60,999 research outputs found

    Implications of Fermi-LAT observations on the origin of IceCube neutrinos

    Full text link
    The IceCube (IC) collaboration recently reported the detection of TeV-PeV extraterrestrial neutrinos whose origin is yet unknown. By the photon-neutrino connection in pppp and pγp\gamma interactions, we use the \fermi-LAT observations to constrain the origin of the IC detected neutrinos. We find that Galactic origins, i.e., the diffuse Galactic neutrinos due to cosmic ray (CR) propagation in the Milky Way, and the neutrinos from the Galactic point sources, may not produce the IC neutrino flux, thus these neutrinos should be of extragalactic origin. Moreover, the extragalactic gamma-ray bursts (GRBs) may not account for the IC neutrino flux, the jets of active galactic nuclei may not produce the IC neutrino spectrum, but the starburst galaxies (SBGs) may be promising sources. As suggested by the consistency between the IC detected neutrino flux and the Waxman-Bahcall bound, GRBs in SBGs may be the sources of both the ultrahigh energy, >1019>10^{19}eV, CRs and the 11001-100~PeV CRs that produce the IC detected TeV-PeV neutrinos.Comment: JCAP accepted version; 8 pages, 2 figs; discussion on blazar origin added; conclusion unchange

    Probing for the Cosmological Parameters with PLANCK Measurement

    Full text link
    We investigate the constraints on cosmological parameters especially for EoS of dark energy, inflationary parameters, neutrino mass and curvature of universe using simulated Planck data. Firstly we determine cosmological parameters with current observations including ESSENCE, WMAP3, Boomerang-2K2, CBI, VSA, ACBAR, SDSS LRG and 2dFGRS, and take best-fit model as the fiducial model in simulations. In simulations we pay attention to the effects of dynamical dark energy in determination of cosmological parameters. We add simulated SNAP data to do all the simulations. Using present data, we find Quintom dark energy model is mildly favored while \LambdaCDM remains a good fit. In the framework of dynamical dark energy, the constraints on inflationary parameters, m_{\nu} and \Omega_{K} become weak compared with the constraints in \LambdaCDM. Intriguingly, we find that the inflationary models with a "blue" tilt, which are excluded about 2\sigma in \LambdaCDM model, are well within 2\sigma region with the presence of the dynamics of dark energy. The upper limits of neutrino mass are weakened by a factor of 2 (95% C.L.), say, m_{\nu}<1.59 eV and m_{\nu}<1.53 eV for two forms of parametrization of the equation of state of dark energy. The flat universe is a good fit to the current data, namely, |\Omega_{K}|<0.03 (95% C.L.). With the simulated Planck and SNAP data, dynamical dark energy and \LambdaCDM might be distinguished at 4\sigma. And uncertainties of inflationary parameters, m_{\nu} and \Omega_{K} can be reduced obviously. We also constrain the rotation angle \Delta\alpha, denoting possible cosmological CPT violation, with simulated Planck and CMBpol data and find that our results are much more stringent than current constraint and will verify cosmological CPT symmetry with a higher precision. (Abridged)Comment: 15 pages, 8 figures and 3 tables, Accepted for publication in Int.J.Mod.Phys.

    Discovery and Identification of W' and Z' in SU(2) x SU(2) x U(1) Models at the LHC

    Full text link
    We explore the discovery potential of W' and Z' boson searches for various SU(2) x SU(2) x U(1) models at the Large Hadron Collider (LHC), after taking into account the constraints from low energy precision measurements and direct searches at both the Tevatron (1.96 TeV) and the LHC (7 TeV). In such models, the W' and Z' bosons emerge after the electroweak symmetry is spontaneously broken. Two patterns of the symmetry breaking are considered in this work: one is SU(2)_L x SU(2)_2 x U(1)_X to SU(2)_L x U(1)_Y (BP-I), another is SU(2)_1 x SU(2)_2 x U(1)_Y to SU(2)_L x U(1)_Y (BP-II). Examining the single production channel of W' and Z' with their subsequent leptonic decays, we find that the probability of detecting W' and Z' bosons in the considered models at the LHC (with 14 TeV) is highly limited by the low energy precision data constraints. We show that observing Z' alone, without seeing a W', does not rule out new physics models with non-Abelian gauge extension, such as the phobic models in BP-I. Models in BP-II would predict the discovery of degenerate W' and Z' bosons at the LHC.Comment: 29 pages, including 11 figures, 3 tables, added references for introductio

    Pumping Current in a Quantum Dot by an Oscillating Magnetic Field

    Full text link
    We investigate spin and charge current through a quantum dot pumped by a time-varying magnetic field. Using the density matrix method, quantum rate equations for the electronic occupation numbers in the quantum dot are obtained and solved in the stationary state limit for a wide set of setup parameters. Both charge and spin current are expressed explicitly in terms of several relevant parameters and analyzed in detail. The results suggest a way of optimizing experimental setup parameters to obtain an maximal spin current without the charge current flow.Comment: to appear in the proceedings of the international conference on frontiers in nonlinear and complex systems as a special issue in the International Journal of Modern Physics B, vol. 21

    Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    Full text link
    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.Comment: 14 pages, 8 figure

    Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction

    Full text link
    We propose a method to improve the performance of two-way continuous-variable quantum key distribution protocol by virtual photon subtraction. The Virtual photon subtraction implemented via non-Gaussian post-selection not only enhances the entanglement of two-mode squeezed vacuum state but also has advantages in simplifying physical operation and promoting efficiency. In two-way protocol, virtual photon subtraction could be applied on two sources independently. Numerical simulations show that the optimal performance of renovated two-way protocol is obtained with photon subtraction only used by Alice. The transmission distance and tolerable excess noise are improved by using the virtual photon subtraction with appropriate parameters. Moreover, the tolerable excess noise maintains a high value with the increase of distance so that the robustness of two-way continuous-variable quantum key distribution system is significantly improved, especially at long transmission distance.Comment: 15 pages, 6 figure
    corecore