231,134 research outputs found
On the accuracy of the S/N estimates obtained with the exposure time calculator of the Wide Field Planetary Camera 2 on board the Hubble Space Telescope
We have studied the accuracy and reliability of the exposure time calculator
(ETC) of the Wide Field Planetary Camera 2 (WFPC2) on board the Hubble Space
Telescope (HST) with the objective of determining how well it represents actual
observations and, therefore, how much confidence can be invested in it and in
similar software tools. We have found, for example, that the ETC gives, in
certain circumstances, very optimistic values for the signal-to-noise ratio
(SNR) of point sources. These values overestimate by up to a factor of 2 the
HST performance when simulations are needed to plan deep imaging observations,
thus bearing serious implications on observing time allocation. For this
particular case, we calculate the corrective factors to compute the appropriate
SNR and detection limits and we show how these corrections vary with field
crowding and sky background. We also compare the ETC of the WFPC2 with a more
general ETC tool, which takes into account the real effects of pixel size and
charge diffusion. Our analysis indicates that similar problems may afflict
other ETCs in general showing the limits to which they are bound and the
caution with which their results must be taken.Comment: 14 pages, 13 figures, to be published in PASP on July 200
Quantum secret sharing between m-party and n-party with six states
We propose a quantum secret sharing scheme between -party and -party
using three conjugate bases, i.e. six states. A sequence of single photons,
each of which is prepared in one of the six states, is used directly to encode
classical information in the quantum secret sharing process. In this scheme,
each of all members in group 1 choose randomly their own secret key
individually and independently, and then directly encode their respective
secret information on the states of single photons via unitary operations, then
the last one (the th member of group 1) sends of the resulting qubits
to each of group 2. By measuring their respective qubits, all members in group
2 share the secret information shared by all members in group 1. The secret
message shared by group 1 and group 2 in such a way that neither subset of each
group nor the union of a subset of group 1 and a subset of group 2 can extract
the secret message, but each whole group (all the members of each group) can.
The scheme is asymptotically 100% in efficiency. It makes the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. We show that it is secure and has an advantage over the one
based on two conjugate bases. We also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states. This protocol is
feasible with present-day technique.Comment: 7 page
Probing the high-density behavior of symmetry energy with gravitational waves
Gravitational wave (GW) astronomy opens up an entirely new window on the
Universe to probe the equations of state (EOS) of neutron-rich matter. With the
advent of next generation GW detectors, measuring the gravitational radiation
from coalescing binary neutron star systems, mountains on rotating neutron
stars, and stellar oscillation modes may become possible in the near future.
Using a set of model EOSs satisfying the latest constraints from terrestrial
nuclear experiments, state of the art nuclear many-body calculations of the
pure neutron matter EOS, and astrophysical observations consistently, we study
various GW signatures of the high-density behavior of the nuclear symmetry
energy, which is considered among the most uncertain properties of dense
neutron-rich nucleonic matter. In particular, we find the tidal polarizability
of neutron stars, potentially measurable in binary systems just prior to
merger, is more sensitive to the high density component of the nuclear symmetry
energy than the symmetry energy at nuclear saturation density. We also find
that the upper limit on the GW strain amplitude from elliptically deformed
stars is very sensitive to the density dependence of the symmetry energy. This
suggests that future developments in modeling of the neutron star crust, and
direct gravitational wave signals from accreting binaries will provide a wealth
of information on the EOS of neutron-rich matter. We also review the
sensitivity of the -mode instability window to the density dependence of the
symmetry energy. Whereas models with larger values of the density slope of the
symmetry energy at saturation seem to be disfavored by the current
observational data, within a simple -mode model, we point out that a
subsequent softer behavior of the symmetry energy at high densities (hinted at
by recent observational interpretations) could rule them in.Comment: 14 pages, 11 figures, 3 tables; submitted to EPJA Special Volume on
Nuclear Symmetry Energ
Efficient quantum cryptography network without entanglement and quantum memory
An efficient quantum cryptography network protocol is proposed with
d-dimension polarized photons, without resorting to entanglement and quantum
memory. A server on the network, say Alice, provides the service for preparing
and measuring single photons whose initial state are |0>. The users code the
information on the single photons with some unitary operations. For preventing
the untrustworthy server Alice from eavesdropping the quantum lines, a
nonorthogonal-coding technique (decoy-photon technique) is used in the process
that the quantum signal is transmitted between the users. This protocol does
not require the servers and the users to store the quantum state and almost all
of the single photons can be used for carrying the information, which makes it
more convenient for application than others with present technology. We also
discuss the case with a faint laser pulse.Comment: 4 pages, 1 figures. It also presented a way for preparing decoy
photons without a sinigle-photon sourc
Plasmon assisted transmission of high dimensional orbital angular momentum entangled state
We present an experimental evidence that high dimensional orbital angular
momentum entanglement of a pair of photons can be survived after a
photon-plasmon-photon conversion. The information of spatial modes can be
coherently transmitted by surface plasmons. This experiment primarily studies
the high dimensional entangled systems based on surface plasmon with
subwavelength structures. It maybe useful in the investigation of spatial mode
properties of surface plasmon assisted transmission through subwavelength hole
arrays.Comment: 7 pages,6 figure
- …