1,903 research outputs found

    Tenth-order lepton g-2: Contribution from diagrams containing a sixth-order light-by-light-scattering subdiagram internally

    Full text link
    This paper reports the result of our evaluation of the tenth-order QED correction to the lepton g-2 from Feynman diagrams which have sixth-order light-by-light-scattering subdiagrams, none of whose vertices couple to the external magnetic field. The gauge-invariant set of these diagrams, called Set II(e), consists of 180 vertex diagrams. In the case of the electron g-2 (a_e), where the light-by-light subdiagram consists of the electron loop, the contribution to a_e is found to be - 1.344 9 (10) (\alpha /\pi)^5. The contribution of the muon loop to a_e is - 0.000 465 (4) (\alpha /\pi)^5. The contribution of the tau-lepton loop is about two orders of magnitudes smaller than that of the muon loop and hence negligible. The sum of all of these contributions to a_e is - 1.345 (1) (\alpha /\pi)^5. We have also evaluated the contribution of Set II(e) to the muon g-2 (a_\mu). The contribution to a_\mu from the electron loop is 3.265 (12) (\alpha /\pi)^5, while the contribution of the tau-lepton loop is -0.038 06 (13) (\alpha /\pi)^5. The total contribution to a_\mu, which is the sum of these two contributions and the mass-independent part of a_e, is 1.882 (13) (\alpha /\pi)^5.Comment: 18 pages, 3 figures, REVTeX4, axodraw.sty used, changed title, corrected uncertainty of a_mu, added a referenc

    Kinetics Study of Adsorption Behaviors of Trivalent Metal Ions onto Chelating Resin: Comparison between Scandium(III) and Other Metal Ions

    Get PDF
    Scandium (Sc) lacks commercially viable independent deposits and is mainly recovered as a by-product of the smelting of other ores. In the process of recovering nickel from laterite ores, Sc is recovered from leaching solutions. The recovery of Sc requires its efficient separation and purification from other impurities. This study proposes a process for the selective separation and recovery of Sc from other trivalent cations in sulfuric acid solutions using an iminodiacetic acid chelating resin, Diaion™ CR11. The adsorption behaviors of trivalent ions Sc(III), Cr(III), Al(III), and Fe(III) onto CR11 in single- and multiple-metal systems were investigated to determine the appropriate Sc separation conditions. In systems containing single metal ions, pseudo-first-order and pseudo-second-order kinetic models were used to fit the data. Linear and nonlinear methods were used for fitting. The activation energies were calculated from the rate constants at a pH of 2.0 and at three different temperatures of 23℃, 60℃, and 80℃ and followed the order: Cr(III) > Fe(III) > Sc(III) > Al(III). In binary systems including Sc(III), the simultaneous adsorption of Sc(III) and other trivalent ions onto CR11 was investigated. Previously adsorbed Sc(III) on CR11 was displaced by the subsequent adsorption of Fe(III) or Cr(III) from the solution. The affinity of the metal ions to iminodiacetic acid and the adsorption reaction rate were critical factors for suitable selective Sc separation, indicating that prior removal of Fe(III) was necessary. Column experiments at 23℃ using a synthetic solution without Fe(III) showed that Cr(III) adsorption was suppressed, and that Sc(III) was efficiently adsorbed. Scandium can be efficiently recovered from a solution containing Sc(III) after prior removal of Fe(III) by adsorption at low temperature using CR11

    Protective Effects of Bacterial Immunostimulants, OK-432 and LC 9018 on Pseudomonas aeruginosa Infection in Tumor-Bearing Mice

    Get PDF
    Survival rates among sarcoma-180 bearing mice against Pseudomonas aeruginosa infection were fewer than those among normal mice. However, the mortality of tumorbearing mice against the infection was reduced in case of administration of bacterial immunostimulants such as OK-432 and LC 9018

    Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction

    Get PDF
    With applications in secure messaging, Updatable Public Key Encryption (UPKE) was proposed by Jost et al. (EUROCRYPT \u2719) and Alwen et al. (CRYPTO \u2720). It is a natural relaxation of forward-secure public-key encryption. In UPKE, we can update secret keys by using update ciphertexts which any sender can generate. The UPKE schemes proposed so far that satisfy the strong CCA security are Haidar et al.\u27s concrete construction (CCS \u2722) and Dodis et al\u27s generic construction that use Non-Interactive Zero-Knowledge (NIZK) arguments. Yet, even despite the aid of random oracles, their concrete efficiency is quite far from the most efficient CPA-secure scheme. In this paper, we first demonstrate a simple and efficient attack against Dodis et al.\u27s strongly CCA-secure scheme, and show how to fix it. Then, based on the observation from the attack and fix, we propose a new strongly CCA-secure generic construction for a UPKE scheme with random oracles and show that its instantiation is almost as concretely efficient as the most efficient CPA-secure one
    corecore