3,362 research outputs found
Beyond single-photon localization at the edge of a Photonic Band Gap
We study spontaneous emission in an atomic ladder system, with both
transitions coupled near-resonantly to the edge of a photonic band gap
continuum. The problem is solved through a recently developed technique and
leads to the formation of a ``two-photon+atom'' bound state with fractional
population trapping in both upper states. In the long-time limit, the atom can
be found excited in a superposition of the upper states and a ``direct''
two-photon process coexists with the stepwise one. The sensitivity of the
effect to the particular form of the density of states is also explored.Comment: to appear in Physical Review
Non-Markovian Decay of a Three Level Cascade Atom in a Structured Reservoir
We present a formalism that enables the study of the non-Markovian dynamics
of a three-level ladder system in a single structured reservoir. The
three-level system is strongly coupled to a bath of reservoir modes and two
quantum excitations of the reservoir are expected. We show that the dynamics
only depends on reservoir structure functions, which are products of the mode
density with the coupling constant squared. This result may enable pseudomode
theory to treat multiple excitations of a structured reservoir. The treatment
uses Laplace transforms and an elimination of variables to obtain a formal
solution. This can be evaluated numerically (with the help of a numerical
inverse Laplace transform) and an example is given. We also compare this result
with the case where the two transitions are coupled to two separate structured
reservoirs (where the example case is also analytically solvable)
New approach to 3D electrostatic calculations for micro-pattern detectors
We demonstrate practically approximation-free electrostatic calculations of
micromesh detectors that can be extended to any other type of micropattern
detectors. Using newly developed Boundary Element Method called Robin Hood
Method we can easily handle objects with huge number of boundary elements
(hundreds of thousands) without any compromise in numerical accuracy. In this
paper we show how such calculations can be applied to Micromegas detectors by
comparing electron transparencies and gains for four different types of meshes.
We demonstrate inclusion of dielectric material by calculating the electric
field around different types of dielectric spacers
Decision and function problems based on boson sampling
Boson sampling is a mathematical problem that is strongly believed to be
intractable for classical computers, whereas passive linear interferometers can
produce samples efficiently. So far, the problem remains a computational
curiosity, and the possible usefulness of boson-sampling devices is mainly
limited to the proof of quantum supremacy. The purpose of this work is to
investigate whether boson sampling can be used as a resource of decision and
function problems that are computationally hard, and may thus have
cryptographic applications. After the definition of a rather general
theoretical framework for the design of such problems, we discuss their
solution by means of a brute-force numerical approach, as well as by means of
non-boson samplers. Moreover, we estimate the sample sizes required for their
solution by passive linear interferometers, and it is shown that they are
independent of the size of the Hilbert space.Comment: Close to the version published in PR
Homeless population
The aim was to derive and analyze a model for numbers of homeless and non-homeless people in a borough, in particular to see how these figures might be affected by different policies regarding housing various categories of people. Most attention was focused on steady populations although the stability of these and possible timescales of dynamic problems were also discussed.
The main outcome of this brief study is the identification of the key role played by the constant k_1 - the constant which fixes the speed at which the homeless are rehoused in permanent council property. Reducing this constant, i.e. making the system "fairer" with less priority to accommodating homeless families, appears to have little effect on the sizes of other categories on the waiting list but there is a marked increase in the number of households in temporary accommodation.
The model, indicated by the size of its longest time-scale, should be modified to allow for births etc.
It could be varied by allowing people to remove themselves from the register or by allowing the rates at which registered and unregistered people become homeless to differ, but these modifications are unlikely to substantially change the main result.
The inclusion of movement from the homeless to the general population would have the effect of limiting the numbers in temporary accommodation. However, it is thought this effect is very small so a great reduction in k_1 would be needed for this flow to become significant
Security bound of two-bases quantum key-distribution protocols using qudits
We investigate the security bounds of quantum cryptographic protocols using
-level systems. In particular, we focus on schemes that use two mutually
unbiased bases, thus extending the BB84 quantum key distribution scheme to
higher dimensions. Under the assumption of general coherent attacks, we derive
an analytic expression for the ultimate upper security bound of such quantum
cryptography schemes. This bound is well below the predictions of optimal
cloning machines. The possibility of extraction of a secret key beyond
entanglement distillation is discussed. In the case of qutrits we argue that
any eavesdropping strategy is equivalent to a symmetric one. For higher
dimensions such an equivalence is generally no longer valid.Comment: 12 pages, 2 figures, to appear in Phys. Rev.
Sequential superradiant scattering from atomic Bose-Einstein condensates
We theoretically discuss several aspects of sequential superradiant
scattering from atomic Bose-Einstein condensates. Our treatment is based on the
semiclassical description of the process in terms of the Maxwell-Schroedinger
equations for the coupled matter-wave and optical fields. First, we investigate
sequential scattering in the weak-pulse regime and work out the essential
mechanisms responsible for bringing about the characteristic fan-shaped
side-mode distribution patterns. Second, we discuss the transition between the
Kapitza-Dirac and Bragg regimes of sequential scattering in the strong-pulse
regime. Finally, we consider the situation where superradiance is initiated by
coherently populating an atomic side mode through Bragg diffraction, as in
studies of matter-wave amplification, and describe the effect on the sequential
scattering process.Comment: 9 pages, 4 figures. Submitted to Proceedings of LPHYS'06 worksho
Computational Indistinguishability between Quantum States and Its Cryptographic Application
We introduce a computational problem of distinguishing between two specific
quantum states as a new cryptographic problem to design a quantum cryptographic
scheme that is "secure" against any polynomial-time quantum adversary. Our
problem, QSCDff, is to distinguish between two types of random coset states
with a hidden permutation over the symmetric group of finite degree. This
naturally generalizes the commonly-used distinction problem between two
probability distributions in computational cryptography. As our major
contribution, we show that QSCDff has three properties of cryptographic
interest: (i) QSCDff has a trapdoor; (ii) the average-case hardness of QSCDff
coincides with its worst-case hardness; and (iii) QSCDff is computationally at
least as hard as the graph automorphism problem in the worst case. These
cryptographic properties enable us to construct a quantum public-key
cryptosystem, which is likely to withstand any chosen plaintext attack of a
polynomial-time quantum adversary. We further discuss a generalization of
QSCDff, called QSCDcyc, and introduce a multi-bit encryption scheme that relies
on similar cryptographic properties of QSCDcyc.Comment: 24 pages, 2 figures. We improved presentation, and added more detail
proofs and follow-up of recent wor
- …