763 research outputs found
How large can the first eigenvalue be on a surface of genus two?
Sharp upper bounds for the first eigenvalue of the Laplacian on a surface of
a fixed area are known only in genera zero and one. We investigate the genus
two case and conjecture that the first eigenvalue is maximized on a singular
surface which is realized as a double branched covering over a sphere. The six
ramification points are chosen in such a way that this surface has a complex
structure of the Bolza surface. We prove that our conjecture follows from a
lower bound on the first eigenvalue of a certain mixed Dirichlet-Neumann
boundary value problem on a half-disk. The latter can be studied numerically,
and we present conclusive evidence supporting the conjecture.Comment: 20 pages; 4 figure
Symmetric Autocompensating Quantum Key Distribution
We present quantum key distribution schemes which are autocompensating
(require no alignment) and symmetric (Alice and Bob receive photons from a
central source) for both polarization and time-bin qubits. The primary benefit
of the symmetric configuration is that both Alice and Bob may have passive
setups (neither Alice nor Bob is required to make active changes for each run
of the protocol). We show that both the polarization and the time-bin schemes
may be implemented with existing technology. The new schemes are related to
previously described schemes by the concept of advanced waves.Comment: 4 pages, 2 figur
Distributed super dense coding over noisy channels
We study multipartite super dense coding in the presence of a covariant noisy
channel. We investigate the case of many senders and one receiver, considering
both unitary and non-unitary encoding. We study the scenarios where the senders
apply local encoding or global encoding. We show that, up to some
pre-processing on the original state, the senders cannot do better encoding
than local, unitary encoding. We then introduce general Pauli channels as a
significant example of covariant maps. Considering Pauli channels, we provide
examples for which the super dense coding capacity is explicitly determined
Longitudinal NMR and Spin States in the A-like Phase of 3He in Aerogel
It was found that two different spin states of the A-like phase can be
obtained in aerogel sample. In one of these states we have observed the signal
of the longitudinal NMR, while in another state no trace of such a signal was
found. The states also have different properties in transverse NMR experiments.
Longitudinal NMR signal was also observed in the B-like phase of 3He in
aerogel.Comment: 8 pages, 7 figure
Magnetic properties and magnetostructural phase transitions in Ni2+xMn1-xGa shape memory alloys
A systematic study of magnetic properties of Ni2+xMn1-xGa (0 \le x \le 0.19)
Heusler alloys undergoing structural martensite-austenite transformations while
in ferromagnetic state has been performed. From measurements of spontaneous
magnetization, Ms(T), jumps \Delta M at structural phase transitions were
determined. Virtual Curie temperatures of the martensite were estimated from
the comparison of magnetization in martensitic and austenitic phases. Both
saturation magnetic moments in ferromagnetic state and effective magnetic
moments in paramagnetic state of Mn and Ni atoms were estimated and the
influence of delocalization effects on magnetism in these alloys was discussed.
The experimental results obtained show that the shift of martensitic transition
temperature depends weakly on composition. The values of this shift are in good
correspondence with Clapeyron-Clausius formalism taking into account the
experimental data on latent heat at martensite-austenite transformations.Comment: 7 pages, 8 figure
Isospectral domains with mixed boundary conditions
We construct a series of examples of planar isospectral domains with mixed
Dirichlet-Neumann boundary conditions. This is a modification of a classical
problem proposed by M. Kac.Comment: 9 figures. Statement of Theorem 5.1 correcte
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
- …