2,440 research outputs found
Transformations of coordinates and Hamiltonian formalism in deformed Special Relativity
We investigate the transformation laws of coordinates in generalizations of
special relativity with two observer-independent scales. The request of
covariance leads to simple formulas if one assumes noncanonical Poisson
brackets, corresponding to noncommuting spacetime coordinates.Comment: 11 pages, plain LaTe
Universality of Highly Damped Quasinormal Modes for Single Horizon Black Holes
It has been suggested that the highly damped quasinormal modes of black holes
provide information about the microscopic quantum gravitational states
underlying black hole entropy. This interpretation requires the form of the
highly damped quasinormal mode frequency to be universally of the form:
, where is an integer, and is the
black hole temperature. We summarize the results of an analysis of the highly
damped quasinormal modes for a large class of single horizon, asymptotically
flat black holes.Comment: 9 pages, 1 figure, submitted to the proceedings of Theory CANADA 1,
which will be published in a special edition of the Canadian Journal of
Physic
Particle velocity in noncommutative space-time
We investigate a particle velocity in the -Minkowski space-time,
which is one of the realization of a noncommutative space-time. We emphasize
that arrival time analyses by high-energy -rays or neutrinos, which
have been considered as powerful tools to restrict the violation of Lorentz
invariance, are not effective to detect space-time noncommutativity. In
contrast with these examples, we point out a possibility that {\it low-energy
massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake
Deciding Full Branching Time Logic by Program Transformation
We present a method based on logic program transformation, for verifying Computation Tree Logic (CTL*) properties of finite state reactive systems. The finite state systems and the CTL* properties we want to verify, are encoded as logic programs on infinite lists. Our verification method consists of two steps. In the first step we transform the logic program that encodes the given system and the given property, into a monadic ω -program, that is, a stratified program defining nullary or unary predicates on infinite lists. This transformation is performed by applying unfold/fold rules that preserve the perfect model of the initial program. In the second step we verify the property of interest by using a proof method for monadic ω-program
Born-Infeld black holes coupled to a massive scalar field
Born-Infeld black holes in the Scalar-Tensor Theories of Gravity, in the case
of massless scalar field, have been recently obtained. The aim of the current
paper is to study the effect from the inclusion of a potential for the scalar
field in the theory, through a combination of analytical techniques and
numerical methods. The black holes coupled to a massive scalar field have
richer causal structure in comparison to the massless scalar field case. In the
latter case, the black holes may have a second, inner horizon. The presence of
potential for the scalar field allows the existence of extremal black holes for
certain values of the mass of the scalar field and the magnetic (electric)
charge of the black hole. The linear stability against spherically symmetric
perturbations is studied. Arguments in favor of the general stability of the
solutions coming from the application of the "turning point" method are also
presented.Comment: 26 pages, 16 figure
Numerical Study of a Mixed Ising Ferrimagnetic System
We present a study of a classical ferrimagnetic model on a square lattice in
which the two interpenetrating square sublattices have spins one-half and one.
This model is relevant for understanding bimetallic molecular ferrimagnets that
are currently being synthesized by several experimental groups. We perform
exact ground-state calculations for the model and employ Monte Carlo and
numerical transfer-matrix techniques to obtain the finite-temperature phase
diagram for both the transition and compensation temperatures. When only
nearest-neighbor interactions are included, our nonperturbative results
indicate no compensation point or tricritical point at finite temperature,
which contradicts earlier results obtained with mean-field analysis.Comment: Figures can be obtained by request to [email protected] or
[email protected]
Drawing Arrangement Graphs In Small Grids, Or How To Play Planarity
We describe a linear-time algorithm that finds a planar drawing of every
graph of a simple line or pseudoline arrangement within a grid of area
O(n^{7/6}). No known input causes our algorithm to use area
\Omega(n^{1+\epsilon}) for any \epsilon>0; finding such an input would
represent significant progress on the famous k-set problem from discrete
geometry. Drawing line arrangement graphs is the main task in the Planarity
puzzle.Comment: 12 pages, 8 figures. To appear at 21st Int. Symp. Graph Drawing,
Bordeaux, 201
Detector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many
practical quantum cryptographic setups. In this paper, we employ a simple
method to estimate the statistics provided by such a photon number resolving
detector using only a threshold detector together with a variable attenuator.
This idea is similar in spirit to that of the decoy state technique, and is
specially suited for those scenarios where only a few parameters of the photon
number statistics of the incoming signals have to be estimated. As an
illustration of the potential applicability of the method in quantum
communication protocols, we use it to prove security of an entanglement based
quantum key distribution scheme with an untrusted source without the need of a
squash model and by solely using this extra idea. In this sense, this detector
decoy method can be seen as a different conceptual approach to adapt a single
photon security proof to its physical, full optical implementation. We show
that in this scenario the legitimate users can now even discard the double
click events from the raw key data without compromising the security of the
scheme, and we present simulations on the performance of the BB84 and the
6-state quantum key distribution protocols.Comment: 27 pages, 7 figure
Equivalence of black hole thermodynamics between a generalized theory of gravity and the Einstein theory
We analyze black hole thermodynamics in a generalized theory of gravity whose
Lagrangian is an arbitrary function of the metric, the Ricci tensor and a
scalar field. We can convert the theory into the Einstein frame via a
"Legendre" transformation or a conformal transformation. We calculate
thermodynamical variables both in the original frame and in the Einstein frame,
following the Iyer--Wald definition which satisfies the first law of
thermodynamics. We show that all thermodynamical variables defined in the
original frame are the same as those in the Einstein frame, if the spacetimes
in both frames are asymptotically flat, regular and possess event horizons with
non-zero temperatures. This result may be useful to study whether the second
law is still valid in the generalized theory of gravity.Comment: 14 pages, no figure
- …