48 research outputs found

    Measurement of single pi0 production in neutral current neutrino interactions with water by a 1.3 GeV wide band muon neutrino beam

    Full text link
    Neutral current single pi0 production induced by neutrinos with a mean energy of 1.3 GeV is measured at a 1000 ton water Cherenkov detector as a near detector of the K2K long baseline neutrino experiment. The cross section for this process relative to the total charged current cross section is measured to be 0.064 +- 0.001 (stat.) +- 0.007 (sys.). The momentum distribution of produced pi0s is measured and is found to be in good agreement with an expectation from the present knowledge of the neutrino cross sections.Comment: 6 pages, 4 figures, Submitted to Phys. Lett.

    A search for periodic modulations of the solar neutrino flux in Super-Kamiokande-I

    Full text link
    A search for periodic modulations of the solar neutrino flux was performed using the Super-Kamiokande-I data taken from May 31st, 1996 to July 15th, 2001. The detector's capability of measuring the exact time of events, combined with a relatively high yield of solar neutrino events, allows a search for short-time variations in the observed flux. We employed the Lomb test to look for periodic modulations of the observed solar neutrino flux. The obtained periodogram is consistent with statistical fluctuation and no significant periodicity was found

    Evidence for muon neutrino oscillation in an accelerator-based experiment

    Get PDF
    We present results for muon neutrino oscillation in the KEK to Kamioka (K2K) long-baseline neutrino oscillation experiment. K2K uses an accelerator-produced muon neutrino beam with a mean energy of 1.3 GeV directed at the Super-Kamiokande detector. We observed the energy dependent disappearance of muon neutrino, which we presume have oscillated to tau neutrino. The probability that we would observe these results if there is no neutrino oscillation is 0.0050% (4.0 sigma).Comment: 5 pages, 4 figure

    Search for Lorentz and CPT violation using sidereal time dependence of neutrino flavor transitions over a short baseline

    Get PDF
    A class of extensions of the Standard Model allows Lorentz and CPT violations, which can be identified by the observation of sidereal modulations in the neutrino interaction rate. A search for such modulations was performed using the T2K on-axis near detector. Two complementary methods were used in this study, both of which resulted in no evidence of a signal. Limits on associated Lorentz and CPT-violating terms from the Standard Model extension have been derived by taking into account their correlations in this model for the first time. These results imply such symmetry violations are suppressed by a factor of more than 10 20 at the GeV scale

    Measurement of coherent π+π^{+} production in low energy neutrino-Carbon scattering

    Get PDF
    We report the first measurement of the flux-averaged cross section for charged current coherent π+\pi^{+} production on carbon for neutrino energies less than 1.5 GeV to a restricted final state phase space region in the T2K near detector, ND280. Comparisons are made with predictions from the Rein-Sehgal coherent production model and the model by Alvarez-Ruso {\it et al.}, the latter representing the first implementation of an instance of the new class of microscopic coherent models in a neutrino interaction Monte Carlo event generator. This results contradicts the null results reported by K2K and SciBooNE in a similar neutrino energy region

    Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report Volume 2: The Physics Program for DUNE at LBNF

    Get PDF
    The Physics Program for the Deep Underground Neutrino Experiment (DUNE) at the Fermilab Long-Baseline Neutrino Facility (LBNF) is described

    Highly-parallelized simulation of a pixelated LArTPC on a GPU

    Get PDF
    The rapid development of general-purpose computing on graphics processing units (GPGPU) is allowing the implementation of highly-parallelized Monte Carlo simulation chains for particle physics experiments. This technique is particularly suitable for the simulation of a pixelated charge readout for time projection chambers, given the large number of channels that this technology employs. Here we present the first implementation of a full microphysical simulator of a liquid argon time projection chamber (LArTPC) equipped with light readout and pixelated charge readout, developed for the DUNE Near Detector. The software is implemented with an end-to-end set of GPU-optimized algorithms. The algorithms have been written in Python and translated into CUDA kernels using Numba, a just-in-time compiler for a subset of Python and NumPy instructions. The GPU implementation achieves a speed up of four orders of magnitude compared with the equivalent CPU version. The simulation of the current induced on 10^3 pixels takes around 1 ms on the GPU, compared with approximately 10 s on the CPU. The results of the simulation are compared against data from a pixel-readout LArTPC prototype

    The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

    No full text
    We present a new mode of operation for obtaining authenticated encryption suited for use in banking and government environments where cryptographic services are only available via a Hardware Security Module (HSM) which protects the keys but offers a limited API. The practical problem is that despite the existence of better modes of operation, modern HSMs still provide nothing but a basic (unauthenticated) CBC mode of encryption, and since they mediate all access to the key, solutions must work around this. Our mode of operation makes only a single call to the HSM, yet provides a secure authenticated encryption scheme; authentication is obtained by manipulation of the plaintext being passed to the HSM via a call to an unkeyed hash function. The scheme offers a considerable performance improvement compared to more traditional authenticated encryption techniques which must be implemented using multiple calls to the HSM. Our new mode of operation is provided with a proof of security, on the assumption that the underlying block cipher used in the CBC mode is a strong pseudorandom permutation, and that the hash function is modelled as a random oracle
    corecore