8,002 research outputs found

    Form Factors of Kaon Semileptonic Decays

    Get PDF
    A calculation of the semi--leptonic decays of the kaon (Kl3K_{l3}) is presented. The results are direct predictions of a covariant model of the pion and kaon introduced earlier by Ito, Buck, Gross. The weak form factors for Kl3K_{l3} are predicted with absolutely no parameter adjustments of the model. We obtained for the form factor parameters: f(q2=ml2)/f+(q2=ml2)=0.28f_-(q^2=m_l^2)/f_+(q^2=m_l^2)=-0.28 and λ+\lambda_+= 0.028, both within experimental error bars. Connections of this approach to heavy quark symmetry will also be discussed.Comment: LaTeX, 3 pages, no figures, requires sprocl.st

    Microwave diode amplifiers with low intermodulation distortion

    Get PDF
    Distortions can be greatly reduced in narrow-band applications by using the second harmonic. The ac behavior of simplified diode amplifier has negative resistance depending on slope of equivalent I-V curve

    Unified Description of Kaon Electroweak Form Factors

    Full text link
    A calculation of the semi--leptonic decays of the kaon (Kl3K_{l3}) is presented. The results are direct predictions of a covariant model of the pion and kaon introduced earlier by Ito, Buck, Gross. The weak form factors for Kl3K_{l3} are predicted with absolutely no parameter adjustments of the model. We obtained for the form factor parameters: f(q2=ml2)/f+(q2=ml2)=0.28f_-(q^2=m_l^2)/f_+(q^2=m_l^2)=-0.28 and λ+\lambda_+= 0.028, both within experimental error bars. Connections of this approach to heavy quark symmetry will also be discussed.Comment: RevTeX, 7 pages, 4 postscript figure

    Social Identity-Based Threats to Human Security: Gender Practice in Sustainable Development and Conflict Transformation

    Get PDF
    I seek to advocate for practitioners in conflict transformation and/or sustainable development to build awareness around the peoples who, according to the status afforded them by their identities within a social context, experience threats to their own sense of human security within situations of violent conflict and/or underdevelopment. This capstone does so by examining gender -- that is, the context-specific distinctions between men and women-- as a social context that influences an individual’s feelings of human security. The capstone then expands a practitioner’s means of addressing gender-based threats to human security in situ. I will first define and situate human security, which describes the working concept of being free from fear and from want, and then will shift focus to social identity as a determinant of human security. As an example, the capstone will use gender contexts, defining the scope and outlining the history of gender practice in the fields of conflict transformation and sustainable development. Using the “Gender Continuum Tool,” this capstone will explore the positive and negative incentives for performing gender practice, relating such reasons back to human security. It will then explore some practical implications for gender practice, relating to examples from my practicum experience at an international development consulting firm in the Washington, D.C. area. Last, the capstone will re-situate the implications of gender practice back into consideration for social identities and social contexts as they relate to human security. Altogether, the considerations in this capstone can help practitioners in conflict transformation and sustainable development take into account those who suffer the deepest threats to human security, thus furthering practice that is effective, self-reflexive, sensitive, and human-focused

    Nuclear fragmentation studies for microelectronic application

    Get PDF
    A formalism for target fragment transport is presented with application to energy loss spectra in thin silicon devices. Predicted results are compared to experiments with the surface barrier detectors of McNulty et al. The intranuclear cascade nuclear reaction model does not predict the McNulty experimental data for the highest energy events. A semiempirical nuclear cross section gives an adequate explanation of McNulty's experiments. Application of the formalism to specific electronic devices is discussed
    corecore