21,265 research outputs found
Bulk-deformed potentials for toric Fano surfaces, wall-crossing and period
We provide an inductive algorithm to compute the bulk-deformed potentials for
toric Fano surfaces via wall-crossing techniques and a tropical-holomorphic
correspondence theorem for holomorphic discs. As an application of the
correspondence theorem, we also prove a big quantum period theorem for toric
Fano surfaces which relates the log descendant Gromov-Witten invariants with
the oscillatory integrals of the bulk-deformed potentials.Comment: 44 pages, 9 figures, comments are welcom
Discovery and Identification of W' and Z' in SU(2) x SU(2) x U(1) Models at the LHC
We explore the discovery potential of W' and Z' boson searches for various
SU(2) x SU(2) x U(1) models at the Large Hadron Collider (LHC), after taking
into account the constraints from low energy precision measurements and direct
searches at both the Tevatron (1.96 TeV) and the LHC (7 TeV). In such models,
the W' and Z' bosons emerge after the electroweak symmetry is spontaneously
broken. Two patterns of the symmetry breaking are considered in this work: one
is SU(2)_L x SU(2)_2 x U(1)_X to SU(2)_L x U(1)_Y (BP-I), another is SU(2)_1 x
SU(2)_2 x U(1)_Y to SU(2)_L x U(1)_Y (BP-II). Examining the single production
channel of W' and Z' with their subsequent leptonic decays, we find that the
probability of detecting W' and Z' bosons in the considered models at the LHC
(with 14 TeV) is highly limited by the low energy precision data constraints.
We show that observing Z' alone, without seeing a W', does not rule out new
physics models with non-Abelian gauge extension, such as the phobic models in
BP-I. Models in BP-II would predict the discovery of degenerate W' and Z'
bosons at the LHC.Comment: 29 pages, including 11 figures, 3 tables, added references for
introductio
Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation
We analyze the security of the two-way continuous-variable quantum key
distribution protocol in reverse reconciliation against general two-mode
attacks, which represent all accessible attacks at fixed channel parameters.
Rather than against one specific attack model, the expression of secret key
rates of the two-way protocol are derived against all accessible attack models.
It is found that there is an optimal two-mode attack to minimize the
performance of the protocol in terms of both secret key rates and maximal
transmission distances. We identify the optimal two-mode attack, give the
specific attack model of the optimal two-mode attack and show the performance
of the two-way protocol against the optimal two-mode attack. Even under the
optimal two-mode attack, the performances of two-way protocol are still better
than the corresponding one-way protocol, which shows the advantage of making a
double use of the quantum channel and the potential of long-distance secure
communication using two-way protocol.Comment: 14 pages, 8 figure
- …