1,925 research outputs found
Theoretical study of the synthesis of superheavy nuclei with Z= 119 and 120 in heavy-ion reactions with trans-uranium targets
By using a newly developed di-nuclear system model with a dynamical potential
energy surface---the DNS-DyPES model, hot fusion reactions for synthesizing
superheavy nuclei (SHN) with the charge number Z = 112-120 are studied. The
calculated evaporation residue cross sections are in good agreement with
available data. In the reaction 50Ti+249Bk -> (299-x)119 + xn, the maximal
evaporation residue (ER) cross section is found to be about 0.11 pb for the
4n-emission channel. For projectile-target combinations producing SHN with
Z=120, the ER cross section increases with the mass asymmetry in the incident
channel increasing. The maximal ER cross sections for 58Fe+244Pu and 54Cr +
248Cm are relatively small (less than 0.01 pb) and those for 50Ti+249Cf and
50Ti+251Cf are about 0.05 and 0.25 pb, respectively.Comment: 6 pages, 5 figures; Phys. Rev. C, in pres
Experimental tests on the lifetime Asymmetry
The experimental test problem of the left-right polarization-dependent
lifetime asymmetry is discussed. It shows that the existing experiments cannot
demonstrate the lifetime asymmetry to be right or wrong after analyzing the
measurements on the neutron, the muon and the tau lifetime, as well as the
experiment. However, It is pointed out emphatically that the SLD and the
E158 experiments, the measurements of the left-right integrated cross section
asymmetry in boson production by collisions and by
electron-electron M{\o}ller scattering, can indirectly demonstrate the lifetime
asymmetry. In order to directly demonstrate the lifetime asymmetry, we propose
some possible experiments on the decays of polarized muons. The precise
measurement of the lifetime asymmetry could have important significance for
building a muon collider, also in cosmology and astrophysics. It would provide
a sensitive test of the standard model in particle physics and allow for
exploration of the possible interactions.Comment: 11 pages, 1 figur
The relationship between two flavors of oblivious transfer at the quantum level
Though all-or-nothing oblivious transfer and one-out-of-two oblivious
transfer are equivalent in classical cryptography, we here show that due to the
nature of quantum cryptography, a protocol built upon secure quantum
all-or-nothing oblivious transfer cannot satisfy the rigorous definition of
quantum one-out-of-two oblivious transfer.Comment: 4 pages, no figur
Gauged Q ball in a piecewise parabolic potential
Q ball solutions are considered within the theory of a complex scalar field
with a gauged
U(1) symmetry and a parabolic-type potential. In the thin-walled limit, we
show explicitly that there is a maximum size for these objects because of the
repulsive Coulomb force. The size of Q ball will increase with the decrease of
local minimum of the potential. And when the two minima degenerate, the energy
stored within the surface of the Q ball becomes significant.
Furthermore, we find an analytic expression for gauged Q ball, which is
beyond the conventional thin-walled limit.Comment: 1 figure
Secure Healthcare Applications Data Storage in Cloud Using Signal Scrambling Method
A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet based applications, and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally whereas the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks
Factorization and Unitarity in Superstring Theory
The overall coefficient of the two-loop 4-particle amplitude in superstring
theory is determined by making use of the factorization and unitarity. To
accomplish this we computed in detail all the relevant tree and one-loop
amplitudes involved and determined their overall coefficients in a consistent
way.Comment: LaTex file, 19 pages, 4 figures; v2, minor corrections and figures
corrected; v3, minor corrections with the English, to be published in JHE
Min-max theory for free boundary minimal hypersurfaces II: general Morse index bounds and applications
For any smooth Riemannian metric on an -dimensional compact manifold with boundary where , we establish general upper bounds for the Morse index of free boundary minimal hypersurfaces produced by min-max theory in the Almgren-Pitts setting. We apply our Morse index estimates to prove that for almost every (in the Baire sense) Riemannan metric, the union of all compact, properly embedded free boundary minimal hypersurfaces is dense in . If is further assumed to have a strictly mean convex point, we show the existence of infinitely many compact, properly embedded free boundary minimal hypersurfaces whose boundaries are non-empty. Our results prove a conjecture of Yau for generic metrics in the free boundary setting
- …