Alternate proof of the optical theorem for impenetrable targets

2006 ◽  
Vol 119 (1) ◽  
pp. 31-32 ◽  
Author(s):  
G. A. Kriegsmann
Author(s):  
Wah Chi

Resolution and contrast are the important factors to determine the feasibility of imaging single heavy atoms on a thin substrate in an electron microscope. The present report compares the atom image characteristics in different modes of fixed beam dark field microscopy including the ideal beam stop (IBS), a wire beam stop (WBS), tilted illumination (Tl) and a displaced aperture (DA). Image contrast between one Hg and a column of linearly aligned carbon atoms (representing the substrate), are also discussed. The assumptions in the present calculations are perfectly coherent illumination, atom object is represented by spherically symmetric potential derived from Relativistic Hartree Fock Slater wave functions, phase grating approximation is used to evaluate the complex scattering amplitude, inelastic scattering is ignored, phase distortion is solely due to defocus and spherical abberation, and total elastic scattering cross section is evaluated by the Optical Theorem. The atom image intensities are presented in a Z-modulation display, and the details of calculation are described elsewhere.


2021 ◽  
Vol 30 (2) ◽  
Author(s):  
Tom Gur ◽  
Yang P. Liu ◽  
Ron D. Rothblum

AbstractInteractive proofs of proximity allow a sublinear-time verifier to check that a given input is close to the language, using a small amount of communication with a powerful (but untrusted) prover. In this work, we consider two natural minimally interactive variants of such proofs systems, in which the prover only sends a single message, referred to as the proof. The first variant, known as -proofs of Proximity (), is fully non-interactive, meaning that the proof is a function of the input only. The second variant, known as -proofs of Proximity (), allows the proof to additionally depend on the verifier's (entire) random string. The complexity of both s and s is the total number of bits that the verifier observes—namely, the sum of the proof length and query complexity. Our main result is an exponential separation between the power of s and s. Specifically, we exhibit an explicit and natural property $$\Pi$$ Π that admits an with complexity $$O(\log n)$$ O ( log n ) , whereas any for $$\Pi$$ Π has complexity $$\tilde{\Omega}(n^{1/4})$$ Ω ~ ( n 1 / 4 ) , where n denotes the length of the input in bits. Our lower bound also yields an alternate proof, which is more general and arguably much simpler, for a recent result of Fischer et al. (ITCS, 2014). Also, Aaronson (Quantum Information & Computation 2012) has shown a $$\Omega(n^{1/6})$$ Ω ( n 1 / 6 ) lower bound for the same property $$\Pi$$ Π .Lastly, we also consider the notion of oblivious proofs of proximity, in which the verifier's queries are oblivious to the proof. In this setting, we show that s can only be quadratically stronger than s. As an application of this result, we show an exponential separation between the power of public and private coin for oblivious interactive proofs of proximity.


2020 ◽  
Vol 2020 (11) ◽  
Author(s):  
David Meltzer ◽  
Allic Sivaramakrishnan

Abstract We derive the Cutkosky rules for conformal field theories (CFTs) at weak and strong coupling. These rules give a simple, diagrammatic method to compute the double-commutator that appears in the Lorentzian inversion formula. We first revisit weakly-coupled CFTs in flat space, where the cuts are performed on Feynman diagrams. We then generalize these rules to strongly-coupled holographic CFTs, where the cuts are performed on the Witten diagrams of the dual theory. In both cases, Cutkosky rules factorize loop diagrams into on-shell sub-diagrams and generalize the standard S-matrix cutting rules. These rules are naturally formulated and derived in Lorentzian momentum space, where the double-commutator is manifestly related to the CFT optical theorem. Finally, we study the AdS cutting rules in explicit examples at tree level and one loop. In these examples, we confirm that the rules are consistent with the OPE limit and that we recover the S-matrix optical theorem in the flat space limit. The AdS cutting rules and the CFT dispersion formula together form a holographic unitarity method to reconstruct Witten diagrams from their cuts.


1988 ◽  
Vol 19 (2) ◽  
pp. 171-171 ◽  
Author(s):  
Stephen H. Friedberg

2001 ◽  
Vol 25 (1) ◽  
pp. 55-67 ◽  
Author(s):  
T.V. Levitina ◽  
E.J. Brändas

2016 ◽  
Vol 62 (3) ◽  
pp. 263-268 ◽  
Author(s):  
Yu. A. Eremin ◽  
A. G. Sveshnikov

1992 ◽  
Vol 33 (8) ◽  
pp. 2903-2915 ◽  
Author(s):  
David E. Budreck ◽  
James H. Rose

Sign in / Sign up

Export Citation Format

Share Document