5,404 research outputs found
Biperiodic superlattices and the transparent state
Coquelin et al. studied biperiodic semiconductor superlattices, which consist
of alternating cell types, one with wide wells and the other narrow wells,
separated by equal strength barriers. If the wells were identical, it would be
a simply periodic system of half-cells. When asymmetry is introduced,
an allowed band splits at the Bragg point into two disjoint allowed bands. The
Bragg resonance turns into a transparent state located close to the band edge
of the lower(upper) band when the first(second) well is the wider. Analysis of
this system gives insight into how band splitting occurs. Further we consider
semi-periodic systems having half-cells. Surprisingly these have very
different transmission properties, with an envelope of maximum transmission
probability that crosses the envelope of minima at the transparent point.Comment: 12 pages, 10 figures Version 2: improved figures using colour, and
some small improvements in the text, in response to referee comments Version
3: incorporates changes which arose in proofs stag
Rigorous derivation of coherent resonant tunneling time and velocity in finite periodic systems
The velocity of resonant tunneling electrons in finite periodic
structures is analytically calculated in two ways. The first method is based on
the fact that a transmission of unity leads to a coincidence of all still
competing tunneling time definitions. Thus, having an indisputable resonant
tunneling time we apply the natural definition
to calculate the velocity. For the second method we
combine Bloch's theorem with the transfer matrix approach to decompose the wave
function into two Bloch waves. Then the expectation value of the velocity is
calculated. Both different approaches lead to the same result, showing their
physical equivalence. The obtained resonant tunneling velocity is
smaller or equal to the group velocity times the magnitude of the complex
transmission amplitude of the unit cell. Only at energies where the unit cell
of the periodic structure has a transmission of unity equals the
group velocity. Numerical calculations for a GaAs/AlGaAs superlattice are
performed. For typical parameters the resonant velocity is below one third of
the group velocity.Comment: 12 pages, 3 figures, LaTe
Two unlinked double-strand breaks can induce reciprocal exchanges in plant genomes via homologous recombination and non-homologous end-joining
Using the rare-cutting endonuclease I-SceI we were able to demonstrate before that the repair of a single double-strand break (DSB) in a plant genome can be mutagenic due to insertions and deletions. However, during replication or due to irradiation several breaks might be induced simultaneously. To analyze the mutagenic potential of such a situation we established an experimental system in tobacco harboring two unlinked transgenes, each carrying an I-SceI site. After transient expression of I-SceI a kanamycin-resistance marker could be restored by joining two previously unlinked broken ends, either by homologous recombination (HR) or by nonhomologous end joining (NHEJ). Indeed, we were able to recover HR and NHEJ events with similar frequencies. Despite the fact that no selection was applied for joining the two other ends, the respective linkage could be detected in most cases tested, demonstrating that the respective exchanges were reciprocal. The frequencies obtained indicate that DSB-induced translocation is up to two orders of magnitude more frequent in somatic cells than ectopic gene conversion. Thus, DSB-induced reciprocal exchanges might play a significant role in plant genome evolution. The technique applied in this study may also be useful for the controlled exchange of unlinked sequences in plant genomes
ELM triggering conditions for the integrated modeling of H-mode plasmas
Recent advances in the integrated modeling of ELMy H-mode plasmas are
presented. A model for the H-mode pedestal and for the triggering of ELMs
predicts the height, width, and shape of the H-mode pedestal and the frequency
and width of ELMs. Formation of the pedestal and the L-H transition is the
direct result of ExB flow shear suppression of anomalous transport. The
periodic ELM crashes are triggered by either the ballooning or peeling MHD
instabilities. The BALOO, DCON, and ELITE ideal MHD stability codes are used to
derive a new parametric expression for the peeling-ballooning threshold. The
new dependence for the peeling-ballooning threshold is implemented in the ASTRA
transport code. Results of integrated modeling of DIII-D like discharges are
presented and compared with experimental observations. The results from the
ideal MHD stability codes are compared with results from the resistive MHD
stability code NIMROD.Comment: 12th International Congress on Plasma Physics, 25-29 October 2004,
Nice (France
Pulsed laser ablation and incubation of nickel, iron and tungsten in liquids and air
Incubation effects in the nanosecond laser ablation of metals exhibit a strong dependence on the thermal and mechanical properties of both the target material and the background gas or liquid. The incubation in air is controlled mainly by thermal properties such as the heat of vaporization. In liquid, the correlation of the incubation and the ultimate tensile stress of the metals suggests that incubation may be related to the mechanical impact on the solid material by the cavitation bubble collapse, causing accumulation of voids and cracks in the subsurface region of the ablation craters. At high ultimate tensile stress, however, the low sensitivity to the environment suggests that the mechanical impact is likely to play a negligible role in the incubation. Finally, the correlation between the incubation and the carbon content of alcoholic liquids may be explained by an absorptivity increase of the cavity surfaces due to carbonaceous deposits generated by laser-induced pyrolysis, or by the mechanical impact of long-living bubbles at higher dynamic viscosity of liquids
Cosmological particle production, causal thermodynamics, and inflationary expansion
Combining the equivalence between cosmological particle creation and an
effective viscous fluid pressure with the fact that the latter represents a
dynamical degree of freedom within the second-order Israel-Stewart theory for
imperfect fluids, we reconsider the possibility of accelerated expansion in
fluid cosmology. We find an inherent self-limitation for the magnitude of an
effective bulk pressure which is due to adiabatic (isentropic) particle
production. For a production rate which depends quadratically on the Hubble
rate we confirm the existence of solutions which describe a smooth transition
from inflationary to noninflationary behavior and discuss their interpretation
within the model of a decaying vacuum energy density. An alternative
formulation of the effective imperfect fluid dynamics in terms of a minimally
coupled scalar field is given. The corresponding potential is discussed and an
entropy equivalent for the scalar field is found.Comment: 16 pages, revtex file, submitted to Phys. Rev.
Nonlinear spinor field in Bianchi type-I Universe filled with viscous fluid: numerical solutions
We consider a system of nonlinear spinor and a Bianchi type I gravitational
fields in presence of viscous fluid. The nonlinear term in the spinor field
Lagrangian is chosen to be , with being a self-coupling
constant and being a function of the invariants an constructed from
bilinear spinor forms and . Self-consistent solutions to the spinor and
BI gravitational field equations are obtained in terms of , where
is the volume scale of BI universe. System of equations for and \ve,
where \ve is the energy of the viscous fluid, is deduced. This system is
solved numerically for some special cases.Comment: 15 pages, 4 figure
Electron transmission and phase time in semiconductor superlattices
We discuss the time spent by an electron propagating through a finite
periodic system such as a semiconductor superlattice. The relation between
dwell-time and phase-time is outlined. The envelopes of phase-time at maximum
and minimum transmission are derived, and it is shown that the peaks and
valleys of phase-time can be well described by parameters fitted at the
extrema. For a many-period system this covers most of the allowed band.
Comparison is made to direct numerical solutions of the time-dependent
Schr\"odinger equation by Veenstra et al. [cond-mat/0411118] who compared
systems with and without addition of an anti-reflection coating (ARC). With an
ARC, the time delay is consistent with propagation at the Bloch velocity of the
periodic system, which significantly reduces the time delay, in addition to
increasing the transmissivity.Comment: 8 pages, 10 figures, based on a talk at Theory-Canada 3 in Edmonton
AB, June 200
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break
Quantum Key Distribution (QKD) protocols which employ a particular message
authentication code suggested previously. This authentication code, featuring
low key consumption, is not Information-Theoretically Secure (ITS) since for
each message the eavesdropper has intercepted she is able to send a different
message from a set of messages that she can calculate by finding collisions of
a cryptographic hash function. However, when this authentication code was
introduced it was shown to prevent straightforward Man-In-The-Middle (MITM)
attacks against QKD protocols.
In this paper, we prove that the set of messages that collide with any given
message under this authentication code contains with high probability a message
that has small Hamming distance to any other given message. Based on this fact
we present extended MITM attacks against different versions of BB84 QKD
protocols using the addressed authentication code; for three protocols we
describe every single action taken by the adversary. For all protocols the
adversary can obtain complete knowledge of the key, and for most protocols her
success probability in doing so approaches unity.
Since the attacks work against all authentication methods which allow to
calculate colliding messages, the underlying building blocks of the presented
attacks expose the potential pitfalls arising as a consequence of non-ITS
authentication in QKD-postprocessing. We propose countermeasures, increasing
the eavesdroppers demand for computational power, and also prove necessary and
sufficient conditions for upgrading the discussed authentication code to the
ITS level.Comment: 34 page
- …