Theory of the Trojan-Horse Method

نویسندگان

  • Gerhard Baur
  • Stefan Typel
چکیده

The Trojan-Horse method is an indirect approach to determine the energy dependence of S factors of astrophysically relevant two-body reactions. This is accomplished by studying closely related three-body reactions under quasi-free scattering conditions. The basic theory of the Trojan-Horse method is developed starting from a post-form distorted wave Born approximation of the T-matrix element. In the surface approximation the cross section of the three-body reaction can be related to the S-matrix elements of the two-body reaction. The essential feature of the Trojan-Horse method is the effective suppression of the Coulomb barrier at low energies for the astrophysical reaction leading to finite cross sections at the threshold of the two-body reaction. In a modified plane wave approximation the relation between the two-body and three-body cross sections becomes very transparent. Applications of the Trojan Horse Method are discussed. It is of special interest that electron screening corrections are negligible due to the high projectile energy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extraction of Astrophysical Cross Sections in the Trojan-Horse Method

The Trojan-horse method has been proposed to extract S-matrix elements of a two-body reaction at astrophysical energies from a related reaction with three particles in the ®nal state. This should be useful in cases where the direct measurement of the two-body reaction at the necessary low energies is experimentally dif®cult. The formalism of the Trojan-horse method for nuclear reactions is deve...

متن کامل

ELT: A Trojan Horse in Disguise?

Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...

متن کامل

Transfer Reactions and Trojan Horse Method

It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction

متن کامل

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs

Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, an increasingly popular target of attacks. Due to their strong cryptographic properties an attacker is more likely to subvert them with malicious software, ie Trojan horse programs. We show that by fusing two techniques, our WORM-supported reliable input method and the Inte...

متن کامل

SOC IC Trojan Thwarting by Identification of Trojan

IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003