18,350 research outputs found

    Dynamic Failure in Amorphous Solids via a Cavitation Instability

    Full text link
    The understanding of dynamic failure in amorphous materials via the propagation of free boundaries like cracks and voids must go beyond elasticity theory, since plasticity intervenes in a crucial and poorly understood manner near the moving free boundary. In this Letter we focus on failure via a cavitation instability in a radially-symmetric stressed material, set up the free boundary dynamics taking both elasticity and visco-plasticity into account, using the recently proposed athermal Shear Transformation Zone theory. We demonstrate the existence (in amorphous systems) of fast cavitation modes accompanied by extensive plastic deformations and discuss the revealed physics.Comment: 4 pages, 4 figure

    Bogoliubov transformations and exact isolated solutions for simple non-adiabatic Hamiltonians

    Get PDF
    We present a new method for finding isolated exact solutions of a class of non-adiabatic Hamiltonians of relevance to quantum optics and allied areas. Central to our approach is the use of Bogoliubov transformations of the bosonic fields in the models. We demonstrate the simplicity and efficiency of this method by applying it to the Rabi Hamiltonian.Comment: LaTeX, 16 pages, 1 figure. Minor additions and journal re

    Implementation of two-party protocols in the noisy-storage model

    Get PDF
    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guideline

    Optical properties of V2O3 in its whole phase diagram

    Get PDF
    Vanadium sesquioxide V2O3 is considered a textbook example of Mott-Hubbard physics. In this paper we present an extended optical study of its whole temperature/doping phase diagram as obtained by doping the pure material with M=Cr or Ti atoms (V1-xMx)2O3. We reveal that its thermodynamically stable metallic and insulating phases, although macroscopically equivalent, show very different low-energy electrodynamics. The Cr and Ti doping drastically change both the antiferromagnetic gap and the paramagnetic metallic properties. A slight chromium content induces a mesoscopic electronic phase separation, while the pure compound is characterized by short-lived quasiparticles at high temperature. This study thus provides a new comprehensive scenario of the Mott-Hubbard physics in the prototype compound V2O3

    Distorted HI Gas in the Widely Separated LIRG Arp 256

    Get PDF
    We present new interferometric HI and CO (1-0) observations of the luminous infrared source, Arp 256. Arp 256 consists of two spiral galaxies in an early stage of merging, with a projected nuclear separation of 29 kpc (54") and an infrared luminosity of 2.0E11 L_sun. Despite the large separation of the galaxies' nuclei and mildly disrupted stellar components, the HI disks are found to be strongly disrupted, and the southern galaxy in Arp 256 shows an elevated star formation efficiency, which is consistent with a nuclear starburst. Both of these results run contrary to expectations, posing interesting questions on the physical mechanisms involved in stimulating star formation during an interaction.Comment: 19 pages, 7 figures. Accepted for publication in AJ. Author added. Full resolution figures available at http://astro.uchicago.edu/home/web/jchen/arp25

    A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution

    Full text link
    We discuss excess noise contributions of a practical balanced homodyne detector in Gaussian-modulated coherent-state (GMCS) quantum key distribution (QKD). We point out the key generated from the original realistic model of GMCS QKD may not be secure. In our refined realistic model, we take into account excess noise due to the finite bandwidth of the homodyne detector and the fluctuation of the local oscillator. A high speed balanced homodyne detector suitable for GMCS QKD in the telecommunication wavelength region is built and experimentally tested. The 3dB bandwidth of the balanced homodyne detector is found to be 104MHz and its electronic noise level is 13dB below the shot noise at a local oscillator level of 8.5*10^8 photon per pulse. The secure key rate of a GMCS QKD experiment with this homodyne detector is expected to reach Mbits/s over a few kilometers.Comment: 22 pages, 11 figure

    An importance sampling algorithm for generating exact eigenstates of the nuclear Hamiltonian

    Full text link
    We endow a recently devised algorithm for generating exact eigensolutions of large matrices with an importance sampling, which is in control of the extent and accuracy of the truncation of their dimensions. We made several tests on typical nuclei using a correlated basis obtained from partitioning the shell model space. The sampling so implemented allows not only for a substantial reduction of the shell model space but also for an extrapolation to exact eigenvalues and E2 strengths.Comment: A compressed file composed of a text in latex of 19 pages and 9 figures in p

    Oncological safety of stromal vascular fraction enriched fat grafting in two-stage breast reconstruction after nipple sparing mastectomy: long-term results of a prospective study

    Get PDF
    OBJECTIVE: Autologous fat transfer (AFT) is commonly used to treat implant palpability and prevent fibrosis and thinning in mastectomy skin flaps. A major limit to this procedure is volume retention over time, leading to the introduction of fat enrichment with stromal vascular fraction (SVF+AFT). Oncological concerns have been raised over the injection of an increased concentration of progenitors cells (ASCs) in the SVF. The aim of the study is to evaluate the long-term cancer recurrence risk of SVF+AFT cases compared to AFT, in patients undergoing Nipple Sparing Mastectomy (NSM). PATIENTS AND METHODS: A prospective study was designed to compare three groups of patients undergoing NSM followed by SVF+AFT, AFT or none (control group), after a two-stage breast reconstruction. Patients were strictly followed-up for at least 5-years from the second stage reconstructive procedure. Loco-regional and systemic recurrence rate were evaluated over time as the primary outcome. Logistic regression was used to investigate which factors were associated with recurrence events and independent variables of interest were: surgical technique, age above 50 years old, lympho-vascular invasion, oncological stage, adjuvant or neoadjuvant chemotherapy, adjuvant radiotherapy and adjuvant hormone therapy. RESULTS: 41 women were included in G1 (SVF+AFT), 64 in G2 (AFT), and 64 in G3 (control group). Loco-regional recurrence rate was 2.4% for G1, 4.7% for G2, and 1.6% for G3. Systemic recurrence was 7.3%, 3.1%, and 3.1%, respectively. Among the variables included, there were no significant risk factors influencing a recurrence event, either loco-regional or systemic. In particular, SVF+AFT (G1) did not increase the oncological recurrence. CONCLUSIONS: Our data suggest that both centrifuged and SVF-enhanced fat transfer have a similar safety level in comparison to patients who did not undergo fat grafting in breast reconstruction after NSM

    Security bound of two-bases quantum key-distribution protocols using qudits

    Full text link
    We investigate the security bounds of quantum cryptographic protocols using dd-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.Comment: 12 pages, 2 figures, to appear in Phys. Rev.
    corecore