11,002 research outputs found

    Uniqueness of stochastic entropy solutions for stochastic balance laws with Lipschitz fluxes

    Full text link
    In this paper, we consider a stochastic balance law with a Lipschitz flux and gain the uniqueness for stochastic entropy solutions. The argument is supported by the stochastic kinetic formulation, the It\^{o} formula and the regularization techniques. Furthermore, as an application, we derive the uniqueness of stochastic entropy solutions for stochastic porous media type equations.Comment: This paper has been withdrawn by the author due to some mistakes in proof of the main resul

    Novel rotating hairy black hole in (2+1)-dimensions

    Full text link
    We present some novel rotating hairy black hole metric in (2+1)(2+1) dimensions, which is an exact solution to the field equations of the Einstein-scalar-AdS theory with a non-minimal coupling. The scalar potential is determined by the metric ansatz and consistency of the field equations and cannot be prescribed arbitrarily. In the simplified, critical case, the scalar potential contains two independent constant parameters, which are respectively related to the mass and angular momentum of the black hole in a particular way. As long as the angular momentum does not vanish, the metric can have zero, one or two horizons. The case with no horizon is physically uninteresting because of the curvature singularity lying at the origin. We identified the necessary conditions for at least one horizon to be present in the solution, which imposes some bound on the mass-angular momentum ratio. For some particular choice of parameters our solution degenerates into some previously known black hole solutions.Comment: 15 pages. v2: New references and minor correction

    Existence of stochastic entropy solutions for stochastic scalar balance laws with Lipschitz vector fields

    Full text link
    In this paper, we consider a scalar stochastic balance law and gain the existence for stochastic entropy solutions. Our proof relies on the BGK approximation and the generalized It\^{o} formula. Moreover, as an application, we derive the existence of stochastic entropy solutions for stochastic Buckley-Leverett type equations.Comment: This paper has been withdrawn by the author due to some mistakes in proof of Theorem 3.

    Critical phenomena and chemical potential of charged AdS black hole

    Full text link
    We study the thermodynamics and the chemical potential for a five-dimensional charged AdS black hole by treating the cosmological constant as the number of colors NN in the boundary gauge theory and its conjugate quantity as the associated chemical potential μ\mu. It is found that there exists a small-large black hole phase transition. The critical phenomena are investigated in the N2N^{2}-μ\mu chart. In particular, in the reduced parameter space, all the thermodynamic quantities can be rescaled with the black hole charge such that these reduced quantities are charge-independent. Then we obtain the coexistence curve and the phase diagram. The latent heat is also numerically calculated. Moreover, the heat capacity and the thermodynamic scalar are studied. The result indicates that the information of the first-order black hole phase transition is encoded in the heat capacity and scalar. However, the phase transition point cannot be directly calculated with them. Nevertheless, the critical point linked to a second-order phase transition can be determined by either the heat capacity or the scalar. In addition, we calculate the critical exponents of the heat capacity and the scalar for the saturated small and large black holes near the critical point.Comment: 17 pages, 17 figure

    Quasinormal Modes and Van der Waals like phase transition of charged AdS black holes in Lorentz symmetry breaking massive gravity

    Full text link
    Using the quasinormal modes of a massless scalar perturbation, we investigate the small/large black hole phase transition in the Lorentz symmetry breaking massive gravity. We mainly focus on two issues: i) the sign change of slope of the quasinormal mode frequencies in the complex-ω\omega diagram; ii) the behaviors of the imaginary part of the quasinormal mode frequencies along the isobaric or isothermal processes. For the first issue, our result shows that, at low fixed temperature or pressure, the phase transition can be probed by the sign change of slope. While increasing the temperature or pressure to some certain values near the critical point, there will appear the deflection point, which indicates that such method may not be appropriate to test the phase transition. In particular, the behavior of the quasinormal mode frequencies for the small and large black holes tend to the same at the critical point. For the second issue, it is shown that the non-monotonic behavior is observed only when the small/large black hole phase transition occurs. Therefore, this property can provide us with an additional method to probe the phase transition through the quasinormal modes.Comment: 12 pages, 10 figures, and 2 table

    Post-processing of the oblivious key in quantum private queries

    Full text link
    Quantum private query (QPQ) is a kind of quantum protocols to protect both users' privacy in their communication. There is an interesting example, that is, Alice wants to buy one item from Bob's database, which is composed of a quantity of valuable messages. QPQ protocol is the communication procedure ensuring that Alice can get only one item from Bob, and at the same time, Bob cannot know which one was taken by Alice. Owing to its practicability, quantum-key-distribution-based QPQ has draw much attention in recent years. However, the post-processing of the key in such protocols, called oblivious key, remains far from being satisfactorily known. Especially, the error correction method for such special key is still missing. Here we focus on the post-processing of the oblivious key, including both dilution and error correction. On the one hand, we demonstrate that the previous dilution method, which greatly reduces the communication complexity, will bring Alice the chance to illegally obtain much additional information about Bob's database. Simulations show that by very limited queries Alice can obtain the whole database. On the other hand, we present an effective error-correction method for the oblivious key, which completes its post-processing and makes such QPQ more practical.Comment: 11 pages, 5 figures, 3 table

    All-optical routing of single photons with multiple input and output ports by interferences

    Full text link
    We propose a waveguide-cavity coupled system to achieve the routing of photons by the phases of other photons. Our router has four input ports and four output ports. The transport of the coherent-state photons injected through any input port can be controlled by the phases of the coherent-state photons injected through other input ports. This control can be achieved when the mean numbers of the routed and control photons are small enough and require no additional control fields. Therefore, the all-optical routing of photons can be achieved at the single-photon level.Comment: Comments are welcome! 5 pages, 4 figure

    QKD-based quantum private query without a failure probability

    Full text link
    In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.Comment: 7 pages, 1 figur

    Thermodynamics of rotating black holes with scalar hair in three dimensions

    Full text link
    Introducing a new form of scalar potential V(Ï•)V(\phi), we derive a proper form of the rotating black hole solution in three-dimensional Einstein gravity with nonminimally coupled scalar field and find that the first law of thermodynamics of this new rotating hairy black hole can be protected, where the scalar field parameter BB is constrained to relate to the black hole size. We also disclose the Hawking-Page phase transition between this rotating hairy black holes and the pure thermal radiation. Moreover, we study phase transitions between this rotating hairy black hole and rotating BTZ black hole. Considering the matchings for the temperature and angular momentum, we find that the rotating BTZ black hole always has smaller free energy which is a thermodynamically more preferred phase. Additionally, we evaluate the thermodynamics of the rotating black hole with minimally coupled scalar hair in three dimensions, which exhibits that the thermodynamical behaviors of this rotating hairy black hole are very similar to those of the rotating black hole with nonminimally coupled scalar hair.Comment: 15 pages, 4 figures, minor changes, To be published in Phys. Rev.

    Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels

    Full text link
    A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can accomplish quantum key distribution with the help of a serving center. Due to the utilization of collective eavesdropping detection strategy, the users of the protocol just need have the ability of performing certain unitary operations. Furthermore, we present three fault-tolerant versions of the proposed protocol, which can combat with the errors over different collective-noise channels. The security of all the proposed protocols is guaranteed by the theorems on quantum operation discrimination.Comment: 10 pages, 3 figures,1 table / Revised according to the reviewers' comments / Changed title / Near to the published versio
    • …
    corecore