Global Information Lookup Global Information

Trojan wave packet information


Trojan wavepacket evolution animation
Classical simulation of the Trojan wavepacket on 1982 home ZX Spectrum microcomputer. The packet is approximated by the ensemble of points initially randomly localized within the peak of a Gaussian and moving according to the Newton equations. The ensemble stays localized. For the comparison the second simulation follows when the strength of the circularly polarized electric (rotating) field is equal to zero and the packet (points) fully spreads around the circle.

A trojan wave packet is a wave packet that is nonstationary and nonspreading. It is part of an artificially created system that consists of a nucleus and one or more electron wave packets, and that is highly excited under a continuous electromagnetic field. Its discovery as one of significant contributions to the Quantum Theory was awarded the 2022 Wigner Medal for Iwo Bialynicki-Birula[1]

The strong, polarized electromagnetic field, holds or "traps" each electron wave packet in an intentionally selected orbit (energy shell).[2][3] They derive their names from the trojan asteroids in the Sun–Jupiter system.[4] Trojan asteroids orbit around the Sun in Jupiter's orbit at its Lagrangian equilibrium points L4 and L5, where they are phase-locked and protected from collision with each other, and this phenomenon is analogous to the way the wave packet is held together.

  1. ^ Bialynicki-Birula, Iwo; Kalinski, Matt; Eberly, J. H. (1994). "Lagrange Equilibrium Points in Celestial Mechanics and Nonspreading Wave Packets for Strongly Driven Rydberg Electrons" (PDF). Physical Review Letters. 73 (13): 1777–1780. Bibcode:1994PhRvL..73.1777B. doi:10.1103/PhysRevLett.73.1777. PMID 10056884.
  2. ^ Bialynicka-Birula, Zofia; Bialynicki-Birula, Iwo (1997). "Radiative decay of Trojan wave packets" (PDF). Physical Review A. 56 (5): 3623. Bibcode:1997PhRvA..56.3623B. doi:10.1103/PhysRevA.56.3623.
  3. ^ Kalinski, Maciej; Eberly, JH (1996). "Trojan wave packets: Mathieu theory and generation from circular states". Physical Review A. 53 (3): 1715–1724. Bibcode:1996PhRvA..53.1715K. doi:10.1103/PhysRevA.53.1715. PMID 9913064.
  4. ^ Kochański, Piotr; Bialynicka-Birula, Zofia; Bialynicki-Birula, Iwo (2000). "Squeezing of electromagnetic field in a cavity by electrons in Trojan states". Physical Review A. 63 (1): 013811. arXiv:quant-ph/0007033v1. Bibcode:2000PhRvA..63a3811K. doi:10.1103/PhysRevA.63.013811. S2CID 36895794.

and 24 Related for: Trojan wave packet information

Request time (Page generated in 0.9556 seconds.)

Trojan wave packet

Last Update:

A trojan wave packet is a wave packet that is nonstationary and nonspreading. It is part of an artificially created system that consists of a nucleus...

Word Count : 1633

Wave

Last Update:

solids Spin wave, in magnetism Spin density wave, in solid materials Trojan wave packet, in particle science Waves in plasmas, in plasma physics Absorption...

Word Count : 7928

Index of wave articles

Last Update:

This is a list of wave topics. Contents:  Top 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z...

Word Count : 37

Quantum dot

Last Update:

single-photon source Quantum point contact Shuming Nie Superatom Trojan wave packet Uri Banin Shishodia, Shubham; Chouchene, Bilel; Gries, Thomas; Schneider...

Word Count : 13191

Isotope separation

Last Update:

deuterium separation using Trojan wavepackets in circularly polarized electromagnetic field. The process of Trojan wave packet formation by the adiabatic-rapid...

Word Count : 4318

Quantum revival

Last Update:

till it will fully revive. Especially once created by fields the Trojan wave packet in a hydrogen atom exists without any external fields stroboscopically...

Word Count : 1039

Hopfield dielectric

Last Update:

other charge is wave-like. Mathematically the Hopfield dielectric for the one mode of excitation is equivalent to the Trojan wave packet in the harmonic...

Word Count : 1162

Superradiant phase transition

Last Update:

system is mathematically equivalent for one mode of excitation to the Trojan wave packet, when the circularly polarized field intensity corresponds to the...

Word Count : 2436

Storm Worm

Last Update:

passing on packets to destinations encoded within the malware itself. According to Symantec, it may also download and run the Trojan.Abwiz.F trojan, and the...

Word Count : 1497

Eavesdropping

Last Update:

categorized as trojan viruses or more broadly as spyware. Network eavesdropping is a network layer attack that focuses on capturing small packets from the network...

Word Count : 675

Computer and network surveillance

Last Update:

called packets, which are routed to their destination and assembled back into a complete message. A packet capture appliance intercepts these packets, so...

Word Count : 4811

Alureon

Last Update:

Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking...

Word Count : 1052

Incat

Last Update:

by Bob Clifford. The company builds vessels using aluminium construction, wave-piercing and water-jet technology. Vessels have been constructed up to 130...

Word Count : 1630

Webcam

Last Update:

working from home. First developed in 1991, a webcam was pointed at the Trojan Room coffee pot in the Cambridge University Computer Science Department...

Word Count : 3646

List of TCP and UDP port numbers

Last Update:

[user-generated source] Knudsen, Kent (April 5, 2002). "Tracking the Back Orifice Trojan On a University Network". sans.org. p. 7. Archived from the original (PDF)...

Word Count : 12630

List of missing ships

Last Update:

distress call. Sudden disasters such as military strike, collision, rogue wave, or piracy could also prevent a crew from sending a distress call and reporting...

Word Count : 2003

Information Sciences Institute

Last Update:

Cohen, became first to implement packet voice and packet video over ARPANET, demonstrating the viability of packet switching for real-time applications...

Word Count : 2038

List of common misconceptions

Last Update:

The macOS and Linux operating systems are not immune to malware such as trojan horses or computer viruses. Specialized malware designed to attack those...

Word Count : 55906

Telephone exchange names

Last Update:

UNderhill, UNion, UNiversity, VOlunteer 87 TRemont, TRiangle, TRinity, TRojan, UPtown 88 TUcker, TUlip, TUrner, TUxedo 89 TWilight, TWinbrook, TWining...

Word Count : 3724

List of inventors

Last Update:

Hull (born 1939), U.S. – 3D printer Troy Hurtubise (1963–2018), Canada – Trojan Ballistics Suit of Armor, Ursus suit, Firepaste, Angel Light Miller Reese...

Word Count : 11964

Windows Vista

Last Update:

malware samples, consisting of backdoors, keyloggers, rootkits, mass mailers, trojan horses, spyware, adware, and various other samples. Each was executed on...

Word Count : 16501

ANT catalog

Last Update:

2022-04-07. Stöcker, Christian; Rosenbach, Marcel (25 November 2014). "Trojaner Regin ist ein Werkzeug von NSA und GCHQ". Spiegel Online (in German). Archived...

Word Count : 1789

Softcam

Last Update:

camfecter sends his victim an innocent-looking application which has a Trojan horse software through which the camfecter can control the victim's webcam...

Word Count : 447

Liverpool

Last Update:

Services are provided by several companies, including the Isle of Man Steam Packet Company, P&O Ferries and Stena Line. The Liverpool Cruise Terminal handles...

Word Count : 31212

PDF Search Engine © AllGlobal.net