3,634 research outputs found

    Nonlinear interactions with an ultrahigh flux of broadband entangled photons

    Full text link
    We experimentally demonstrate sum-frequency generation (SFG) with entangled photon-pairs, generating as many as 40,000 SFG photons per second, visible even to the naked eye. The nonclassical nature of the interaction is exhibited by a linear intensity-dependence of the nonlinear process. The key element in our scheme is the generation of an ultrahigh flux of entangled photons while maintaining their nonclassical properties. This is made possible by generating the down-converted photons as broadband as possible, orders of magnitude wider than the pump. This approach is readily applicable for other nonlinear interactions, and may be applicable for various quantum-measurement tasks.Comment: 4 pages, 2 figures, Accepted to Phys. Rev. Let

    Secret-Sharing for NP

    Get PDF
    A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing schemes. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (STOC 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement "x in L" for a language L in NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not in L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP

    Heart rate variability before and after cycle exercise in relation to different body positions

    Get PDF
    The purpose of this study was to assess the effect of three different body positions on HRV measures following short-term submaximal exercise. Thirty young healthy males performed submaximal cycling for five minutes on three different occasions. Measures of HRV were obtained from 5-min R to R wave intervals before the exercise (baseline) and during the last five minutes of a 15 min recovery (post-exercise) in three different body positions (seated, supine, supine with elevated legs). Measures of the mean RR normal-to-normal intervals (RRNN), the standard deviation of normal-to-normal intervals (SDNN), the root mean square of successive differences (RMSSD) and the low-frequency (LF) and the high-frequency (HF) spectral power were analyzed. Post-exercise RRNN, RMSSD were significantly higher in the two supine positions (p 0.05). Post-exercise time domain measures of HRV (RRNN, SDNN, RMSSD) were significantly lower compared with baseline values (p < 0.01) regardless body position. Post-exercise ln LF and ln HF in all three positions remained significantly reduced during recovery compared to baseline values (p < 0.01). The present study suggests that 15 minutes following short-term submaximal exercise most of the time and frequency domain HRV measures have not returned to pre-exercise values. Modifications in autonomic cardiac regulation induced by body posture present at rest remained after exercise, but the post-exercise differences among the three positions did not resemble the ones established at res

    Non-Relativistic Gravitation: From Newton to Einstein and Back

    Full text link
    We present an improvement to the Classical Effective Theory approach to the non-relativistic or Post-Newtonian approximation of General Relativity. The "potential metric field" is decomposed through a temporal Kaluza-Klein ansatz into three NRG-fields: a scalar identified with the Newtonian potential, a 3-vector corresponding to the gravito-magnetic vector potential and a 3-tensor. The derivation of the Einstein-Infeld-Hoffmann Lagrangian simplifies such that each term corresponds to a single Feynman diagram providing a clear physical interpretation. Spin interactions are dominated by the exchange of the gravito-magnetic field. Leading correction diagrams corresponding to the 3PN correction to the spin-spin interaction and the 2.5PN correction to the spin-orbit interaction are presented.Comment: 10 pages, 3 figures. v2: published version. v3: Added a computation of Einstein-Infeld-Hoffmann in higher dimensions within our improved ClEFT which partially confirms and partially corrects a previous computation. See notes added at end of introductio

    Transcription factor interactions explain the context-dependent activity of CRX binding sites

    Get PDF
    The effects of transcription factor binding sites (TFBSs) on the activity of a cis-regulatory element (CRE) depend on the local sequence context. In rod photoreceptors, binding sites for the transcription factor (TF) Cone-rod homeobox (CRX) occur in both enhancers and silencers, but the sequence context that determines whether CRX binding sites contribute to activation or repression of transcription is not understood. To investigate the context-dependent activity of CRX sites, we fit neural network-based models to the activities of synthetic CREs composed of photoreceptor TFBSs. The models revealed that CRX binding sites consistently make positive, independent contributions to CRE activity, while negative homotypic interactions between sites cause CREs composed of multiple CRX sites to function as silencers. The effects of negative homotypic interactions can be overcome by the presence of other TFBSs that either interact cooperatively with CRX sites or make independent positive contributions to activity. The context-dependent activity of CRX sites is thus determined by the balance between positive heterotypic interactions, independent contributions of TFBSs, and negative homotypic interactions. Our findings explain observed patterns of activity among genomic CRX-bound enhancers and silencers, and suggest that enhancers may require diverse TFBSs to overcome negative homotypic interactions between TFBSs

    Matched Asymptotic Expansion for Caged Black Holes - Regularization of the Post-Newtonian Order

    Full text link
    The "dialogue of multipoles" matched asymptotic expansion for small black holes in the presence of compact dimensions is extended to the Post-Newtonian order for arbitrary dimensions. Divergences are identified and are regularized through the matching constants, a method valid to all orders and known as Hadamard's partie finie. It is closely related to "subtraction of self-interaction" and shows similarities with the regularization of quantum field theories. The black hole's mass and tension (and the "black hole Archimedes effect") are obtained explicitly at this order, and a Newtonian derivation for the leading term in the tension is demonstrated. Implications for the phase diagram are analyzed, finding agreement with numerical results and extrapolation shows hints for Sorkin's critical dimension - a dimension where the transition turns second order.Comment: 28 pages, 5 figures. v2:published versio

    Repercussions of the COVID-19 pandemic on child and adolescent mental health: A matter of concern—A joint statement from EAP and ECPCP

    Get PDF
    COVID-19 pandemic and the consequent rigid social distancing measures implemented, including school closures, have heavily impacted children's and adolescents' psychosocial wellbeing, and their mental health problems significantly increased. However, child and adolescent mental health were already a serious problem before the Pandemic all over the world. COVID-19 is not just a pandemic, it is a syndemic and mentally or socially disadvantaged children and adolescents are the most affected. Non-Communicable Diseases (NCDs) and previous mental health issues are an additional worsening condition. Even though many countries have responded with decisive efforts to scale-up mental health services, a more integrated and community-based approach to mental health is required. EAP and ECPCP makes recommendations to all the stakeholders to take action to promote, protect and care for the mental health of a generation

    PseudoGeneQuest – Service for identification of different pseudogene types in the human genome

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Pseudogenes, nonfunctional copies of genes, evolve fast due the lack of evolutionary pressures and thus appear in several different forms. PseudoGeneQuest is an online tool to search the human genome for a given query sequence and to identify different types of pseudogenes as well as novel genes and gene fragments.</p> <p>Description</p> <p>The service can detect pseudogenes, that have arisen either by retrotransposition or segmental genome duplication, many of which are not listed in the public pseudogene databases. The service has a user-friendly web interface and uses a powerful computer cluster in order to perform parallel searches and provide relatively fast runtimes despite exhaustive database searches and analyses.</p> <p>Conclusion</p> <p>PseudoGeneQuest is a versatile tool for detecting novel pseudogene candidates from the human genome. The service searches human genome sequences for five types of pseudogenes and provides an output that allows easy further analysis of observations. In addition to the result file the system provides visualization of the results linked to Ensembl Genome Browser. PseudoGeneQuest service is freely available.</p

    On the statistical leak of the GGH13 multilinear map and some variants

    Get PDF
    At EUROCRYPT 2013, Garg, Gentry and Halevi proposed a candidate construction (later referred as GGH13) of cryptographic multilinear map (MMap). Despite weaknesses uncovered by Hu and Jia (EUROCRYPT 2016), this candidate is still used for designing obfuscators.The naive version of the GGH13 scheme was deemed susceptible to averaging attacks, i.e., it could suffer from a statistical leak (yet no precise attack was described). A variant was therefore devised, but it remains heuristic. Recently, to obtain MMaps with low noise and modulus, two variants of this countermeasure were developed by Döttling et al. (EPRINT:2016/599).In this work, we propose a systematic study of this statistical leakage for all these GGH13 variants. In particular, we confirm the weakness of the naive version o
    • …
    corecore