25 research outputs found

    An Introduction to Nuclear Supersymmetry: a Unification Scheme for Nuclei

    Full text link
    The main ideas behind nuclear supersymmetry are presented, starting from the basic concepts of symmetry and the methods of group theory in physics. We propose new, more stringent experimental tests that probe the supersymmetry classification in nuclei and point out that specific correlations should exist for particle transfer intensities among supersymmetric partners. We also discuss possible ways to generalize these ideas to cases where no dynamical symmetries are present. The combination of these theoretical and experimental studies may play a unifying role in nuclear phenomena.Comment: 40 pages, 11 figures, lecture notes `VIII Hispalensis International Summer School: Exotic Nuclear Physics', Oromana, Sevilla, Spain, June 9-21, 200

    Critical test of multi-{\it j} supersymmetries from magnetic moment measurements

    Get PDF
    Magnetic moment measurements in odd nuclei directly probe the distribution of fermion states and hence provide one of the most critical tests for multi-jj supersymmetries in collective nuclei. Due to complexity of calculations and lack of data, such tests have not been performed in the past. Using the Mathematica software, we derive analytic expressions for magnetic moments in the SO(BF)(6)×SU(F)(2)SO^{(BF)}(6) \times SU^{(F)}(2) limit of the U(6/12)U(6/12) supersymmetry and compare the results with recent measurements in 195^{195}Pt.Comment: 10 pages with 1 figur

    High-spin states in boson models with applications to actinide nuclei

    Get PDF
    We use the 1/NN expansion formalism in a systematic study of high-spin states in the sdsd and sdgsdg boson models with emphasis on spin dependence of moment of inertia and E2 transitions. The results are applied to the high-spin states in the actinide nuclei 232^{232}Th, 234238^{234-238}U, where the need for gg bosons is especially acute but until now, no realistic calculation existed. We find that the dd-boson energy plays a crucial role in description of the high-spin data.Comment: 11 pages Latex, 4 figures available upon request (to appear in Phys. Lett. B

    A Revisit of SO(6) Dynamical Symmetry in Nuclear Structure

    Full text link
    According to the analysis based on the fermion dynamical symmetry model, nuclei previously regarded as SO(6)-like (e.g. 128^{128}Xe and 196^{196}Pt) are shown to be more akin to the transitional nuclei between SO(7) and SO(6) symmetries

    Solution of the Nuclear Shell Model by Symmetry-Dictated Truncation

    Full text link
    The dynamical symmetries of the Fermion Dynamical Symmetry Model are used as a principle of truncation for the spherical shell model. Utilizing the usual principle of energy-dictated truncation to select a valence space, and symmetry-dictated truncation to select a collective subspace of that valence space, we are able to reduce the full shell model space to one of manageable dimensions with modern supercomputers, even for the heaviest nuclei. The resulting shell model then consists of diagonalizing an effective Hamiltonian within the restricted subspace. This theory is not confined to any symmetry limits, and represents a full solution of the original shell model if the appropriate effective interaction of the truncated space can be determined. As a first step in constructing that interaction, we present an empirical determination of its matrix elements for the collective subspace with no broken pairs in a representative set of nuclei with 130A250130\le A \le 250. We demonstrate that this effective interaction can be parameterized in terms of a few quantities varying slowly with particle number, and is capable of describing a broad range of low-energy observables for these nuclei. Finally we give a brief discussion of extending these methods to include a single broken collective pair.Comment: invited paper for J. Phys. G, 57 pages, Latex, 18 figures a macro are available under request at [email protected]

    A Privacy-aware Data Access System for Automotive Applications

    Get PDF
    The introduction of Information technology (IT) in modern vehicles enables a plethora of new applications ranging from value added services up to autonomous driving vehicles. However, this also introduces new threats with regard to IT security and privacy. In this paper, we discuss the new privacy issues and propose a privacy-aware data access system for automotive applications. Our system informs the user over all privacy aspects and enables him to control third-party access to his personal data. We developed an easily usable human machine interface (HMI) and an underlying policy system to control data flows which is compliant to the European General Data Protection Regulation (GDPR). Our system can be easily integrated in future automotive architectures

    A new look at nuclear supersymmetry though transfer experiments

    Full text link
    Nuclear supersymmetry is reviewed and some of its applications and extensions are discussed, together with a proposal for new, more stringent and precise tests to probe the supersymmetry classification, in particular, correlations between nuclei that belong to the same supermultiplet. The combination of these theoretical and experimental studies may play a unifying role in nuclear phenomenaComment: 13 pages, 3 figures, 2 table

    Die Struktur der Uebergangskerne 195Pt und 196Pt

    No full text
    SIGLEAvailable from the library of Frankfurt Univ. (DE) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische InformationsbibliothekDEGerman

    Short paper: Experimental analysis of misbehavior detection and prevention in VANETs

    Get PDF
    Vehicular Ad-hoc Networks (VANETs) aim to increase, among others, traffic safety and efficiency by warning and informing the driver about road events and hazards. Due to their direct impact on drivers' safety, external and internal attacks have to be prevented. While authentication prevents most of the external attacks, internal attackers are still able to misuse the system and inject fake - but authenticated - messages. Therefore, misbehavior detection and prevention mechanisms are required to mitigate such attacks. In this paper we provide a categorization of internal attackers to identify most relevant attack variants. Instead of using simulations, as done by most related works, we use an implementation on real vehicles to demonstrate the feasibility of location-based attacks. Especially, we demonstrate that a malware application installed on a vehicle can provoke false warnings on benign vehicles that are within the attacker's communication range. This exemplary attack is possible due to insufficiently specified VANET security standards. By using our proposed countermeasures, we show that this internal attack is detected and blocked, preventing false driver warnings
    corecore