4,559 research outputs found
The theory of the scattering-induced feeding-in in bent crystals
An analytical theory for the efficiency of scattering-induced transitions
from a random to a channeled state (feed-in) in bent crystals is derived. The
predictions from the theory are in good agreement with experiment and Monte
Carlo simulations.Comment: 6 page
Optimization of crystal extraction experiment
Using a computer model for the crystal extraction, we investigate the
bent-crystal parameters optimal for the extraction experiment. The optimal
crystal curvature is found to be near 1 GeV/cm (for pv/R), i.e. a factor of
2--3 higher than for the crystal application in beam lines. An influence of the
accelerator optics on extraction is discussed. A possibility of using the
high-Z crystals for extraction is considered. The simulations for the ongoing
experiments at the CERN-SPS and the Fermilab Tevatron, and for the proposed
extraction at LHC, are presented.Comment: 11 pages, 4 figure
Simulation of beam steering phenomena in bent crystals
The simulation methods for the channeling phenomena in GeV/TeV energy range
in ideal or distorted crystal lattices are discussed. Monte Carlo predictions
for feed-out and feed-in rates, dislocation dechanneling, and deflection
efficiencies of bent crystals are compared to the experimental data. The role
of multiple interactions with crystal in circular accelerators ("multipass
channeling") for the efficiency boost in the crystal-aided extraction
experiments is analysed. Possible future applications of the crystal channeling
technique are considered.Comment: 10pp. Presented at COSIRES 1998 (Okayama
Studies of Nanotube Channeling for Efficient Beam Scraping at Accelerators
While particle beam steering (and in particular, "scraping") in accelerators
by bent channeling crystals is an established technique extensively tested at
IHEP Protvino and other major high-energy labs, an interesting question is how
one could improve channeling capabilities by applying modern nanotechnology.
Theoretical research of nanotube channeling was in progress over recent years.
In this work, we assess potential benefits from nanotube channeling for real
accelerator systems. We report simulation studies of channeling in
nanostructured material (carbon SWNT and MWNT) tested for possible serving as a
primary scraper for the collimation systems of hadron colliders. The advantages
of nanostructured material as a potential choice for a primary scraper in a
high-energy accelerator such as LHC or the Tevatron are discussed in comparison
to crystal lattices and amorphous material. We evaluate physical processes
relevant to this application and reveal nanotechnology requirements.Comment: Presented at the Int. Conf. on Atomic Collisions with Solids
(ICACS-21, Genova 4-9 July 2004
The limits of volume reflection in bent crystals
We show that theory predictions for volume reflection in bent crystals agree
with recent experimental data. This makes possible to predict volume reflection
angle and efficiency in a broad range of energy for various crystals. A simple
formula is proposed for volume reflection efficiency. We derive the physical
limits for application of crystal reflection at high-energy accelerators where
it may help beam collimation.Comment: 6 pages, 2 figure
Bitcoin over Tor isn't a good idea
Bitcoin is a decentralized P2P digital currency in which coins are generated
by a distributed set of miners and transaction are broadcasted via a
peer-to-peer network. While Bitcoin provides some level of anonymity (or rather
pseudonymity) by encouraging the users to have any number of random-looking
Bitcoin addresses, recent research shows that this level of anonymity is rather
low. This encourages users to connect to the Bitcoin network through
anonymizers like Tor and motivates development of default Tor functionality for
popular mobile SPV clients. In this paper we show that combining Tor and
Bitcoin creates an attack vector for the deterministic and stealthy
man-in-the-middle attacks. A low-resource attacker can gain full control of
information flows between all users who chose to use Bitcoin over Tor. In
particular the attacker can link together user's transactions regardless of
pseudonyms used, control which Bitcoin blocks and transactions are relayed to
the user and can \ delay or discard user's transactions and blocks. In
collusion with a powerful miner double-spending attacks become possible and a
totally virtual Bitcoin reality can be created for such set of users. Moreover,
we show how an attacker can fingerprint users and then recognize them and learn
their IP address when they decide to connect to the Bitcoin network directly.Comment: 11 pages, 4 figures, 4 table
- …
