29,962 research outputs found
A bolometric measurement of the antineutrino mass
High statistics calorimetric measurements of the beta spectrum of 187Re are
being performed with arrays of silver perrhenate crystals operated at low
temperature. After a modification of the experimental set-up, which allowed to
substantially reduce the background of spurious counts and therefore to
increase the sensitivity on the electron antineutrino mass, a new measurement
with 10 silver perrhenate microbolometers is running since July 2002. The
crystals have masses between 250 and 350 micrograms and their average FWHM
energy resolution, constantly monitored by means of fluorescence X-rays, is of
28.3 eV at the beta end-point. The Kurie plot collected during 4485 hours x mg
effective running time has an end-point energy of 2466.1 +/- 0.8{stat} +/- 1.5
{syst} eV, while the half lifetime of the decay is found to be 43.2 +/-
0.2{stat} +/- 0.1{syst} Gy. These values are the most precise obtained so far
for 187Re. From the fit of the Kurie plot we can deduce a value for the squared
electron antineutrino mass m(nu)^2 of 147 +/- 237{stat} +/- 90{syst} eV^2. The
corresponding 90% C.L. upper limit for m(nu) is 21.7 eV.Comment: 3 pages, 3 figures. Submitted to Phys. Rev. Let
THE VALUE OF KNOWLEDGE THROUGH H-BIM MODELS: HISTORIC DOCUMENTATION WITH A SEMANTIC APPROACH
Abstract. The Building Information Modeling (BIM) in the Architectural Heritage field is constantly proving to be a fertile ground for the experimentation of innovative systems for the enhancement and management of cultural heritage. Regarding to the management of the entire process, the building field is increasing in efficiency from the construction to the management phase; conversely, the approach to historical buildings opens up interesting and heterogeneous scenarios, according to different levels of complexity. The presented work is the result of a collaboration between the Politecnico di Torino and the Escuela TĂ©cnica Superior de Arquitectura of Granada: the main scope was to create an historic building information model (H-BIM) of the building that today hosts the Faculty of Architecture (ETSAG), taking into account its historical past from the sixteenth century up to the present day, as the result of many modifications, extensions and different use classifications over time. According to this, the BIM methodology can be considered as a bridge between the archive documentation and the digital model, proving to be an effective tool as a data repository, semantically oriented, not only constituted by geometry, but also by alpha-numerical attributes, improving in effectiveness if it is directly related to formal language object oriented.</p
Radio continuum of galaxies with HO megamaser disks: 33 GHz VLA data
We investigate the nuclear environment of galaxies with observed 22 GHz water
megamaser in their subparsec edge-on accretion disks, using 33 GHz (9mm) radio
continuum data from VLA, with a resolution of ~ 0.2-0.5 arcsecs, and relate the
maser and host galaxy properties to those of its radio continuum emission.
Eighty-seven percent (21 out of 24) galaxies in our sample show 33 GHz radio
continuum emission at levels of 4.5-240 . Five sources show extended
emission, including one source with two main components and one with three main
components. The remaining detected 16 sources exhibit compact cores within the
sensitivity limits. Little evidence is found for extended jets (>300 pc) in
most sources. Either they do not exist, or our chosen frequency of 33 GHz is
too high for a detection of these supposedly steep spectrum features. In only
one source among those with known maser disk orientation, NGC4388, we found an
extended jet-like feature that appears to be oriented perpendicular to the
water megamaser disk. Smaller 100-300 pc sized jets might also be present, as
is suggested by the beam-deconvolved morphology of our sources. Whenever
possible, central positions with accuracies of 20-280 mas are provided. A
correlation analysis shows that the 33 GHz luminosity weakly correlates with
the infrared luminosity. The 33 GHz luminosity is anticorrelated with the
circular velocity of the galaxy. The black hole masses show stronger
correlations with water maser luminosity than with 1.4 GHz, 33 GHz, or hard
X-ray luminosities. Furthermore, the inner radii of the disks show stronger
correlations with 1.4 GHz, 33 GHz, and hard X-ray luminosities than their outer
radii, suggesting that the outer radii may be affected by disk warping, star
formation, or peculiar density distributions.Comment: 18 pages, 10 figures, Accepted for publication in A&
The Megamaser Cosmology Project. III. Accurate Masses of Seven Supermassive Black Holes in Active Galaxies with Circumnuclear Megamaser Disks
Observations of HO masers from circumnuclear disks in active galaxies for
the Megamaser Cosmology Project allow accurate measurement of the mass of
supermassive black holes (BH) in these galaxies. We present the Very Long
Baseline Interferometry (VLBI) images and kinematics of water maser emission in
six active galaxies: NGC~1194, NGC~2273, NGC~2960 (Mrk~1419), NGC~4388,
NGC~6264 and NGC~6323. We use the Keplerian rotation curves of these six
megamaser galaxies, plus a seventh previously published, to determine accurate
enclosed masses within the central pc of these galaxies, smaller than
the radius of the sphere of influence of the central mass in all cases. We also
set lower limits to the central mass densities of between 0.12 and 60 ~pc. For six of the seven disks, the high central
densities rule out clusters of stars or stellar remnants as the central
objects, and this result further supports our assumption that the enclosed mass
can be attributed predominantly to a supermassive black hole. The seven BHs
have masses ranging between 0.76 and 6.510. The BH mass
errors are \%, dominated by the uncertainty of the Hubble constant.
We compare the megamaser BH mass determination with other BH mass measurement
techniques. The BH mass based on virial estimation in four galaxies is
consistent with the megamaser BH mass given the latest empirical value of
, but the virial mass uncertainty is much greater. MCP
observations continue and we expect to obtain more maser BH masses in the
future.Comment: 18 pages, 4 figures. This paper has been submitted to ApJ. An updated
version of this paper will be posted when it gets accepte
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the most well-known application of quantum
cryptography. Previous proposed proofs of security of quantum key distribution
contain various technical subtleties. Here, a conceptually simpler proof of
security of quantum key distribution is presented. The new insight is the
invariance of the error rate of a teleportation channel: We show that the error
rate of a teleportation channel is independent of the signals being
transmitted. This is because the non-trivial error patterns are permuted under
teleportation. This new insight is combined with the recently proposed quantum
to classical reduction theorem. Our result shows that assuming that Alice and
Bob have fault-tolerant quantum computers, quantum key distribution can be made
unconditionally secure over arbitrarily long distances even against the most
general type of eavesdropping attacks and in the presence of all types of
noises.Comment: 13 pages, extended abstract. Comments will be appreciate
Quantum models related to fouled Hamiltonians of the harmonic oscillator
We study a pair of canonoid (fouled) Hamiltonians of the harmonic oscillator
which provide, at the classical level, the same equation of motion as the
conventional Hamiltonian. These Hamiltonians, say and , result
to be explicitly time-dependent and can be expressed as a formal rotation of
two cubic polynomial functions, and , of the canonical variables
(q,p).
We investigate the role of these fouled Hamiltonians at the quantum level.
Adopting a canonical quantization procedure, we construct some quantum models
and analyze the related eigenvalue equations. One of these models is described
by a Hamiltonian admitting infinite self-adjoint extensions, each of them has a
discrete spectrum on the real line. A self-adjoint extension is fixed by
choosing the spectral parameter of the associated eigenvalue
equation equal to zero. The spectral problem is discussed in the context of
three different representations. For , the eigenvalue equation is
exactly solved in all these representations, in which square-integrable
solutions are explicity found. A set of constants of motion corresponding to
these quantum models is also obtained. Furthermore, the algebraic structure
underlying the quantum models is explored. This turns out to be a nonlinear
(quadratic) algebra, which could be applied for the determination of
approximate solutions to the eigenvalue equations.Comment: 24 pages, no figures, accepted for publication on JM
Modeling the interrelating effects of plastic deformation and stress on magnetic properties of materials
A model has been developed that describes the interrelating effects of plastic deformation and applied stress on hysteresis loops based on the theory of ferromagnetichysteresis. In the current model the strength of pinning sites for domain walls is characterized by the pinning coefficient keff given by keff=k0+kâČÏ. The term k0 depicts pinning of domain walls by dislocations and is proportional to Ïn, where Ï is the number density of dislocation which is related to the amount of plastic strain, and the exponent n depends on the strength of pinning sites. The second term kâČÏââ3/2λs/2mÏ, where m is magnetization and λs is magnetostriction constant, describes the changes in pinning strength on a domain wall induced by an applied stress Ï. The model was capable of reproducing the stress dependence of hysteresis loop properties such as coercivity and remanence of a series of nickel samples which were pre-strained to various plastic strain levels. An empirical relation was found between the parameter k0 and the plastic strain, which can be interpreted in terms of the effects on the strength of domain wall pinning of changes in dislocation density and substructure under plastic deformation
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for
quantum key distribution. We first give a key distribution protocol based on
entanglement purification, which can be proven secure using methods from Lo and
Chau's proof of security for a similar protocol. We then show that the security
of this protocol implies the security of BB84. The entanglement-purification
based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these
codes are used to remove the use of quantum computation from the Lo-Chau
protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially
improving the performance of quantum key distribution. Here, we present a
general theory of the decoy state protocol based on only two decoy states and
one signal state. We perform optimization on the choice of intensities of the
two decoy states and the signal state. Our result shows that a decoy state
protocol with only two types of decoy states--the vacuum and a weak decoy
state--asymptotically approaches the theoretical limit of the most general type
of decoy state protocols (with an infinite number of decoy states). We also
present a one-decoy-state protocol. Moreover, we provide estimations on the
effects of statistical fluctuations and suggest that, even for long distance
(larger than 100km) QKD, our two-decoy-state protocol can be implemented with
only a few hours of experimental data. In conclusion, decoy state quantum key
distribution is highly practical.Comment: 31 pages. 6 figures. Preprint forma
- âŠ