2,792 research outputs found
Comment on "Asking Photons Where Have They Been"
We argue that, in the recent letter by A. Danan et al. [PRL 111, 240402
(2013), arXiv:1304.7469], if weak measurements are performed such that complete
destructive interference is not disturbed, claims such as "some photons have
been inside the inner interferometer but they never entered and never left"
should not arise. Standard quantum mechanics not only explains the physics
better than the two-state vector formulation the authors advocate, but it can
tell a very different story.Comment: One figure added supporting our claim that rotating mirrors A and B
at exactly the same frequency, but out of phase, restores complete
destructive interference. Minor changes made in order to make our main
argument cleare
Protocol for Counterfactually Transporting an Unknown Qubit
Quantum teleportation circumvents the uncertainty principle using dual
channels: a quantum one consisting of previously-shared entanglement, and a
classical one, together allowing the disembodied transport of an unknown
quantum state over distance. It has recently been shown that a classical bit
can be counterfactually communicated between two parties in empty space,
"Alice" and "Bob". Here, by using our "dual" version of the chained quantum
Zeno effect to achieve a counterfactual CNOT gate, we propose the first
protocol for transporting an unknown qubit counterfactually, that is without
any physical particles travelling between Alice and Bob - no classical channel
and no previously-shared entanglement.Comment: Minor improvement
Performance Analysis of Project-and-Forward Relaying in Mixed MIMO-Pinhole and Rayleigh Dual-Hop Channel
In this letter, we present an end-to-end performance analysis of dual-hop
project-and-forward relaying in a realistic scenario, where the source-relay
and the relay-destination links are experiencing MIMO-pinhole and Rayleigh
channel conditions, respectively. We derive the probability density function of
both the relay post-processing and the end-to-end signal-to-noise ratios, and
the obtained expressions are used to derive the outage probability of the
analyzed system as well as its end-to-end ergodic capacity in terms of
generalized functions. Applying then the residue theory to Mellin-Barnes
integrals, we infer the system asymptotic behavior for different channel
parameters. As the bivariate Meijer-G function is involved in the analysis, we
propose a new and fast MATLAB implementation enabling an automated definition
of the complex integration contour. Extensive Monte-Carlo simulations are
invoked to corroborate the analytical results.Comment: 4 pages, IEEE Communications Letters, 201
PENDAPAT KH. SALIM MARUF TENTANG JUAL BELI DALAM RISALAH MUAMALAH
The study of KH. Salim Ma'ruf thought about buying and selling is important to do because sometimes his thought is in contrast to other scholars opinion. For example, KH. Salim Ma'ruf said that buying and selling done by a drunk person is valid/legal. However, if it is done by children under the permission of the guardians, according to KH.Salim Maruf, is not valid/legal. KH. Salim Ma'ruf also found that buying and selling to people whose treasure is doubtful is makruh. In addition, he also noted that buying and selling sacrificial meat is haram, bay 'al-'urbun, bay' munabadzah and bay 'mulamasah, bay'ataini fi bay'atin, bay 'malaqih. KH. Salim Maruf did not give the legal proposition on each of his thought published in the book of Risalah Mu'amalah while the law is said to be invalid or false is determined from the aspect of legal proposition, therefore, it is necessary to study and search of the arguments used in book
Do the laws of physics prohibit counterfactual communication?
It has been conjectured that counterfactual communication is impossible, even
for post-selected quantum particles. We strongly challenge this by proposing
exactly such a counterfactual scheme where---unambiguously---none of Alice's
photons that make it has been to Bob. We demonstrate counterfactuality
theoretically and experimentally by means of weak measurements, as well as
conceptually using consistent histories. Importantly, the accuracy of Alice
learning Bob's bit can be made arbitrarily close to unity with no trace left by
Bob on Alice's photon.Comment: Experiment conducted in the lab, showing no weak trace from Bob at
either D0 or D1. 5 pages, 5 figure
CO2 valorization by means of dielectric barrier discharge
peer reviewedAs atmospheric pollution is causing several environmental problems it is incumbent to reduce the impact of pollution on the environment. One particular problem is the production of CO2 by many transport and industrial applications. Instead of stocking CO2 and instead of being a product, it can be used as a source. The case considered is the CO2 reformation of methane producing hydrogen and CO. It is an endothermic reaction, for which the activation barrier needs to be surpassed. This can be done efficiently by the method of Dielectric Barrier Discharge. The process relies on the collision of electrons, which are accelerated under an electrical field that is created in the discharge area. This leads to the formation of reactive species, which facilitate the abovementioned reaction. This study is performed using a Matlab program with the Reaction Engineering module in COMSOL (with an incorporated kinetic mechanism) in order to model the discharge phase. Then COMSOL (continuity and Navier-Stokes equations) is used to model the flow in the post-discharge phase. The results showed that both a 2D and 3D model can be used to model the chemical-plasma process. These methods need strongly reduced kinetic mechanism, which in some cases can cause loss of precision
- …