10,095 research outputs found
Effective potential for composite operators and for an auxiliary scalar field in a Nambu-Jona-Lasinio model
We derive the effective potentials for composite operators in a
Nambu-Jona-Lasinio (NJL) model at zero and finite temperature and show that in
each case they are equivalent to the corresponding effective potentials based
on an auxiliary scalar field. The both effective potentials could lead to the
same possible spontaneous breaking and restoration of symmetries including
chiral symmetry if the momentum cutoff in the loop integrals is large enough,
and can be transformed to each other when the Schwinger-Dyson (SD) equation of
the dynamical fermion mass from the fermion-antifermion vacuum (or thermal)
condensates is used. The results also generally indicate that two effective
potentials with the same single order parameter but rather different
mathematical expressions can still be considered physically equivalent if the
SD equation corresponding to the extreme value conditions of the two potentials
have the same form.Comment: 7 pages, no figur
Thermoelectric Properties of Silicon Carbide Nanowires with Nitrogen Dopants and Vacancies
The thermoelectric properties of cubic zincblend silicon carbide nanowires
(SiCNWs) with nitrogen impurities and vacancies along [111] direction are
theoretically studied by means of atomistic simulations. It is found that the
thermoelectric figure of merit ZT of SiCNWs can be significantly enhanced by
doping N impurities together with making Si vacancies. Aiming at obtaining a
large ZT, we study possible energetically stable configurations, and disclose
that, when N dopants locate at the center, a small number of Si vacancies at
corners are most favored for n-type nanowires, while a large number of Si
vacancies spreading into the flat edge sites are most favored for p-type
nanowires. For the SiCNW with a diameter of 1.1 nm and a length of 4.6 nm, the
ZT value for the n-type is shown capable of reaching 1.78 at 900K. The
conditions to get higher ZT values for longer SiCNWs are also addressed.Comment: 9 pages, 10 figure
Notes on Ghost Dark Energy
We study a phenomenological dark energy model which is rooted in the
Veneziano ghost of QCD. In this dark energy model, the energy density of dark
energy is proportional to Hubble parameter and the proportional coefficient is
of the order , where is the mass scale of QCD.
The universe has a de Sitter phase at late time and begins to accelerate at
redshift around . We also fit this model and give the
constraints on model parameters, with current observational data including
SnIa, BAO, CMB, BBN and Hubble parameter data. We find that the squared sound
speed of the dark energy is negative, which may cause an instability. We also
study the cosmological evolution of the dark energy with interaction with cold
dark matter.Comment: 20 pages,10 figures,Correct some typos and add new reference
Topology of Knotted Optical Vortices
Optical vortices as topological objects exist ubiquitously in nature. In this
paper, by making use of the -mapping topological current theory, we
investigate the topology in the closed and knotted optical vortices. The
topological inner structure of the optical vortices are obtained, and the
linking of the knotted optical vortices is also given.Comment: 11 pages, no figures, accepted by Commun. Theor. Phys. (Beijing, P.
R. China
Secure Wireless Communications Based on Compressive Sensing: A Survey
IEEE Compressive sensing (CS) has become a popular signal processing technique and has extensive applications in numerous fields such as wireless communications, image processing, magnetic resonance imaging, remote sensing imaging, and anology to information conversion, since it can realize simultaneous sampling and compression. In the information security field, secure CS has received much attention due to the fact that CS can be regarded as a cryptosystem to attain simultaneous sampling, compression and encryption when maintaining the secret measurement matrix. Considering that there are increasing works focusing on secure wireless communications based on CS in recent years, we produce a detailed review for the state-of-the-art in this paper. To be specific, the survey proceeds with two phases. The first phase reviews the security aspects of CS according to different types of random measurement matrices such as Gaussian matrix, circulant matrix, and other special random matrices, which establishes theoretical foundations for applications in secure wireless communications. The second phase reviews the applications of secure CS depending on communication scenarios such as wireless wiretap channel, wireless sensor network, internet of things, crowdsensing, smart grid, and wireless body area networks. Finally, some concluding remarks are given
New Spinor Field Realizations of the Non-Critical String
We investigate the new spinor field realizations of the algebra,
making use of the fact that the algebra can be linearized by the
addition of a spin-1 current. We then use these new realizations to build the
nilpotent Becchi-Rouet-Stora--Tyutin (BRST) charges of the spinor non-critical
string.Comment: 8 pages, no figures, revtex4 style, accepted by Chin. Phys. Let
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
Audio watermarking is a promising technology for copyright protection of audio data. Built upon the concept of spread spectrum (SS), many SS-based audio watermarking methods have been developed, where a pseudonoise (PN) sequence is usually used to introduce security. A major drawback of the existing SS-based audio watermarking methods is their low embedding capacity. In this paper, we propose a new SS-based audio watermarking method which possesses much higher embedding capacity while ensuring satisfactory imperceptibility and robustness. The high embedding capacity is achieved through a set of mechanisms: embedding multiple watermark bits in one audio segment, reducing host signal interference on watermark extraction, and adaptively adjusting PN sequence amplitude in watermark embedding based on the property of audio segments. The effectiveness of the proposed audio watermarking method is demonstrated by simulation examples
Rank-based image watermarking method with high embedding capacity and robustness
This paper presents a novel rank-based method for image watermarking. In the watermark embedding process, the host image is divided into blocks, followed by the 2-D discrete cosine transform (DCT). For each image block, a secret key is employed to randomly select a set of DCT coefficients suitable for watermark embedding. Watermark bits are inserted into an image block by modifying the set of DCT coefficients using a rank-based embedding rule. In the watermark detection process, the corresponding detection matrices are formed from the received image using the secret key. Afterward, the watermark bits are extracted by checking the ranks of the detection matrices. Since the proposed watermarking method only uses two DCT coefficients to hide one watermark bit, it can achieve very high embedding capacity. Moreover, our method is free of host signal interference. This desired feature and the usage of an error buffer in watermark embedding result in high robustness against attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method
Topological Properties of Spatial Coherence Function
Topology of the spatial coherence function is considered in details. The
phase singularity (coherence vortices) structures of coherence function are
classified by Hopf index and Brouwer degree in topology. The coherence flux
quantization and the linking of the closed coherence vortices are also studied
from the topological properties of the spatial coherence function.Comment: 9 page
Multiuser Multihop MIMO Relay System Design Based on Mutual Information Maximization
In this paper, we consider multiuser multihop relay communication systems, where the users, relays, and the destination node may have multiple antennas. We address the issue of source and relay precoding matrices design to maximize the system mutual information (MI). By exploiting the linkbetween the maximal MI and the weighted minimal mean-squared error (WMMSE) objective functions, we show that the intractable maximal MI-based source and relay optimization problem can be solved via the WMMSE-based source and relay design through an iterative approach which is guaranteed toconverge to at least a stationary point. For the WMMSE problem, we derive the optimal structure of the relay precoding matrices and show that the WMMSE matrix at the destination node can be decomposed into the sum of WMMSE matrices at all hops. Under a (moderately) high signal-to-noise ratio (SNR) condition, this WMMSE matrix decomposition significantly simplifies the solution to the WMMSE problem. Numerical simulations are performed to demonstrate the effectiveness of the proposed algorithm
- …