7,848 research outputs found
Near- to mid-infrared picosecond optical parametric oscillator based on periodically poled RbTiOAsO4
We describe a Ti:sapphire-pumped picosecond optical parametric oscillator based on periodically poled RbTiOAsO4 that is broadly tunable in the near to mid infrared. A 4.5-mm single-grating crystal at room temperature in combination with pump wavelength tuning provided access to a continuous-tuning range from 3.35 to 5 mu m, and a pump power threshold of 90 mW was measured. Average mid-infrared output powers in excess of 100 mW and total output powers of 400 mW in similar to 1-ps pulses were obtained at 33% extraction efficiency. (C) 1998 Optical Society of America.</p
GW approximation with self-screening correction
The \emph{GW} approximation takes into account electrostatic self-interaction
contained in the Hartree potential through the exchange potential. However, it
has been known for a long time that the approximation contains self-screening
error as evident in the case of the hydrogen atom. When applied to the hydrogen
atom, the \emph{GW} approximation does not yield the exact result for the
electron removal spectra because of the presence of self-screening: the hole
left behind is erroneously screened by the only electron in the system which is
no longer present. We present a scheme to take into account self-screening and
show that the removal of self-screening is equivalent to including exchange
diagrams, as far as self-screening is concerned. The scheme is tested on a
model hydrogen dimer and it is shown that the scheme yields the exact result to
second order in where and are respectively
the onsite and offsite Hubbard interaction parameters and the hopping
parameter.Comment: 9 pages, 2 figures; Submitted to Phys. Rev.
Эпидемиология и факторы риска рака шейки матки
ФАКТОРЫ РИСКАШЕЙКИ МАТКИ НОВООБРАЗОВАНИ
Polarized Neutron Laue Diffraction on a Crystal Containing Dynamically Polarized Proton Spins
We report on a polarized-neutron Laue diffraction experiment on a single
crystal of neodynium doped lanthanum magnesium nitrate hydrate containing
polarized proton spins. By using dynamic nuclear polarization to polarize the
proton spins, we demonstrate that the intensities of the Bragg peaks can be
enhanced or diminished significantly, whilst the incoherent background, due to
proton spin disorder, is reduced. It follows that the method offers unique
possibilities to tune continuously the contrast of the Bragg reflections and
thereby represents a new tool for increasing substantially the signal-to-noise
ratio in neutron diffraction patterns of hydrogenous matter.Comment: 5 pages, 3 figure
A Quantum solution to the Byzantine agreement problem
We present a solution to an old and timely problem in distributed computing.
Like Quantum Key Distribution (QKD), quantum channels make it possible to
achieve taks classically impossible. However, unlike QKD, here the goal is not
secrecy but agreement, and the adversary is not outside but inside the game,
and the resources require qutrits.Comment: 4 pages, 1 figur
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between -party and -party
using three conjugate bases, i.e. six states. A sequence of single photons,
each of which is prepared in one of the six states, is used directly to encode
classical information in the quantum secret sharing process. In this scheme,
each of all members in group 1 choose randomly their own secret key
individually and independently, and then directly encode their respective
secret information on the states of single photons via unitary operations, then
the last one (the th member of group 1) sends of the resulting qubits
to each of group 2. By measuring their respective qubits, all members in group
2 share the secret information shared by all members in group 1. The secret
message shared by group 1 and group 2 in such a way that neither subset of each
group nor the union of a subset of group 1 and a subset of group 2 can extract
the secret message, but each whole group (all the members of each group) can.
The scheme is asymptotically 100% in efficiency. It makes the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. We show that it is secure and has an advantage over the one
based on two conjugate bases. We also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states. This protocol is
feasible with present-day technique.Comment: 7 page
Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state
We present a scheme for symmetric multiparty quantum state sharing of an
arbitrary -qubit state with Greenberger-Horne-Zeilinger states following
some ideas from the controlled teleportation [Phys. Rev. A \textbf{72}, 02338
(2005)]. The sender Alice performs Bell-state measurements on her
particles and the controllers need only to take some single-photon product
measurements on their photons independently, not Bell-state measurements, which
makes this scheme more convenient than the latter. Also it does not require the
parties to perform a controlled-NOT gate on the photons for reconstructing the
unknown -qubit state and it is an optimal one as its efficiency for qubits
approaches the maximal value.Comment: 6 pages, no figures; It simplifies the process for sharing an
arbitrary m-qubit state in Phys. Rev. A 72, 022338 (2005) (quant-ph/0501129
- …