21,599 research outputs found
Constraints on the ultracompact minihalos using neutrino signals from the gravitino dark matter decay
Ultracompact dark matter minihalos (UCMHs) would be formed during the earlier
universe if there were large density perturbations. If the dark matter can
decay into the standard model particles, such as neutrinos, these objects would
become the potential astrophysical sources and could be detected by the related
instruments, such as IceCube. In this paper, we investigate the neutrino
signals from the nearby UCMHs due to the gravitino dark matter decay and
compare these signals with the background neutrino flux which is mainly from
the atmosphere to get the constraints on the abundance of UCMHs.Comment: 7 pages, 3 figures, Accepted by RAA (Research in Astronomy and
Astrophysics). Comments welcome!
Probing Half-odd Topological Number with Cold Atoms in a Non-Abelian Optical Lattice
We propose an experimental scheme to probe the contribution of a single Dirac
cone to the Hall conductivity as half-odd topological number sequence. In our
scheme, the quantum anomalous Hall effect as in graphene is simulated with cold
atoms trapped in an optical lattice and subjected to a laser-induced
non-Abelian gauge field. By tuning the laser intensity to change the gauge
flux, the energies of the four Dirac points in the first Brillouin zone are
shifted with each other and the contribution of the single Dirac cone to the
total atomic Hall conductivity is manifested. We also show such manifestation
can be experimentally probed with atomic density profile measurements.Comment: 5 pages, 3 figure
Practical decoy-state measurement-device-independent quantum key distribution
Measurement-device-independent quantum key distribution (MDI-QKD) is immune
to all the detection attacks; thus when it is combined with the decoy-state
method, the final key is unconditionally secure, even if a practical weak
coherent source is used by Alice and Bob. However, until now, the analysis of
decoy-state MDI-QKD with a weak coherent source is incomplete. In this paper,
we derive, with only vacuum+weak decoy state, some tight formulas to estimate
the lower bound of yield and the upper bound of error rate for the fraction of
signals in which both Alice and Bob send a single-photon pulse to the untrusted
third party Charlie. The numerical simulations show that our method with only
vacuum+weak decoy state can asymptotically approach the theoretical limit of
the infinite number of decoy states. Furthermore, the statistical fluctuation
due to the finite length of date is also considered based on the standard
statistical analysis.Comment: 5 pages, 3 figure
- …
