355 research outputs found

    Linear and nonlinear optical properties of realistic quantum-wire structures: The dominant role of Coulomb correlation

    Get PDF
    A systematic analysis of the linear and nonlinear optical properties of realistic quantum wires is presented. The proposed theoretical approach, based on a set of generalized semiconductor Bloch equations, provides a full three-dimensional multisubband description of carrier-carrier correlation for any profile of the confinement potential, thus allowing a direct comparison with experiments on available structures. In agreement with previous investigations based on simplified one-dimensional models, our analysis shows that, also for realistic quantum-wire structures, electron-hole Coulomb correlation completely removes the one-dimensional band-edge singularities from the linear-absorption spectra. Moreover, we find that this effect is present also at high densities (corresponding to gain regimes) and contributes significantly in suppressing the ideal sharp features of the free-carrier density of states. The multisubband nature of available state-of-the-art structures is found to play a dominant role in determining the overall spectral shape in the whole density range

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Microscopic theory of vertical-transport phenomena in semiconductor heterostructures: Interplay between two- and three-dimensional hot-carrier relaxation

    Get PDF
    A theoretical analysis of vertical-transport phenomena in semiconductor heterostructures is presented. In particular, the scattering coupling between two- and three-dimensional states in multiple quantum wells is investigated. To this purpose, a fully three-dimensional approach for the description of both localized and extended states in the heterostructure is proposed. Starting from such three-dimensional states, obtained from a self-consistent Schrödinger-Poisson calculation, a Monte Carlo solution of the corresponding Boltzmann transport equation is performed. In contrast to various phenomenological transport models, the present simulation scheme allows a kinetic description, i.e., based on microscopic scattering rates, of vertical transport across a generic heterostructure. Our results provide a rigorous description of hot-carrier relaxation between extended and localized states. This simulation scheme has been applied to finite multiple quantum wells with different geometries and doping profiles. A detailed analysis of the electron current as a function of temperature in quasiequilibrium conditions shows good agreement with experimental results. Moreover, in non-equilibrium conditions (i.e., hot-carrier regime) the scattering coupling between three- and two-dimensional states is found to play a significant role in modifying the carrier mobility as well as the fraction of conducting electrons

    Soft systems methodology: a context within a 50-year retrospective of OR/MS

    Get PDF
    Soft systems methodology (SSM) has been used in the practice of operations research and management science OR/MS) since the early 1970s. In the 1990s, it emerged as a viable academic discipline. Unfortunately, its proponents consider SSM and traditional systems thinking to be mutually exclusive. Despite the differences claimed by SSM proponents between the two, they have been complementary. An extensive sampling of the OR/MS literature over its entire lifetime demonstrates the richness with which the non-SSM literature has been addressing the very same issues as does SSM

    Ultrafast carrier relaxation and vertical-transport phenomena in semiconductor superlattices: A Monte Carlo analysis

    Get PDF
    The ultrafast dynamics of photoexcited carriers in semiconductor superlattices is studied theoretically on the basis of a Monte Carlo solution of the coupled Boltzmann transport equations for electrons and holes. The approach allows a kinetic description of the relevant interaction mechanisms such as intra- miniband and interminiband carrier-phonon scattering processes. The energy relaxation of photoexcited carriers, as well as their vertical transport, is investigated in detail. The effects of the multiminiband nature of the superlattice spectrum on the energy relaxation process are discussed with particular emphasis on the presence of Bloch oscillations induced by an external electric field. The analysis is performed for different superlattice structures and excitation conditions. It shows the dominant role of carrier-polar-optical-phonon interaction in determining the nature of the carrier dynamics in the low-density limit. In particular, the miniband width, compared to the phonon energy, turns out to be a relevant quantity in predicting the existence of Bloch oscillations

    Lung adenocarcinoma originates from retrovirus infection of proliferating type 2 pneumocytes during pulmonary post-natal development or tissue repair

    Get PDF
    Jaagsiekte sheep retrovirus (JSRV) is a unique oncogenic virus with distinctive biological properties. JSRV is the only virus causing a naturally occurring lung cancer (ovine pulmonary adenocarcinoma, OPA) and possessing a major structural protein that functions as a dominant oncoprotein. Lung cancer is the major cause of death among cancer patients. OPA can be an extremely useful animal model in order to identify the cells originating lung adenocarcinoma and to study the early events of pulmonary carcinogenesis. In this study, we demonstrated that lung adenocarcinoma in sheep originates from infection and transformation of proliferating type 2 pneumocytes (termed here lung alveolar proliferating cells, LAPCs). We excluded that OPA originates from a bronchioalveolar stem cell, or from mature post-mitotic type 2 pneumocytes or from either proliferating or non-proliferating Clara cells. We show that young animals possess abundant LAPCs and are highly susceptible to JSRV infection and transformation. On the contrary, healthy adult sheep, which are normally resistant to experimental OPA induction, exhibit a relatively low number of LAPCs and are resistant to JSRV infection of the respiratory epithelium. Importantly, induction of lung injury increased dramatically the number of LAPCs in adult sheep and rendered these animals fully susceptible to JSRV infection and transformation. Furthermore, we show that JSRV preferentially infects actively dividing cell in vitro. Overall, our study provides unique insights into pulmonary biology and carcinogenesis and suggests that JSRV and its host have reached an evolutionary equilibrium in which productive infection (and transformation) can occur only in cells that are scarce for most of the lifespan of the sheep. Our data also indicate that, at least in this model, inflammation can predispose to retroviral infection and cancer

    The Communication Complexity of Threshold Private Set Intersection

    Get PDF
    Threshold private set intersection enables Alice and Bob who hold sets AA and BB of size nn to compute the intersection ABA \cap B if the sets do not differ by more than some threshold parameter tt. In this work, we investigate the communication complexity of this problem and we establish the first upper and lower bounds. We show that any protocol has to have a communication complexity of Ω(t)\Omega(t). We show that an almost matching upper bound of O~(t)\tilde{\mathcal{O}}(t) can be obtained via fully homomorphic encryption. We present a computationally more efficient protocol based on weaker assumptions, namely additively homomorphic encryption, with a communication complexity of O~(t2)\tilde{\mathcal{O}}(t^2). We show how our protocols can be extended to the multiparty setting. For applications like biometric authentication, where a given fingerprint has to have a large intersection with a fingerprint from a database, our protocols may result in significant communication savings. We, furthermore, show how to extend all of our protocols to the multiparty setting. Prior to this work, all previous protocols had a communication complexity of Ω(n)\Omega(n). Our protocols are the first ones with communication complexities that mainly depend on the threshold parameter tt and only logarithmically on the set size nn

    Large-scale integration of cancer microarray data identifies a robust common cancer signature

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>There is a continuing need to develop molecular diagnostic tools which complement histopathologic examination to increase the accuracy of cancer diagnosis. DNA microarrays provide a means for measuring gene expression signatures which can then be used as components of genomic-based diagnostic tests to determine the presence of cancer.</p> <p>Results</p> <p>In this study, we collect and integrate ~ 1500 microarray gene expression profiles from 26 published cancer data sets across 21 major human cancer types. We then apply a statistical method, referred to as the <it>T</it>op-<it>S</it>coring <it>P</it>air of <it>G</it>roups (TSPG) classifier, and a repeated random sampling strategy to the integrated training data sets and identify a common cancer signature consisting of 46 genes. These 46 genes are naturally divided into two distinct groups; those in one group are typically expressed less than those in the other group for cancer tissues. Given a new expression profile, the classifier discriminates cancer from normal tissues by ranking the expression values of the 46 genes in the cancer signature and comparing the average ranks of the two groups. This signature is then validated by applying this decision rule to independent test data.</p> <p>Conclusion</p> <p>By combining the TSPG method and repeated random sampling, a robust common cancer signature has been identified from large-scale microarray data integration. Upon further validation, this signature may be useful as a robust and objective diagnostic test for cancer.</p
    corecore