Search results for "forbidden"

showing 10 items of 36 documents

Value of the Axial-Vector Coupling Strength in β and ββ Decays : A Review

2017

In this review the quenching of the weak axial-vector coupling constant, $g_{\rm A}$, is discussed in nuclear $\beta$ and double-$\beta$ decays. On one hand, the nuclear-medium and nuclear many-body effects are separated, and on the other hand the quenching is discussed from the points of view of different many-body methods and different $\beta$-decay and double-$\beta$-decay processes. Both the historical background and the present status are reviewed and contrasted against each other. The theoretical considerations are tied to performed and planned measurements, and possible new measurements are urged, whenever relevant and doable. Relation of the quenching problem to the measurements of …

Semileptonic decayParticle physicsaxial-vector coupling strengthMaterials Science (miscellaneous)Biophysicsforbidden beta decaysGeneral Physics and Astronomy01 natural sciencesbeta spectra0103 physical sciencesPhysical and Theoretical Chemistry010306 general physicsPseudovectorMathematical PhysicsPhysicsQuenchingCoupling constantdouble beta decaysCoupling strength010308 nuclear & particles physicsmuon captureNuclear matterlcsh:QC1-999Muon capturecharge-exchange reactionsGamow-Teller beta decaysValue (mathematics)lcsh:Physicsstrength functions
researchProduct

"Una coppia di serpenti allacciati". L'incesto nelle "Benevole" di Jonathan Littell

2020

The article reads the novel "The Kindly Ones" (2006) by French author Jonathan Littell and focuses on the issue of incest displayed in the plot.

Settore L-FIL-LET/14 - Critica Letteraria E Letterature Comparateincest eros and literature forbidden racism gender issues
researchProduct

Text Compression Using Antidictionaries

1999

International audience; We give a new text compression scheme based on Forbidden Words ("antidictionary"). We prove that our algorithms attain the entropy for balanced binary sources. They run in linear time. Moreover, one of the main advantages of this approach is that it produces very fast decompressors. A second advantage is a synchronization property that is helpful to search compressed data and allows parallel compression. Our algorithms can also be presented as "compilers" that create compressors dedicated to any previously fixed source. The techniques used in this paper are from Information Theory and Finite Automata.

Theoretical computer scienceFinite-state machineComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010102 general mathematicsforbidden wordData_CODINGANDINFORMATIONTHEORY0102 computer and information sciencesInformation theory01 natural sciencesfinite automatonParallel compressionpattern matching010201 computation theory & mathematicsEntropy (information theory)Pattern matching0101 mathematicsTime complexityAlgorithmdata compressioninformation theoryData compression
researchProduct

Minimal forbidden words and factor automata

1998

International audience; Let L(M) be the (factorial) language avoiding a given antifactorial language M. We design an automaton accepting L(M) and built from the language M. The construction is eff ective if M is finite. If M is the set of minimal forbidden words of a single word v, the automaton turns out to be the factor automaton of v (the minimal automaton accepting the set of factors of v). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a non-trivial upper bound on the number of minimal forbidden words of a word.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESfailure functionfactor code[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Büchi automatonComputerApplications_COMPUTERSINOTHERSYSTEMS[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciencesavoiding a wordω-automaton01 natural sciencesfactorial languageReversible cellular automatonCombinatoricsDeterministic automatonanti-factorial languageNondeterministic finite automaton0101 mathematicsMathematicsfactor automatonPowerset constructionLevenshtein automaton010102 general mathematicsforbidden wordComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)16. Peace & justiceNonlinear Sciences::Cellular Automata and Lattice GasesTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematicsProbabilistic automatonPhysics::Accelerator PhysicsComputer Science::Programming LanguagesHigh Energy Physics::ExperimentComputer Science::Formal Languages and Automata Theory
researchProduct

Chromatic sums for colorings avoiding monochromatic subgraphs

2015

Abstract Given graphs G and H, a vertex coloring c : V ( G ) → N is an H-free coloring of G if no color class contains a subgraph isomorphic to H. The H-free chromatic number of G, χ ( H , G ) , is the minimum number of colors in an H-free coloring of G. The H-free chromatic sum of G , Σ ( H , G ) , is the minimum value achieved by summing the vertex colors of each H-free coloring of G. We provide a general bound for Σ ( H , G ) , discuss the computational complexity of finding this parameter for different choices of H, and prove an exact formulas for some graphs G. For every integer k and for every graph H, we construct families of graphs, G k with the property that k more colors than χ ( …

Vertex (graph theory)Computational complexity theoryApplied MathematicsChromatic sumValue (computer science)forbidden subgraphsCombinatoricsGreedy coloringIntegerQA1-939sum of colorsDiscrete Mathematics and CombinatoricsChromatic scaleMonochromatic colorcoloringMathematicsMathematicsDiscussiones Mathematicae Graph Theory
researchProduct

EBIT diagnostics using X-ray spectra of highly ionized Ne

2003

We have carried out a detailed analysis of highly ionized neon spectra collected at the NIST EBIT using an NTD germanium X-ray microcalorimeter developed at the Harvard-Smithsonian Center for Astrophysics [Nucl. Instr. and Meth. A 444 (2000) 156]. Our attention was focused especially on the Ne IX He-like triplet to check electron density diagnostics through the intercombination/forbidden line ratio. We have investigated possible effects of the ion dynamics on the plasma emission line intensities, looking at the dependence of the count-rate and the charge state distribution on the electron beam energy and current. The temperature and spatial distribution of the neon ions, and hence the overl…

X-ray spectraNuclear and High Energy PhysicsElectron densityEBITChemistrySurfaces Coatings and Filmchemistry.chemical_elementFizikai tudományokSurfaces and InterfacesPlasmaIonNeonSettore FIS/05 - Astronomia E AstrofisicaTermészettudományokIonizationAstrophysical plasmaPhysics::Atomic PhysicsEmission spectrumAtomic physicsIonization of atomForbidden mechanismInstrumentationExcitation
researchProduct

Presentations of constrained systems with unconstrained positions

2005

International audience; We give a polynomial-time construction of the set of sequences that satisfy a finite-memory constraint defined by a finite list of forbidden blocks, with a specified set of bit positions unconstrained. Such a construction can be used to build modulation/error-correction codes (ECC codes) like the ones defined by the Immink-Wijngaarden scheme in which certain bit positions are reserved for ECC parity. We give a lineartime construction of a finite-state presentation of a constrained system defined by a periodic list of forbidden blocks. These systems, called periodic-finite-type systems, were introduced by Moision and Siegel. Finally, we present a linear-time algorithm for con…

[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]finite-memory systemperiodic-finite-type (PFT) system[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technologyLibrary and Information Sciences01 natural sciencesModulation coding0202 electrical engineering electronic engineering information engineeringMathematicsDiscrete mathematicsChannel codefinite-state encodermodulation codeDAWG020206 networking & telecommunicationsDirected graphDirected acyclic graphforbidden blockComputer Science ApplicationsFinite sequence010201 computation theory & mathematicscodeError detection and correctionrun-length limited (RLL) codesInformation SystemsCoding (social sciences)maximum transition run (MTR)
researchProduct

Spectral shapes of forbidden argon β decays as background component for rare-event searches

2018

The spectral shape of the electrons from the two first-forbidden unique ${\beta }^{-}$ decays of 39Ar and 42Ar were calculated for the first time to the next-to-leading order. Especially the spectral shape of the 39Ar decay can be used to characterize this background component for dark matter searches based on argon. Alternatively, due to the low thresholds of these experiments, the spectral shape can be investigated over a wide energy range with high statistics and thus allow a sensitive comparison with the theoretical predictions, in particular at low electron energies where the shape of the computed β spectrum has a slight dependence on the value of the weak axial-vector coupling constan…

background componentforbidden argon β decayrare-event searchesspectral shapes
researchProduct

Microscopic calculation of the $\beta^-$ decays of $^{151}$Sm, $^{171}$Tm, and $^{210}$Pb with implications to detection of the cosmic neutrino backg…

2023

The electron spectral shapes corresponding to the low-$Q$ $\beta^-$-decay transitions $^{151}$Sm$(5/2^-_{\rm g.s.})\to\,^{151}\textrm{Eu}(5/2^+_{\rm g.s.})$, $^{151}$Sm$(5/2^-_{\rm g.s.})\to\,^{151}\textrm{Eu}(7/2^+_{1})$, $^{171}$Tm$(1/2^+_{\rm g.s.})\to\,^{171}\textrm{Yb}(1/2^-_{\rm g.s.})$, $^{171}$Tm$(1/2^+_{\rm g.s.})\to\,^{171}\textrm{Yb}(3/2^-_{1})$, $^{210}\textrm{Pb}(0^+_{\rm g.s.})\to\,^{210}\textrm{Bi}(1^-_{\rm g.s.})$, and $^{210}\textrm{Pb}(0^+_{\rm g.s.})\to\,^{210}\textrm{Bi}(0^-_{1})$ have been computed using beta-decay theory with several refinements for these first-forbidden nonunique (ff-nu) $\beta^-$ transitions. These ff-nu $\beta^-$ transitions have non-trivial electro…

beta spectral shapesNuclear and High Energy Physicsxi-approximationIBFM-2Nuclear Theoryshell modelfirst-forbidden nonunique beta transitionsneutriinotFOS: Physical sciencesNuclear Theory (nucl-th)cosmic neutrino backgroundkosminen taustasäteilyydinfysiikkaPTOLEMY
researchProduct

Beta-spectrum shapes of forbidden β decays

2018

The neutrinoless [Formula: see text] decay of atomic nuclei continues to attract fervent interest due to its potential to confirm the possible Majorana nature of the neutrino, and thus the nonconservation of the lepton number. At the same time, the direct dark matter experiments are looking for weakly interacting massive particles (WIMPs) through their scattering on nuclei. The neutrino-oscillation experiments on reactor antineutrinos base their analyses on speculations of [Formula: see text]-spectrum shapes of nuclear decays, thus leading to the notorious “reactor antineutrino anomaly.” In all these experimental efforts, one encounters the problem of [Formula: see text]-spectrum shapes of…

direct dark matter searchNuclear and High Energy Physicsaxial-vector coupling strengthSHELL modelforbidden beta decaysdouble beta decay01 natural sciencesNuclear physicsDouble beta decay0103 physical sciencesBeta (velocity)beta spectrum shapes010306 general physicsreactor antineutrino anomalyaxial-charge matrix elementPhysicsta114010308 nuclear & particles physicsSpectrum (functional analysis)Astronomy and AstrophysicsAtomic and Molecular Physics and OpticsMAJORANAAtomic nucleusHigh Energy Physics::ExperimentNeutrinoInternational Journal of Modern Physics A
researchProduct