Search results for "Forb"
showing 10 items of 62 documents
Search forb→utransitions inB±→[K∓π±π0]DK±decays
2007
We report results from an updated study of the suppressed decays ${B}^{\ensuremath{-}}\ensuremath{\rightarrow}D{K}^{\ensuremath{-}}$ and ${B}^{\ensuremath{-}}\ensuremath{\rightarrow}{D}^{*}{K}^{\ensuremath{-}}$ followed by $D\ensuremath{\rightarrow}{K}^{+}{\ensuremath{\pi}}^{\ensuremath{-}}$, where ${D}^{(*)}$ indicates a ${D}^{(*)0}$ or a ${\overline{D}}^{(*)0}$ meson, and ${D}^{*}\ensuremath{\rightarrow}D{\ensuremath{\pi}}^{0}$ or ${D}^{*}\ensuremath{\rightarrow}D\ensuremath{\gamma}$. These decays are sensitive to the Cabibbo-Kobayashi-Maskawa unitarity triangle angle $\ensuremath{\gamma}$ due to interference between the $b\ensuremath{\rightarrow}c$ transition ${B}^{\ensuremath{-}}\ensure…
ROSELYNE FORBIN D’OPPÈDE: POLITICA, DEMOCRAZIA E RELIGIONE NEL DIBATTITO LEGITTIMISTA FRANCESE DELLA SECONDA METÀ DEL XIX SECOLO
2015
Double β Decay and the Axial Strength
2019
Quenching of the weak axial strength gA is discussed and relations of this quenching to the nuclear matrix elements of double beta decays are highlighted. An analysis of Gamow-Teller transitions in the mass range A = 62 − 142 is presented and its results are compared with those of many previous works. The enhancement of the axial charge is discussed for first-forbidden pseudoscalar β transitions. Higher-forbidden β transitions are introduced and their role in determining the effective value of gA is examined, in particular from the point of view of the β-decay half-lives and the shapes of electron spectra of forbidden non-unique β transitions. peerReviewed
Searches for rare or forbidden semileptonic charm decays
2011
We present searches for rare or forbidden charm decays of the form $X_c^+\to h^\pm\ell^\mp\ell^{(\prime)+}$, where $X_c^+$ is a charm hadron ($D^+$, $D^+_s$, or $\Lambda_c^+$), $h^\pm$ is a pion, kaon, or proton, and $\ell^{(\prime)\pm}$ is an electron or muon. The analysis is based on $384 fb^{-1}$ of $e^+e^-$ annihilation data collected at or close to the $\Upsilon(4S)$ resonance with the BaBar detector at the SLAC National Accelerator Laboratory. No significant signal is observed for any of the 35 decay modes that are investigated. We establish 90% confidence-level upper limits on the branching fractions between $1 \times 10^{-6}$ and $44 \times 10^{-6}$ depending on the channel. In most…
Value of the Axial-Vector Coupling Strength in β and ββ Decays : A Review
2017
In this review the quenching of the weak axial-vector coupling constant, $g_{\rm A}$, is discussed in nuclear $\beta$ and double-$\beta$ decays. On one hand, the nuclear-medium and nuclear many-body effects are separated, and on the other hand the quenching is discussed from the points of view of different many-body methods and different $\beta$-decay and double-$\beta$-decay processes. Both the historical background and the present status are reviewed and contrasted against each other. The theoretical considerations are tied to performed and planned measurements, and possible new measurements are urged, whenever relevant and doable. Relation of the quenching problem to the measurements of …
PROFORBIOMED: le biomasse per il Mediterraneo
2013
INTERVISTA DIVULGATIVA DEL PROGETTO PROFORBIOMED
"Una coppia di serpenti allacciati". L'incesto nelle "Benevole" di Jonathan Littell
2020
The article reads the novel "The Kindly Ones" (2006) by French author Jonathan Littell and focuses on the issue of incest displayed in the plot.
Text Compression Using Antidictionaries
1999
International audience; We give a new text compression scheme based on Forbidden Words ("antidictionary"). We prove that our algorithms attain the entropy for balanced binary sources. They run in linear time. Moreover, one of the main advantages of this approach is that it produces very fast decompressors. A second advantage is a synchronization property that is helpful to search compressed data and allows parallel compression. Our algorithms can also be presented as "compilers" that create compressors dedicated to any previously fixed source. The techniques used in this paper are from Information Theory and Finite Automata.
Minimal forbidden words and factor automata
1998
International audience; Let L(M) be the (factorial) language avoiding a given antifactorial language M. We design an automaton accepting L(M) and built from the language M. The construction is eff ective if M is finite. If M is the set of minimal forbidden words of a single word v, the automaton turns out to be the factor automaton of v (the minimal automaton accepting the set of factors of v). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a non-trivial upper bound on the number of minimal forbidden words of a word.
What drives diners' eco-friendly behaviour? The moderating role of planning routine
2021
Research focusing on diners' intentions towards leftovers, which are considered one of the main sources of consumer food waste in restaurants, is still at a nascent stage and requires further investigation. The present study attempts to address this gap by investigating the antecedents of diners' intentions to take away leftovers and thereby mitigate food waste in an out-of-home setting. Towards this end, we examined the role of personal and social norms as antecedents of the facilitators, inhibitors, and intentions of taking away leftovers. Using the theoretical lens of the Stimulus-Organism-Response (SOR) paradigm, we tested the proposed hypotheses by analysing data collected from 281 din…