153 research outputs found

    Generation of atom-photon entangled states in atomic Bose-Einstein condensate via electromagnetically induced transparency

    Full text link
    In this paper, we present a method to generate continuous-variable-type entangled states between photons and atoms in atomic Bose-Einstein condensate (BEC). The proposed method involves an atomic BEC with three internal states, a weak quantized probe laser and a strong classical coupling laser, which form a three-level Lambda-shaped BEC system. We consider a situation where the BEC is in electromagnetically induced transparency (EIT) with the coupling laser being much stronger than the probe laser. In this case, the upper and intermediate levels are unpopulated, so that their adiabatic elimination enables an effective two-mode model involving only the atomic field at the lowest internal level and the quantized probe laser field. Atom-photon quantum entanglement is created through laser-atom and inter-atomic interactions, and two-photon detuning. We show how to generate atom-photon entangled coherent states and entangled states between photon (atom) coherent states and atom-(photon-) macroscopic quantum superposition (MQS) states, and between photon-MQS and atom-MQS states.Comment: 9 pages, 1 figur

    Problems with Saliency Maps

    Get PDF
    Despite the popularity that saliency models have gained in the computer vision community, they are most often conceived, exploited and benchmarked without taking heed of a number of problems and subtle issues they bring about. When saliency maps are used as proxies for the likelihood of fixating a location in a viewed scene, one such issue is the temporal dimension of visual attention deployment. Through a simple simulation it is shown how neglecting this dimension leads to results that at best cast shadows on the predictive performance of a model and its assessment via benchmarking procedures

    The Security of Practical Quantum Key Distribution

    Full text link
    Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power. The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change

    How to look next? A data-driven approach for scanpath prediction

    Get PDF
    By and large, current visual attention models mostly rely, when considering static stimuli, on the following procedure. Given an image, a saliency map is computed, which, in turn, might serve the purpose of predicting a sequence of gaze shifts, namely a scanpath instantiating the dynamics of visual attention deployment. The temporal pattern of attention unfolding is thus confined to the scanpath generation stage, whilst salience is conceived as a static map, at best conflating a number of factors (bottom-up information, top-down, spatial biases, etc.). In this note we propose a novel sequential scheme that consists of a three-stage processing relying on a center-bias model, a context/layout model, and an object-based model, respectively. Each stage contributes, at different times, to the sequential sampling of the final scanpath. We compare the method against classic scanpath generation that exploits state-of-the-art static saliency model. Results show that accounting for the structure of the temporal unfolding leads to gaze dynamics close to human gaze behaviour

    Of cattle, sand flies and men : a systematic review of risk factor analyses for South Asian visceral leishmaniasis and implications for elimination

    Get PDF
    Background: Studies performed over the past decade have identified fairly consistent epidemiological patterns of risk factors for visceral leishmaniasis (VL) in the Indian subcontinent. Methods and Principal Findings: To inform the current regional VL elimination effort and identify key gaps in knowledge, we performed a systematic review of the literature, with a special emphasis on data regarding the role of cattle because primary risk factor studies have yielded apparently contradictory results. Because humans form the sole infection reservoir, clustering of kala-azar cases is a prominent epidemiological feature, both at the household level and on a larger scale. Subclinical infection also tends to show clustering around kala-azar cases. Within villages, areas become saturated over a period of several years; kala-azar incidence then decreases while neighboring areas see increases. More recently, post kalaazar dermal leishmaniasis (PKDL) cases have followed kala-azar peaks. Mud walls, palpable dampness in houses, and peridomestic vegetation may increase infection risk through enhanced density and prolonged survival of the sand fly vector. Bed net use, sleeping on a cot and indoor residual spraying are generally associated with decreased risk. Poor micronutrient status increases the risk of progression to kala-azar. The presence of cattle is associated with increased risk in some studies and decreased risk in others, reflecting the complexity of the effect of bovines on sand fly abundance, aggregation, feeding behavior and leishmanial infection rates. Poverty is an overarching theme, interacting with individual risk factors on multiple levels. Conclusions: Carefully designed demonstration projects, taking into account the complex web of interconnected risk factors, are needed to provide direct proof of principle for elimination and to identify the most effective maintenance activities to prevent a rapid resurgence when interventions are scaled back. More effective, short-course treatment regimens for PKDL are urgently needed to enable the elimination initiative to succeed

    Magnetism, FeS colloids, and Origins of Life

    Full text link
    A number of features of living systems: reversible interactions and weak bonds underlying motor-dynamics; gel-sol transitions; cellular connected fractal organization; asymmetry in interactions and organization; quantum coherent phenomena; to name some, can have a natural accounting via physicalphysical interactions, which we therefore seek to incorporate by expanding the horizons of `chemistry-only' approaches to the origins of life. It is suggested that the magnetic 'face' of the minerals from the inorganic world, recognized to have played a pivotal role in initiating Life, may throw light on some of these issues. A magnetic environment in the form of rocks in the Hadean Ocean could have enabled the accretion and therefore an ordered confinement of super-paramagnetic colloids within a structured phase. A moderate H-field can help magnetic nano-particles to not only overcome thermal fluctuations but also harness them. Such controlled dynamics brings in the possibility of accessing quantum effects, which together with frustrations in magnetic ordering and hysteresis (a natural mechanism for a primitive memory) could throw light on the birth of biological information which, as Abel argues, requires a combination of order and complexity. This scenario gains strength from observations of scale-free framboidal forms of the greigite mineral, with a magnetic basis of assembly. And greigite's metabolic potential plays a key role in the mound scenario of Russell and coworkers-an expansion of which is suggested for including magnetism.Comment: 42 pages, 5 figures, to be published in A.R. Memorial volume, Ed Krishnaswami Alladi, Springer 201

    Cargo Cults in Information Systems Development: a Definition and an Analytical Framework

    Get PDF
    Organizations today adopt agile information systems development methods (ISDM), but many do not succeed with the adoption process and in achieving desired results. Systems developers sometimes fail in efficient use of ISDM, often due to a lack of understanding the fundamental intentions of the chosen method. In many cases organizations simply imitate the behavior of others without really understanding why. This conceptual paper defines this phenomenon as an ISDM cargo cult behavior and proposes an analytical framework to identify such situations. The concept of cargo cults originally comes from the field of social anthropology and has been used to explain irrational, ritualistic imitation of certain behavior. By defining and introducing the concept in the field of information systems development we provide a diagnostic tool to better understand one of the reasons why ISDM adoption sometimes fail

    Characterising the phenotypic diversity of Papilio dardanus wing patterns using an extensive museum collection

    Get PDF
    The history of 20th Century evolutionary biology can be followed through the study of mimetic butterflies. From the initial findings of discontinuous polymorphism through the debates regarding the evolution of mimicry and the step-size of evolutionary change, to the studies on supergene evolution and molecular characterisation of butterfly genomes, mimetic butterflies have been at the heart of evolutionary thought for over 100 years. During this time, few species have received as much attention and in-depth study as Papilio dardanus. To assist all aspects of mimicry research, we present a complete data-derived overview of the extent of polymorphism within this species. Using historical samples permanently held by the NHM London, we document the extent of phenotypic variation and characterise the diversity present in each of the subspecies and how it varies across Africa. We also demonstrate an association between “imperfect” mimetic forms and the transitional race formed in the area where Eastern and Western African populations meet around Lake Victoria. We present a novel portal for access to this collection, www.mimeticbutterflies.org, allowing remote access to this unique repository. It is hoped that this online resource can act as a nucleus for the sharing and dissemination of other collections databases and imagery connected with mimetic butterflies

    Generalized Matrix Factorizations as a Unifying Framework for Pattern Set Mining: Complexity Beyond Blocks

    Full text link
    Abstract. Matrix factorizations are a popular tool to mine regularities from data. There are many ways to interpret the factorizations, but one particularly suited for data mining utilizes the fact that a matrix product can be interpreted as a sum of rank-1 matrices. Then the factorization of a matrix becomes the task of finding a small number of rank-1 matrices, sum of which is a good representation of the original matrix. Seen this way, it becomes obvious that many problems in data mining can be expressed as matrix factorizations with correct definitions of what a rank-1 matrix and a sum of rank-1 matrices mean. This paper develops a unified theory, based on generalized outer product operators, that encompasses many pattern set mining tasks. The focus is on the computational aspects of the theory and studying the computational complexity and approximability of many problems related to generalized matrix factorizations. The results immediately apply to a large number of data mining problems, and hopefully allow generalizing future results and algorithms, as well.

    Control of Visceral Leishmaniasis in Latin America—A Systematic Review

    Get PDF
    Visceral leishmaniasis is a vector-borne disease characterized by fever, spleen and liver enlargement, and low blood cell counts. In the Americas VL is zoonotic, with domestic dogs as main animal reservoirs, and is caused by the intracellular parasite Leishmania infantum (syn. Leishmania chagasi). Humans acquire the infection through the bite of an infected sand fly. The disease is potentially lethal if untreated. VL is reported from Mexico to Argentina, with recent trends showing a rapid spread in Brazil. Control measures directed against the canine reservoir and insect vectors have been unsuccessful, and early detection and treatment of human cases remains as the most important strategy to reduce case fatality. Well-designed studies evaluating diagnosis, treatment, and prevention/control interventions are scarce. The available scientific evidence reasonably supports the use of rapid diagnostic tests for the diagnosis of human disease. Properly designed randomized controlled trials following good clinical practices are needed to inform drug policy. Routine control strategies against the canine reservoirs and insect vectors are based on weak and conflicting evidence, and vector control strategies and vaccine development should constitute research priorities
    corecore