1,932 research outputs found

    Fission modes of 256Fm and 258Fm in a microscopic approach

    Full text link
    A static microscopic study of potential-energy surfaces within the Skyrme-Hartree-Fock-plus-BCS model is carried out for the 256Fm and 258Fm isotopes with the goal of deducing some properties of spontaneous fission. The calculated fission modes are found to be in agreement with the experimentaly observed asymmetric-to-symmetric transition in the fragment-mass distributions and with the high- and low-total-kinetic-energy modes experimentally observed in 258Fm. Most of the results are similar to those obtained in macroscopic-microscopic models as well as in recent Hartree-Fock-Bogolyubov calculations with the Gogny interaction, with a few differences in their interpretations. In particular an alternative explanation is proposed for the low-energy fission mode of 258Fm.Comment: 14 pages, 11 figures, 3 tables, submitted to Phys. Rev.

    Action principles, restoration of BRS symmetry and the renormalization group equation for chiral non-Abelian gauge theories in dimensional renormalization with a non-anticommuting γ5\gamma_5

    Get PDF
    The one-loop renormalization of a general chiral gauge theory without scalar and Majorana fields is fully worked out within Breitenlohner and Maison dimensional renormalization scheme. The coefficients of the anomalous terms introduced in the Slavnov-Taylor equations by the minimal subtraction algorithm are calculated and the asymmetric counterterms needed to restore the BRS symmetry, if the anomaly cancellation conditions are met, are computed. The renormalization group equation and its coefficients are worked out in the anomaly free case. The computations draw heavily from the existence of action principles and BRS cohomology theory.Comment: 86 pages, 14 figures, one table, plane te

    Parity restoration in the Highly Truncated Diagonalization Approach: application to the outer fission barrier of 240^{240}Pu

    Full text link
    The restoration of the parity symmetry has been performed in the framework of the Highly Truncated Diagonalization Approach suited to treat correlations in an explicitly particle-number conserving microscopic approach. To do so we have assumed axial symmetry and used a generalized Wick's theorem due to L\"owdin in a projection-after-variation scheme. We have chosen the Skyrme SkM^* energy-density functional for the particle-hole channel and a density-independent delta force for the residual interaction. We have applied this approach in the region of the outer fission barrier of the 240^{240}Pu nucleus. As a result, we have shown that the Kπ=0+K^{\pi} = 0^+ fission isomeric state is statically unstable against intrinsic-parity breaking modes, while the projection does not affect the energy at the top of the intrinsic outer fission barrier. Altogether, this leads to an increase of the height of the outer fission barrier--with respect to the fission isomeric state--by about 350 keV, affecting thus significantly the fission-decay lifetime of the considered fission isomer

    Semi-naive dimensional renormalization

    Get PDF
    We propose a treatment of γ5\gamma^5 in dimensional regularization which is based on an algebraically consistent extension of the Breitenlohner-Maison-'t Hooft-Veltman (BMHV) scheme; we define the corresponding minimal renormalization scheme and show its equivalence with a non-minimal BMHV scheme. The restoration of the chiral Ward identities requires the introduction of considerably fewer finite counterterms than in the BMHV scheme. This scheme is the same as the minimal naive dimensional renormalization in the case of diagrams not involving fermionic traces with an odd number of γ5\gamma^5, but unlike the latter it is a consistent scheme. As a simple example we apply our minimal subtraction scheme to the Yukawa model at two loops in presence of external gauge fields.Comment: 28 pages, 3 figure

    The b -> s gamma decay revisited

    Full text link
    In this work we compute the leading logarithmic corrections to the b -> s gamma decay in a dimensional scheme which does not require any definition of the gamma5 matrix. The scheme does not exhibit unconsistencies and it is therefore a viable alternative to the t'Hooft Veltman scheme, particularly in view of the next-to-leading computation. We confirm the recent results of Ciuchini et al.Comment: 11 pages RevTeX + 2 EPSF figures, report IFUP-TH 2/94, HUTP-93/A038. PostScript file or hardcopy available from the authors upon reques

    Astrophysical Rates for Explosive Nucleosynthesis: Stellar and Laboratory Rates for Exotic Nuclei

    Get PDF
    A selected overview of stellar effects and reaction mechanisms with relevance to the prediction of astrophysical reaction rates far off stability is provided.Comment: 4 pages, 2 figures (contining 2 subfigures each); Proceedings of 10th Intl. Conference on Nucleus-Nucleus Collisions, Beijing, China, August 2009; to appear in Nuclear Physics

    Module networks revisited: computational assessment and prioritization of model predictions

    Full text link
    The solution of high-dimensional inference and prediction problems in computational biology is almost always a compromise between mathematical theory and practical constraints such as limited computational resources. As time progresses, computational power increases but well-established inference methods often remain locked in their initial suboptimal solution. We revisit the approach of Segal et al. (2003) to infer regulatory modules and their condition-specific regulators from gene expression data. In contrast to their direct optimization-based solution we use a more representative centroid-like solution extracted from an ensemble of possible statistical models to explain the data. The ensemble method automatically selects a subset of most informative genes and builds a quantitatively better model for them. Genes which cluster together in the majority of models produce functionally more coherent modules. Regulators which are consistently assigned to a module are more often supported by literature, but a single model always contains many regulator assignments not supported by the ensemble. Reliably detecting condition-specific or combinatorial regulation is particularly hard in a single optimum but can be achieved using ensemble averaging.Comment: 8 pages REVTeX, 6 figure

    The anomaly in the central charge of the supersymmetric kink from dimensional regularization and reduction

    Get PDF
    We show that the anomalous contribution to the central charge of the 1+1-dimensional N=1 supersymmetric kink that is required for BPS saturation at the quantum level can be linked to an analogous term in the extra momentum operator of a 2+1-dimensional kink domain wall with spontaneous parity violation and chiral domain wall fermions. In the quantization of the domain wall, BPS saturation is preserved by nonvanishing quantum corrections to the momentum density in the extra space dimension. Dimensional reduction from 2+1 to 1+1 dimensions preserves the unbroken N=1/2 supersymmetry and turns these parity-violating contributions into the anomaly of the central charge of the supersymmetric kink. On the other hand, standard dimensional regularization by dimensional reduction from 1 to (1-epsilon) spatial dimensions, which also preserves supersymmetry, obtains the anomaly from an evanescent counterterm.Comment: LATeX, 19 pages, v2: significantly extended section 4 on dimensional reduction and evanescent counterterm

    Dimensional renormalization of Yukawa theories wia Wilsonian methods

    Get PDF
    In the 't Hooft-Veltman dimensional regularization scheme it is necessary to introduce finite counterterms to satisfy chiral Ward identities. It is a non-trivial task to evaluate these counterterms even at two loops. We suggest the use of Wilsonian exact renormalization group techniques to reduce the computation of these counterterms to simple master integrals. We illustrate this method by a detailed study of a generic Yukawa model with massless fermions at two loops.Comment: 32 pages, 9 figures, revised version: minor errors corrected, a reference adde

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17
    corecore