763 research outputs found

    How large can the first eigenvalue be on a surface of genus two?

    Full text link
    Sharp upper bounds for the first eigenvalue of the Laplacian on a surface of a fixed area are known only in genera zero and one. We investigate the genus two case and conjecture that the first eigenvalue is maximized on a singular surface which is realized as a double branched covering over a sphere. The six ramification points are chosen in such a way that this surface has a complex structure of the Bolza surface. We prove that our conjecture follows from a lower bound on the first eigenvalue of a certain mixed Dirichlet-Neumann boundary value problem on a half-disk. The latter can be studied numerically, and we present conclusive evidence supporting the conjecture.Comment: 20 pages; 4 figure

    Symmetric Autocompensating Quantum Key Distribution

    Full text link
    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.Comment: 4 pages, 2 figur

    Distributed super dense coding over noisy channels

    Full text link
    We study multipartite super dense coding in the presence of a covariant noisy channel. We investigate the case of many senders and one receiver, considering both unitary and non-unitary encoding. We study the scenarios where the senders apply local encoding or global encoding. We show that, up to some pre-processing on the original state, the senders cannot do better encoding than local, unitary encoding. We then introduce general Pauli channels as a significant example of covariant maps. Considering Pauli channels, we provide examples for which the super dense coding capacity is explicitly determined

    Longitudinal NMR and Spin States in the A-like Phase of 3He in Aerogel

    Full text link
    It was found that two different spin states of the A-like phase can be obtained in aerogel sample. In one of these states we have observed the signal of the longitudinal NMR, while in another state no trace of such a signal was found. The states also have different properties in transverse NMR experiments. Longitudinal NMR signal was also observed in the B-like phase of 3He in aerogel.Comment: 8 pages, 7 figure

    Magnetic properties and magnetostructural phase transitions in Ni2+xMn1-xGa shape memory alloys

    Full text link
    A systematic study of magnetic properties of Ni2+xMn1-xGa (0 \le x \le 0.19) Heusler alloys undergoing structural martensite-austenite transformations while in ferromagnetic state has been performed. From measurements of spontaneous magnetization, Ms(T), jumps \Delta M at structural phase transitions were determined. Virtual Curie temperatures of the martensite were estimated from the comparison of magnetization in martensitic and austenitic phases. Both saturation magnetic moments in ferromagnetic state and effective magnetic moments in paramagnetic state of Mn and Ni atoms were estimated and the influence of delocalization effects on magnetism in these alloys was discussed. The experimental results obtained show that the shift of martensitic transition temperature depends weakly on composition. The values of this shift are in good correspondence with Clapeyron-Clausius formalism taking into account the experimental data on latent heat at martensite-austenite transformations.Comment: 7 pages, 8 figure

    Isospectral domains with mixed boundary conditions

    Full text link
    We construct a series of examples of planar isospectral domains with mixed Dirichlet-Neumann boundary conditions. This is a modification of a classical problem proposed by M. Kac.Comment: 9 figures. Statement of Theorem 5.1 correcte

    Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors

    Full text link
    Quantum Key Distribution with the BB84 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can be covered by these methods are limited due to the loss in the quantum channel (e.g. loss in the optical fiber) and in the single-photon counters of the receivers. One can argue that the loss in the detectors cannot be changed by an eavesdropper in order to increase the covered distance. Here we show that the security analysis of this scenario is not as easy as is commonly assumed, since already two-photon processes allow eavesdropping strategies that outperform the known photon-number splitting attack. For this reason there is, so far, no satisfactory security analysis available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix added, references update
    corecore