3,684 research outputs found

    How to master the host immune system? Leishmania parasites have the solutions!

    Get PDF
    Infection by protozoan parasites of the genus Leishmania results in the development of leishmaniasis, an increasingly prevalent group of diseases affecting over 12 million people worldwide. Leishmaniasis can have very different outcomes ranging from cutaneous lesions, mucosal lesions to visceralization depending on the species of the infecting parasite and on the immune response developed by the host. As an obligate intracellular parasite, residing within macrophages, Leishmania evolved in strict contact with the host immune system, developing different mechanisms to evade or modulate the immune response. Various types of immune responses are observed during different Leishmania spp. infections, resulting in parasite clearance but also contributing to the pathogenesis, thus increasing the complexity of the course of the disease. Interestingly, depending on the type of leishmaniasis developed, opposite treatment strategies, which either boost or inhibit the inflammatory response, have shown efficacy. In this review, we summarize the contribution of different immune cell types to the development of the anti-leishmanial immune response and the parasite strategies to evade and modulate host immunity. Further, we discuss the involvement of co-infecting pathogens in the determination of the outcome of leishmaniasis and on the effectiveness of treatment and the implication of the immune response for treatment and vaccine development

    Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors

    Full text link
    We compare the performance of various quantum key distribution (QKD) systems using a novel single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche photodiode (APD). The comparison is based on the secure communication rate as a function of distance for three QKD protocols: the Bennett-Brassard 1984 (BB84), the Bennett, Brassard, and Mermin 1992 (BBM92), and the coherent differential phase shift keying (DPSK). We show that the up-conversion detector allows for higher communication rates and longer communication distances than the commonly used InGaAs/InP APD for all the three QKD protocols.Comment: 9 pages, 9 figure

    An in vitro anatomic model of the human cerebral arteries with saccular arterial aneurysms

    Get PDF
    Summary: Anin vitro model of the main human cerebral arteries with or without saccular arterial aneurysms is presented. A cast of the cerebral arteries was obtained in a human specimen. Three aneurysms were simulated and added to the cast. Wax copies of the cast were produced, and embedded with liquid resin solidifying into solid blocks. After evacuation of the wax, a model consisting of a hollow reproduction of the cast within the resin block was obtained. The model is reproducible and anatomically accurate. Since it is transparent to visible light, and compatible with x-ray, magnetic resonance and transcranial doppler techniques, it should prove useful for a wide range of haemodynamic and radiologic investigations. The reported technique may be adapted to any structure with a hollow configuration, allowing for the preparation of arterial and venous models from other vascular areas, as well as models from other anatomic systems, such as the biliary or urinary tract

    Security bound of two-bases quantum key-distribution protocols using qudits

    Full text link
    We investigate the security bounds of quantum cryptographic protocols using dd-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.Comment: 12 pages, 2 figures, to appear in Phys. Rev.

    Theoretical analysis of the electronic structure of the stable and metastable c(2x2) phases of Na on Al(001): Comparison with angle-resolved ultra-violet photoemission spectra

    Full text link
    Using Kohn-Sham wave functions and their energy levels obtained by density-functional-theory total-energy calculations, the electronic structure of the two c(2x2) phases of Na on Al(001) are analysed; namely, the metastable hollow-site structure formed when adsorption takes place at low temperature, and the stable substitutional structure appearing when the substrate is heated thereafter above ca. 180K or when adsorption takes place at room temperature from the beginning. The experimentally obtained two-dimensional band structures of the surface states or resonances are well reproduced by the calculations. With the help of charge density maps it is found that in both phases, two pronounced bands appear as the result of a characteristic coupling between the valence-state band of a free c(2x2)-Na monolayer and the surface-state/resonance band of the Al surfaces; that is, the clean (001) surface for the metastable phase and the unstable, reconstructed "vacancy" structure for the stable phase. The higher-lying band, being Na-derived, remains metallic for the unstable phase, whereas it lies completely above the Fermi level for the stable phase, leading to the formation of a surface-state/resonance band-structure resembling the bulk band-structure of an ionic crystal.Comment: 11 pages, 11 postscript figures, published in Phys. Rev. B 57, 15251 (1998). Other related publications can be found at http://www.rz-berlin.mpg.de/th/paper.htm

    Characterizing heralded single-photon sources with imperfect measurement devices

    Full text link
    Any characterization of a single-photon source is not complete without specifying its second-order degree of coherence, i.e., its g(2)g^{(2)} function. An accurate measurement of such coherence functions commonly requires high-precision single-photon detectors, in whose absence, only time-averaged measurements are possible. It is not clear, however, how the resulting time-averaged quantities can be used to properly characterize the source. In this paper, we investigate this issue for a heralded source of single photons that relies on continuous-wave parametric down-conversion. By accounting for major shortcomings of the source and the detectors--i.e., the multiple-photon emissions of the source, the time resolution of photodetectors, and our chosen width of coincidence window--our theory enables us to infer the true source properties from imperfect measurements. Our theoretical results are corroborated by an experimental demonstration using a PPKTP crystal pumped by a blue laser, that results in a single-photon generation rate about 1.2 millions per second per milliwatt of pump power. This work takes an important step toward the standardization of such heralded single-photon sources.Comment: 18 pages, 9 figures; corrected Eq. (11) and the description follows Eq. (22

    Optimizing single-photon-source heralding efficiency at 1550 nm using periodically poled lithium niobate

    Full text link
    We explore the feasibility of using high conversion-efficiency periodically-poled crystals to produce photon pairs for photon-counting detector calibrations at 1550 nm. The goal is the development of an appropriate parametric down-conversion (PDC) source at telecom wavelengths meeting the requirements of high-efficiency pair production and collection in single spectral and spatial modes (single-mode fibers). We propose a protocol to optimize the photon collection, noise levels and the uncertainty evaluation. This study ties together the results of our efforts to model the single-mode heralding efficiency of a two-photon PDC source and to estimate the heralding uncertainty of such a source.Comment: 14 pages, 2 tables and 3 figures, final version accepted by Metrologi

    Raptor hunted by caspases.

    Get PDF
    corecore