Search results for "forbidden"
showing 10 items of 36 documents
Value of the Axial-Vector Coupling Strength in β and ββ Decays : A Review
2017
In this review the quenching of the weak axial-vector coupling constant, $g_{\rm A}$, is discussed in nuclear $\beta$ and double-$\beta$ decays. On one hand, the nuclear-medium and nuclear many-body effects are separated, and on the other hand the quenching is discussed from the points of view of different many-body methods and different $\beta$-decay and double-$\beta$-decay processes. Both the historical background and the present status are reviewed and contrasted against each other. The theoretical considerations are tied to performed and planned measurements, and possible new measurements are urged, whenever relevant and doable. Relation of the quenching problem to the measurements of …
"Una coppia di serpenti allacciati". L'incesto nelle "Benevole" di Jonathan Littell
2020
The article reads the novel "The Kindly Ones" (2006) by French author Jonathan Littell and focuses on the issue of incest displayed in the plot.
Text Compression Using Antidictionaries
1999
International audience; We give a new text compression scheme based on Forbidden Words ("antidictionary"). We prove that our algorithms attain the entropy for balanced binary sources. They run in linear time. Moreover, one of the main advantages of this approach is that it produces very fast decompressors. A second advantage is a synchronization property that is helpful to search compressed data and allows parallel compression. Our algorithms can also be presented as "compilers" that create compressors dedicated to any previously fixed source. The techniques used in this paper are from Information Theory and Finite Automata.
Minimal forbidden words and factor automata
1998
International audience; Let L(M) be the (factorial) language avoiding a given antifactorial language M. We design an automaton accepting L(M) and built from the language M. The construction is eff ective if M is finite. If M is the set of minimal forbidden words of a single word v, the automaton turns out to be the factor automaton of v (the minimal automaton accepting the set of factors of v). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a non-trivial upper bound on the number of minimal forbidden words of a word.
Chromatic sums for colorings avoiding monochromatic subgraphs
2015
Abstract Given graphs G and H, a vertex coloring c : V ( G ) → N is an H-free coloring of G if no color class contains a subgraph isomorphic to H. The H-free chromatic number of G, χ ( H , G ) , is the minimum number of colors in an H-free coloring of G. The H-free chromatic sum of G , Σ ( H , G ) , is the minimum value achieved by summing the vertex colors of each H-free coloring of G. We provide a general bound for Σ ( H , G ) , discuss the computational complexity of finding this parameter for different choices of H, and prove an exact formulas for some graphs G. For every integer k and for every graph H, we construct families of graphs, G k with the property that k more colors than χ ( …
EBIT diagnostics using X-ray spectra of highly ionized Ne
2003
We have carried out a detailed analysis of highly ionized neon spectra collected at the NIST EBIT using an NTD germanium X-ray microcalorimeter developed at the Harvard-Smithsonian Center for Astrophysics [Nucl. Instr. and Meth. A 444 (2000) 156]. Our attention was focused especially on the Ne IX He-like triplet to check electron density diagnostics through the intercombination/forbidden line ratio. We have investigated possible effects of the ion dynamics on the plasma emission line intensities, looking at the dependence of the count-rate and the charge state distribution on the electron beam energy and current. The temperature and spatial distribution of the neon ions, and hence the overl…
Presentations of constrained systems with unconstrained positions
2005
International audience; We give a polynomial-time construction of the set of sequences that satisfy a finite-memory constraint defined by a finite list of forbidden blocks, with a specified set of bit positions unconstrained. Such a construction can be used to build modulation/error-correction codes (ECC codes) like the ones defined by the Immink-Wijngaarden scheme in which certain bit positions are reserved for ECC parity. We give a lineartime construction of a finite-state presentation of a constrained system defined by a periodic list of forbidden blocks. These systems, called periodic-finite-type systems, were introduced by Moision and Siegel. Finally, we present a linear-time algorithm for con…
Spectral shapes of forbidden argon β decays as background component for rare-event searches
2018
The spectral shape of the electrons from the two first-forbidden unique ${\beta }^{-}$ decays of 39Ar and 42Ar were calculated for the first time to the next-to-leading order. Especially the spectral shape of the 39Ar decay can be used to characterize this background component for dark matter searches based on argon. Alternatively, due to the low thresholds of these experiments, the spectral shape can be investigated over a wide energy range with high statistics and thus allow a sensitive comparison with the theoretical predictions, in particular at low electron energies where the shape of the computed β spectrum has a slight dependence on the value of the weak axial-vector coupling constan…
Microscopic calculation of the $\beta^-$ decays of $^{151}$Sm, $^{171}$Tm, and $^{210}$Pb with implications to detection of the cosmic neutrino backg…
2023
The electron spectral shapes corresponding to the low-$Q$ $\beta^-$-decay transitions $^{151}$Sm$(5/2^-_{\rm g.s.})\to\,^{151}\textrm{Eu}(5/2^+_{\rm g.s.})$, $^{151}$Sm$(5/2^-_{\rm g.s.})\to\,^{151}\textrm{Eu}(7/2^+_{1})$, $^{171}$Tm$(1/2^+_{\rm g.s.})\to\,^{171}\textrm{Yb}(1/2^-_{\rm g.s.})$, $^{171}$Tm$(1/2^+_{\rm g.s.})\to\,^{171}\textrm{Yb}(3/2^-_{1})$, $^{210}\textrm{Pb}(0^+_{\rm g.s.})\to\,^{210}\textrm{Bi}(1^-_{\rm g.s.})$, and $^{210}\textrm{Pb}(0^+_{\rm g.s.})\to\,^{210}\textrm{Bi}(0^-_{1})$ have been computed using beta-decay theory with several refinements for these first-forbidden nonunique (ff-nu) $\beta^-$ transitions. These ff-nu $\beta^-$ transitions have non-trivial electro…
Beta-spectrum shapes of forbidden β decays
2018
The neutrinoless [Formula: see text] decay of atomic nuclei continues to attract fervent interest due to its potential to confirm the possible Majorana nature of the neutrino, and thus the nonconservation of the lepton number. At the same time, the direct dark matter experiments are looking for weakly interacting massive particles (WIMPs) through their scattering on nuclei. The neutrino-oscillation experiments on reactor antineutrinos base their analyses on speculations of [Formula: see text]-spectrum shapes of nuclear decays, thus leading to the notorious “reactor antineutrino anomaly.” In all these experimental efforts, one encounters the problem of [Formula: see text]-spectrum shapes of…