285 research outputs found

    Extensive Air Shower Radio Detection: Recent Results and Outlook

    Full text link
    A prototype system for detecting radio pulses associated with extensive cosmic ray air showers is described. Sensitivity is compared with that in previous experiments, and lessons are noted for future studies.Comment: 17 pages, LaTeX, 7 figures, invited talk presented by J. Rosner at RADHEP-2000 Conference, UCLA, Nov. 16-18, 2000, Proceedings published by AIP. Some figures and text changed; one reference update

    A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers

    Full text link
    The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around 101710^{17} eV.Comment: 53 pages, LaTeX, 19 figures, published in Nuclear Instruments and Methods. Revised version; some references update

    The B -> pi K Puzzle and New Physics

    Full text link
    The present B -> pi K data is studied in the context of the standard model (SM) and with new physics (NP). We confirm that the SM has difficulties explaining the B -> pi K measurements. By adopting an effective-lagrangian parametrization of NP effects, we are able to rule out several classes of NP. Our model-independent analysis shows that the B -> pi K data can be accommodated by NP in the electroweak penguin sector.Comment: 4 pages (revtex

    Synthesis of n operand Modulo Three Adders

    Get PDF

    Synchrotron Radiation at Radio Frequencies from Cosmic Ray Air Showers

    Get PDF
    We review some of the properties of extensive cosmic ray air showers and describe a simple model of the radio-frequency radiation generated by shower electrons and positrons as they bend in the Earth's magnetic field. We perform simulations by calculating the trajectory and radiation of a few thousand charged shower particles. The results are then transformed to predict the strength and polarization of the electromagnetic radiation emitted by the whole shower.Comment: 18 pages, LaTeX, 7 figures, accepted for publication in Astropart. Phys. Added pancake profiles (fig. 1

    Phenomenology of charmless hadronic B decays

    Full text link
    The decays of BB mesons to a pair of charmless pseudoscalar mesons (PPPP decays) or to a vector and pseudoscalar meson (VPVP decays) have been analyzed within the framework of flavor SU(3) symmetry and the Kobayashi-Maskawa mechanism of CP violation. Separate PPPP and VPVP fits proved to be successful in describing the experimental data (branching ratios, CP asymmetries and time-dependent parameters). Decay magnitudes and relative weak and strong phases have been extracted from the fits. Values of the weak phase γ\gamma were found to be consistent with the current indirect bounds from other analyses of CKM parameters.Comment: Talk presented at the Sixth International Conference on Hyperons, Charm and Beauty Hadrons, IIT, Chicago, June 27 - July 3, 200

    Linguo-pragmatic features of elliptic constructions in media discourse

    Get PDF
    The article is devoted to a linguistic research of the impact of social media texts on modern society. The article considers the linguistic and pragmatic features of ellipsis in mass media texts and their influence on readers. The argument of the article is illustrated through the discourse analysis of media texts. The object of the present paper is to analyze ellipsis as a particular characteristic of media text

    Strengthening differential and linear attacks using virtual isomorphisms

    Get PDF
    The ciphers y = C (x, k) and y = C(x, k) are isomorphic if there is a computable in both directions map y ↔ y, x ↔ x, k ↔ k. The cipher is vulnerable to an attack if the isomorphic cipher is vulnerable to it. If φ is a substitution and T is an encryption operator, then T = φT φ 1 is a cipher isomorphism. For cryptanalysis it is reasonable to choose substitution φ in such a way that it has a lot of fixed points. It is shown that byte substitution φ can have no more than 130 fixed points. Isomorphic AES (IAES) is proposed where the only non-linear operation is an isomorphic image of the XOR operation. On average, maximum probabilities of IAES differentials are 8.5 times higher in comparison with the original whereas dominance of the linear sum is increased by 3 times. IAES has differentials with zero output difference and probability 1, which slows down replication of active non-linearities and decreases complexity of an attack. Presumably, resistance of AES to linear and differential attacks can be twice reduced by magnitude in comparison with the generally accepted estimates
    corecore