Results 71 to 80 of about 448,148 (200)

Spectral sequences in string topology [PDF]

open access: yesAlgebraic & Geometric Topology, 2011
In this paper, we investigate the behaviour of the Serre spectral sequence with respect to the algebraic structures of string topology in generalized homology theories, specificially with the Chas-Sullivan product and the corresponding coproduct and module structures. We prove compatibility for two kinds of fibre bundles: the fibre bundle $ ^n M \to L^
openaire   +4 more sources

Observation of vortex-string chiral modes in metamaterials

open access: yesNature Communications
As hypothetical topological defects in the geometry of spacetime, vortex strings could have played many roles in cosmology, and their distinct features can provide observable clues about the early universe’s evolution.
Jingwen Ma   +9 more
doaj   +1 more source

TOPOLOGICAL STRINGS ON NONCOMMUTATIVE MANIFOLDS [PDF]

open access: yesInternational Journal of Geometric Methods in Modern Physics, 2004
We identify a deformation of the N=2 supersymmetric sigma model on a Calabi–Yau manifold X which has the same effect on B-branes as a noncommutative deformation of X. We show that for hyperkähler X such deformations allow one to interpolate continuously between the A-model and the B-model.
openaire   +4 more sources

Topologically Alice strings and monopoles [PDF]

open access: yesPhysical Review D, 2004
2 figures; this paper consolidates preprints hep-th/0304161 and hep-th/0304162, to appear in Phys.
Benson, Katherine M., Imbo, Tom
openaire   +2 more sources

Realization of a two-dimensional Weyl semimetal and topological Fermi strings

open access: yesNature Communications
A two-dimensional (2D) Weyl semimetal, akin to a spinful variant of graphene, represents a topological matter characterized by Weyl fermion-like quasiparticles in low dimensions.
Qiangsheng Lu   +22 more
semanticscholar   +1 more source

Random Generation Topology Coding Technique in Asymmetric Topology Encryption

open access: yesMathematics
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers ...
Jing Su, Bing Yao
doaj   +1 more source

Bethe/Gauge correspondence in odd dimension: modular double, non-perturbative corrections and open topological strings [PDF]

open access: yes, 2016
A bstractBethe/Gauge correspondence as it is usually stated is ill-defined in five dimensions and needs a “non-perturbative” completion; a related problem also appears in three dimensions.
A. Sciarappa
semanticscholar   +1 more source

New Z3 strings

open access: yesPhysics Letters B, 2016
We consider a Yang–Mills–Higgs theory with the gauge group SU(3) broken to its center Z3 by two scalar fields in the adjoint representation and obtain new Z3 strings asymptotic configurations with the gauge field and magnetic field in the direction of ...
Marco A.C. Kneipp, Paulo J. Liebgott
doaj   +1 more source

Defects in the 3-dimensional toric code model form a braided fusion 2-category

open access: yesJournal of High Energy Physics, 2020
It was well known that there are e-particles and m-strings in the 3-dimensional (spatial dimension) toric code model, which realizes the 3-dimensional ℤ2 topological order.
Liang Kong, Yin Tian, Zhi-Hao Zhang
doaj   +1 more source

ABJM on ellipsoid and topological strings [PDF]

open access: yes, 2016
A bstractIt is known that the large N expansion of the partition function in ABJM theory on a three-sphere is completely determined by the topological string on local Hirzebruch surface F0$$ {\mathbb{F}}_0 $$.
Yasuyuki Hatsuda
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy