12,274 research outputs found
Engine condition monitoring: CF6 family 60's through the 80's
The on condition program is described in terms of its effectiveness as a maintenance tool both at the line station as well as at home base by the early detection of engine faults, erroneous instrumentation signals and by verification of engine health. The system encompasses all known methods from manual procedures to the fully automated airborne integrated data system
No Signalling and Quantum Key Distribution
Standard quantum key distribution protocols are provably secure against
eavesdropping attacks, if quantum theory is correct. It is theoretically
interesting to know if we need to assume the validity of quantum theory to
prove the security of quantum key distribution, or whether its security can be
based on other physical principles. The question would also be of practical
interest if quantum mechanics were ever to fail in some regime, because a
scientifically and technologically advanced eavesdropper could perhaps use
post-quantum physics to extract information from quantum communications without
necessarily causing the quantum state disturbances on which existing security
proofs rely. Here we describe a key distribution scheme provably secure against
general attacks by a post-quantum eavesdropper who is limited only by the
impossibility of superluminal signalling. The security of the scheme stems from
violation of a Bell inequality.Comment: Clarifications and minor revisions in response to comments. Final
version; to appear in Phys. Rev. Let
Mating Flights of \u3ci\u3eEphoron Album\u3c/i\u3e (Ephemeroptera: Polymitarcidae) in Michigan
Mating flights of the mayfly Ephoron album (Say) were observed on the Sturgeon River in Houghton County, Michigan, on five evenings between 16 and 22 August, 1977. Peak emergence occurred about 30 minutes befqre sunset on 19 August and the flight period lasted about two hours. Many more adult males than females were collected on three evenings, but on one evening females greatly outnumbered males collected
Coin Tossing is Strictly Weaker Than Bit Commitment
We define cryptographic assumptions applicable to two mistrustful parties who
each control two or more separate secure sites between which special relativity
guarantees a time lapse in communication. We show that, under these
assumptions, unconditionally secure coin tossing can be carried out by
exchanges of classical information. We show also, following Mayers, Lo and
Chau, that unconditionally secure bit commitment cannot be carried out by
finitely many exchanges of classical or quantum information. Finally we show
that, under standard cryptographic assumptions, coin tossing is strictly weaker
than bit commitment. That is, no secure classical or quantum bit commitment
protocol can be built from a finite number of invocations of a secure coin
tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let
Data Catalog Series for Space Science and Applications Flight Missions
The main purpose of the data catalog series is to provide descriptive references to data generated by space science flight missions. The data sets described include all of the actual holdings of the Space Science Data Center (NSSDC), all data sets for which direct contact information is available, and some data collections held and serviced by foreign investigators, NASA and other U.S. government agencies. This volume contains narrative descriptions of data sets from geostationary and high altitude scientific spacecraft and investigations. The following spacecraft series are included: Mariner, Pioneer, Pioneer Venus, Venera, Viking, Voyager, and Helios. Separate indexes to the planetary and interplanetary missions are also provided
Causal Quantum Theory and the Collapse Locality Loophole
Causal quantum theory is an umbrella term for ordinary quantum theory
modified by two hypotheses: state vector reduction is a well-defined process,
and strict local causality applies. The first of these holds in some versions
of Copenhagen quantum theory and need not necessarily imply practically
testable deviations from ordinary quantum theory. The second implies that
measurement events which are spacelike separated have no non-local
correlations. To test this prediction, which sharply differs from standard
quantum theory, requires a precise theory of state vector reduction.
Formally speaking, any precise version of causal quantum theory defines a
local hidden variable theory. However, causal quantum theory is most naturally
seen as a variant of standard quantum theory. For that reason it seems a more
serious rival to standard quantum theory than local hidden variable models
relying on the locality or detector efficiency loopholes.
Some plausible versions of causal quantum theory are not refuted by any Bell
experiments to date, nor is it obvious that they are inconsistent with other
experiments. They evade refutation via a neglected loophole in Bell experiments
-- the {\it collapse locality loophole} -- which exists because of the possible
time lag between a particle entering a measuring device and a collapse taking
place. Fairly definitive tests of causal versus standard quantum theory could
be made by observing entangled particles separated by light
seconds.Comment: Discussion expanded; typos corrected; references adde
Satellite remote sensing facility for oceanograhic applications
The project organization, design process, and construction of a Remote Sensing Facility at Scripps Institution of Oceanography at LaJolla, California are described. The facility is capable of receiving, processing, and displaying oceanographic data received from satellites. Data are primarily imaging data representing the multispectral ocean emissions and reflectances, and are accumulated during 8 to 10 minute satellite passes over the California coast. The most important feature of the facility is the reception and processing of satellite data in real time, allowing investigators to direct ships to areas of interest for on-site verifications and experiments
Current Induced Excitations in Cu/Co/Cu Single Ferromagnetic Layer Nanopillars
Current-induced magnetic excitations in Cu/Co/Cu single layer nanopillars
(~50 nm in diameter) have been studied experimentally as a function of Co layer
thickness at low temperatures for large applied fields perpendicular to the
layers. For asymmetric junctions current induced excitations are observed at
high current densities for only one polarity of the current and are absent at
the same current densities in symmetric junctions. These observations confirm
recent predictions of spin-transfer torque induced spin wave excitations in
single layer junctions with a strong asymmetry in the spin accumulation in the
leads.Comment: 4 pages, 3 figures, submitted to Phys. Rev. Let
Critical Currents of Josephson-Coupled Wire Arrays
We calculate the current-voltage characteristics and critical current
I_c^{array} of an array of Josephson-coupled superconducting wires. The array
has two layers, each consisting of a set of parallel wires, arranged at right
angles, such that an overdamped resistively-shunted junction forms wherever two
wires cross. A uniform magnetic field equal to f flux quanta per plaquette is
applied perpendicular to the layers. If f = p/q, where p and q are mutually
prime integers, I_c^{array}(f) is found to have sharp peaks when q is a small
integer. To an excellent approximation, it is found in a square array of n^2
plaquettes, that I_c^{array}(f) \propto (n/q)^{1/2} for sufficiently large n.
This result is interpreted in terms of the commensurability between the array
and the assumed q \times q unit cell of the ground state vortex lattice.Comment: 4 pages, 4 figure
Efficient quantum key distribution secure against no-signalling eavesdroppers
By carrying out measurements on entangled states, two parties can generate a
secret key which is secure not only against an eavesdropper bound by the laws
of quantum mechanics, but also against a hypothetical "post-quantum"
eavesdroppers limited by the no-signalling principle only. We introduce a
family of quantum key distribution protocols of this type, which are more
efficient than previous ones, both in terms of key rate and noise resistance.
Interestingly, the best protocols involve large number of measurements. We show
that in the absence of noise, these protocols can yield one secret bit per
entanglement bit, implying that the key rates in the no-signalling post-quantum
scenario are comparable to the key rates in usual quantum key distribution.Comment: 11 pages, 2 color figures. v2: minor modifications, added references,
added note on the relation to quant-ph/060604
- …