2,224 research outputs found

    Shot noise and conductivity at high bias in bilayer graphene: Signatures of electron-optical phonon coupling

    Get PDF
    We have studied electronic conductivity and shot noise of bilayer graphene (BLG) sheets at high bias voltages and low bath temperature T0=4.2T_0=4.2 K. As a function of bias, we find initially an increase of the differential conductivity, which we attribute to self-heating. At higher bias, the conductivity saturates and even decreases due to backscattering from optical phonons. The electron-phonon interactions are also responsible for the decay of the Fano factor at bias voltages V>0.1V>0.1 V. The high bias electronic temperature has been calculated from shot noise measurements, and it goes up to ∼1200\sim1200 K at V=0.75V=0.75 V. Using the theoretical temperature dependence of BLG conductivity, we extract an effective electron-optical phonon scattering time τe−op\tau_{e-op}. In a 230 nm long BLG sample of mobility μ=3600\mu=3600 cm2^2V−1^{-1}s−1^{-1}, we find that τe−op\tau_{e-op} decreases with increasing voltage and is close to the charged impurity scattering time τimp=60\tau_{imp}=60 fs at V=0.6V=0.6 V.Comment: 7 pages, 7 figures. Extended version of the high bias part of version 1. The low bias part is discussed in arXiv:1102.065

    Reconstruction of the optical potential from scattering data

    Full text link
    We propose a method for reconstruction of the optical potential from scattering data. The algorithm is a two-step procedure. In the first step the real part of the potential is determined analytically via solution of the Marchenko equation. At this point we use a diagonal Pad\'{e} approximant of the corresponding unitary SS-matrix. In the second step the imaginary part of the potential is determined via the phase equation of the variable phase approach. We assume that the real and the imaginary parts of the optical potential are proportional. We use the phase equation to calculate the proportionality coefficient. A numerical algorithm is developed for a single and for coupled partial waves. The developed procedure is applied to analysis of 1S0^{1}S_{0} NNNN, 3SD1^{3}SD_{1} NNNN, P31P31 π−N\pi^{-} N and S01S01 K+NK^{+}N data.Comment: 26 pages, 8 figures, results of nucl-th/0410092 are refined, some new results are presente

    Quantum Key Distribution with High Loss: Toward Global Secure Communication

    Full text link
    We propose a decoy-state method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multi-photon pulses (decoy-states). Then they check the loss of the decoy-states. If the loss of the decoy-states is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate loss of signal multi-photon pulses based on that of decoy-states. This estimation can be done with an assumption that the two losses have similar values, that we justify.Comment: derivation made more detailed, 4 pages, RevTe

    Neurophysiology

    Get PDF
    Contains reports on three research projects.National Institutes of Health (Grant 5 RO1 NB-04985-03)Instrumentation Laboratory under the auspices of DSR Project 55-257Bioscience Division of National Aeronautics and Space Administration through Contract NSR 22-009-138Bell Telephone Laboratories, Inc. (Grant)The Teagle Foundation, Inc. (Grant)U. S. Air Force (Aerospace Medical Division) under Contract AF33(615)-388

    Efficient single-photon emission from electrically driven InP quantum dots epitaxially grown on Si(001)

    Full text link
    The heteroepitaxy of III-V semiconductors on silicon is a promising approach for making silicon a photonic platform for on-chip optical interconnects and quantum optical applications. Monolithic integration of both material systems is a long-time challenge, since different material properties lead to high defect densities in the epitaxial layers. In recent years, nanostructures however have shown to be suitable for successfully realising light emitters on silicon, taking advantage of their geometry. Facet edges and sidewalls can minimise or eliminate the formation of dislocations, and due to the reduced contact area, nanostructures are little affected by dislocation networks. Here we demonstrate the potential of indium phosphide quantum dots as efficient light emitters on CMOS-compatible silicon substrates, with luminescence characteristics comparable to mature devices realised on III-V substrates. For the first time, electrically driven single-photon emission on silicon is presented, meeting the wavelength range of silicon avalanche photo diodes' highest detection efficiency

    Many Roads to Synchrony: Natural Time Scales and Their Algorithms

    Full text link
    We consider two important time scales---the Markov and cryptic orders---that monitor how an observer synchronizes to a finitary stochastic process. We show how to compute these orders exactly and that they are most efficiently calculated from the epsilon-machine, a process's minimal unifilar model. Surprisingly, though the Markov order is a basic concept from stochastic process theory, it is not a probabilistic property of a process. Rather, it is a topological property and, moreover, it is not computable from any finite-state model other than the epsilon-machine. Via an exhaustive survey, we close by demonstrating that infinite Markov and infinite cryptic orders are a dominant feature in the space of finite-memory processes. We draw out the roles played in statistical mechanical spin systems by these two complementary length scales.Comment: 17 pages, 16 figures: http://cse.ucdavis.edu/~cmg/compmech/pubs/kro.htm. Santa Fe Institute Working Paper 10-11-02

    Neurophysiology

    Get PDF
    Contains reports on two research projects.Teagle Foundation, IncorporatedNational Institutes of HealthBell Telephone Laboratories, Incorporate

    Universally Composable Quantum Multi-Party Computation

    Full text link
    The Universal Composability model (UC) by Canetti (FOCS 2001) allows for secure composition of arbitrary protocols. We present a quantum version of the UC model which enjoys the same compositionality guarantees. We prove that in this model statistically secure oblivious transfer protocols can be constructed from commitments. Furthermore, we show that every statistically classically UC secure protocol is also statistically quantum UC secure. Such implications are not known for other quantum security definitions. As a corollary, we get that quantum UC secure protocols for general multi-party computation can be constructed from commitments

    Quantum Lightning Never Strikes the Same State Twice

    Get PDF
    Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary. In this work, investigate quantum lightning, a formalization of "collision-free quantum money" defined by Lutomirski et al. [ICS'10], where no-cloning holds even when the adversary herself generates the quantum state to be cloned. We then study quantum money and quantum lightning, showing the following results: - We demonstrate the usefulness of quantum lightning by showing several potential applications, such as generating random strings with a proof of entropy, to completely decentralized cryptocurrency without a block-chain, where transactions is instant and local. - We give win-win results for quantum money/lightning, showing that either signatures/hash functions/commitment schemes meet very strong recently proposed notions of security, or they yield quantum money or lightning. - We construct quantum lightning under the assumed multi-collision resistance of random degree-2 systems of polynomials. - We show that instantiating the quantum money scheme of Aaronson and Christiano [STOC'12] with indistinguishability obfuscation that is secure against quantum computers yields a secure quantum money schem
    • …
    corecore