17,359 research outputs found

    On the role of entanglement in quantum computational speed-up

    Get PDF
    For any quantum algorithm operating on pure states we prove that the presence of multi-partite entanglement, with a number of parties that increases unboundedly with input size, is necessary if the quantum algorithm is to offer an exponential speed-up over classical computation. Furthermore we prove that the algorithm can be classically efficiently simulated to within a prescribed tolerance \eta even if a suitably small amount of global entanglement (depending on \eta) is present. We explicitly identify the occurrence of increasing multi-partite entanglement in Shor's algorithm. Our results do not apply to quantum algorithms operating on mixed states in general and we discuss the suggestion that an exponential computational speed-up might be possible with mixed states in the total absence of entanglement. Finally, despite the essential role of entanglement for pure state algorithms, we argue that it is nevertheless misleading to view entanglement as a key resource for quantum computational power.Comment: Main proofs simplified. A few further explanatory remarks added. 22 pages, plain late

    Risk and Utility in Portfolio Optimization

    Full text link
    Modern portfolio theory(MPT) addresses the problem of determining the optimum allocation of investment resources among a set of candidate assets. In the original mean-variance approach of Markowitz, volatility is taken as a proxy for risk, conflating uncertainty with risk. There have been many subsequent attempts to alleviate that weakness which, typically, combine utility and risk. We present here a modification of MPT based on the inclusion of separate risk and utility criteria. We define risk as the probability of failure to meet a pre-established investment goal. We define utility as the expectation of a utility function with positive and decreasing marginal value as a function of yield. The emphasis throughout is on long investment horizons for which risk-free assets do not exist. Analytic results are presented for a Gaussian probability distribution. Risk-utility relations are explored via empirical stock-price data, and an illustrative portfolio is optimized using the empirical data.Comment: 10 pages, 1 figure, presented at 2002 Conference on Econophysics in Bali Indonesi

    Maximum entropy controller synthesis for colocated and noncolocated systems

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/77185/1/AIAA-21277-539.pd

    Efficient arithmetic on elliptic curves in characteristic 2

    No full text
    International audienceWe present normal forms for elliptic curves over a field of characteristic 2 analogous to Edwards normal form, and determine bases of addition laws, which provide strikingly simple expressions for the group law. We deduce efficient algorithms for point addition and scalar multiplication on these forms. The resulting algorithms apply to any elliptic curve over a field of characteristic 2 with a 4-torsion point, via an isomorphism with one of the normal forms. We deduce algorithms for duplication in time 2M+5S+2mc2M + 5S + 2m_c and for addition of points in time 7M+2S7M + 2S, where MM is the cost of multiplication, SS the cost of squaring , and mcm_c the cost of multiplication by a constant. By a study of the Kummer curves K=E/{±1]}\mathcal{K} = E/\{\pm1]\}, we develop an algorithm for scalar multiplication with point recovery which computes the multiple of a point P with 4M+4S+2mc+mt4M + 4S + 2m_c + m_t per bit where mtm_t is multiplication by a constant that depends on PP

    On bit-commitment based quantum coin flipping

    Get PDF
    In this paper, we focus on a special framework for quantum coin flipping protocols,_bit-commitment based protocols_, within which almost all known protocols fit. We show a lower bound of 1/16 for the bias in any such protocol. We also analyse a sequence of multi-round protocol that tries to overcome the drawbacks of the previously proposed protocols, in order to lower the bias. We show an intricate cheating strategy for this sequence, which leads to a bias of 1/4. This indicates that a bias of 1/4 might be optimal in such protocols, and also demonstrates that a cleverer proof technique may be required to show this optimality.Comment: The lower bound shown in this paper is superceded by a result of Kitaev (personal communication, 2001

    A new paradigm for credibly administering placebo alcohol to underage drinkers

    Get PDF
    Background: The primary goal of this study was to establish a paradigm for credibly administering placebo alcohol to underage drinkers. We also sought to create a new, valid procedure for establishing placebo alcohol believability. Method: Participants were 138 American college students (66.7% female) predominantly (90.0%) under the legal drinking age. Groups of 2–3 participants and one same-sex confederate consumed mixed drinks, purportedly containing alcohol, ad-lib in a naturalistic bar-laboratory for 20 min. All beverages, however, were non-alcoholic but we used visual, olfactory, and taste cues to maximize placebo credibility. Also, the confederate made two scripted statements designed to increase the perception of drinking real alcohol. After the drinking portion, participants responded to survey items related to alcohol consumption and intoxication. Next, they were individually debriefed, with open-ended responses used to make a determination of whether the participant was deceived with respect to placebo alcohol. Results: All participants estimated consuming some amount of alcohol. However, using a more conservative criteria for estimating alcohol believability based on the debrief, 89.1% of participants were classified as deceived. Deceived participants were much more likely to estimate having a positive blood alcohol content and to say that their current level of intoxication was typical given the amount of alcohol consumed than non-deceived participants. Discussion: Credibly administering placebo alcohol to underage drinkers is possible. This approach carries great potential for future laboratory work. In addition, the methodology used here to classify participants as deceived or not deceived appears valid based on self-reported BAC estimation and intoxication levels

    Neutrinos and Nucleosynthesis in Supernova

    Full text link
    The type II supernova is considered as a candidate site for the production of heavy elements. The nucleosynthesis occurs in an intense neutrino flux, we calculate the electron fraction in this environment.Comment: RevTex4 style, 3 pages including 1 figure. Presented at Mexican School of Astrophysics 2002, Guanajuato, Mexico, 31 Jul - 7 Aug 2002. Final version to appear in the Proceedings of IX Mexican Workshop on Particles and Fields Physics Beyond the Standard Model, Colima Col. Mexico, November 17-22, 200

    Detecting brute-force attacks on cryptocurrency wallets

    Full text link
    Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.Comment: 10 pages, 2 figures; published versio

    Management of neonates after postpartum discharge and all children in the ambulatory setting during the coronavirus disease 2019 (COVID-19) pandemic

    Get PDF
    PURPOSE OF REVIEW: The present coronavirus disease 2019 (COVID-19) pandemic has created additional challenges with an increased number of presumed healthy, full-term newborns being discharged at 24 h after delivery. Short lengths of stay raise the possibility of mother-infant dyads being less ready for discharge, defined as at least one of the three informants (i.e., mother, pediatrician, and obstetrician) believing that either the mother and/or infant should stay longer than the proposed time of discharge. This public health crisis has reduced the number of in-person well child visits, negatively impacting vaccine receipt, and anticipatory guidance. RECENT FINDINGS: Extra precautions should be taken during the transition period between postpartum discharge and follow-up in the ambulatory setting to ensure the safety of all patients and practice team members. This should include restructuring office flow by visit type and location, limiting in-person visits during well infant exams, instituting proper procedures for personal protective equipment and for cleaning of the office, expanding telehealth capabilities for care and education, and prioritizing universal vaccinations and routine well child screenings. SUMMARY: Based on current limited evidence, this report provides guidance for the postdischarge management of newborns born to mothers with confirmed or suspected disease in the ambulatory setting as well as prioritizing universal immunizations and routine well child screenings during the COVID-19 pandemic

    A Biopersistence Study following Exposure to Chrysotile Asbestos Alone or in Combination with Fine Particles

    Get PDF
    In designing a study to evaluate the inhalation biopersistence of a chrysotile asbestos that was used as a component of a joint-compound, a feasibility study was initiated to evaluate the short-term biopersistence of the chrysotile alone and of the chrysotile in combination witht the sanded reformulated joint-compound. Two groups of Wistar rats were exposed to either 7RF3 chrysotile (Group 2) or to 7RF3 chrysotile combined with aerosolized sanded joint-compound (Group 3). In addition, a control group was exposed to flltered-air. The chrysotile used in the Ready Mix joint compound is rapidly removed from the lung. The chrysotile alone exposure group had a clearance half-time of fibers L > 20 μm of 2.2 days; in the chrysotile plus sanded exposure group the clearance half-time of fibers L > 20 μm was 2.8 days. However, across all size ranges there was approximately an order of magnitude decrease in the mean number of fibers remaining in the lungs of Group 3 as compared to Group 2 despite similiar aerosol exposures. Histopathological examination showed that the chrysotile exposed lungs had the same appearance as the flltered-air controls. This study uniquely illustrates that additional concurrent exposure to an aerosol of the sanded joint-compound, with large numbers of fine-particles depositing in the lungs, accelerates the recruitment of macrophages, resulting in a tenfold decrease in the number of fibers remaining in the lung. The increased number of macrophages in the chrysotile/sanded joint exposure group was confirmed histologically, with this being the only exposure-related histological finding reported
    corecore