3,950 research outputs found
Antiproton-Proton Channels in J/psi Decays
The recent measurements by the BES Collaboration of J/psi decays into a
photon and a proton-antiproton pair indicate a strong enhancement at the
proton-antiproton threshold not observed in the decays into a neutral pion and
a proton-antiproton pair. Is this enhancement due to a proton-antiproton
quasi-bound state or a baryonium? A natural explanation follows from a
traditional model of proton-antiproton interactions based on G-parity
transformation. The observed proton-antiproton structure is due to a strong
attraction in the 1S0 state, and possibly to a near-threshold quasi-bound state
in the 11S0 wave.Comment: 6 pages, 5 figures. The antiproton-proton pair being in isospin one
in the J/Psi decay into neutral pion-antiproton-proton, the antiproton-proton
1P1 and 3S1 waves have been replaced by the 31P1 and 33S1 ones and Figs. 1
and 2 have been replaced accordingly. Conclusions are unchanged. Most of the
content of the paper is published in Phys. Rev. C72, 011001 (2005
Godel Universe from String Theory
G\"odel universe is a direct product of a line and a three-dimensional
spacetime we call G. In this paper, we show that the G\"odel metrics
can arise as exact solutions in Einstein-Maxwell-Axion, Einstein-Proca-Axion,
or Freedman-Schwarz gauged supergravity theories. The last allows us to embed
G\"odel universe in string theory. The ten-dimensional spacetime is a direct
product of a line and the nine-dimensional one of an bundle
over G, and it can be interpreted as some decoupling limit of the
rotating D1/D5/D5 intersection. For some appropriate parameter choice, the
nine-dimensional metric becomes an AdS bundle over squashed
3-sphere. We also study the properties of the G\"odel black holes that are
constructed from the double Wick rotations of the G\"odel metrics.Comment: latex, 20 pages, discussion on null-energy condition included, typos
corrected and references adde
Godel Metrics with Chronology Protection in Horndeski Gravities
G\"odel universe, one of the most interesting exact solutions predicted by
General Relativity, describes a homogeneous rotating universe containing naked
closed time-like curves (CTCs). It was shown that such CTCs are the consequence
of the null energy condition in General Relativity. In this paper, we show that
the G\"odel-type metrics with chronology protection can emerge in
Einstein-Horndeski gravity. We construct such exact solutions also in
Einstein-Horndeski-Maxwell and Einstein-Horndeski-Proca theories.Comment: Latex, 11 pages, references adde
Magnetization plateau and incommensurate spin modulation in Ca3Co2O6
The magnetic properties of a trigonal prism unit of the spin-2 frustrated
compound Ca3Co2O6 are studied by means of the density-matrix renormalization
group method. A magnetization plateau at ( is the saturation
magnetization) with ferrimagnetic structure is observed. By fitting the
experimental data of magnetic curve, an estimation of the couplings gives
J1=-26.84K, J_{2}=0.39K, and J_{3}=0.52K. The local magnetic moments are
unveiled to exhibit an incommensurate sinusoidally modulation along the three
chains of the trigonal prism, which gives a strong theoretical support to the
experimentally observed incommensurate partially disordered antiferromagnetic
state for Ca3Co2O6. The present result suggests that the modulation indeed
originates from the competition of antiferromagnetic and ferromagnetic
couplings.Comment: 4 pages, 4 figures, accepted by Appl. Phys. Lett
Secure Quantum Secret Sharing Based on Reusable GHZ States as Secure Carriers
We show a potential eavesdropper can eavesdrop whole secret information when
the legitimate users use secure carrier to encode and decode classical
information repeatedly in the protocol [proposed in Bagherinezhad S and
Karimipour V 2003 Phys. Rev. A \textbf{67} 044302]. Then we present a revised
quantum secret sharing protocol by using Greenberger-Horne-Zeilinger state as
secure carrier. Our protocol can resist Eve's attack
Improving the security of quantum direct communication with authentication
Two protocols of quantum direct communication with authentication [Phys. Rev.
A {\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this
paper we will show that in the two protocols the authenticator Trent should be
prevented from knowing the secret message of communication. The first protocol
can be eavesdropped by Trent using the the intercept-measure-resend attack,
while the second protocol can be eavesdropped by Trent using single-qubit
measurement. To fix these leaks, I revise the original versions of the
protocols by using the Pauli-Z operation instead of the original
bit-flip operation . As a consequence, the protocol securities are improved.Comment: Any suggestion,comment or help is welcome
- âŠ