811 research outputs found

    Material Transport in the Ocean Mixed Layer: Recent Developments Enabled by Large Eddy Simulations

    Get PDF
    Material transport in the ocean mixed layer (OML) is an important component of natural processes such as gas and nutrient exchanges. It is also important in the context of pollution (oil droplets, microplastics, etc.). Observational studies of small-scale three-dimensional turbulence in the OML are difficult, especially if one aims at a systematic coverage of relevant parameters and their effects, under controlled conditions. Numerical studies are also challenging due to the large-scale separation between the physical processes dominating transport in the horizontal and vertical directions. Despite this difficulty, the application of large eddy simulation (LES) to study OML turbulence and, more specifically, its effects on material transport has resulted in major advances in the field in recent years. In this paper we review the use of LES to study material transport within the OML and then summarize and synthesize the advances it has enabled in the past decade or so. In the first part we describe the LES technique and the most common approaches when applying it in OML material transport investigations. In the second part we review recent results on material transport obtained using LES and comment on implications

    A framework for space-efficient string kernels

    Full text link
    String kernels are typically used to compare genome-scale sequences whose length makes alignment impractical, yet their computation is based on data structures that are either space-inefficient, or incur large slowdowns. We show that a number of exact string kernels, like the kk-mer kernel, the substrings kernels, a number of length-weighted kernels, the minimal absent words kernel, and kernels with Markovian corrections, can all be computed in O(nd)O(nd) time and in o(n)o(n) bits of space in addition to the input, using just a rangeDistinct\mathtt{rangeDistinct} data structure on the Burrows-Wheeler transform of the input strings, which takes O(d)O(d) time per element in its output. The same bounds hold for a number of measures of compositional complexity based on multiple value of kk, like the kk-mer profile and the kk-th order empirical entropy, and for calibrating the value of kk using the data

    Approximating open quantum system dynamics in a controlled and efficient way: A microscopic approach to decoherence

    Get PDF
    We demonstrate that the dynamics of an open quantum system can be calculated efficiently and with predefined error, provided a basis exists in which the system-environment interactions are local and hence obey the Lieb-Robinson bound. We show that this assumption can generally be made. Defining a dynamical renormalization group transformation, we obtain an effective Hamiltonian for the full system plus environment that comprises only those environmental degrees of freedom that are within the effective light cone of the system. The reduced system dynamics can therefore be simulated with a computational effort that scales at most polynomially in the interaction time and the size of the effective light cone. Our results hold for generic environments consisting of either discrete or continuous degrees of freedom

    Postprocessing for quantum random number generators: entropy evaluation and randomness extraction

    Full text link
    Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical noises. To distill this quantum randomness, one needs to quantify the randomness of the source and apply a randomness extractor. Here, we propose a generic framework for evaluating quantum randomness of real-life QRNGs by min-entropy, and apply it to two different existing quantum random-number systems in the literature. Moreover, we provide a guideline of QRNG data postprocessing for which we implement two information-theoretically provable randomness extractors: Toeplitz-hashing extractor and Trevisan's extractor.Comment: 13 pages, 2 figure

    Practical private database queries based on a quantum key distribution protocol

    Get PDF
    Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum key distribution protocol, with changes only in the classical post-processing of the key. This approach makes our scheme both easy to implement and loss-tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved, relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both user and database. We think that there is scope for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims, expanded security discussio

    UVB radiation induced effects on cells studied by FTIR spectroscopy

    Full text link
    We have made a preliminary analysis of the results about the eVects on tumoral cell line (lymphoid T cell line Jurkat) induced by UVB radiation (dose of 310 mJ/cm^2) with and without a vegetable mixture. In the present study, we have used two techniques: Fourier transform infrared spectroscopy (FTIR) and flow cytometry. FTIR spectroscopy has the potential to provide the identiWcation of the vibrational modes of some of the major compounds (lipid, proteins and nucleic acids) without being invasive in the biomaterials. The second technique has allowed us to perform measurements of cytotoxicity and to assess the percentage of apoptosis. We already studied the induction of apoptotic process in the same cell line by UVB radiation; in particular, we looked for correspondences and correlations between FTIR spetroscopy and flow cytometry data finding three highly probable spectroscopic markers of apoptosis (Pozzi et al. in Radiat Res 168:698-705, 2007). In the present work, the results have shown significant changes in the absorbance and spectral pattern in the wavenumber protein and nucleic acids regions after the treatments

    Order-Revealing Encryption and the Hardness of Private Learning

    Get PDF
    An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning from efficient (Ï”,ÎŽ)(\epsilon, \delta)-differentially private PAC learning. That is, we construct a concept class that is efficiently PAC learnable, but for which every efficient learner fails to be differentially private. This answers a question of Kasiviswanathan et al. (FOCS '08, SIAM J. Comput. '11). To prove our result, we give a generic transformation from an order-revealing encryption scheme into one with strongly correct comparison, which enables the consistent comparison of ciphertexts that are not obtained as the valid encryption of any message. We believe this construction may be of independent interest.Comment: 28 page

    Determinants of adults' intention to vaccinate against pandemic swine flu

    Get PDF
    This article has been made available through the Brunel Open Access Publishing Fund.This article has been made available through the Brunel Open Access Publishing Fund.Background: Vaccination is one of the cornerstones of controlling an influenza pandemic. To optimise vaccination rates in the general population, ways of identifying determinants that influence decisions to have or not to have a vaccination need to be understood. Therefore, this study aimed to predict intention to have a swine influenza vaccination in an adult population in the UK. An extension of the Theory of Planned Behaviour provided the theoretical framework for the study. Methods: Three hundred and sixty two adults from the UK, who were not in vaccination priority groups, completed either an online (n = 306) or pen and paper (n = 56) questionnaire. Data were collected from 30th October 2009, just after swine flu vaccination became available in the UK, and concluded on 31st December 2009. The main outcome of interest was future swine flu vaccination intentions. Results: The extended Theory of Planned Behaviour predicted 60% of adults’ intention to have a swine flu vaccination with attitude, subjective norm, perceived control, anticipating feelings of regret (the impact of missing a vaccination opportunity), intention to have a seasonal vaccine this year, one perceived barrier: “I cannot be bothered to get a swine flu vaccination” and two perceived benefits: “vaccination decreases my chance of getting swine flu or its complications” and “if I get vaccinated for swine flu, I will decrease the frequency of having to consult my doctor,” being significant predictors of intention. Black British were less likely to intend to have a vaccination compared to Asian or White respondents. Conclusions: Theoretical frameworks which identify determinants that influence decisions to have a pandemic influenza vaccination are useful. The implications of this research are discussed with a view to maximising any future pandemic influenza vaccination uptake using theoretically-driven applications.This article is available through the Brunel Open Access Publishing Fund

    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    Get PDF
    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model
    • 

    corecore