5,288 research outputs found

    Vibration analysis of a circular disc backed by a cylindrical cavity

    Get PDF
    This paper describes the free vibration analysis of a thin disc vibrating and interacting with an acoustic medium contained in a cylindrical duct. The effects of structural-acoustic coupling are studied by means of an analytical-numerical method that is based upon classical theory and the Galerkin method. The coupling effects are discussed, and results obtained from the analysis are compared with corresponding values obtained both experimentally and from a finite element analysis. There is good agreement between the three sets of results

    Relaxation dynamics of the toric code in contact with a thermal reservoir: Finite-size scaling in a low temperature regime

    Get PDF
    We present an analysis of the relaxation dynamics of finite-size topological qubits in contact with a thermal bath. Using a continuous-time Monte Carlo method, we explicitly compute the low-temperature nonequilibrium dynamics of the toric code on finite lattices. In contrast to the size-independent bound predicted for the toric code in the thermodynamic limit, we identify a low-temperature regime on finite lattices below a size-dependent crossover temperature with nontrivial finite-size and temperature scaling of the relaxation time. We demonstrate how this nontrivial finite-size scaling is governed by the scaling of topologically nontrivial two-dimensional classical random walks. The transition out of this low-temperature regime defines a dynamical finite-size crossover temperature that scales inversely with the log of the system size, in agreement with a crossover temperature defined from equilibrium properties. We find that both the finite-size and finite-temperature scaling are stronger in the low-temperature regime than above the crossover temperature. Since this finite-temperature scaling competes with the scaling of the robustness to unitary perturbations, this analysis may elucidate the scaling of memory lifetimes of possible physical realizations of topological qubits.Comment: 14 Pages, 13 figure

    Benchmarking high fidelity single-shot readout of semiconductor qubits

    Full text link
    Determination of qubit initialisation and measurement fidelity is important for the overall performance of a quantum computer. However, the method by which it is calculated in semiconductor qubits varies between experiments. In this paper we present a full theoretical analysis of electronic single-shot readout and describe critical parameters to achieve high fidelity readout. In particular, we derive a model for energy selective state readout based on a charge detector response and examine how to optimise the fidelity by choosing correct experimental parameters. Although we focus on single electron spin readout, the theory presented can be applied to other electronic readout techniques in semiconductors that use a reservoir.Comment: 19 pages, 8 figure

    Axiomatic Bargaining Theory on Opportunity Assignments

    Get PDF
    This paper discusses issues of axiomatic bargaining problems over opportunity assignments. The fair arbitrator uses the principle of "equal opportunity" for all players to make the recommendation on re- source allocations. A framework in such a context is developed and several classical solutions to standard bargaining problems are reformulated and axiomatically characterized. Working Paper 06-4

    Scenarios of domain pattern formation in a reaction-diffusion system

    Full text link
    We performed an extensive numerical study of a two-dimensional reaction-diffusion system of the activator-inhibitor type in which domain patterns can form. We showed that both multidomain and labyrinthine patterns may form spontaneously as a result of Turing instability. In the stable homogeneous system with the fast inhibitor one can excite both localized and extended patterns by applying a localized stimulus. Depending on the parameters and the excitation level of the system stripes, spots, wriggled stripes, or labyrinthine patterns form. The labyrinthine patterns may be both connected and disconnected. In the the stable homogeneous system with the slow inhibitor one can excite self-replicating spots, breathing patterns, autowaves and turbulence. The parameter regions in which different types of patterns are realized are explained on the basis of the asymptotic theory of instabilities for patterns with sharp interfaces developed by us in Phys. Rev. E. 53, 3101 (1996). The dynamics of the patterns observed in our simulations is very similar to that of the patterns forming in the ferrocyanide-iodate-sulfite reaction.Comment: 15 pages (REVTeX), 15 figures (postscript and gif), submitted to Phys. Rev.

    Evaluating care farming as a means to care for those in trauma and grief

    Get PDF
    This is the final version. Available on open access from Elsevier via the DOI in this recordThe interrelationships between nature, health, and wellbeing are increasingly recognized and incorporated into therapeutic interventions. Care farming, the concept of utilizing agricultural places and practices for providing care, therapy, and rehabilitation, is a paradigmatic example of this shift. This mixed method study empirically evaluates the efficacy of care farming as an intervention for individuals affected by traumatic grief, a complex experiential condition. Both quantitative and qualitative results suggest this care farm intervention was beneficial, yielding significant reductions in subjective distress to grief intensity. The study's findings add to the growing body of evidence on care farming and support green care as a therapeutic potential for individuals affected by traumatic grief.Wellcome TrustArizona State University’s Watts College of Public Service and Community Solution

    Low Cost and Compact Quantum Cryptography

    Full text link
    We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad and authentication protocols.Comment: 18 pages, 9 figures, to be published in New Journal of Physic
    corecore