480 research outputs found

    Multiparticle entanglement purification for graph states

    Full text link
    We introduce a class of multiparticle entanglement purification protocols that allow us to distill a large class of entangled states. These include cluster states, GHZ states and various error correction codes all of which belong to the class of two-colorable graph states. We analyze these schemes under realistic conditions and observe that they are scalable, i.e. the threshold value for imperfect local operations does not depend on the number of parties for many of these states. When compared to schemes based on bipartite entanglement purification, the protocol is more efficient and the achievable quality of the purified states is larger. As an application we discuss an experimental realization of the protocol in optical lattices which allows one to purify cluster states.Comment: 4 pages, 2 figures; V2: some typos corrected; V3: published versio

    Multiparticle entanglement purification for two-colorable graph states

    Full text link
    We investigate multiparticle entanglement purification schemes which allow one to purify all two colorable graph states, a class of states which includes e.g. cluster states, GHZ states and codewords of various error correction codes. The schemes include both recurrence protocols and hashing protocols. We analyze these schemes under realistic conditions and observe for a generic error model that the threshold value for imperfect local operations depends on the structure of the corresponding interaction graph, but is otherwise independent of the number of parties. The qualitative behavior can be understood from an analytically solvable model which deals only with a restricted class of errors. We compare direct multiparticle entanglement purification protocols with schemes based on bipartite entanglement purification and show that the direct multiparticle entanglement purification is more efficient and the achievable fidelity of the purified states is larger. We also show that the purification protocol allows one to produce private entanglement, an important aspect when using the produced entangled states for secure applications. Finally we discuss an experimental realization of a multiparty purification protocol in optical lattices which is issued to improve the fidelity of cluster states created in such systems.Comment: 22 pages, 8 figures; replaced with published versio

    Foundation Rehabilitation of Bridge over Danube: the Role of Pile Integrity Testing

    Get PDF
    The construction of the bridge near Pöchlarn over Danube, in Austria was begun 1998 and completed in 2002. The four middle piers of the bridge consist of sink caissons made of pre-cast reinforced concrete elements. Each caisson is founded on 18 bored piles of 1.2 m diameter. In a first step, two pilot piles of about 40 m length are installed for each caisson. After the pilot piles were completed, an accident happened in April 1999. A cargo ship collided with the pier no 3 and damaged the two pilot piles. Since the piles were below water level, it was very difficult to inspect the damage. Therefore, integrity tests were carried out to know the level of damage. The possible scenarios range from local repair to installation of new pilot piles. The paper describes a case study of the repair works of the damaged piles, where under water pile integrity tests were carried out

    Implications of survey methods on travel and non-travel activities: A comparison of the Austrian national travel survey and an innovative mobility-activity-expenditure diary (MAED)

    Get PDF
    This paper contributes to the research on non-reporting effects in mixed-method household travel surveys (HTS) in two ways: Firstly, we compare travel activities reported in the established Austrian National HTS (ANTS) with an innovative survey approach, the so-called “MobilityActivity-Expenditure Diary” (MAED), and secondly we extend the analysis to (i) additional travel estimates and to (ii) non-travel activities. The analysis addresses three main goals: (i) identification of non-reporting effects in the HTS for travel estimates, (ii) analysis of speed-ofresponse effects on travel estimates, (iii) assessment of the completeness and accuracy of nontravel activities inferred from the trip purposes in the HTS. Underreporting in HTS occurs both on person level and on the trip level, and mainly for peak-hour trips with either short distances or short durations of the subsequent non-travel activity. No significant underreporting was found on the tour level. Speed-of-response effects are small in both surveys but significant for the ANTS. The duration of non-travel activities per activity type corresponds well in the MAEDsurvey and in the ANTS but the information in the MAED-survey is much richer. The results can be used threefold: (i) to develop correction factors that account for systematic biases in HTS, (ii) to identify omitted items (trip frequency, duration, distance etc.) if HTS data are used without correction factors, and (iii) to demonstrate the importance of high quality field work and validation

    A joint time-assignment and expenditure-allocation model: value of leisure and value of time assigned to travel for specific population segments

    Get PDF
    Based on a time-use model with a sound theoretical basis and carefully collected data for Austria, the value of leisure (VoL) for different population segments has been estimated. Through the combination of these results with mode-specific values of travel time savings from a related study based on the same data, the first mode-specific values of time assigned to travel (VTAT) were calculated. Data was collected using a Mobility-Activity-Expenditure Diary, a novel survey format which gathers all activities, expenditures, and travel decisions from the same individuals for 1 week in a diary-based format. The average VoL is 8.17 Euro/h, which is below the mean wage of 12.14 Euro/h, indicating that the value of work is, on average, negative. Regarding the reliability of the VoL, we show its sensitivity to the variance of working time in a sample, something that has been ignored in previous studies and could be used to avoid inadequate segmentation. We controlled this effect in the analysis of the heterogeneity of the VoL across the population by estimating the parameters from the total (unsegmented) dataset with single interaction terms. We find that the VTAT is strictly negative for walking, predominantly negative for cycling and car, and predominantly positive for public transport with 0.27 Euro/h on average. The positive VTAT for public transport is a strong indication for the importance of travel conditions, in turn suggesting that improvements in travel conditions of public transport might be as important as investing in shorter travel times

    Haldane, Large-D and Intermediate-D States in an S=2 Quantum Spin Chain with On-Site and XXZ Anisotropies

    Full text link
    Using mainly numerical methods, we investigate the ground-state phase diagram of the S=2 quantum spin chain described by H=j(SjxSj+1x+SjySj+1y+ΔSjzSj+1z)+Dj(Sjz)2H = \sum_j (S_j^x S_{j+1}^x + S_j^y S_{j+1}^y + \Delta S_j^z S_{j+1}^z) + D \sum_j (S_j^z)^2, where Δ\Delta denotes the XXZXXZ anisotropy parameter of the nearest-neighbor interactions and DD the on-site anisotropy parameter. We restrict ourselves to the case with Δ0\Delta \ge 0 and D0D \ge 0 for simplicity. Each of the phase boundary lines is determined by the level spectroscopy or the phenomenological renormalization analysis of numerical results of exact-diagonalization calculations. The resulting phase diagram on the Δ\Delta-DD plane consists of four phases; the XY 1 phase, the Haldane/large-DD phase, the intermediate-DD phase and the N\'eel phase. The remarkable natures of the phase diagram are: (1) the Haldane state and the large-DD state belong to the same phase; (2) there exists the intermediate-DD phase which was predicted by Oshikawa in 1992; (3) the shape of the phase diagram on the Δ\Delta-DD plane is different from that believed so far. We note that this is the first report of the observation of the intermediate-DD phase

    Advanced continuous-discrete model for joint time-use expenditure and mode choice estimation

    Get PDF
    This paper presents the joint time use, expenditure and mode choice model, based on the theoretical Framework of Jara-Díazand Gueva (2003), for the first time estimated in Panel Setting while using Survey edexpenditure data. This extended estimation takes into account multiple trips per individual, as well as mode availability. The model was es-timated using the novel dataset gathered in Austria in 2015. It includes individual-specific Information on time-use, expenditures and mode choice. As a result, we calculate the value of leisure (VoL), travel time savings (VTTS) and time as signed to travel (VTAT), that are rel-evant inputs to appraisals of transport policies. We also show that, at least fort he Austrian working population, the omission of expenditures in the model might result in a significant overestimation of the value of leisure (16.83%); the VoL (9.29€/h) was estimated to be considerably lower than the wage rate (12.14€/h) and the VTTS varies strongly between the modes (9.98€/h for car, 3.91€/h for public transport, 9.25€/h for bike and 17.53€/h for walk). The joint estimation framework produced positive estimates of VTAT (5.38€/h) only for public transport, reflecting the favorable public transport conditions in Austria

    The central nervous system of sea cucumbers (Echinodermata: Holothuroidea) shows positive immunostaining for a chordate glial secretion

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Echinoderms and chordates belong to the same monophyletic taxon, the Deuterostomia. In spite of significant differences in body plan organization, the two phyla may share more common traits than was thought previously. Of particular interest are the common features in the organization of the central nervous system. The present study employs two polyclonal antisera raised against bovine Reissner's substance (RS), a secretory product produced by glial cells of the subcomissural organ, to study RS-like immunoreactivity in the central nervous system of sea cucumbers.</p> <p>Results</p> <p>In the ectoneural division of the nervous system, both antisera recognize the content of secretory vacuoles in the apical cytoplasm of the radial glia-like cells of the neuroepithelium and in the flattened glial cells of the non-neural epineural roof epithelium. The secreted immunopositive material seems to form a thin layer covering the cell apices. There is no accumulation of the immunoreactive material on the apical surface of the hyponeural neuroepithelium or the hyponeural roof epithelium. Besides labelling the supporting cells and flattened glial cells of the epineural roof epithelium, both anti-RS antisera reveal a previously unknown putative glial cell type within the neural parenchyma of the holothurian nervous system.</p> <p>Conclusion</p> <p>Our results show that: a) the glial cells of the holothurian tubular nervous system produce a material similar to Reissner's substance known to be synthesized by secretory glial cells in all chordates studied so far; b) the nervous system of sea cucumbers shows a previously unrealized complexity of glial organization. Our findings also provide significant clues for interpretation of the evolution of the nervous system in the Deuterostomia. It is suggested that echinoderms and chordates might have inherited the RS-producing radial glial cell type from the central nervous system of their common ancestor, i.e., the last common ancestor of all the Deuterostomia.</p

    Quantum Communication and Decoherence

    Get PDF
    In this contribution we will give a brief overview on the methods used to overcome decoherence in quantum communication protocols. We give an introduction to quantum error correction, entanglement purification and quantum cryptography. It is shown that entanglement purification can be used to create ``private entanglement'', which makes it a useful tool for cryptographic protocols.Comment: 31 pages, 10 figures, LaTeX, book chapter to appear in ``Coherent Evolution in Noisy Environments'', Lecture Notes in Physics, (Springer Verlag, Berlin-Heidelberg-New York). Minor typos correcte

    A security proof of quantum cryptography based entirely on entanglement purification

    Get PDF
    We give a proof that entanglement purification, even with noisy apparatus, is sufficient to disentangle an eavesdropper (Eve) from the communication channel. In the security regime, the purification process factorises the overall initial state into a tensor-product state of Alice and Bob, on one side, and Eve on the other side, thus establishing a completely private, albeit noisy, quantum communication channel between Alice and Bob. The security regime is found to coincide for all practical purposes with the purification regime of a two-way recurrence protocol. This makes two-way entanglement purification protocols, which constitute an important element in the quantum repeater, an efficient tool for secure long-distance quantum cryptography.Comment: Follow-up paper to quant-ph/0108060, submitted to PRA; 24 pages, revex
    corecore