-
QuAS: Quantum Application Score for benchmarking the utility of quantum computers
Authors:
Koen J. Mesman,
Ward van der Schoot,
Matthias Möller,
Niels M. P. Neumann
Abstract:
Benchmarking quantum computers helps to quantify them and bringing the technology to the market. Various application-level metrics exist to benchmark a quantum device at an application level. This paper presents a revised holistic scoring method called the Quantum Application Score (QuAS) incorporating strong points of previous metrics, such as QPack and the Q-score. We discuss how to integrate bo…
▽ More
Benchmarking quantum computers helps to quantify them and bringing the technology to the market. Various application-level metrics exist to benchmark a quantum device at an application level. This paper presents a revised holistic scoring method called the Quantum Application Score (QuAS) incorporating strong points of previous metrics, such as QPack and the Q-score. We discuss how to integrate both and thereby obtain an application-level metric that better quantifies the practical utility of quantum computers. We evaluate the new metric on different hardware platforms such as D-Wave and IBM as well as quantum simulators of Quantum Inspire and Rigetti.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Quantum algorithms for N-1 security in power grids
Authors:
Niels M. P. Neumann,
Stan van der Linde,
Willem de Kok,
Koen Leijnse,
Juan Boschero,
Esteban Aguilera,
Peter Elias-van den Berg,
Vincent Koppen,
Nikki Jaspers,
Jelte Zwetsloot
Abstract:
In recent years, the supply and demand of electricity has significantly increased. As a result, the interconnecting grid infrastructure has required (and will continue to require) further expansion, while allowing for rapid resolution of unforeseen failures. Energy grid operators strive for networks that satisfy different levels of security requirements. In the case of N-1 security for medium volt…
▽ More
In recent years, the supply and demand of electricity has significantly increased. As a result, the interconnecting grid infrastructure has required (and will continue to require) further expansion, while allowing for rapid resolution of unforeseen failures. Energy grid operators strive for networks that satisfy different levels of security requirements. In the case of N-1 security for medium voltage networks, the goal is to ensure the continued provision of electricity in the event of a single-link failure. However, the process of determining if networks are N-1 secure is known to scale polynomially in the network size. This poses restrictions if we increase our demand of the network. In that case, more computationally hard cases will occur in practice and the computation time also increases significantly. In this work, we explore the potential of quantum computers to provide a more scalable solution. In particular, we consider gate-based quantum computing, quantum annealing, and photonic quantum computing.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Noise robustness of a multiparty quantum summation protocol
Authors:
Antón Rodríguez Otero,
Niels M. P. Neumann,
Ward van der Schoot,
Robert Wezeman
Abstract:
Connecting quantum computers to a quantum network opens a wide array of new applications, such as securely performing computations on distributed data sets. Near-term quantum networks are noisy, however, and hence correctness and security of protocols are not guaranteed. To study the impact of noise, we consider a multiparty summation protocol with imperfect shared entangled states. We study analy…
▽ More
Connecting quantum computers to a quantum network opens a wide array of new applications, such as securely performing computations on distributed data sets. Near-term quantum networks are noisy, however, and hence correctness and security of protocols are not guaranteed. To study the impact of noise, we consider a multiparty summation protocol with imperfect shared entangled states. We study analytically the impact of both depolarising and dephasing noise on this protocol and the noise patterns arising in the probability distributions. We conclude by eliminating the need for a trusted third party in the protocol using Shamir's secret sharing.
△ Less
Submitted 29 April, 2024; v1 submitted 26 November, 2023;
originally announced November 2023.
-
Evaluating Three Levels of Quantum Metrics on Quantum-Inspire Hardware
Authors:
Ward van der Schoot,
Robert Wezeman,
Pieter Thijs Eendebak,
Niels M. P. Neumann,
Frank Phillipson
Abstract:
With the rise of quantum computing, many quantum devices have been developed and many more devices are being developed as we speak. This begs the question of which device excels at which tasks and how to compare these different quantum devices with one another. The answer is given by quantum metrics, of which many exist today already. Different metrics focus on different aspects of (quantum) devic…
▽ More
With the rise of quantum computing, many quantum devices have been developed and many more devices are being developed as we speak. This begs the question of which device excels at which tasks and how to compare these different quantum devices with one another. The answer is given by quantum metrics, of which many exist today already. Different metrics focus on different aspects of (quantum) devices and choosing the right metric to benchmark one device against another is a difficult choice. In this paper we aim to give an overview of this zoo of metrics by grou** established metrics in three levels: component level, system level and application level. With this characterisation we also mention what the merits and uses are for each of the different levels. In addition, we evaluate these metrics on the Starmon-5 device of Quantum-Inspire through the cloud access, giving the most complete benchmark of a quantum device from an user experience to date.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
State preparation by shallow circuits using feed forward
Authors:
Harry Buhrman,
Marten Folkertsma,
Bruno Loff,
Niels M. P. Neumann
Abstract:
In order to achieve fault-tolerant quantum computation, we need to repeat the following sequence of four steps: First, perform 1 or 2 qubit quantum gates (in parallel if possible). Second, do a syndrome measurement on a subset of the qubits. Third, perform a fast classical computation to establish which errors have occurred (if any). Fourth, depending on the errors, we apply a correction step. The…
▽ More
In order to achieve fault-tolerant quantum computation, we need to repeat the following sequence of four steps: First, perform 1 or 2 qubit quantum gates (in parallel if possible). Second, do a syndrome measurement on a subset of the qubits. Third, perform a fast classical computation to establish which errors have occurred (if any). Fourth, depending on the errors, we apply a correction step. Then the procedure repeats with the next sequence of gates. In order for these four steps to succeed, we need the error rate of the gates to be below a certain threshold. Unfortunately, the error rates of current quantum hardware are still too high. On the other hand, current quantum hardware platforms are designed with these four steps in mind. In this work we make use of this four-step scheme not to carry out fault-tolerant computations, but to enhance short, constant-depth, quantum circuits that perform 1 qubit gates and nearest-neighbor 2 qubit gates. To explore how this can be useful, we study a computational model which we call Local Alternating Quantum Classical Computations (LAQCC). In this model, qubits are placed in a grid allowing nearest neighbor interactions; the quantum circuits are of constant depth with intermediate measurements; a classical controller can perform log-depth computations on these intermediate measurement outcomes to control future quantum operations. This model fits naturally between quantum algorithms in the NISQ era and full fledged fault-tolerant quantum computation. We show that LAQCC circuits can create long-ranged interactions, which constant-depth quantum circuits cannot achieve, and use it to construct a range of useful multi-qubit gates. With these gates, we create three new state preparation protocols for a uniform superposition over an arbitrary number of states, W-states, Dicke states and may-body scar states.
△ Less
Submitted 1 July, 2024; v1 submitted 27 July, 2023;
originally announced July 2023.
-
Noisy decoding by shallow circuits with parities: classical and quantum
Authors:
Jop Briët,
Harry Buhrman,
Davi Castro-Silva,
Niels M. P. Neumann
Abstract:
We consider the problem of decoding corrupted error correcting codes with NC$^0[\oplus]$ circuits in the classical and quantum settings. We show that any such classical circuit can correctly recover only a vanishingly small fraction of messages, if the codewords are sent over a noisy channel with positive error rate. Previously this was known only for linear codes with large dual distance, whereas…
▽ More
We consider the problem of decoding corrupted error correcting codes with NC$^0[\oplus]$ circuits in the classical and quantum settings. We show that any such classical circuit can correctly recover only a vanishingly small fraction of messages, if the codewords are sent over a noisy channel with positive error rate. Previously this was known only for linear codes with large dual distance, whereas our result applies to any code. By contrast, we give a simple quantum circuit that correctly decodes the Hadamard code with probability $Ω(\varepsilon^2)$ even if a $(1/2 - \varepsilon)$-fraction of a codeword is adversarially corrupted.
Our classical hardness result is based on an equidistribution phenomenon for multivariate polynomials over a finite field under biased input-distributions. This is proved using a structure-versus-randomness strategy based on a new notion of rank for high-dimensional polynomial maps that may be of independent interest.
Our quantum circuit is inspired by a non-local version of the Bernstein-Vazirani problem, a technique to generate ``poor man's cat states'' by Watts et al., and a constant-depth quantum circuit for the OR function by Takahashi and Tani.
△ Less
Submitted 19 December, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Q-score Max-Clique: The First Quantum Metric Evaluation on Multiple Computational Paradigms
Authors:
Ward van der Schoot,
Robert Wezeman,
Niels M. P. Neumann,
Frank Phillipson,
Rob Kooij
Abstract:
Evaluating the performance of quantum devices is an important step towards scaling quantum devices and eventually using them in practice. The great number of available quantum metrics and the different hardware technologies used to develop quantum computers complicate this evaluation. In addition, different computational paradigms implement quantum operations in different ways. We add to the lands…
▽ More
Evaluating the performance of quantum devices is an important step towards scaling quantum devices and eventually using them in practice. The great number of available quantum metrics and the different hardware technologies used to develop quantum computers complicate this evaluation. In addition, different computational paradigms implement quantum operations in different ways. We add to the landscape of quantum metrics by extending the Q-score metric of Atos to the Q-score Max-Clique. To our knowledge, this yields the first application-level metric which allows comparison of three different paradigms of quantum computing. This metric is evaluated on these computational quantum paradigms -- quantum annealing, gate-based quantum computing, and photonic quantum computing -- and the results are compared to those obtained by classical solvers.
△ Less
Submitted 11 December, 2023; v1 submitted 1 February, 2023;
originally announced February 2023.
-
Classification of Hybrid Quantum-Classical Computing
Authors:
Frank Phillipson,
Niels Neumann,
Robert Wezeman
Abstract:
As quantum computers mature, the applicability in practice becomes more important. Many uses of quantum computers will be hybrid, with classical computers still playing an important role in operating and using the quantum computer. The term hybrid is however diffuse and multi-interpretable. In this work we define two classes of hybrid quantum-classical computing: vertical and horizontal. The first…
▽ More
As quantum computers mature, the applicability in practice becomes more important. Many uses of quantum computers will be hybrid, with classical computers still playing an important role in operating and using the quantum computer. The term hybrid is however diffuse and multi-interpretable. In this work we define two classes of hybrid quantum-classical computing: vertical and horizontal. The first is application-agnostic and concerns using quantum computers. The second is application-specific and concerns running an algorithm. For both, we give a further subdivision in different types of hybrid quantum-classical computing and we coin terms for them.
△ Less
Submitted 27 October, 2022;
originally announced October 2022.
-
Distributed Quantum Machine Learning
Authors:
Niels M. P. Neumann,
Robert S. Wezeman
Abstract:
Quantum computers can solve specific complex tasks for which no reasonable-time classical algorithm is known. Quantum computers do however also offer inherent security of data, as measurements destroy quantum states. Using shared entangled states, multiple parties can collaborate and securely compute quantum algorithms. In this paper we propose an approach for distributed quantum machine learning,…
▽ More
Quantum computers can solve specific complex tasks for which no reasonable-time classical algorithm is known. Quantum computers do however also offer inherent security of data, as measurements destroy quantum states. Using shared entangled states, multiple parties can collaborate and securely compute quantum algorithms. In this paper we propose an approach for distributed quantum machine learning, which allows multiple parties to securely perform computations, without having to reveal their data. We will consider a distributed adder and a distributed distance-based classifier.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Evaluating the Q-score of Quantum Annealers
Authors:
Ward van der Schoot,
Daan Leermakers,
Robert Wezeman,
Niels Neumann,
Frank Phillipson
Abstract:
We report the Atos Q-score for D-Wave's quantum devices, classical algorithms and hybrid quantum-classical solver. Computing the Q-score entails solving the Max-Cut problem for increasingly large graphs. This work presents the first computation of the Q-score on a quantum device and shows how these quantum devices compare to classical devices at solving optimisation problems. We use D-Wave's stand…
▽ More
We report the Atos Q-score for D-Wave's quantum devices, classical algorithms and hybrid quantum-classical solver. Computing the Q-score entails solving the Max-Cut problem for increasingly large graphs. This work presents the first computation of the Q-score on a quantum device and shows how these quantum devices compare to classical devices at solving optimisation problems. We use D-Wave's standard methods out of the box with a time limit of 60 seconds. The Q-score for D-Wave's 2000Q and Advantage devices are 70 and 140, respectively. The Q-score for two of D-Wave's classical algorithms, based on tabu search and simulated annealing respectively, are 2,300 and 5,800. Finally, we report the out-of-the-box hybrid approach to have a Q-score of 12,500.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
Towards European Standards for Quantum Technologies
Authors:
O. van Deventer,
N. Spethmann,
M. Loeffler,
M. Amoretti,
R. van den Brink,
N. Bruno,
P. Comi,
N. Farrugia,
M. Gramegna,
B. Kassenberg,
W. Kozlowski,
T. Länger,
T. Lindstrom,
V. Martin,
N. Neumann,
H. Papadopoulos,
S. Pascazio,
M. Peev,
R. Pitwon,
M. A. Rol,
P. Traina,
P. Venderbosch,
F. K. Wilhelm-Mauch,
A. Jenet
Abstract:
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels,…
▽ More
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels, near to the market.
In 2018, the European Commission has launched its large-scale and long-term Quantum Flagship research initiative to support and foster the creation and development of a competitive European quantum technologies industry, as well as the consolidation and expansion of leadership and excellence in European quantum technology research. One of the measures to achieve an accelerated development and uptake has been identified by the Quantum Flagship in its Strategic Research Agenda: the promotion of coordinated, dedicated standardisation and certification efforts. Standardisation is indeed of paramount importance to facilitate the growth of new technologies, and the development of efficient and effective supply chains. The harmonisation of technologies, methodologies, and interfaces enables interoperable products, innovation, and competition, all leading to structuring and hence growth of markets. As quantum technologies are maturing, time has come to start thinking about further standardisation needs.
This article presents insights on standardisation for quantum technologies from the perspective of the CEN-CENELEC Focus Group on Quantum Technologies (FGQT), which was established in June 2020 to coordinate and support the development of standards relevant for European industry and research.
△ Less
Submitted 3 October, 2022; v1 submitted 3 March, 2022;
originally announced March 2022.
-
Quantum Communication for Military Applications
Authors:
Niels M. P. Neumann,
Maran P. P. van Heesch,
Patrick de Graaf
Abstract:
Communication is vital in everyday life and critical for current and future military operations. However, conventional communication as we know it also has its limitations. Quantum communication allows some of these challenges to be overcome and, thereby, new application areas open up, also in the military domain. In this work quantum communication for military purposes is considered. Different ap…
▽ More
Communication is vital in everyday life and critical for current and future military operations. However, conventional communication as we know it also has its limitations. Quantum communication allows some of these challenges to be overcome and, thereby, new application areas open up, also in the military domain. In this work quantum communication for military purposes is considered. Different applications are presented and the state-of-the-art of the technology is given. Also, quantum communication use cases specific for military applications are described.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
Optimizing the Decoy-State BB84 QKD Protocol Parameters
Authors:
Thomas Attema,
Joost Bosman,
Niels Neumann
Abstract:
The performance of a QKD implementation is determined by the tightness of the underlying security analysis. In particular, the security analyses determines the key-rate, i.e., the amount of cryptographic key material that can be distributed per time unit. Nowadays, the security analyses of various QKD protocols are well understood. It is known that optimal protocol parameters, such as the number o…
▽ More
The performance of a QKD implementation is determined by the tightness of the underlying security analysis. In particular, the security analyses determines the key-rate, i.e., the amount of cryptographic key material that can be distributed per time unit. Nowadays, the security analyses of various QKD protocols are well understood. It is known that optimal protocol parameters, such as the number of decoy states and their intensities, can be found by solving a nonlinear optimization problem. The complexity of this optimization problem is typically handled by making an number of heuristic assumptions. For instance, the number of decoy states is restricted to only one or two, with one of the decoy intensities set to a fixed value, and vacuum states are ignored as they are assumed to contribute only marginally to the secure key-rate. These assumptions simplify the optimization problem and reduce the size of search space significantly. However, they also cause the security analysis to be non-tight, and thereby result in sub-optimal performance.
In this work, we follow a more rigorous approach using both linear and non-linear programs describing the optimization problem. Our approach, focusing on the Decoy-State BB84 protocol, allows heuristic assumptions to be omitted, and therefore results in a tighter security analysis with better protocol parameters. We show an improved performance for the Decoy-State BB84 QKD protocol, demonstrating that the heuristic assumptions typically made are too restrictive. Moreover, our improved optimization frameworks shows that the complexity of the performance optimization problem can also be handled without making heuristic assumptions, even with limited computational resources available.
△ Less
Submitted 28 December, 2020; v1 submitted 29 June, 2020;
originally announced June 2020.
-
Influence of dispersive element on phase noise suppression in Talbot effect based optical upconversion scheme
Authors:
Niels Neumann,
Zaid Al-Husseini,
Dirk Plettemeier
Abstract:
The temporal Talbot effect supports the generation of RF signals with high purity in optical domain. This allows for example a remote RF generation without the need for costly high-end electronic circuits and resource sharing. However, one of the most interesting features of the approach is its inherent ability to suppress phase noise during the carrier generation process. Besides the comb laser s…
▽ More
The temporal Talbot effect supports the generation of RF signals with high purity in optical domain. This allows for example a remote RF generation without the need for costly high-end electronic circuits and resource sharing. However, one of the most interesting features of the approach is its inherent ability to suppress phase noise during the carrier generation process. Besides the comb laser source, the dispersive element is the key component in this upconversion scheme. Ideally, it provides the right amount of dispersion over the whole spectral range of the comb. Broader combs are expected to allow a higher degree of phase noise suppression. The simulation of phase noise of an RF tone generated by an optical scheme is challenging in terms of computational and memory effort. Therefore, a simulation tool taking advantage of the properties of the comb and the Talbot effect had to be developed. In this paper, the dependency of the phase noise suppression on the dispersion characteristic is investigated yielding an important input to the design of these elements. First, the implemented simulation tool and the simulation parameters ensuring a correct estimation of the phase noise before and after dispersion influence are introduced. Then, the effect of different dispersion characteristics on the phase noise behavior is analyzed. It could be shown and explained how the phase noise at different offset frequencies to the carrier is affected differently depending on the dispersion characteristic and also the comb width. Design rules for the required comb width as well as the acceptable variation of the produced dispersion from the ideal value depending on the demands for the phase noise improvements could be developed and will be presented.
△ Less
Submitted 3 December, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Classification using a two-qubit quantum chip
Authors:
Niels M. P. Neumann
Abstract:
Quantum computing has great potential for advancing machine learning algorithms beyond classical reach. Even though full-fledged universal quantum computers do not exist yet, its expected benefits for machine learning can already be shown using simulators and already available quantum hardware. In this work, we focus on distance-based classification using actual early stage quantum hardware. We ex…
▽ More
Quantum computing has great potential for advancing machine learning algorithms beyond classical reach. Even though full-fledged universal quantum computers do not exist yet, its expected benefits for machine learning can already be shown using simulators and already available quantum hardware. In this work, we focus on distance-based classification using actual early stage quantum hardware. We extend earlier work and present a distance-based classification algorithm using only two qubits. We show that the results are similar to the theoretically expected results.
△ Less
Submitted 22 July, 2020; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Limitations of Clustering Using Quantum Persistent Homology
Authors:
Niels Neumann,
Sterre den Breeijen
Abstract:
Different algorithms can be used for clustering purposes with data sets. On of these algorithms, uses topological features extracted from the data set to base the clusters on. The complexity of this algorithm is however exponential in the number of data points. Recently a quantum algorithm was proposed by Lloyd Garnerone and Zanardi with claimed polynomial complexity, hence an exponential improved…
▽ More
Different algorithms can be used for clustering purposes with data sets. On of these algorithms, uses topological features extracted from the data set to base the clusters on. The complexity of this algorithm is however exponential in the number of data points. Recently a quantum algorithm was proposed by Lloyd Garnerone and Zanardi with claimed polynomial complexity, hence an exponential improved over classical algorithms. However, we show that this algorithm in general cannot be used to compute these topological features in any dimension but the zeroth. We also give pointers on how to still use the algorithm for clustering purposes.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Perturbation semigroup of matrix algebras
Authors:
Niels Neumann,
Walter D. van Suijlekom
Abstract:
In this article we analyze the structure of the semigroup of inner perturbations in noncommutative geometry. This perturbation semigroup is associated to a unital associative *-algebra and extends the group of unitary elements of this *-algebra. We compute the perturbation semigroup for all matrix algebras.
In this article we analyze the structure of the semigroup of inner perturbations in noncommutative geometry. This perturbation semigroup is associated to a unital associative *-algebra and extends the group of unitary elements of this *-algebra. We compute the perturbation semigroup for all matrix algebras.
△ Less
Submitted 22 October, 2014;
originally announced October 2014.
-
Ion impact induced Interatomic Coulombic Decay in neon and argon dimers
Authors:
H. -K. Kim,
H. Gassert,
M. S. Schöffler,
J. N. Titze,
M. Waitz,
J. Voigtsberger,
F. Trinter,
J. Becht,
A. Kalinin,
N. Neumann,
C. Zhou,
L. Ph. H. Schmidt,
O. Jagutzki,
A. Czasch,
H. Merabet,
H. Schmidt-Böcking,
T. Jahnke,
A. Cassimi,
R. Dörner
Abstract:
We investigate the contribution of Interatomic Coulombic Decay induced by ion impact in neon and argon dimers (Ne$_2$ and Ar$_2$) to the production of low energy electrons. Our experiments cover a broad range of perturbation strengths and reaction channels. We use 11.37 MeV/u S$^{14+}$, 0.125 MeV/u He$^{1+}$, 0.1625 MeV/u He$^{1+}$ and 0.150 MeV/u He$^{2+}$ as projectiles and study ionization, sin…
▽ More
We investigate the contribution of Interatomic Coulombic Decay induced by ion impact in neon and argon dimers (Ne$_2$ and Ar$_2$) to the production of low energy electrons. Our experiments cover a broad range of perturbation strengths and reaction channels. We use 11.37 MeV/u S$^{14+}$, 0.125 MeV/u He$^{1+}$, 0.1625 MeV/u He$^{1+}$ and 0.150 MeV/u He$^{2+}$ as projectiles and study ionization, single and double electron transfer to the projectile as well as projectile electron loss processes. The application of a COLTRIMS reaction microscope enables us to retrieve the three-dimensional momentum vectors of the ion pairs of the fragmenting dimer into Ne$^{q+}$/Ne$^{1+}$ and Ar$^{q+}$/Ar$^{1+}$ (q = 1, 2, 3) in coincidence with at least one emitted electron.
△ Less
Submitted 31 October, 2013;
originally announced October 2013.
-
Single photon double ionization of the helium dimer
Authors:
T. Havermeier,
T. Jahnke,
K. Kreidi,
R. Wallauer,
S. Voss,
M. Schöffler,
S. Schössler,
L. Foucar,
N. Neumann,
J. Titze,
H. Sann,
M. Kühnel,
J. Voigtsberger,
A. Malakzadeh,
N. Sisourat,
W. Schöllkopf,
H. Schmidt-Böcking,
R. E. Grisenti,
R. Dörner
Abstract:
We show that a single photon can ionize the two helium atoms of the helium dimer in a distance up to 10 °A. The energy sharing among the electrons, the angular distributions of the ions and electrons as well as comparison with electron impact data for helium atoms suggest a knock-off type double ionization process. The Coulomb explosion imaging of He_2 provides a direct view of the nuclear wave fu…
▽ More
We show that a single photon can ionize the two helium atoms of the helium dimer in a distance up to 10 °A. The energy sharing among the electrons, the angular distributions of the ions and electrons as well as comparison with electron impact data for helium atoms suggest a knock-off type double ionization process. The Coulomb explosion imaging of He_2 provides a direct view of the nuclear wave function of this by far most extended and most diffuse of all naturally existing molecules.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
Interatomic Coulombic Decay following Photoionization of the Helium Dimer: Observation of Vibrational Structure
Authors:
T. Havermeier,
T. Jahnke,
K. Kreidi,
R. Wallauer,
S. Voss,
M. Schöffler,
S. Schössler,
L. Foucar,
N. Neumann,
J. Titze,
H. Sann,
M. Kühnel,
J. Voigtsberger,
J. H. Morilla,
W. Schöllkopf,
H. Schmidt-Böcking,
R. E. Grisenti,
R. Dörner
Abstract:
Using synchrotron radiation we simultaneously ionize and excite one helium atom of a helium dimer (He_2) in a shakeup process. The populated states of the dimer ion (i.e. He^[*+](n = 2; 3)-He) are found to deexcite via interatomic coulombic decay. This leads to the emission of a second electron from the neutral site and a subsequent coulomb explosion. In this letter we present a measurement of the…
▽ More
Using synchrotron radiation we simultaneously ionize and excite one helium atom of a helium dimer (He_2) in a shakeup process. The populated states of the dimer ion (i.e. He^[*+](n = 2; 3)-He) are found to deexcite via interatomic coulombic decay. This leads to the emission of a second electron from the neutral site and a subsequent coulomb explosion. In this letter we present a measurement of the momenta of fragments that are created during this reaction. The electron energy distribution and the kinetic energy release of the two He^+ ions show pronounced oscillations which we attribute to the structure of the vibrational wave function of the dimer ion.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
Fragmentation dynamics of CO23+ investigated by multiple electron capture in collisions with slow highly charged ions
Authors:
N. Neumann,
D. Hant,
L. Ph. H. Schmidt,
J. Titze,
T. Jahnke,
A. Czasch,
M. S. Schöffler,
K. Kreidi,
O. Jagutzki,
H. Schmidt-Böcking,
R. Dörner
Abstract:
Fragmentation of highly charged molecular ions or clusters consisting of more than two atoms can proceed in an onestep synchronous manner where all bonds break simultaneously or sequentially by emitting one ion after the other. We separated these decay channels for the fragmentation of CO23+ ions by measuring the momenta of the ionic fragments. We show that the total energy deposited in the mole…
▽ More
Fragmentation of highly charged molecular ions or clusters consisting of more than two atoms can proceed in an onestep synchronous manner where all bonds break simultaneously or sequentially by emitting one ion after the other. We separated these decay channels for the fragmentation of CO23+ ions by measuring the momenta of the ionic fragments. We show that the total energy deposited in the molecular ion is a control parameter which switches between three distinct fragmentation pathways: the sequential fragmentation in which the emission of an O+ ion leaves a rotating CO2+ ion behind that fragments after a time delay, the Coulomb explosion and an in-between fragmentation - the asynchronous dissociation. These mechanisms are directly distinguishable in Dalitz plots and Newton diagrams of the fragment momenta. The CO23+ ions are produced by multiple electron capture in collisions with 3.2 keV/u Ar8+ ions.
△ Less
Submitted 21 January, 2010;
originally announced January 2010.
-
Localization of Inner-Shell Photoelectron Emission and Interatomic Coulombic Decay in Ne$_2$
Authors:
K. Kreidi,
T. Jahnke,
Th. Weber,
T. Havermeier,
R. E. Grisenti,
X. Liu,
Y. Morisita,
S. Schössler,
L. Ph. H. Schmidt,
M. Schöffler,
M. Odenweller,
N. Neumann,
L. Foucar,
J. Titze,
B. Ulrich,
F. Sturm,
C. Stuck,
R. Wallauer,
S. Voss,
I. Lauter,
H. K. Kim,
M. Rudloff,
H. Fukuzawa,
G. Prümper,
N. Saito
, et al. (7 additional authors not shown)
Abstract:
We used Cold Target Recoil Ion Momentum Spectroscopy (COLTRIMS) to investigate the decay of Ne$_2$ after K-shell photoionization. The breakup into Ne$^{1+}$ / Ne$^{2+}$ shows interatomic Coulombic decay (ICD) occurring after a preceding atomic Auger decay. The molecular frame angular distributions of the photoelectron and the ICD electron show distinct, asymmetric features, which imply localizat…
▽ More
We used Cold Target Recoil Ion Momentum Spectroscopy (COLTRIMS) to investigate the decay of Ne$_2$ after K-shell photoionization. The breakup into Ne$^{1+}$ / Ne$^{2+}$ shows interatomic Coulombic decay (ICD) occurring after a preceding atomic Auger decay. The molecular frame angular distributions of the photoelectron and the ICD electron show distinct, asymmetric features, which imply localization of the K-vacancy created at one of the two atomic sites of the Ne$_2$ and an emission of the ICD electron from a localized site. The experimental results are supported by calculations in frozen core Hartree-Fock approach.
△ Less
Submitted 31 March, 2008;
originally announced March 2008.