25 research outputs found
An Introduction to Nuclear Supersymmetry: a Unification Scheme for Nuclei
The main ideas behind nuclear supersymmetry are presented, starting from the
basic concepts of symmetry and the methods of group theory in physics. We
propose new, more stringent experimental tests that probe the supersymmetry
classification in nuclei and point out that specific correlations should exist
for particle transfer intensities among supersymmetric partners. We also
discuss possible ways to generalize these ideas to cases where no dynamical
symmetries are present. The combination of these theoretical and experimental
studies may play a unifying role in nuclear phenomena.Comment: 40 pages, 11 figures, lecture notes `VIII Hispalensis International
Summer School: Exotic Nuclear Physics', Oromana, Sevilla, Spain, June 9-21,
200
Critical test of multi-{\it j} supersymmetries from magnetic moment measurements
Magnetic moment measurements in odd nuclei directly probe the distribution of
fermion states and hence provide one of the most critical tests for multi-
supersymmetries in collective nuclei. Due to complexity of calculations and
lack of data, such tests have not been performed in the past. Using the
Mathematica software, we derive analytic expressions for magnetic moments in
the limit of the supersymmetry and
compare the results with recent measurements in Pt.Comment: 10 pages with 1 figur
High-spin states in boson models with applications to actinide nuclei
We use the 1/ expansion formalism in a systematic study of high-spin
states in the and boson models with emphasis on spin dependence of
moment of inertia and E2 transitions. The results are applied to the high-spin
states in the actinide nuclei Th, U, where the need for
bosons is especially acute but until now, no realistic calculation existed. We
find that the -boson energy plays a crucial role in description of the
high-spin data.Comment: 11 pages Latex, 4 figures available upon request (to appear in Phys.
Lett. B
A Revisit of SO(6) Dynamical Symmetry in Nuclear Structure
According to the analysis based on the fermion dynamical symmetry model,
nuclei previously regarded as SO(6)-like (e.g. Xe and Pt) are
shown to be more akin to the transitional nuclei between SO(7) and SO(6)
symmetries
Solution of the Nuclear Shell Model by Symmetry-Dictated Truncation
The dynamical symmetries of the Fermion Dynamical Symmetry Model are used as
a principle of truncation for the spherical shell model. Utilizing the usual
principle of energy-dictated truncation to select a valence space, and
symmetry-dictated truncation to select a collective subspace of that valence
space, we are able to reduce the full shell model space to one of manageable
dimensions with modern supercomputers, even for the heaviest nuclei. The
resulting shell model then consists of diagonalizing an effective Hamiltonian
within the restricted subspace. This theory is not confined to any symmetry
limits, and represents a full solution of the original shell model if the
appropriate effective interaction of the truncated space can be determined. As
a first step in constructing that interaction, we present an empirical
determination of its matrix elements for the collective subspace with no broken
pairs in a representative set of nuclei with . We demonstrate
that this effective interaction can be parameterized in terms of a few
quantities varying slowly with particle number, and is capable of describing a
broad range of low-energy observables for these nuclei. Finally we give a brief
discussion of extending these methods to include a single broken collective
pair.Comment: invited paper for J. Phys. G, 57 pages, Latex, 18 figures a macro are
available under request at [email protected]
A Privacy-aware Data Access System for Automotive Applications
The introduction of Information technology (IT) in modern vehicles enables a plethora of new applications ranging from value added services up to autonomous driving vehicles. However, this also introduces new threats with regard to IT security and privacy. In this paper, we discuss the new privacy issues and propose a privacy-aware data access system for automotive applications. Our system informs the user over all privacy aspects and enables him to control third-party access to his personal data. We developed an easily usable human machine interface (HMI) and an underlying policy system to control data flows which is compliant to the European General Data Protection Regulation (GDPR). Our system can be easily integrated in future automotive architectures
A new look at nuclear supersymmetry though transfer experiments
Nuclear supersymmetry is reviewed and some of its applications and extensions
are discussed, together with a proposal for new, more stringent and precise
tests to probe the supersymmetry classification, in particular, correlations
between nuclei that belong to the same supermultiplet. The combination of these
theoretical and experimental studies may play a unifying role in nuclear
phenomenaComment: 13 pages, 3 figures, 2 table
Die Struktur der Uebergangskerne 195Pt und 196Pt
SIGLEAvailable from the library of Frankfurt Univ. (DE) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman
Short paper: Experimental analysis of misbehavior detection and prevention in VANETs
Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to misuse the system and inject fake - but authenticated - messages. Therefore, misbehavior detection and prevention mechanisms are required to mitigate such attacks. In this paper we provide a categorization of internal attackers to identify most relevant attack variants. Instead of using simulations, as done by most related works, we use an implementation on real vehicles to demonstrate the feasibility of location-based attacks. Especially, we demonstrate that a malware application installed on a vehicle can provoke false warnings on benign vehicles that are within the attacker's communication range. This exemplary attack is possible due to insufficiently specified VANET security standards. By using our proposed countermeasures, we show that this internal attack is detected and blocked, preventing false driver warnings