5,257 research outputs found

    Reflective scattering effects in double-pomeron exchange processes

    Full text link
    We discuss energy dependence of rapidity gap survival probability in the double-pomeron exchange processes with account of the reflective scattering effects.Comment: 11 pages, 3 figure

    Simulation of Three Dimensional Electrostatic Field Configuration in Wire Chambers : A Novel Approach

    Full text link
    Three dimensional field configuration has been simulated for a simple wire chamber consisting of one anode wire stretched along the axis of a grounded square cathode tube by solving numerically the boundary integral equation of the first kind. A closed form expression of potential due to charge distributed over flat rectangular surface has been invoked in the solver using Green's function formalism leading to a nearly exact computation of electrostatic field. The solver has been employed to study the effect of several geometrical attributes such as the aspect ratio (λ=ld\lambda = \frac{l}{d}, defined as the ratio of the length ll of the tube to its width dd) and the wire modeling on the field configuration. Detailed calculation has revealed that the field values deviate from the analytic estimates significantly when the λ\lambda is reduced to 2 or below. The solver has demonstrated the effect of wire modeling on the accuracy of the estimated near-field values in the amplification region. The thin wire results can be reproduced by the polygon model incorporating a modest number of surfaces (32\geq 32) in the calculation with an accuracy of more than 99%. The smoothness in the three dimensional field calculation in comparison to fluctuations produced by other methods has been observed.Comment: Revised version submitted to Elsevier Science including some more near-field calculation

    An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

    Full text link
    As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure

    The Lore of Low Methane Livestock:Co-Producing Technology and Animals for Reduced Climate Change Impact

    Get PDF
    Methane emissions from sheep and cattle production have gained increasing profile in the context of climate change. Policy and scientific research communities have suggested a number of technological approaches to mitigate these emissions. This paper uses the concept of co-production as an analytical framework to understand farmers’ evaluation of a 'good animal’. It examines how technology and sheep and beef cattle are co-produced in the context of concerns about the climate change impact of methane. Drawing on 42 semi-structured interviews, this paper demonstrates that methane emissions are viewed as a natural and integral part of sheep and beef cattle by farmers, rather than as a pollutant. Sheep and beef cattle farmers in the UK are found to be an extremely heterogeneous group that need to be understood in their specific social, environmental and consumer contexts. Some are more amenable to appropriating methane reducing measures than others, but largely because animals are already co-constructed from the natural and the technical for reasons of increased production efficiency

    Closed Strings with Low Harmonics and Kinks

    Full text link
    Low-harmonic formulas for closed relativistic strings are given. General parametrizations are presented for the addition of second- and third-harmonic waves to the fundamental wave. The method of determination of the parametrizations is based upon a product representation found for the finite Fourier series of string motion in which the constraints are automatically satisfied. The construction of strings with kinks is discussed, including examples. A procedure is laid out for the representation of kinks that arise from self-intersection, and subsequent intercommutation, for harmonically parametrized cosmic strings.Comment: 39, CWRUTH-93-

    Search for the decay K+π+ννˉK^+\to \pi^+ \nu \bar\nu in the momentum region Pπ<195 MeV/cP_\pi < 195 {\rm ~MeV/c}

    Full text link
    We have searched for the decay K+π+ννˉK^+ \to \pi^+ \nu \bar\nu in the kinematic region with pion momentum below the K+π+π0K^+ \to \pi^+ \pi^0 peak. One event was observed, consistent with the background estimate of 0.73±0.180.73\pm 0.18. This implies an upper limit on B(K+π+ννˉ)<4.2×109B(K^+ \to \pi^+ \nu \bar\nu)< 4.2\times 10^{-9} (90% C.L.), consistent with the recently measured branching ratio of (1.570.82+1.75)×1010(1.57^{+1.75}_{-0.82}) \times 10^{-10}, obtained using the standard model spectrum and the kinematic region above the K+π+π0K^+ \to \pi^+ \pi^0 peak. The same data were used to search for K+π+X0K^+ \to \pi^+ X^0, where X0X^0 is a weakly interacting neutral particle or system of particles with 150<MX0<250 MeV/c2150 < M_{X^0} < 250 {\rm ~MeV/c^2}.Comment: 4 pages, 2 figure
    corecore