5,429 research outputs found

    The Origin of Mass

    Full text link
    The quark-lepton mass problem and the ideas of mass protection are reviewed. The hierarchy problem and suggestions for its resolution, including Little Higgs models, are discussed. The Multiple Point Principle is introduced and used within the Standard Model to predict the top quark and Higgs particle masses. Mass matrix ans\"{a}tze are considered; in particular we discuss the lightest family mass generation model, in which all the quark mixing angles are successfully expressed in terms of simple expressions involving quark mass ratios. It is argued that an underlying chiral flavour symmetry is responsible for the hierarchical texture of the fermion mass matrices. The phenomenology of neutrino mass matrices is briefly discussed.Comment: 33 pages, 7 figures, to be published in the Proceedings of the XXXI ITEP Winter School, Moscow, Russia, 18 - 26 February 200

    Submission in Response to the Australian Productivity Commission's Inquiry into IP Arrangements Draft Report

    Full text link
    This Submission by nine intellectual property academics responds to the Draft Report in the Inquiry into IP Arrangements published by the Australian Productivity Commission on 29 April 2016 ('Draft Report'). In broad terms, the submission supports many of the goals of, and recommendations of, the Productivity Commission expressed in the Draft Report, but expresses concerns that some recommendations may not achieve the overall goals of the Commission, or reflect misunderstandings of the statutory framework. The submission addresses many of the Commission's draft recommendations concerning copyright, patents, trade marks and geographical indicators, IP and public institutions, and IP's institutional and governance arrangements

    Experimental realisation of Shor's quantum factoring algorithm using qubit recycling

    Full text link
    Quantum computational algorithms exploit quantum mechanics to solve problems exponentially faster than the best classical algorithms. Shor's quantum algorithm for fast number factoring is a key example and the prime motivator in the international effort to realise a quantum computer. However, due to the substantial resource requirement, to date, there have been only four small-scale demonstrations. Here we address this resource demand and demonstrate a scalable version of Shor's algorithm in which the n qubit control register is replaced by a single qubit that is recycled n times: the total number of qubits is one third of that required in the standard protocol. Encoding the work register in higher-dimensional states, we implement a two-photon compiled algorithm to factor N=21. The algorithmic output is distinguishable from noise, in contrast to previous demonstrations. These results point to larger-scale implementations of Shor's algorithm by harnessing scalable resource reductions applicable to all physical architectures.Comment: 7 pages, 3 figure

    Adding control to arbitrary unknown quantum operations

    Get PDF
    While quantum computers promise significant advantages, the complexity of quantum algorithms remains a major technological obstacle. We have developed and demonstrated an architecture-independent technique that simplifies adding control qubits to arbitrary quantum operations-a requirement in many quantum algorithms, simulations and metrology. The technique is independent of how the operation is done, does not require knowledge of what the operation is, and largely separates the problems of how to implement a quantum operation in the laboratory and how to add a control. We demonstrate an entanglement-based version in a photonic system, realizing a range of different two-qubit gates with high fidelity.Comment: 9 pages, 8 figure

    Death, dying and informatics: misrepresenting religion on MedLine

    Get PDF
    BACKGROUND: The globalization of medical science carries for doctors worldwide a correlative duty to deepen their understanding of patients' cultural contexts and religious backgrounds, in order to satisfy each as a unique individual. To become better informed, practitioners may turn to MedLine, but it is unclear whether the information found there is an accurate representation of culture and religion. To test MedLine's representation of this field, we chose the topic of death and dying in the three major monotheistic religions. METHODS: We searched MedLine using PubMed in order to retrieve and thematically analyze full-length scholarly journal papers or case reports dealing with religious traditions and end-of-life care. Our search consisted of a string of words that included the most common denominations of the three religions, the standard heading terms used by the National Reference Center for Bioethics Literature (NRCBL), and the Medical Subject Headings (MeSH) used by the National Library of Medicine. Eligible articles were limited to English-language papers with an abstract. RESULTS: We found that while a bibliographic search in MedLine on this topic produced instant results and some valuable literature, the aggregate reflected a selection bias. American writers were over-represented given the global prevalence of these religious traditions. Denominationally affiliated authors predominated in representing the Christian traditions. The Islamic tradition was under-represented. CONCLUSION: MedLine's capability to identify the most current, reliable and accurate information about purely scientific topics should not be assumed to be the same case when considering the interface of religion, culture and end-of-life care

    Quantum encryption with certified deletion

    Get PDF
    Given a ciphertext, is it possible to prove the deletion of the underlying plaintext? Since classical ciphertexts can be copied, clearly such a feat is impossible using classical information alone. In stark contrast to this, we show that quantum encodings enable certified deletion. More precisely, we show that it is possible to encrypt classical data into a quantum ciphertext such that the recipient of the ciphertext can produce a classical string which proves to the originator that the recipient has relinquished any chance of recovering the plaintext should the decryption key be revealed. Our scheme is feasible with current quantum technology: the honest parties only require quantum devices for single-qubit preparation and measurements; the scheme is also robust against noise in these devices. Furthermore, we provide an analysis that is suitable in the finite-key regime.Comment: 28 pages, 1 figure. Some technical details modifie
    • …
    corecore