiation generated by shower
electrons and positrons as they bend in the Earth's magnetic field. We perform
simulations by calculating the trajectory and radiation of a few thousand
charged shower particles. The results are then transformed to predict the
strength and polarization of the electromagnetic radiation emitted by the whole
shower.Comment: 18 pages, LaTeX, 7 figures, accepted for publication in Astropart.
Phys. Added pancake profiles (fig. 1
Phenomenology of charmless hadronic B decays
The decays of mesons to a pair of charmless pseudoscalar mesons (
decays) or to a vector and pseudoscalar meson ( decays) have been analyzed
within the framework of flavor SU(3) symmetry and the Kobayashi-Maskawa
mechanism of CP violation. Separate and fits proved to be successful
in describing the experimental data (branching ratios, CP asymmetries and
time-dependent parameters). Decay magnitudes and relative weak and strong
phases have been extracted from the fits. Values of the weak phase
were found to be consistent with the current indirect bounds from other
analyses of CKM parameters.Comment: Talk presented at the Sixth International Conference on Hyperons,
Charm and Beauty Hadrons, IIT, Chicago, June 27 - July 3, 200
Linguo-pragmatic features of elliptic constructions in media discourse
The article is devoted to a linguistic research of the impact of social media texts on modern society. The article considers the linguistic and pragmatic features of ellipsis in mass media texts and their influence on readers. The argument of the article is illustrated through the discourse analysis of media texts. The object of the present paper is to analyze ellipsis as a particular characteristic of media text
Strengthening differential and linear attacks using virtual isomorphisms
The ciphers y = C (x, k) and y = C(x, k) are isomorphic if there is a computable in both directions map y ↔ y, x ↔ x, k ↔ k. The cipher is vulnerable to an attack if the isomorphic cipher is vulnerable to it. If φ is a substitution and T is an encryption operator, then T = φT φ 1 is a cipher isomorphism. For cryptanalysis it is reasonable to choose substitution φ in such a way that it has a lot of fixed points. It is shown that byte substitution φ can have no more than 130 fixed points. Isomorphic AES (IAES) is proposed where the only non-linear operation is an isomorphic image of the XOR operation. On average, maximum probabilities of IAES differentials are 8.5 times higher in comparison with the original whereas dominance of the linear sum is increased by 3 times. IAES has differentials with zero output difference and probability 1, which slows down replication of active non-linearities and decreases complexity of an attack. Presumably, resistance of AES to linear and differential attacks can be twice reduced by magnitude in comparison with the generally accepted estimates
- …