23,527 research outputs found

    Quantum computers can search arbitrarily large databases by a single query

    Full text link
    This paper shows that a quantum mechanical algorithm that can query information relating to multiple items of the database, can search a database in a single query (a query is defined as any question to the database to which the database has to return a (YES/NO) answer). A classical algorithm will be limited to the information theoretic bound of at least O(log N) queries (which it would achieve by using a binary search).Comment: Several enhancements to the original pape

    When only two thirds of the entanglement can be distilled

    Get PDF
    We provide an example of distillable bipartite mixed state such that, even in the asymptotic limit, more pure-state entanglement is required to create it than can be distilled from it. Thus, we show that the irreversibility in the processes of formation and distillation of bipartite states, recently proved in [G. Vidal, J.I. Cirac, Phys. Rev. Lett. 86, (2001) 5803-5806], is not limited to bound-entangled states.Comment: 4 pages, revtex, 1 figur

    Effects of infrequent dried distillers grain supplementation on spring-calving cow performance

    Get PDF
    Feed and supplement costs and the expenses associated with delivery of winter supplements account for a large proportion of the total operating expenditures for cow-calf producers. Cattle grazing low-quality dormant native range (<6% crude protein) typically are unable to consume sufficient protein from the forage base, which limits microbial activity and forage digestion. Supplemental protein often is required to maintain cow body weight and body condition score during the last trimester of pregnancy. Low cow body condition scores at calving are common and may negatively affect lactation, rebreeding rates, and calf weaning weight. Failure to maintain proper nutritional status during this period severely affects short-term cow performance, reduces overall herd productivity, and limits profit potential. The most effective means of supplying supplemental protein to cows consuming dormant native range is to provide a small amount of high-protein feedstuff (>30% crude protein). Dried distillers grains with solubles (DDGS) are a by-product of the ethanol refining process. Distillers grains supply the recommended 30% crude protein level, are readily available, and often are favorably priced compared with more traditional feedstuffs. With the rising costs of inputs in today’s cow-calf sector, reducing cost is necessary to maintain viability of the national cowherd. Reducing the frequency of supplementation results in less labor and fuel use, effectively reducing input costs; however, this is viable only as long as cow performance is maintained at acceptable levels. Therefore, the objective of this study was to examine the effects of infrequent supplementation of dried distillers grains with solubles on cow body weight and body condition score

    A method of enciphering quantum states

    Get PDF
    In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confirm that the qubits are transmitted between them correctly by measuring a signature. If Eve measures m qubits one by one from n enciphered qubits and sends alternative ones (the Intercept/Resend attack), a probability that Alice and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for decryption and the signature are given by classical binary strings and they are disclosed through a public channel. Enciphering classical information by this method is equivalent to the one-time pad method with distributing a classical key (random binary string) by the BB84 protocol. If Eve takes away qubits, Alice and Bob lose the original quantum information. If we apply our method to a state in iteration, Eve's success probability decreases exponentially. We cannot examine security against the case that Eve makes an attack with using entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two references, several clarifying sentences are added in Sec. 5, typos corrected, a new proof is provided in Appendix A and it is shorter than the old one. v3: 23 pages, one section is adde

    Valuing remnant vegetation in Central Queensland using choice modelling

    Get PDF
    In the Desert Uplands region of Central Queensland, many pastoralists are clearing vegetation in order to improve cattle grazing production. A choice modelling study was undertaken to provide estimates of the benefits of retaining remnant vegetation that are appropriate for inclusion in a cost benefit analysis of tighter clearing restrictions. Attributes included in the choice model were reductions in the population size of non‐threatened species, the number of endangered species lost to the region, and changes in regional income and employment. A nested logit model was used to model the data in order to avoid violations of the independence of irrelevant alternatives condition. The estimated benefits are reported for several tree clearing policy regimes that are more stringent than those currently applied.Resource /Energy Economics and Policy,

    Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

    Get PDF
    We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo

    Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information

    Full text link
    When an observer wants to identify a quantum state, which is known to be one of a given set of non-orthogonal states, the act of observation causes a disturbance to that state. We investigate the tradeoff between the information gain and that disturbance. This issue has important applications in quantum cryptography. The optimal detection method, for a given tolerated disturbance, is explicitly found in the case of two equiprobable non-orthogonal pure states.Comment: 20 pages, standard LaTeX, four png figures (also available from the authors: [email protected] and [email protected]

    Entanglement sharing among qudits

    Full text link
    Consider a system consisting of n d-dimensional quantum particles (qudits), and suppose that we want to optimize the entanglement between each pair. One can ask the following basic question regarding the sharing of entanglement: what is the largest possible value Emax(n,d) of the minimum entanglement between any two particles in the system? (Here we take the entanglement of formation as our measure of entanglement.) For n=3 and d=2, that is, for a system of three qubits, the answer is known: Emax(3,2) = 0.550. In this paper we consider first a system of d qudits and show that Emax(d,d) is greater than or equal to 1. We then consider a system of three particles, with three different values of d. Our results for the three-particle case suggest that as the dimension d increases, the particles can share a greater fraction of their entanglement capacity.Comment: 4 pages; v2 contains a new result for 3 qudits with d=

    Society of Lloyd's v Price: Characterization and 'gap' in the Conflict of Laws

    Get PDF
    For connoisseurs of legal arcana, the case of Society of Lloyd's v Price; Society of Lloyd's v Lee 2006 (5) SA 393 (SCA) (hereafter Society of Lloyd's) has a special significance. Not only did it settle the question how best to characterize causes of action, but it also offered a solution for that curious problem of 'gap'. Both of these are issues arising out of conflicts of law. In itself the conflict of laws is an abstruse discipline, for it involves not simply the application of law to facts, but rather the application of a set of second-order choice-of-law rules which are designed to indicate what law should be applied to facts that happen to contain a foreign element. The Society of Lloyd’s case, however, took matters a stage further: the logic of the choice-of-law process drove the court to a point where it discovered that, in the circumstances of the case, no law was applicable. In conflict jargon, this conundrum is known as a problem of ‘gap’. (Its counterpart is ‘cumulation’, namely the simultaneous applicability of two or more laws.
    • 

    corecore