23,527 research outputs found
Quantum computers can search arbitrarily large databases by a single query
This paper shows that a quantum mechanical algorithm that can query
information relating to multiple items of the database, can search a database
in a single query (a query is defined as any question to the database to which
the database has to return a (YES/NO) answer). A classical algorithm will be
limited to the information theoretic bound of at least O(log N) queries (which
it would achieve by using a binary search).Comment: Several enhancements to the original pape
When only two thirds of the entanglement can be distilled
We provide an example of distillable bipartite mixed state such that, even in
the asymptotic limit, more pure-state entanglement is required to create it
than can be distilled from it. Thus, we show that the irreversibility in the
processes of formation and distillation of bipartite states, recently proved in
[G. Vidal, J.I. Cirac, Phys. Rev. Lett. 86, (2001) 5803-5806], is not limited
to bound-entangled states.Comment: 4 pages, revtex, 1 figur
Effects of infrequent dried distillers grain supplementation on spring-calving cow performance
Feed and supplement costs and the expenses associated with delivery of winter supplements
account for a large proportion of the total operating expenditures for cow-calf
producers. Cattle grazing low-quality dormant native range (<6% crude protein) typically
are unable to consume sufficient protein from the forage base, which limits microbial
activity and forage digestion. Supplemental protein often is required to maintain
cow body weight and body condition score during the last trimester of pregnancy. Low
cow body condition scores at calving are common and may negatively affect lactation,
rebreeding rates, and calf weaning weight. Failure to maintain proper nutritional status
during this period severely affects short-term cow performance, reduces overall herd
productivity, and limits profit potential.
The most effective means of supplying supplemental protein to cows consuming
dormant native range is to provide a small amount of high-protein feedstuff (>30%
crude protein). Dried distillers grains with solubles (DDGS) are a by-product of the
ethanol refining process. Distillers grains supply the recommended 30% crude protein
level, are readily available, and often are favorably priced compared with more traditional
feedstuffs.
With the rising costs of inputs in todayâs cow-calf sector, reducing cost is necessary to
maintain viability of the national cowherd. Reducing the frequency of supplementation
results in less labor and fuel use, effectively reducing input costs; however, this is viable
only as long as cow performance is maintained at acceptable levels. Therefore, the objective
of this study was to examine the effects of infrequent supplementation of dried
distillers grains with solubles on cow body weight and body condition score
A method of enciphering quantum states
In this paper, we propose a method of enciphering quantum states of two-state
systems (qubits) for sending them in secrecy without entangled qubits shared by
two legitimate users (Alice and Bob). This method has the following two
properties. First, even if an eavesdropper (Eve) steals qubits, she can extract
information from them with certain probability at most. Second, Alice and Bob
can confirm that the qubits are transmitted between them correctly by measuring
a signature. If Eve measures m qubits one by one from n enciphered qubits and
sends alternative ones (the Intercept/Resend attack), a probability that Alice
and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for
decryption and the signature are given by classical binary strings and they are
disclosed through a public channel. Enciphering classical information by this
method is equivalent to the one-time pad method with distributing a classical
key (random binary string) by the BB84 protocol. If Eve takes away qubits,
Alice and Bob lose the original quantum information. If we apply our method to
a state in iteration, Eve's success probability decreases exponentially. We
cannot examine security against the case that Eve makes an attack with using
entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two
references, several clarifying sentences are added in Sec. 5, typos
corrected, a new proof is provided in Appendix A and it is shorter than the
old one. v3: 23 pages, one section is adde
Valuing remnant vegetation in Central Queensland using choice modelling
In the Desert Uplands region of Central Queensland, many pastoralists are clearing vegetation in order to improve cattle grazing production. A choice modelling study was undertaken to provide estimates of the benefits of retaining remnant vegetation that are appropriate for inclusion in a cost benefit analysis of tighter clearing restrictions. Attributes included in the choice model were reductions in the population size of nonâthreatened species, the number of endangered species lost to the region, and changes in regional income and employment. A nested logit model was used to model the data in order to avoid violations of the independence of irrelevant alternatives condition. The estimated benefits are reported for several tree clearing policy regimes that are more stringent than those currently applied.Resource /Energy Economics and Policy,
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for
quantum key distribution. We first give a key distribution protocol based on
entanglement purification, which can be proven secure using methods from Lo and
Chau's proof of security for a similar protocol. We then show that the security
of this protocol implies the security of BB84. The entanglement-purification
based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these
codes are used to remove the use of quantum computation from the Lo-Chau
protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
Quantum State Disturbance vs. Information Gain: Uncertainty Relations for Quantum Information
When an observer wants to identify a quantum state, which is known to be one
of a given set of non-orthogonal states, the act of observation causes a
disturbance to that state. We investigate the tradeoff between the information
gain and that disturbance. This issue has important applications in quantum
cryptography. The optimal detection method, for a given tolerated disturbance,
is explicitly found in the case of two equiprobable non-orthogonal pure states.Comment: 20 pages, standard LaTeX, four png figures (also available from the
authors: [email protected] and [email protected]
Entanglement sharing among qudits
Consider a system consisting of n d-dimensional quantum particles (qudits),
and suppose that we want to optimize the entanglement between each pair. One
can ask the following basic question regarding the sharing of entanglement:
what is the largest possible value Emax(n,d) of the minimum entanglement
between any two particles in the system? (Here we take the entanglement of
formation as our measure of entanglement.) For n=3 and d=2, that is, for a
system of three qubits, the answer is known: Emax(3,2) = 0.550. In this paper
we consider first a system of d qudits and show that Emax(d,d) is greater than
or equal to 1. We then consider a system of three particles, with three
different values of d. Our results for the three-particle case suggest that as
the dimension d increases, the particles can share a greater fraction of their
entanglement capacity.Comment: 4 pages; v2 contains a new result for 3 qudits with d=
Society of Lloyd's v Price: Characterization and 'gap' in the Conflict of Laws
For connoisseurs of legal arcana, the case of Society of Lloyd's v Price; Society of Lloyd's v Lee 2006 (5) SA 393 (SCA) (hereafter Society of Lloyd's) has a special significance. Not only did it settle the question how best to characterize causes of action, but it also offered a solution for that curious problem of 'gap'. Both of these are issues arising out of conflicts of law. In itself the conflict of laws is an abstruse discipline, for it involves not simply the application of law to facts, but rather the application of a set of second-order choice-of-law rules which are designed to indicate what law should be applied to facts that happen to contain a foreign element. The Society of Lloydâs case, however, took matters a stage further: the logic of the choice-of-law process drove the court to a point where it discovered that, in the circumstances of the case, no law was applicable. In conflict jargon, this conundrum is known as a problem of âgapâ. (Its counterpart is âcumulationâ, namely the simultaneous applicability of two or more laws.
- âŠ