101 research outputs found

    Heisenberg exchange parameters of molecular magnets from the high-temperature susceptibility expansion

    Full text link
    We provide exact analytical expressions for the magnetic susceptibility function in the high temperature expansion for finite Heisenberg spin systems with an arbitrary coupling matrix, arbitrary single-spin quantum number, and arbitrary number of spins. The results can be used to determine unknown exchange parameters from zero-field magnetic susceptibility measurements without diagonalizing the system Hamiltonian. We demonstrate the possibility of reconstructing the exchange parameters from simulated data for two specific model systems. We examine the accuracy and stability of the proposed method.Comment: 13 pages, 7 figures, submitted to Phys. Rev.

    Calculating the energy spectra of magnetic molecules: application of real- and spin-space symmetries

    Full text link
    The determination of the energy spectra of small spin systems as for instance given by magnetic molecules is a demanding numerical problem. In this work we review numerical approaches to diagonalize the Heisenberg Hamiltonian that employ symmetries; in particular we focus on the spin-rotational symmetry SU(2) in combination with point-group symmetries. With these methods one is able to block-diagonalize the Hamiltonian and thus to treat spin systems of unprecedented size. In addition it provides a spectroscopic labeling by irreducible representations that is helpful when interpreting transitions induced by Electron Paramagnetic Resonance (EPR), Nuclear Magnetic Resonance (NMR) or Inelastic Neutron Scattering (INS). It is our aim to provide the reader with detailed knowledge on how to set up such a diagonalization scheme.Comment: 29 pages, many figure

    When is a test not a proof?

    Get PDF
    A common primitive in election and auction protocols is plaintext equivalence test (PET) in which two ciphertexts are tested for equality of their plaintexts, and a verifiable proof of the test\u27s outcome is provided. The most commonly-cited PETs require at least one honest party, but many applications claim universal verifiability, at odds with this requirement. If a test that relies on at least one honest participant is mistakenly used in a place where universally verifiable proof is needed, then a collusion by all participants can insert a forged proof of equality into the tallying transcript. We show this breaks universal verifiability for the JCJ/Civitas scheme among others, because the only PETs they reference are not universally verifiable. We then demonstrate how to fix the problem

    Signing Information in the Quantum Era

    Get PDF
    Signatures are primarily used as a mark of authenticity, to demonstrate that the sender of a message is who they claim to be. In the current digital age, signatures underpin trust in the vast majority of information that we exchange, particularly on public networks such as the internet. However, schemes for signing digital information which are based on assumptions of computational complexity are facing challenges from advances in mathematics, the capability of computers, and the advent of the quantum era. Here we present a review of digital signature schemes, looking at their origins and where they are under threat. Next, we introduce post-quantum digital schemes, which are being developed with the specific intent of mitigating against threats from quantum algorithms whilst still relying on digital processes and infrastructure. Finally, we review schemes for signing information carried on quantum channels, which promise provable security metrics. Signatures were invented as a practical means of authenticating communications and it is important that the practicality of novel signature schemes is considered carefully, which is kept as a common theme of interest throughout this review

    Host-Based Th2 Cell Therapy for Prolongation of Cardiac Allograft Viability

    Get PDF
    Donor T cell transfusion, which is a long-standing approach to prevent allograft rejection, operates indirectly by alteration of host T cell immunity. We therefore hypothesized that adoptive transfer of immune regulatory host Th2 cells would represent a novel intervention to enhance cardiac allograft survival. Using a well-described rat cardiac transplant model, we first developed a method for ex vivo manufacture of rat host-type Th2 cells in rapamycin, with subsequent injection of such Th2.R cells prior to class I and class II disparate cardiac allografting. Second, we determined whether Th2.R cell transfer polarized host immunity towards a Th2 phenotype. And third, we evaluated whether Th2.R cell therapy prolonged allograft viability when used alone or in combination with a short-course of cyclosporine (CSA) therapy. We found that host-type Th2.R cell therapy prior to cardiac allografting: (1) reduced the frequency of activated T cells in secondary lymphoid organs; (2) shifted post-transplant cytokines towards a Th2 phenotype; and (3) prolonged allograft viability when used in combination with short-course CSA therapy. These results provide further support for the rationale to use “direct” host T cell therapy for prolongation of allograft viability as an alternative to “indirect” therapy mediated by donor T cell infusion

    Reactive transport codes for subsurface environmental simulation

    Full text link

    Keep off the grass?:Cannabis, cognition and addiction

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.In an increasing number of states and countries, cannabis now stands poised to join alcohol and tobacco as a legal drug. Quantifying the relative adverse and beneficial effects of cannabis and its constituent cannabinoids should therefore be prioritized. Whereas newspaper headlines have focused on links between cannabis and psychosis, less attention has been paid to the much more common problem of cannabis addiction. Certain cognitive changes have also been attributed to cannabis use, although their causality and longevity are fiercely debated. Identifying why some individuals are more vulnerable than others to the adverse effects of cannabis is now of paramount importance to public health. Here, we review the current state of knowledge about such vulnerability factors, the variations in types of cannabis, and the relationship between these and cognition and addiction.This work was supported by grants from the US National Institutes of Health to L.H.P. (AA020404, AA006420, AA022249 and AA017447) and by grants from the UK Medical Research Council to H.V.C. and C.J.A.M. (G0800268; MR/K015524/1)
    corecore