3,092 research outputs found
Double entanglement and quantum cryptography
We propose a quantum transmission based on bi-photons which are
doubly-entangled both in polarisation and phase. This scheme finds a natural
application in quantum cryptography, where we show that an eventual
eavesdropper is bound to introduce a larger error on the quantum communication
than for a single entangled bi-photon communication, when steeling the same
information
Can experimental tests of Bell inequalities performed with pseudoscalar mesons be definitive?
We discuss if experimental tests of Bell inequalities performed with
pseudoscalar mesons (K or B) can be definitive. Our conclusion is that this is
not the case, for the efficiency loophole cannot be eliminated.Comment: submitted for publicatio
Experimental test of local realism using non-maximally entangled states
In this paper we describe a test of Bell inequalities using a non- maximally
entangled state, which represents an important step in the direction of
eliminating the detection loophole. The experiment is based on the creation of
a polarisation entangled state via the superposition, by use of an appropriate
optics, of the spontaneous fluorescence emitted by two non-linear crystals
driven by the same pumping laser.Comment: proc. of QCM&C, Capr
A new conception experimental test of Bell inequalities using non-maximally entangled states
We report on a test of Bell inequalities using a non-maximally entangled
state, which represents an important step in the direction of eliminating the
detection loophole. The experiment is based on the creation of a polarisation
entangled state via the superposition, by use of an appropriate optics, of the
spontaneous fluorescence emitted by two non-linear crystals driven by the same
pumping laser. The alignment has profitably taken advantage from the use of an
optical amplifier scheme, where a solid state laser is injected into the
crystals together with the pumping laser. In principle a very high total
quantum efficiency can be reached using this configuration and thus the final
version of this experiment can lead to a resolution of the detection loophole,
we carefully discuss the conditions which must be satisfied for reaching this
result.Comment: to be published in Proc. of International Workshop on Optics and
Spectroscopy (Hanoi, Vietnam
Ab initio calculation of the binding energy of impurities in semiconductors: Application to Si nanowires
We discuss the binding energy E_b of impurities in semiconductors within
density functional theory (DFT) and the GW approximation, focusing on donors in
nanowires as an example. We show that DFT succeeds in the calculation of E_b
from the Kohn-Sham (KS) hamiltonian of the ionized impurity, but fails in the
calculation of E_b from the KS hamiltonian of the neutral impurity, as it
misses most of the interaction of the bound electron with the surface
polarization charges of the donor. We trace this deficiency back to the lack of
screened exchange in the present functionals
A new source detection algorithm using FDR
The False Discovery Rate (FDR) method has recently been described by Miller
et al (2001), along with several examples of astrophysical applications. FDR is
a new statistical procedure due to Benjamini and Hochberg (1995) for
controlling the fraction of false positives when performing multiple hypothesis
testing. The importance of this method to source detection algorithms is
immediately clear. To explore the possibilities offered we have developed a new
task for performing source detection in radio-telescope images, Sfind 2.0,
which implements FDR. We compare Sfind 2.0 with two other source detection and
measurement tasks, Imsad and SExtractor, and comment on several issues arising
from the nature of the correlation between nearby pixels and the necessary
assumption of the null hypothesis. The strong suggestion is made that
implementing FDR as a threshold defining method in other existing
source-detection tasks is easy and worthwhile. We show that the constraint on
the fraction of false detections as specified by FDR holds true even for highly
correlated and realistic images. For the detection of true sources, which are
complex combinations of source-pixels, this constraint appears to be somewhat
less strict. It is still reliable enough, however, for a priori estimates of
the fraction of false source detections to be robust and realistic.Comment: 17 pages, 7 figures, accepted for publication by A
Efficient and accurate three dimensional Poisson solver for surface problems
We present a method that gives highly accurate electrostatic potentials for
systems where we have periodic boundary conditions in two spatial directions
but free boundary conditions in the third direction. These boundary conditions
are needed for all kind of surface problems. Our method has an O(N log N)
computational cost, where N is the number of grid points, with a very small
prefactor. This Poisson solver is primarily intended for real space methods
where the charge density and the potential are given on a uniform grid.Comment: 6 pages, 2 figure
MR- arthrography: anatomic variant from link between lateral meniscus and anterior and posterior cruciate ligaments. A case report and review of the literature
Menisci congenital anomalies are rare morphologic abnormalities including accessory meniscus, discoid meniscus, double-layered meniscus, hypoplastic meniscus and ring-shaped meniscus (RSM). In a 35 year-old male patient, MR arthrography showed a bridging accessory bundle connecting the anterior cruciate ligament and posterior cruciate ligament with the posterior horn of the lateral meniscus. Arthroscopic examination showed a fan-like obstacle embracing the posterior horn of the lateral meniscus. It would be important to correctly identify this anatomical variant, because the bundle connecting the external meniscus to the ligaments of the central pivot can be misinterpreted as a meniscal fragment
- …