Tunneling in Double Barriers

Northern Arizona University, Vol. I, No. 1, 1-9
Fall 2014
Tunneling in Double Barriers
Congwei Wu12 *
Abstract
In this research project, the main focus was on the rectangular symmetric double barrier system.
There exists an analytic solution for this system hence it is possible to verify numerical results. We
applied multiple methods to compute the numerical values of transmission coefficients for different
initial energies. As a result, a comparison between analytic solution and numerical solutions is given.
Keywords
Double Barriers Tunneling, Monte Carlo, Transfer matrix, WKB approximation
1 Department
of Physics and Astronomy, Northern Arizona University, Flagstaff, AZ
of Mathematics and Statistics, Northern Arizona University, Flagstaff, AZ
*Corresponding author: Congwei Wu, cw692@nau.edu
2 Department
Contents
1
Introduction
1
Physics Model
1
1.1 Quantum Tunneling . . . . . . . . . . . . . . . . . . . 1
Challenge to classical physics • Quantum rectangular
potential barrier
1.2 Symmetric Double Barriers . . . . . . . . . . . . . 2
Derivation • Tunneling coefficient • Analytical solution
2
Methods
3
2.1 Method of Solving Non-Linear Equations . . 3
Separation • Metropolis Monte Carlo
2.2 Method of Transfer Matrix . . . . . . . . . . . . . . 4
Background • Transfer matrix • Transmission coefficient •
Probability density function f (x)
2.3 WKB Method with Numerov Scheme . . . . . 6
WKB method • Scheme of Numerov’s method • Algorithm
3
Results and Discussion
7
3.1 Transmission Coefficient . . . . . . . . . . . . . . . 7
devices, spontaneous DNA mutation, and Radioactive
decay. For the application of semiconductor devices,
tunnel diode is one example that uses the quantum tunneling.
For a more complicated structure such as double barriers, it is almost impossible to derive analytically solutions, and many numerical methods are being used. For
instance, the Wentzel-kramers-Brillouin (WKB) method
and Numerov methods are two approximations to solving the Schr¨odinger equation. Meanwhile, new methods such as transfer matrix for solutions of wave functions, and Metropolis Monte Carlo method for estimating
ground-state energy have been developed rapidly. Hence
there is a tendency for computational statistical methods to be involved in the research of quantum physics.
In addition, a circumstance of physicists who become
Quantum Bayesianisms also indicates evidence of combination, although there is still a divergence between
Frequentists and Bayesians in the area of statistics.
Simulation settings • Results and comparison
3.2 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4
1. Physics Model
Conclusion
9
1.1 Quantum Tunneling
Appendix
9
1.1.1 Challenge to classical physics
References
9
Introduction
Quantum tunneling was developed in the 20th Century and it has widely areas of applications, such as
Scanning tunneling microscope (STM), semiconductor
In classical physics, an object can never be passing
through a physical barrier. It is also hard to imagine that
someone would pass through a wall with some probability. However, in the world of quantum mechanics, there
is some probability for particles to transmit through a
barrier, given that the kinetic energy of those particles
is lower than the required potential energy. So this type
Tunneling in Double Barriers — 2/9
of randomness gives us difficulties not only in physics
interpretation, but also in the methods involving partial
differential equations (PDE).
1.1.2 Quantum rectangular potential barrier
In quantum mechanics, the rectangular potential barrier is a one-dimensional problem which consists of
the tunneling phenomenon. This type of problem is required for solving the one-dimensional time-independent
Schr¨odinger equation. In addition, under a multiple barriers situation, an analytic solution to the Schr¨odinger
equation is not be able to obtained. In this study we are
focusing on the double-barrier problem.
1.2 Symmetric Double Barriers
In this research study, we are focusing on a symmetric structure of double barrier problem, and are proposing
statistical methods to quantum mechanics. As introduced
before, solutions to many problems require physicists to
solve the Sch¨odinger equation in order to obtain a closeform of the wave function. The wave function consists
of the fundamentals of the physical system.
d 2 ψ(x) 2m
+ 2 [E −V (x)]ψ(x) = 0
dx2
h¯
1.2.2 Tunneling coefficient
If E < V0 , then
ψI = A1 eik0 x + A2 e−ik0 x , −∞ < x < 0
ψII = B1 ek1 x + B2 e−k1 x , 0 < x < a
ψIII = C1 eik0 x +C2 e−ik0 x , a < x < b
k1 x
ψIV = D1 e
ψV = F1 e
To avoid tedious calculations, the derivations of transmission coefficient is given as follows. Since the xcoordinate does not have an impact on the derivations,
we constructed the double barriers question as: The bar-
(1)
where m is the mass of the particles, h¯ is the Planck constant, E is the total energy, V (x) is the potential energy,
and ψ(x) is the wave function. Due to the conservation
of energy, the potential V (x) is constant for all regions.
The Schr¨odinger equation can be written as five different
wave functions depending on different regions.
ik0 x
1.2.1 Derivation
−k1 x
+ D2 e
(2)
, b<x<c
, c<x<∞
Also, the wave numbers k are related to the energy via

q
 k = 2m(V − E)/¯h2 , x ∈ (0, a) ∪ (b, c)
1
0
q
k=
 k = 2mE/¯h2 ,
otherwise
0
V0
I
So the time-independent Schr¨odinger equation for
the wave function ψ(x) is
(3)
II
III
IV
a
c
b
Figure 1. General View of Double Barriers
0
V
x
riers (in yellow) are positioned between x = 0 and x = a,
and between x = b and x = c, respectively. The barriers
divide the one dimensional space in five parts. Denote
them as:
Table 1. Table of Regions
Name of Region
Region I
Region II
Region III
Region IV
Region V
Range of x
−∞ < x < 0
0<x<a
a<x<b
b<x<c
c<x<∞
The index on coefficients A, B,C, D and F denotes the
direction of the velocity vector, where 1 represents the
left and 2 represents the right. When E < V0 , k1 becomes imaginary and the wave function is exponentially
decaying within the barrier.
To determine the coefficients A, B,C, D and F, we
applied the boundary conditions of the wave function at
x = 0, x = a, x = b and x = c. Also note the derivative
of the wave function has to be continuous everywhere.
ψI (0) = ψII (0) ⇒ ψI0 (0) = ψII0 (0)
0
ψII (a) = ψIII (a) ⇒ ψII0 (a) = ψIII
(a)
0
0
ψIII (b) = ψIV (b) ⇒ ψIII
(b) = ψIV
(b)
(4)
0
ψIV (c) = ψV (c) ⇒ ψIV
(c) = ψV0 (c)
Substitute all ψ’s by the corresponding wave functions,
the boundary conditions yield the restriction on the coef-
Tunneling in Double Barriers — 3/9
2.1 Method of Solving Non-Linear Equations
ficients
2.1.1 Separation
A1 + A2 = B1 + B2
B1 e
k1 a
−k1 a
+ B2 e
ik0 a
= C1 e
+C2 e
A numerical solution can be given by solving the
system of non-linear equations (5) with Monte Carlo
simulation. The Euler’s formula yields:
−ik0 a
C1 eik0 b +C2 e−ik0 b = D1 ek1 b + D2 e−k1 b
eix = cos(x) + i sin(x)
D1 ek1 c + D2 e−k1 c = Feik0 c
A1 (ik0 ) − A2 (ik0 ) = B1 (k1 ) − B2 (k1 )
B1 k1 ek1 a − B2 k1 e−k1 a = C1 ik0 eik0 a −C2 ik0 e−ik0 a
C1 ik0 eik0 b −C2 ik0 e−ik0 b = D1 k1 ek1 b − D2 k1 e−k1 b
D1 k1 ek1 c − D2 k1 e−k1 c = Fik0 eik0 c .
(5)
1.2.3 Analytical solution
To simplify this type of problem, we treated the
system as consisting of two symmetric double barriers.
That is, widths of the two barriers are the same, namely
a − 0 = a = c − b. By Burstein and Lundqvist [1], the
closed-form of transmission coefficient can be written
as:
2
1
Ttrans = cosh(γl) + iα sinh(γl) · e−i2k0 L
2
−2
1 2
+ β sinh2 (γl)−2 ,
(6)
4
(8)
One important property of the Euler’s formula is that
it separates the imaginary parts from the real parts. So
we use the Euler’s formula rewrite (5) in terms of a
linear combination of a real part and an imaginary part.
That is, express (5) in terms of the form of (Creal ) +
(Cimaginary )i. For each part of this combination, we solve
for the coefficient independently for Creal and Cimaginary .
So (5) can be written as: (i) for all imaginary parts
A2 k0 = 0
(C1 −C2 )k0 cos(k0 a) = 0
(C1 +C2 ) sin(k0 a) = 0
(C1 −C2 )k0 cos(k0 b) = 0
(9)
(C1 +C2 ) sin(k0 b) = 0
F sin(k0 c) = 0
Fk0 cos(k0 c) = 0,
and (ii) for all real parts
where
A2 − (B1 + B2 ) = 0
l = a−0 = a = c−b
(B1 − B2 )k1 = 0
L = b−a
k0
γ
α= −
k0
γ
γ
k0
β= +
k0
γ
r
2m
γ=
(V0 − E).
h¯ 2
k1 (B1 ek1 a − B2 e−k1 a ) + (C1 +C2 )k0 sin(k0 a) = 0
(7)
Therefore, we obtained the closed-form solution of the
transmission coefficient, which can be applied for verifying our numerical results. Note that the analytic solution
is generally different for a different quantum tunneling
problem, but numerical methods are basically the same.
Hence this analytical solution for double barrier problem would help us to determine the best method among
various numerical methods.
2. Methods
B1 ek1 a + B2 e−k1 a − (C1 +C2 ) cos(k0 a) = 0
k1 (D1 ek1 b − D2 e−k1 b ) + (C1 +C2 )k0 sin(k0 a) = 0
D1 ek1 b + D2 e−k1 b − (C1 +C2 ) cos(k0 a) = 0
D1 ek1 c + D2 e−k2 c − F cos(k0 c) = 0
D1 k1 ek1 c − D2 k1 e−k1 c + Fk0 sin(k0 c) = 0.
(10)
So now our question is converted into a problem that
solves two sytsems of non-linear equations, using the
Monte Carlo simulation. In other words, solving a system of non-linear equations as follows

f1 (x1 , x2 , ..., xn ) = 0



 f2 (x1 , x2 , ..., xn ) = 0
(11)
..

.



fn (x1 , x2 , ..., xn ) = 0,
Tunneling in Double Barriers — 4/9
with a algorithm. We assume the true value of xi , i =
1, 2, ..., n is in some interval (ai , bi ). Each interval does
not necessarily be identical but for simplicity they would
be set as the same. By evaluating a large number of
points from this interval, we will eventually obtain a
sequence of points xi∗ , i = 1, 2, ..., n, which would satisfy
our equations within a given error ε. The error ε is
usually very small, and in this case we picked ε = 0.01.
2.1.2 Metropolis Monte Carlo
In statistics, the Metropolis-Hastings algorithm is a
Markov chain Monte Carlo (MCMC) method for obtaining a sequence of random samples from our interested
probability distribution [2], but it is difficult to sample directly. Statistically speaking, Markov chain is a
stochastic process in which every state of the system
only depends upon the previous state. Namely, to obtain
the information of n-th state, all we need is the information of the n − 1-th state of the system. Therefore, the
sequence obtained by MCMC can be used to estimate
some statistics that we are interested in, such as expected
value of some variable. For our purpose, we could also
apply MCMC to sample from the probability distribution (or equivalently square of the wave function) and
compute the ground state energy [3]. Since this study
focused mainly on tunneling, the ground state energy
would not be computed.
For each xi , there is a corresponding interval I =
0
(xi − α, xi0 + α) that covers the true value xi∗ . Then we
let Xi ∼ Unif(xi0 − α, xi0 + α) for the i-th variable. An
algorithm is given below: (for our case, n = 6 since we
set A1 = 1 and F2 = 0)
1. Define a detector function Ξ as
s
n
Ξ=
∑ [ fi (x1 , x2 , ..., xn )]2 .
(12)
4. If Ξnew < Ξold , then this trial is meaningful and
we let Ξold = Ξnew and let xi0 = xij . Because the
trail value xij is closer to the true value compared
with xi0 . Otherwise, go back to step 3 and select
another point xij+1 .
5. Since the trial is good, and we obtain a better Ξ,
move to the next variable xi+1 . That is, repeat step
∗ . If i = n, then set i = 1.
3 but for the point xi+1
Therefore, we applied this algorithm to either equation
(9) or (10), then we obtained a numerical values of the
coefficients A2 , B1 , B2 ,C1 ,C2 , D1 , D2 , and F, given that
E,V0 , a, b, c.
2.2 Method of Transfer Matrix
2.2.1 Background
The method of transfer matrix has been developed
rapidly over the last decades. As Ricco and Azbel mentioned [4], transfer matrix method can be applied to any
types of barrier case and extremely useful when it is hard
to obtain an analytical solution.
2.2.2 Transfer matrix
The Schr¨odinger equation for one dimensional time
independent particle with energy V0 is
d 2 ψ(x) 2m
+ 2 (E −V (x))ψ(x) = 0
dx2
h¯
(13)
where the m represents mass of the particle. We divided
any barrier into N number of intervals, and each interval
the solution of the Schr¨odinger equation can be written
as
ψn (x) = An eikn x + Bn e−ikn x
(14)
i=1
Note for the sequence of solutions {xi∗ }, we should
have Ξ = 0. So a value of Ξ detects whether a
sequence of {xi } is our solution.
2. Pick a starting point xi0 for each i, i = 1, 2, ..., n.
Let α be some relative big number, for example,
10000. Calculate Ξ, denote as Ξold . Define an
interval (xi0 − α, xi0 + α) for which we assume that
the true sequence of solutions {xi∗ } is in this ndimensional space.
3. For the j-th sampling, we randomly select a point
xij from (xi0 − α, xi0 + α), then plug it into (11). So
(11) gives a new value of Ξ. Denote as Ξnew .
where xn−1 < x < xn and kn =
Denote
q
2m(E −V (xn ))/¯h2 .
Knxn = eikn xn
Kn∗xn = e−ikn xn
xn
Kn+1
= eikn+1 xn
∗xn
Kn+1
= e−ikn+1 xn ,
(15)
For every two consecutive intervals, namely (xn , xn+1 )
and (xn+1 , xn+2 ), the left-hand side of wave functions
Tunneling in Double Barriers — 5/9
and their derivatives along with the wave functions is
ψn (xn ) = An Knxn + Bn Kn∗xn
ψn0 (xn ) = An ikn Knxn − Bn ikn Kn∗xn
∗x
x
n+1
n+1
ψn+1 (xn+1 ) = An+1 Kn+1
+ Bn+1 Kn+1
x
∗x
0
n+1
n+1
ψn+1
(xn+1 ) = An+1 ikn+1 Kn+1
− Bn+1 ikn+1 Kn+1
(16)
By the boundary conditions at x = xn+1 , we obtain
ψn (xn+1 )
ψn+1 (xn+1 )
ψn (xn+1 − δ )
=
=
0 (x
ψn0 (xn+1 )
ψn+1
ψn0 (xn+1 − δ )
n+1 )
(17)
where the width of interval is defined as δ = xn+1 − xn .
Denote
ik x
e n+1 n+1
eikn+1 xn+1
Λn (xn+1 ) =
ikn eikn xn+1 −ikn e−ikn xn+1
ik x
e n+1 n+1
eikn+1 xn+1
Λn+1 (xn+1 ) =
ikn+1 eikn+1 xn+1 −ikn+1 e−ikn+1 xn+1
(18)
Then
ψn (xn+1 )
A
= Λn (xn+1 ) n
ψn0 (xn+1 )
Bn
ψn+1 (xn+1 )
An+1
= Λn+1 (xn+1 )
0 (x
ψn+1
Bn+1
n+1 )
So we obtain
ψn (xn+1 )
ψn+1 (xn+1 )
= (Tn+1 ) 0
ψn0 (xn+1 )
ψn+1 (xn+1 )
(19)
So (20) and (22) together yield
ψ0 (x0 )
ψN (xN )
= T1 T2 ...TN 0
ψ00 (x0 )
ψN (xN )
where T j,k , j, k ∈ {1, 2} are elements of the transfer matrix T . So we rewrite (23) and thus
ψ0 (x0 )
ψN (xN )
Ta Tb ψN (xN )
=T
=
ψ00 (x0 )
ψN0 (xN )
Tc Td ψN0 (xN )
(25)
which gives
ψN (xN )
−1 ψ0 (x0 )
=T
ψN0 (xN )
ψ00 (x0 )
(26)
2.2.3 Transmission coefficient
By the definition of transfer matrix T , we can cite
find the transfer coefficient. Note that the wave functions
for region I and region V are defined as:
ψ0 (x0 ) = A1 eik0 x0 + A0 e−ik0 x0
(27)
ψN (xN ) = AN eikN xN
(28)
Then by (27), (28) and (25) we have
ik x
A1 e 0 0 + A0 e−ik0 x0
Ta Tb ψN (xN )
=
ψ00 (x0 )
Tc Td ψN0 (xN )
(29)
After tedious matrices calculation, it yields that
(20)
where Tn+1 is derived by Tn+1 = [Λn (xn+1 )][Λn (xn )−1 ],
namely
1
cos(kn+1 δ )
− kn+1
sin(kn+1 δ )
Tn+1 =
kn+1 sin(kn+1 δ )
cos(kn+1 δ )
(21)
So by (21) we define the matrix Tn as
cos(kn δ ) − k1n sin(kn δ )
Tn =
kn sin(kn δ )
cos(kn δ )
Then define the transfer matrix as
1
N sin(kn+1 δ )
cos(kn+1 δ )
− kn+1
T=∏
cos(kn+1 δ )
n=1 kn+1 sin(kn+1 δ )
(24)
AN =
2ik0 ei(k0 x0 −kN xN )
ik0 (Ta + ikN Tb ) + Tc + ikN Td
2
2ik0 ei(k0 x0 −kN xN )
Ttrans = |AN | = ik0 (Ta + ikN Tb ) + Tc + ikN Td 2
(31)
Rre f = 1 − Ttrans .
(22)
(23)
(30)
(32)
2.2.4 Probability density function f (x)
In order to derive the general probability density function for each n state, then we divide the total length of x
into N of lengths. By (20), let n + 1 = N then we have
ψN−1 (xN−1 )
ψN (xN )
= TN 0
,
(33)
0
ψN−2
(xN−2 )
ψN (xN )
Tunneling in Double Barriers — 6/9
Obviously, (23), (24) and (25) indicate that the matrix sequence of [ψn (xn )ψn0 (xn )]T is a geometric matrix
sequence, which can be written as:
ψn (xn )
AN eikN xN
n ψN (xN )
=
T
=
(34)
ψn0 (xn )
ψN0 (xN )
ikN AN eikN xN
where
1
cos(kn+1 δ )
− kn+1
sin(kn+1 δ )
T =∏
,
cos(kn+1 δ )
n=0 kn+1 sin(kn+1 δ )
n
Ta Tbn
n
.
(35)
T = n
Tc Tdn
N
n
So the wave function for each state of n is
ψn (xn ) = Tan An eikN xN + ikN Tbn AN eikN xN .
(36)
Then we obtain the probability density function f (xn ) for
each n state, for which the wave function is normalized
|ψn (xn )|2
.
f (xn ) = R ∞
2
−∞ |ψn (xn )| dxn
(37)
R
2.3 WKB Method with Numerov Scheme
2.3.1 WKB method
WKB approximation is a half-classical computational
method that can be used to solve a linear partial differential equations with varying coefficients [3]. The idea is
to use some exponential functions to replace the wave
functions in the Schr¨odinger’s equation, then find an
asymptotic series as an approximation of the exponential
function. Finally we take the limit of the asymptotic
series, and obtain an approximation of the wave function. Since we focus on the transmission coefficient in
this study, the WKB method was applied to find the
transmission coefficient instead of the wave functions.
In general, for a differential equation
dn y
dn−1 y
dy
+
a
x
+ ... + an−1 + an y = 0, (38)
1
n
n−1
dx
dx
dx
where ε > 0 is a very small number. We assume that
the solution can be expressed as an asymptotic series,
namely
y(x) ≈ exp
1 ∞ n
δ Sn (x) .
∑
δ n=0
φ10 = φ2
2m
φ20 = 2 (V (x) − E)φ1 .
h¯
(40)
(41)
We write the wave function as
∞
Since the presence of −∞
|ψn (xn )|2 dxn (constant), the
probability density function f (xn ) is normalized, which
has a range from 0 to 1.
ε
n
Then we substitute exp δ1 ∑∞
n=0 δ Sn (x) into the differential equation. Let δ → 0, then starting with n = 0
solve for every single Sn (x). Note most cases the series
is not convergent, so when n is sufficiently large, δ n Sn (x)
would increase. Therefore, once δ n Sn (x) increases, we
stop substituting n, and hence an approximate solution
yields.
For our symmetric double barrier, the differential
equation is the Schr¨odinger equation (1), where our variable of interest is the wave function ψ(x). To apply the
WKB method, first we write the Schr¨odinger equation
(1) as a system of two first-order linear ordinary differential equations with φ1 = ψ and φ2 = dψ/dx. That
is,
(39)
ψ = A(x)eiφ (x) .
(42)
Assume the potential is changing slowly, then d2 φ /dx2 →
0, the solution of the Schr¨odinger equation is
R
1
ψ = A p e±i/¯h |p|dx
|p|
p
k = 2m[E −V0 ].
(43)
(44)
So the asymptotic forms is a power series
∞
A=
∑ h¯ n An (x).
(45)
n=0
2.3.2 Scheme of Numerov’s method
Numerov’s method is a numerical method to solve ordinary differential equations [3], which is especially useful for the one-dimensional time-independent Schr¨odinger
equation. Combined together with the WKB method,
the error of our approximation could be reduced to
very small. There also exists less accurate methods for
solving the Schr¨odinger equation, such as Runge-Kutta
method. However, the basic algorithm for both methods is the same. As long as a minimization scheme of
the Numerov’s method is well designed, then it should
give a relatively close or useful numerical solution to
the double-barrier system. In our design scheme, the
Numerov’s method is mainly used to reduce the error of
the last term of the asymptotic series within the WKB
approximation.
Tunneling in Double Barriers — 7/9
From the Taylor expansion of g(x) about a point x0 :
N∈N
g(x) = g(x0 ) +
∑
k=1
(x − x0 )k g(k) (x0 )
k!
(46)
Then let the distance between x to x0 be h = x − x0 , and
then x = h + x0 . So we rewrite the Taylor expansion of
g(x) as:
So (52) yields the Numerov’s method, and the reminder
O(h6 ) is ignored in calculation. In other words, the error
in each time step is O(h6 ), which decreases with steps,
and the first term of this sequence of error is O(h4 ).
Therefore, we derived the Numerov formula for determining ψn , for n = 2, 3, ..., given ψ0 and ψ1 as two initial
values.
2.3.3 Algorithm
g(x0 + h) = g(x0 ) +
N∈N k (k)
h g (x
∑
0)
(47)
k!
k=1
So (47) means the point x0 of the Taylor expansion is
taking a step forward by an amount of h. That is, the
original expansion point of center is x0 , and we shift
this point to x0 + h. Likewise, we can also derive an
expansion of backward by taking a step of h back:
N∈N
g(x0 − h) = g(x0 ) +
∑
k=1
(−h)k g(k) (x0 )
k!
(48)
For computational purpose, the length h is small, so each
time the expansion point is shifted slightly, forward or
backward. Note
gn+1 = g(xn + h) = g(xn ) +
N∈N k (k)
h g (xn )
∑
k=1
N∈N
gn−1 = g(xn − h) = g(xn ) +
∑
k=1
k!
(49)
(−h)k g(k) (xn )
.
k!
(50)
The sum of (49) and (50) gives
00
gn−1 + gn+1 = 2gn + h2 gn +
h4 4
g + O(h6 ) (51)
12 n
where O(h6 ) denotes terms with order 6 or higher than
order 6. Namely, O(h6 ) denotes the reminder of the
Taylor expansion. Then we obtain a differential equation
as follows:
Applying the Numerov’s method to the double-barrier
problem requires an adjusted scheme, since each boundary condition contains complex numbers. Therefore, a
scheme designed for double-barrier is listed as follows:
1. In order to separate a complex parameter A, we let
2 2
A = Ar + iAi , given that a particle energy E = h¯2mk .
Then we guess two initial values ψ0 and ψ1 .
2. The transmission coefficient can be written as [5]
T3 (C4 −C3 ) C3 +C4 2
Ttrans = +
(54)
4
T3 1 T1
(55)
C3 = ( − )eiT2
T1
4
1
T1
(56)
C4 = ( + )e−iT2
4 T1
Z x4
|k|
T1 = exp(−
dx)
(57)
¯
x3 h
Z x3
|k|
dx
(58)
T2 =
¯
x2 h
Z x2
|k|
T3 = exp(−
dx).
(59)
¯
x1 h
Therefore, we obtained a numerical result of the transmission coefficient.
3. Results and Discussion
3.1 Transmission Coefficient
3.1.1 Simulation settings
Since our study project is focusing on the tunneling in
double barrier, it is necessary to obtain the transmission
h4
coefficient for our model. Note there are three numerical
h2 an gn = 2gn − gn−1 − gn+1 + g4n + O(h6 )
methods, so we set up various numerical systems such
12
(52) that every method can be evaluated under different circumstances. Additionally, the closed-form solution for
The solution of (52) is
the symmetric double barrier system is obtained, so our
numerical simulated environment would be also built on
2
h2
(2 − 5h6 an )gn − (1 + 12
an−1 )gn+1
gn+1 =
+ O(h6 ) this symmetric system. From (7) we knew that l reph2
1 + 12
an+1
resents the width of each barrier, and L represents the
(53) distance between two barriers.
Tunneling in Double Barriers — 8/9
Table 2. Table of Simulation Settings
Circumstances
V0 , in eV l, in m L, in m
I: Basic
1
10−10 10−10
II: Huge Barriers
1
10−9
10−10
III: Long Distance 1
10−10 20−9
IV: High Potential 2
10−10 10−10
reach the same level as in the basic model. For example,
at V0 = 1eV , it demands E = 0.20eV for a Ttrans ≈ 33%,
while at V0 = 2eV , it demands E = 0.40eV for the Ttrans
be able to pass 36%.
Second we applied the each numerical method to the
setting I, the basic model:
Table 4. Table of Ttrans from Different Methods
There are four settings that base on the symmetric
system, which were consisted of four distinct circumstances. The basic circumstance is a possibly realistic
model in real world, and the other three are extremal
situations in different ways. The huge barriers model has
two large barriers with widths of 10−9 meters and the distance between two barriers for the long distance model
is large, also reaching 2 × 10−9 meters. Note that the
total width of the systems for both models are the same,
so it is reasonable that the transmission coefficients for
both models be the same. But due to the existence of the
double barriers, the transmission coefficients might be
somehow different. The last model is called the high potential model, which has a relative high potential energy
for both barriers. Thus if given same kinetic energy, the
transmission coefficient for this model would be likely
lower than the basic model, because it requires higher
energy for particles to be tunneling.
3.1.2 Results and comparison
First we calculated the exact values for all four settings via (7). The results are as follows:
Table 3. Table of Exact Ttrans for All Settings
Results
E
0.10
0.20
0.30
0.40
0.50
I
0.01068
0.33145
0.41192
0.82572
0.73648
Settings
II
III
0.00032 0.01052
0.17954 0.33029
0.25698 0.40974
0.56232 0.82003
0.51041 0.72966
IV
0.00120
0.08061
0.20568
0.36557
0.48706
It is obvious that the long distance model has a higher
transmission coefficient than the huge barriers model. Although the total widths of both models are the same, the
width of barrier has the main effect on the transmission
coefficient. Compared the data between basic model and
long distance model, it is apparent that the Ttrans of long
distance model is very close to the Ttrans of the basic
model. So it indicates that the distance between two barriers does not have a big impact on the Ttrans . Finally, for
the high potential model, E must be higher to be able to
Results
E
0.10
0.20
0.30
0.40
0.50
Methods for Setting I
Monte Carlo Transfer Matrix
0.01564
0.01395
0.33149
0.35142
0.40190
0.42007
0.83555
0.83134
0.74647
0.75164
WKB
0.00002
0.13415
0.36287
0.52334
0.39787
As we expected, the Monte Carlo method is the most
accurate method among all three numerical methods.
For each energy level, the Monte Carlo method gives
almost the same result as the true value. In addition, the
transfer matrix method also yields relative close result,
compared to the true values. Note that as long as the
simulation time sufficiently large, both Monte Carlo and
transfer matrix methods could be very close to the true
values, within error less than 10−10 . In our study, we
constricted the computing time to about 120 minutes,
so both methods did not converge with a very small
error. Through this comparison, it is obvious that the
convergent speed of Monte Carlo is a little faster than
the transfer matrix’s. The reason is probably for the
optimization scheme for the Monte Carlo method, and
hence this method has a higher efficiency.
However, the WKB method seems to be the worst
among all numerical methods. Compared to the true
values, the WKB method is not only underestimated
the Ttrans , but also it has a relative big error, which is
over 40% of the estimate. Even though the Numerov’s
method came with the WKB to eliminate the error, the
results are still not acceptable. The reason for such poor
performance is expected to be the divergent asymptotic
series. As mentioned before, usually the asymptotic
series we chose to approximate is not convergent, and
thus it would give a relative large error because of the
divergence.
3.2 Discussion
Overall, the Monte Carlo method with the scheme
of optimization is the best method among all numerical
methods. A visualized figure is provided as follows:
Tunneling in Double Barriers — 9/9
Figure 2. Figure of data
Note that the estimated line of the Monte Carlo is
almost the same as the true value line, so is the line
of transfer matrix. Therefore, these two methods are
actually both good, even though the Monte Carlo method
is slightly better in estimation. In addition, it is obvious
that the WKB method is off by a large error.
References
[1]
E. Burstein and S. Lundqvist. Tunneling phenomena
in solids. Plenum Press, 1:9–12, 1969.
[2]
R.E. Salvino and F.A. Buot. Self-consistent monte
carlo particle transport with model quantum tunneling dynamics: Application to the intrinsic bistability
of a symmetric double-barrier structure. Journal of
Applied Physics, 72:5975–5981, 1992.
[3]
T. Pang. An introduction to computational physics.
Cambridge University Press, 2:110–115, 2006.
[4]
B. Ricco and M.Ya. Azbel. Physics of resonant unneling. the one-dimensional double-barrier case. Physical Review Letter B, 29:2, 1984.
[5]
A. Dutt and S. Kar. Smooth double barriers in
quantum mechanics. American Journal of Physics,
78:1352–1360, 2010.
4. Conclusion
In this study, for the symmetric rectangular double
barrier system, we derived the analytical solution, and
also introduced three numerical methods to obtain the
transmission coefficient. A simulation study is given
and the Monte Carlo and transfer matrix are the two best
numerical methods.
In the future study, the goal is to develop a better
scheme for the WKB method in order to obtain a less
error estimation. As a classical method, WKB still plays
an important role in the area of quantum mechanics so it
is necessary to have a better performance in estimation.
Appendix