3,369 research outputs found

    Three-dimensional formation flying using bifurcating potential fields

    Get PDF
    This paper describes the design of a three-dimensional formation flying guidance and control algorithm for a swarm of autonomous Unmanned Aerial Vehicles (UAVs), using the new approach of bifurcating artificial potential fields. We consider a decentralized control methodology that can create verifiable swarming patterns, which guarantee obstacle and vehicle collision avoidance. Based on a steering and repulsive potential field the algorithm supports flight that can transition between different formation patterns by way of a simple parameter change. The algorithm is applied to linear longitudinal and lateral models of a UAV. An experimental system to demonstrate formation flying is also developed to verify the validity of the proposed control system

    Entanglement via Barut-Girardello coherent state for suq(1,1)su_{q}(1, 1) quantum algebra: bipartite composite system

    Full text link
    Using noncocommutative coproduct properties of the quantum algebras, we introduce and obtain, in a bipartite composite system, the Barut-Girardello coherent state for the q-deformed suq(1,1)su_{q}(1,1) algebra. The quantum coproduct structure ensures this normalizable coherent state to be entangled. The entanglement disappears in the classical q→1q \to 1 limit, giving rise to a factorizable state.Comment: 12 page

    A deterministic cavity-QED source of polarization entangled photon pairs

    Get PDF
    We present two cavity quantum electrodynamics proposals that, sharing the same basic elements, allow for the deterministic generation of entangled photons pairs by means of a three-level atom successively coupled to two single longitudinal mode high-Q optical resonators presenting polarization degeneracy. In the faster proposal, the three-level atom yields a polarization entangled photon pair via two truncated Rabi oscillations, whereas in the adiabatic proposal a counterintuitive Stimulated Raman Adiabatic Passage process is considered. Although slower than the former process, this second method is very efficient and robust under fluctuations of the experimental parameters and, particularly interesting, almost completely insensitive to atomic decay.Comment: 5 pages, 5 figure

    Quantum correlations from local amplitudes and the resolution of the Einstein-Podolsky-Rosen nonlocality puzzle

    Get PDF
    The Einstein-Podolsky-Rosen nonlocality puzzle has been recognized as one of the most important unresolved issues in the foundational aspects of quantum mechanics. We show that the problem is resolved if the quantum correlations are calculated directly from local quantities which preserve the phase information in the quantum system. We assume strict locality for the probability amplitudes instead of local realism for the outcomes, and calculate an amplitude correlation function.Then the experimentally observed correlation of outcomes is calculated from the square of the amplitude correlation function. Locality of amplitudes implies that the measurement on one particle does not collapse the companion particle to a definite state. Apart from resolving the EPR puzzle, this approach shows that the physical interpretation of apparently `nonlocal' effects like quantum teleportation and entanglement swapping are different from what is usually assumed. Bell type measurements do not change distant states. Yet the correlations are correctly reproduced, when measured, if complex probability amplitudes are treated as the basic local quantities. As examples we discuss the quantum correlations of two-particle maximally entangled states and the three-particle GHZ entangled state.Comment: Std. Latex, 11 pages, 1 table. Prepared for presentation at the International Conference on Quantum Optics, ICQO'2000, Minsk, Belaru

    Using of small-scale quantum computers in cryptography with many-qubit entangled states

    Full text link
    We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum channel to the addressee, who applies a quantum computer tuned to realize the inverse unitary transformation decoding of the message. Different ways of eavesdropping are considered, and an estimate of the time needed for determining the secret unitary transformation is given. It is shown that using even small quantum computers can serve as a basis for very efficient cryptographic protocols. For a suggested cryptographic protocol, the time scale on which communication can be considered secure is exponential in the number of qubits in the entangled states and in the number of gates used to construct the quantum network

    Understanding the link between trafficking in persons and HIV and AIDS risk in Tanzania

    Get PDF
    The magnitude of trafficking in persons in Tanzania is unknown. Consequently, available information on health risks of persons trafficked for different forms of exploitation is extremely scanty. We conducted a baseline study in eight administrative regions of Tanzania using both qualitative and quantitative methods to generate data on the health conditions of trafficked persons to inform trafficking in persons control measures through HIV and AIDS interventions. Study participants included the national, regional and district community development officers, district medical officers, local government leaders, managers or representatives of non-governmental organizations involved in anti-trafficking in persons activities, members of the community and victims. Findings indicated that common forms of labour into which persons are trafficked include domestic services, agriculture (farming), construction, mining/quarrying, fishing, lumbering and manufacturing. Trafficked persons are reported to be exposed to risks like overcrowding, long working hours, psychological problems, physical injuries, impotence, breathing problems and sexually transmitted infections including HIV. It is concluded that the reported occupational hazards in industries where trafficked persons are forced into are not specific to trafficked persons as they affect all labourers. However, the underground nature of the trafficking in persons process increases health problems and risks, including the vulnerability to HIV infection. More tailored research is needed, especially to find means of how to reach out and provide services to this particular vulnerable population, validate labour forms of exploitation into which persons are trafficked to enable the integration or mainstreaming of HIV and AIDS and trafficking in persons at the policy and programmatic levels. In addition, findings would facilitate the understanding of the link between increased risk of HIV and trafficking in persons

    An mHealth Technology for Chronic Wound Management

    Get PDF
    Increasingly, mobile consumer electronic devices are able to make meaningful applications in healthcare, and this chapter discusses the development of a mHealth app called SmartWoundCare, designed to document and assess chronic wounds on smartphones and tablets. Pressure ulcers (bedsores) were selected as the application area for SmartWoundCare due to their pervasiveness in healthcare and their associated impacts on patients’ quality of life and mortality, and electronic documentation is considered as an important intervention in pressure ulcer prevention and treatment. The chapter reviews the design of SmartWoundCare on Android and iOS platforms. Its benefits over paper‐based charting include automatically generated wound histories in graph and text formats, alerts and notifications for user‐set conditions, wound image galleries, and positioning for telehealth consultation by transmitting wound data across sites. The mobile app was implemented in a user trial in a long‐term care facility in Winnipeg, Canada, and the user trial illuminated that a key benefit of SmartWoundCare was the ability to take wound photographs. This feature had benefits for patients as well as caregivers. Consequently, algorithms were developed to analyse wound images for size and colour to provide additional indicators of wound progression

    Quasiparticle Resonances in the BCS Approach

    Full text link
    We present a simple method for calculating the energies and the widths of quasiparticle resonant states. The method is based on BCS equations solved in the Berggren representation. In this representation the quasiparticle resonances are associated to the Gamow states of the mean field. The method is illustrated for the case of neutron-rich nuclei 20−22^{20-22}O and 84^{84}Ni. It is shown that the contribution of the continuum coupling to the pairing correlations is small and largely dominated by a few resonant states close to the continuum threshold.Comment: 14 pages, 2 figure

    Quantum complexities of ordered searching, sorting, and element distinctness

    Full text link
    We consider the quantum complexities of the following three problems: searching an ordered list, sorting an un-ordered list, and deciding whether the numbers in a list are all distinct. Letting N be the number of elements in the input list, we prove a lower bound of \frac{1}{\pi}(\ln(N)-1) accesses to the list elements for ordered searching, a lower bound of \Omega(N\log{N}) binary comparisons for sorting, and a lower bound of \Omega(\sqrt{N}\log{N}) binary comparisons for element distinctness. The previously best known lower bounds are {1/12}\log_2(N) - O(1) due to Ambainis, \Omega(N), and \Omega(\sqrt{N}), respectively. Our proofs are based on a weighted all-pairs inner product argument. In addition to our lower bound results, we give a quantum algorithm for ordered searching using roughly 0.631 \log_2(N) oracle accesses. Our algorithm uses a quantum routine for traversing through a binary search tree faster than classically, and it is of a nature very different from a faster algorithm due to Farhi, Goldstone, Gutmann, and Sipser.Comment: This new version contains new results. To appear at ICALP '01. Some of the results have previously been presented at QIP '01. This paper subsumes the papers quant-ph/0009091 and quant-ph/000903
    • 

    corecore