1,903 research outputs found
Tenth-order lepton g-2: Contribution from diagrams containing a sixth-order light-by-light-scattering subdiagram internally
This paper reports the result of our evaluation of the tenth-order QED
correction to the lepton g-2 from Feynman diagrams which have sixth-order
light-by-light-scattering subdiagrams, none of whose vertices couple to the
external magnetic field. The gauge-invariant set of these diagrams, called Set
II(e), consists of 180 vertex diagrams. In the case of the electron g-2 (a_e),
where the light-by-light subdiagram consists of the electron loop, the
contribution to a_e is found to be - 1.344 9 (10) (\alpha /\pi)^5. The
contribution of the muon loop to a_e is - 0.000 465 (4) (\alpha /\pi)^5. The
contribution of the tau-lepton loop is about two orders of magnitudes smaller
than that of the muon loop and hence negligible. The sum of all of these
contributions to a_e is - 1.345 (1) (\alpha /\pi)^5. We have also evaluated the
contribution of Set II(e) to the muon g-2 (a_\mu). The contribution to a_\mu
from the electron loop is 3.265 (12) (\alpha /\pi)^5, while the contribution of
the tau-lepton loop is -0.038 06 (13) (\alpha /\pi)^5. The total contribution
to a_\mu, which is the sum of these two contributions and the mass-independent
part of a_e, is 1.882 (13) (\alpha /\pi)^5.Comment: 18 pages, 3 figures, REVTeX4, axodraw.sty used, changed title,
corrected uncertainty of a_mu, added a referenc
Kinetics Study of Adsorption Behaviors of Trivalent Metal Ions onto Chelating Resin: Comparison between Scandium(III) and Other Metal Ions
Scandium (Sc) lacks commercially viable independent deposits and is mainly recovered as a by-product of the smelting of other ores. In the process of recovering nickel from laterite ores, Sc is recovered from leaching solutions. The recovery of Sc requires its efficient separation and purification from other impurities. This study proposes a process for the selective separation and recovery of Sc from other trivalent cations in sulfuric acid solutions using an iminodiacetic acid chelating resin, Diaion™ CR11. The adsorption behaviors of trivalent ions Sc(III), Cr(III), Al(III), and Fe(III) onto CR11 in single- and multiple-metal systems were investigated to determine the appropriate Sc separation conditions. In systems containing single metal ions, pseudo-first-order and pseudo-second-order kinetic models were used to fit the data. Linear and nonlinear methods were used for fitting. The activation energies were calculated from the rate constants at a pH of 2.0 and at three different temperatures of 23℃, 60℃, and 80℃ and followed the order: Cr(III) > Fe(III) > Sc(III) > Al(III). In binary systems including Sc(III), the simultaneous adsorption of Sc(III) and other trivalent ions onto CR11 was investigated. Previously adsorbed Sc(III) on CR11 was displaced by the subsequent adsorption of Fe(III) or Cr(III) from the solution. The affinity of the metal ions to iminodiacetic acid and the adsorption reaction rate were critical factors for suitable selective Sc separation, indicating that prior removal of Fe(III) was necessary. Column experiments at 23℃ using a synthetic solution without Fe(III) showed that Cr(III) adsorption was suppressed, and that Sc(III) was efficiently adsorbed. Scandium can be efficiently recovered from a solution containing Sc(III) after prior removal of Fe(III) by adsorption at low temperature using CR11
Protective Effects of Bacterial Immunostimulants, OK-432 and LC 9018 on Pseudomonas aeruginosa Infection in Tumor-Bearing Mice
Survival rates among sarcoma-180 bearing mice against Pseudomonas aeruginosa infection were fewer than those among normal mice. However, the mortality of tumorbearing mice against the infection was reduced in case of administration of bacterial immunostimulants such as OK-432 and LC 9018
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction
With applications in secure messaging, Updatable Public Key Encryption (UPKE) was proposed by Jost et al. (EUROCRYPT \u2719) and Alwen et al. (CRYPTO \u2720). It is a natural relaxation of forward-secure public-key encryption. In UPKE, we can update secret keys by using update ciphertexts which any sender can generate. The UPKE schemes proposed so far that satisfy the strong CCA security are Haidar et al.\u27s concrete construction (CCS \u2722) and Dodis et al\u27s generic construction that use Non-Interactive Zero-Knowledge (NIZK) arguments. Yet, even despite the aid of random oracles, their concrete efficiency is quite far from the most efficient CPA-secure scheme. In this paper, we first demonstrate a simple and efficient attack against Dodis et al.\u27s strongly CCA-secure scheme, and show how to fix it. Then, based on the observation from the attack and fix, we propose a new strongly CCA-secure generic construction for a UPKE scheme with random oracles and show that its instantiation is almost as concretely efficient as the most efficient CPA-secure one
- …