43,761 research outputs found
Invisible Z decay width bounds on active-sterile neutrino mixing in the (3+1) and (3+2) models
In this work we consider the standard model extended with singlet sterile
neutrinos with mass in the eV range and mixed with the active neutrinos. The
active-sterile neutrino mixing renders new contributions to the invisible Z
decay width which, in the case of light sterile neutrinos, depends on the
active-sterile mixing matrix elements only. We then use the current
experimental value of the invisible Z decay width to obtain bounds on these
mixing matrix elements for both (3+1) and (3+2) models.Comment: 10 pages, 5 figure
Data and Predictive Analytics Use for Logistics and Supply Chain Management
Purpose
The purpose of this paper is to explore the social process of Big Data and predictive analytics (BDPA) use for logistics and supply chain management (LSCM), focusing on interactions among technology, human behavior and organizational context that occur at the technologyâs post-adoption phases in retail supply chain (RSC) organizations. Design/methodology/approach
The authors follow a grounded theory approach for theory building based on interviews with senior managers of 15 organizations positioned across multiple echelons in the RSC. Findings
Findings reveal how user involvement shapes BDPA to fit organizational structures and how changes made to the technology retroactively affect its design and institutional properties. Findings also reveal previously unreported aspects of BDPA use for LSCM. These include the presence of temporal and spatial discontinuities in the technology use across RSC organizations. Practical implications
This study unveils that it is impossible to design a BDPA technology ready for immediate use. The emergent process framework shows that institutional and social factors require BDPA use specific to the organization, as the technology comes to reflect the properties of the organization and the wider social environment for which its designers originally intended. BDPA is, thus, not easily transferrable among collaborating RSC organizations and requires managerial attention to the institutional context within which its usage takes place. Originality/value
The literature describes why organizations will use BDPA but fails to provide adequate insight into how BDPA use occurs. The authors address the âhowâ and bring a social perspective into a technology-centric area
Wall Effects in Cavity Flows and their Correction Rules
The wall effects in cavity flows have been long recognized to be more important and more difficult to determine than those in single-phase, nonseparated flows. Earlier theoretical investigations of this problem have been limited largely to simple body forms in plane flows, based on some commonly used cavity-flow models, such as the Riabouchinsky, the reentrant jet, or the linearized flow model, to represent a finite cavity. Although not meant to be exhaustive, references may be made to Cisotti (1922), Birkhoff, Plesset and Simmons (1950, 1952), Gurevich (1953), Cohen et al. (1957, 1958), and Fabula (1964). The wall effects in axisymmetric flows with a finite cavity has been evaluated numerically by Brennen (1969) for a disk and a sphere. Some intricate features of the wall effects have been noted in experimental studies by Morgan (1966) and Dobay (1967). Also, an empirical method for correcting the wall effect has been proposed by Meijer (1967).
The presence of lateral flow boundaries in a closed water tunnel introduces the following physical effects: (i) First, in dealing with the part of irrotational flow outside the viscous region, these flow boundaries will impose a condition on the flow direction at the rigid tunnel walls. This "streamline-blocking" effect will produce extraneous forces and modifications of cavity shape. (ii) The boundary layer built up at the tunnel walls may effectively reduce the tunnel cross-sectional area, and generate a longitudinal pressure gradient in the working section, giving rise to an additional drag force known as the "horizontal buoyancy." (iii) The lateral constraint of tunnel walls results in a higher velocity outside the boundary layer, and hence a greater skin friction at the wetted body surface. (iv) The lateral constraint also affects the spreading of the viscous wake behind the cavity, an effect known as the "wake-blocking." (v) It may modify the location of the "smooth detachment" of cavity boundary from a continuously curved body.
In the present paper, the aforementioned effect (i) will be investigated for the pure-drag flows so that this primary effect can be clarified first. Two cavity flow models, namely, the Riabouchinsky and the open-wake (the latter has been attributed, independently, to Joukowsky, Roshko, and Eppler) models, are adopted for detailed examination. The asymptotic representations of these theoretical solutions, with the wall effect treated as a small correction to the unbounded-flow limit, have yielded two different wall-correction rules, both of which can be applied very effectively in practice. It is of interest to note that the most critical range for comparison of these results lies in the case when the cavitating body is slender, rather than blunt ones, and when the cavity is short, instead of very long ones in the nearly choked-flow state. Only in this critical range do these flow models deviate significantly from each other, thereby permitting a refined differentiation and a critical examination of the accuracy of these flow models in representing physical flows. A series of experiments carefully planned for this purpose has provided conclusive evidences, which seem to be beyond possible experimental uncertainties, that the Riabouchinsky model gives a very satisfactory agreement with the experimental results, and is superior to other models, even in the most critical range when the wall effects are especially significant and the differences between these theoretical flow models become noticeably large.
These outstanding features are effectively demonstrated by the relatively simple case of a symmetric wedge held in a non-lifting flow within a closed tunnel, which we discuss in the sequel
Phases of the infinite U Hubbard model
We apply the density matrix renormalization group (DMRG) to study the phase
diagram of the infinite U Hubbard model on 2-, 4-, and 6-leg ladders. Where the
results are largely insensitive to the ladder width, we consider the results
representative of the 2D square lattice model. We find a fully polarized
ferromagnetic Fermi liquid phase when n, the density of electrons per site, is
in the range 1>n>n_F ~ 4/5. For n=3/4 we find an unexpected commensurate
insulating "checkerboard" phase with coexisting bond density order with 4 sites
per unit cell and block spin antiferromagnetic order with 8 sites per unit
cell. For 3/4 > n, the wider ladders have unpolarized groundstates, which is
suggestive that the same is true in 2D
Substituting a qubit for an arbitrarily large number of classical bits
We show that a qubit can be used to substitute for an arbitrarily large
number of classical bits. We consider a physical system S interacting locally
with a classical field phi(x) as it travels directly from point A to point B.
The field has the property that its integrated value is an integer multiple of
some constant. The problem is to determine whether the integer is odd or even.
This task can be performed perfectly if S is a qubit. On the otherhand, if S is
a classical system then we show that it must carry an arbitrarily large amount
of classical information. We identify the physical reason for such a huge
quantum advantage, and show that it also implies a large difference between the
size of quantum and classical memories necessary for some computations. We also
present a simple proof that no finite amount of one-way classical communication
can perfectly simulate the effect of quantum entanglement.Comment: 8 pages, LaTeX, no figures. v2: added result on entanglement
simulation with classical communication; v3: minor correction to main proof,
change of title, added referenc
Generation of a High-Visibility Four-Photon Entangled State and Realization of a Four-Party Quantum Communication Complexity Scenario
We obtain a four-photon polarization-entangled state with a visibility as
high as (95.35\pm 0.45)% directly from a single down-conversion source. A
success probability of (81.54\pm 1.38)% is observed by applying this entangled
state to realize a four-party quantum communication complexity scenario (QCCS),
which comfortably surpass the classical limit of 50%. As a comparison, two
Einstein-Podolsky-Rosen (EPR) pairs are shown to implement the scenario with a
success probability of (73.89\pm 1.33)%. This four-photon state can be used to
fulfill decoherence-free quantum information processing and other advanced
quantum communication schemes.Comment: REVTEX 4.0, 4 pages, 4 figures, 1 tabl
Single-qubit optical quantum fingerprinting
We analyze and demonstrate the feasibility and superiority of linear optical
single-qubit fingerprinting over its classical counterpart. For one-qubit
fingerprinting of two-bit messages, we prepare `tetrahedral' qubit states
experimentally and show that they meet the requirements for quantum
fingerprinting to exceed the classical capability. We prove that shared
entanglement permits 100% reliable quantum fingerprinting, which will
outperform classical fingerprinting even with arbitrary amounts of shared
randomness.Comment: 4 pages, one figur
Bell inequality with an arbitrary number of settings and its applications
Based on a geometrical argument introduced by Zukowski, a new multisetting
Bell inequality is derived, for the scenario in which many parties make
measurements on two-level systems. This generalizes and unifies some previous
results. Moreover, a necessary and sufficient condition for the violation of
this inequality is presented. It turns out that the class of non-separable
states which do not admit local realistic description is extended when compared
to the two-setting inequalities. However, supporting the conjecture of Peres,
quantum states with positive partial transposes with respect to all subsystems
do not violate the inequality. Additionally, we follow a general link between
Bell inequalities and communication complexity problems, and present a quantum
protocol linked with the inequality, which outperforms the best classical
protocol.Comment: 8 pages, To appear in Phys. Rev.
Oblivious transfer using quantum entanglement
Based on quantum entanglement, an all-or-nothing oblivious transfer protocol
is proposed and is proven to be secure. The distinct merit of the present
protocol lies in that it is not based on quantum bit commitment. More
intriguingly, this OT protocol does not belong to a class of protocols denied
by the Lo's no-go theorem of one-sided two-party secure computation, and thus
its security can be achieved.Comment: 9 pages, 1 figur
Hole Spin Coherence in a Ge/Si Heterostructure Nanowire
Relaxation and dephasing of hole spins are measured in a gate-defined Ge/Si
nanowire double quantum dot using a fast pulsed-gate method and dispersive
readout. An inhomogeneous dephasing time
exceeds corresponding measurements in III-V semiconductors by more than an
order of magnitude, as expected for predominately nuclear-spin-free materials.
Dephasing is observed to be exponential in time, indicating the presence of a
broadband noise source, rather than Gaussian, previously seen in systems with
nuclear-spin-dominated dephasing.Comment: 15 pages, 4 figure
- âŠ