50,413 research outputs found
Realization of the N(odd)-dimensional Quantum Euclidean Space by Differential Operators
The quantum Euclidean space R_{q}^{N} is a kind of noncommutative space which
is obtained from ordinary Euclidean space R^{N} by deformation with parameter
q. When N is odd, the structure of this space is similar to R_{q}^{3}.
Motivated by realization of R_{q}^{3} by differential operators in R^{3}, we
give such realization for R_{q}^{5} and R_{q}^{7} cases and generalize our
results to R_{q}^{N} (N odd) in this paper, that is, we show that the algebra
of R_{q}^{N} can be realized by differential operators acting on C^{infinite}
functions on undeformed space R^{N}.Comment: 10 pages, LaTe
Polarization screening and induced carrier density at the interface of LaAlO overlayer on SrTiO (001)
We investigate the role of lattice polarization in determination of induced
carrier density at the -type interface of LaAlO overlayer on SrTiO
(001) by carrying out density-functional-theory calculations. When no oxygen
vacancy or defect is present, the magnitude of polarization screening in the
LaAlO layers is found to be correlated with the carrier charge induced at
the interface. For the interfaces with a few LaAlO layers, the induced
charge carrier is compensated by the electrostatic screening and consequently
its density remains far less than 0.5 electrons per unit cell.Comment: 4 pages, 4 figure
Properties of h-deformed quantum (super)matrices
We investigate the -deformed quantum (super)group of matrices
and use a kind of contraction procedure to prove that the -th power of this
deformed quantum (super)matrix is quantum (super)matrix with the deformation
parameter .Comment: Accepted by International Journal of Theoretical Physic
An ideal multi-secret sharing scheme based on minimal privileged coalitions
How to construct an ideal multi-secret sharing scheme for general access
structures is difficult. In this paper, we solve an open problem proposed by
Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342],
namely to design an algorithm of privileged coalitions of any length if such
coalitions exist. Furthermore, in terms of privileged coalitions, we show that
most of the existing multi-secret sharing schemes based on Shamir threshold
secret sharing are not perfect by analyzing Yang et al.'s scheme and Pang et
al.'s scheme. Finally, based on the algorithm mentioned above, we devise an
ideal multi-secret sharing scheme for families of access structures, which
possesses more vivid authorized sets than that of the threshold scheme.Comment: 13page
- …