23,890 research outputs found
Universal Source Polarization and an Application to a Multi-User Problem
We propose a scheme that universally achieves the smallest possible
compression rate for a class of sources with side information, and develop an
application of this result for a joint source channel coding problem over a
broadcast channel.Comment: to be presented at Allerton 201
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Towards 'smart lasers': self-optimisation of an ultrafast pulse source using a genetic algorithm
Short-pulse fibre lasers are a complex dynamical system possessing a broad
space of operating states that can be accessed through control of cavity
parameters. Determination of target regimes is a multi-parameter global
optimisation problem. Here, we report the implementation of a genetic algorithm
to intelligently locate optimum parameters for stable single-pulse mode-locking
in a Figure-8 fibre laser, and fully automate the system turn-on procedure.
Stable ultrashort pulses are repeatably achieved by employing a compound
fitness function that monitors both temporal and spectral output properties of
the laser. Our method of encoding photonics expertise into an algorithm and
applying machine-learning principles paves the way to self-optimising `smart'
optical technologies
Ninja: Automated Integrand Reduction via Laurent Expansion for One-Loop Amplitudes
We present the public C++ library Ninja, which implements the Integrand
Reduction via Laurent Expansion method for the computation of one-loop
integrals. The algorithm is suited for applications to complex one-loop
processes.Comment: Published versio
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
Automatic Computation of Feynman Diagrams
Quantum corrections significantly influence the quantities observed in modern
particle physics. The corresponding theoretical computations are usually quite
lengthy which makes their automation mandatory. This review reports on the
current status of automatic calculation of Feynman diagrams in particle
physics. The most important theoretical techniques are introduced and their
usefulness is demonstrated with the help of simple examples. A survey over
frequently used programs and packages is provided, discussing their abilities
and fields of applications. Subsequently, some powerful packages which have
already been applied to important physical problems are described in more
detail. The review closes with the discussion of a few typical applications for
the automated computation of Feynman diagrams, addressing current physical
questions like properties of the and Higgs boson, four-loop corrections to
renormalization group functions and two-loop electroweak corrections.Comment: Latex, 62 pages. Typos corrected, references updated and some
comments added. Vertical offset changed. The complete paper is also available
via anonymous ftp at ftp://ttpux2.physik.uni-karlsruhe.de/ttp98/ttp98-41/ or
via www at http://www-ttp.physik.uni-karlsruhe.de/Preprints
Field test of a practical secure communication network with decoy-state quantum cryptography
We present a secure network communication system that operated with
decoy-state quantum cryptography in a real-world application scenario. The full
key exchange and application protocols were performed in real time among three
nodes, in which two adjacent nodes were connected by approximate 20 km of
commercial telecom optical fiber. The generated quantum keys were immediately
employed and demonstrated for communication applications, including unbreakable
real-time voice telephone between any two of the three communication nodes, or
a broadcast from one node to the other two nodes by using one-time pad
encryption.Comment: 10 pages, 2 figures, 2 tables, typos correcte
- âŠ