1,847 research outputs found
Species status of Neisseria gonorrhoeae: Evolutionary and epidemiological inferences from multilocus sequence typing
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0),
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited - Copyright @ 2007 Bennett et al; licensee BioMed Central Ltd.Background: Various typing methods have been developed for Neisseria gonorrhoeae, but none provide the combination of discrimination, reproducibility, portability, and genetic inference that allows the analysis of all aspects of the epidemiology of this pathogen from a single data set. Multilocus sequence typing (MLST) has been used successfully to characterize the related organisms Neisseria meningitidis and Neisseria lactamica. Here, the same seven locus Neisseria scheme was used to characterize a diverse collection of N. gonorrhoeae isolates to investigate whether this method would allow differentiation among isolates, and to distinguish these three species. Results: A total of 149 gonococcal isolates were typed and submitted to the Neisseria MLST database. Although relatively few (27) polymorphisms were detected among the seven MLST loci, a total of 66 unique allele combinations (sequence types, STs), were observed, a number comparable to that seen among isolate collections of the more diverse meningococcus. Patterns of genetic variation were consistent with high levels of recombination generating this diversity. There was no evidence for geographical structuring among the isolates examined, with isolates collected in Liverpool, UK, showing levels of diversity similar to a global collection of isolates. There was, however, evidence that populations of N. meningitidis, N. gonorrhoeae and N. lactamica were distinct, with little support for frequent genetic recombination among these species, with the sequences from the gdh locus alone grouping the species into distinct clusters. Conclusion: The seven loci Neisseria MLST scheme was readily adapted to N. gonorrhoeae isolates, providing a highly discriminatory typing method. In addition, these data permitted phylogenetic and population genetic inferences to be made, including direct comparisons with N. meningitidis and N. lactamica. Examination of these data demonstrated that alleles were rarely shared among the three species. Analysis of variation at a single locus, gdh, provided a rapid means of identifying misclassified isolates and determining whether mixed cultures were present.This study is funded by the Wellcome Trust and European Unio
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored as an alternative means to
implement quantum key distribution, which is usually based on single photon
counting. The former approach is potentially advantageous because it should
enable higher key distribution rates. Here we propose and experimentally
demonstrate a quantum key distribution protocol based on the transmission of
gaussian-modulated coherent states (consisting of laser pulses containing a few
hundred photons) and shot-noise-limited homodyne detection; squeezed or
entangled beams are not required. Complete secret key extraction is achieved
using a reverse reconciliation technique followed by privacy amplification. The
reverse reconciliation technique is in principle secure for any value of the
line transmission, against gaussian individual attacks based on entanglement
and quantum memories. Our table-top experiment yields a net key transmission
rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per
second for a line with losses of 3.1 dB. We anticipate that the scheme should
remain effective for lines with higher losses, particularly because the present
limitations are essentially technical, so that significant margin for
improvement is available on both the hardware and software.Comment: 8 pages, 4 figure
Triggering information by context
With the increased availability of personal computers with attached sensors to capture their environment, there is a big opportunity for context-aware applications; these automatically provide information and/or take actions according to the user's present context, as detected by sensors. When wel l designed, these applications provide an opportunity to tailor the provision of information closely to the user's current needs. A sub-set of context-a ware applications are discrete applications, where discrete pieces of i nformation are attached to individual contexts, to be triggered when the user enters those contexts. The advantage of discrete applications is that authori ng them can be solely a creative process rather than a programming process: it can be a task akin to creating simple web pages. This paper looks at a general system that can be used in any discrete context- aware application. It propounds a general triggering rule, and investigates how this rule applies in practical applications
Recommended from our members
River channel width controls blocking by slow-moving landslides in California's Franciscan melange
This is the final version. Available from European Geosciences Union via the DOI in this record. To explore the sensitivity of rivers to blocking from landslide debris, we exploit two similar geomorphic settings in California's Franciscan mélange where slow-moving landslides, often referred to as earthflows, impinge on river channels with drainage areas that differ by a factor of 30. Analysis of valley widths and river long profiles over ∼19 km of Alameda Creek (185 km2 drainage area) and Arroyo Hondo (200 km2 drainage area) in central California shows a very consistent picture in which earthflows that intersect these channels force tens of meters of gravel aggradation for kilometers upstream, leading to apparently long-lived sediment storage and channel burial at these sites. In contrast, over a ∼30 km section of the Eel River (5547 km2 drainage area), there are no knickpoints or aggradation upstream of locations where earthflows impinge on its channel. Hydraulic and hydrologic data from United States Geological Survey (USGS) gages on Arroyo Hondo and the Eel River, combined with measured size distributions of boulders input by landslides for both locations, suggest that landslide derived boulders are not mobile at either site during the largest floods (>2-year recurrence) with field-measured flow depths. We therefore argue that boulder transport capacity is an unlikely explanation for the observed difference in sensitivity to landslide inputs. At the same time, we find that earthflow fluxes per unit channel width are nearly identical for Oak Ridge earthflow on Arroyo Hondo, where evidence for blocking is clear, and for the Boulder Creek earthflow on the Eel River, where evidence for blocking is absent. These observations suggest that boulder supply is also an unlikely explanation for the observed morphological differences along the two rivers. Instead, we argue that the dramatically different sensitivity of the two locations to landslide blocking is related to differences in channel width relative to typical seasonal displacements of earthflows. A synthesis of seasonal earthflow displacements in the Franciscan mélange shows that the channel width of the Eel River is ∼5 times larger than the largest annual seasonal displacement. In contrast, during wet winters, earthflows are capable of crossing the entire channel width of Arroyo Hondo and Alameda Creek. In support of this interpretation, satellite imagery shows that immobile earthflow-derived boulders are generally confined to the edges of the channel on the Eel River. By contrast, immobile earthflow-derived boulders jam the entire channel on Arroyo Hondo. Our results imply that lower drainage area reaches of earthflow-dominated catchments may be particularly prone to blocking. By inhibiting the upstream propagation of base-level signals, valley-blocking earthflows may therefore promote the formation of so-called “relict topography”.National Science Foundatio
A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries
In privacy amplification, two mutually trusted parties aim to amplify the
secrecy of an initial shared secret in order to establish a shared private
key by exchanging messages over an insecure communication channel. If the
channel is authenticated the task can be solved in a single round of
communication using a strong randomness extractor; choosing a quantum-proof
extractor allows one to establish security against quantum adversaries.
In the case that the channel is not authenticated, Dodis and Wichs (STOC'09)
showed that the problem can be solved in two rounds of communication using a
non-malleable extractor, a stronger pseudo-random construction than a strong
extractor.
We give the first construction of a non-malleable extractor that is secure
against quantum adversaries. The extractor is based on a construction by Li
(FOCS'12), and is able to extract from source of min-entropy rates larger than
. Combining this construction with a quantum-proof variant of the
reduction of Dodis and Wichs, shown by Cohen and Vidick (unpublished), we
obtain the first privacy amplification protocol secure against active quantum
adversaries
A tri-dimensional approach for auditing brand loyalty
Over the past twenty years brand loyalty has been an important topic for both marketing practitioners and academics. While practitioners have produced proprietary brand loyalty audit models, there has been little academic research to make transparent the methodology that underpins these audits and to enable practitioners to understand, develop and conduct their own audits. In this paper, we propose a framework for a brand loyalty audit that uses a tri-dimensional approach to brand loyalty, which includes behavioural loyalty and the two components of attitudinal loyalty: emotional and cognitive loyalty. In allowing for different levels and intensity of brand loyalty, this tri-dimensional approach is important from a managerial perspective. It means that loyalty strategies that arise from a brand audit can be made more effective by targeting the market segments that demonstrate the most appropriate combination of brand loyalty components. We propose a matrix with three dimensions (emotional, cognitive and behavioural loyalty) and two levels (high and low loyalty) to facilitate a brand loyalty audit. To demonstrate this matrix, we use the example of financial services, in particular a rewards-based credit card
Quantum uniqueness
In the classical world one can construct two identical systems which have
identical behavior and give identical measurement results. We show this to be
impossible in the quantum domain. We prove that after the same quantum
measurement two different quantum systems cannot yield always identical
results, provided the possible measurement results belong to a non orthogonal
set. This is interpreted as quantum uniqueness - a quantum feature which has no
classical analog. Its tight relation with objective randomness of quantum
measurements is discussed.Comment: Presented at 4th Feynman festival, June 22-26, 2009, in Olomouc,
Czech Republic
Quantum information can be negative
Given an unknown quantum state distributed over two systems, we determine how
much quantum communication is needed to transfer the full state to one system.
This communication measures the "partial information" one system needs
conditioned on it's prior information. It turns out to be given by an extremely
simple formula, the conditional entropy. In the classical case, partial
information must always be positive, but we find that in the quantum world this
physical quantity can be negative. If the partial information is positive, its
sender needs to communicate this number of quantum bits to the receiver; if it
is negative, the sender and receiver instead gain the corresponding potential
for future quantum communication. We introduce a primitive "quantum state
merging" which optimally transfers partial information. We show how it enables
a systematic understanding of quantum network theory, and discuss several
important applications including distributed compression, multiple access
channels and multipartite assisted entanglement distillation (localizable
entanglement). Negative channel capacities also receive a natural
interpretation
Flipping quantum coins
Coin flipping is a cryptographic primitive in which two distrustful parties
wish to generate a random bit in order to choose between two alternatives. This
task is impossible to realize when it relies solely on the asynchronous
exchange of classical bits: one dishonest player has complete control over the
final outcome. It is only when coin flipping is supplemented with quantum
communication that this problem can be alleviated, although partial bias
remains. Unfortunately, practical systems are subject to loss of quantum data,
which restores complete or nearly complete bias in previous protocols. We
report herein on the first implementation of a quantum coin-flipping protocol
that is impervious to loss. Moreover, in the presence of unavoidable
experimental noise, we propose to use this protocol sequentially to implement
many coin flips, which guarantees that a cheater unwillingly reveals
asymptotically, through an increased error rate, how many outcomes have been
fixed. Hence, we demonstrate for the first time the possibility of flipping
coins in a realistic setting. Flipping quantum coins thereby joins quantum key
distribution as one of the few currently practical applications of quantum
communication. We anticipate our findings to be useful for various
cryptographic protocols and other applications, such as an online casino, in
which a possibly unlimited number of coin flips has to be performed and where
each player is free to decide at any time whether to continue playing or not.Comment: 17 pages, 3 figure
The Politics of Ocean Governance Transformations
Recently, oceans have become the focus of substantial global attention and diverse appeals for “transformation.” Calls to transform ocean governance are motivated by various objectives, including the need to secure the rights of marginalized coastal communities, to boost ocean-based economic development, and to reverse global biodiversity loss. This paper examines the politics of ocean governance transformations through an analysis of three ongoing cases: the FAO’s voluntary guidelines for small-scale fisheries; debt-for-“blue”-nature swaps in the Seychelles; and the United Nations’ negotiations for a high seas’ treaty. We find that transformations are not inevitable or apolitical. Rather, changes are driven by an array of actors with different objectives and varying degrees of power. Objectives are articulated and negotiated through interactions that may reassemble rights, access, and control; however, there is also the potential that existing conditions become further entrenched rather than transformed at all. In particular, our analysis suggests that: (1) efforts to transform are situated in contested, historical landscapes that bias the trajectory of transformation, (2) power dynamics shape whose agendas and narratives drive transformational change, and (3) transformations create uneven distributions of costs and benefits that can facilitate or stall progress toward intended goals. As competing interests over ocean spaces continue to grow in the coming decades, understanding the processes through which ocean governance transformations can occur—and making the politics of transformative change more explicit—will be critical for realizing equitable ocean governance.</jats:p
- …