222 research outputs found

    Magneto-transport and magnetic susceptibility of SmFeAsO1-xFx (x = 0.0 and 0.20)

    Full text link
    Bulk polycrystalline samples, SmFeAsO and the iso-structural superconducting SmFeAsO0.80F0.20 are explored through resistivity with temperature under magnetic field {\rho}(T, H), AC and DC magnetization (M-T), and Specific heat (Cp) measurements. The Resistivity measurement shows superconductivity for x = 0.20 sample with Tc(onset) ~ 51.7K. The upper critical field, [Hc2(0)] is estimated ~3770kOe by Ginzburg-Landau (GL) theory. Broadening of superconducting transition in magneto transport is studied through thermally activated flux flow in applied field up to 130 kOe. The flux flow activation energy (U/kB) is estimated ~1215K for 1kOe field. Magnetic measurements exhibited bulk superconductivity with lower critical field (Hc1) of ~1.2kOe at 2K. In normal state, the paramagnetic nature of compound confirms no trace of magnetic impurity which orders ferromagnetically. AC susceptibility measurements have been carried out for SmFeAsO0.80F0.20 sample at various amplitude and frequencies of applied AC drive field. The inter-granular critical current density (Jc) is estimated. Specific heat [Cp(T)] measurement showed an anomaly at around 140K due to the SDW ordering of Fe, followed by another peak at 5K corresponding to the antiferromagnetic (AFM) ordering of Sm+3 ions in SmFeAsO compound. Interestingly the change in entropy (marked by the Cp transition height) at 5K for Sm+3 AFM ordering is heavily reduced in case of superconducting SmFeAsO0.80F0.20 sample.Comment: 18 pages text + Figs: comments/suggestions welcome ([email protected]

    Partial Wave Analysis of J/Ïˆâ†’Îł(K+K−π+π−)J/\psi \to \gamma (K^+K^-\pi^+\pi^-)

    Full text link
    BES data on J/Ïˆâ†’Îł(K+K−π+π−)J/\psi \to \gamma (K^+K^-\pi^+\pi^-) are presented. The K∗Kˉ∗K^*\bar K^* contribution peaks strongly near threshold. It is fitted with a broad 0−+0^{-+} resonance with mass M=1800±100M = 1800 \pm 100 MeV, width Γ=500±200\Gamma = 500 \pm 200 MeV. A broad 2++2^{++} resonance peaking at 2020 MeV is also required with width ∌500\sim 500 MeV. There is further evidence for a 2−+2^{-+} component peaking at 2.55 GeV. The non-K∗Kˉ∗K^*\bar K^* contribution is close to phase space; it peaks at 2.6 GeV and is very different from K∗K∗ˉK^{*}\bar{K^{*}}.Comment: 15 pages, 6 figures, 1 table, Submitted to PL

    Study of J/Psi decays into eta Kstar Kstar-bar

    Get PDF
    We report the first observation of \mPJpsi \to \mPeta\mPKst\mAPKst decay in a \mPJpsi sample of 58 million events collected with the BESII detector. The branching fraction is determined to be (1.15±0.13±0.22)×10−3(1.15 \pm 0.13 \pm 0.22)\times 10^{-3}. The selected signal event sample is further used to search for the \mPY resonance through \mPJpsi \to \mPeta \mPY, \mPY\to\mPKst\mAPKst. No evidence of a signal is seen. An upper limit of \mathrm{Br}(\mPJpsi \to \mPeta \mPY)\cdot\mathrm{Br}(\mPY\to\mPKst\mAPKst) < 2.52\times 10^{-4} is set at the 90% confidence level.Comment: 11 pages, 4 figure

    Study of J\psi decaying into \omega p \bar p

    Full text link
    The decay J/ψ→ωppˉJ/\psi \to \omega p \bar p is studied using a 5.8×1075.8 \times 10^7 J/ψJ/\psi event sample accumulated with the BES II detector at the Beijing electron-positron collider. The decay branching fraction is measured to be B(J/ψ→ωppˉ)=(9.8±0.3±1.4)×10−4B(J/\psi \to \omega p \bar p)=(9.8\pm 0.3\pm 1.4)\times 10^{-4}. No significant enhancement near the ppˉp\bar p mass threshold is observed, and an upper limit of B(J/ψ→ωX(1860))B(X(1860)→ppˉ)B(J/\psi \to \omega X(1860))B(X(1860)\to p\bar p) <1.5×10−5< 1.5 \times 10^{-5} is determined at the 95% confidence level, where X(1860) designates the near-threshold enhancement seen in the ppˉp\bar p mass spectrum in J/Ïˆâ†’ÎłppˉJ/\psi \to \gamma p \bar p decays.Comment: 5 pages, 4 figure

    Curvature-bias corrections using a pseudomass method

    Get PDF
    Momentum measurements for very high momentum charged particles, such as muons from electroweak vector boson decays, are particularly susceptible to charge-dependent curvature biases that arise from misalignments of tracking detectors. Low momentum charged particles used in alignment procedures have limited sensitivity to coherent displacements of such detectors, and therefore are unable to fully constrain these misalignments to the precision necessary for studies of electroweak physics. Additional approaches are therefore required to understand and correct for these effects. In this paper the curvature biases present at the LHCb detector are studied using the pseudomass method in proton-proton collision data recorded at centre of mass energy √(s)=13 TeV during 2016, 2017 and 2018. The biases are determined using Z→Ό + ÎŒ - decays in intervals defined by the data-taking period, magnet polarity and muon direction. Correcting for these biases, which are typically at the 10-4 GeV-1 level, improves the Z→Ό + ÎŒ - mass resolution by roughly 18% and eliminates several pathological trends in the kinematic-dependence of the mean dimuon invariant mass

    Helium identification with LHCb

    Get PDF
    The identification of helium nuclei at LHCb is achieved using a method based on measurements of ionisation losses in the silicon sensors and timing measurements in the Outer Tracker drift tubes. The background from photon conversions is reduced using the RICH detectors and an isolation requirement. The method is developed using pp collision data at √(s) = 13 TeV recorded by the LHCb experiment in the years 2016 to 2018, corresponding to an integrated luminosity of 5.5 fb-1. A total of around 105 helium and antihelium candidates are identified with negligible background contamination. The helium identification efficiency is estimated to be approximately 50% with a corresponding background rejection rate of up to O(10^12). These results demonstrate the feasibility of a rich programme of measurements of QCD and astrophysics interest involving light nuclei

    Intrusion-Resilience via the Bounded-Storage Model

    Get PDF
    We introduce a new method of achieving intrusion-resilience in the cryptographic protocols. More precisely we show how to preserve security of such protocols, even if a malicious program (e.g. a virus) was installed on a computer of an honest user (and it was later removed). The security of our protocols relies on the assumption that the amount of data that the adversary can transfer from the infected machine is limited (however, we allow the adversary to perform any efficient computation on user&apos;s private data, before deciding on what to transfer). We focus on two cryptographic tasks, namely: authenticated key exchange and entity authentication. Our method is based on the results from the Bounded-Storage Model
    • 

    corecore