1,594 research outputs found

    Disordered quantum walk-induced localization of a Bose-Einstein condensate

    Full text link
    We present an approach to induce localization of a Bose-Einstein condensate in a one-dimensional lattice under the influence of unitary quantum walk evolution using disordered quantum coin operation. We introduce a discrete-time quantum walk model in which the interference effect is modified to diffuse or strongly localize the probability distribution of the particle by assigning a different set of coin parameters picked randomly for each step of the walk, respectively. Spatial localization of the particle/state is explained by comparing the variance of the probability distribution of the quantum walk in position space using disordered coin operation to that of the walk using an identical coin operation for each step. Due to the high degree of control over quantum coin operation and most of the system parameters, ultracold atoms in an optical lattice offer opportunities to implement a disordered quantum walk that is unitary and induces localization. Here we present a scheme to use a Bose-Einstein condensate that can be evolved to the superposition of its internal states in an optical lattice and control the dynamics of atoms to observe localization. This approach can be adopted to any other physical system in which controlled disordered quantum walk can be implemented.Comment: 6 pages, 4 figures, published versio

    Effects of Noise, Correlations and errors in the preparation of initial states in Quantum Simulations

    Full text link
    In principle a quantum system could be used to simulate another quantum system. The purpose of such a simulation would be to obtain information about problems which cannot be simulated with a classical computer due to the exponential increase of the Hilbert space with the size of the system and which cannot be measured or controlled in an actual experiment. The system will interact with the surrounding environment, with the other particles in the system and be implemented using imperfect controls making it subject to noise. It has been suggested that noise does not need to be controlled to the same extent as it must be for general quantum computing. However the effects of noise in quantum simulations and how to treat them are not completely understood. In this paper we study an existing quantum algorithm for the one-dimensional Fano-Anderson model to be simulated using a liquid-state NMR device. We calculate the evolution of different initial states in the original model, and then we add interacting spins to simulate a more realistic situation. We find that states which are entangled with their environment, and sometimes correlated but not necessarily entangled have an evolution which is described by maps which are not completely positive. We discuss the conditions for this to occur and also the implications.Comment: Revtex 4-1, 14 pages, 21 figures, version 2 has typos corrected and acknowledgement adde

    Quantum phase transition using quantum walks in an optical lattice

    Full text link
    We present an approach using quantum walks (QWs) to redistribute ultracold atoms in an optical lattice. Different density profiles of atoms can be obtained by exploiting the controllable properties of QWs, such as the variance and the probability distribution in position space using quantum coin parameters and engineered noise. The QW evolves the density profile of atoms in a superposition of position space resulting in a quadratic speedup of the process of quantum phase transition. We also discuss implementation in presently available setups of ultracold atoms in optical lattices.Comment: 7 pages, 8 figure

    Generic quantum walk using a coin-embedded shift operator

    Full text link
    The study of quantum walk processes has been widely divided into two standard variants, the discrete-time quantum walk (DTQW) and the continuous-time quantum walk (CTQW). The connection between the two variants has been established by considering the limiting value of the coin operation parameter in the DTQW, and the coin degree of freedom was shown to be unnecessary [26]. But the coin degree of freedom is an additional resource which can be exploited to control the dynamics of the QW process. In this paper we present a generic quantum walk model using a quantum coin-embedded unitary shift operation UCU_{C}. The standard version of the DTQW and the CTQW can be conveniently retrieved from this generic model, retaining the features of the coin degree of freedom in both variants.Comment: 5 pages, 1 figure, Publishe

    One- and two-dimensional quantum walks in arrays of optical traps

    Get PDF
    We propose a novel implementation of discrete time quantum walks for a neutral atom in an array of optical microtraps or an optical lattice. We analyze a one-dimensional walk in position space, with the coin, the additional qubit degree of freedom that controls the displacement of the quantum walker, implemented as a spatially delocalized qubit, i.e., the coin is also encoded in position space. We analyze the dependence of the quantum walk on temperature and experimental imperfections as shaking in the trap positions. Finally, combining a spatially delocalized qubit and a hyperfine qubit, we also give a scheme to realize a quantum walk on a two-dimensional square lattice with the possibility of implementing different coin operators.Comment: 10 pages, 8 figures; v2: some comments added and other minor change

    Post-aragonite phases of CaCO3_{3} at lower mantle pressures

    Get PDF
    The stability, structure and properties of carbonate minerals at lower mantle conditions has significant impact on our understanding of the global carbon cycle and the composition of the interior of the Earth. In recent years, there has been significant interest in the behavior of carbonates at lower mantle conditions, specifically in their carbon hybridization, which has relevance for the storage of carbon within the deep mantle. Using high-pressure synchrotron X-ray diffraction in a diamond anvil cell coupled with direct laser heating of CaCO3_{3} using a CO2_{2} laser, we identify a crystalline phase of the material above 40 GPa −- corresponding to a lower mantle depth of around 1,000 km −- which has first been predicted by \textit{ab initio} structure predictions. The observed sp2sp^{2} carbon hybridized species at 40 GPa is monoclinic with P21/cP2_{1}/c symmetry and is stable up to 50 GPa, above which it transforms into a structure which cannot be indexed by existing known phases. A combination of \textit{ab initio} random structure search (AIRSS) and quasi-harmonic approximation (QHA) calculations are used to re-explore the relative phase stabilities of the rich phase diagram of CaCO3_{3}. Nudged elastic band (NEB) calculations are used to investigate the reaction mechanisms between relevant crystal phases of CaCO3_{3} and we postulate that the mineral is capable of undergoing sp2sp^{2}-sp3sp^{3} hybridization change purely in the P21/cP2_{1}/c structure −- forgoing the accepted post-aragonite PmmnPmmn structure.Comment: 12 pages, 8 figure

    LGP2 plays a critical role in sensitizing mda-5 to activation by double-stranded RNA.

    Get PDF
    The DExD/H box RNA helicases retinoic acid-inducible gene-I (RIG-I) and melanoma differentiation associated gene-5 (mda-5) sense viral RNA in the cytoplasm of infected cells and activate signal transduction pathways that trigger the production of type I interferons (IFNs). Laboratory of genetics and physiology 2 (LGP2) is thought to influence IFN production by regulating the activity of RIG-I and mda-5, although its mechanism of action is not known and its function is controversial. Here we show that expression of LGP2 potentiates IFN induction by polyinosinic-polycytidylic acid [poly(I:C)], commonly used as a synthetic mimic of viral dsRNA, and that this is particularly significant at limited levels of the inducer. The observed enhancement is mediated through co-operation with mda-5, which depends upon LGP2 for maximal activation in response to poly(I:C). This co-operation is dependent upon dsRNA binding by LGP2, and the presence of helicase domain IV, both of which are required for LGP2 to interact with mda-5. In contrast, although RIG-I can also be activated by poly(I:C), LGP2 does not have the ability to enhance IFN induction by RIG-I, and instead acts as an inhibitor of RIG-I-dependent poly(I:C) signaling. Thus the level of LGP2 expression is a critical factor in determining the cellular sensitivity to induction by dsRNA, and this may be important for rapid activation of the IFN response at early times post-infection when the levels of inducer are low

    Composable security of delegated quantum computation

    Full text link
    Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context---or simply to securely run two protocols in parallel---the security definitions need to be composable. Here, we define composable security for delegated quantum computation. We distinguish between protocols which provide only blindness---the computation is hidden from the server---and those that are also verifiable---the client can check that it has received the correct result. We show that the composable security definition capturing both these notions can be reduced to a combination of several distinct "trace-distance-type" criteria---which are, individually, non-composable security definitions. Additionally, we study the security of some known delegated quantum computation protocols, including Broadbent, Fitzsimons and Kashefi's Universal Blind Quantum Computation protocol. Even though these protocols were originally proposed with insufficient security criteria, they turn out to still be secure given the stronger composable definitions.Comment: 37+9 pages, 13 figures. v3: minor changes, new references. v2: extended the reduction between composable and local security to include entangled inputs, substantially rewritten the introduction to the Abstract Cryptography (AC) framewor

    Fractional recurrence in discrete-time quantum walk

    Full text link
    Quantum recurrence theorem holds for quantum systems with discrete energy eigenvalues and fails to hold in general for systems with continuous energy. We show that during quantum walk process dominated by interference of amplitude corresponding to different paths fail to satisfy the complete quantum recurrence theorem. Due to the revival of the fractional wave packet, a fractional recurrence characterized using quantum P\'olya number can be seen.Comment: 10 pages, 11 figure : Accepted to appear in Central European Journal of Physic

    Long-range coupling and scalable architecture for superconducting flux qubits

    Full text link
    Constructing a fault-tolerant quantum computer is a daunting task. Given any design, it is possible to determine the maximum error rate of each type of component that can be tolerated while still permitting arbitrarily large-scale quantum computation. It is an underappreciated fact that including an appropriately designed mechanism enabling long-range qubit coupling or transport substantially increases the maximum tolerable error rates of all components. With this thought in mind, we take the superconducting flux qubit coupling mechanism described in PRB 70, 140501 (2004) and extend it to allow approximately 500 MHz coupling of square flux qubits, 50 um a side, at a distance of up to several mm. This mechanism is then used as the basis of two scalable architectures for flux qubits taking into account crosstalk and fault-tolerant considerations such as permitting a universal set of logical gates, parallelism, measurement and initialization, and data mobility.Comment: 8 pages, 11 figure
    • …
    corecore