109 research outputs found

    Reflection principles for harmonic and polyharmonic functions

    Get PDF

    Complete Break Up of Ortho Positronium (Ps)- Hydrogenic ion System

    Full text link
    The dynamics of the complete breakup process in an Ortho Ps - He+ system including electron loss to the continuum (ELC) is studied where both the projectile and the target get ionized. The process is essentially a four body problem and the present model takes account of the two centre effect on the electron ejected from the Ps atom which is crucial for a proper description of the ELC phenomena. The calculations are performed in the framework of Coulomb Distorted Eikonal Approximation. The exchange effect between the target and the projectile electron is taken into account in a consistent manner. The proper asymptotic 3-body boundary condition for this ionization process is also satisfied in the present model. A distinct broad ELC peak is noted in the fully differential cross sections (5DCS) for the Ps electron corroborating qualitatively the experiment for the Ps - He system. Both the dynamics of the ELC from the Ps and the ejected electron from the target He+ in the FDCS are studied using coplanar geometry. Interesting features are noted in the FDCS for both the electrons belonging to the target and the projectile.Comment: 14 pages,7 figure

    Hot Spots and Transition from d-Wave to Another Pairing Symmetry in the Electron-Doped Cuprate Superconductors

    Full text link
    We present a simple theoretical explanation for a transition from d-wave to another superconducting pairing observed in the electron-doped cuprates. The d_{x^2-y^2} pairing potential Delta, which has the maximal magnitude and opposite signs at the hot spots on the Fermi surface, becomes suppressed with the increase of electron doping, because the hot spots approach the Brillouin zone diagonals, where Delta vanishes. Then, the d_{x^2-y^2} pairing is replaced by either singlet s-wave or triplet p-wave pairing. We argue in favor of the latter and discuss experiments to uncover it.Comment: 6 pages, 4 figures, RevTeX 4. V.2: Extra figure and many references added. V.3: Minor update of references for the proof

    Surface electronic structure of Sr2RuO4

    Full text link
    We have addressed the possibility of surface ferromagnetism in Sr2RuO4 by investigating its surface electronic states by angle-resolved photoemission spectroscopy (ARPES). By cleaving samples under different conditions and using various photon energies, we have isolated the surface from the bulk states. A comparison with band structure calculations indicates that the ARPES data are most readily explained by a nonmagnetic surface reconstruction.Comment: 4 pages, 4 figures, RevTex, submitted to Phys. Rev.

    Sharp Trace Hardy-Sobolev-Maz'ya Inequalities and the Fractional Laplacian

    Get PDF
    In this work we establish trace Hardy and trace Hardy-Sobolev-Maz'ya inequalities with best Hardy constants, for domains satisfying suitable geometric assumptions such as mean convexity or convexity. We then use them to produce fractional Hardy-Sobolev-Maz'ya inequalities with best Hardy constants for various fractional Laplacians. In the case where the domain is the half space our results cover the full range of the exponent s(0,1)s \in (0,1) of the fractional Laplacians. We answer in particular an open problem raised by Frank and Seiringer \cite{FS}.Comment: 42 page

    Electron Dynamics in Nd1.85_{1.85}Ce.15_{.15}CuO4+δ_{4+\delta}: Evidence for the Pseudogap State and Unconventional c-axis Response

    Full text link
    Infrared reflectance measurements were made with light polarized along the a- and c-axis of both superconducting and antiferromagnetic phases of electron doped Nd1.85_{1.85}Ce.15_{.15}CuO4+δ_{4+\delta}. The results are compared to characteristic features of the electromagnetic response in hole doped cuprates. Within the CuO2_2 planes the frequency dependent scattering rate, 1/τ(ω)\tau(\omega), is depressed below \sim 650 cm1^{-1}; this behavior is a hallmark of the pseudogap state. While in several hole doped compounds the energy scales associated with the pseudogap and superconducting states are quite close, we are able to show that in Nd1.85_{1.85}Ce.15_{.15}CuO4+δ_{4+\delta} the two scales differ by more than one order of magnitude. Another feature of the in-plane charge response is a peak in the real part of the conductivity, σ1(ω)\sigma_1(\omega), at 50-110 cm1^{-1} which is in sharp contrast with the Drude-like response where σ1(ω)\sigma_1(\omega) is centered at ω=0\omega=0. This latter effect is similar to what is found in disordered hole doped cuprates and is discussed in the context of carrier localization. Examination of the c-axis conductivity gives evidence for an anomalously broad frequency range from which the interlayer superfluid is accumulated. Compelling evidence for the pseudogap state as well as other characteristics of the charge dynamics in Nd1.85_{1.85}Ce.15_{.15}CuO4+δ_{4+\delta} signal global similarities of the cuprate phase diagram with respect to electron and hole doping.Comment: Submitted to PR

    Doping dependence of the gap anisotropy in LCCO studied by millimeter-wave spectroscopy

    Full text link
    We measure the penetration depth of optimally doped and underdoped La2-xCexCuO4 in the millimeter frequency domain (4 - 7 cm-1) and for temperatures 2 K < T < 300 K. The penetration depth as function of temperature reveals significant changes on electron doping. It shows quadratic temperature dependence in underdoped samples, but increases almost exponentially at optimal doping. Significant changes in the gap anisotropy (or even in the gap symmetry) may account for this transition.Comment: 4 pages, 4 figure

    The Behavioral Roots of Information Systems Security:Exploring Key Factors Related to Unethical IT Use

    Get PDF
    Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals, organizations, and society in terms of the threat to information systems (IS) security. While there is a growing body of work on this phenomenon, we notice several gaps, limitations, and inconsistencies in the literature. In order to further understand this complex phenomenon and reconcile past findings, we conduct an exploratory study to uncover the nomological network of key constructs salient to this phenomenon, and the nature of their interrelationships. Using a scenario-based study of young adult participants, and both linear and nonlinear analyses, we uncover key nuances of this phenomenon of unethical IT use. We find that unethical IT use is a complex phenomenon, often characterized by nonlinear and idiosyncratic relationships between the constructs that capture it. Overall, ethical beliefs held by the individuals, along with economic, social, and technological considerations are found to be relevant to this phenomenon. In terms of practical implications, these results suggest that multiple interventions at various levels may be required to combat this growing threat to IS security
    corecore