• No results found

Anisotropic flow of identified particles in Pb–Pb collisions at √sNN = 2.76 TeV measured with ALICE at the LHC

N/A
N/A
Protected

Academic year: 2020

Share "Anisotropic flow of identified particles in Pb–Pb collisions at √sNN = 2.76 TeV measured with ALICE at the LHC"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 4. The pT-differential v2 for different particle species [4](a), (b), (e), (f), measured with the scalar product method witha pseudo-rapidity gap |∆η| > 0.9 in Pb–Pb collisions at √sNN =2.76 TeV, compared to theoretical hydrodynamical calculationscoup
Figure 3. The pT-differential v2 for different particle species grouped by centrality class of Pb–Pb collisions at √sNN = 2.76 TeV [4].
Figure 6. v2(pT) scaling with the constituent number of quarks[4], nq, vs. transverse momentum, pT, per nq: ratio with respectthe proton fit for 10–20% (top) and 40–50% (bottom) centralityclasses.
Figure 7. Identified particle v2(pT) scaling with the constituentnumber of quarks [4], nq, vs
+3

References

Related documents

Findings of this study reveals that there is no significant difference between the mean scores of male and female students taught reading comprehension using

hami GK, and Ferguson SS (2006) Regulation of metabotropic glutamate receptor signaling, desensitization and endocytosis. Dhami GK, Babwah AV, Sterne-Marr R, and Ferguson SS

The performance of GLCM based features extraction and classification method in terms of detection accuracy is more efficient as compared to wavelet transform technique as

of molybdenum and tungsten with some donor ligands 9 Table 3: Examples ofMo(III) complexes obtained after!. the disproportionation ofMo(II)

The success of round improvement of very soft clay with vertical drains using preloading depends on the accguracy of design parameters and planning of proposed

The Digital audio watermarking has provide a efficient solutions for copyright protection of digital media by inserting a hidden data signal in the original audio signal, to

Note that the process of secret bit extraction can also be conducted separately, the data embedding technique may be used for many algorithms one of the best

Technical, Industrial, Vocational and Entrepreneurship Training (TIVET) is acknowledged as a means of transforming and empowering the youth with skills, knowledge and