154 research outputs found
Generation of atom-photon entangled states in atomic Bose-Einstein condensate via electromagnetically induced transparency
In this paper, we present a method to generate continuous-variable-type
entangled states between photons and atoms in atomic Bose-Einstein condensate
(BEC). The proposed method involves an atomic BEC with three internal states, a
weak quantized probe laser and a strong classical coupling laser, which form a
three-level Lambda-shaped BEC system. We consider a situation where the BEC is
in electromagnetically induced transparency (EIT) with the coupling laser being
much stronger than the probe laser. In this case, the upper and intermediate
levels are unpopulated, so that their adiabatic elimination enables an
effective two-mode model involving only the atomic field at the lowest internal
level and the quantized probe laser field. Atom-photon quantum entanglement is
created through laser-atom and inter-atomic interactions, and two-photon
detuning. We show how to generate atom-photon entangled coherent states and
entangled states between photon (atom) coherent states and atom-(photon-)
macroscopic quantum superposition (MQS) states, and between photon-MQS and
atom-MQS states.Comment: 9 pages, 1 figur
Problems with Saliency Maps
Despite the popularity that saliency models have gained in the computer vision community, they are most often conceived, exploited and benchmarked without taking heed of a number of problems and subtle issues they bring about. When saliency maps are used as proxies for the likelihood of fixating a location in a viewed scene, one such issue is the temporal dimension of visual attention deployment. Through a simple simulation it is shown how neglecting this dimension leads to results that at best cast shadows on the predictive performance of a model and its assessment via benchmarking procedures
The Security of Practical Quantum Key Distribution
Quantum key distribution (QKD) is the first quantum information task to reach
the level of mature technology, already fit for commercialization. It aims at
the creation of a secret key between authorized partners connected by a quantum
channel and a classical authenticated channel. The security of the key can in
principle be guaranteed without putting any restriction on the eavesdropper's
power.
The first two sections provide a concise up-to-date review of QKD, biased
toward the practical side. The rest of the paper presents the essential
theoretical tools that have been developed to assess the security of the main
experimental platforms (discrete variables, continuous variables and
distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change
How to look next? A data-driven approach for scanpath prediction
By and large, current visual attention models mostly rely, when considering static stimuli, on the following procedure. Given an image, a saliency map is computed, which, in turn, might serve the purpose of predicting a sequence of gaze shifts, namely a scanpath instantiating the dynamics of visual attention deployment. The temporal pattern of attention unfolding is thus confined to the scanpath generation stage, whilst salience is conceived as a static map, at best conflating a number of factors (bottom-up information, top-down, spatial biases, etc.). In this note we propose a novel sequential scheme that consists of a three-stage processing relying on a center-bias model, a context/layout model, and an object-based model, respectively. Each stage contributes, at different times, to the sequential sampling of the final scanpath. We compare the method against classic scanpath generation that exploits state-of-the-art static saliency model. Results show that accounting for the structure of the temporal unfolding leads to gaze dynamics close to human gaze behaviour
Of cattle, sand flies and men : a systematic review of risk factor analyses for South Asian visceral leishmaniasis and implications for elimination
Background: Studies performed over the past decade have identified fairly consistent epidemiological patterns of risk
factors for visceral leishmaniasis (VL) in the Indian subcontinent.
Methods and Principal Findings: To inform the current regional VL elimination effort and identify key gaps in knowledge,
we performed a systematic review of the literature, with a special emphasis on data regarding the role of cattle because
primary risk factor studies have yielded apparently contradictory results. Because humans form the sole infection reservoir,
clustering of kala-azar cases is a prominent epidemiological feature, both at the household level and on a larger scale.
Subclinical infection also tends to show clustering around kala-azar cases. Within villages, areas become saturated over a
period of several years; kala-azar incidence then decreases while neighboring areas see increases. More recently, post kalaazar
dermal leishmaniasis (PKDL) cases have followed kala-azar peaks. Mud walls, palpable dampness in houses, and peridomestic
vegetation may increase infection risk through enhanced density and prolonged survival of the sand fly vector.
Bed net use, sleeping on a cot and indoor residual spraying are generally associated with decreased risk. Poor micronutrient
status increases the risk of progression to kala-azar. The presence of cattle is associated with increased risk in some studies
and decreased risk in others, reflecting the complexity of the effect of bovines on sand fly abundance, aggregation, feeding
behavior and leishmanial infection rates. Poverty is an overarching theme, interacting with individual risk factors on multiple
levels.
Conclusions: Carefully designed demonstration projects, taking into account the complex web of interconnected risk
factors, are needed to provide direct proof of principle for elimination and to identify the most effective maintenance
activities to prevent a rapid resurgence when interventions are scaled back. More effective, short-course treatment
regimens for PKDL are urgently needed to enable the elimination initiative to succeed
Magnetism, FeS colloids, and Origins of Life
A number of features of living systems: reversible interactions and weak
bonds underlying motor-dynamics; gel-sol transitions; cellular connected
fractal organization; asymmetry in interactions and organization; quantum
coherent phenomena; to name some, can have a natural accounting via
interactions, which we therefore seek to incorporate by expanding the horizons
of `chemistry-only' approaches to the origins of life. It is suggested that the
magnetic 'face' of the minerals from the inorganic world, recognized to have
played a pivotal role in initiating Life, may throw light on some of these
issues. A magnetic environment in the form of rocks in the Hadean Ocean could
have enabled the accretion and therefore an ordered confinement of
super-paramagnetic colloids within a structured phase. A moderate H-field can
help magnetic nano-particles to not only overcome thermal fluctuations but also
harness them. Such controlled dynamics brings in the possibility of accessing
quantum effects, which together with frustrations in magnetic ordering and
hysteresis (a natural mechanism for a primitive memory) could throw light on
the birth of biological information which, as Abel argues, requires a
combination of order and complexity. This scenario gains strength from
observations of scale-free framboidal forms of the greigite mineral, with a
magnetic basis of assembly. And greigite's metabolic potential plays a key role
in the mound scenario of Russell and coworkers-an expansion of which is
suggested for including magnetism.Comment: 42 pages, 5 figures, to be published in A.R. Memorial volume, Ed
Krishnaswami Alladi, Springer 201
Cargo Cults in Information Systems Development: a Definition and an Analytical Framework
Organizations today adopt agile information systems development methods (ISDM), but many do not succeed with the adoption process and in achieving desired results. Systems developers sometimes fail in efficient use of ISDM, often due to a lack of understanding the fundamental intentions of the chosen method. In many cases organizations simply imitate the behavior of others without really understanding why. This conceptual paper defines this phenomenon as an ISDM cargo cult behavior and proposes an analytical framework to identify such situations. The concept of cargo cults originally comes from the field of social anthropology and has been used to explain irrational, ritualistic imitation of certain behavior. By defining and introducing the concept in the field of information systems development we provide a diagnostic tool to better understand one of the reasons why ISDM adoption sometimes fail
Characterising the phenotypic diversity of Papilio dardanus wing patterns using an extensive museum collection
The history of 20th Century evolutionary biology can be followed through the study of mimetic butterflies. From the initial findings of discontinuous polymorphism through the debates regarding the evolution of mimicry and the step-size of evolutionary change, to the studies on supergene evolution and molecular characterisation of butterfly genomes, mimetic butterflies have been at the heart of evolutionary thought for over 100 years. During this time, few species have received as much attention and in-depth study as Papilio dardanus. To assist all aspects of mimicry research, we present a complete data-derived overview of the extent of polymorphism within this species. Using historical samples permanently held by the NHM London, we document the extent of phenotypic variation and characterise the diversity present in each of the subspecies and how it varies across Africa. We also demonstrate an association between “imperfect” mimetic forms and the transitional race formed in the area where Eastern and Western African populations meet around Lake Victoria. We present a novel portal for access to this collection, www.mimeticbutterflies.org, allowing remote access to this unique repository. It is hoped that this online resource can act as a nucleus for the sharing and dissemination of other collections databases and imagery connected with mimetic butterflies
Generalized Matrix Factorizations as a Unifying Framework for Pattern Set Mining: Complexity Beyond Blocks
Abstract. Matrix factorizations are a popular tool to mine regularities from data. There are many ways to interpret the factorizations, but one particularly suited for data mining utilizes the fact that a matrix product can be interpreted as a sum of rank-1 matrices. Then the factorization of a matrix becomes the task of finding a small number of rank-1 matrices, sum of which is a good representation of the original matrix. Seen this way, it becomes obvious that many problems in data mining can be expressed as matrix factorizations with correct definitions of what a rank-1 matrix and a sum of rank-1 matrices mean. This paper develops a unified theory, based on generalized outer product operators, that encompasses many pattern set mining tasks. The focus is on the computational aspects of the theory and studying the computational complexity and approximability of many problems related to generalized matrix factorizations. The results immediately apply to a large number of data mining problems, and hopefully allow generalizing future results and algorithms, as well.
Control of Visceral Leishmaniasis in Latin America—A Systematic Review
Visceral leishmaniasis is a vector-borne disease characterized by fever, spleen and liver enlargement, and low blood cell counts. In the Americas VL is zoonotic, with domestic dogs as main animal reservoirs, and is caused by the intracellular parasite Leishmania infantum (syn. Leishmania chagasi). Humans acquire the infection through the bite of an infected sand fly. The disease is potentially lethal if untreated. VL is reported from Mexico to Argentina, with recent trends showing a rapid spread in Brazil. Control measures directed against the canine reservoir and insect vectors have been unsuccessful, and early detection and treatment of human cases remains as the most important strategy to reduce case fatality. Well-designed studies evaluating diagnosis, treatment, and prevention/control interventions are scarce. The available scientific evidence reasonably supports the use of rapid diagnostic tests for the diagnosis of human disease. Properly designed randomized controlled trials following good clinical practices are needed to inform drug policy. Routine control strategies against the canine reservoirs and insect vectors are based on weak and conflicting evidence, and vector control strategies and vaccine development should constitute research priorities
- …