Feeds

Scientists brew up 'missing link' isotope

Doubly magic nickel-78

  • alert
  • submit to reddit

Top three mobile application threats

Scientists at Michigan State University have succeeded in recreating an isotope of nickel they say is a "missing link" in the process by which precious metals are formed in supernovae.

German and US boffins working at the National Superconducting Cyclotron Laboratory (NSCL) fired atoms of a stable isotpe of krypton at a beryllium plate. In the process, they were able to create 11 nickel-78 (Ni-78) atoms - a highly unstable isotope consisting of 28 protons and 50 neutrons - and determine its life at just 110 milliseconds.

Ni-78 does not exist in nature, SpaceDaily.com reports, but the NSCL team says it must have existed as a key step in the "progressive decay of isotopes [resulting] in the synthesis of precious metals in exploding stars".

Hendrik Schatz, an associate professor of physics at the NSCL, explained: "Every gold atom you find in the gold on your ring, every one of those atoms has gone through such a process. We've now seen a link in the chain - one that controlled everything."

The NSCL team is also fired up about Ni-78's "doubly magic" properties, ie, "the number of protons and number of neutrons are in a subatomically tidy package that makes it easier to study". Doctoral student Paul Hosmer clarified: "It's like studying a bunch of cats and dogs. The groups are a lot easier to keep track of if they're in a pen. That, basically, is what being doubly magic is - an isotope with the protons and neutrons in defined pens. The 28 protons and 50 neutrons are more stable and less reactive when they're penned up."

Professor Schatz will present the NSCL findings at an American Physical Society meeting in Tampa, Florida, on Sunday. ®

Related stories

Physicists freeze light, propose optical CPUs
The truth about tritium
Air is heavier than we thought, admit scientists

High performance access to file storage

More from The Register

next story
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
KILLER ROBOTS, DNA TAMPERING and PEEPING CYBORGS: the future looks bright!
Americans optimistic about technology despite being afraid of EVERYTHING
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.