12,274 research outputs found

    Engine condition monitoring: CF6 family 60's through the 80's

    Get PDF
    The on condition program is described in terms of its effectiveness as a maintenance tool both at the line station as well as at home base by the early detection of engine faults, erroneous instrumentation signals and by verification of engine health. The system encompasses all known methods from manual procedures to the fully automated airborne integrated data system

    No Signalling and Quantum Key Distribution

    Full text link
    Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use post-quantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a post-quantum eavesdropper who is limited only by the impossibility of superluminal signalling. The security of the scheme stems from violation of a Bell inequality.Comment: Clarifications and minor revisions in response to comments. Final version; to appear in Phys. Rev. Let

    Mating Flights of \u3ci\u3eEphoron Album\u3c/i\u3e (Ephemeroptera: Polymitarcidae) in Michigan

    Get PDF
    Mating flights of the mayfly Ephoron album (Say) were observed on the Sturgeon River in Houghton County, Michigan, on five evenings between 16 and 22 August, 1977. Peak emergence occurred about 30 minutes befqre sunset on 19 August and the flight period lasted about two hours. Many more adult males than females were collected on three evenings, but on one evening females greatly outnumbered males collected

    Coin Tossing is Strictly Weaker Than Bit Commitment

    Full text link
    We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally secure coin tossing can be carried out by exchanges of classical information. We show also, following Mayers, Lo and Chau, that unconditionally secure bit commitment cannot be carried out by finitely many exchanges of classical or quantum information. Finally we show that, under standard cryptographic assumptions, coin tossing is strictly weaker than bit commitment. That is, no secure classical or quantum bit commitment protocol can be built from a finite number of invocations of a secure coin tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let

    Data Catalog Series for Space Science and Applications Flight Missions

    Get PDF
    The main purpose of the data catalog series is to provide descriptive references to data generated by space science flight missions. The data sets described include all of the actual holdings of the Space Science Data Center (NSSDC), all data sets for which direct contact information is available, and some data collections held and serviced by foreign investigators, NASA and other U.S. government agencies. This volume contains narrative descriptions of data sets from geostationary and high altitude scientific spacecraft and investigations. The following spacecraft series are included: Mariner, Pioneer, Pioneer Venus, Venera, Viking, Voyager, and Helios. Separate indexes to the planetary and interplanetary missions are also provided

    Causal Quantum Theory and the Collapse Locality Loophole

    Full text link
    Causal quantum theory is an umbrella term for ordinary quantum theory modified by two hypotheses: state vector reduction is a well-defined process, and strict local causality applies. The first of these holds in some versions of Copenhagen quantum theory and need not necessarily imply practically testable deviations from ordinary quantum theory. The second implies that measurement events which are spacelike separated have no non-local correlations. To test this prediction, which sharply differs from standard quantum theory, requires a precise theory of state vector reduction. Formally speaking, any precise version of causal quantum theory defines a local hidden variable theory. However, causal quantum theory is most naturally seen as a variant of standard quantum theory. For that reason it seems a more serious rival to standard quantum theory than local hidden variable models relying on the locality or detector efficiency loopholes. Some plausible versions of causal quantum theory are not refuted by any Bell experiments to date, nor is it obvious that they are inconsistent with other experiments. They evade refutation via a neglected loophole in Bell experiments -- the {\it collapse locality loophole} -- which exists because of the possible time lag between a particle entering a measuring device and a collapse taking place. Fairly definitive tests of causal versus standard quantum theory could be made by observing entangled particles separated by ≈0.1\approx 0.1 light seconds.Comment: Discussion expanded; typos corrected; references adde

    Satellite remote sensing facility for oceanograhic applications

    Get PDF
    The project organization, design process, and construction of a Remote Sensing Facility at Scripps Institution of Oceanography at LaJolla, California are described. The facility is capable of receiving, processing, and displaying oceanographic data received from satellites. Data are primarily imaging data representing the multispectral ocean emissions and reflectances, and are accumulated during 8 to 10 minute satellite passes over the California coast. The most important feature of the facility is the reception and processing of satellite data in real time, allowing investigators to direct ships to areas of interest for on-site verifications and experiments

    Current Induced Excitations in Cu/Co/Cu Single Ferromagnetic Layer Nanopillars

    Full text link
    Current-induced magnetic excitations in Cu/Co/Cu single layer nanopillars (~50 nm in diameter) have been studied experimentally as a function of Co layer thickness at low temperatures for large applied fields perpendicular to the layers. For asymmetric junctions current induced excitations are observed at high current densities for only one polarity of the current and are absent at the same current densities in symmetric junctions. These observations confirm recent predictions of spin-transfer torque induced spin wave excitations in single layer junctions with a strong asymmetry in the spin accumulation in the leads.Comment: 4 pages, 3 figures, submitted to Phys. Rev. Let

    Critical Currents of Josephson-Coupled Wire Arrays

    Full text link
    We calculate the current-voltage characteristics and critical current I_c^{array} of an array of Josephson-coupled superconducting wires. The array has two layers, each consisting of a set of parallel wires, arranged at right angles, such that an overdamped resistively-shunted junction forms wherever two wires cross. A uniform magnetic field equal to f flux quanta per plaquette is applied perpendicular to the layers. If f = p/q, where p and q are mutually prime integers, I_c^{array}(f) is found to have sharp peaks when q is a small integer. To an excellent approximation, it is found in a square array of n^2 plaquettes, that I_c^{array}(f) \propto (n/q)^{1/2} for sufficiently large n. This result is interpreted in terms of the commensurability between the array and the assumed q \times q unit cell of the ground state vortex lattice.Comment: 4 pages, 4 figure

    Efficient quantum key distribution secure against no-signalling eavesdroppers

    Get PDF
    By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the no-signalling principle only. We introduce a family of quantum key distribution protocols of this type, which are more efficient than previous ones, both in terms of key rate and noise resistance. Interestingly, the best protocols involve large number of measurements. We show that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rates in usual quantum key distribution.Comment: 11 pages, 2 color figures. v2: minor modifications, added references, added note on the relation to quant-ph/060604
    • …
    corecore