5,404 research outputs found

    Biperiodic superlattices and the transparent state

    Full text link
    Coquelin et al. studied biperiodic semiconductor superlattices, which consist of alternating cell types, one with wide wells and the other narrow wells, separated by equal strength barriers. If the wells were identical, it would be a simply periodic system of N=2nN = 2n half-cells. When asymmetry is introduced, an allowed band splits at the Bragg point into two disjoint allowed bands. The Bragg resonance turns into a transparent state located close to the band edge of the lower(upper) band when the first(second) well is the wider. Analysis of this system gives insight into how band splitting occurs. Further we consider semi-periodic systems having N=2n+1N= 2n+1 half-cells. Surprisingly these have very different transmission properties, with an envelope of maximum transmission probability that crosses the envelope of minima at the transparent point.Comment: 12 pages, 10 figures Version 2: improved figures using colour, and some small improvements in the text, in response to referee comments Version 3: incorporates changes which arose in proofs stag

    Rigorous derivation of coherent resonant tunneling time and velocity in finite periodic systems

    Full text link
    The velocity vresv_{res} of resonant tunneling electrons in finite periodic structures is analytically calculated in two ways. The first method is based on the fact that a transmission of unity leads to a coincidence of all still competing tunneling time definitions. Thus, having an indisputable resonant tunneling time Ď„res,\tau_{res}, we apply the natural definition vres=L/Ď„resv_{res}=L/\tau_{res} to calculate the velocity. For the second method we combine Bloch's theorem with the transfer matrix approach to decompose the wave function into two Bloch waves. Then the expectation value of the velocity is calculated. Both different approaches lead to the same result, showing their physical equivalence. The obtained resonant tunneling velocity vresv_{res} is smaller or equal to the group velocity times the magnitude of the complex transmission amplitude of the unit cell. Only at energies where the unit cell of the periodic structure has a transmission of unity vresv_{res} equals the group velocity. Numerical calculations for a GaAs/AlGaAs superlattice are performed. For typical parameters the resonant velocity is below one third of the group velocity.Comment: 12 pages, 3 figures, LaTe

    Two unlinked double-strand breaks can induce reciprocal exchanges in plant genomes via homologous recombination and non-homologous end-joining

    Get PDF
    Using the rare-cutting endonuclease I-SceI we were able to demonstrate before that the repair of a single double-strand break (DSB) in a plant genome can be mutagenic due to insertions and deletions. However, during replication or due to irradiation several breaks might be induced simultaneously. To analyze the mutagenic potential of such a situation we established an experimental system in tobacco harboring two unlinked transgenes, each carrying an I-SceI site. After transient expression of I-SceI a kanamycin-resistance marker could be restored by joining two previously unlinked broken ends, either by homologous recombination (HR) or by nonhomologous end joining (NHEJ). Indeed, we were able to recover HR and NHEJ events with similar frequencies. Despite the fact that no selection was applied for joining the two other ends, the respective linkage could be detected in most cases tested, demonstrating that the respective exchanges were reciprocal. The frequencies obtained indicate that DSB-induced translocation is up to two orders of magnitude more frequent in somatic cells than ectopic gene conversion. Thus, DSB-induced reciprocal exchanges might play a significant role in plant genome evolution. The technique applied in this study may also be useful for the controlled exchange of unlinked sequences in plant genomes

    Effects of nanosecond pulsed electric field exposure on Arabidopsis thaliana

    Get PDF

    ELM triggering conditions for the integrated modeling of H-mode plasmas

    Full text link
    Recent advances in the integrated modeling of ELMy H-mode plasmas are presented. A model for the H-mode pedestal and for the triggering of ELMs predicts the height, width, and shape of the H-mode pedestal and the frequency and width of ELMs. Formation of the pedestal and the L-H transition is the direct result of ExB flow shear suppression of anomalous transport. The periodic ELM crashes are triggered by either the ballooning or peeling MHD instabilities. The BALOO, DCON, and ELITE ideal MHD stability codes are used to derive a new parametric expression for the peeling-ballooning threshold. The new dependence for the peeling-ballooning threshold is implemented in the ASTRA transport code. Results of integrated modeling of DIII-D like discharges are presented and compared with experimental observations. The results from the ideal MHD stability codes are compared with results from the resistive MHD stability code NIMROD.Comment: 12th International Congress on Plasma Physics, 25-29 October 2004, Nice (France

    Pulsed laser ablation and incubation of nickel, iron and tungsten in liquids and air

    Get PDF
    Incubation effects in the nanosecond laser ablation of metals exhibit a strong dependence on the thermal and mechanical properties of both the target material and the background gas or liquid. The incubation in air is controlled mainly by thermal properties such as the heat of vaporization. In liquid, the correlation of the incubation and the ultimate tensile stress of the metals suggests that incubation may be related to the mechanical impact on the solid material by the cavitation bubble collapse, causing accumulation of voids and cracks in the subsurface region of the ablation craters. At high ultimate tensile stress, however, the low sensitivity to the environment suggests that the mechanical impact is likely to play a negligible role in the incubation. Finally, the correlation between the incubation and the carbon content of alcoholic liquids may be explained by an absorptivity increase of the cavity surfaces due to carbonaceous deposits generated by laser-induced pyrolysis, or by the mechanical impact of long-living bubbles at higher dynamic viscosity of liquids

    Cosmological particle production, causal thermodynamics, and inflationary expansion

    Get PDF
    Combining the equivalence between cosmological particle creation and an effective viscous fluid pressure with the fact that the latter represents a dynamical degree of freedom within the second-order Israel-Stewart theory for imperfect fluids, we reconsider the possibility of accelerated expansion in fluid cosmology. We find an inherent self-limitation for the magnitude of an effective bulk pressure which is due to adiabatic (isentropic) particle production. For a production rate which depends quadratically on the Hubble rate we confirm the existence of solutions which describe a smooth transition from inflationary to noninflationary behavior and discuss their interpretation within the model of a decaying vacuum energy density. An alternative formulation of the effective imperfect fluid dynamics in terms of a minimally coupled scalar field is given. The corresponding potential is discussed and an entropy equivalent for the scalar field is found.Comment: 16 pages, revtex file, submitted to Phys. Rev.

    Nonlinear spinor field in Bianchi type-I Universe filled with viscous fluid: numerical solutions

    Full text link
    We consider a system of nonlinear spinor and a Bianchi type I gravitational fields in presence of viscous fluid. The nonlinear term in the spinor field Lagrangian is chosen to be λF\lambda F, with λ\lambda being a self-coupling constant and FF being a function of the invariants II an JJ constructed from bilinear spinor forms SS and PP. Self-consistent solutions to the spinor and BI gravitational field equations are obtained in terms of τ\tau, where τ\tau is the volume scale of BI universe. System of equations for τ\tau and \ve, where \ve is the energy of the viscous fluid, is deduced. This system is solved numerically for some special cases.Comment: 15 pages, 4 figure

    Electron transmission and phase time in semiconductor superlattices

    Full text link
    We discuss the time spent by an electron propagating through a finite periodic system such as a semiconductor superlattice. The relation between dwell-time and phase-time is outlined. The envelopes of phase-time at maximum and minimum transmission are derived, and it is shown that the peaks and valleys of phase-time can be well described by parameters fitted at the extrema. For a many-period system this covers most of the allowed band. Comparison is made to direct numerical solutions of the time-dependent Schr\"odinger equation by Veenstra et al. [cond-mat/0411118] who compared systems with and without addition of an anti-reflection coating (ARC). With an ARC, the time delay is consistent with propagation at the Bloch velocity of the periodic system, which significantly reduces the time delay, in addition to increasing the transmissivity.Comment: 8 pages, 10 figures, based on a talk at Theory-Canada 3 in Edmonton AB, June 200

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page
    • …
    corecore