4,075 research outputs found

    Entangled SU(2) and SU(1,1) coherent states

    Get PDF
    Entangled SU(2) and SU(1,1) coherent states are developed as superpositions of multiparticle SU(2) and SU(1,1) coherent states. In certain cases, these are coherent states with respect to generalized su(2) and su(1,1) generators, and multiparticle parity states arise as a special case. As a special example of entangled SU(2) coherent states, entangled binomial states are introduced and these entangled binomial states enable the contraction from entangled SU(2) coherent states to entangled harmonic oscillator coherent states. Entangled SU(2) coherent states are discussed in the context of pairs of qubits. We also introduce the entangled negative binomial states and entangled squeezed states as examples of entangled SU(1,1) coherent states. A method for generating the entangled SU(2) and SU(1,1) coherent states is discussed and degrees of entanglement calculated. Two types of SU(1,1) coherent states are discussed in each case: Perelomov coherent states and Barut-Girardello coherent states.Comment: 31 pages, no figure

    Non-classical properties and algebraic characteristics of negative binomial states in quantized radiation fields

    Get PDF
    We study the nonclassical properties and algebraic characteristics of the negative binomial states introduced by Barnett recently. The ladder operator formalism and displacement operator formalism of the negative binomial states are found and the algebra involved turns out to be the SU(1,1) Lie algebra via the generalized Holstein-Primarkoff realization. These states are essentially Peremolov's SU(1,1) coherent states. We reveal their connection with the geometric states and find that they are excited geometric states. As intermediate states, they interpolate between the number states and geometric states. We also point out that they can be recognized as the nonlinear coherent states. Their nonclassical properties, such as sub-Poissonian distribution and squeezing effect are discussed. The quasiprobability distributions in phase space, namely the Q and Wigner functions, are studied in detail. We also propose two methods of generation of the negative binomial states.Comment: 17 pages, 5 figures, Accepted in EPJ

    Characterization of four-qubit states via Bell inequalities

    Get PDF
    A set of Bell inequalities classifying the quantum entanglement of four-qubit states is presented. These inequalities involve only two measurement settings per observer and can characterize fully separable, bi-separable and tri-separable quantum states. In addition, a quadratic inequality of the Bell operators for four-qubit systems is derived

    Precise QCD predictions on top quark pair production mediated by massive color octet vector boson at hadron colliders

    Full text link
    We present a theoretical framework for systematically calculating next-to-leading order (NLO) QCD effects to various experimental observables in models with massive COVB in a model independent way at hadron colliders. Specifically, we show the numerical results for the NLO QCD corrections to total cross sections, invariant mass distribution and AFB of top quark pairs production mediated by a massive COVB in both the fixed scale (top quark mass) scheme and the dynamical scale (top pair invariant mass) scheme. Our results show that the NLO QCD calculations in the dynamical scale scheme is more reasonable than the fixed scheme and the naive estimate of the NLO effects by simple rescaling of the LO results with the SM NLO K-factor is not appropriate.Comment: 6 pages, 5 figures, 2 tables; version published in EPJ

    Secrecy Outage Probability Analysis of Multi-User Multi-Eavesdropper Wireless Systems

    Full text link
    In this paper, we explore the physical-layer security of a multi-user wireless system that consists of multiple users intending to transmit to a base station (BS), while multiple eavesdroppers attempt to tap the user transmissions. We examine the employment of multi-user scheduling for improving the transmission security against eavesdropping and propose a multi-user scheduling scheme, which only requires the channel state information (CSI) of BS without the need of the passive eavesdroppers' CSI. We also consider the round-robin scheduling for comparison purposes. The closed-form secrecy outage probability expressions of the round-robin scheduling and proposed multi-user scheduling are derived over Rayleigh fading channels. Numerical results demonstrate that the proposed multi-user scheduling outperforms the round-robin scheduling in terms of the secrecy outage probability. As the number of users increases, the secrecy outage probability of round-robin scheduling keeps unchanged. By contrast, the secrecy outage performance of the proposed multi-user scheduling improves significantly with an increasing number of users.Comment: 5 page
    • …
    corecore