12,697 research outputs found

    Scaling for Interfacial Tensions near Critical Endpoints

    Full text link
    Parametric scaling representations are obtained and studied for the asymptotic behavior of interfacial tensions in the \textit{full} neighborhood of a fluid (or Ising-type) critical endpoint, i.e., as a function \textit{both} of temperature \textit{and} of density/order parameter \textit{or} chemical potential/ordering field. Accurate \textit{nonclassical critical exponents} and reliable estimates for the \textit{universal amplitude ratios} are included naturally on the basis of the ``extended de Gennes-Fisher'' local-functional theory. Serious defects in previous scaling treatments are rectified and complete wetting behavior is represented; however, quantitatively small, but unphysical residual nonanalyticities on the wetting side of the critical isotherm are smoothed out ``manually.'' Comparisons with the limited available observations are presented elsewhere but the theory invites new, searching experiments and simulations, e.g., for the vapor-liquid interfacial tension on the two sides of the critical endpoint isotherm for which an amplitude ratio 3.25±0.05-3.25 \pm 0.05 is predicted.Comment: 42 pages, 6 figures, to appear in Physical Review

    Path integrals and symmetry breaking for optimal control theory

    Get PDF
    This paper considers linear-quadratic control of a non-linear dynamical system subject to arbitrary cost. I show that for this class of stochastic control problems the non-linear Hamilton-Jacobi-Bellman equation can be transformed into a linear equation. The transformation is similar to the transformation used to relate the classical Hamilton-Jacobi equation to the Schr\"odinger equation. As a result of the linearity, the usual backward computation can be replaced by a forward diffusion process, that can be computed by stochastic integration or by the evaluation of a path integral. It is shown, how in the deterministic limit the PMP formalism is recovered. The significance of the path integral approach is that it forms the basis for a number of efficient computational methods, such as MC sampling, the Laplace approximation and the variational approximation. We show the effectiveness of the first two methods in number of examples. Examples are given that show the qualitative difference between stochastic and deterministic control and the occurrence of symmetry breaking as a function of the noise.Comment: 21 pages, 6 figures, submitted to JSTA

    Photon-number-solving Decoy State Quantum Key Distribution

    Full text link
    In this paper, a photon-number-resolving decoy state quantum key distribution scheme is presented based on recent experimental advancements. A new upper bound on the fraction of counts caused by multiphoton pulses is given. This upper bound is independent of intensity of the decoy source, so that both the signal pulses and the decoy pulses can be used to generate the raw key after verified the security of the communication. This upper bound is also the lower bound on the fraction of counts caused by multiphoton pulses as long as faint coherent sources and high lossy channels are used. We show that Eve's coherent multiphoton pulse (CMP) attack is more efficient than symmetric individual (SI) attack when quantum bit error rate is small, so that CMP attack should be considered to ensure the security of the final key. finally, optimal intensity of laser source is presented which provides 23.9 km increase in the transmission distance. 03.67.DdComment: This is a detailed and extended version of quant-ph/0504221. In this paper, a detailed discussion of photon-number-resolving QKD scheme is presented. Moreover, the detailed discussion of coherent multiphoton pulse attack (CMP) is presented. 2 figures and some discussions are added. A detailed cauculation of the "new" upper bound 'is presente

    Imagine Math Day: Encouraging Secondary School Students and Teachers to Engage in Authentic Mathematical Discovery

    Get PDF
    Research mathematicians and school children experience mathematics in profoundly different ways. Ask a group of mathematicians what it means to “do mathematics” and you are likely to get a myriad of responses: mathematics involves analyzing and organizing patterns and relationships, reasoning and drawing conclusions about the world, or creating languages and tools to describe and solve important problems. Students of mathematics often report “doing mathematics” as performing calculations or following rules. It’s natural that they see mathematics as monolithic rather than an evolving, growing, socially constructed body of knowledge, because most mathematical training in primary and secondary schools consists of learning how to use pre-existing mathematical tools. They rarely get to see the process by which those tools came about, let alone authentically participate in the construction of those tools

    P-wave Pairing and Colossal Magnetoresistance in Manganese Oxides

    Full text link
    We point out that the existing experimental data of most manganese oxides show the {\sl frustrated} p-wave superconducting condensation in the ferromagnetic phase in the sense that the superconducting coherence is not long enough to cover the whole system. The superconducting state is similar to the A1A_{1} state in superfluid He-3. The sharp drop of resistivity, the steep jump of specific heat, and the gap opening in tunneling are well understood in terms of the p-wave pairing. In addition, colossal magnetoresistance (CMR) is naturally explained by the superconducting fluctuations with increasing magnetic fields. The finite resistivity may be due to some magnetic inhomogeneities. This study leads to the possibility of room temperature superconductivity.Comment: LaTex, 14 pages, For more information, please send me an e-mail. e-mail adrress : [email protected]

    Transport optimization on complex networks

    Full text link
    We present a comparative study of the application of a recently introduced heuristic algorithm to the optimization of transport on three major types of complex networks. The algorithm balances network traffic iteratively by minimizing the maximum node betweenness with as little path lengthening as possible. We show that by using this optimal routing, a network can sustain significantly higher traffic without jamming than in the case of shortest path routing. A formula is proved that allows quick computation of the average number of hops along the path and of the average travel times once the betweennesses of the nodes are computed. Using this formula, we show that routing optimization preserves the small-world character exhibited by networks under shortest path routing, and that it significantly reduces the average travel time on congested networks with only a negligible increase in the average travel time at low loads. Finally, we study the correlation between the weights of the links in the case of optimal routing and the betweennesses of the nodes connected by them.Comment: 19 pages, 7 figure

    Quantum Tomographic Cryptography with a Semiconductor Single Photon Source

    Full text link
    In this paper we analyze the security of the so-called quantum tomographic cryptography with the source producing entangled photons via an experimental scheme proposed in Phys. Rev. Lett. 92, 37903 (2004). We determine the range of the experimental parameters for which the protocol is secure against the most general incoherent attacks

    The possible explanation of electric-field-doped C60 phenomenology in the framework of Eliashberg theory

    Full text link
    In a recent paper (J.H. Schon, Ch. Kloc, R.C. Haddon and B. Batlogg, Nature 408 (2000) 549) a large increase in the superconducting critical temperature was observed in C60 doped with holes by application of a high electric field. We demonstrate that the measured Tc versus doping curves can be explained by solving the (four) s-wave Eliashberg equations in the case of a finite, non-half-filled energy band. In order to reproduce the experimental data, we assume a Coulomb pseudopotential depending on the filling in a very simple and plausible way. Reasonable values of the physical parameters involved are obtained. The application of the same approach to new experimental data (J.H. Schon, Ch. Kloc and B. Batlogg, Science 293 (2001) 2432) on electric field-doped, lattice-expanded C60 single crystals (Tc=117 K in the hole-doped case) gives equally good results and sets a theoretical limit to the linear increase of Tc at the increase of the lattice spacing.Comment: latex2e, 6 pages, 7 figures, 1 table, revised versio

    Competitive market for multiple firms and economic crisis

    Full text link
    The origin of economic crises is a key problem for economics. We present a model of long-run competitive markets to show that the multiplicity of behaviors in an economic system, over a long time scale, emerge as statistical regularities (perfectly competitive markets obey Bose-Einstein statistics and purely monopolistic-competitive markets obey Boltzmann statistics) and that how interaction among firms influences the evolutionary of competitive markets. It has been widely accepted that perfect competition is most efficient. Our study shows that the perfectly competitive system, as an extreme case of competitive markets, is most efficient but not stable, and gives rise to economic crises as society reaches full employment. In the economic crisis revealed by our model, many firms condense (collapse) into the lowest supply level (zero supply, namely bankruptcy status), in analogy to Bose-Einstein condensation. This curious phenomenon arises because perfect competition (homogeneous competitions) equals symmetric (indistinguishable) investment direction, a fact abhorred by nature. Therefore, we urge the promotion of monopolistic competition (heterogeneous competitions) rather than perfect competition. To provide early warning of economic crises, we introduce a resolving index of investment, which approaches zero in the run-up to an economic crisis. On the other hand, our model discloses, as a profound conclusion, that the technological level for a long-run social or economic system is proportional to the freedom (disorder) of this system; in other words, technology equals the entropy of system. As an application of this new concept, we give a possible answer to the Needham question: "Why was it that despite the immense achievements of traditional China it had been in Europe and not in China that the scientific and industrial revolutions occurred?"Comment: 17 pages; 3 figure

    A_4 flavour symmetry breaking scheme for understanding quark and neutrino mixing angles

    Full text link
    We propose a spontaneous A_4 flavour symmetry breaking scheme to understand the observed pattern of quark and neutrino mixing. The fermion mass eigenvalues are arbitrary, but the mixing angles are constrained in such a way that the overall patterns are explained while also leaving sufficient freedom to fit the detailed features of the observed values, including CP violating phases. The scheme realises the proposal of Low and Volkas to generate zero quark mixing and tribimaximal neutrino mixing at tree-level, with deviations from both arising from small corrections after spontaneous A_4 breaking. In the neutrino sector, the breaking is A_4 --> Z_2, while in the quark and charged-lepton sectors it is A_4 --> Z_3 = C_3. The full theory has A_4 completely broken, but the two different unbroken subgroups in the two sectors force the dominant mixing patterns to be as stated above. Radiative effects within each sector are shown to deviate neutrino mixing from tribimaximal, while maintaining zero quark mixing. Interactions between the two sectors -- "cross-talk" -- induce nonzero quark mixing, and additional deviation from tribimaximal neutrino mixing. We discuss the vacuum alignment challenge the scenario faces, and suggest three generic ways to approach the problem. We follow up one of those ways by sketching how an explicit model realising the symmetry breaking structure may be constructed.Comment: 14 pages, no figures; v3: Section 5 rewritten to correct an error; new section added to the appendix; added references; v4: minor change to appendix C, version to be published by JHE
    corecore