4,903 research outputs found
Rotationally resolved ultraviolet spectrum of the benzene–Ar complex by mass-selected resonance-enhanced two-photon ionization
Citation of non-English peer review publications – some Chinese examples
Articles published in English language journals with citations of non-English peer reviewed materials are not very common today. However, as epidemiologists are becoming more aware of data and information being readily available and accessible in the non-English literature, the question of whether non-English materials can be cited in English language journals and if so, how should they be cited, has become an increasingly important issue. Bringing together personal insights from the author's familiarity with both the English and Chinese language epidemiological literature and results from a survey on the use of citations of non-English peer reviewed materials across a sample of epidemiology and public health journals, this commentary discusses the different ways authors cite non-English articles in different English language journals and the different methods used by journals to handle non-Latin scripts (e.g. transliteration). This commentary will be useful to both epidemiologists and editors alike
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Quantum key distribution (QKD) can be used to generate secret keys between
two distant parties. Even though QKD has been proven unconditionally secure
against eavesdroppers with unlimited computation power, practical
implementations of QKD may contain loopholes that may lead to the generated
secret keys being compromised. In this paper, we propose a phase-remapping
attack targeting two practical bidirectional QKD systems (the "plug & play"
system and the Sagnac system). We showed that if the users of the systems are
unaware of our attack, the final key shared between them can be compromised in
some situations. Specifically, we showed that, in the case of the
Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when
the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders
the final key insecure, whereas the same range of QBER values has been proved
secure if the two users are unaware of our attack; also, we demonstrated three
situations with realistic devices where positive key rates are obtained without
the consideration of Trojan horse attacks but in fact no key can be distilled.
We remark that our attack is feasible with only current technology. Therefore,
it is very important to be aware of our attack in order to ensure absolute
security. In finding our attack, we minimize the QBER over individual
measurements described by a general POVM, which has some similarity with the
standard quantum state discrimination problem.Comment: 13 pages, 8 figure
The measurement of the winds near the ocean surface with a radiometer-scatterometer on Skylab
The author has identified the following significant results. There were a total of twenty-six passes in the ZLV mode that yielded useful data. Six were in the in-track noncontiguous mode; all others were in the cross-track noncontiguous mode. The wind speed and direction, as effectively determined in a neutral atmosphere at 19.5 m above the sea surface, were found for each cell scanned by S193. It is shown how the passive microwave measurements were used both to compute the attenuation of the radar beam and to determine those cells where the backscatter measurement was suspect. Given the direction of the wind from some independent source, with the typical accuracy of measurement by available meteorological methods, a backscatter measurement at a nadir angle of 50, 43, or 32 deg can be used to compute the speed of the wind averaged over the illuminated area
Decoy state quantum key distribution with two-way classical post-processing
Decoy states have recently been proposed as a useful method for substantially
improving the performance of quantum key distribution protocols when a coherent
state source is used. Previously, data post-processing schemes based on one-way
classical communications were considered for use with decoy states. In this
paper, we develop two data post-processing schemes for the decoy-state method
using two-way classical communications. Our numerical simulation (using
parameters from a specific QKD experiment as an example) results show that our
scheme is able to extend the maximal secure distance from 142km (using only
one-way classical communications with decoy states) to 181km. The second scheme
is able to achieve a 10% greater key generation rate in the whole regime of
distances
Microbial flora of commercially produced vacuum packaged, cooked beef roast
Commercially produced vacuum
packaged, fully cooked, microwaveable beef
roasts from four producers were purchased
from local retail markets. Salt concentration,
pH, water activity (aw), and percent moisture,
fat and protein were determined. Samples of
both package juice and homogenized beef
plus juice were analyzed for the presence of
aerobic, anaerobic and lactic acid bacteria
and clostridia-type organisms. The cooked
beef products had pH values from 5.82 to
6.19, water activity of 0.992 to 0.997, and
contained 0.34 to 1.07% salt, 61.89 to
72.39% moisture, 4.29 to 18.21% fat and
15.92 to 20.62% protein. No growth was
detected in juice for aerobic, anaerobic or
lactic acid bacteria or clostridia-type
organisms. Combined beef and juice had
less than 2 CFU/g for aerobic, anaerobic or
lactic acid bacteria or clostridia-type
organisms. Cooking and chilling schedules
used in the manufacture of the four products
we evaluated in this study limited survival
and outgrowth of microorganisms
NMR Simulation of an Eight-State Quantum System
The propagation of excitation along a one-dimensional chain of atoms is
simulated by means of NMR. The physical system used as an analog quantum
computer is a nucleus of 133-Cs (spin 7/2) in a liquid crystalline matrix. The
Hamiltonian of migration is simulated by using a special 7-frequency pulse, and
the dynamics is monitored by following the transfer of population from one of
the 8 spin energy levels to the other.Comment: 10 pages, 3 figure
IMECE2002-33981 VIBRATION ANALYSIS AND CONTROL OF A ROTATING FLEXIBLE ARM WITH ACLD TREATMENT
ABSTRACT In this paper, the vibration behavior and control of a clamped-free rotating flexible cantilever arm with fully covered Active Constrained Layer Damping (ACLD) treatment is investigated. The arm is rotating in a horizontal plane in which the gravitational effect and rotary inertia are neglected. The stress-strain relationship for the viscoelastic material (VEM) is described by a complex shear modulus while the shear deformations in the two piezoelectric layers are neglected. Hamilton's principle in conjunction with finite element method (FEM) is used to derive the nonlinear coupled differential equations of motion and the associated boundary conditions that describe the rigid hub angle rotation, the arm transverse displacement and the axial deformations of the three-layer composite. This refined model takes into account the effects of centrifugal stiffening due to the rotation of the beam and the potential energies of the VEM due to extension and bending. Active controllers are designed with PD for the piezo-sensor and actuator. The vibration frequencies and damping factors of the closed-loop beam/ACLD system are obtained after solving the characteristic complex eigenvalue problem numerically. The effects of different rotating speed, thickness ratio and loss factor of the VEM as well as different controller gain on the damped frequency and damping ratio are presented. The results of this study will be useful in the design of adaptive and smart structures for vibration suppression and control in rotating structures such as rotorcraft blades or robotic arms
- …