3,977 research outputs found

    Angular distributions of the polarized photons and electron in the decays of the 3D3^3D_3 state of charmonium

    Get PDF
    We calculate the combined angular distribution functions of the polarized photons (γ1\gamma_1 and γ2\gamma_2) and electron (ee^-) produced in the cascade process pˉp\bar{p}p\rightarrow 3D3^3D_3\rightarrow 3P2+γ1^3P_2+\gamma_1\rightarrow (ψ+γ2)+γ1(e++e)+γ1+γ2(\psi+\gamma_2)+\gamma_1\rightarrow(e^++e^-)+\gamma_1+\gamma_2, when the colliding pˉ\bar{p} and pp are unpolarized. Our results are independent of any dynamical models and are expressed in terms of the spherical harmonics whose coefficients are functions of the angular-momentum helicity amplitudes of the individual processes. Once the joint angular distribution of (γ1\gamma_1, γ2\gamma_2) and that of (γ2\gamma_2, ee^-) with the polarization of either one of the two particles are measured, our results will enable one to determine the relative magnitudes as well as the relative phases of all the angular-momentum helicity amplitudes in the radiative decay processes 3D3^3D_3\rightarrow 3P2+γ1^3P_2+\gamma_1 and 3P2ψ+γ2^3P_2\rightarrow\psi+\gamma_2

    Angular distributions in the radiative decays of the 3D3^3D_3 state of charmonium originating from polarized pˉp\bar{p}p collisions

    Full text link
    Using the helicity formalism, we calculate the combined angular distribution function of the two gamma photons (γ1\gamma_1 and γ2\gamma_2) and the electron (ee^-) in the triple cascade process pˉp3D33P2+γ1(ψ+γ2)+γ1(e+e+)+γ2+γ1\bar{p}p\rightarrow{}^3D_3\rightarrow{}^3P_2+\gamma_1\rightarrow(\psi+\gamma_2) +\gamma_1 \rightarrow (e^- + e^+) +\gamma_2 +\gamma_1, when pˉ\bar{p} and pp are arbitrarily polarized. We also derive six different partially integrated angular distribution functions which give the angular distributions of one or two particles in the final state. Our results show that by measuring the two-particle angular distribution of γ1\gamma_1 and γ2\gamma_2 and that of γ2\gamma_2 and ee^-, one can determine the relative magnitudes as well as the relative phases of all the helicity amplitudes in the two charmonium radiative transitions 3D33P2+γ1{}^3D_3\rightarrow{}^3P_2+\gamma_1 and 3P2ψ+γ2^3P_2\rightarrow \psi+\gamma_2.Comment: arXiv admin note: substantial text overlap with arXiv:1311.464

    Discourse processes and products : land surveyors in Hong Kong

    Get PDF
    2007-2008 > Academic research: refereed > Publication in refereed journalAccepted ManuscriptPublishe

    Vaccinia virus requires heat-shock proteins for genome replication and virion assembly

    Get PDF
    The large double-stranded DNA virus, vaccinia virus (VACV), is closely related to variola virus, the causative agent of smallpox. While the poxvirus lifecycle has been studied for over 50 years, much is still unknown about the complex multi-step process of genome uncoating. Viral and cellular factors involved in poxvirus uncoating have been identified, including host cell proteasomes, ubiquitin, and heat-shock proteins (HSPs), which play a critical role in protein folding and the prevention of protein aggregation. Although HSPs have been linked to the lifecycle of many viruses including VACV, the role of these proteins in poxvirus infection has not been defined. Using various small compound inhibitors and RNAi, in combination with a battery of virus-specific assays, I show that heat-shock proteins are required for multiple stages of the VACV lifecycle. I demonstrate that Hsp90 is required for two stages of infection: release of the genome from the viral core and assembly of new virions. Following the finding that HSF1, the transcription factor for inducible HSPs, is required for infection, I also identify the Hsp105 as the inducible HSP required for post-replication formation of nascent virions. Given the clinical relevance of HSP inhibitors these results highlight HSPs as potential anti-poxviral drug targets. Collectively, through this work I define new cell factors required for poxvirus infection and demonstrate that subjugation of cellular HSPs during the poxvirus lifecycle is far more complex than previously appreciated

    Anomalous Light Scattering by Topological PT{\mathcal{PT}}-symmetric Particle Arrays

    Get PDF
    Robust topological edge modes may evolve into complex-frequency modes when a physical system becomes non-Hermitian. We show that, while having negligible forward optical extinction cross section, a conjugate pair of such complex topological edge modes in a non-Hermitian PT\mathcal{PT}-symmetric system can give rise to an anomalous sideway scattering when they are simultaneously excited by a plane wave. We propose a realization of such scattering state in a linear array of subwavelength resonators coated with gain media. The prediction is based on an analytical two-band model and verified by rigorous numerical simulation using multiple-multipole scattering theory. The result suggests an extreme situation where leakage of classical information is unnoticeable to the transmitter and the receiver when such a PT\mathcal{PT}-symmetric unit is inserted into the communication channel.Comment: 16 pages, 8 figure

    A computer-enhanced pH study of the formaldehyde–sulphite clock reaction

    Get PDF
    The formaldehyde-sulphite clock reaction was studied using an Orion SA 720 pH/ISE meter interfaced to an IBM PC. The laboratory software ‘ASYST’ was employed to facilitate data acquisition and data treatment. Experimental pH profiles thus obtained for the first time were simulated by invoking a theoretical model based on the reaction mechanism suggested by Burnett [1]. The variation of rate constants with compositions of reaction mixtures was also discuseed in light of the empirical expression proposed by Bell and Evans [2] for instantaneous rate constant of the clock reaction

    Mining Audit Data to Build Intrusion Detection Models

    Get PDF
    In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of program and user behavior, and use the set of relevant system features presented in the patterns to compute (inductively learned) classifiers that can recognize anomalies and known intrusions. Our past experiments showed that classifiers can be used to detect intrusions, provided that sufficient audit data is available for training and the right set of system features are selected. We propose to use the association rules and frequent episodes computed from audit data as the basis for guiding the audit data gathering and feature selection processes. We modify these two basic algorithms to use axis attribute(s) as a form of item constraints to compute only the relevant ("useful") patterns, and an iterative level-wise approximate mining procedure to uncover the low frequency (but important) patterns. We report our experiments in using these algorithms on real-world audit data
    corecore