1,349 research outputs found

    Triply degenerate nodal line and tunable contracted-drumhead surface state in a tight-binding model

    Full text link
    The study of topological semimetals has been extended to more general topological nodal systems such as metamaterials and artificial periodic structures. Among various nodal structures, triply degenerate nodal line (TNL) is rare and hence lack of attention. In this work, we have proposed a simple tight-binding model which hosts a topological non-trivial TNL. This TNL not only has the drumhead surface states as usual nodal line systems, but also has surface states which form a contracted-drumhead shape. And the shape and area of this contracted-drumhead can be tuned by the hopping parameters of the model. This provides an effective way to modulate surface states as well as their density of states, which can be important in future applications of topological nodal systems.Comment: 6 pages, 5 figure

    Triply degenerate nodal line and tunable contracted-drumhead surface state in a tight-binding model

    Get PDF
    The study of topological semimetals has been extended to more general topological nodal systems such as metamaterials and artificial periodic structures. Among various nodal structures, triply degenerate nodal line (TDNL) is rare and, hence, has received little attention. In this work, we have proposed a simple tight-binding (TB) model, which hosts a topological non-trivial TDNL. This TDNL not only has the drumhead surface states (DSSs) as usual nodal line systems but also has surface states that form a contracted-drumhead shape. The shape and area of this contracted drumhead can be tuned by the hopping parameters of the model. This provides an effective way to modulate surface states and their density of states, which can be important in future applications of topological nodal systems

    Semileptonic decays DA(AVP)+νD \to A(A \to VP)\ell^+\nu_\ell with the SU(3) flavor analysis

    Full text link
    Semileptonic three-body DA+νD \to A\ell^+\nu_\ell decays, nonleptonic AVPA \to VP decays and semileptonic four-body DA(AVP)+νD \to A(A \to VP)\ell^+\nu_\ell strong or electromagnetic decays are analyzed by the SU(3) flavor symmetry/breaking approach, where AA denotes the axial-vector meson, VV denotes the vector meson, and PP denotes pseudoscalar meson. In terms of the SU(3) flavor symmetry/breaking, the decay amplitudes of the DA+νD \to A \ell^+ \nu_\ell decays or the vertex coefficients of the AVPA \to VP decays are related. The relevant nonperturbative parameters are constrained by the present experimental data. Then the branching ratios of the DA+νD \to A \ell^+ \nu_\ell , AVPA \to VP and DA(AVP)+νD\to A(A\to VP)\ell^+\nu_\ell decays are predicted by the constrained parameters. We find that some branching ratios are large and they might be measured in the near future experiments. Moreover, the sensitivities of the branching ratios of DA+νD \to A \ell^+ \nu_\ell and AVPA \to VP decays to the parameters are also shown, and some decay branching ratios are sensitive to the nonperturbative parameters.Comment: 29 pages, 6 figure

    Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)

    Get PDF
    In this paper we propose two public key BE schemes that have efficient complexity measures. The first scheme, called the PBE-PI scheme, has O(r)O(r) header size, O(1)O(1) public keys and O(logN)O(\log N) private keys per user, where rr is the number of revoked users. This is the first public key BE scheme that has both public and private keys under O(logN)O(\log N) while the header size is O(r)O(r). These complexity measures match those of efficient secret key BE schemes. \par Our second scheme, called the PBE-SD-PI scheme, has O(r)O(r) header size, O(1)O(1) public key and O(logN)O(\log N) private keys per user also. However, its decryption time is remarkably O(1)O(1). This is the first public key BE scheme that has O(1)O(1) decryption time while other complexity measures are kept low. Overall, this is the most efficient public key BE scheme up to now. \par Our basic schemes are one-way secure against {\em full collusion of revoked users} in the random oracle model under the BDH assumption. We modify our schemes to have indistinguishably security against adaptive chosen ciphertext attacks

    The linear and nonlinear Jaynes-Cummings model for the multiphoton transition

    Full text link
    With the Jaynes-Cummings model, we have studied the atom and light field quantum entanglement of multiphoton transition, and researched the effect of initial state superposition coefficient C1C_{1}, the transition photon number NN, the quantum discord δ\delta and the nonlinear coefficient χ\chi on the quantum entanglement degrees. We have given the quantum entanglement degrees curves with time evolution, and obtained some results, which should have been used in quantum computing and quantum information.Comment: arXiv admin note: text overlap with arXiv:1404.0821, arXiv:1205.0979 by other author

    Victim sensitivity and altruistic behavior in school: mediating effects of teacher justice and teacher-student relationship

    Get PDF
    The current study aimed to explore how victim sensitivity influenced altruistic behaviors in school and to explore the mediating roles of teacher justice and teacher-student relationship. In 2018, we recruited 1,856 Chinese adolescents including 989 fourth graders (M = 10.35, SD = 0.56) and 867 eighth graders (M = 15.57, SD = 0.91), and the participation rate was 100%. Participations completed the self-report victim sensitivity scale, the teacher justice scale, the teacher-student relationship scale, and the altruistic behavior toward classmate scale. Structural equation modeling (SEM) indicated that victim sensitivity had a direct negative effect on altruistic behavior in school, but this relationship was mediated by teacher justice. There was also a mediated path between teacher justice and altruistic behavior by way of teacher-student relationship. These findings suggested possible mechanisms to explain the relationship between victim sensitivity and altruistic behavior and provided new directions for intervention

    Brain derived neurotrophic factor (BDNF) contributes to the pain hypersensitivity following surgical incision in the rats

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The pathogenic role of brain derived neurotrophic factor (BDNF) in the incisional pain is poorly understood. The present study explores the role of the BDNF in the incision-induced pain hypersensitivity.</p> <p>Methods</p> <p>A longitudinal incision was made in one plantar hind paw of isoflurane-anesthetized rats. Dorsal root ganglias (DRG) and spinal cords were removed at various postoperative times (1–72 h). Expression pattern of BDNF was determined by immunohistochemistry and double-labeling immunofluorescence. Lidocaine-induced blockade of sciatic nerve function was used to determine the importance of afferent nerve activity on BDNF expression in the DRG and spinal cord after incision. BDNF antibody was administered intrathecally (IT) or intraperitoneal (IP) to modulate the spinal BDNF or peripheral BDNF after incision.</p> <p>Results</p> <p>After hind-paw incision, the BDNF was upregulated in the ipsilateral lumbar DRG and spinal cord whereas thoracic BDNF remained unchanged in response to incision. The upregulated BDNF was mainly expressed in the large-sized neurons in DRG and the neurons and the primary nerve terminals in the spinal cord. Sciatic nerve blockade prevented the increase of BDNF in the DRG and spinal cord. IT injection of BDNF antibody greatly inhibited the mechanical allodynia induced by incision whereas IP administration had only marginal effect.</p> <p>Conclusion</p> <p>The present study showed that incision induced the segmental upregulation of BDNF in the DRG and spinal cord through somatic afferent nerve transmission, and the upregulated BDNF contributed to the pain hypersensitivity induced by surgical incision.</p
    corecore