1,882 research outputs found

    Qubit quantum-dot sensors: noise cancellation by coherent backaction, initial slips, and elliptical precession

    Full text link
    We theoretically investigate the backaction of a sensor quantum dot with strong local Coulomb repulsion on the transient dynamics of a qubit that is probed capacitively. We show that the measurement backaction induced by the noise of electron cotunneling through the sensor is surprisingly mitigated by the recently identified coherent backaction [PRB 89, 195405] arising from quantum fluctuations. This renormalization effect is missing in semiclassical stochastic fluctuator models and typically also in Born-Markov approaches, which try to avoid the calculation of the nonstationary, nonequilibrium state of the qubit plus sensor. Technically, we integrate out the current-carrying electrodes to obtain kinetic equations for the joint, nonequilibrium detector-qubit dynamics. We show that the sensor-current response, level renormalization, cotunneling, and leading non-Markovian corrections always appear together and cannot be turned off individually in an experiment or ignored theoretically. We analyze the backaction on the reduced qubit state - capturing the full non-Markovian effects imposed by the sensor quantum dot on the qubit - by applying a Liouville-space decomposition into quasistationary and rapidly decaying modes. Importantly, the sensor cannot be eliminated completely even in the simplest high-temperature, weak-measurement limit: The qubit state experiences an initial slip that persists over many qubit cycles and depends on the initial preparation of qubit plus sensor quantum dot. A quantum-dot sensor can thus not be modeled as a 'black box' without accounting for its dynamical variables. We furthermore find that the Bloch vector relaxes (T1) along an axis that is not orthogonal to the plane in which the Bloch vector dephases (T2), blurring the notions of T1 and T2 times. Finally, the precessional motion of the Bloch vector is distorted into an ellipse in the tilted dephasing plane.Comment: This is the version published in Phys. Rev.

    Training of Physicians in Disaster Medicine

    Get PDF
    In disasters, every available physician and lay person alike is called upon to render help. Disaster medicine is a most demanding field because of its multidisciplinary nature. Specialties like anesthesia, general surgery, internal medicine, pediatrics, opthalmology, orthopedics, otorhinolaryngology, bacteriology, thoracic and vascular surgery, toxicology, radiology, and others are each separately and directly involved. Without specialized knowledge, no one physician is able to cope with all problems that may arise. Therefore, disaster management planning calls for adequate training and organizational preparations, with plans for the whole spectrum of possible catastrophes from man-made and natural disasters (e.g., floods, avalanches, fire, war, terrorism attacks; air, rail and high-way accidents; chemical catastrophes, irradiation, and radioactive fallout

    On the reduction of the CSP dichotomy conjecture to digraphs

    Full text link
    It is well known that the constraint satisfaction problem over general relational structures can be reduced in polynomial time to digraphs. We present a simple variant of such a reduction and use it to show that the algebraic dichotomy conjecture is equivalent to its restriction to digraphs and that the polynomial reduction can be made in logspace. We also show that our reduction preserves the bounded width property, i.e., solvability by local consistency methods. We discuss further algorithmic properties that are preserved and related open problems.Comment: 34 pages. Article is to appear in CP2013. This version includes two appendices with proofs of claims omitted from the main articl

    On the homomorphism order of labeled posets

    Get PDF
    Partially ordered sets labeled with k labels (k-posets) and their homomorphisms are examined. We give a representation of directed graphs by k-posets; this provides a new proof of the universality of the homomorphism order of k-posets. This universal order is a distributive lattice. We investigate some other properties, namely the infinite distributivity, the computation of infinite suprema and infima, and the complexity of certain decision problems involving the homomorphism order of k-posets. Sublattices are also examined.Comment: 14 page

    Lower Bounds for the Graph Homomorphism Problem

    Full text link
    The graph homomorphism problem (HOM) asks whether the vertices of a given nn-vertex graph GG can be mapped to the vertices of a given hh-vertex graph HH such that each edge of GG is mapped to an edge of HH. The problem generalizes the graph coloring problem and at the same time can be viewed as a special case of the 22-CSP problem. In this paper, we prove several lower bound for HOM under the Exponential Time Hypothesis (ETH) assumption. The main result is a lower bound 2Ω(nlog⁥hlog⁥log⁥h)2^{\Omega\left( \frac{n \log h}{\log \log h}\right)}. This rules out the existence of a single-exponential algorithm and shows that the trivial upper bound 2O(nlog⁥h)2^{{\mathcal O}(n\log{h})} is almost asymptotically tight. We also investigate what properties of graphs GG and HH make it difficult to solve HOM(G,H)(G,H). An easy observation is that an O(hn){\mathcal O}(h^n) upper bound can be improved to O(hvc⁥(G)){\mathcal O}(h^{\operatorname{vc}(G)}) where vc⁥(G)\operatorname{vc}(G) is the minimum size of a vertex cover of GG. The second lower bound hΩ(vc⁥(G))h^{\Omega(\operatorname{vc}(G))} shows that the upper bound is asymptotically tight. As to the properties of the "right-hand side" graph HH, it is known that HOM(G,H)(G,H) can be solved in time (f(Δ(H)))n(f(\Delta(H)))^n and (f(tw⁥(H)))n(f(\operatorname{tw}(H)))^n where Δ(H)\Delta(H) is the maximum degree of HH and tw⁥(H)\operatorname{tw}(H) is the treewidth of HH. This gives single-exponential algorithms for graphs of bounded maximum degree or bounded treewidth. Since the chromatic number χ(H)\chi(H) does not exceed tw⁥(H)\operatorname{tw}(H) and Δ(H)+1\Delta(H)+1, it is natural to ask whether similar upper bounds with respect to χ(H)\chi(H) can be obtained. We provide a negative answer to this question by establishing a lower bound (f(χ(H)))n(f(\chi(H)))^n for any function ff. We also observe that similar lower bounds can be obtained for locally injective homomorphisms.Comment: 19 page

    Sub-nanometer free electrons with topological charge

    Full text link
    The holographic mask technique is used to create freely moving electrons with quantized angular momentum. With electron optical elements they can be focused to vortices with diameters below the nanometer range. The understanding of these vortex beams is important for many applications. Here we present a theory of focused free electron vortices. The agreement with experimental data is excellent. As an immediate application, fundamental experimental parameters like spherical aberration and partial coherence are determined.Comment: 4 pages, 5 figure

    Aflatoxin control and prevention strategies in maize for Sub-Saharan Africa

    Get PDF
    Mycotoxins are secondary fungal metabolites that contaminate agricultural commodities and can cause sickness or death in humans and animals. Risk of mycotoxin contamination of food and feed in Africa is increased due to environmental, agronomic and socio-economic factors. Environmental conditions especially high humidity and temperature favour fungal proliferation. Farming practices in Africa sustain fungal and toxin contamination of food and feed. The socio-economic and food security status of the majority of inhabitants of sub-Saharan Africa leaves them little option in choosing good quality products. Several technologies have been tested in Africa to reduce mycotoxin risk. Field management practices that increase yields may also prevent aflatoxin. They include use of resistant varieties, timely planting, fertilizer application, weed control, insect control and avoiding drought and nutritional stress. Other options to control the toxin causing fungi A. flavus contamination in the field are use of atoxigenic fungi to competitively displace toxigenic fungi, and timely harvest. Post-harvest interventions that reduce mycotoxins are rapid and proper drying, sorting, cleaning, drying, smoking, post harvest insect control, and the use of botanicals or synthetic pesticides as storage protectant. Another approach is to reduce the frequent consumption of ‘high risk’ foods (especially maize and groundnut) by consuming a more varied diet, and diversifying into less risky staples like sorghum and millet. Chemo-preventive measures that can reduce mycotoxin effect include daily consumption of chlorophyllin or oltipraz and by incorporating hydrated sodium calcium aluminosilicates into the diet. Detoxification of aflatoxins is often achieved physically (sorting, physical segregation, flotation etc.), chemically (with calcium hydroxide, ammonia) and microbiologically by incorporating probiotics or lactic acid bacteria into the diet. There is need for efficient monitoring and surveillance with costeffective sampling and anlytical methods. Sustaining public education and awareness can help to reduce aflatoxin contamination. Keywords: Aflatoxin, Sub-Saharan Africa, Control measure

    On Approximating Restricted Cycle Covers

    Get PDF
    A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An L-cycle cover is a cycle cover in which the length of every cycle is in the set L. The weight of a cycle cover of an edge-weighted graph is the sum of the weights of its edges. We come close to settling the complexity and approximability of computing L-cycle covers. On the one hand, we show that for almost all L, computing L-cycle covers of maximum weight in directed and undirected graphs is APX-hard and NP-hard. Most of our hardness results hold even if the edge weights are restricted to zero and one. On the other hand, we show that the problem of computing L-cycle covers of maximum weight can be approximated within a factor of 2 for undirected graphs and within a factor of 8/3 in the case of directed graphs. This holds for arbitrary sets L.Comment: To appear in SIAM Journal on Computing. Minor change
    • 

    corecore