5,250 research outputs found

    Studie ueber die Eisenacher Epistel des Sonntags Misericordias Domini

    Get PDF
    Studie ueber die Eisenacher Epistel des Sonntags Misericordias Domini (Study on the Eisenach Epistle of the Sunday Misericordias Domini

    Progress using generalized lattice Dirac operators to parametrize the Fixed-Point QCD action

    Get PDF
    We report on an ongoing project to parametrize the Fixed-Point Dirac operator for massless quarks, using a very general construction which has arbitrarily many fermion offsets and gauge paths, the complete Clifford algebra and satisfies all required symmetries. Optimizing a specific construction with hypercubic fermion offsets, we present some preliminary results.Comment: Lattice 2000 (Improvement), 9 pages, based on a talk by K.H. and a poster by T.J. References adde

    Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables

    Full text link
    We discuss quantum key distribution protocols using quantum continuous variables. We show that such protocols can be made secure against individual gaussian attacks regardless the transmission of the optical line between Alice and Bob. This is achieved by reversing the reconciliation procedure subsequent to the quantum transmission, that is, using Bob's instead of Alice's data to build the key. Although squeezing or entanglement may be helpful to improve the resistance to noise, they are not required for the protocols to remain secure with high losses. Therefore, these protocols can be implemented very simply by transmitting coherent states and performing homodyne detection. Here, we show that entanglement nevertheless plays a crucial role in the security analysis of coherent state protocols. Every cryptographic protocol based on displaced gaussian states turns out to be equivalent to an entanglement-based protocol, even though no entanglement is actually present. This equivalence even holds in the absence of squeezing, for coherent state protocols. This ``virtual'' entanglement is important to assess the security of these protocols as it provides an upper bound on the mutual information between Alice and Bob if they had used entanglement. The resulting security criteria are compared to the separability criterion for bipartite gaussian variables. It appears that the security thresholds are well within the entanglement region. This supports the idea that coherent state quantum cryptography may be unconditionally secure.Comment: 18 pages, 6 figures. Submitted to QI

    The construction of generalized Dirac operators on the lattice

    Get PDF
    We discuss the steps to construct Dirac operators which have arbitrary fermion offsets, gauge paths, a general structure in Dirac space and satisfy the basic symmetries (gauge symmetry, hermiticity condition, charge conjugation, hypercubic rotations and reflections) on the lattice. We give an extensive set of examples and offer help to add further structures.Comment: 19 pages, latex, maple code attache

    Object Detection and 3D Estimation via an FMCW Radar Using A Fully Convolutional Network

    Full text link
    This paper considers object detection and 3D estimation using an FMCW radar. The state-of-the-art deep learning framework is employed instead of using traditional signal processing. In preparing the radar training data, the ground truth of an object orientation in 3D space is provided by conducting image analysis, of which the images are obtained through a coupled camera to the radar device. To ensure successful training of a fully convolutional network (FCN), we propose a normalization method, which is found to be essential to be applied to the radar signal before feeding into the neural network. The system after proper training is able to first detect the presence of an object in an environment. If it does, the system then further produces an estimation of its 3D position. Experimental results show that the proposed system can be successfully trained and employed for detecting a car and further estimating its 3D position in a noisy environment.Comment: 5 page

    Predigtstudie ueber 1 Tim. 1, 12-17

    Get PDF
    Predigtstudie ueber 1 Tim. 1:12-17 (Sermon study on 1 Tim. 1:12-17

    CVcat: an interactive database on cataclysmic variables

    Full text link
    CVcat is a database that contains published data on cataclysmic variables and related objects. Unlike in the existing online sources, the users are allowed to add data to the catalogue. The concept of an ``open catalogue'' approach is reviewed together with the experience from one year of public usage of CVcat. New concepts to be included in the upcoming AstroCat framework and the next CVcat implementation are presented. CVcat can be found at http://www.cvcat.org.Comment: 5 pages A&A Latex, 4 figures, accepted for publication in A&

    Walking in Step to the Future: Views of Journalism Education by Practitioners and Educators

    Get PDF
    This study, based on an Internet survey of 317 educational administrators, television news executives, newspaper editors and online executives during first quarter 2004, contrasts views about preparation of students for current and future jobs by showing gaps between what employers’ value most in job applicants and what educational programs are providing. Second, it addresses newsroom challenges that are shaping the industry and journalism education
    • …
    corecore