10,095 research outputs found

    Effective potential for composite operators and for an auxiliary scalar field in a Nambu-Jona-Lasinio model

    Full text link
    We derive the effective potentials for composite operators in a Nambu-Jona-Lasinio (NJL) model at zero and finite temperature and show that in each case they are equivalent to the corresponding effective potentials based on an auxiliary scalar field. The both effective potentials could lead to the same possible spontaneous breaking and restoration of symmetries including chiral symmetry if the momentum cutoff in the loop integrals is large enough, and can be transformed to each other when the Schwinger-Dyson (SD) equation of the dynamical fermion mass from the fermion-antifermion vacuum (or thermal) condensates is used. The results also generally indicate that two effective potentials with the same single order parameter but rather different mathematical expressions can still be considered physically equivalent if the SD equation corresponding to the extreme value conditions of the two potentials have the same form.Comment: 7 pages, no figur

    Thermoelectric Properties of Silicon Carbide Nanowires with Nitrogen Dopants and Vacancies

    Full text link
    The thermoelectric properties of cubic zincblend silicon carbide nanowires (SiCNWs) with nitrogen impurities and vacancies along [111] direction are theoretically studied by means of atomistic simulations. It is found that the thermoelectric figure of merit ZT of SiCNWs can be significantly enhanced by doping N impurities together with making Si vacancies. Aiming at obtaining a large ZT, we study possible energetically stable configurations, and disclose that, when N dopants locate at the center, a small number of Si vacancies at corners are most favored for n-type nanowires, while a large number of Si vacancies spreading into the flat edge sites are most favored for p-type nanowires. For the SiCNW with a diameter of 1.1 nm and a length of 4.6 nm, the ZT value for the n-type is shown capable of reaching 1.78 at 900K. The conditions to get higher ZT values for longer SiCNWs are also addressed.Comment: 9 pages, 10 figure

    Notes on Ghost Dark Energy

    Full text link
    We study a phenomenological dark energy model which is rooted in the Veneziano ghost of QCD. In this dark energy model, the energy density of dark energy is proportional to Hubble parameter and the proportional coefficient is of the order ΛQCD3\Lambda^3_{QCD}, where ΛQCD\Lambda_{QCD} is the mass scale of QCD. The universe has a de Sitter phase at late time and begins to accelerate at redshift around zacc∼0.6z_{acc}\sim0.6. We also fit this model and give the constraints on model parameters, with current observational data including SnIa, BAO, CMB, BBN and Hubble parameter data. We find that the squared sound speed of the dark energy is negative, which may cause an instability. We also study the cosmological evolution of the dark energy with interaction with cold dark matter.Comment: 20 pages,10 figures,Correct some typos and add new reference

    Topology of Knotted Optical Vortices

    Full text link
    Optical vortices as topological objects exist ubiquitously in nature. In this paper, by making use of the Ï•\phi-mapping topological current theory, we investigate the topology in the closed and knotted optical vortices. The topological inner structure of the optical vortices are obtained, and the linking of the knotted optical vortices is also given.Comment: 11 pages, no figures, accepted by Commun. Theor. Phys. (Beijing, P. R. China

    Secure Wireless Communications Based on Compressive Sensing: A Survey

    Get PDF
    IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given

    New Spinor Field Realizations of the Non-Critical W3W_{3} String

    Full text link
    We investigate the new spinor field realizations of the W3W_{3} algebra, making use of the fact that the W3W_{3} algebra can be linearized by the addition of a spin-1 current. We then use these new realizations to build the nilpotent Becchi-Rouet-Stora--Tyutin (BRST) charges of the spinor non-critical W3W_{3} string.Comment: 8 pages, no figures, revtex4 style, accepted by Chin. Phys. Let

    Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals

    Get PDF
    Audio watermarking is a promising technology for copyright protection of audio data. Built upon the concept of spread spectrum (SS), many SS-based audio watermarking methods have been developed, where a pseudonoise (PN) sequence is usually used to introduce security. A major drawback of the existing SS-based audio watermarking methods is their low embedding capacity. In this paper, we propose a new SS-based audio watermarking method which possesses much higher embedding capacity while ensuring satisfactory imperceptibility and robustness. The high embedding capacity is achieved through a set of mechanisms: embedding multiple watermark bits in one audio segment, reducing host signal interference on watermark extraction, and adaptively adjusting PN sequence amplitude in watermark embedding based on the property of audio segments. The effectiveness of the proposed audio watermarking method is demonstrated by simulation examples

    Rank-based image watermarking method with high embedding capacity and robustness

    Get PDF
    This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method

    Topological Properties of Spatial Coherence Function

    Full text link
    Topology of the spatial coherence function is considered in details. The phase singularity (coherence vortices) structures of coherence function are classified by Hopf index and Brouwer degree in topology. The coherence flux quantization and the linking of the closed coherence vortices are also studied from the topological properties of the spatial coherence function.Comment: 9 page

    Multiuser Multihop MIMO Relay System Design Based on Mutual Information Maximization

    Get PDF
    In this paper, we consider multiuser multihop relay communication systems, where the users, relays, and the destination node may have multiple antennas. We address the issue of source and relay precoding matrices design to maximize the system mutual information (MI). By exploiting the linkbetween the maximal MI and the weighted minimal mean-squared error (WMMSE) objective functions, we show that the intractable maximal MI-based source and relay optimization problem can be solved via the WMMSE-based source and relay design through an iterative approach which is guaranteed toconverge to at least a stationary point. For the WMMSE problem, we derive the optimal structure of the relay precoding matrices and show that the WMMSE matrix at the destination node can be decomposed into the sum of WMMSE matrices at all hops. Under a (moderately) high signal-to-noise ratio (SNR) condition, this WMMSE matrix decomposition significantly simplifies the solution to the WMMSE problem. Numerical simulations are performed to demonstrate the effectiveness of the proposed algorithm
    • …
    corecore