1,023 research outputs found
Quantum Correlation Bounds for Quantum Information Experiments Optimization: the Wigner Inequality Case
Violation of modified Wigner inequality by means binary bipartite quantum
system allows the discrimination between the quantum world and the classical
local-realistic one, and also ensures the security of Ekert-like quantum key
distribution protocol. In this paper we study both theoretically and
experimentally the bounds of quantum correlation associated to the modified
Wigner's inequality finding the optimal experimental configuration for its
maximal violation. We also extend this analysis to the implementation of
Ekert's protocol
Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States
We introduce a novel form of decoy-state technique to make the single-photon
Bennett 1992 protocol robust against losses and noise of a communication
channel. Two uninformative states are prepared by the transmitter in order to
prevent the unambiguous state discrimination attack and improve the phase-error
rate estimation. The presented method does not require strong reference pulses,
additional electronics or extra detectors for its implementation.Comment: 7 pages, 2 figure
Recommended from our members
Spawn Timing of Winter-Run Chinook Salmon in the Upper Sacramento River
Spawn timing in anadromous Pacific salmon may be especially sensitive to environmental cues such as river temperature and flow regimes. In this study, we explored correlations between peak spawn timing and water temperature in endangered Sacramento River winter-run Chinook Salmon. In recent drought years, rising water temperatures during egg incubation have negatively affected the winter-run Chinook Salmon population. This paper seeks to understand how winter-run spawn timing may be affected by temperatures during the staging period prior to spawning, and how water releases from Shasta Dam might affect these dynamics. We fit a proportional-odds logistic regression model to evaluate annual spawn timing as a function of average temperatures in April and May below Keswick Dam. While the start date of spawning remains relatively constant from year to year, the timing of peak spawning varies annually. Cool springtime temperatures trigger winter-run Chinook Salmon to spawn earlier, whereas warm springtime temperatures trigger fish to spawn later. Before dam construction, winter-run Chinook Salmon spawned in cool, spring-fed streams that are now inaccessible to migrating salmonids. In their natal spawning grounds, temperature-driven spawn timing would have primarily ensured sufficient time for egg maturation in cool years, while secondarily preventing egg and alevin mortality in warm years. In the current winter-run spawning grounds, the relationship between temperature and spawn timing may have important applications to management of Shasta Dam water releases, especially during conditions when thermal mortality can affect developing winter-run Chinook Salmon eggs
Isolation, spectroscopic characterization, X-ray, theoretical studies as well as in vitro cytotoxicity of Samarcandin
Samarcandin 1, a natural sesquiterpene-coumarin, was isolated as well as elucidated from F. assa-foetida which has significant effect in Iranian traditional medicine because of its medicinal attitudes. The crystal structure of samarcandin was determined by single-crystal X-ray structure analysis. It is orthorhombic, with unit cell parameters a = 10.8204 (5) Å, b = 12.9894 (7) Å, c = 15.2467 (9) Å, V = 2142.9 (2) Å3, space group P212121 and four symmetry equivalent molecules in the unit cell. Samarcandin was isolated in order to study for its theoretical studies as well as its cellular toxicity as anti-cancer drug against two cancerous cells. In comparison with controls, our microscopic and MTT assay data showed that samarcandin suppresses cancer cell proliferation in a dose-dependent manner with IC50 = 11 μM and 13 for AGS and WEHI-164 cell lines, respectively. Density functional theory (DFT) and time-dependent density functional theory (TD-DFT) of the structure was computed by three functional methods and 6-311++G∗∗ standard basis set. The optimized molecular geometry and theoretical analysis agree closely to that obtained from the single crystal X-ray crystallography. To sum up, the good correlations between experimental and theoretical studies by UV, NMR, and IR spectra were found. © 2016 Elsevier Inc. All rights reserved
Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse
We prove the unconditional security of the original Bennett 1992 protocol
with strong reference pulse. We show that we may place a projection onto
suitably defined qubit spaces before the receiver, which makes the analysis as
simple as qubit-based protocols. Unlike the single-photon-based qubits, the
qubits identified in this scheme are almost surely detected by the receiver
even after a lossy channel. This leads to the key generation rate that is
proportional to the channel transmission rate for proper choices of
experimental parameters.Comment: More detailed presentation and a bit modified security proo
- …