117 research outputs found

    Generation of atom-photon entangled states in atomic Bose-Einstein condensate via electromagnetically induced transparency

    Full text link
    In this paper, we present a method to generate continuous-variable-type entangled states between photons and atoms in atomic Bose-Einstein condensate (BEC). The proposed method involves an atomic BEC with three internal states, a weak quantized probe laser and a strong classical coupling laser, which form a three-level Lambda-shaped BEC system. We consider a situation where the BEC is in electromagnetically induced transparency (EIT) with the coupling laser being much stronger than the probe laser. In this case, the upper and intermediate levels are unpopulated, so that their adiabatic elimination enables an effective two-mode model involving only the atomic field at the lowest internal level and the quantized probe laser field. Atom-photon quantum entanglement is created through laser-atom and inter-atomic interactions, and two-photon detuning. We show how to generate atom-photon entangled coherent states and entangled states between photon (atom) coherent states and atom-(photon-) macroscopic quantum superposition (MQS) states, and between photon-MQS and atom-MQS states.Comment: 9 pages, 1 figur

    Global Warming: Forecasts by Scientists versus Scientific Forecasts

    Get PDF
    In 2007, the Intergovernmental Panel on Climate Change’s Working Group One, a panel of experts established by the World Meteorological Organization and the United Nations Environment Programme, issued its Fourth Assessment Report. The Report included predictions of dramatic increases in average world temperatures over the next 92 years and serious harm resulting from the predicted temperature increases. Using forecasting principles as our guide we asked: Are these forecasts a good basis for developing public policy? Our answer is “no”. To provide forecasts of climate change that are useful for policy-making, one would need to forecast (1) global temperature, (2) the effects of any temperature changes, and (3) the effects of feasible alternative policies. Proper forecasts of all three are necessary for rational policy making. The IPCC WG1 Report was regarded as providing the most credible long-term forecasts of global average temperatures by 31 of the 51 scientists and others involved in forecasting climate change who responded to our survey. We found no references in the 1056-page Report to the primary sources of information on forecasting methods despite the fact these are conveniently available in books, articles, and websites. We audited the forecasting processes described in Chapter 8 of the IPCC’s WG1 Report to assess the extent to which they complied with forecasting principles. We found enough information to make judgments on 89 out of a total of 140 forecasting principles. The forecasting procedures that were described violated 72 principles. Many of the violations were, by themselves, critical. The forecasts in the Report were not the outcome of scientific procedures. In effect, they were the opinions of scientists transformed by mathematics and obscured by complex writing. Research on forecasting has shown that experts’ predictions are not useful in situations involving uncertainly and complexity. We have been unable to identify any scientific forecasts of global warming. Claims that the Earth will get warmer have no more credence than saying that it will get colder

    The Security of Practical Quantum Key Distribution

    Full text link
    Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power. The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change

    Magnetism, FeS colloids, and Origins of Life

    Full text link
    A number of features of living systems: reversible interactions and weak bonds underlying motor-dynamics; gel-sol transitions; cellular connected fractal organization; asymmetry in interactions and organization; quantum coherent phenomena; to name some, can have a natural accounting via physicalphysical interactions, which we therefore seek to incorporate by expanding the horizons of `chemistry-only' approaches to the origins of life. It is suggested that the magnetic 'face' of the minerals from the inorganic world, recognized to have played a pivotal role in initiating Life, may throw light on some of these issues. A magnetic environment in the form of rocks in the Hadean Ocean could have enabled the accretion and therefore an ordered confinement of super-paramagnetic colloids within a structured phase. A moderate H-field can help magnetic nano-particles to not only overcome thermal fluctuations but also harness them. Such controlled dynamics brings in the possibility of accessing quantum effects, which together with frustrations in magnetic ordering and hysteresis (a natural mechanism for a primitive memory) could throw light on the birth of biological information which, as Abel argues, requires a combination of order and complexity. This scenario gains strength from observations of scale-free framboidal forms of the greigite mineral, with a magnetic basis of assembly. And greigite's metabolic potential plays a key role in the mound scenario of Russell and coworkers-an expansion of which is suggested for including magnetism.Comment: 42 pages, 5 figures, to be published in A.R. Memorial volume, Ed Krishnaswami Alladi, Springer 201

    Of cattle, sand flies and men : a systematic review of risk factor analyses for South Asian visceral leishmaniasis and implications for elimination

    Get PDF
    Background: Studies performed over the past decade have identified fairly consistent epidemiological patterns of risk factors for visceral leishmaniasis (VL) in the Indian subcontinent. Methods and Principal Findings: To inform the current regional VL elimination effort and identify key gaps in knowledge, we performed a systematic review of the literature, with a special emphasis on data regarding the role of cattle because primary risk factor studies have yielded apparently contradictory results. Because humans form the sole infection reservoir, clustering of kala-azar cases is a prominent epidemiological feature, both at the household level and on a larger scale. Subclinical infection also tends to show clustering around kala-azar cases. Within villages, areas become saturated over a period of several years; kala-azar incidence then decreases while neighboring areas see increases. More recently, post kalaazar dermal leishmaniasis (PKDL) cases have followed kala-azar peaks. Mud walls, palpable dampness in houses, and peridomestic vegetation may increase infection risk through enhanced density and prolonged survival of the sand fly vector. Bed net use, sleeping on a cot and indoor residual spraying are generally associated with decreased risk. Poor micronutrient status increases the risk of progression to kala-azar. The presence of cattle is associated with increased risk in some studies and decreased risk in others, reflecting the complexity of the effect of bovines on sand fly abundance, aggregation, feeding behavior and leishmanial infection rates. Poverty is an overarching theme, interacting with individual risk factors on multiple levels. Conclusions: Carefully designed demonstration projects, taking into account the complex web of interconnected risk factors, are needed to provide direct proof of principle for elimination and to identify the most effective maintenance activities to prevent a rapid resurgence when interventions are scaled back. More effective, short-course treatment regimens for PKDL are urgently needed to enable the elimination initiative to succeed

    Characterising the phenotypic diversity of Papilio dardanus wing patterns using an extensive museum collection

    Get PDF
    The history of 20th Century evolutionary biology can be followed through the study of mimetic butterflies. From the initial findings of discontinuous polymorphism through the debates regarding the evolution of mimicry and the step-size of evolutionary change, to the studies on supergene evolution and molecular characterisation of butterfly genomes, mimetic butterflies have been at the heart of evolutionary thought for over 100 years. During this time, few species have received as much attention and in-depth study as Papilio dardanus. To assist all aspects of mimicry research, we present a complete data-derived overview of the extent of polymorphism within this species. Using historical samples permanently held by the NHM London, we document the extent of phenotypic variation and characterise the diversity present in each of the subspecies and how it varies across Africa. We also demonstrate an association between “imperfect” mimetic forms and the transitional race formed in the area where Eastern and Western African populations meet around Lake Victoria. We present a novel portal for access to this collection, www.mimeticbutterflies.org, allowing remote access to this unique repository. It is hoped that this online resource can act as a nucleus for the sharing and dissemination of other collections databases and imagery connected with mimetic butterflies

    Cargo Cults in Information Systems Development: a Definition and an Analytical Framework

    Get PDF
    Organizations today adopt agile information systems development methods (ISDM), but many do not succeed with the adoption process and in achieving desired results. Systems developers sometimes fail in efficient use of ISDM, often due to a lack of understanding the fundamental intentions of the chosen method. In many cases organizations simply imitate the behavior of others without really understanding why. This conceptual paper defines this phenomenon as an ISDM cargo cult behavior and proposes an analytical framework to identify such situations. The concept of cargo cults originally comes from the field of social anthropology and has been used to explain irrational, ritualistic imitation of certain behavior. By defining and introducing the concept in the field of information systems development we provide a diagnostic tool to better understand one of the reasons why ISDM adoption sometimes fail

    Generalized Matrix Factorizations as a Unifying Framework for Pattern Set Mining: Complexity Beyond Blocks

    Full text link
    Abstract. Matrix factorizations are a popular tool to mine regularities from data. There are many ways to interpret the factorizations, but one particularly suited for data mining utilizes the fact that a matrix product can be interpreted as a sum of rank-1 matrices. Then the factorization of a matrix becomes the task of finding a small number of rank-1 matrices, sum of which is a good representation of the original matrix. Seen this way, it becomes obvious that many problems in data mining can be expressed as matrix factorizations with correct definitions of what a rank-1 matrix and a sum of rank-1 matrices mean. This paper develops a unified theory, based on generalized outer product operators, that encompasses many pattern set mining tasks. The focus is on the computational aspects of the theory and studying the computational complexity and approximability of many problems related to generalized matrix factorizations. The results immediately apply to a large number of data mining problems, and hopefully allow generalizing future results and algorithms, as well.
    corecore