1,234 research outputs found

    Permeabilized cells

    Get PDF

    Lorentz violation in neutron and allowed nuclear beta decay

    Full text link
    We explore the possibility that the weak interaction violates Lorentz, and in particular rotational, invariance in neutron and allowed nuclear beta decay. A broad class of Lorentz-violating effects is considered, in which the standard propagator of the W-boson acquires an additional Lorentz-violating tensor. The general decay rate for allowed beta decay that incorporates such a modified propagator is derived. The resulting Lorentz-violating signals are discussed for the different types of beta-decay transitions, Fermi, Gamow-Teller, and mixed. We study the implications of our formalism for dedicated beta-decay experiments. We give a short overview of the few relevant experiments that have been performed or are ongoing.Comment: 23 pages; added reference

    Nuclear beta decay with Lorentz violation

    Get PDF
    We consider the possibility of Lorentz-invariance violation in weak-decay processes. We present a general approach that entails modifying the W-boson propagator by adding a Lorentz-violating tensor to it. We describe the effects of Lorentz violation on nuclear beta decay in this scenario. In particular we show the expression for a first-forbidden transition with a spin change of two. Using data from an old experiment on the rotational invariance of yttrium-90, we derive several bounds on the Lorentz-violating parameters of the order of 10^(-6)-10^(-8).Comment: 4 pages; presented at the Sixth Meeting on CPT and Lorentz Symmetry, Bloomington, Indiana, June 17-21, 2013; Added reference

    Parallel Evaluation of Multi-join Queries

    Get PDF
    A number of execution strategies for parallel evaluation of multi-join queries have been proposed in the literature. In this paper we give a comparative performance evaluation of four execution strategies by implementing all of them on the same parallel database system, PRISMA/DB. Experiments have been done up to 80 processors. These strategies, coming from the literature, are named: Sequential Parallel, Synchronous Execution, Segmented Right-Deep, and Full Parallel. Based on the experiments clear guidelines are given when to use which strategy. This is an extended abstract; the full paper appeared in Proc. ACM SIGMOD'94, Minneapolis, Minnesota, May 24–27, 199

    Exploration of Lorentz violation in neutral-kaon decay

    Get PDF
    The KLOE collaboration recently reported bounds on the directional dependence of the lifetime of the short-lived neutral kaon KS0K^0_S with respect to the dipole anisotropy of the cosmic microwave background. We interpret their results in an effective field theory framework developed to probe the violation of Lorentz invariance in the weak interaction and previously applied to semileptonic processes, in particular β\beta decay. In this approach a general Lorentz-violating tensor χμν\chi^{\mu\nu} is added to the standard propagator of the WW boson. We perform an exploratory study of the prospects to search for Lorentz violation in nonleptonic decays. For the kaon, we find that the sensitivity to Lorentz violation is limited by the velocity of the kaons and by the extent to which hadronic effects can be calculated. In a simple model we derive the KS0K^0_S decay rate and calculate the asymmetry for the lifetime. Using the KLOE data, limits on the values of χμν\chi^{\mu\nu} are determined.Comment: accepted for publication in Physics Letters

    Implementation and Performance Evaluation of a Parallel Transitive Closure Algorithms on PRISMA/DB

    Get PDF
    This paper is one of the first to discuss actual implementation of and experimentation with parallel transitive closure operations on a full-fledged relational database system. It brings two research efforts together; the development of an efficient execution strategy for parallel computation of path problems, called Disconnection Set Approach, and the development and implementation of a parallel, main-memory DBMS, called PRISMA/DB. First, we report on the implementation of the disconnection set approach on PRISMA/DB, showing how the latter's design allowed us to easily extend the functionality of the system. Second, we investigate the disconnection set approach's parallel behavior and performance by means of extensive experimentation. It is shown that the parallel implementation of the disconnection set approach yields very good performance characteristics, and that (super)linear speedup w.r.t. a special implementation of semi-naive is achieved for regular, so-called linear fragmenta..

    Fluorescent visualization of a spreading surfactant

    Full text link
    The spreading of surfactants on thin films is an industrially and medically important phenomenon, but the dynamics are highly nonlinear and visualization of the surfactant dynamics has been a long-standing experimental challenge. We perform the first quantitative, spatiotemporally-resolved measurements of the spreading of an insoluble surfactant on a thin fluid layer. During the spreading process, we directly observe both the radial height profile of the spreading droplet and the spatial distribution of the fluorescently-tagged surfactant. We find that the leading edge of spreading circular layer of surfactant forms a Marangoni ridge in the underlying fluid, with a trough trailing the ridge as expected. However, several novel features are observed using the fluorescence technique, including a peak in the surfactant concentration which trails the leading edge, and a flat, monolayer-scale spreading film which differs from concentration profiles predicted by current models. Both the Marangoni ridge and surfactant leading edge can be described to spread as RtδR \propto t^{\delta}. We find spreading exponents, δH0.30\delta_H \approx 0.30 and δΓ0.22\delta_\Gamma \approx 0.22 for the ridge peak and surfactant leading edge, respectively, which are in good agreement with theoretical predictions of δ=1/4\delta = 1/4. In addition, we observe that the surfactant leading edge initially leads the peak of the Marangoni ridge, with the peak later catching up to the leading edge

    Characterization of antigen-presenting properties of tumour cells using virus-specific cytotoxic T lymphocytes

    Get PDF
    Immunotherapy of tumours by induction of tumour-specific cytotoxic T-lymphocytes (CTLs) will only be effective for tumours with a functional antigen processing and presentation machinery. However, many tumours are known to down-regulate expression of major histocompatibility complex (MHC) class I molecules and/or to impair antigen processing. It is therefore desirable to evaluate the ability of a given tumour to present antigenic epitopes before developing an immunotherapy protocol. In this study we have used influenza virus as a tool to determine the antigen-presenting capacities of the murine neuroblastoma C1300 cell line NB41A3, a frequently used model for human neuroblastoma. Immunofluorescence analyses revealed low and moderate expression of MHC class I molecules Ddand Kkrespectively. Nevertheless, infected NB41A3 cells were lysed efficiently by influenza-specific CTLs. These results demonstrate that all steps of the antigen-processing pathway function properly in the NB tumour cells, and that the limited MHC class I expression suffices for efficient recognition by CTLs. In addition, lysis of the NB tumour cells shows that the cells are susceptible to CTL-induced apoptosis, a pathway that is often impaired in tumour cells. These characteristics make neuroblastoma a suitable target for immunotherapy. The presented assay allows evaluation of various immunological properties of tumour cells and, thus, represents a valuable tool to assess whether a given tumour will be susceptible to immunotherapy or not. Copyright 2000 Cancer Research Campaign. © 2000 Cancer Research Campaig
    corecore