3 resultados para 2-b]thiophene

em Universitätsbibliothek Kassel, Universität Kassel, Germany


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The hyperfine structure and isotope shift of ^{221- 226}Ra and ^{212, 214}Ra have been measured in the ionic (Ra 11) transition 7s^2 S_{1/2} - 7p ^2 P_{3/2} (\lamda = 381.4 nm). The method of on-line collinear fast-beam laser spectroscopy has been applied using frequency-doubling of cw dye laser radiation in an external ring cavity. The magnetic hyperfine fields are compared with semi-empirical and ab initio calculations. The analysis of the quadrupole splitting by the same method yields the following, improved values of spectroscopic quadrupole moments: Q_s(^221 Ra)= 1.978(7)b, Q_s (^223 Ra)= 1.254(3)b and the reanalyzed values Q_s(^209 Ra) = 0.40(2)b, Q_s(^211 Ra) = 0.48(2)b, Q_s(^227 Ra)= 1.58(3)b, Q_s (^229 Ra) = 3.09(4)b with an additional scaling uncertainty of ±5%. Furthermore, the J-dependence of the isotope shift is analyzed in both Ra II transitions connecting the 7s^2 S_{1/2} ground state with the first excited doublet 7p^ P_{1/2} and 7p^ P_{3/2}.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper we champion Diophantus of Alexandria and Isabella Basmakova against Norbert Schappacher. In two publications ([46] and [47]) he puts forward inter alia two propositions: Questioning Diophantus' originality he considers affirmatively the possibility, that the Arithmetica are the joint work of a team of authors like Bourbaki. And he calls Basmakova's claim (in [5]), that Diophantus uses negative numbers, a "nonsense", reproaching her for her "thoughtlessness". First, we disprove Schappacher's Bourbaki thesis. Second, we investigate the semantic meaning and historical significance of Diophantus' keywords leipsis and mparxis. Next, we discuss Schappacher's epistemology of the history of mathematics and defend Basmakova's methods. Furthermore, we give 33 places where Diophantus uses negative quantities as intermediate results; they appear as differences a - b of positive rational numbers, the subtrahend b being bigger than the minuend a; they each represent the (negative) basis (pleyra) of a square number (tetragonos), which is afterwards computed by the formula (a - b)^2 = a^2 + b^2 - 2ab. Finally, we report how the topic "Diophantus and the negative numbers" has been dealt with by translators and commentators from Maximus Planudes onwards.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.