432 research outputs found
Stabilisation of Quantum Computations by Symmetrisation
We propose a method for the stabilisation of quantum computations (including
quantum state storage). The method is based on the operation of projection into
, the symmetric subspace of the full state space of redundant
copies of the computer. We describe an efficient algorithm and quantum network
effecting --projection and discuss the stabilising effect of the
proposed method in the context of unitary errors generated by hardware
imprecision, and nonunitary errors arising from external environmental
interaction. Finally, limitations of the method are discussed.Comment: 20 pages LaTeX, 2 postscript figure
Quantum Reed-Solomon Codes
After a brief introduction to both quantum computation and quantum error
correction, we show how to construct quantum error-correcting codes based on
classical BCH codes. With these codes, decoding can exploit additional
information about the position of errors. This error model - the quantum
erasure channel - is discussed. Finally, parameters of quantum BCH codes are
provided.Comment: Summary only (2 pages), for the full version see: Proceedings Applied
Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-13), Lecture
Notes in Computer Science 1719, Springer, 199
Quantum secret sharing
Secret sharing is a procedure for splitting a message into several parts so
that no subset of parts is sufficient to read the message, but the entire set
is. We show how this procedure can be implemented using GHZ states. In the
quantum case the presence of an eavesdropper will introduce errors so that his
presence can be detected. We also show how GHZ states can be used to split
quantum information into two parts so that both parts are necessary to
reconstruct the original qubit.Comment: 6 pages, revtex, revised version, to appear in Phys. Rev.
Prolonged refractory status epilepticus following acute traumatic brain injury: a case report of excellent neurological recovery
INTRODUCTION: Refractory status epilepticus (RSE) secondary to traumatic brain injury (TBI) may be under-recognized and is associated with significant morbidity and mortality. METHODS: This case report describes a 20 year old previously healthy woman who suffered a severe TBI as a result of a motor vehicle collision and subsequently developed RSE. Pharmacological coma, physiological support and continuous electroencephalography (cEEG) were undertaken. RESULTS: Following 25 days of pharmacological coma, electrographic and clinical seizures subsided and the patient has made an excellent cognitive recovery. CONCLUSION: With early identification, aggressive physiological support, appropriate monitoring, including cEEG, and an adequate length of treatment, young trauma patients with no previous seizure history and limited structural damage to the brain can have excellent neurological recovery from prolonged RSE
Two-Bit Gates are Universal for Quantum Computation
A proof is given, which relies on the commutator algebra of the unitary Lie
groups, that quantum gates operating on just two bits at a time are sufficient
to construct a general quantum circuit. The best previous result had shown the
universality of three-bit gates, by analogy to the universality of the Toffoli
three-bit gate of classical reversible computing. Two-bit quantum gates may be
implemented by magnetic resonance operations applied to a pair of electronic or
nuclear spins. A ``gearbox quantum computer'' proposed here, based on the
principles of atomic force microscopy, would permit the operation of such
two-bit gates in a physical system with very long phase breaking (i.e., quantum
phase coherence) times. Simpler versions of the gearbox computer could be used
to do experiments on Einstein-Podolsky-Rosen states and related entangled
quantum states.Comment: 21 pages, REVTeX 3.0, two .ps figures available from author upon
reques
Perfect quantum error correction coding in 24 laser pulses
An efficient coding circuit is given for the perfect quantum error correction
of a single qubit against arbitrary 1-qubit errors within a 5 qubit code. The
circuit presented employs a double `classical' code, i.e., one for bit flips
and one for phase shifts. An implementation of this coding circuit on an
ion-trap quantum computer is described that requires 26 laser pulses. A further
circuit is presented requiring only 24 laser pulses, making it an efficient
protection scheme against arbitrary 1-qubit errors. In addition, the
performance of two error correction schemes, one based on the quantum Zeno
effect and the other using standard methods, is compared. The quantum Zeno
error correction scheme is found to fail completely for a model of noise based
on phase-diffusion.Comment: Replacement paper: Lost two laser pulses gained one author; added
appendix with circuits easily implementable on an ion-trap compute
Pericyte remodeling is deficient in the aged brain and contributes to impaired capillary flow and structure
Deterioration of brain capillary flow and architecture is a hallmark of aging and dementia. It remains unclear how loss of brain pericytes in these conditions contributes to capillary dysfunction. Here, we conduct cause-and-effect studies by optically ablating pericytes in adult and aged mice in vivo. Focal pericyte loss induces capillary dilation without blood-brain barrier disruption. These abnormal dilations are exacerbated in the aged brain, and result in increased flow heterogeneity in capillary networks. A subset of affected capillaries experience reduced perfusion due to flow steal. Some capillaries stall in flow and regress, leading to loss of capillary connectivity. Remodeling of neighboring pericytes restores endothelial coverage and vascular tone within days. Pericyte remodeling is slower in the aged brain, resulting in regions of persistent capillary dilation. These findings link pericyte loss to disruption of capillary flow and structure. They also identify pericyte remodeling as a therapeutic target to preserve capillary flow dynamics
Experimental realization of the one qubit Deutsch-Jozsa algorithm in a quantum dot
We perform quantum interference experiments on a single self-assembled
semiconductor quantum dot. The presence or absence of a single exciton in the
dot provides a qubit that we control with femtosecond time resolution. We
combine a set of quantum operations to realize the single-qubit Deutsch-Jozsa
algorithm. The results show the feasibility of single qubit quantum logic in a
semiconductor quantum dot using ultrafast optical control.Comment: REVTex4, 4 pages, 3 figures. Now includes more details about the
dephasing in the quantum dots. The introduction has been reworded for
clarity. Minor readability fixe
Basic concepts in quantum computation
Section headings: 1 Qubits, gates and networks 2 Quantum arithmetic and
function evaluations 3 Algorithms and their complexity 4 From interferometers
to computers 5 The first quantum algorithms 6 Quantum search 7 Optimal phase
estimation 8 Periodicity and quantum factoring 9 Cryptography 10 Conditional
quantum dynamics 11 Decoherence and recoherence 12 Concluding remarksComment: 37 pages, lectures given at les Houches Summer School on "Coherent
Matter Waves", July-August 199
Mesoscopic superpositions of vibronic collective states of N trapped ions
We propose a scalable procedure to generate entangled superpositions of
motional coherent states and electronic states in N trapped ions. Beyond their
fundamental importance, these states may be of interest for quantum information
processing and may be used in experimental studies of decoherence.Comment: Final version, as published in Physical Review Letters. See also
further developments and applications in quant-ph/020207
- …