7,556 research outputs found

    Associations of plasma very-long-chain SFA and the metabolic syndrome in adults

    Get PDF
    Plasma levels of very-long-chain SFA (VLCSFA) are associated with the metabolic syndrome (MetS). However, the associations may vary by different biological activities of individual VLCSFA or population characteristics. We aimed to examine the associations of VLCSFA and MetS risk in Chinese adults. Totally, 2008 Chinese population aged 35–59 years were recruited and followed up from 2010 to 2012. Baseline MetS status and plasma fatty acids data were available for 1729 individuals without serious diseases. Among 899 initially metabolically healthy individuals, we identified 212 incident MetS during the follow-up. Logistic regression analysis was used to estimate OR and 95 % CI. Cross-sectionally, each VLCSFA was inversely associated with MetS risk; comparing with the lowest quartile, the multivariate-adjusted OR for the highest quartile were 0·18 (95 % CI 0·13, 0·25) for C20 : 0, 0·26 (95 % CI 0·18, 0·35) for C22 : 0, 0·19 (95 % CI 0·13, 0·26) for C24 : 0 and 0·16 (0·11, 0·22) for total VLCSFA (all Pfor trend<0·001). The associations remained significant after further adjusting for C16 : 0, C18 : 0, C18 : 3n-3, C22 : 6n-3, n-6 PUFA and MUFA, respectively. Based on follow-up data, C20 : 0 or C22 : 0 was also inversely associated with incident MetS risk. Among the five individual MetS components, higher levels of VLCSFA were most strongly inversely associated with elevated TAG (≥1·7 mmol/l). Plasma levels of VLCSFA were significantly and inversely associated with MetS risk and individual MetS components, especially TAG. Further studies are warranted to confirm the findings and explore underlying mechanisms

    Passive-scheme analysis for solving untrusted source problem in quantum key distribution

    Full text link
    As a practical method, the passive scheme is useful to monitor the photon statistics of an untrusted source in a "Plug & Play" quantum key distribution (QKD) system. In a passive scheme, three kinds of monitor mode can be adopted: average photon number (APN) monitor, photon number analyzer (PNA) and photon number distribution (PND) monitor. In this paper, the security analysis is rigorously given for APN monitor, while for PNA, the analysis including statistical fluctuation and random noise, is addressed with a confidence level. The results show that the PNA can achieve better performance than the APN monitor and can asymptotically approach the theoretical limit of the PND monitor. Also, the passive scheme with the PNA works efficiently when the signal-to-noise ratio (RSNR^{SN}) is not too low and so is highly applicable to solve the untrusted source problem in the QKD system.Comment: 8 pages, 6 figures, published versio

    DeltaPhish: Detecting Phishing Webpages in Compromised Websites

    Full text link
    The large-scale deployment of modern phishing attacks relies on the automatic exploitation of vulnerable websites in the wild, to maximize profit while hindering attack traceability, detection and blacklisting. To the best of our knowledge, this is the first work that specifically leverages this adversarial behavior for detection purposes. We show that phishing webpages can be accurately detected by highlighting HTML code and visual differences with respect to other (legitimate) pages hosted within a compromised website. Our system, named DeltaPhish, can be installed as part of a web application firewall, to detect the presence of anomalous content on a website after compromise, and eventually prevent access to it. DeltaPhish is also robust against adversarial attempts in which the HTML code of the phishing page is carefully manipulated to evade detection. We empirically evaluate it on more than 5,500 webpages collected in the wild from compromised websites, showing that it is capable of detecting more than 99% of phishing webpages, while only misclassifying less than 1% of legitimate pages. We further show that the detection rate remains higher than 70% even under very sophisticated attacks carefully designed to evade our system.Comment: Preprint version of the work accepted at ESORICS 201

    Anomalous impurity effects in the iron-based superconductor KFe2_2As2_2

    Full text link
    High-quality K(Fe1x_{1-x}Cox_x)2_2As2_2 single crystals have been grown by using KAs flux method. Instead of increasing the superconducting transition temperature TcT_{\rm c} through electron doping, we find that Co impurities rapidly suppress TcT_{\rm c} down to zero at only xx \approx 0.04. Such an effective suppression of TcT_{\rm c} by impurities is quite different from that observed in Ba0.5_{0.5}K0.5_{0.5}Fe2_2As2_2 with multiple nodeless superconducting gaps. Thermal conductivity measurements in zero field show that the residual linear term κ0/T\kappa_0/T only change slightly with 3.4%3.4\% Co doping, despite the sharp increase of scattering rate. The implications of these anomalous impurity effects are discussed.Comment: 5 pages, 4 fig

    Phase diagram for diblock copolymer melts under cylindrical confinement

    Full text link
    We extensively study the phase diagram of a diblock copolymer melt confined in a cylindrical nanopore using real-space self-consistent mean-field theory. We discover a rich variety of new two-dimensional equilibrium structures that have no analog in the unconfined system. These include non-hexagonally coordinated cylinder phases and structures intermediate between lamellae and cylinders. We map the stability regions and phase boundaries for all the structures we find. As the pore radius is decreased, the pore accommodates fewer cylindrical domains and structural transitions occur as cylinders are eliminated. Our results are consistent with experiments, but we also predict phases yet to be observed.Comment: 12 pages, 3 figures. submitted to Physical Review Letter

    Dirac Equation at Finite Temperature

    Full text link
    In this paper, we propose finite temperature Dirac equation, which can describe the quantum systems in an arbitrary temperature for a relativistic particle of spin-1/2. When the temperature T=0, it become Dirac equation. With the equation, we can study the relativistic quantum systems in an arbitrary temperature.Comment: arXiv admin note: text overlap with arXiv:1005.2751, arXiv:hep-ph/0004125, arXiv:hep-ph/0005272 by other author

    Estimating Mass of Sigma-Meson and Study on Application of the Linear Sigma-Model

    Full text link
    Whether the σmeson\sigma-meson (f0(600)f_0(600)) exists as a real particle is a long-standing problem in both particle physics and nuclear physics. In this work, we analyze the deuteron binding energy in the linear σ\sigma model and by fitting the data, we are able to determine the range of mσm_{\sigma} and also investigate applicability of the linear σ\sigma model for the interaction between hadrons in the energy region of MeV's. Our result shows that the best fit to the data of the deuteron binding energy and other experimental data about deuteron advocates a narrow range for the σ\sigma-meson mass as 520mσ580520\leq m_{\sigma}\leq 580 MeV and the concrete values depend on the input parameters such as the couplings. Inversely fitting the experimental data, our results set constraints on the couplings. The other relevant phenomenological parameters in the model are simultaneously obtained.Comment: 12 page

    Integrability of Lie systems through Riccati equations

    Full text link
    Integrability conditions for Lie systems are related to reduction or transformation processes. We here analyse a geometric method to construct integrability conditions for Riccati equations following these approaches. This approach provides us with a unified geometrical viewpoint that allows us to analyse some previous works on the topic and explain new properties. Moreover, this new approach can be straightforwardly generalised to describe integrability conditions for any Lie system. Finally, we show the usefulness of our treatment in order to study the problem of the linearisability of Riccati equations.Comment: Corrected typo

    Suppression of decoherence by bath ordering

    Full text link
    The dynamics of two coupled spins-1/2 coupled to a spin-bath is studied as an extended model of the Tessieri-Wilkie Hamiltonian \cite{TWmodel}. The pair of spins served as an open subsystem were prepared in one of the Bell states and the bath consisted of some spins-1/2 is in a thermal equilibrium state from the very beginning. It is found that with the increasing the coupling strength of the bath spins, the bath forms a resonant antiferromagnetic order. The polarization correlation between the two spins of the subsystem and the concurrence are recovered in some extent to the isolated subsystem. This suppression of the subsystem decoherence may be used to control the quantum devices in practical applications.Comment: 32 pages, Chinese Physics (accepted
    corecore