5,547 research outputs found

    Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution

    Full text link
    We propose a method to prepare different non-Poissonian signal pulses from sources of Poissonian photon number distribution using only linear optical elements and threshold photon detectors. This method allows a simple passive preparation of decoy states for quantum key distribution. We show that the resulting key rates are comparable to the performance of active choices of intensities of Poissonian signals.Comment: 7 pages, 3 figures, accepted for publication in Opt. Let

    Collapse and revival oscillations as a probe for the tunneling amplitude in an ultra-cold Bose gas

    Full text link
    We present a theoretical study of the quantum corrections to the revival time due to finite tunneling in the collapse and revival of matter wave interference after a quantum quench. We study hard-core bosons in a superlattice potential and the Bose-Hubbard model by means of exact numerical approaches and mean-field theory. We consider systems without and with a trapping potential present. We show that the quantum corrections to the revival time can be used to accurately determine the value of the hopping parameter in experiments with ultracold bosons in optical lattices.Comment: 10 pages, 12 figures, typos in section 3A correcte

    Formació i tecnologies de la traducció

    Get PDF
    Aquest número de la Revista Tradumàtica proposa una reflexió sobre la necessària imbricació entre les tecnologies i la formació de traductors. L’objectiu és presentar punts de vista diferents i sovint complementaris relacionats amb els diversos papers que hi entren en joc: interessa saber el que pensen les persones responsables de la formació i conèixer quines característiques té l’oferta docent, però també convé veure com es situen els estudiants. D’igual manera volem pensar en el futur, sense perdre de vista el present d’un context tan àgil i canviant com el que es descriu aquí.Este número de la Revista Tradumàtica propone una reflexión sobre la necesaria imbricación entre las tecnologías y la formación de traductores. El objetivo es presentar puntos de vista diferentes y a menudo complementarios relacionados con los diversos papeles que entran en juego: interesa saber lo que piensan las personas responsables de la formación y conocer las características de la oferta docente, pero también conviene ver como se sitúan los estudiantes. De igual manera queremos pensar en el futuro, pero sin perder de vista el presente de un contexto tan ágil y cambiante como el que aquí se describe

    Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    Full text link
    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.Comment: 14 pages, 11 figure

    Upper bounds for the secure key rate of decoy state quantum key distribution

    Full text link
    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure

    Comparative effects of macro-sized aluminum oxide and aluminum oxide nanoparticles on erythrocyte hemolysis: influence of cell source, temperature and size

    Get PDF
    Al2O3 is the most abundantly produced nanomaterial and has been used in diverse fields, including the medical, military and industrial sectors. As there are concerns about the health effects of nanoparticles, it is important to understand how they interact with cells, and specifically with red blood cells. The hemolysis induced by three commercial nano-sized aluminum oxide particles (nanopowder 13 nm, nanopowder <50 nm and nanowire 2-6 nm × 200-400 nm) was compared to aluminum oxide and has been studied on erythrocytes from humans, rats and rabbits, in order to elucidate the mechanism of action and the influence of size and shape on hemolytic behavior. The concentrations inducing 50% hemolysis (HC50) were calculated for each compound studied. The most hemolytic aluminum oxide particles were of nanopowder 13, followed by nanowire and nanopowder 50. The addition of albumin to PBS induced a protective effect on hemolysis in all the nano-forms of Al2O3, but not on Al2O3. The drop in HC50 correlated to a decrease in nanomaterial size, which was induced by a reduction of aggregation Aluminum oxide nanoparticles are less hemolytic than other oxide nanoparticles, and behave differently depending on the size and shape of the nanoparticles. The hemolytic behavior of aluminum oxide nanoparticles differs from that of aluminum oxide

    The Problem of Large Leptonic Mixing

    Get PDF
    Unlike in the quark sector where simple S3S_3 permutation symmetries can generate the general features of quark masses and mixings, we find it impossible (under conditions of hierarchy for the charged leptons and without considering the see-saw mechanism or a more elaborate extension of the SM) to guarantee large leptonic mixing angles with any general symmetry or transformation of only known particles. If such symmetries exist, they must be realized in more extended scenarios.Comment: RevTeX, 4 pages, no figure

    Influencia de los modelos intuitivos en la comprensión de la multiplicación y la división

    Get PDF
    Since the stdy by Fischbein et al. (1985) which suggested that children develop intuitive models about multiplication and division early, much research has offered data that corroborate these models. In this study we analyze the differential weight of the models in three kid of task: algorithms, problem solving, and problem posing. We included two age groups (1st of ESO and 8th of EGB), and three kid of quantities (whole numbers, decimals and fractions). The results indicated that the intuitive models did not have the same differential weight for the different tasks. For instance, the problem posing task did not seem suited to the conditions under which the intuitive models act. Likewise, the presence of quantities that failed to observe one or more restrictions of the models did not have a negative influence. In contrast, the errors committed in the two remaining tasks were almost exclusively due to the application of the intuitive rules.A partir del trabajo de Fischbein et al. (1985) que sugiere que los niños construyen tempranamente modelos intuitivos sobre la multiplicación y división, numerosas investigaciones han ofrecido datos consistentes con estos modelos. En este estudio analizamos el peso diferencial de los modelos en tres tipos de tareas: resolver algoritmes, resolver problemas y plantear problemas. Hemos incluido también dos grupos de edad (1º de ESO y 8º de EGB), asi como tres tipos de cantidades (enteros, decimales y fracciones). LoS resultados indicaron que los modelos intuitivos no tuvieron el mismo peso diferencial en las diferentes tareas. Por ejemplo, la tarea de plantear problemas no parecía reunir las condiciones bajo las que actúan los modelos intuitivos. Asimismo, la presencia de cantidades que alteraban una o más imposiciones de los modelos no influyó negativamente. Por el contrario, los errores de las dos tareas restantes se debieron a la aplicación de las reglas intuitivas
    corecore