• No results found

Berezinskii-Kosterlitz-Thouless phase transition from lattice sine-Gordon model

N/A
N/A
Protected

Academic year: 2020

Share "Berezinskii-Kosterlitz-Thouless phase transition from lattice sine-Gordon model"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. Illustration of the vortex binding andunbinding on the two side of the BKT transition.
Figure 3. The autocorrelation in the thickness observable on a 64O × 64 lattice for y = 0.1, and t that bracketthe phase transition
Figure 4. Thickness versusbehaviors occurs for t for various y for an L = 64 lattice. It can be seen that a cross-over between different y ∼ 1, with a nonlinear dependence of σ2 on t appearing for large y

References

Related documents

With three ranking algorithms based on network structure of Wikipedia, we assign ranking to all articles in 9 multilingual editions of Wikipedia and investigate general

International joint venture negotiation behaviour outcome : the role of bargaining power, culture and trust (qualitative case studies.. (Unpublished Doctoral thesis, City

Open Access.. Keynes argues that exports lead expanding the output via foreign trade multiplier in the short-run [9]. However, most of the previous studies that tested ELGH

Aspects of Relationship Formation in Foster Care Mourning: The Loss of the Primary Attachment Figure Durability of Attachment The Child 's Right to a Biologica l Family A Sense

The discussions centred on presentations describing the approach and experience gained in the United Kingdom with the "Em- ployer's Manpower and Skill Practices Sur-

In this paper we describe how the Kalman-Bucy filter can be extended to L´evy noise in both the system and observations, with the system noise having a finite second moment while

Between the first two quarters of 1983 production of capital goods in the Community (EUR 10) was rather inclined to fall (-0.6%), whereas production of intermediate products

In this paper, we propose a method that allows the data owner to delegate the auditing task to a potentially untrusted third party auditor in a secure manner: (1) The data owner