2,046 research outputs found
Necessary and sufficient condition for quantum state-independent contextuality
We solve the problem of whether a set of quantum tests reveals
state-independent contextuality and use this result to identify the simplest
set of the minimal dimension. We also show that identifying state-independent
contextuality graphs [R. Ramanathan and P. Horodecki, Phys. Rev. Lett. 112,
040404 (2014)] is not sufficient for revealing state-independent contextuality.Comment: 5 pages, 3 graph
Structural approach to unambiguous discrimination of two mixed quantum states
We analyze the optimal unambiguous discrimination of two arbitrary mixed
quantum states. We show that the optimal measurement is unique and we present
this optimal measurement for the case where the rank of the density operator of
one of the states is at most 2 ("solution in 4 dimensions"). The solution is
illustrated by some examples. The optimality conditions proved by Eldar et al.
[Phys. Rev. A 69, 062318 (2004)] are simplified to an operational form. As an
application we present optimality conditions for the measurement, when only one
of the two states is detected. The current status of optimal unambiguous state
discrimination is summarized via a general strategy.Comment: 33 pages, 3 figures, minor correction
Properties of the unusual galaxy PSC 09104+4109
The IRAS source PSC 09104+4109 is tentatively identified with a faint emission line galaxy having z = 0.442. Assuming this identification is correct, the total infrared luminosity of this galaxy is estimated to be 5 x 10 to the 12th power L sub 0, among the highest for galaxies detected by IRAS. This energy is concentrated at wavelengths less than 30 micrometers, and is approx. 50 times greater than the estimated optical luminosity. The serendipitous way in which this source was found in the PSC catalog suggests that many more similar objects may be found at the lowest levels of the IRAS survey
Optimal witnessing of the quantum Fisher information with few measurements
We show how to verify the metrological usefulness of quantum states based on
the expectation values of an arbitrarily chosen set of observables. In
particular, we estimate the quantum Fisher information as a figure of merit of
metrological usefulness. Our approach gives a tight lower bound on the quantum
Fisher information for the given incomplete information. We apply our method to
the results of various multiparticle quantum states prepared in experiments
with photons and trapped ions, as well as to spin-squeezed states and Dicke
states realized in cold gases. Our approach can be used for detecting and
quantifying metrologically useful entanglement in very large systems, based on
a few operator expectation values. We also gain new insights into the
difference between metrological useful multipartite entanglement and
entanglement in general.Comment: 14 pages including 7 figures, revtex4.1, v2:typos corrected,
published versio
Ureteroscopic treatment of larger renal calculi (\u3e2 cm).
OBJECTIVES: To evaluate the current status of ureteroscopic lithotripsy (UL) for treating renal calculi of \u3e2 cm, as advances in flexible ureteroscope design, accessory instrumentation and lithotrites have revolutionised the treatment of urinary calculi. While previously reserved for ureteric and small renal calculi, UL has gained an increasing role in the selective management of larger renal stone burdens.
METHODS: We searched the available databases, including PubMed, Google Scholar, and Scopus, for relevant reports in English, and the article bibliographies to identify additional relevant articles. Keywords included ureteroscopy, lithotripsy, renal calculi, and calculi \u3e2 cm. Retrieved articles were reviewed to consider the number of patients, mean stone size, success rates, indications and complications.
RESULTS: In all, nine studies (417 patients) were eligible for inclusion. After one, two or three procedures the mean (range) success rates were 68.2 (23-84)%, 87.1 (79-91)% and 94.4 (90.1-96.7)%, respectively. Overall, the success rate was \u3e90% with a mean of 1.2-2.3 procedures per patient. The overall complication rate was 10.3%, including six (1.4%) intraoperative and 37 (8.9%) postoperative complications, most of which were minor. The most common indications for UL were a failed previous treatment (46%), comorbidities (18.2%), and technical and anatomical factors (12.3%).
CONCLUSIONS: UL is safe and effective for treating large renal calculi. While several procedures might be required for total stone clearance, UL should be considered a standard approach in the urologist\u27s options treating renal calculi of \u3e2 cm
Memory cost of quantum contextuality
The simulation of quantum effects requires certain classical resources, and
quantifying them is an important step in order to characterize the difference
between quantum and classical physics. For a simulation of the phenomenon of
state-independent quantum contextuality, we show that the minimal amount of
memory used by the simulation is the critical resource. We derive optimal
simulation strategies for important cases and prove that reproducing the
results of sequential measurements on a two-qubit system requires more memory
than the information carrying capacity of the system.Comment: 18 pages, no figures, v2: revised for clarit
Stealthy Deception Attacks Against SCADA Systems
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to
network attacks such as session hijacking. Hence, research focuses on network
anomaly detection based on meta--data (message sizes, timing, command
sequence), or on the state values of the physical process. In this work we
present a class of semantic network-based attacks against SCADA systems that
are undetectable by the above mentioned anomaly detection. After hijacking the
communication channels between the Human Machine Interface (HMI) and
Programmable Logic Controllers (PLCs), our attacks cause the HMI to present a
fake view of the industrial process, deceiving the human operator into taking
manual actions. Our most advanced attack also manipulates the messages
generated by the operator's actions, reversing their semantic meaning while
causing the HMI to present a view that is consistent with the attempted human
actions. The attacks are totaly stealthy because the message sizes and timing,
the command sequences, and the data values of the ICS's state all remain
legitimate.
We implemented and tested several attack scenarios in the test lab of our
local electric company, against a real HMI and real PLCs, separated by a
commercial-grade firewall. We developed a real-time security assessment tool,
that can simultaneously manipulate the communication to multiple PLCs and cause
the HMI to display a coherent system--wide fake view. Our tool is configured
with message-manipulating rules written in an ICS Attack Markup Language (IAML)
we designed, which may be of independent interest. Our semantic attacks all
successfully fooled the operator and brought the system to states of blackout
and possible equipment damage
- …
