4,004 research outputs found
Complete bond-operator theory of the two-chain spin ladder
The discovery of the almost ideal, two-chain spin-ladder material
(C_5H_12N)_2CuBr_4 has once again focused attention on this most fundamental
problem in low-dimensional quantum magnetism. Within the bond-operator
framework, three qualitative advances are introduced which extend the theory to
all finite temperatures and magnetic fields in the gapped regime. This
systematic description permits quantitative and parameter-free experimental
comparisons, which are presented for the specific heat, and predictions for
thermal renormalization of the triplet magnon excitations.Comment: 12 pages, 10 figure
Tight-binding molecular-dynamics studies of defects and disorder in covalently-bonded materials
Tight-binding (TB) molecular dynamics (MD) has emerged as a powerful method
for investigating the atomic-scale structure of materials --- in particular the
interplay between structural and electronic properties --- bridging the gap
between empirical methods which, while fast and efficient, lack
transferability, and ab initio approaches which, because of excessive
computational workload, suffer from limitations in size and run times. In this
short review article, we examine several recent applications of TBMD in the
area of defects in covalently-bonded semiconductors and the amorphous phases of
these materials.Comment: Invited review article for Comput. Mater. Sci. (38 pages incl. 18
fig.
Moments of the characteristic polynomial in the three ensembles of random matrices
Moments of the characteristic polynomial of a random matrix taken from any of
the three ensembles, orthogonal, unitary or symplectic, are given either as a
determinant or a pfaffian or as a sum of determinants. For gaussian ensembles
comparing the two expressions of the same moment one gets two remarkable
identities, one between an determinant and an
determinant and another between the pfaffian of a anti-symmetric
matrix and a sum of determinants.Comment: tex, 1 file, 15 pages [SPhT-T01/016], published J. Phys. A: Math.
Gen. 34 (2001) 1-1
Amorphous silicon under mechanical shear deformations: shear velocity and temperature effects
Mechanical shear deformations lead, in some cases, to effects similar to
those resulting from ion irradiation. Here we characterize the effects of shear
velocity and temperature on amorphous silicon (\aSi) modelled using classical
molecular dynamics simulations based on the empirical Environment Dependent
Inter-atomic Potential (EDIP). With increasing shear velocity at low
temperature, we find a systematic increase in the internal strain leading to
the rapid appearance of structural defects (5-fold coordinated atoms). The
impacts of externally applied strain can be almost fully compensated by
increasing the temperature, allowing the system to respond more rapidly to the
deformation. In particular, we find opposite power-law relations between the
temperature and the shear velocity and the deformation energy. The spatial
distribution of defects is also found to strongly depend on temperature and
strain velocity. For low temperature or high shear velocity, defects are
concentrated in a few atomic layers near the center of the cell while, with
increasing temperature or decreasing shear velocity, they spread slowly
throughout the full simulation cell. This complex behavior can be related to
the structure of the energy landscape and the existence of a continuous
energy-barrier distribution.Comment: 10 pages, 17 figure
Public health training in Europe. Development of European masters degrees in public health.
BACKGROUND: Changing political and economic relations in Europe mean that there are new challenges for public health and public health training. There have been several attempts to develop training at the master's level in public health which is focused on meeting the new needs. These have failed due to being too inflexible to allow participation by schools of public health. METHODS: A project funded by the European Union involving public health trainers has developed a new approach which allows participating schools to retain their national differences and work within local rules and traditions, but which aims to introduce the European dimension into public health training. This paper reports the conclusions of this project. CONCLUSIONS: A network of schools wishing to develop European Master's degrees is being established and other schools offering good quality programmes will be able to join
Security of two-way quantum key distribution
Quantum key distribution protocols typically make use of a one-way quantum
channel to distribute a shared secret string to two distant users. However,
protocols exploiting a two-way quantum channel have been proposed as an
alternative route to the same goal, with the potential advantage of
outperforming one-way protocols. Here we provide a strategy to prove security
for two-way quantum key distribution protocols against the most general quantum
attack possible by an eavesdropper. We utilize an entropic uncertainty
relation, and only a few assumptions need to be made about the devices used in
the protocol. We also show that a two-way protocol can outperform comparable
one-way protocols.Comment: 10 pages, 5 figure
Assumptions in Quantum Cryptography
Quantum cryptography uses techniques and ideas from physics and computer
science. The combination of these ideas makes the security proofs of quantum
cryptography a complicated task. To prove that a quantum-cryptography protocol
is secure, assumptions are made about the protocol and its devices. If these
assumptions are not justified in an implementation then an eavesdropper may
break the security of the protocol. Therefore, security is crucially dependent
on which assumptions are made and how justified the assumptions are in an
implementation of the protocol.
This thesis is primarily a review that analyzes and clarifies the connection
between the security proofs of quantum-cryptography protocols and their
experimental implementations. In particular, we focus on quantum key
distribution: the task of distributing a secret random key between two parties.
We provide a comprehensive introduction to several concepts: quantum mechanics
using the density operator formalism, quantum cryptography, and quantum key
distribution. We define security for quantum key distribution and outline
several mathematical techniques that can either be used to prove security or
simplify security proofs. In addition, we analyze the assumptions made in
quantum cryptography and how they may or may not be justified in
implementations.
Along with the review, we propose a framework that decomposes
quantum-key-distribution protocols and their assumptions into several classes.
Protocol classes can be used to clarify which proof techniques apply to which
kinds of protocols. Assumption classes can be used to specify which assumptions
are justified in implementations and which could be exploited by an
eavesdropper. Two contributions of the author are discussed: the security
proofs of two two-way quantum-key-distribution protocols and an intuitive proof
of the data-processing inequality.Comment: PhD Thesis, 221 page
Entanglement verification with realistic measurement devices via squashing operations
Many protocols and experiments in quantum information science are described
in terms of simple measurements on qubits. However, in a real implementation,
the exact description is more difficult, and more complicated observables are
used. The question arises whether a claim of entanglement in the simplified
description still holds, if the difference between the realistic and simplified
models is taken into account. We show that a positive entanglement statement
remains valid if a certain positive linear map connecting the two
descriptions--a so-called squashing operation--exists; then lower bounds on the
amount of entanglement are also possible. We apply our results to polarization
measurements of photons using only threshold detectors, and derive procedures
under which multi-photon events can be neglected.Comment: 12 pages, 2 figure
- …