A Method of obtaining Polarized Neutron Beams
نویسندگان
چکیده
منابع مشابه
Problems in Obtaining Polarized E+ and E- Beams and Perspectives for Pep*
BSTRACT A matrix formalism for polarization calculation, as well as its omparison with other methods, is briefly discussed. The prediction for PEAR is compared with experimental measurements. An estimate is offered or the transverse polarization for PEP. Various schemes for obtaining he longitudinal polarization in PEP are studied. \ITRODUCTION As we know, PEP has now been officially dedicated ...
متن کاملLongitudinally Polarized Colliding Beams
The feasibility of experiments with the polarized colliding beams expands significantly possibilities of getting information on fundamental interactions. Even the use of the transversely polarized beams enables getting the more reliable and clear definition of spins for the intermediate states and final particles,1p2 as well as to introduce the precise absolute energy scale.3-s But only the use...
متن کاملElliptically Symmetric Polarized Beams
We study the free-propagation features of an optical field endowed with a non-uniform polarization pattern with elliptical symmetry. The fields derived in this way are called Elliptically Symmetric Polarized Beams (ESPB for short). Some properties of these fields are analysed. Moreover, it is shown how it is possible to obtain such light beams by applying the results to Bessel-Gauss beams.
متن کاملA Method of Obtaining Parasitic e or e− Beams during SLAC Linear Collider Operation
We have developed a technique that allows SLAC to provide parasitic low-intensity secondary e and e− beams up to 25 GeV to End Stations A and B and to the FFTB during SLC operation. This beam was successfully used for a one-month-long experimental run in End Station A by the SLAC E-146 collaboration. The experiment used 400 MeV to 25 GeV electron beams at intensities averaging one electron per ...
متن کاملA Method for Obtaining
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1937
ISSN: 0028-0836,1476-4687
DOI: 10.1038/140425a0