45,594 research outputs found
A low-power opportunistic communication protocol for wearable applications
© 2015 IEEE.Recent trends in wearable applications demand flexible architectures being able to monitor people while they move in free-living environments. Current solutions use either store-download-offline processing or simple communication schemes with real-time streaming of sensor data. This limits the applicability of wearable applications to controlled environments (e.g, clinics, homes, or laboratories), because they need to maintain connectivity with the base station throughout the monitoring process. In this paper, we present the design and implementation of an opportunistic communication framework that simplifies the general use of wearable devices in free-living environments. It relies on a low-power data collection protocol that allows the end user to opportunistically, yet seamlessly manage the transmission of sensor data. We validate the feasibility of the framework by demonstrating its use for swimming, where the normal wireless communication is constantly interfered by the environment
Microstructural evolution in materials during thermal processing
Copyright © 2012 Joseph K. L. Lai et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This article has been made available through the Brunel Open Access Publishing Fund.This article is made available through the Brunel Open Access Publishing Fund
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Quantum key distribution (QKD) can be used to generate secret keys between
two distant parties. Even though QKD has been proven unconditionally secure
against eavesdroppers with unlimited computation power, practical
implementations of QKD may contain loopholes that may lead to the generated
secret keys being compromised. In this paper, we propose a phase-remapping
attack targeting two practical bidirectional QKD systems (the "plug & play"
system and the Sagnac system). We showed that if the users of the systems are
unaware of our attack, the final key shared between them can be compromised in
some situations. Specifically, we showed that, in the case of the
Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when
the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders
the final key insecure, whereas the same range of QBER values has been proved
secure if the two users are unaware of our attack; also, we demonstrated three
situations with realistic devices where positive key rates are obtained without
the consideration of Trojan horse attacks but in fact no key can be distilled.
We remark that our attack is feasible with only current technology. Therefore,
it is very important to be aware of our attack in order to ensure absolute
security. In finding our attack, we minimize the QBER over individual
measurements described by a general POVM, which has some similarity with the
standard quantum state discrimination problem.Comment: 13 pages, 8 figure
Real-time food intake classification and energy expenditure estimation on a mobile device
© 2015 IEEE.Assessment of food intake has a wide range of applications in public health and life-style related chronic disease management. In this paper, we propose a real-time food recognition platform combined with daily activity and energy expenditure estimation. In the proposed method, food recognition is based on hierarchical classification using multiple visual cues, supported by efficient software implementation suitable for realtime mobile device execution. A Fischer Vector representation together with a set of linear classifiers are used to categorize food intake. Daily energy expenditure estimation is achieved by using the built-in inertial motion sensors of the mobile device. The performance of the vision-based food recognition algorithm is compared to the current state-of-the-art, showing improved accuracy and high computational efficiency suitable for realtime feedback. Detailed user studies have also been performed to demonstrate the practical value of the software environment
Combining Physical galaxy models with radio observations to constrain the SFRs of high-z dusty star forming galaxies
We complement our previous analysis of a sample of z~1-2 luminous and
ultra-luminous infrared galaxies ((U)LIRGs), by adding deep VLA radio
observations at 1.4 GHz to a large data-set from the far-UV to the sub-mm,
including Spitzer and Herschel data. Given the relatively small number of
(U)LIRGs in our sample with high S/N radio data, and to extend our study to a
different family of galaxies, we also include 6 well sampled near IR-selected
BzK galaxies at z~1.5. From our analysis based on the radiative transfer
spectral synthesis code GRASIL, we find that, while the IR luminosity may be a
biased tracer of the star formation rate (SFR) depending on the age of stars
dominating the dust heating, the inclusion of the radio flux offers
significantly tighter constraints on SFR. Our predicted SFRs are in good
agreement with the estimates based on rest-frame radio luminosity and the Bell
(2003) calibration. The extensive spectro-photometric coverage of our sample
allows us to set important constraints on the SF history of individual objects.
For essentially all galaxies we find evidence for a rather continuous SFR and a
peak epoch of SF preceding that of the observation by a few Gyrs. This seems to
correspond to a formation redshift of z~5-6. We finally show that our physical
analysis may affect the interpretation of the SFR-M* diagram, by possibly
shifting, with respect to previous works, the position of the most dust
obscured objects to higher M* and lower SFRs.Comment: 26 pages, 15 figures, 3 tables, accepted for publication in MNRAS on
Dec. 4th, 201
La raffigurazione della malattia neuropsichiatrica nell'iconografia barocca ovvero l'interpretazione della fenomenologia mistica nell'arte.
Implementation of two-party protocols in the noisy-storage model
The noisy-storage model allows the implementation of secure two-party
protocols under the sole assumption that no large-scale reliable quantum
storage is available to the cheating party. No quantum storage is thereby
required for the honest parties. Examples of such protocols include bit
commitment, oblivious transfer and secure identification. Here, we provide a
guideline for the practical implementation of such protocols. In particular, we
analyze security in a practical setting where the honest parties themselves are
unable to perform perfect operations and need to deal with practical problems
such as errors during transmission and detector inefficiencies. We provide
explicit security parameters for two different experimental setups using weak
coherent, and parametric down conversion sources. In addition, we analyze a
modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030
considering practical aspects, v2: published version, title changed in
accordance with PRA guideline
Vacuum ultraviolet photoabsorption of prime ice analogues of Pluto and Charon
Here we present the first Vacuum UltraViolet (VUV) photoabsorption spectra of ice analogues of Pluto and Charon ice mixtures. For Pluto the ice analogue is an icy mixture containing nitrogen (N2), carbon monoxide (CO), methane (CH4) and water (H2O) prepared with a 100:1:1:3 ratio, respectively. Photoabsorption of icy mixtures with and without H2O were recorded and no significant changes in the spectra due to presence of H2O were observed. For Charon a VUV photoabsorption spectra of an ice analogue containing ammonia (NH3) and H2O prepared with a 1:1 ratio was recorded, a spectrum of ammonium hydroxide (NH4OH) was also recorded. These spectra may help to interpret the P-Alice data from New Horizons
Entanglement degradation in the solid state: interplay of adiabatic and quantum noise
We study entanglement degradation of two non-interacting qubits subject to
independent baths with broadband spectra typical of solid state nanodevices. We
obtain the analytic form of the concurrence in the presence of adiabatic noise
for classes of entangled initial states presently achievable in experiments. We
find that adiabatic (low frequency) noise affects entanglement reduction
analogously to pure dephasing noise. Due to quantum (high frequency) noise,
entanglement is totally lost in a state-dependent finite time. The possibility
to implement on-chip both local and entangling operations is briefly discussed.Comment: Replaced with published version. Minor change
Recurrent deficit irrigation and fruit harvest affect tree water relations and fruitlet growth in ‘Valencia’ orange
Background. Partial rootzone drying is an irrigation strategy known for increasing water use efficiency without significantly affecting tree water status. ‘Valencia’ oranges have a very long development period and nearly mature fruit and new fruitlets may be present at the same time on the tree, competing for water and assimilates. Objectives. The present study investigates the effect of recurrent deficit irrigation and fruit harvest on tree water status and fruitlet growth of ‘Valencia’ orange. Methods. Forty-eight adult trees were exposed to three irrigation treatments for seven years (2007-2013): irrigation with 100% of ETc (CI), continuous deficit irrigation (DI, 50% of CI) and partial root-zone drying (PRD, 50% of CI on alternated sides of the root-zone). In spring 2014, stem water potential (Ψstem) and continuous measurements of sap flow and fruitlet growth were recorded before (May) and after (June) the harvest of mature fruit. Results. No differences in Ψstem were found among irrigation treatments, while Ψstem was lower in June than in May at midday. In both May and June, sap flow density (not sap flow per tree) was higher in DI than in CI and PRD trees suggesting more efficient water uptake/transport in the former. In May, DI and PRD fruit showed lower daily relative growth rate (RGR) than CI fruit due to a possible shortage of carbon and nutrients. After removing mature fruits, differences among irrigation treatments were canceled. Sap flow was directly related to fruit RGR at low sap flow rates, but inversely related to RGR at high sap flow rates. Conclusions. Our data show that the presence of maturing fruit does not impact the water status of ‘Valencia’ trees, while it may transiently limit fruitlet growth (by source limitation) in deficit irrigated trees
- …
