782 research outputs found
Origin of the Immirzi Parameter
Using quadratic spinor techniques we demonstrate that the Immirzi parameter
can be expressed as ratio between scalar and pseudo-scalar contributions in the
theory and can be interpreted as a measure of how Einstein gravity differs from
a generally constructed covariant theory for gravity. This interpretation is
independent of how gravity is quantized. One of the important advantage of
deriving the Immirzi parameter using the quadratic spinor techniques is to
allow the introduction of renormalization scale associated with the Immirzi
parameter through the expectation value of the spinor field upon quantization
Probing the quantum vacuum with an artificial atom in front of a mirror
Quantum fluctuations of the vacuum are both a surprising and fundamental
phenomenon of nature. Understood as virtual photons flitting in and out of
existence, they still have a very real impact, \emph{e.g.}, in the Casimir
effects and the lifetimes of atoms. Engineering vacuum fluctuations is
therefore becoming increasingly important to emerging technologies. Here, we
shape vacuum fluctuations using a "mirror", creating regions in space where
they are suppressed. As we then effectively move an artificial atom in and out
of these regions, measuring the atomic lifetime tells us the strength of the
fluctuations. The weakest fluctuation strength we observe is 0.02 quanta, a
factor of 50 below what would be expected without the mirror, demonstrating
that we can hide the atom from the vacuum
Large collective Lamb shift of two distant superconducting artificial atoms
Virtual photons can mediate interaction between atoms, resulting in an energy
shift known as a collective Lamb shift. Observing the collective Lamb shift is
challenging, since it can be obscured by radiative decay and direct atom-atom
interactions. Here, we place two superconducting qubits in a transmission line
terminated by a mirror, which suppresses decay. We measure a collective Lamb
shift reaching 0.8% of the qubit transition frequency and exceeding the
transition linewidth. We also show that the qubits can interact via the
transmission line even if one of them does not decay into it.Comment: 7+5 pages, 4+2 figure
On the "Fake" Inferred Entanglement Associated with the Maximum Entropy Inference of Quantum States
The inference of entangled quantum states by recourse to the maximum entropy
principle is considered in connection with the recently pointed out problem of
fake inferred entanglement [R. Horodecki, {\it et al.}, Phys. Rev. A {\it 59}
(1999) 1799]. We show that there are operators , both diagonal and non
diagonal in the Bell basis, such that when the expectation value is
taken as prior information the problem of fake entanglement is not solved by
adding a new constraint associated with the mean value of (unlike
what happens when the partial information is given by the expectation value of
a Bell operator). The fake entanglement generated by the maximum entropy
principle is also studied quantitatively by comparing the entanglement of
formation of the inferred state with that of the original one.Comment: 25 Revtex pages, 5 Postscript figures, submitted to J. Phys. A (Math.
Gen.
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially
improving the performance of quantum key distribution. Here, we present a
general theory of the decoy state protocol based on only two decoy states and
one signal state. We perform optimization on the choice of intensities of the
two decoy states and the signal state. Our result shows that a decoy state
protocol with only two types of decoy states--the vacuum and a weak decoy
state--asymptotically approaches the theoretical limit of the most general type
of decoy state protocols (with an infinite number of decoy states). We also
present a one-decoy-state protocol. Moreover, we provide estimations on the
effects of statistical fluctuations and suggest that, even for long distance
(larger than 100km) QKD, our two-decoy-state protocol can be implemented with
only a few hours of experimental data. In conclusion, decoy state quantum key
distribution is highly practical.Comment: 31 pages. 6 figures. Preprint forma
Decoy state quantum key distribution with two-way classical post-processing
Decoy states have recently been proposed as a useful method for substantially
improving the performance of quantum key distribution protocols when a coherent
state source is used. Previously, data post-processing schemes based on one-way
classical communications were considered for use with decoy states. In this
paper, we develop two data post-processing schemes for the decoy-state method
using two-way classical communications. Our numerical simulation (using
parameters from a specific QKD experiment as an example) results show that our
scheme is able to extend the maximal secure distance from 142km (using only
one-way classical communications with decoy states) to 181km. The second scheme
is able to achieve a 10% greater key generation rate in the whole regime of
distances
Scattering from Electroweak Strings
The scattering of a charged fermion from an electroweak string is studied.
Owing to an amplification of the wave function at the core radius, the cross
sections for helicity flip processes can be largely enhanced. For (where is the Weinberg angle), and , we show that the helicity flip differential cross section
for electrons is of the order and is independent of angle. We
compare our results with those obtained in calculations of rates for baryon
number violating processes in the core of a cosmic string. In that case, while
the enhancement is a general phenomenon, its actual magnitude is extremely
sensitive to the fractional flux carried by the string core. Apart from showing
the existence of a similar enhancement effect for non-topological strings, our
results indicate that in some models the magnitude of enhancement can be
rendered much less sensitive to the value of the parameters in the theories.
Scattering of particles off semi-local strings and axion strings are also
considered.Comment: Replaced with revised version "Tex with phyzzx, 18 pages,
CALT-68-1921 Non-trivial changes made: discussion on axion strings corrected.
Overlap with a recently revised version of hep-ph/9311202 note
Extraction of from the Decay
We develop the perturbative QCD formalism including Sudakov effects for
semi-leptonic meson decays. We evaluate the differential decay rate of
, and find that the perturbative calculation is reliable for
the energy fraction of the pion above 0.3. Combining predictions from the soft
pion theorems, we extract the value of the matrix element which is
roughly .Comment: 10 pages, CCUTH-94-05, IP-ASTP-13-9
- …