1,751 research outputs found

    Shot noise and conductivity at high bias in bilayer graphene: Signatures of electron-optical phonon coupling

    Get PDF
    We have studied electronic conductivity and shot noise of bilayer graphene (BLG) sheets at high bias voltages and low bath temperature T0=4.2T_0=4.2 K. As a function of bias, we find initially an increase of the differential conductivity, which we attribute to self-heating. At higher bias, the conductivity saturates and even decreases due to backscattering from optical phonons. The electron-phonon interactions are also responsible for the decay of the Fano factor at bias voltages V>0.1V>0.1 V. The high bias electronic temperature has been calculated from shot noise measurements, and it goes up to ∼1200\sim1200 K at V=0.75V=0.75 V. Using the theoretical temperature dependence of BLG conductivity, we extract an effective electron-optical phonon scattering time τe−op\tau_{e-op}. In a 230 nm long BLG sample of mobility μ=3600\mu=3600 cm2^2V−1^{-1}s−1^{-1}, we find that τe−op\tau_{e-op} decreases with increasing voltage and is close to the charged impurity scattering time τimp=60\tau_{imp}=60 fs at V=0.6V=0.6 V.Comment: 7 pages, 7 figures. Extended version of the high bias part of version 1. The low bias part is discussed in arXiv:1102.065

    Reconstruction of the optical potential from scattering data

    Full text link
    We propose a method for reconstruction of the optical potential from scattering data. The algorithm is a two-step procedure. In the first step the real part of the potential is determined analytically via solution of the Marchenko equation. At this point we use a diagonal Pad\'{e} approximant of the corresponding unitary SS-matrix. In the second step the imaginary part of the potential is determined via the phase equation of the variable phase approach. We assume that the real and the imaginary parts of the optical potential are proportional. We use the phase equation to calculate the proportionality coefficient. A numerical algorithm is developed for a single and for coupled partial waves. The developed procedure is applied to analysis of 1S0^{1}S_{0} NNNN, 3SD1^{3}SD_{1} NNNN, P31P31 π−N\pi^{-} N and S01S01 K+NK^{+}N data.Comment: 26 pages, 8 figures, results of nucl-th/0410092 are refined, some new results are presente

    Quantum Key Distribution with High Loss: Toward Global Secure Communication

    Full text link
    We propose a decoy-state method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multi-photon pulses (decoy-states). Then they check the loss of the decoy-states. If the loss of the decoy-states is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate loss of signal multi-photon pulses based on that of decoy-states. This estimation can be done with an assumption that the two losses have similar values, that we justify.Comment: derivation made more detailed, 4 pages, RevTe

    Efficient single-photon emission from electrically driven InP quantum dots epitaxially grown on Si(001)

    Full text link
    The heteroepitaxy of III-V semiconductors on silicon is a promising approach for making silicon a photonic platform for on-chip optical interconnects and quantum optical applications. Monolithic integration of both material systems is a long-time challenge, since different material properties lead to high defect densities in the epitaxial layers. In recent years, nanostructures however have shown to be suitable for successfully realising light emitters on silicon, taking advantage of their geometry. Facet edges and sidewalls can minimise or eliminate the formation of dislocations, and due to the reduced contact area, nanostructures are little affected by dislocation networks. Here we demonstrate the potential of indium phosphide quantum dots as efficient light emitters on CMOS-compatible silicon substrates, with luminescence characteristics comparable to mature devices realised on III-V substrates. For the first time, electrically driven single-photon emission on silicon is presented, meeting the wavelength range of silicon avalanche photo diodes' highest detection efficiency

    Many Roads to Synchrony: Natural Time Scales and Their Algorithms

    Full text link
    We consider two important time scales---the Markov and cryptic orders---that monitor how an observer synchronizes to a finitary stochastic process. We show how to compute these orders exactly and that they are most efficiently calculated from the epsilon-machine, a process's minimal unifilar model. Surprisingly, though the Markov order is a basic concept from stochastic process theory, it is not a probabilistic property of a process. Rather, it is a topological property and, moreover, it is not computable from any finite-state model other than the epsilon-machine. Via an exhaustive survey, we close by demonstrating that infinite Markov and infinite cryptic orders are a dominant feature in the space of finite-memory processes. We draw out the roles played in statistical mechanical spin systems by these two complementary length scales.Comment: 17 pages, 16 figures: http://cse.ucdavis.edu/~cmg/compmech/pubs/kro.htm. Santa Fe Institute Working Paper 10-11-02

    Pulsar Searches with the SKA

    Get PDF
    The Square Kilometre Array will be an amazing instrument for pulsar astronomy. While the full SKA will be sensitive enough to detect all pulsars in the Galaxy visible from Earth, already with SKA1, pulsar searches will discover enough pulsars to increase the currently known population by a factor of four, no doubt including a range of amazing unknown sources. Real time processing is needed to deal with the 60 PB of pulsar search data collected per day, using a signal processing pipeline required to perform more than 10 POps. Here we present the suggested design of the pulsar search engine for the SKA and discuss challenges and solutions to the pulsar search venture.Comment: 4 pages, 1 figure. To be published in Proceedings of IAU Symposium 337: Pulsar Astrophysics - The Next 50 Year

    The Uncertainty Principle in the Presence of Quantum Memory

    Full text link
    The uncertainty principle, originally formulated by Heisenberg, dramatically illustrates the difference between classical and quantum mechanics. The principle bounds the uncertainties about the outcomes of two incompatible measurements, such as position and momentum, on a particle. It implies that one cannot predict the outcomes for both possible choices of measurement to arbitrary precision, even if information about the preparation of the particle is available in a classical memory. However, if the particle is prepared entangled with a quantum memory, a device which is likely to soon be available, it is possible to predict the outcomes for both measurement choices precisely. In this work we strengthen the uncertainty principle to incorporate this case, providing a lower bound on the uncertainties which depends on the amount of entanglement between the particle and the quantum memory. We detail the application of our result to witnessing entanglement and to quantum key distribution.Comment: 5 pages plus 12 of supplementary information. Updated to match the journal versio

    How to share a quantum secret

    Full text link
    We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum "no-cloning theorem", which requires that n < 2k, and, in all such cases, we give an efficient construction of a ((k,n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k <= n < 2k-1 then any ((k,n)) threshold scheme must distribute information that is globally in a mixed state.Comment: 5 pages, REVTeX, submitted to PR

    Is Quantum Bit Commitment Really Possible?

    Get PDF
    We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen type of attack and delaying her measurement until she opens her commitment.Comment: Major revisions to include a more extensive introduction and an example of bit commitment. Overlap with independent work by Mayers acknowledged. More recent works by Mayers, by Lo and Chau and by Lo are also noted. Accepted for publication in Phys. Rev. Let

    Oscillatory Shear Flow-Induced Alignment of Lamellar Melts of Hydrogen-Bonded Comb Copolymer Supramolecules

    Get PDF
    In this work we present the orientational behavior of comb copolymer-like supramolecules P4VP(PDP)1.0, obtained by hydrogen bonding between poly(4-vinylpyridine) and pentadecylphenol, during large-amplitude oscillatory shear flow experiments over a broad range of frequencies (0.001-10 Hz). The alignment diagram, presenting the macroscopic alignment in T/TODT vs ω/ωc, contains three regions of parallel alignment separated by a region of perpendicular alignment. For our material, the order-disorder temperature TODT = 67 °C and ωc, the frequency above which the distortion of the chain conformation dominates the materials’ viscoelasticity, is around 0.1 Hz at 61 °C. For the first time flipping from a pure transverse alignment via biaxial transverse/perpendicular alignment to a perpendicular alignment as a function of the strain amplitude was found.
    • …
    corecore