1,932 research outputs found
Fission modes of 256Fm and 258Fm in a microscopic approach
A static microscopic study of potential-energy surfaces within the
Skyrme-Hartree-Fock-plus-BCS model is carried out for the 256Fm and 258Fm
isotopes with the goal of deducing some properties of spontaneous fission. The
calculated fission modes are found to be in agreement with the experimentaly
observed asymmetric-to-symmetric transition in the fragment-mass distributions
and with the high- and low-total-kinetic-energy modes experimentally observed
in 258Fm. Most of the results are similar to those obtained in
macroscopic-microscopic models as well as in recent Hartree-Fock-Bogolyubov
calculations with the Gogny interaction, with a few differences in their
interpretations. In particular an alternative explanation is proposed for the
low-energy fission mode of 258Fm.Comment: 14 pages, 11 figures, 3 tables, submitted to Phys. Rev.
Action principles, restoration of BRS symmetry and the renormalization group equation for chiral non-Abelian gauge theories in dimensional renormalization with a non-anticommuting
The one-loop renormalization of a general chiral gauge theory without scalar
and Majorana fields is fully worked out within Breitenlohner and Maison
dimensional renormalization scheme. The coefficients of the anomalous terms
introduced in the Slavnov-Taylor equations by the minimal subtraction algorithm
are calculated and the asymmetric counterterms needed to restore the BRS
symmetry, if the anomaly cancellation conditions are met, are computed. The
renormalization group equation and its coefficients are worked out in the
anomaly free case. The computations draw heavily from the existence of action
principles and BRS cohomology theory.Comment: 86 pages, 14 figures, one table, plane te
Parity restoration in the Highly Truncated Diagonalization Approach: application to the outer fission barrier of Pu
The restoration of the parity symmetry has been performed in the framework of
the Highly Truncated Diagonalization Approach suited to treat correlations in
an explicitly particle-number conserving microscopic approach. To do so we have
assumed axial symmetry and used a generalized Wick's theorem due to L\"owdin in
a projection-after-variation scheme. We have chosen the Skyrme SkM
energy-density functional for the particle-hole channel and a
density-independent delta force for the residual interaction. We have applied
this approach in the region of the outer fission barrier of the Pu
nucleus. As a result, we have shown that the fission isomeric
state is statically unstable against intrinsic-parity breaking modes, while the
projection does not affect the energy at the top of the intrinsic outer fission
barrier. Altogether, this leads to an increase of the height of the outer
fission barrier--with respect to the fission isomeric state--by about 350 keV,
affecting thus significantly the fission-decay lifetime of the considered
fission isomer
Semi-naive dimensional renormalization
We propose a treatment of in dimensional regularization which is
based on an algebraically consistent extension of the Breitenlohner-Maison-'t
Hooft-Veltman (BMHV) scheme; we define the corresponding minimal
renormalization scheme and show its equivalence with a non-minimal BMHV scheme.
The restoration of the chiral Ward identities requires the introduction of
considerably fewer finite counterterms than in the BMHV scheme. This scheme is
the same as the minimal naive dimensional renormalization in the case of
diagrams not involving fermionic traces with an odd number of , but
unlike the latter it is a consistent scheme. As a simple example we apply our
minimal subtraction scheme to the Yukawa model at two loops in presence of
external gauge fields.Comment: 28 pages, 3 figure
The b -> s gamma decay revisited
In this work we compute the leading logarithmic corrections to the b -> s
gamma decay in a dimensional scheme which does not require any definition of
the gamma5 matrix. The scheme does not exhibit unconsistencies and it is
therefore a viable alternative to the t'Hooft Veltman scheme, particularly in
view of the next-to-leading computation. We confirm the recent results of
Ciuchini et al.Comment: 11 pages RevTeX + 2 EPSF figures, report IFUP-TH 2/94, HUTP-93/A038.
PostScript file or hardcopy available from the authors upon reques
Astrophysical Rates for Explosive Nucleosynthesis: Stellar and Laboratory Rates for Exotic Nuclei
A selected overview of stellar effects and reaction mechanisms with relevance
to the prediction of astrophysical reaction rates far off stability is
provided.Comment: 4 pages, 2 figures (contining 2 subfigures each); Proceedings of 10th
Intl. Conference on Nucleus-Nucleus Collisions, Beijing, China, August 2009;
to appear in Nuclear Physics
Module networks revisited: computational assessment and prioritization of model predictions
The solution of high-dimensional inference and prediction problems in
computational biology is almost always a compromise between mathematical theory
and practical constraints such as limited computational resources. As time
progresses, computational power increases but well-established inference
methods often remain locked in their initial suboptimal solution. We revisit
the approach of Segal et al. (2003) to infer regulatory modules and their
condition-specific regulators from gene expression data. In contrast to their
direct optimization-based solution we use a more representative centroid-like
solution extracted from an ensemble of possible statistical models to explain
the data. The ensemble method automatically selects a subset of most
informative genes and builds a quantitatively better model for them. Genes
which cluster together in the majority of models produce functionally more
coherent modules. Regulators which are consistently assigned to a module are
more often supported by literature, but a single model always contains many
regulator assignments not supported by the ensemble. Reliably detecting
condition-specific or combinatorial regulation is particularly hard in a single
optimum but can be achieved using ensemble averaging.Comment: 8 pages REVTeX, 6 figure
The anomaly in the central charge of the supersymmetric kink from dimensional regularization and reduction
We show that the anomalous contribution to the central charge of the
1+1-dimensional N=1 supersymmetric kink that is required for BPS saturation at
the quantum level can be linked to an analogous term in the extra momentum
operator of a 2+1-dimensional kink domain wall with spontaneous parity
violation and chiral domain wall fermions. In the quantization of the domain
wall, BPS saturation is preserved by nonvanishing quantum corrections to the
momentum density in the extra space dimension. Dimensional reduction from 2+1
to 1+1 dimensions preserves the unbroken N=1/2 supersymmetry and turns these
parity-violating contributions into the anomaly of the central charge of the
supersymmetric kink. On the other hand, standard dimensional regularization by
dimensional reduction from 1 to (1-epsilon) spatial dimensions, which also
preserves supersymmetry, obtains the anomaly from an evanescent counterterm.Comment: LATeX, 19 pages, v2: significantly extended section 4 on dimensional
reduction and evanescent counterterm
Dimensional renormalization of Yukawa theories wia Wilsonian methods
In the 't Hooft-Veltman dimensional regularization scheme it is necessary to
introduce finite counterterms to satisfy chiral Ward identities. It is a
non-trivial task to evaluate these counterterms even at two loops. We suggest
the use of Wilsonian exact renormalization group techniques to reduce the
computation of these counterterms to simple master integrals. We illustrate
this method by a detailed study of a generic Yukawa model with massless
fermions at two loops.Comment: 32 pages, 9 figures, revised version: minor errors corrected, a
reference adde
CacheZoom: How SGX Amplifies The Power of Cache Attacks
In modern computing environments, hardware resources are commonly shared, and
parallel computation is widely used. Parallel tasks can cause privacy and
security problems if proper isolation is not enforced. Intel proposed SGX to
create a trusted execution environment within the processor. SGX relies on the
hardware, and claims runtime protection even if the OS and other software
components are malicious. However, SGX disregards side-channel attacks. We
introduce a powerful cache side-channel attack that provides system adversaries
a high resolution channel. Our attack tool named CacheZoom is able to virtually
track all memory accesses of SGX enclaves with high spatial and temporal
precision. As proof of concept, we demonstrate AES key recovery attacks on
commonly used implementations including those that were believed to be
resistant in previous scenarios. Our results show that SGX cannot protect
critical data sensitive computations, and efficient AES key recovery is
possible in a practical environment. In contrast to previous works which
require hundreds of measurements, this is the first cache side-channel attack
on a real system that can recover AES keys with a minimal number of
measurements. We can successfully recover AES keys from T-Table based
implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems
(CHES '17
- …
