2,681 research outputs found
Solar neutrino interactions: Using charged currents at SNO to tell neutral currents at Super-Kamiokande
In the presence of flavor oscillations, muon and tau neutrinos can contribute
to the Super-Kamiokande (SK) solar neutrino signal through the neutral current
process \nu_{\mu,\tau} e^{-}\to \nu_{\mu,\tau} e^{-}. We show how to separate
the \nu_e and \nu_{\mu,\tau} event rates in SK in a model independent way, by
using the rate of the charged current process \nu_e d \to p p e^{-} from the
Sudbury Neutrino Observatory (SNO) experiment, with an appropriate choice of
the SK and SNO energy thresholds. Under the additional hypothesis of no
oscillations into sterile states, we also show how to determine the absolute
^{8}B neutrino flux from the same data set, independently of the \nu_e survival
probability.Comment: 14 pages (RevTeX), incl. 3 figures (epsf), submitted to Phys. ReV.
Formation of core/shell structured cobalt/carbon nanoparticles by pulsed laser ablation in toluene
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
Studies on the DNA elongation inhibitor and its proliferating cell nuclear antigen-dependent control in simian virus 40 DNA replication in vitro.
Upper bounds for the secure key rate of decoy state quantum key distribution
The use of decoy states in quantum key distribution (QKD) has provided a
method for substantially increasing the secret key rate and distance that can
be covered by QKD protocols with practical signals. The security analysis of
these schemes, however, leaves open the possibility that the development of
better proof techniques, or better classical post-processing methods, might
further improve their performance in realistic scenarios. In this paper, we
derive upper bounds on the secure key rate for decoy state QKD. These bounds
are based basically only on the classical correlations established by the
legitimate users during the quantum communication phase of the protocol. The
only assumption about the possible post-processing methods is that double click
events are randomly assigned to single click events. Further we consider only
secure key rates based on the uncalibrated device scenario which assigns
imperfections such as detection inefficiency to the eavesdropper. Our analysis
relies on two preconditions for secure two-way and one-way QKD: The legitimate
users need to prove that there exists no separable state (in the case of
two-way QKD), or that there exists no quantum state having a symmetric
extension (one-way QKD), that is compatible with the available measurements
results. Both criteria have been previously applied to evaluate single-photon
implementations of QKD. Here we use them to investigate a realistic source of
weak coherent pulses. The resulting upper bounds can be formulated as a convex
optimization problem known as a semidefinite program which can be efficiently
solved. For the standard four-state QKD protocol, they are quite close to known
lower bounds, thus showing that there are clear limits to the further
improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems
Quantum key distribution (QKD) systems can send signals over more than 100 km
standard optical fiber and are widely believed to be secure. Here, we show
experimentally for the first time a technologically feasible attack, namely the
time-shift attack, against a commercial QKD system. Our result shows that,
contrary to popular belief, an eavesdropper, Eve, has a non-negligible
probability (~4%) to break the security of the system. Eve's success is due to
the well-known detection efficiency loophole in the experimental testing of
Bell inequalities. Therefore, the detection efficiency loophole plays a key
role not only in fundamental physics, but also in technological applications
such as QKD.Comment: 5 pages, 3 figures. Substantially revised versio
Heterozygosity at Gm Loci Associated with Humoral Immunity to Osteosarcoma
Familial clustering of osteosarcoma suggests the involvement of genetic factors (1, 2), and the demonstration of a high incidence of osteosarcoma-specific antibodies (3, 4), as well as tumor-specific cell-mediated immunity (5) in patients and their relatives, indicates the involvement of immunological factors in the pathogenesis of this disease. Certain Gm allotypes (genetic markers of IgG) have been shown to be associated with a high relative risk of some forms of cancer. For instance, in Caucasians an unusual Gm haplotype--Gm 1,3;5,13,14--has been found to be associated with neuroblastoma (6), and an increased frequency of Gm (2) has been reported in patients with malignant melanoma (7, 8). A recent report has shown an association of the Gm 1,2; 13,15,16,21 phenotype with lung cancer and primary hepatoma in the Japanese (9). To our knowledge, however, the possible role of Gm allotypes in predisposition to osteosarcoma has not been examined. Immune responsiveness to a variety of antigens in both experimental animals and humans has been shown to be controlled either by major histocompatibility complex (MHC)-linked immune response (Ir) genes or by allotype-linked Ir genes (10-13). In some instances an interactive effect of these two unlinked genetic systems has been observed (12). It is possible that MHC-linked or allotype-linked Ir genes may also influence humoral immunity to tumor antigens. In this report we present evidence for complementary Ir genes controlling immune responses to osteosarcoma-associated antigens (OSAA)
Higgs particle detection using jets
We study the possibility of detecting the Higgs boson in the intermediate
mass range via its two jet channel. We consider only Higgs bosons produced in
association with a pair. Both and are required to
decay semileptonically to reduce the QCD background. The signal is compared
with the main background, jets, after appropriate cuts. A
sizable signal above background is seen in our simulation at the parton level.
Use of the channel with decaying to is suggested for
eliminating theoretical uncertainties in determining the signal.Comment: 10 pages, Fig.1 a,b,c,d(surve on request), plain tex, PVAM-HEP-93-
- …