1,847 research outputs found

    Species status of Neisseria gonorrhoeae: Evolutionary and epidemiological inferences from multilocus sequence typing

    Get PDF
    This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited - Copyright @ 2007 Bennett et al; licensee BioMed Central Ltd.Background: Various typing methods have been developed for Neisseria gonorrhoeae, but none provide the combination of discrimination, reproducibility, portability, and genetic inference that allows the analysis of all aspects of the epidemiology of this pathogen from a single data set. Multilocus sequence typing (MLST) has been used successfully to characterize the related organisms Neisseria meningitidis and Neisseria lactamica. Here, the same seven locus Neisseria scheme was used to characterize a diverse collection of N. gonorrhoeae isolates to investigate whether this method would allow differentiation among isolates, and to distinguish these three species. Results: A total of 149 gonococcal isolates were typed and submitted to the Neisseria MLST database. Although relatively few (27) polymorphisms were detected among the seven MLST loci, a total of 66 unique allele combinations (sequence types, STs), were observed, a number comparable to that seen among isolate collections of the more diverse meningococcus. Patterns of genetic variation were consistent with high levels of recombination generating this diversity. There was no evidence for geographical structuring among the isolates examined, with isolates collected in Liverpool, UK, showing levels of diversity similar to a global collection of isolates. There was, however, evidence that populations of N. meningitidis, N. gonorrhoeae and N. lactamica were distinct, with little support for frequent genetic recombination among these species, with the sequences from the gdh locus alone grouping the species into distinct clusters. Conclusion: The seven loci Neisseria MLST scheme was readily adapted to N. gonorrhoeae isolates, providing a highly discriminatory typing method. In addition, these data permitted phylogenetic and population genetic inferences to be made, including direct comparisons with N. meningitidis and N. lactamica. Examination of these data demonstrated that alleles were rarely shared among the three species. Analysis of variation at a single locus, gdh, provided a rapid means of identifying misclassified isolates and determining whether mixed cultures were present.This study is funded by the Wellcome Trust and European Unio

    Quantum key distribution using gaussian-modulated coherent states

    Full text link
    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.Comment: 8 pages, 4 figure

    Triggering information by context

    Get PDF
    With the increased availability of personal computers with attached sensors to capture their environment, there is a big opportunity for context-aware applications; these automatically provide information and/or take actions according to the user's present context, as detected by sensors. When wel l designed, these applications provide an opportunity to tailor the provision of information closely to the user's current needs. A sub-set of context-a ware applications are discrete applications, where discrete pieces of i nformation are attached to individual contexts, to be triggered when the user enters those contexts. The advantage of discrete applications is that authori ng them can be solely a creative process rather than a programming process: it can be a task akin to creating simple web pages. This paper looks at a general system that can be used in any discrete context- aware application. It propounds a general triggering rule, and investigates how this rule applies in practical applications

    A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries

    Get PDF
    In privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret XX in order to establish a shared private key KK by exchanging messages over an insecure communication channel. If the channel is authenticated the task can be solved in a single round of communication using a strong randomness extractor; choosing a quantum-proof extractor allows one to establish security against quantum adversaries. In the case that the channel is not authenticated, Dodis and Wichs (STOC'09) showed that the problem can be solved in two rounds of communication using a non-malleable extractor, a stronger pseudo-random construction than a strong extractor. We give the first construction of a non-malleable extractor that is secure against quantum adversaries. The extractor is based on a construction by Li (FOCS'12), and is able to extract from source of min-entropy rates larger than 1/21/2. Combining this construction with a quantum-proof variant of the reduction of Dodis and Wichs, shown by Cohen and Vidick (unpublished), we obtain the first privacy amplification protocol secure against active quantum adversaries

    A tri-dimensional approach for auditing brand loyalty

    Get PDF
    Over the past twenty years brand loyalty has been an important topic for both marketing practitioners and academics. While practitioners have produced proprietary brand loyalty audit models, there has been little academic research to make transparent the methodology that underpins these audits and to enable practitioners to understand, develop and conduct their own audits. In this paper, we propose a framework for a brand loyalty audit that uses a tri-dimensional approach to brand loyalty, which includes behavioural loyalty and the two components of attitudinal loyalty: emotional and cognitive loyalty. In allowing for different levels and intensity of brand loyalty, this tri-dimensional approach is important from a managerial perspective. It means that loyalty strategies that arise from a brand audit can be made more effective by targeting the market segments that demonstrate the most appropriate combination of brand loyalty components. We propose a matrix with three dimensions (emotional, cognitive and behavioural loyalty) and two levels (high and low loyalty) to facilitate a brand loyalty audit. To demonstrate this matrix, we use the example of financial services, in particular a rewards-based credit card

    Quantum uniqueness

    Full text link
    In the classical world one can construct two identical systems which have identical behavior and give identical measurement results. We show this to be impossible in the quantum domain. We prove that after the same quantum measurement two different quantum systems cannot yield always identical results, provided the possible measurement results belong to a non orthogonal set. This is interpreted as quantum uniqueness - a quantum feature which has no classical analog. Its tight relation with objective randomness of quantum measurements is discussed.Comment: Presented at 4th Feynman festival, June 22-26, 2009, in Olomouc, Czech Republic

    Quantum information can be negative

    Full text link
    Given an unknown quantum state distributed over two systems, we determine how much quantum communication is needed to transfer the full state to one system. This communication measures the "partial information" one system needs conditioned on it's prior information. It turns out to be given by an extremely simple formula, the conditional entropy. In the classical case, partial information must always be positive, but we find that in the quantum world this physical quantity can be negative. If the partial information is positive, its sender needs to communicate this number of quantum bits to the receiver; if it is negative, the sender and receiver instead gain the corresponding potential for future quantum communication. We introduce a primitive "quantum state merging" which optimally transfers partial information. We show how it enables a systematic understanding of quantum network theory, and discuss several important applications including distributed compression, multiple access channels and multipartite assisted entanglement distillation (localizable entanglement). Negative channel capacities also receive a natural interpretation

    Flipping quantum coins

    Get PDF
    Coin flipping is a cryptographic primitive in which two distrustful parties wish to generate a random bit in order to choose between two alternatives. This task is impossible to realize when it relies solely on the asynchronous exchange of classical bits: one dishonest player has complete control over the final outcome. It is only when coin flipping is supplemented with quantum communication that this problem can be alleviated, although partial bias remains. Unfortunately, practical systems are subject to loss of quantum data, which restores complete or nearly complete bias in previous protocols. We report herein on the first implementation of a quantum coin-flipping protocol that is impervious to loss. Moreover, in the presence of unavoidable experimental noise, we propose to use this protocol sequentially to implement many coin flips, which guarantees that a cheater unwillingly reveals asymptotically, through an increased error rate, how many outcomes have been fixed. Hence, we demonstrate for the first time the possibility of flipping coins in a realistic setting. Flipping quantum coins thereby joins quantum key distribution as one of the few currently practical applications of quantum communication. We anticipate our findings to be useful for various cryptographic protocols and other applications, such as an online casino, in which a possibly unlimited number of coin flips has to be performed and where each player is free to decide at any time whether to continue playing or not.Comment: 17 pages, 3 figure

    The Politics of Ocean Governance Transformations

    Full text link
    Recently, oceans have become the focus of substantial global attention and diverse appeals for “transformation.” Calls to transform ocean governance are motivated by various objectives, including the need to secure the rights of marginalized coastal communities, to boost ocean-based economic development, and to reverse global biodiversity loss. This paper examines the politics of ocean governance transformations through an analysis of three ongoing cases: the FAO’s voluntary guidelines for small-scale fisheries; debt-for-“blue”-nature swaps in the Seychelles; and the United Nations’ negotiations for a high seas’ treaty. We find that transformations are not inevitable or apolitical. Rather, changes are driven by an array of actors with different objectives and varying degrees of power. Objectives are articulated and negotiated through interactions that may reassemble rights, access, and control; however, there is also the potential that existing conditions become further entrenched rather than transformed at all. In particular, our analysis suggests that: (1) efforts to transform are situated in contested, historical landscapes that bias the trajectory of transformation, (2) power dynamics shape whose agendas and narratives drive transformational change, and (3) transformations create uneven distributions of costs and benefits that can facilitate or stall progress toward intended goals. As competing interests over ocean spaces continue to grow in the coming decades, understanding the processes through which ocean governance transformations can occur—and making the politics of transformative change more explicit—will be critical for realizing equitable ocean governance.</jats:p
    corecore