Trojan horse particle invariance: The impact on nuclear astrophysics
- Laboratori Nazionali del Sud - INFN, Catania (Italy)
- Universitá di Catania and Laboratori Nazionali del Sud - INFN (Italy)
- Texas A and M University, Commerce (United States)
- Texas A and M University, College Station, Texas (United States)
- Moscow State University, Moscow (Russian Federation)
- Universitá di Catania and Laboratori Nazionali del Sud - INFN, Catania (Italy)
- Universitá Kore, Enna (Italy)
In the current picture of nuclear astrophysics indirect methods and, in particular, the Trojan Horse Method cover a crucial role for the measurement of charged particle induced reactions cross sections of astrophysical interest, in the energy range required by the astrophysical scenarios. To better understand its cornerstones and its applications to physical cases many tests were performed to verify all its properties and the possible future perspectives. The key to the method is the quasi-free break-up and some of its properties will be investigated in the present work. In particular, the Trojan Horse nucleus invariance will be studied and previous studies will be extended to the cases of the binary d(d, p)t and {sup 6}Li(d,α){sup 4}He reactions, which were tested using different quasi-free break-up's, namely {sup 6}Li and {sup 3}He. The astrophysical S(E)-factor were then extracted with the Trojan Horse formalism applied to the two different break-up schemes and compared with direct data as well as with previous indirect investigations. The very good agreement confirms the independence of binary indirect cross section on the chosen spectator particle also for these reactions.
- OSTI ID:
- 22280461
- Journal Information:
- AIP Conference Proceedings, Journal Name: AIP Conference Proceedings Journal Issue: 1 Vol. 1594; ISSN APCPCS; ISSN 0094-243X
- Country of Publication:
- United States
- Language:
- English
Similar Records
Trojan horse particle invariance studied with the {sup 6}Li(d,{alpha}){sup 4}He and {sup 7}Li(p,{alpha}){sup 4}He reactions
Distortion effects in Trojan Horse applications