782 research outputs found

    Origin of the Immirzi Parameter

    Full text link
    Using quadratic spinor techniques we demonstrate that the Immirzi parameter can be expressed as ratio between scalar and pseudo-scalar contributions in the theory and can be interpreted as a measure of how Einstein gravity differs from a generally constructed covariant theory for gravity. This interpretation is independent of how gravity is quantized. One of the important advantage of deriving the Immirzi parameter using the quadratic spinor techniques is to allow the introduction of renormalization scale associated with the Immirzi parameter through the expectation value of the spinor field upon quantization

    Probing the quantum vacuum with an artificial atom in front of a mirror

    Full text link
    Quantum fluctuations of the vacuum are both a surprising and fundamental phenomenon of nature. Understood as virtual photons flitting in and out of existence, they still have a very real impact, \emph{e.g.}, in the Casimir effects and the lifetimes of atoms. Engineering vacuum fluctuations is therefore becoming increasingly important to emerging technologies. Here, we shape vacuum fluctuations using a "mirror", creating regions in space where they are suppressed. As we then effectively move an artificial atom in and out of these regions, measuring the atomic lifetime tells us the strength of the fluctuations. The weakest fluctuation strength we observe is 0.02 quanta, a factor of 50 below what would be expected without the mirror, demonstrating that we can hide the atom from the vacuum

    Large collective Lamb shift of two distant superconducting artificial atoms

    Get PDF
    Virtual photons can mediate interaction between atoms, resulting in an energy shift known as a collective Lamb shift. Observing the collective Lamb shift is challenging, since it can be obscured by radiative decay and direct atom-atom interactions. Here, we place two superconducting qubits in a transmission line terminated by a mirror, which suppresses decay. We measure a collective Lamb shift reaching 0.8% of the qubit transition frequency and exceeding the transition linewidth. We also show that the qubits can interact via the transmission line even if one of them does not decay into it.Comment: 7+5 pages, 4+2 figure

    On the "Fake" Inferred Entanglement Associated with the Maximum Entropy Inference of Quantum States

    Get PDF
    The inference of entangled quantum states by recourse to the maximum entropy principle is considered in connection with the recently pointed out problem of fake inferred entanglement [R. Horodecki, {\it et al.}, Phys. Rev. A {\it 59} (1999) 1799]. We show that there are operators A^\hat A, both diagonal and non diagonal in the Bell basis, such that when the expectation value is taken as prior information the problem of fake entanglement is not solved by adding a new constraint associated with the mean value of A^2\hat A^2 (unlike what happens when the partial information is given by the expectation value of a Bell operator). The fake entanglement generated by the maximum entropy principle is also studied quantitatively by comparing the entanglement of formation of the inferred state with that of the original one.Comment: 25 Revtex pages, 5 Postscript figures, submitted to J. Phys. A (Math. Gen.

    Practical Decoy State for Quantum Key Distribution

    Full text link
    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states--the vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.Comment: 31 pages. 6 figures. Preprint forma

    Decoy state quantum key distribution with two-way classical post-processing

    Full text link
    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used. Previously, data post-processing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data post-processing schemes for the decoy-state method using two-way classical communications. Our numerical simulation (using parameters from a specific QKD experiment as an example) results show that our scheme is able to extend the maximal secure distance from 142km (using only one-way classical communications with decoy states) to 181km. The second scheme is able to achieve a 10% greater key generation rate in the whole regime of distances

    Scattering from Electroweak Strings

    Full text link
    The scattering of a charged fermion from an electroweak string is studied. Owing to an amplification of the wave function at the core radius, the cross sections for helicity flip processes can be largely enhanced. For 0<sin2θw<1/20 <\sin^2 \theta_w < 1/2 (where θw\theta_w is the Weinberg angle), ωkme\omega \sim k \sim m_e and kR1kR \ll 1, we show that the helicity flip differential cross section for electrons is of the order me1m_e^{-1} and is independent of angle. We compare our results with those obtained in calculations of rates for baryon number violating processes in the core of a cosmic string. In that case, while the enhancement is a general phenomenon, its actual magnitude is extremely sensitive to the fractional flux carried by the string core. Apart from showing the existence of a similar enhancement effect for non-topological strings, our results indicate that in some models the magnitude of enhancement can be rendered much less sensitive to the value of the parameters in the theories. Scattering of particles off semi-local strings and axion strings are also considered.Comment: Replaced with revised version "Tex with phyzzx, 18 pages, CALT-68-1921 Non-trivial changes made: discussion on axion strings corrected. Overlap with a recently revised version of hep-ph/9311202 note

    Extraction of VubV_{ub} from the Decay BπlνB\to \pi l \nu

    Full text link
    We develop the perturbative QCD formalism including Sudakov effects for semi-leptonic BB meson decays. We evaluate the differential decay rate of BπlνB\to \pi l \nu, and find that the perturbative calculation is reliable for the energy fraction of the pion above 0.3. Combining predictions from the soft pion theorems, we extract the value of the matrix element Vub|V_{ub}| which is roughly 2.7×1032.7\times 10^{-3}.Comment: 10 pages, CCUTH-94-05, IP-ASTP-13-9
    corecore