15,040 research outputs found

    CP Violation and Extra Dimensions

    Full text link
    It is shown that the new sources of CP violation can be generated in the models with more than one extra dimensions. In the supersymmetric models on the space-time M4×T2/Z2M^4\times T^2/Z_2, where the radius moduli have auxiliary vacuum expectation values and the supersymmetry breaking is mediated by the Kaluza-Klein states of gauge supermultiplets, we analyze the gaugino masses and trilinear couplings for two scenarios and obtain that there exist relative CP violating phases among the gaugino masses and trilinear couplings.Comment: Latex, 7 page

    Rare decay BXsl+lB\to X_sl^+l^- in a CP spontaneously broken two Higgs doublet model

    Full text link
    The Higgs boson mass spectrum and couplings of neutral Higgs bosons to fermions are worked out i n a CP spontaneously broken two Higgs doublet model in the large tanβ\beta case. The differential branching ratio, forward-backward asymmetry, CP asymmetry and lepton polarization for BXsl+lB\to X_s l^+ l^- are computed. It is shown that effects of neutral Higgs bosons are quite significant when tanβ\tan\beta is large. Especially, the CP violating normal polarization PNP_N can be as large as several percents.Comment: 27 pages, text updated, new numerical results include

    Cryptanalysis of a multi-party quantum key agreement protocol with single particles

    Full text link
    Recently, Sun et al. [Quant Inf Proc DOI: 10.1007/s11128-013-0569-x] presented an efficient multi-party quantum key agreement (QKA) protocol by employing single particles and unitary operations. The aim of this protocol is to fairly and securely negotiate a secret session key among NN parties with a high qubit efficiency. In addition, the authors claimed that no participant can learn anything more than his/her prescribed output in this protocol, i.e., the sub-secret keys of the participants can be kept secret during the protocol. However, here we points out that the sub-secret of a participant in Sun et al.'s protocol can be eavesdropped by the two participants next to him/her. In addition, a certain number of dishonest participants can fully determine the final shared key in this protocol. Finally, we discuss the factors that should be considered when designing a really fair and secure QKA protocol.Comment: 7 page

    Scales, Couplings Revisited and Low Energy Phenomenology in M-theory on S1/Z2S^1/Z_2

    Full text link
    We revisit the eleven dimension Planck scale, the physical scale of the eleventh dimension, the physical scale of Calabi-Yau manifold and coupling in hidden sector in M-theory on S1/Z2S^1/Z_2. And we discuss the reasonable bound on them. Considering F-term of dilaton and moduli SUSY breaking and choosing two repersentative points which correspond to scalar quasi-massless scenario and dilaton dominant SUSY breaking scenario respectively, we analyze experimental constraints to the parameter space. The sparticle spectrum and some phenomenological predictions are also given.Comment: 35 pages and 8 eps files. One error on fig1b is correcte

    Nonadiabatic molecular dynamics simulation: An approach based on quantum measurement picture

    Full text link
    Mixed-quantum-classical molecular dynamics simulation implies an effective measurement on the electronic states owing to continuously tracking the atomic forces.Based on this insight, we propose a quantum trajectory mean-field approach for nonadiabatic molecular dynamics simulations. The new protocol provides a natural interface between the separate quantum and classical treatments, without invoking artificial surface hopping algorithm. Moreover, it also bridges two widely adopted nonadiabatic dynamics methods, the Ehrenfest mean-field theory and the trajectory surface-hopping method. Excellent agreement with the exact results is illustrated with representative model systems, including the challenging ones for traditional methods
    corecore