2,046 research outputs found

    Necessary and sufficient condition for quantum state-independent contextuality

    Full text link
    We solve the problem of whether a set of quantum tests reveals state-independent contextuality and use this result to identify the simplest set of the minimal dimension. We also show that identifying state-independent contextuality graphs [R. Ramanathan and P. Horodecki, Phys. Rev. Lett. 112, 040404 (2014)] is not sufficient for revealing state-independent contextuality.Comment: 5 pages, 3 graph

    Structural approach to unambiguous discrimination of two mixed quantum states

    Full text link
    We analyze the optimal unambiguous discrimination of two arbitrary mixed quantum states. We show that the optimal measurement is unique and we present this optimal measurement for the case where the rank of the density operator of one of the states is at most 2 ("solution in 4 dimensions"). The solution is illustrated by some examples. The optimality conditions proved by Eldar et al. [Phys. Rev. A 69, 062318 (2004)] are simplified to an operational form. As an application we present optimality conditions for the measurement, when only one of the two states is detected. The current status of optimal unambiguous state discrimination is summarized via a general strategy.Comment: 33 pages, 3 figures, minor correction

    Properties of the unusual galaxy PSC 09104+4109

    Get PDF
    The IRAS source PSC 09104+4109 is tentatively identified with a faint emission line galaxy having z = 0.442. Assuming this identification is correct, the total infrared luminosity of this galaxy is estimated to be 5 x 10 to the 12th power L sub 0, among the highest for galaxies detected by IRAS. This energy is concentrated at wavelengths less than 30 micrometers, and is approx. 50 times greater than the estimated optical luminosity. The serendipitous way in which this source was found in the PSC catalog suggests that many more similar objects may be found at the lowest levels of the IRAS survey

    Optimal witnessing of the quantum Fisher information with few measurements

    Get PDF
    We show how to verify the metrological usefulness of quantum states based on the expectation values of an arbitrarily chosen set of observables. In particular, we estimate the quantum Fisher information as a figure of merit of metrological usefulness. Our approach gives a tight lower bound on the quantum Fisher information for the given incomplete information. We apply our method to the results of various multiparticle quantum states prepared in experiments with photons and trapped ions, as well as to spin-squeezed states and Dicke states realized in cold gases. Our approach can be used for detecting and quantifying metrologically useful entanglement in very large systems, based on a few operator expectation values. We also gain new insights into the difference between metrological useful multipartite entanglement and entanglement in general.Comment: 14 pages including 7 figures, revtex4.1, v2:typos corrected, published versio

    Ureteroscopic treatment of larger renal calculi (\u3e2 cm).

    Get PDF
    OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens. METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications. RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%). CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm

    Memory cost of quantum contextuality

    Get PDF
    The simulation of quantum effects requires certain classical resources, and quantifying them is an important step in order to characterize the difference between quantum and classical physics. For a simulation of the phenomenon of state-independent quantum contextuality, we show that the minimal amount of memory used by the simulation is the critical resource. We derive optimal simulation strategies for important cases and prove that reproducing the results of sequential measurements on a two-qubit system requires more memory than the information carrying capacity of the system.Comment: 18 pages, no figures, v2: revised for clarit

    Stealthy Deception Attacks Against SCADA Systems

    Full text link
    SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) and Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a fake view of the industrial process, deceiving the human operator into taking manual actions. Our most advanced attack also manipulates the messages generated by the operator's actions, reversing their semantic meaning while causing the HMI to present a view that is consistent with the attempted human actions. The attacks are totaly stealthy because the message sizes and timing, the command sequences, and the data values of the ICS's state all remain legitimate. We implemented and tested several attack scenarios in the test lab of our local electric company, against a real HMI and real PLCs, separated by a commercial-grade firewall. We developed a real-time security assessment tool, that can simultaneously manipulate the communication to multiple PLCs and cause the HMI to display a coherent system--wide fake view. Our tool is configured with message-manipulating rules written in an ICS Attack Markup Language (IAML) we designed, which may be of independent interest. Our semantic attacks all successfully fooled the operator and brought the system to states of blackout and possible equipment damage
    corecore