671 research outputs found
Dynamical CPA approach to an itinerant fermionic spin glass model
We study a fermionic version of the Sherrington-Kirkpatrick model including
nearest-neighbor hopping on a -dimensional simple cubic lattices. The
problem is reduced to one of free fermions moving in a dynamical effective
random medium. By means of a CPA method we derive a set of self-consistency
equations for the spin glass order parameter and for the Fourier components of
the local spin susceptibility. In order to solve these equations numerically we
employ an approximation scheme which restricts the dynamics to a feasible
number of the leading Fourier components. From a sequence of systematically
improved dynamical approximations we estimate the location of the quantum
critical point.Comment: 9 pages, 6 figures, revised versio
Dynamical solutions of a quantum Heisenberg spin glass model
We consider quantum-dynamical phenomena in the ,
infinite-range quantum Heisenberg spin glass. For a fermionic generalization of
the model we formulate generic dynamical self-consistency equations. Using the
Popov-Fedotov trick to eliminate contributions of the non-magnetic fermionic
states we study in particular the isotropic model variant on the spin space.
Two complementary approximation schemes are applied: one restricts the quantum
spin dynamics to a manageable number of Matsubara frequencies while the other
employs an expansion in terms of the dynamical local spin susceptibility. We
accurately determine the critical temperature of the spin glass to
paramagnet transition. We find that the dynamical correlations cause an
increase of by 2% compared to the result obtained in the spin-static
approximation. The specific heat exhibits a pronounced cusp at .
Contradictory to other reports we do not observe a maximum in the -curve
above .Comment: 8 pages, 7 figure
Finite key analysis for symmetric attacks in quantum key distribution
We introduce a constructive method to calculate the achievable secret key
rate for a generic class of quantum key distribution protocols, when only a
finite number n of signals is given. Our approach is applicable to all
scenarios in which the quantum state shared by Alice and Bob is known. In
particular, we consider the six state protocol with symmetric eavesdropping
attacks, and show that for a small number of signals, i.e. below the order of
10^4, the finite key rate differs significantly from the asymptotic value for n
approaching infinity. However, for larger n, a good approximation of the
asymptotic value is found. We also study secret key rates for protocols using
higher-dimensional quantum systems.Comment: 9 pages, 5 figure
Optimal estimation of multiple phases
We study the issue of simultaneous estimation of several phase shifts induced
by commuting operators on a quantum state. We derive the optimal positive
operator-valued measure corresponding to the multiple-phase estimation. In
particular, we discuss the explicit case of the optimal detection of double
phase for a system of identical qutrits and generalise these results to optimal
multiple phase detection for d-dimensional quantum states.Comment: 6 page
Assessments of Composite and Discrete Sampling Approaches for Water Quality Monitoring
peer-reviewedAchieving an operational compromise between spatial coverage and temporal resolution in national scale river water quality monitoring is a major challenge for regulatory authorities, particularly where chemical concentrations are hydrologically dependent. The efficacy of flow-weighted composite sampling (FWCS) approaches for total phosphorus (TP) sampling (n = 26–52 analysed samples per year), previously applied in monitoring programmes in Norway, Sweden and Denmark, and which account for low to high flow discharges, was assessed by repeated simulated sampling on high resolution TP data. These data were collected in three research catchments in Ireland over the period 2010–13 covering a base-flow index range of 0.38 to 0.69. Comparisons of load estimates were also made with discrete (set time interval) daily and sub-daily sampling approaches (n = 365 to >1200 analysed samples per year). For all years and all sites a proxy of the Norwegian sampling approach, which is based on re-forecasting discharge for each 2-week deployment, proved most stable (median TP load estimates of 87–98%). Danish and Swedish approaches, using long-term flow records to set a flow constant, were only slightly less effective (median load estimates of 64–102% and 80–96%, respectively). Though TP load estimates over repeated iterations were more accurate using the discrete approaches, particularly the 24/7 approach (one sample every 7 h in a 24 bottle sampler - median % load estimates of 93–100%), composite load estimates were more stable, due to the integration of multiple small samples (n = 100–588) over a deployment
Finite-precision measurement does not nullify the Kochen-Specker theorem
It is proven that any hidden variable theory of the type proposed by Meyer
[Phys. Rev. Lett. {\bf 83}, 3751 (1999)], Kent [{\em ibid.} {\bf 83}, 3755
(1999)], and Clifton and Kent [Proc. R. Soc. London, Ser. A {\bf 456}, 2101
(2000)] leads to experimentally testable predictions that are in contradiction
with those of quantum mechanics. Therefore, it is argued that the existence of
dense Kochen-Specker-colorable sets must not be interpreted as a nullification
of the physical impact of the Kochen-Specker theorem once the finite precision
of real measurements is taken into account.Comment: REVTeX4, 5 page
Energy Spectrum Evolution of a Diffuse Field in Elastic Body Caused by Weak Nonlinearity
We study the evolution of diffuse elastodynamic spectral energy density under
the influence of weak nonlinearity. It is shown that the rate of change of this
quantity is given by a convolution of the linear energy at two frequencies.
Quantitative estimates are given for sample aluminum and fused silica blocks of
experimental interest.Comment: 9 pages, 3 figures; revised for better presentatio
Optimal eavesdropping in cryptography with three-dimensional quantum states
We study optimal eavesdropping in quantum cryptography with three-dimensional
systems, and show that this scheme is more secure than protocols using
two-dimensional states. We generalize the according eavesdropping
transformation to arbitrary dimensions, and discuss the connection with optimal
quantum cloning.Comment: 4 pages, 2 figure
Triggered qutrits for Quantum Communication protocols
A general protocol in Quantum Information and Communication relies in the
ability of producing, transmitting and reconstructing, in general, qunits. In
this letter we show for the first time the experimental implementation of these
three basic steps on a pure state in a three dimensional space, by means of the
orbital angular momentum of the photons. The reconstruction of the qutrit is
performed with tomographic techniques and a Maximum-Likelihood estimation
method. In this way we also demonstrate that we can perform any transformation
in the three dimensional space
Black Hole--Scalar Field Interactions in Spherical Symmetry
We examine the interactions of a black hole with a massless scalar field
using a coordinate system which extends ingoing Eddington-Finkelstein
coordinates to dynamic spherically symmetric-spacetimes. We avoid problems with
the singularity by excising the region of the black hole interior to the
apparent horizon. We use a second-order finite difference scheme to solve the
equations. The resulting program is stable and convergent and will run forever
without problems. We are able to observe quasi-normal ringing and power-law
tails as well an interesting nonlinear feature.Comment: 16 pages, 26 figures, RevTex, to appear in Phys. Rev.
- …