
Lectures in Theoretical Biophysics - Theoretical and Computational
... the firing of neurons. Since such systems are often subject to random perturbations, noise is added to the deterministic equations to yield associated stochastic differential equations. In such cases as well as in the case of classical Brownian particles, the noise term B[x(t), t] · η(t) needs to be ...
... the firing of neurons. Since such systems are often subject to random perturbations, noise is added to the deterministic equations to yield associated stochastic differential equations. In such cases as well as in the case of classical Brownian particles, the noise term B[x(t), t] · η(t) needs to be ...
Frozen Quantum Coherence - School of Mathematical Sciences
... Cl1 under local bit-flip channels; however, the same does not hold for CRE in general. Frozen coherence: N qubits.—Our main finding can be readily generalized to a system of N qubits with any even N. We define N-qubit states with maximally mixed marginals (M3N states) [58,66] as those with density P ...
... Cl1 under local bit-flip channels; however, the same does not hold for CRE in general. Frozen coherence: N qubits.—Our main finding can be readily generalized to a system of N qubits with any even N. We define N-qubit states with maximally mixed marginals (M3N states) [58,66] as those with density P ...
Controllability issues for continuous
... is contained in a countable union of compact subsets of X and, in particular, it has an empty interior in X. Thus (4) is not controllable in X with controls in ∪r>1 Lrloc ([0, +∞)). We cannot apply directly here this result since the spaces X = L2 ((ω∗ , ω ∗ ), S2 ) or C 0 ([ω∗ , ω ∗ ], S2 ) where t ...
... is contained in a countable union of compact subsets of X and, in particular, it has an empty interior in X. Thus (4) is not controllable in X with controls in ∪r>1 Lrloc ([0, +∞)). We cannot apply directly here this result since the spaces X = L2 ((ω∗ , ω ∗ ), S2 ) or C 0 ([ω∗ , ω ∗ ], S2 ) where t ...
Lossless Quantum Data Compression and Secure Direct
... Quantum information theory is the combination of quantum mechanics and information theory. The profit is on both sides: quantum mechanics gains valuable aspects concerning the physical interpretation of the theory, and information theory gains enhanced capabilities of information processing and comm ...
... Quantum information theory is the combination of quantum mechanics and information theory. The profit is on both sides: quantum mechanics gains valuable aspects concerning the physical interpretation of the theory, and information theory gains enhanced capabilities of information processing and comm ...
Modeling quantum fluid dynamics at nonzero temperatures
... temperature in such systems. The Landau two-fluid model is the most successful hydrodynamical theory of superfluid helium, but by the nature of the scale separations it cannot give an adequate description of the processes involving vortex dynamics and interactions. In our contribution we introduce a ...
... temperature in such systems. The Landau two-fluid model is the most successful hydrodynamical theory of superfluid helium, but by the nature of the scale separations it cannot give an adequate description of the processes involving vortex dynamics and interactions. In our contribution we introduce a ...
Fast converging path integrals for time-dependent potentials
... amplitudes for further numerical calculations. Such situations occur, for instance, when determining partition functions [47, 49] or for obtaining energy spectra with the method of diagonalizing the space-discretized evolution operator matrix [50, 51]. In order to avoid an accumulation of numerical ...
... amplitudes for further numerical calculations. Such situations occur, for instance, when determining partition functions [47, 49] or for obtaining energy spectra with the method of diagonalizing the space-discretized evolution operator matrix [50, 51]. In order to avoid an accumulation of numerical ...
hidden symmetry and explicit spheroidal eigenfunctions of the
... 6 also showed that the spheroidal solutions provide the correct zero-order basis states for treating the interaction of a point charge or a point dipole with the hy 7 used the spheroidal eigenfunctions drogen atom. Demkov to construct analytic solutions (exact for the Born—Oppen heimer problem) for ...
... 6 also showed that the spheroidal solutions provide the correct zero-order basis states for treating the interaction of a point charge or a point dipole with the hy 7 used the spheroidal eigenfunctions drogen atom. Demkov to construct analytic solutions (exact for the Born—Oppen heimer problem) for ...
Entanglement and Quantum Cryptography Joonwoo Bae Universitat de Barcelona
... applications. The present thesis covers several topics on quantum cryptography, such as the security analysis of quantum channels for key distribution protocols and the study of quantum cloning. First, we introduce a general formalism to characterize the cryptographic properties of quantum channels ...
... applications. The present thesis covers several topics on quantum cryptography, such as the security analysis of quantum channels for key distribution protocols and the study of quantum cloning. First, we introduce a general formalism to characterize the cryptographic properties of quantum channels ...
Entanglement and Quantum Cryptography
... applications. The present thesis covers several topics on quantum cryptography, such as the security analysis of quantum channels for key distribution protocols and the study of quantum cloning. First, we introduce a general formalism to characterize the cryptographic properties of quantum channels ...
... applications. The present thesis covers several topics on quantum cryptography, such as the security analysis of quantum channels for key distribution protocols and the study of quantum cloning. First, we introduce a general formalism to characterize the cryptographic properties of quantum channels ...
Introduction to Integrable Models
... We have seen that the expression for the energies, Eq. (2.28), is reminiscent of two superimposed magnons. The magnon interaction is reflected in the phase shift θ and the deviation of the momenta k1 , k2 from the one-magnon wave numbers. We will see that the magnons either scatter off each other or ...
... We have seen that the expression for the energies, Eq. (2.28), is reminiscent of two superimposed magnons. The magnon interaction is reflected in the phase shift θ and the deviation of the momenta k1 , k2 from the one-magnon wave numbers. We will see that the magnons either scatter off each other or ...
ORAMs in a Quantum World - Cryptology ePrint Archive
... carefully the meaning of database, data request, and communication transcript in terms of circuit registers. Then we define a novel, game-based security model for ORAMs, which is very flexible and at least as strong as all the other models proposed to date. We start by defining access patterns, whi ...
... carefully the meaning of database, data request, and communication transcript in terms of circuit registers. Then we define a novel, game-based security model for ORAMs, which is very flexible and at least as strong as all the other models proposed to date. We start by defining access patterns, whi ...
Electron-electron scattering in linear transport in two
... cases in GaAs quantum wells, m 0 / m ` '2. Thus, for accurate theoretical determination of the mobility at the semiclassical level, it is important that e-e scattering effects are included. Furthermore, it has been shown7 that experiments measuring the drag rate between electron gases between two co ...
... cases in GaAs quantum wells, m 0 / m ` '2. Thus, for accurate theoretical determination of the mobility at the semiclassical level, it is important that e-e scattering effects are included. Furthermore, it has been shown7 that experiments measuring the drag rate between electron gases between two co ...
Microscopic description of two dimensional dipolar quantum gases Universitat Polit` ecnica de Catalunya
... will be used as a trial wave function for Monte Carlo simulations of the bulk two-dimensional system of bosonic dipoles. In the first part of this work we have studied the low-density dipolar Bose gas and we find that the anisotropy has an almost negligible impact on the ground state properties of t ...
... will be used as a trial wave function for Monte Carlo simulations of the bulk two-dimensional system of bosonic dipoles. In the first part of this work we have studied the low-density dipolar Bose gas and we find that the anisotropy has an almost negligible impact on the ground state properties of t ...
Coupling-Matrix Approach to the Chern Number Calculation in
... While simplification exists for pure systems [13], calculation of the Chern number in the presence of disorder is usually based upon the integral of partial derivatives of electron wave functions over the boundary phases. [10, 14, 15] Numerical implementation involves hundreds of times of exact diag ...
... While simplification exists for pure systems [13], calculation of the Chern number in the presence of disorder is usually based upon the integral of partial derivatives of electron wave functions over the boundary phases. [10, 14, 15] Numerical implementation involves hundreds of times of exact diag ...
Consciousness in the universe A review of the ‘Orch OR’ theory ScienceDirect
... ‘Non-computability’ and causal agency As shown by Gödel’s theorem, Penrose [23,24] described how the mental quality of ‘understanding’ cannot be encapsulated by any computational system and must derive from some ‘non-computable’ effect. Moreover, the neurocomputational approach to volition, where al ...
... ‘Non-computability’ and causal agency As shown by Gödel’s theorem, Penrose [23,24] described how the mental quality of ‘understanding’ cannot be encapsulated by any computational system and must derive from some ‘non-computable’ effect. Moreover, the neurocomputational approach to volition, where al ...
(Never) Mind your p`s and q`s: Von Neumann versus Jordan on the
... the value of another. Beyond that Jordan and von Neumann had very different views about the appropriate formulation of problems in the new theory. For Jordan, unable to let go of the analogy to classical mechanics, the solution of such problems required the identification of sets of canonically conj ...
... the value of another. Beyond that Jordan and von Neumann had very different views about the appropriate formulation of problems in the new theory. For Jordan, unable to let go of the analogy to classical mechanics, the solution of such problems required the identification of sets of canonically conj ...
Superconducting Circuits and Quantum Computation—T. P. Orlando
... Figure 1a shows a SEM image of the persistent current qubit (inner loop) and the measuring dc SQUID (outer) loop. A schematic of the qubit and the measuring circuit is shown in Figure 1b, where the Josephson junctions are denoted by x's. The sample is fabricated at MIT Lincoln Laboratory in niobium ...
... Figure 1a shows a SEM image of the persistent current qubit (inner loop) and the measuring dc SQUID (outer) loop. A schematic of the qubit and the measuring circuit is shown in Figure 1b, where the Josephson junctions are denoted by x's. The sample is fabricated at MIT Lincoln Laboratory in niobium ...
Towards a Tight Finite Key Analysis for BB84
... either X or Z, chosen at random. The X bits will be used to extract a key, while the Z are used to check security. She sends the qubit over a public channel to Bob, while the eavesdropper, Eve, may interfere as she wishes. Bob measures the system randomly either in the X or Z basis. Alice and Bob si ...
... either X or Z, chosen at random. The X bits will be used to extract a key, while the Z are used to check security. She sends the qubit over a public channel to Bob, while the eavesdropper, Eve, may interfere as she wishes. Bob measures the system randomly either in the X or Z basis. Alice and Bob si ...