Pai-Chai University
We describe the statistics of chaotic wavefunctions near periodic orbits using a basis of states which optimise the effect of scarring. These states reflect the underlying structure of stable and unstable manifolds in phase space and provide a natural means of characterising scarring effects in individual wavefunctions as well as their collective statistical properties. In particular, these states may be used to find scarring in regions of the spectrum normally associated with antiscarring and suggest a characterisation of templates for scarred wavefunctions which vary over the spectrum. The results are applied to quantum maps and billiard systems.
We study resonance patterns of a spiral-shaped dielectric microcavity with chaotic ray dynamics. Many resonance patterns of this microcavity, with refractive indices n=2n=2 and 3, exhibit strong localization of simple geometric shape, and we call them {\em quasi-scarred resonances} in the sense that there is, unlike the conventional scarring, no underlying periodic orbits. It is shown that the formation of quasi-scarred pattern can be understood in ter ms of ray dynamical probability distributions and wave properties like uncertainty and interference.
We apply the generalized uncertainty principle to the thermodynamics of a small black hole. Here we have a black hole system with the UV cutoff. It is shown that the minimal length induced by the GUP interrupts the Gross-Perry-Yaffe phase transition for a small black hole. In order to see whether the black hole remnant takes place a transition to a large black hole, we introduce a black hole in a cavity (IR system). However, we fail to show the phase transition of the remnant to the large black hole.
We propose a new quantum key distribution scheme that uses the blind polarization basis. In our scheme the sender and the receiver share key information by exchanging qubits with arbitrary polarization angles without basis reconciliation. As only random polarizations are transmitted, our protocol is secure even when a key is embedded in a not-so-weak coherent-state pulse. We show its security against the photon number splitting attack and the impersonation attack.
There are no more papers matching your filters at the moment.