28,534 research outputs found

    A superconducting cavity bus for single Nitrogen Vacancy defect centres in diamond

    Full text link
    Circuit-QED has demonstrated very strong coupling between individual microwave photons trapped in a superconducting coplanar resonator and nearby superconducting qubits. In this work we show how, by designing a novel interconnect, one can strongly connect the superconducting resonator, via a magnetic interaction, to a small number (perhaps single), of electronic spins. By choosing the electronic spin to be within a Nitrogen Vacancy centre in diamond one can perform optical readout, polarization and control of this electron spin using microwave and radio frequency irradiation. More importantly, by utilising Nitrogen Vacancy centres with nearby 13C nuclei, using this interconnect, one has the potential build a quantum device where the nuclear spin qubits are connected over centimeter distances via the Nitrogen Vacancy electronic spins interacting through the superconducting bus.Comment: 4 pages, 6 figure

    An algebraic interpretation of the Wheeler-DeWitt equation

    Get PDF
    We make a direct connection between the construction of three dimensional topological state sums from tensor categories and three dimensional quantum gravity by noting that the discrete version of the Wheeler-DeWitt equation is exactly the pentagon for the associator of the tensor category, the Biedenharn-Elliott identity. A crucial role is played by an asymptotic formula relating 6j-symbols to rotation matrices given by Edmonds.Comment: 10 pages, amstex, uses epsf.tex. New version has improved presentatio

    LANDSAT survey of near-shore ice conditions along the Arctic coast of Alaska

    Get PDF
    The author has identified the following significant results. Winter and spring near-shore ice conditions were analyzed for the Beaufort Sea 1973-77, and the Chukchi Sea 1973-76. LANDSAT imagery was utilized to map major ice features related to regional ice morphology. Significant features from individual LANDSAT image maps were combined to yield regional maps of major ice ridge systems for each year of study and maps of flaw lead systems for representative seasons during each year. These regional maps were, in turn, used to prepare seasonal ice morphology maps. These maps showed, in terms of a zonal analysis, regions of statistically uniform ice behavior. The behavioral characteristics of each zone were described in terms of coastal processes and bathymetric configuration

    A one-equation turbulence transport model for high Reynolds number wall-bounded flows

    Get PDF
    A one-equation turbulence model that avoids the need for an algebraic length scale is derived from a simplified form of the standard k-epsilon model equations. After calibration based on well established properties of the flow over a flat plate, predictions of several other flows are compared with experiment. The preliminary results presented indicate that the model has predictive and numerical properties of sufficient interest to merit further investigation and refinement. The one-equation model is also analyzed numerically and robust solution methods are presented

    Improving Performance of Iterative Methods by Lossy Checkponting

    Get PDF
    Iterative methods are commonly used approaches to solve large, sparse linear systems, which are fundamental operations for many modern scientific simulations. When the large-scale iterative methods are running with a large number of ranks in parallel, they have to checkpoint the dynamic variables periodically in case of unavoidable fail-stop errors, requiring fast I/O systems and large storage space. To this end, significantly reducing the checkpointing overhead is critical to improving the overall performance of iterative methods. Our contribution is fourfold. (1) We propose a novel lossy checkpointing scheme that can significantly improve the checkpointing performance of iterative methods by leveraging lossy compressors. (2) We formulate a lossy checkpointing performance model and derive theoretically an upper bound for the extra number of iterations caused by the distortion of data in lossy checkpoints, in order to guarantee the performance improvement under the lossy checkpointing scheme. (3) We analyze the impact of lossy checkpointing (i.e., extra number of iterations caused by lossy checkpointing files) for multiple types of iterative methods. (4)We evaluate the lossy checkpointing scheme with optimal checkpointing intervals on a high-performance computing environment with 2,048 cores, using a well-known scientific computation package PETSc and a state-of-the-art checkpoint/restart toolkit. Experiments show that our optimized lossy checkpointing scheme can significantly reduce the fault tolerance overhead for iterative methods by 23%~70% compared with traditional checkpointing and 20%~58% compared with lossless-compressed checkpointing, in the presence of system failures.Comment: 14 pages, 10 figures, HPDC'1

    Quantum information processing via a lossy bus

    Get PDF
    We describe a method to perform two qubit measurements and logic operations on pairs of qubits which each interact with a harmonic oscillator degree of freedom (the \emph{bus}), but do not directly interact with one another. Our scheme uses only weak interactions between the qubit and the bus, homodyne measurements, and single qubit operations. In contrast to earlier schemes, the technique presented here is extremely robust to photon loss in the bus mode, and can function with high fidelity even when the rate of photon loss is comparable to the strength of the qubit-bus coupling.Comment: Added more discussion on effects of noise. Typos correcte

    Holonomy observables in Ponzano-Regge type state sum models

    Get PDF
    We study observables on group elements in the Ponzano-Regge model. We show that these observables have a natural interpretation in terms of Feynman diagrams on a sphere and contrast them to the well studied observables on the spin labels. We elucidate this interpretation by showing how they arise from the no-gravity limit of the Turaev-Viro model and Chern-Simons theory.Comment: 15 pages, 2 figure

    Efficient quantum key distribution secure against no-signalling eavesdroppers

    Get PDF
    By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the no-signalling principle only. We introduce a family of quantum key distribution protocols of this type, which are more efficient than previous ones, both in terms of key rate and noise resistance. Interestingly, the best protocols involve large number of measurements. We show that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rates in usual quantum key distribution.Comment: 11 pages, 2 color figures. v2: minor modifications, added references, added note on the relation to quant-ph/060604
    • …
    corecore