30,113 research outputs found
Bell's inequality and the coincidence-time loophole
This paper analyzes effects of time-dependence in the Bell inequality. A
generalized inequality is derived for the case when coincidence and
non-coincidence [and hence whether or not a pair contributes to the actual
data] is controlled by timing that depends on the detector settings. Needless
to say, this inequality is violated by quantum mechanics and could be violated
by experimental data provided that the loss of measurement pairs through
failure of coincidence is small enough, but the quantitative bound is more
restrictive in this case than in the previously analyzed "efficiency loophole."Comment: revtex4, 3 figures, v2: epl document class, reformatted w slight
change
Recommended from our members
Mobile Audiovisual Terminal: System Design and Subjective Testing in DECT and UMTS networks
It is anticipated that there will shortly be a requirement
for multimedia terminals that operate via mobile
communications systems. This paper presents a functional specification
for such a terminal operating at 32 kb/s in a digital
European cordless telecommunications (DECT) and universal
mobile telecommunications system (UMTS) radio network. A terminal
has been built, based on a PC with digital signal processor
(DSP) boards for audio and video coding and decoding. Speech
coding is by a phonetically driven code-excited linear prediction
(CELP) speech coder and video coding by a block-oriented hybrid
discrete cosine transform (DCT) coder. Separate channel coding
is provided for the audio and video data. The paper describes the
techniques used for audio and video coding, channel coding, and
synchronization. Methods of subjective testing in a DECT network
and in a UMTS network are also described. These consisted of
subjective tests of first impressions of the mobile audio–visual
terminal (MAVT) quality, interactive tests, and the completion
of an exit questionnaire. The test results showed that the quality
of the audio was sufficiently good for comprehension and the
video was sufficiently good for following and repeating simple
mechanical tasks. However, the quality of the MAVT was not
good enough for general use where high-quality audio and video
was needed, especially when transmission was in a noisy radio
environment
A geometric proof of the Kochen-Specker no-go theorem
We give a short geometric proof of the Kochen-Specker no-go theorem for
non-contextual hidden variables models. Note added to this version: I
understand from Jan-Aake Larsson that the construction we give here actually
contains the original Kochen-Specker construction as well as many others (Bell,
Conway and Kochen, Schuette, perhaps also Peres).Comment: This paper appeared some years ago, before the author was aware of
quant-ph. It is relevant to recent developments concerning Kochen-Specker
theorem
Recommended from our members
LENS® and SFF: Enabling Technologies for Optimized Structures
Optimized, lightweight, high-strength structures are needed in many applications from aerospace
to automotive. In pursuit of such structures, there have been proposed analytical solutions and
some specialized FEA solutions for specific structures such as automobile frames. However,
generalized 3D optimization methods have been unavailable for use by most designers.
Moreover, in the cases where optimized structural solutions are available, they are often hollow,
curving, thin wall structures that cannot be fabricated by conventional manufacturing methods.
Researchers at Sandia National Laboratories and the University of Rhode Island teamed to solve
these problems. The team has been pursuing two methods of optimizing models for generalized
loading conditions, and also has been investigating the methods needed to fabricate these
structures using Laser Engineered Net Shaping™ (LENS®) and other rapid prototyping
methods. These solid freeform fabrication (SFF) methods offer the unique ability to make
hollow, high aspect ratio features out of many materials. The manufacturing development
required for LENS to make these complex structures has included the addition of rotational axes
to Sandia’s LENS machine bringing the total to 5 controlled axes. The additional axes have
required new efforts in process planning. Several of the unique structures that are only now
possible through the use of SFF technology are shown as part of the discussion of this exciting
new application for SFF.Mechanical Engineerin
Hybrid Superconductor-Quantum Point Contact Devices using InSb Nanowires
Proposals for studying topological superconductivity and Majorana bound
states in nanowires proximity coupled to superconductors require that transport
in the nanowire is ballistic. Previous work on hybrid nanowire-superconductor
systems has shown evidence for Majorana bound states, but these experiments
were also marked by disorder, which disrupts ballistic transport. In this
letter, we demonstrate ballistic transport in InSb nanowires interfaced
directly with superconducting Al by observing quantized conductance at
zero-magnetic field. Additionally, we demonstrate that the nanowire is
proximity coupled to the superconducting contacts by observing Andreev
reflection. These results are important steps for robustly establishing
topological superconductivity in InSb nanowires
Experimenter's Freedom in Bell's Theorem and Quantum Cryptography
Bell's theorem states that no local realistic explanation of quantum
mechanical predictions is possible, in which the experimenter has a freedom to
choose between different measurement settings. Within a local realistic picture
the violation of Bell's inequalities can only be understood if this freedom is
denied. We determine the minimal degree to which the experimenter's freedom has
to be abandoned, if one wants to keep such a picture and be in agreement with
the experiment. Furthermore, the freedom in choosing experimental arrangements
may be considered as a resource, since its lacking can be used by an
eavesdropper to harm the security of quantum communication. We analyze the
security of quantum key distribution as a function of the (partial) knowledge
the eavesdropper has about the future choices of measurement settings which are
made by the authorized parties (e.g. on the basis of some quasi-random
generator). We show that the equivalence between the violation of Bell's
inequality and the efficient extraction of a secure key - which exists for the
case of complete freedom (no setting knowledge) - is lost unless one adapts the
bound of the inequality according to this lack of freedom.Comment: 7 pages, 2 figures, incorporated referee comment
Float zone experiments in space
The molten zone/freezing crystal interface system and all the mechanisms were examined. If Marangoni convection produces oscillatory flows in the float zone of semiconductor materials, such as silicon, then it is unlikely that superior quality crystals can be grown in space using this process. The major goals were: (1) to determine the conditions for the onset of Marangoni flows in molten tin, a model system for low Prandtl number molten semiconductor materials; (2) to determine whether the flows can be suppressed by a thin oxide layer; and (3) based on experimental and mathematical analysis, to predict whether oscillatory flows will occur in the float zone silicon geometry in space, and if so, could it be suppressed by thin oxide or nitride films. Techniques were developed to analyze molten tin surfaces in a UHV system in a disk float zone geometry to minimize buoyancy flows. The critical Marangoni number for onset of oscillatory flows was determined to be greater than 4300 on atomically clean molten tin surfaces
Deep optical imaging of nova remnants II. A southern-sky sample
We present an optical imaging study of 20 southern-sky nova remnants which
has resulted in the discovery of four previously unknown nova shells -- V842
Cen, RR Cha, DY Pup and HS Pup. The study has also revealed previously
unobserved features in three other known shells -- those of BT Mon, CP Pup and
RR Pic. The images of BT Mon, V842 Cen, RR Cha, DY Pup and HS Pup have been
processed using several deconvolution algorithms (Richardson-Lucy, maximum
entropy and clean) in addition to straightforward point-source subtraction in
an attempt to resolve the shells from the central stars. The use of four
different methods enables us to make a qualitative judgement of the results.
Notably, the shell of RR Pic displays tails extending outwards from clumps in
the main ejecta similar to those previously detected in DQ Her.Comment: Accepted for publication by MNRA
- …