21,882 research outputs found

    Ab initio calculation of intrinsic spin Hall effect in semiconductors

    Full text link
    Relativistic band theoretical calculations reveal that intrinsic spin Hall conductivity in hole-doped archetypical semiconductors Ge, GaAs and AlAs is large [100(/e)(Ωcm)1][\sim 100 (\hbar/e)(\Omega cm)^{-1}], showing the possibility of spin Hall effect beyond the four band Luttinger Hamiltonian. The calculated orbital-angular-momentum (orbital) Hall conductivity is one order of magnitude smaller, indicating no cancellation between the spin and orbital Hall effects in bulk semiconductors. Furthermore, it is found that the spin Hall effect can be strongly manipulated by strains, and that the acac spin Hall conductivity in the semiconductors is large in pure as well as doped semiconductors.Comment: Phys. Rev. Lett. (accepted

    Phase diagram and excitations of a Shiba molecule

    Full text link
    We analyze the phase diagram associated with a pair of magnetic impurities trapped in a superconducting host. The natural interplay between Kondo screening, superconductivity and exchange interactions leads to a rich array of competing phases, whose transitions are characterized by discontinuous changes of the total spin. Our analysis is based on a combination of numerical renormalization group techniques as well as semi-classical analytics. In addition to the expected screened and unscreened phases, we observe a new molecular doublet phase where the impurity spins are only partially screened by a single extended quasiparticle. Direct signatures of the various Shiba molecule states can be observed via RF spectroscopy.Comment: 13 pages, 7 figure

    Unforgeable Noise-Tolerant Quantum Tokens

    Get PDF
    The realization of devices which harness the laws of quantum mechanics represents an exciting challenge at the interface of modern technology and fundamental science. An exemplary paragon of the power of such quantum primitives is the concept of "quantum money". A dishonest holder of a quantum bank-note will invariably fail in any forging attempts; indeed, under assumptions of ideal measurements and decoherence-free memories such security is guaranteed by the no-cloning theorem. In any practical situation, however, noise, decoherence and operational imperfections abound. Thus, the development of secure "quantum money"-type primitives capable of tolerating realistic infidelities is of both practical and fundamental importance. Here, we propose a novel class of such protocols and demonstrate their tolerance to noise; moreover, we prove their rigorous security by determining tight fidelity thresholds. Our proposed protocols require only the ability to prepare, store and measure single qubit quantum memories, making their experimental realization accessible with current technologies.Comment: 18 pages, 5 figure

    Perceptually Motivated Wavelet Packet Transform for Bioacoustic Signal Enhancement

    Get PDF
    A significant and often unavoidable problem in bioacoustic signal processing is the presence of background noise due to an adverse recording environment. This paper proposes a new bioacoustic signal enhancement technique which can be used on a wide range of species. The technique is based on a perceptually scaled wavelet packet decomposition using a species-specific Greenwood scale function. Spectral estimation techniques, similar to those used for human speech enhancement, are used for estimation of clean signal wavelet coefficients under an additive noise model. The new approach is compared to several other techniques, including basic bandpass filtering as well as classical speech enhancement methods such as spectral subtraction, Wiener filtering, and Ephraim–Malah filtering. Vocalizations recorded from several species are used for evaluation, including the ortolan bunting (Emberiza hortulana), rhesus monkey (Macaca mulatta), and humpback whale (Megaptera novaeanglia), with both additive white Gaussian noise and environment recording noise added across a range of signal-to-noise ratios (SNRs). Results, measured by both SNR and segmental SNR of the enhanced wave forms, indicate that the proposed method outperforms other approaches for a wide range of noise conditions

    Collective decision-making on triadic graphs

    Get PDF
    Many real-world networks exhibit community structures and non-trivial clustering associated with the occurrence of a considerable number of triangular subgraphs known as triadic motifs. Triads are a set of distinct triangles that do not share an edge with any other triangle in the network. Network motifs are subgraphs that occur significantly more often compared to random topologies. Two prominent examples, the feedforward loop and the feedback loop, occur in various real-world networks such as gene-regulatory networks, food webs or neuronal networks. However, as triangular connections are also prevalent in communication topologies of complex collective systems, it is worthwhile investigating the influence of triadic motifs on the collective decision-making dynamics. To this end, we generate networks called Triadic Graphs (TGs) exclusively from distinct triadic motifs. We then apply TGs as underlying topologies of systems with collective dynamics inspired from locust marching bands. We demonstrate that the motif type constituting the networks can have a paramount influence on group decision-making that cannot be explained solely in terms of the degree distribution. We find that, in contrast to the feedback loop, when the feedforward loop is the dominant subgraph, the resulting network is hierarchical and inhibits coherent behavior

    q-deformed Supersymmetric t-J Model with a Boundary

    Full text link
    The q-deformed supersymmetric t-J model on a semi-infinite lattice is diagonalized by using the level-one vertex operators of the quantum affine superalgebra Uq[sl(21)^]U_q[\hat{sl(2|1)}]. We give the bosonization of the boundary states. We give an integral expression of the correlation functions of the boundary model, and derive the difference equations which they satisfy.Comment: LaTex file 18 page

    Location, correlation, radiation: where is the σ\sigma, what is its structure and what is its coupling to photons?

    Full text link
    Scalar mesons are a key expression of the infrared regime of QCD. The lightest of these is the σ\sigma. Now that its pole in the complex energy plane has been precisely located, we can ask whether this state is transiently qˉq{\bar q}q or qqˉqq{\bar {qq}} qq or a multi-meson molecule or largely glue? The two photon decay of the σ\sigma can, in principle, discriminate between these possibilities. We review here how the γγπ+π\gamma\gamma\to\pi^+\pi^-, π0π0\pi^0\pi^0 cross-sections can be accurately computed. The result not only agrees with experiment, but definitively fixes the radiative coupling of the σ\sigma. This equates to a two photon width of (4.1±0.3)(4.1 \pm 0.3) keV, which accords with the simple non-relativistic quark model expectation for a uˉu,dˉd{\bar u}u, {\bar d}d scalar. Nevertheless, robust predictions from relativistic strong coupling QCD are required for each of the possible compositions before we can be sure which one really delivers the determined γγ\gamma\gamma coupling.Comment: 18 pages, 11 figures. To be published in Modern Physics Letters A A number of references updated and three sentences changed in the text to reflect thes

    Computing the lower and upper bounds of Laplace eigenvalue problem: by combining conforming and nonconforming finite element methods

    Full text link
    This article is devoted to computing the lower and upper bounds of the Laplace eigenvalue problem. By using the special nonconforming finite elements, i.e., enriched Crouzeix-Raviart element and extension Q1rotQ_1^{\rm rot}, we get the lower bound of the eigenvalue. Additionally, we also use conforming finite elements to do the postprocessing to get the upper bound of the eigenvalue. The postprocessing method need only to solve the corresponding source problems and a small eigenvalue problem if higher order postprocessing method is implemented. Thus, we can obtain the lower and upper bounds of the eigenvalues simultaneously by solving eigenvalue problem only once. Some numerical results are also presented to validate our theoretical analysis.Comment: 19 pages, 4 figure
    corecore