92,357 research outputs found

    Explicit Multimonopole Solutions in SU(N) Gauge Theory

    Get PDF
    We construct multimonopole solutions containing N-1 distinct fundamental monopoles in SU(N) gauge theory. When the gauge symmetry is spontaneously broken to U(1)^{N-1}, the monopoles are all massive, and we show that the fields can be written in terms of elementary function for all values of the monopole positions and phases. In the limit of unbroken U(1) X SU(N-2) X U(1) symmetry, the configuration can be viewed as containing a pair of massive monopoles, each carrying both U(1) and SU(N-2) magnetic charges, together with N-3 massless monopoles that condense into a cloud of non-Abelian fields. We obtain explicit expressions for the fields in the latter case and use these to analyze the properties of the non-Abelian cloud.Comment: 22 pages, no figure

    A pure-carbon ring transistor: The role of topology and structure

    Get PDF
    We report results on the rectification properties of a carbon nanotube (CNT) ring transistor, contacted by CNT leads, whose novel features have been recently communicated by Watanabe et al. [Appl. Phys. Lett. 78, 2928 (2001)]. This paper contains results which are validated by the experimental observations. Moreover, we report on additional features of the transmission of this ring device which are associated with the possibility of breaking the lead inversion symmetry. The linear conductance displays a "chessboard"-like behavior alternated with anomalous zero-lines which should be directly observable in experiments. We are also able to discriminate in our results structural properties (quasi-onedimensional confinement) from pure topological effects (ring configuration), thus helping to gain physical intuition on the rich ring phenomenology.Comment: 3 pages, 4 figure

    A dubiety-determining based model for database cumulated anomaly intrusion

    Get PDF
    The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions to change data beyond constraints in different operations and different transactions. It happens when some appearing to be authorized and normal transactions lead to certain accumulated results out of given thresholds. The existing intrusion techniques are unable to deal with CAs. This paper proposes a detection model, Dubiety-Determining Model (DDM), for Cumulated Anomaly. This model is mainly based on statistical theories and fuzzy set theories. It measures the dubiety degree, which is presented by a real number between 0 and 1, for each database transaction, to show the likelihood of a transaction to be intrusive. The algorithms used in the DDM are introduced. A DDM-based software architecture has been designed and implemented for monitoring database transactions. The experimental results show that the DDM method is feasible and effective

    Strong transmission and reflection of edge modes in bounded photonic graphene

    Get PDF
    The propagation of linear and nonlinear edge modes in bounded photonic honeycomb lattices formed by an array of rapidly varying helical waveguides is studied. These edge modes are found to exhibit strong transmission (reflection) around sharp corners when the dispersion relation is topologically nontrivial (trivial), and can also remain stationary. An asymptotic theory is developed that establishes the presence (absence) of edge states on all four sides, including in particular armchair edge states, in the topologically nontrivial (trivial) case. In the presence of topological protection, nonlinear edge solitons can persist over very long distances.Comment: 5 pages, 4 figures. Minor updates on the presentation and interpretation of results. The movies showing transmission and reflection of linear edge modes are available at https://www.youtube.com/watch?v=XhaZZlkMadQ and https://www.youtube.com/watch?v=R8NOw0NvRu

    Dispersive shock waves in the Kadomtsev-Petviashvili and Two Dimensional Benjamin-Ono equations

    Full text link
    Dispersive shock waves (DSWs) in the Kadomtsev-Petviashvili (KP) equation and two dimensional Benjamin-Ono (2DBO) equation are considered using parabolic front initial data. Employing a front tracking type ansatz exactly reduces the study of DSWs in two space one time (2+1) dimensions to finding DSW solutions of (1+1) dimensional equations. With this ansatz, the KP and 2DBO equations can be exactly reduced to cylindrical Korteweg-de Vries (cKdV) and cylindrical Benjamin-Ono (cBO) equations, respectively. Whitham modulation equations which describe DSW evolution in the cKdV and cBO equations are derived in general and Riemann type variables are introduced. DSWs obtained from the numerical solutions of the corresponding Whitham systems and direct numerical simulations of the cKdV and cBO equations are compared with excellent agreement obtained. In turn, DSWs obtained from direct numerical simulations of the KP and 2DBO equations are compared with the cKdV and cBO equations, again with remarkable agreement. It is concluded that the (2+1) DSW behavior along parabolic fronts can be effectively described by the DSW solutions of the reduced (1+1) dimensional equations.Comment: 25 Pages, 16 Figures. The movies showing dispersive shock wave propagation in Kadomtsev-Petviashvili II and Two Dimensional Benjamin-Ono equations are available at https://youtu.be/AExAQHRS_vE and https://youtu.be/aXUNYKFlke
    corecore