3,696 research outputs found

    Characteristic length of a Holographic Superconductor with dd-wave gap

    Full text link
    After the discovery of the ss-wave and pp-wave holographic superconductors, holographic models of dd-wave superconductor have also been constructed recently. We study analytically the perturbation of the dual gravity theory to calculate the superconducting coherence length ξ\xi of the dd-wave holographic superconductor near the superconducting phase transition point. The superconducting coherence length ξ\xi divergents as (1T/Tc)1/2(1-T/T_c)^{-1/2} near the critical temperature TcT_c. We also obtain the magnetic penetration depth λ(TcT)1/2\lambda\propto(T_c-T)^{-1/2} by adding a small external homogeneous magnetic field. The results agree with the ss-wave and pp-wave models, which are also the same as the Ginzburg-Landau theory.Comment: last version, 10 pages, accepted by PR

    d-wave Holographic Superconductor Vortex Lattice and Non-Abelian Holographic Superconductor Droplet

    Full text link
    A d-wave holographic superconductor is studied under a constant magnetic field by perturbation method, we obtain both droplet and triangular vortex lattice solution. The results are the same as the s-wave holographic superconductor. The non-Abelian holographic superconductor with p+ipp+ip-wave background is also studied under magnetic field, unlike the d-wave and s-wave models, we find that the non-Abelian model has only droplet solution.Comment: Version2, 12 pages,2 figures. Accepted by PR

    Quantum Cloning Machines and the Applications

    Full text link
    No-cloning theorem is fundamental for quantum mechanics and for quantum information science that states an unknown quantum state cannot be cloned perfectly. However, we can try to clone a quantum state approximately with the optimal fidelity, or instead, we can try to clone it perfectly with the largest probability. Thus various quantum cloning machines have been designed for different quantum information protocols. Specifically, quantum cloning machines can be designed to analyze the security of quantum key distribution protocols such as BB84 protocol, six-state protocol, B92 protocol and their generalizations. Some well-known quantum cloning machines include universal quantum cloning machine, phase-covariant cloning machine, the asymmetric quantum cloning machine and the probabilistic quantum cloning machine etc. In the past years, much progress has been made in studying quantum cloning machines and their applications and implementations, both theoretically and experimentally. In this review, we will give a complete description of those important developments about quantum cloning and some related topics. On the other hand, this review is self-consistent, and in particular, we try to present some detailed formulations so that further study can be taken based on those results.Comment: 98 pages, 12 figures, 400+ references. Physics Reports (published online
    corecore