42,665 research outputs found

    Invisible Z decay width bounds on active-sterile neutrino mixing in the (3+1) and (3+2) models

    Full text link
    In this work we consider the standard model extended with singlet sterile neutrinos with mass in the eV range and mixed with the active neutrinos. The active-sterile neutrino mixing renders new contributions to the invisible Z decay width which, in the case of light sterile neutrinos, depends on the active-sterile mixing matrix elements only. We then use the current experimental value of the invisible Z decay width to obtain bounds on these mixing matrix elements for both (3+1) and (3+2) models.Comment: 10 pages, 5 figure

    Data and Predictive Analytics Use for Logistics and Supply Chain Management

    Get PDF
    Purpose The purpose of this paper is to explore the social process of Big Data and predictive analytics (BDPA) use for logistics and supply chain management (LSCM), focusing on interactions among technology, human behavior and organizational context that occur at the technology’s post-adoption phases in retail supply chain (RSC) organizations. Design/methodology/approach The authors follow a grounded theory approach for theory building based on interviews with senior managers of 15 organizations positioned across multiple echelons in the RSC. Findings Findings reveal how user involvement shapes BDPA to fit organizational structures and how changes made to the technology retroactively affect its design and institutional properties. Findings also reveal previously unreported aspects of BDPA use for LSCM. These include the presence of temporal and spatial discontinuities in the technology use across RSC organizations. Practical implications This study unveils that it is impossible to design a BDPA technology ready for immediate use. The emergent process framework shows that institutional and social factors require BDPA use specific to the organization, as the technology comes to reflect the properties of the organization and the wider social environment for which its designers originally intended. BDPA is, thus, not easily transferrable among collaborating RSC organizations and requires managerial attention to the institutional context within which its usage takes place. Originality/value The literature describes why organizations will use BDPA but fails to provide adequate insight into how BDPA use occurs. The authors address the “how” and bring a social perspective into a technology-centric area

    Wall Effects in Cavity Flows and their Correction Rules

    Get PDF
    The wall effects in cavity flows have been long recognized to be more important and more difficult to determine than those in single-phase, nonseparated flows. Earlier theoretical investigations of this problem have been limited largely to simple body forms in plane flows, based on some commonly used cavity-flow models, such as the Riabouchinsky, the reentrant jet, or the linearized flow model, to represent a finite cavity. Although not meant to be exhaustive, references may be made to Cisotti (1922), Birkhoff, Plesset and Simmons (1950, 1952), Gurevich (1953), Cohen et al. (1957, 1958), and Fabula (1964). The wall effects in axisymmetric flows with a finite cavity has been evaluated numerically by Brennen (1969) for a disk and a sphere. Some intricate features of the wall effects have been noted in experimental studies by Morgan (1966) and Dobay (1967). Also, an empirical method for correcting the wall effect has been proposed by Meijer (1967). The presence of lateral flow boundaries in a closed water tunnel introduces the following physical effects: (i) First, in dealing with the part of irrotational flow outside the viscous region, these flow boundaries will impose a condition on the flow direction at the rigid tunnel walls. This "streamline-blocking" effect will produce extraneous forces and modifications of cavity shape. (ii) The boundary layer built up at the tunnel walls may effectively reduce the tunnel cross-sectional area, and generate a longitudinal pressure gradient in the working section, giving rise to an additional drag force known as the "horizontal buoyancy." (iii) The lateral constraint of tunnel walls results in a higher velocity outside the boundary layer, and hence a greater skin friction at the wetted body surface. (iv) The lateral constraint also affects the spreading of the viscous wake behind the cavity, an effect known as the "wake-blocking." (v) It may modify the location of the "smooth detachment" of cavity boundary from a continuously curved body. In the present paper, the aforementioned effect (i) will be investigated for the pure-drag flows so that this primary effect can be clarified first. Two cavity flow models, namely, the Riabouchinsky and the open-wake (the latter has been attributed, independently, to Joukowsky, Roshko, and Eppler) models, are adopted for detailed examination. The asymptotic representations of these theoretical solutions, with the wall effect treated as a small correction to the unbounded-flow limit, have yielded two different wall-correction rules, both of which can be applied very effectively in practice. It is of interest to note that the most critical range for comparison of these results lies in the case when the cavitating body is slender, rather than blunt ones, and when the cavity is short, instead of very long ones in the nearly choked-flow state. Only in this critical range do these flow models deviate significantly from each other, thereby permitting a refined differentiation and a critical examination of the accuracy of these flow models in representing physical flows. A series of experiments carefully planned for this purpose has provided conclusive evidences, which seem to be beyond possible experimental uncertainties, that the Riabouchinsky model gives a very satisfactory agreement with the experimental results, and is superior to other models, even in the most critical range when the wall effects are especially significant and the differences between these theoretical flow models become noticeably large. These outstanding features are effectively demonstrated by the relatively simple case of a symmetric wedge held in a non-lifting flow within a closed tunnel, which we discuss in the sequel

    Phases of the infinite U Hubbard model

    Full text link
    We apply the density matrix renormalization group (DMRG) to study the phase diagram of the infinite U Hubbard model on 2-, 4-, and 6-leg ladders. Where the results are largely insensitive to the ladder width, we consider the results representative of the 2D square lattice model. We find a fully polarized ferromagnetic Fermi liquid phase when n, the density of electrons per site, is in the range 1>n>n_F ~ 4/5. For n=3/4 we find an unexpected commensurate insulating "checkerboard" phase with coexisting bond density order with 4 sites per unit cell and block spin antiferromagnetic order with 8 sites per unit cell. For 3/4 > n, the wider ladders have unpolarized groundstates, which is suggestive that the same is true in 2D

    Substituting a qubit for an arbitrarily large number of classical bits

    Full text link
    We show that a qubit can be used to substitute for an arbitrarily large number of classical bits. We consider a physical system S interacting locally with a classical field phi(x) as it travels directly from point A to point B. The field has the property that its integrated value is an integer multiple of some constant. The problem is to determine whether the integer is odd or even. This task can be performed perfectly if S is a qubit. On the otherhand, if S is a classical system then we show that it must carry an arbitrarily large amount of classical information. We identify the physical reason for such a huge quantum advantage, and show that it also implies a large difference between the size of quantum and classical memories necessary for some computations. We also present a simple proof that no finite amount of one-way classical communication can perfectly simulate the effect of quantum entanglement.Comment: 8 pages, LaTeX, no figures. v2: added result on entanglement simulation with classical communication; v3: minor correction to main proof, change of title, added referenc

    Generation of a High-Visibility Four-Photon Entangled State and Realization of a Four-Party Quantum Communication Complexity Scenario

    Full text link
    We obtain a four-photon polarization-entangled state with a visibility as high as (95.35\pm 0.45)% directly from a single down-conversion source. A success probability of (81.54\pm 1.38)% is observed by applying this entangled state to realize a four-party quantum communication complexity scenario (QCCS), which comfortably surpass the classical limit of 50%. As a comparison, two Einstein-Podolsky-Rosen (EPR) pairs are shown to implement the scenario with a success probability of (73.89\pm 1.33)%. This four-photon state can be used to fulfill decoherence-free quantum information processing and other advanced quantum communication schemes.Comment: REVTEX 4.0, 4 pages, 4 figures, 1 tabl

    Single-qubit optical quantum fingerprinting

    Full text link
    We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart. For one-qubit fingerprinting of two-bit messages, we prepare `tetrahedral' qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability. We prove that shared entanglement permits 100% reliable quantum fingerprinting, which will outperform classical fingerprinting even with arbitrary amounts of shared randomness.Comment: 4 pages, one figur

    Bell inequality with an arbitrary number of settings and its applications

    Full text link
    Based on a geometrical argument introduced by Zukowski, a new multisetting Bell inequality is derived, for the scenario in which many parties make measurements on two-level systems. This generalizes and unifies some previous results. Moreover, a necessary and sufficient condition for the violation of this inequality is presented. It turns out that the class of non-separable states which do not admit local realistic description is extended when compared to the two-setting inequalities. However, supporting the conjecture of Peres, quantum states with positive partial transposes with respect to all subsystems do not violate the inequality. Additionally, we follow a general link between Bell inequalities and communication complexity problems, and present a quantum protocol linked with the inequality, which outperforms the best classical protocol.Comment: 8 pages, To appear in Phys. Rev.

    Oblivious transfer using quantum entanglement

    Full text link
    Based on quantum entanglement, an all-or-nothing oblivious transfer protocol is proposed and is proven to be secure. The distinct merit of the present protocol lies in that it is not based on quantum bit commitment. More intriguingly, this OT protocol does not belong to a class of protocols denied by the Lo's no-go theorem of one-sided two-party secure computation, and thus its security can be achieved.Comment: 9 pages, 1 figur

    Hole Spin Coherence in a Ge/Si Heterostructure Nanowire

    Get PDF
    Relaxation and dephasing of hole spins are measured in a gate-defined Ge/Si nanowire double quantum dot using a fast pulsed-gate method and dispersive readout. An inhomogeneous dephasing time T2∗∌0.18 ΌsT_2^* \sim 0.18~\mathrm{\mu s} exceeds corresponding measurements in III-V semiconductors by more than an order of magnitude, as expected for predominately nuclear-spin-free materials. Dephasing is observed to be exponential in time, indicating the presence of a broadband noise source, rather than Gaussian, previously seen in systems with nuclear-spin-dominated dephasing.Comment: 15 pages, 4 figure
    • 

    corecore