2,393 research outputs found

    Transformations of coordinates and Hamiltonian formalism in deformed Special Relativity

    Full text link
    We investigate the transformation laws of coordinates in generalizations of special relativity with two observer-independent scales. The request of covariance leads to simple formulas if one assumes noncanonical Poisson brackets, corresponding to noncommuting spacetime coordinates.Comment: 11 pages, plain LaTe

    Universality of Highly Damped Quasinormal Modes for Single Horizon Black Holes

    Full text link
    It has been suggested that the highly damped quasinormal modes of black holes provide information about the microscopic quantum gravitational states underlying black hole entropy. This interpretation requires the form of the highly damped quasinormal mode frequency to be universally of the form: ωR=ln(l)kTBH\hbar\omega_R = \ln(l)kT_{BH}, where ll is an integer, and TBHT_{BH} is the black hole temperature. We summarize the results of an analysis of the highly damped quasinormal modes for a large class of single horizon, asymptotically flat black holes.Comment: 9 pages, 1 figure, submitted to the proceedings of Theory CANADA 1, which will be published in a special edition of the Canadian Journal of Physic

    Particle velocity in noncommutative space-time

    Full text link
    We investigate a particle velocity in the κ\kappa-Minkowski space-time, which is one of the realization of a noncommutative space-time. We emphasize that arrival time analyses by high-energy γ\gamma-rays or neutrinos, which have been considered as powerful tools to restrict the violation of Lorentz invariance, are not effective to detect space-time noncommutativity. In contrast with these examples, we point out a possibility that {\it low-energy massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake

    Deciding Full Branching Time Logic by Program Transformation

    Get PDF
    We present a method based on logic program transformation, for verifying Computation Tree Logic (CTL*) properties of finite state reactive systems. The finite state systems and the CTL* properties we want to verify, are encoded as logic programs on infinite lists. Our verification method consists of two steps. In the first step we transform the logic program that encodes the given system and the given property, into a monadic ω -program, that is, a stratified program defining nullary or unary predicates on infinite lists. This transformation is performed by applying unfold/fold rules that preserve the perfect model of the initial program. In the second step we verify the property of interest by using a proof method for monadic ω-program

    Born-Infeld black holes coupled to a massive scalar field

    Full text link
    Born-Infeld black holes in the Scalar-Tensor Theories of Gravity, in the case of massless scalar field, have been recently obtained. The aim of the current paper is to study the effect from the inclusion of a potential for the scalar field in the theory, through a combination of analytical techniques and numerical methods. The black holes coupled to a massive scalar field have richer causal structure in comparison to the massless scalar field case. In the latter case, the black holes may have a second, inner horizon. The presence of potential for the scalar field allows the existence of extremal black holes for certain values of the mass of the scalar field and the magnetic (electric) charge of the black hole. The linear stability against spherically symmetric perturbations is studied. Arguments in favor of the general stability of the solutions coming from the application of the "turning point" method are also presented.Comment: 26 pages, 16 figure

    Numerical Study of a Mixed Ising Ferrimagnetic System

    Full text link
    We present a study of a classical ferrimagnetic model on a square lattice in which the two interpenetrating square sublattices have spins one-half and one. This model is relevant for understanding bimetallic molecular ferrimagnets that are currently being synthesized by several experimental groups. We perform exact ground-state calculations for the model and employ Monte Carlo and numerical transfer-matrix techniques to obtain the finite-temperature phase diagram for both the transition and compensation temperatures. When only nearest-neighbor interactions are included, our nonperturbative results indicate no compensation point or tricritical point at finite temperature, which contradicts earlier results obtained with mean-field analysis.Comment: Figures can be obtained by request to [email protected] or [email protected]

    Drawing Arrangement Graphs In Small Grids, Or How To Play Planarity

    Full text link
    We describe a linear-time algorithm that finds a planar drawing of every graph of a simple line or pseudoline arrangement within a grid of area O(n^{7/6}). No known input causes our algorithm to use area \Omega(n^{1+\epsilon}) for any \epsilon>0; finding such an input would represent significant progress on the famous k-set problem from discrete geometry. Drawing line arrangement graphs is the main task in the Planarity puzzle.Comment: 12 pages, 8 figures. To appear at 21st Int. Symp. Graph Drawing, Bordeaux, 201

    Detector decoy quantum key distribution

    Full text link
    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement based quantum key distribution scheme with an untrusted source without the need of a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single photon security proof to its physical, full optical implementation. We show that in this scenario the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.Comment: 27 pages, 7 figure

    Equivalence of black hole thermodynamics between a generalized theory of gravity and the Einstein theory

    Get PDF
    We analyze black hole thermodynamics in a generalized theory of gravity whose Lagrangian is an arbitrary function of the metric, the Ricci tensor and a scalar field. We can convert the theory into the Einstein frame via a "Legendre" transformation or a conformal transformation. We calculate thermodynamical variables both in the original frame and in the Einstein frame, following the Iyer--Wald definition which satisfies the first law of thermodynamics. We show that all thermodynamical variables defined in the original frame are the same as those in the Einstein frame, if the spacetimes in both frames are asymptotically flat, regular and possess event horizons with non-zero temperatures. This result may be useful to study whether the second law is still valid in the generalized theory of gravity.Comment: 14 pages, no figure
    corecore