14,226 research outputs found
Optimal Eavesdropping in Quantum Cryptography. II. Quantum Circuit
It is shown that the optimum strategy of the eavesdropper, as described in
the preceding paper, can be expressed in terms of a quantum circuit in a way
which makes it obvious why certain parameters take on particular values, and
why obtaining information in one basis gives rise to noise in the conjugate
basis.Comment: 7 pages, 1 figure, Latex, the second part of quant-ph/970103
Gambling in Great Britain:a response to Rogers
A recent issue of Practice: Social Work in Action featured a paper by Rogers that examined whether the issue of problem gambling was a suitable case for social work. Rogersâ overview was (in various places) out of date, highly selective, contradictory, presented unsupported claims and somewhat misleading. Rogersâ paper is to be commended for putting the issue of problem gambling on the social work agenda. However, social workers need up-to-date information and contextually situated information if they are to make informed decisions in helping problem gamblers
Channel kets, entangled states, and the location of quantum information
The well-known duality relating entangled states and noisy quantum channels
is expressed in terms of a channel ket, a pure state on a suitable tripartite
system, which functions as a pre-probability allowing the calculation of
statistical correlations between, for example, the entrance and exit of a
channel, once a framework has been chosen so as to allow a consistent set of
probabilities. In each framework the standard notions of ordinary (classical)
information theory apply, and it makes sense to ask whether information of a
particular sort about one system is or is not present in another system.
Quantum effects arise when a single pre-probability is used to compute
statistical correlations in different incompatible frameworks, and various
constraints on the presence and absence of different kinds of information are
expressed in a set of all-or-nothing theorems which generalize or give a
precise meaning to the concept of ``no-cloning.'' These theorems are used to
discuss: the location of information in quantum channels modeled using a
mixed-state environment; the (classical-quantum) channels introduced by
Holevo; and the location of information in the physical carriers of a quantum
code. It is proposed that both channel and entanglement problems be classified
in terms of pure states (functioning as pre-probabilities) on systems of parts, with mixed bipartite entanglement and simple noisy channels belonging
to the category , a five-qubit code to the category , etc.; then by
the dimensions of the Hilbert spaces of the component parts, along with other
criteria yet to be determined.Comment: Latex 32 pages, 4 figures in text using PSTricks. Version 3: Minor
typographical errors correcte
Design tribes and information spaces for creative conversations
This paper reports on work in progress to augment the role and practice of Creative Conversations in product design education. We describe changes in practice designed to elevate the importance of conversations and various pedagogical approaches used to support this elevation. These changes are principally manifested in the formation of like-minded Communities of Interest, or âDesign Tribesâ, the adoption of revised design process models and the associated reorganisation of assessment philosophy and practice. We go on to describe and reflect on various technological interventions deployed, that have been designed to weakly augment the conversation space in both situated (studio based contact sessions) and distributed (work undertaken in between contact sessions) settings.
Keywords: Design Development, Creative Conversation, Idea Generation, Design Critique, Design Practice
Two qubit copying machine for economical quantum eavesdropping
We study the mapping which occurs when a single qubit in an arbitrary state
interacts with another qubit in a given, fixed state resulting in some unitary
transformation on the two qubit system which, in effect, makes two copies of
the first qubit. The general problem of the quality of the resulting copies is
discussed using a special representation, a generalization of the usual Schmidt
decomposition, of an arbitrary two-dimensional subspace of a tensor product of
two 2-dimensional Hilbert spaces. We exhibit quantum circuits which can
reproduce the results of any two qubit copying machine of this type. A simple
stochastic generalization (using a ``classical'' random signal) of the copying
machine is also considered. These copying machines provide simple embodiments
of previously proposed optimal eavesdropping schemes for the BB84 and B92
quantum cryptography protocols.Comment: Minor changes. 26 pages RevTex including 7 PS figure
An asymptotic theory for the re-equilibration of a micellar surfactant solution
Micellar surfactant solutions are characterized by a distribution of aggregates comprised predominantly of pre-micellar aggregates (monomers, dimers, trimers, etc.) and a region of proper micelles close to the peak aggregation number, connected by an intermediate region containing a very low concentration of aggregates. Such a distribution gives rise to a distinct two-timescale re-equilibration following a system dilution, known as the 1 and 2 processes, whose dynamics may be described by the BeckerâDöring equations. We use a continuum version of these equations to develop a reduced asymptotic description that elucidates the behavior during each of these processes
Contributions to the Science of Environmental Impact Assessment: Three Papers on the Arctic Cisco (Coregonus autumnalis) of Northern Alaska
Editor's Introduction -- D. W. Norton; An Assessment of the Colville River Delta Stock of Arctic Cisco--Migrants from Canada? -- B. J. Gallaway, W. B. Griffiths, P. C. Craig, W. J. Gazey, and J. W. Helmericks; Temperature Preference of Juvenile Arctic Cisco (Coregonus autumnalis) From the Alaskan Beaufort Sea -- R. G. Fechhelm, W. H. Neill, and B. J. Gallaway; Modeling Movements and Distribution of Arctic Cisco (Coregonus autumnalis) Relative to Temperature-Salinity Regimes of the Beaufort Sea Near the Waterflood Causeway, Prudhoe Bay, Alaska. -- W. H. Neill, R. G. Fechhelm, B. J. Gallaway, J. D. Bryan, and S. W. Anderson; Notice to Author
Exploring a rheonomic system
A simple and illustrative rheonomic system is explored in the Lagrangian
formalism. The difference between Jacobi's integral and energy is highlighted.
A sharp contrast with remarks found in the literature is pointed out. The
non-conservative system possess a Lagrangian not explicitly dependent on time
and consequently there is a Jacobi's integral. The Lagrange undetermined
multiplier method is used as a complement to obtain a few interesting
conclusion
P,T-Violating Nuclear Matrix Elements in the One-Meson Exchange Approximation
Expressions for the P,T-violating NN potentials are derived for ,
and exchange. The nuclear matrix elements for and
exchange are shown to be greatly suppressed, so that, under the assumption of
comparable coupling constants, exchange would dominate by two orders of
magnitude. The ratio of P,T-violating to P-violating matrix elements is found
to remain approximately constant across the nuclear mass table, thus
establishing the proportionality between time-reversal-violation and
parity-violation matrix elements. The calculated values of this ratio suggest a
need to obtain an accuracy of order for the ratio of the
PT-violating to P-violating asymmetries in neutron transmission experiments in
order to improve on the present limits on the isovector pion coupling constant.Comment: 17 pages, LaTeX, no figure
Complementarity of Kinematics and Geometry in General Relativity Theory
Relations between kinematics, geometry and law of reference frame motion are
considered. We show, that kinematical tensors define geometry up to a space
functional arbitrariness when integrability condition for spin tensor is
satisfied. Some aspects of geometrization principle and geometrical
conventionalism of Poincare are discussed in a light of the obtained results.Comment: The paper is developed version of talk, presented at the conference
RusGrav-2010 (June 2010, Moscow), submitted to GR
- âŠ