3,977 research outputs found
Angular distributions of the polarized photons and electron in the decays of the state of charmonium
We calculate the combined angular distribution functions of the polarized
photons ( and ) and electron () produced in the
cascade process
, when the
colliding and are unpolarized. Our results are independent of any
dynamical models and are expressed in terms of the spherical harmonics whose
coefficients are functions of the angular-momentum helicity amplitudes of the
individual processes. Once the joint angular distribution of (,
) and that of (, ) with the polarization of either one
of the two particles are measured, our results will enable one to determine the
relative magnitudes as well as the relative phases of all the angular-momentum
helicity amplitudes in the radiative decay processes
and
Angular distributions in the radiative decays of the state of charmonium originating from polarized collisions
Using the helicity formalism, we calculate the combined angular distribution
function of the two gamma photons ( and ) and the electron
() in the triple cascade process
, when and
are arbitrarily polarized. We also derive six different partially integrated
angular distribution functions which give the angular distributions of one or
two particles in the final state. Our results show that by measuring the
two-particle angular distribution of and and that of
and , one can determine the relative magnitudes as well as the
relative phases of all the helicity amplitudes in the two charmonium radiative
transitions and .Comment: arXiv admin note: substantial text overlap with arXiv:1311.464
Discourse processes and products : land surveyors in Hong Kong
2007-2008 > Academic research: refereed > Publication in refereed journalAccepted ManuscriptPublishe
Vaccinia virus requires heat-shock proteins for genome replication and virion assembly
The large double-stranded DNA virus, vaccinia virus (VACV), is closely related to variola virus, the causative agent of smallpox. While the poxvirus lifecycle has been studied for over 50 years, much is still unknown about the complex multi-step process of genome uncoating. Viral and cellular factors involved in poxvirus uncoating have been identified, including host cell proteasomes, ubiquitin, and heat-shock proteins (HSPs), which play a critical role in protein folding and the prevention of protein aggregation. Although HSPs have been linked to the lifecycle of many viruses including VACV, the role of these proteins in poxvirus infection has not been defined. Using various small compound inhibitors and RNAi, in combination with a battery of virus-specific assays, I show that heat-shock proteins are required for multiple stages of the VACV lifecycle. I demonstrate that Hsp90 is required for two stages of infection: release of the genome from the viral core and assembly of new virions. Following the finding that HSF1, the transcription factor for inducible HSPs, is required for infection, I also identify the Hsp105 as the inducible HSP required for post-replication formation of nascent virions. Given the clinical relevance of HSP inhibitors these results highlight HSPs as potential anti-poxviral drug targets. Collectively, through this work I define new cell factors required for poxvirus infection and demonstrate that subjugation of cellular HSPs during the poxvirus lifecycle is far more complex than previously appreciated
Anomalous Light Scattering by Topological -symmetric Particle Arrays
Robust topological edge modes may evolve into complex-frequency modes when a
physical system becomes non-Hermitian. We show that, while having negligible
forward optical extinction cross section, a conjugate pair of such complex
topological edge modes in a non-Hermitian -symmetric system can
give rise to an anomalous sideway scattering when they are simultaneously
excited by a plane wave. We propose a realization of such scattering state in a
linear array of subwavelength resonators coated with gain media. The prediction
is based on an analytical two-band model and verified by rigorous numerical
simulation using multiple-multipole scattering theory. The result suggests an
extreme situation where leakage of classical information is unnoticeable to the
transmitter and the receiver when such a -symmetric unit is
inserted into the communication channel.Comment: 16 pages, 8 figure
A computer-enhanced pH study of the formaldehyde–sulphite clock reaction
The formaldehyde-sulphite clock reaction was studied using an
Orion SA 720 pH/ISE meter interfaced to an IBM PC. The
laboratory software ‘ASYST’ was employed to facilitate data
acquisition and data treatment. Experimental pH profiles thus
obtained for the first time were simulated by invoking a theoretical
model based on the reaction mechanism suggested by Burnett [1].
The variation of rate constants with compositions of reaction
mixtures was also discuseed in light of the empirical expression
proposed by Bell and Evans [2] for instantaneous rate constant of
the clock reaction
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of program and user behavior, and use the set of relevant system features presented in the patterns to compute (inductively learned) classifiers that can recognize anomalies and known intrusions. Our past experiments showed that classifiers can be used to detect intrusions, provided that sufficient audit data is available for training and the right set of system features are selected. We propose to use the association rules and frequent episodes computed from audit data as the basis for guiding the audit data gathering and feature selection processes. We modify these two basic algorithms to use axis attribute(s) as a form of item constraints to compute only the relevant ("useful") patterns, and an iterative level-wise approximate mining procedure to uncover the low frequency (but important) patterns. We report our experiments in using these algorithms on real-world audit data
Recommended from our members
A Comparative Study of Divergence Control Algorithms
This paper evaluates and compares the performance of two-phase locking divergence control (2PLDC) and optimistic divergence control (ODC) algorithms using a comprehensive centralized database simulation model. We examine a system with multiclass workloads in which on-line update transactions and long-duration queries progress based on epsilon serializability (ESR). Our results demonstrate that significant performance enhancements can be achieved with a non-zero tolerable inconsistency (ϵ-spec). With sufficient ϵ-spec and limited system resources, both algorithms achieve comparable performance. However, with low resource contention, ODC performs significantly better than 2PLDC. Moreover, given a small ϵ-spec, ODC returns more accurate results on the committed queries then 2PLDC
- …