1,272 research outputs found

    Non-Abelian Quantum Hall Effect in Topological Flat Bands

    Full text link
    Inspired by recent theoretical discovery of robust fractional topological phases without a magnetic field, we search for the non-Abelian quantum Hall effect (NA-QHE) in lattice models with topological flat bands (TFBs). Through extensive numerical studies on the Haldane model with three-body hard-core bosons loaded into a TFB, we find convincing numerical evidence of a stable ν=1\nu=1 bosonic NA-QHE, with the characteristic three-fold quasi-degeneracy of ground states on a torus, a quantized Chern number, and a robust spectrum gap. Moreover, the spectrum for two-quasihole states also shows a finite energy gap, with the number of states in the lower energy sector satisfying the same counting rule as the Moore-Read Pfaffian state.Comment: 5 pages, 7 figure

    2-(4-Hy­droxy­phen­oxy)propanoic acid

    Get PDF
    In the title compound, C9H10O4, the carboxyl group is oriented at a dihedral angle of 84.6 (3)° with respect to the benzene ring. In the crystal, mol­ecules are linked via O—H⋯O hydrogen bonds

    Time-reversal symmetry breaking superconducting ground state in the doped Mott insulator on the honeycomb lattice

    Full text link
    The emergence of superconductivity in doped Mott insulators has been debated for decades. In this paper, we report the theoretical discovery of a time-reversal symmetry breaking superconducting ground state in the doped Mott insulator (described by the well known t-J model) on honeycomb lattice, based on a recently developed variational method: the Grassmann tensor product state approach. As a benchmark, we use exact diagonalization and density-matrix renormalization methods to check our results on small clusters. We find systematic consistency for the ground-state energy as well as other physical quantities, such as the staggered magnetization. At low doping, the superconductivity coexists with antiferromagnetic ordering.Comment: 7 pages, 9 figures (published version

    A novel subnetwork alignment approach predicts new components of the cell cycle regulatory apparatus in Plasmodium falciparum

    Get PDF
    Background According to the World Health organization, half the world\u27s population is at risk of contracting malaria. They estimated that in 2010 there were 219 million cases of malaria, resulting in 660,000 deaths and an enormous economic burden on the countries where malaria is endemic. The adoption of various high-throughput genomics-based techniques by malaria researchers has meant that new avenues to the study of this disease are being explored and new targets for controlling the disease are being developed. Here, we apply a novel neighborhood subnetwork alignment approach to identify the interacting elements that help regulate the cell cycle of the malaria parasite Plasmodium falciparum. Results Our novel subnetwork alignment approach was used to compare networks in Escherichia coli and P. falciparum. Some 574 P. falciparum proteins were revealed as functional orthologs of known cell cycle proteins in E. coli. Over one third of these predicted functional orthologs were annotated as conserved Plasmodium proteins or putative uncharacterized proteins of unknown function. The predicted functionalities included cyclins, kinases, surface antigens, transcriptional regulators and various functions related to DNA replication, repair and cell division. Conclusions The results of our analysis demonstrate the power of our subnetwork alignment approach to assign functionality to previously unannotated proteins. Here, the focus was on proteins involved in cell cycle regulation. These proteins are involved in the control of diverse aspects of the parasite lifecycle and of important aspects of pathogenesis

    The value of high-flow nasal cannula oxygen therapy after extubation in patients with acute respiratory failure

    Get PDF
    OBJECTIVE: To investigate the value of high-flow nasal cannula oxygen therapy after extubation in patients with acute respiratory failure. METHODS: A single-center, prospective, randomized, controlled pilot trial was conducted between January 2013 and December 2014. Sixty enrolled patients were randomized immediately after extubation into either a high-flow nasal cannula group (n=30) or an air entrainment mask group (n=30) at a fixed inspired oxygen fraction (40%). The success rate of oxygen therapy, respiratory and hemodynamic parameters and subjective discomfort (using a visual analogue scale) were assessed at 24h after extubation. RESULTS: The two groups were comparable at extubation. A total of 46 patients were successfully treated including 27 patients in the high-flow nasal cannula group and 19 patients in the air entrainment mask group. Compared to the air entrainment mask group, the success rate of oxygen therapy and the partial pressure of arterial oxygen were significantly higher and the respiratory rate was lower in the high-flow nasal cannula group. In addition, less discomfort related to interface displacement and airway dryness was observed in the high-flow nasal cannula group than in the air entrainment mask group. CONCLUSIONS: At a fixed inspired oxygen fraction, the application of a high-flow nasal cannula after extubation achieves a higher success rate of oxygen therapy and less discomfort at 24h than an air entrainment mask in patients with acute respiratory failure

    Photometric observation of the transiting exoplanet WASP-1b

    Get PDF

    Scalable Private Set Union, with Stronger Security

    Get PDF
    Private Set Union (PSU) protocol allows parties, each holding an input set, to jointly compute the union of the sets without revealing anything else. In the literature, scalable PSU protocols follow the “split-execute-assemble” paradigm (Kolesnikov et al., ASIACRYPT 2019); in addition, those fast protocols often use Oblivious Transfer as building blocks. Kolesnikov et al. (ASIACRYPT 2019) and Jia et al. (USENIX Security 2022), pointed out that certain security issues can be introduced in the “split-execute-assemble” paradigm. In this work, surprisingly, we observe that the typical way of invoking Oblivious Transfer also causes unnecessary leakage, and only the PSU protocols based on additively homomorphic encryption (AHE) can avoid the leakage. However, the AHE-based PSU protocols are far from being practical. To bridge the gap, we also design a new PSU protocol that can avoid the unnecessary leakage. Unlike the AHE-based PSU protocols, our new construction only relies on symmetric-key operations other than base OTs, thereby being much more scalable. The experimental results demonstrate that our protocol can obtain at least 873.74× speedup over the best-performing AHE-based scheme. Moreover, our performance is comparable to that of the state-of-the-art PSU protocol (Chen et al., USENIX Security 2023), which also suffers from the unnecessary leakage

    The Ideal Functionalities for Private Set Union, Revisited

    Get PDF
    A Private Set Union (PSU) protocol allows parties, each holding an input set, to jointly compute the union of the sets without revealing anything else. In the literature, when we design scalable two-party PSU protocols, we follow the so-called ``split-execute-assemble\u27\u27 paradigm, and also use Oblivious Transfer as a building block. Recently, Kolesnikov et al. (ASIACRYPT 2019) pointed out that security issues could be introduced when we design PSU protocols following the ``split-execute-assemble\u27\u27 paradigm. Surprisingly, we observe that the typical way of invoking Oblivious Transfer also causes unnecessary leakage. In this work, to enable a better understanding of the security for PSU, we provide a systematic treatment of the typical PSU protocols, which may shed light on the design of practical and secure PSU protocols in the future. More specifically, we define different versions of PSU functionalities to properly capture the subtle security issues arising from protocols following the ``split-execute-assemble\u27\u27 paradigm and using Oblivious Transfer as subroutines. Then, we survey the typical PSU protocols, and categorize these protocols into three design frameworks, and prove what PSU functionality the protocols under each framework can achieve at best, in the semi-honest setting
    corecore