3,957 research outputs found

    What could be learnt from Positronium for Quarkonium?

    Get PDF
    In order to fulfill Low's theorem requirements, a new lowest order basis for bound state decay computations is proposed, in which the binding energy is treated non-perturbatively. The properties of the method are sketched by reviewing standard positronium decay processes. Then, it is shown how applying the method to quarkonia sheds new light on some longstanding puzzles.Comment: 12 pages, 10 figures. Talk given at the ETH Workshop on Positronium Physics, May 30-31, 2003, Zurich, Switzerlan

    The automorphism group of separable states in quantum information theory

    Get PDF
    We show that the linear group of automorphism of Hermitian matrices which preserves the set of separable states is generated by \emph{natural} automorphisms: change of an orthonormal basis in each tensor factor, partial transpose in each tensor factor, and interchanging two tensor factors of the same dimension. We apply our results to preservers of the product numerical range.Comment: 15 page

    Statistical interaction modeling of bovine herd behaviors

    Get PDF
    While there has been interest in modeling the group behavior of herds or flocks, much of this work has focused on simulating their collective spatial motion patterns which have not accounted for individuality in the herd and instead assume a homogenized role for all members or sub-groups of the herd. Animal behavior experts have noted that domestic animals exhibit behaviors that are indicative of social hierarchy: leader/follower type behaviors are present as well as dominance and subordination, aggression and rank order, and specific social affiliations may also exist. Both wild and domestic cattle are social species, and group behaviors are likely to be influenced by the expression of specific social interactions. In this paper, Global Positioning System coordinate fixes gathered from a herd of beef cows tracked in open fields over several days at a time are utilized to learn a model that focuses on the interactions within the herd as well as its overall movement. Using these data in this way explores the validity of existing group behavior models against actual herding behaviors. Domain knowledge, location geography and human observations, are utilized to explain the causes of these deviations from this idealized behavior

    Towards higher scalability of hybrid optical CDMA network

    Get PDF
    A novel approach for improving the number of simultaneous users in a hybrid OCDMAOTDMA network is proposed and analysed. OCDMA system is based on two-dimensional wavelength-hopping time-spreading codes with multi-wavelengths picosecond carriers. The scalability increase was achieved by adding a third dimension to separate OCDMA user groups within OTDMA time slots by assigning them into different wavelength bands. We have shown this will scale-up the system capacity proportionally to the number of assigned wavelength bands. A self-clocking all-optical time gate was then demonstrated as an effective means for suppressing the growing detrimental multi access interference noise resulted from this capacity increase

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    A high flux source of cold strontium atoms

    Full text link
    We describe an experimental apparatus capable of achieving a high loading rate of strontium atoms in a magneto-optical trap operating in a high vacuum environment. A key innovation of this setup is a two dimensional magneto-optical trap deflector located after a Zeeman slower. We find a loading rate of 6x10^9/s whereas the lifetime of the magnetically trapped atoms in the 3P2 state is 54s.Comment: 12 pages, 16 figure

    RELBET 4.0 user's guide

    Get PDF
    This manual describes the operation and use of RELBET 4.0 implemented on the Hewlett Packard model 9000. The RELBET System is an integrated collection of computer programs which support the analysis and post-flight reconstruction of vehicle to vehicle relative trajectories of two on-orbit free-flying vehicles: the Space Shuttle Orbiter and some other free-flyer. The manual serves both as a reference and as a training guide. Appendices provide experienced users with details and full explanations of program usage. The body of the manual introduces new users to the system by leading them through a step by step example of a typical production. This should equip the new user both to execute a typical production process and to understand the most significant variables in that process
    corecore