5,507 research outputs found

    Exact Solution of the Asymmetric Exclusion Model with Particles of Arbitrary Size

    Full text link
    A generalization of the simple exclusion asymmetric model is introduced. In this model an arbitrary mixture of molecules with distinct sizes s=0,1,2,...s = 0,1,2,..., in units of lattice space, diffuses asymmetrically on the lattice. A related surface growth model is also presented. Variations of the distribution of molecules's sizes may change the excluded volume almost continuously. We solve the model exactly through the Bethe ansatz and the dynamical critical exponent zz is calculated from the finite-size corrections of the mass gap of the related quantum chain. Our results show that for an arbitrary distribution of molecules the dynamical critical behavior is on the Kardar-Parizi-Zhang (KPZ) universality.Comment: 28 pages, 2 figures. To appear in Phys. Rev. E (1999

    A Generalized Duality Transformation of the Anisotropic Xy Chain in a Magnetic Field

    Full text link
    We consider the anisotropic XYXY chain in a magnetic field with special boundary conditions described by a two-parameter Hamiltonian. It is shown that the exchange of the parameters corresponds to a similarity transformation, which reduces in a special limit to the Ising duality transformation.Comment: 6 pages, LaTeX, BONN-HE-93-4

    Critical Behaviour of Mixed Heisenberg Chains

    Full text link
    The critical behaviour of anisotropic Heisenberg models with two kinds of antiferromagnetically exchange-coupled centers are studied numerically by using finite-size calculations and conformal invariance. These models exhibit the interesting property of ferrimagnetism instead of antiferromagnetism. Most of our results are centered in the mixed Heisenberg chain where we have at even (odd) sites a spin-S (S') SU(2) operator interacting with a XXZ like interaction (anisotropy Δ\Delta). Our results indicate universal properties for all these chains. The whole phase, 1>Δ>11>\Delta>-1, where the models change from ferromagnetic (Δ=1)( \Delta=1 ) to ferrimagnetic (Δ=1)(\Delta=-1) behaviour is critical. Along this phase the critical fluctuations are ruled by a c=1 conformal field theory of Gaussian type. The conformal dimensions and critical exponents, along this phase, are calculated by studying these models with several boundary conditions.Comment: 21 pages, standard LaTex, to appear in J.Phys.A:Math.Ge

    The Wave Functions for the Free-Fermion Part of the Spectrum of the SUq(N)SU_q(N) Quantum Spin Models

    Full text link
    We conjecture that the free-fermion part of the eigenspectrum observed recently for the SUq(N)SU_q(N) Perk-Schultz spin chain Hamiltonian in a finite lattice with q=exp(iπ(N1)/N)q=\exp (i\pi (N-1)/N) is a consequence of the existence of a special simple eigenvalue for the transfer matrix of the auxiliary inhomogeneous SUq(N1)SU_q(N-1) vertex model which appears in the nested Bethe ansatz approach. We prove that this conjecture is valid for the case of the SU(3) spin chain with periodic boundary condition. In this case we obtain a formula for the components of the eigenvector of the auxiliary inhomogeneous 6-vertex model (q=exp(2iπ/3)q=\exp (2 i \pi/3)), which permit us to find one by one all components of this eigenvector and consequently to find the eigenvectors of the free-fermion part of the eigenspectrum of the SU(3) spin chain. Similarly as in the known case of the SUq(2)SU_q(2) case at q=exp(i2π/3)q=\exp(i2\pi/3) our numerical and analytical studies induce some conjectures for special rates of correlation functions.Comment: 25 pages and no figure

    GAPS IN THE HEISENBERG-ISING MODEL

    Full text link
    We report on the closing of gaps in the ground state of the critical Heisenberg-Ising chain at momentum π\pi. For half-filling, the gap closes at special values of the anisotropy Δ=cos(π/Q)\Delta= \cos(\pi/Q), QQ integer. We explain this behavior with the help of the Bethe Ansatz and show that the gap scales as a power of the system size with variable exponent depending on Δ\Delta. We use a finite-size analysis to calculate this exponent in the critical region, supplemented by perturbation theory at Δ0\Delta\sim 0. For rational 1/r1/r fillings, the gap is shown to be closed for {\em all} values of Δ\Delta and the corresponding perturbation expansion in Δ\Delta shows a remarkable cancellation of various diagrams.Comment: 12 RevTeX pages + 4 figures upon reques

    One dimensional strongly interacting Luttinger liquid of lattice spinless fermions

    Full text link
    The spinless fermion model with hard core repulsive potential extended on a few lattice sites is considered.The Luttinger liquid behaviour is studied for the different values of a hard core radius. A critical exponent of the one particle correlation function for arbitrary electron density and coupling constant are obtained.Comment: 4 pages, 4 figures, Late

    On the density matrix for the kink ground state of higher spin XXZ chain

    Full text link
    The exact expression for the density matrix of the kink ground state of higher spin XXZ chain is obtained

    The XX-model with boundaries. Part III:Magnetization profiles and boundary bound states

    Full text link
    We calculate the magnetization profiles of the σjx\sigma_j^x and σjz\sigma_j^z operators for the XX-model with hermitian boundary terms. We study the profiles on the finite chain and in the continuum limit. The results are discussed in the context of conformal invariance. We also discuss boundary excitations and their effect on the magnetization profiles.Comment: 30 pages, 3 figure

    Stealthy Deception Attacks Against SCADA Systems

    Full text link
    SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a fake view of the industrial process, deceiving the human operator into taking manual actions. Our most advanced attack also manipulates the messages generated by the operator's actions, reversing their semantic meaning while causing the HMI to present a view that is consistent with the attempted human actions. The attacks are totaly stealthy because the message sizes and timing, the command sequences, and the data values of the ICS's state all remain legitimate. We implemented and tested several attack scenarios in the test lab of our local electric company, against a real HMI and real PLCs, separated by a commercial-grade firewall. We developed a real-time security assessment tool, that can simultaneously manipulate the communication to multiple PLCs and cause the HMI to display a coherent system--wide fake view. Our tool is configured with message-manipulating rules written in an ICS Attack Markup Language (IAML) we designed, which may be of independent interest. Our semantic attacks all successfully fooled the operator and brought the system to states of blackout and possible equipment damage

    Excited states in the twisted XXZ spin chain

    Full text link
    We compute the finite size spectrum for the spin 1/2 XXZ chain with twisted boundary conditions, for anisotropy in the regime 0<γ<π/20< \gamma <\pi/2, and arbitrary twist θ\theta. The string hypothesis is employed for treating complex excitations. The Bethe Ansatz equtions are solved within a coupled non-linear integral equation approach, with one equation for each type of string. The root-of-unity quantum group invariant periodic chain reduces to the XXZ_1/2 chain with a set of twist boundary conditions (π/γZ\pi/\gamma\in Z, θ\theta an integer multiple of γ\gamma). For this model, the restricted Hilbert space corresponds to an unitary conformal field theory, and we recover all primary states in the Kac table in terms of states with specific twist and strings.Comment: 16 pages, Latex; added discussion on quantum group invariance and arbitrary magnon numbe
    corecore