ترغب بنشر مسار تعليمي؟ اضغط هنا

Whether a quantum bath can be approximated as classical noise is a fundamental issue in central spin decoherence and also of practical importance in designing noise-resilient quantum control. Spin qubits based on bismuth donors in silicon have tunabl e interactions with nuclear spin baths and are first-order insensitive to magnetic noise at so-called clock-transitions (CTs). This system is therefore ideal for studying the quantum/classical nature of nuclear spin baths since the qubit-bath interaction strength determines the back-action on the baths and hence the adequacy of a classical noise model. We develop a Gaussian noise model with noise correlations determined by quantum calculations and compare the classical noise approximation to the full quantum bath theory. We experimentally test our model through dynamical decoupling sequence of up to 128 pulses, finding good agreement with simulations and measuring electron spin coherence times approaching one second - notably using natural silicon. Our theoretical and experimental study demonstrates that the noise from a nuclear spin bath is analogous to classical Gaussian noise if the back-action of the qubit on the bath is small compared to the internal bath dynamics, as is the case close to CTs. However, far from the CTs, the back-action of the central spin on the bath is such that the quantum model is required to accurately model spin decoherence.
The sparse representation classifier (SRC) has been utilized in various classification problems, which makes use of L1 minimization and works well for image recognition satisfying a subspace assumption. In this paper we propose a new implementation o f SRC via screening, establish its equivalence to the original SRC under regularity conditions, and prove its classification consistency under a latent subspace model and contamination. The results are demonstrated via simulations and real data experiments, where the new algorithm achieves comparable numerical performance and significantly faster.
49 - Wen-Kai Yu , Shen Li , Xu-Ri Yao 2013
We present a protocol for the amplification and distribution of a one-time-pad cryptographic key over a point-to-multipoint optical network based on computational ghost imaging (GI) and compressed sensing (CS). It is shown experimentally that CS imag ing can perform faster authentication and increase the key generation rate by an order of magnitude compared with the scheme using computational GI alone. The protocol is applicable for any number of legitimate user, thus, the scheme could be used in real intercity networks where high speed and high security are crucial.
203 - Jan Kallsen , Shen Li 2013
We consider an investor with constant absolute risk aversion who trades a risky asset with general Ito dynamics, in the presence of small proportional transaction costs. Kallsen and Muhle-Karbe (2012) formally derived the leading-order optimal tradin g policy and the associated welfare impact of transaction costs. In the present paper, we carry out a convex duality approach facilitated by the concept of shadow price processes in order to verify the main results of Kallsen and Muhle-Karbe under well-defined regularity conditions.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا