24,926 research outputs found

    In-medium modification of P-wave charmonia from QCD sum rules

    Full text link
    We investigate the changes of the masses and widths of χc0\chi_{c0} and χc1\chi_{c1} in hot gluonic matter near TcT_c and in nuclear medium using QCD sum rules. As in the previous works for the J/ψJ/\psi and ηc\eta_c, in-medium effects are incorporated through the changes of gluon condensates. Twist-2 terms for the 3P0(χc0)^3 P_0 (\chi_{c0}) and 3P1(χc1)^3 P_1 (\chi_{c1}) are also included for the first time. The results show that larger mass shifts and width broadenings take place as compared to the SS-wave states. As the critical change take place near TcT_c, related measurements can reveal critical phenomenon in QCD.Comment: 7 pages, 6 figures, to be published in Phys.Rev.

    Noncommutative D-Brane in Non-Constant NS-NS B Field Background

    Get PDF
    We show that when the field strength H of the NS-NS B field does not vanish, the coordinates X and momenta P of an open string endpoints satisfy a set of mixed commutation relations among themselves. Identifying X and P with the coordinates and derivatives of the D-brane world volume, we find a new type of noncommutative spaces which is very different from those associated with a constant B field background.Comment: 11 pages, Latex, minor modification

    Distribution amplitudes and decay constants for (π,K,ρ,K)(\pi,K,\rho,K^*) mesons in light-front quark model

    Get PDF
    We present a calculation of the quark distribution amplitudes(DAs), the Gegenbauer moments, and decay constants for π,ρ,K\pi,\rho,K and KK^* mesons using the light-front quark model. While the quark DA for π\pi is somewhat broader than the asymptotic one, that for ρ\rho meson is very close to the asymptotic one. The quark DAs for KK and KK^* show asymmetric form due to the flavor SU(3)-symmetry breaking effect. The decay constants for the transversely polarized ρ\rho and KK^* mesons(fρTf^T_\rho and fKTf^T_{K^*}) as well as the longitudinally polarized ones(fρf_\rho and fKf_{K^*}) are also obtained. Our averaged values for fVT/fVf^T_V/f_V, i.e. (fρT/fρ)av=0.78(f^T_\rho/f_\rho)_{\rm av}=0.78 and (fKT/fK)av=0.84(f^T_{K^*}/f_{K^*})_{\rm av}=0.84, are found to be consistent with other model predictions. Especially, our results for the decay constants are in a good agreement with the SU(6) symmetry relation, fρ(K)T=(fπ(K)+fρ(K))/2f^T_{\rho(K^*)}=(f_{\pi(K)}+f_{\rho(K^*)})/2.Comment: 12 pages, 6figure

    Synchronization of Chaotic Oscillators due to Common Delay Time Modulation

    Full text link
    We have found a synchronization behavior between two identical chaotic systems^M when their delay times are modulated by a common irregular signal. ^M This phenomenon is demonstrated both in two identical chaotic maps whose delay times are driven by a common^M chaotic or random signal and in two identical chaotic oscillators whose delay times are driven by^M a signal of another chaotic oscillator. We analyze the phenomenon by using^M the Lyapunov exponents and discuss it in relation with generalized synchronization.^MComment: 5 pages, 4 figures (to be published in PRE

    Optical activity and transport in twisted bilayer graphene: the essence of spatial dispersion effects

    Full text link
    This study investigates optical activity and quantum transport in twisted bilayer graphene (TBG) systems, demonstrating that the former results from spatial dispersion effects. The transfer matrix method is used to solve the propagation of electromagnetic waves through two graphene layers that act as the coupling surfaces of a dielectric slab. The resulting optical conductivity tensor is decomposed into a local and a drag part, with the drag transverse conductivity σxy(drag)\sigma_{xy}^{(drag)} governing the TBG system's optical property. An effective continuum model is employed to analyze electron state formation and calculate relevant parts of the optical conductivity tensor. Correlation of electron motions leads to incomplete cancellation and a finite σxy(drag)\sigma_{xy}^{(drag)} in the chiral TBG lattice. The study also calculates DC conductivity, showing TBG supports quantum conductivity proportional to e2/he^2/h at the intrinsic Fermi energy.Comment: arXiv admin note: substantial text overlap with arXiv:2205.1267

    Non-Sequential Double Ionization is a Completely Classical Photoelectric Effect

    Full text link
    We introduce a unified and simplified theory of atomic double ionization. Our results show that at high laser intensities (I1014I \ge 10^{14} watts/cm2^2) purely classical correlation is strong enough to account for all of the main features observed in experiments to date

    Algebraic Model for scattering of three-s-cluster systems. II. Resonances in the three-cluster continuum of 6He and 6Be

    Get PDF
    The resonance states embedded in the three-cluster continuum of 6He and 6Be are obtained in the Algebraic Version of the Resonating Group Method. The model accounts for a correct treatment of the Pauli principle. It also provides the correct three-cluster continuum boundary conditions by using a Hyperspherical Harmonics basis. The model reproduces the observed resonances well and achieves good agreement with other models. A better understanding for the process of formation and decay of the resonance states in six-nucleon systems is obtained.Comment: 8 pages, 10 postscript figures, submitted to Phys. Rev.

    Detecting and characterizing lateral phishing at scale

    Get PDF
    We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefit-ting from both the implicit trust and the information in the hijacked user's account. We develop a classifier that finds hundreds of real-world lateral phishing emails, while generating under four false positives per every one-million employee-sent emails. Drawing on the attacks we detect, as well as a corpus of user-reported incidents, we quantify the scale of lateral phishing, identify several thematic content and recipient targeting strategies that attackers follow, illuminate two types of sophisticated behaviors that attackers exhibit, and estimate the success rate of these attacks. Collectively, these results expand our mental models of the 'enterprise attacker' and shed light on the current state of enterprise phishing attacks
    corecore