1,110 research outputs found
Polarization and frequency disentanglement of photons via stochastic polarization mode dispersion
We investigate the quantum decoherence of frequency and polarization
variables of photons via polarization mode dispersion in optical fibers. By
observing the analogy between the propagation equation of the field and the
Schr\"odinger equation, we develop a master equation under Markovian
approximation and analytically solve for the field density matrix. We identify
distinct decay behaviors for the polarization and frequency variables for
single-photon and two-photon states. For the single photon case, purity
functions indicate that complete decoherence for each variable is possible only
for infinite fiber length. For entangled two-photon states passing through
separate fibers, entanglement associated with each variable can be completely
destroyed after characteristic finite propagation distances. In particular, we
show that frequency disentanglement is independent of the initial polarization
status. For propagation of two photons in a common fiber, the evolution of a
polarization singlet state is addressed. We show that while complete
polarization disentanglement occurs at a finite propagation distance, frequency
entanglement could survive at any finite distance for gaussian states.Comment: 2 figure
Viewpoint: ‘When black lives matter all lives will matter’ − a teacher and three students discuss the BLM movement
The Black Lives Matter (BLM) movement is generating a new appetite for understanding the ubiquity of systemic racism. In this short piece, a professor and three newly graduated students from different racialized groups reflect on the reproduction of social inequalities in key institutions and on what decolonization means for the nation, not just for education
Bacterial susceptibility and resistance to modelin-5.
Modelin-5 (M5-NH ) killed with a minimum lethal concentration (MLC) of 5.86 μM and strongly bound its cytoplasmic membrane (CM) with a of 23.5 μM. The peptide adopted high levels of amphiphilic α-helical structure (75.0%) and penetrated the CM hydrophobic core (8.0 mN m ). This insertion destabilised CM structure increased lipid packing and decreased fluidity (Δ 0) and promoted only low levels of lysis (24.3%). The insertion and lysis of the CM by M5-NH showed a strong negative correlation with its lysyl phosphatidylglycerol (Lys-PG) content ( > 0.98). In combination, these data suggested that Lys-PG mediated mechanisms inhibited the membranolytic action of M5-NH against , thereby rendering the organism resistant to the peptide. These results are discussed in relation to structure/function relationships of M5-NH and CM lipids that underpin bacterial susceptibility and resistance to the peptide
Security against eavesdropping in quantum cryptography
In this article we deal with the security of the BB84 quantum cryptography
protocol over noisy channels using generalized privacy amplification. For this
we estimate the fraction of bits needed to be discarded during the privacy
amplification step. This estimate is given for two scenarios, both of which
assume the eavesdropper to access each of the signals independently and take
error correction into account. One scenario does not allow a delay of the
eavesdropper's measurement of a measurement probe until he receives additional
classical information. In this scenario we achieve a sharp bound. The other
scenario allows a measurement delay, so that the general attack of an
eavesdropper on individual signals is covered. This bound is not sharp but
allows a practical implementation of the protocol.Comment: 11 pages including 3 figures, contains new results not contained in
my Phys. Rev. A pape
PEGylated graphene oxide for tumor-targeted delivery of paclitaxel.
AIM:
The graphene oxide (GO) sheet has been considered one of the most promising carbon derivatives in the field of material science for the past few years and has shown excellent tumor-targeting ability, biocompatibility and low toxicity. We have endeavored to conjugate paclitaxel (PTX) to GO molecule and investigate its anticancer efficacy.
MATERIALS & METHODS:
We conjugated the anticancer drug PTX to aminated PEG chains on GO sheets through covalent bonds to get GO-PEG-PTX complexes. The tissue distribution and anticancer efficacy of GO-PEG-PTX were then investigated using a B16 melanoma cancer-bearing C57 mice model.
RESULTS:
The GO-PEG-PTX complexes exhibited excellent water solubility and biocompatibility. Compared with the traditional formulation of PTX (Taxol®), GO-PEG-PTX has shown prolonged blood circulation time as well as high tumor-targeting and -suppressing efficacy.
CONCLUSION:
PEGylated graphene oxide is an excellent nanocarrier for paclitaxel for cancer targeting
Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts
We discuss the potential of quantum key distribution (QKD) for long distance
communication by proposing a new analysis of the errors caused by dark counts.
We give sufficient conditions for a considerable improvement of the key
generation rates and the security thresholds of well-known QKD protocols such
as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state
protocol. This analysis is applicable to other QKD protocols like Bennett 1992.
We examine two scenarios: a sender using a perfect single-photon source and a
sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse
reconciliation as suggested by Nicolas Gisi
How paradata can illuminate technical, social and professional role changes between the Poverty in the UK (1967/1968) and Poverty and Social Exclusion in the UK (2012) surveys
This article brings together analyses of the micro paradata ‘by-products’ from the 1967/1968 Poverty in the United Kingdom (PinUK) and 2012 Poverty and Social Exclusion in the UK (PSE) surveys to explore changes in the conditions of production over this 45 year period. We highlight technical, social and professional role continuities and changes, shaped by the institutionalisation of survey researchers, the professionalization of the field interviewer, and economisation. While there are similarities between the surveys in that field interviewers were and are at the bottom of the research hierarchy, we demonstrate an increasing segregation between the core research team and field interviewers. In PinUK the field interviewers are visible in the paper survey booklets; through their handwritten notes on codes and in written marginalia they can ‘talk’ to the central research team. In PSE they are absent from the computer mediated data, and from communication with the central team. We argue that, while there have been other benefits to field interviewers, their relational labour has become less visible in a shift from the exercise of observational judgement to an emphasis on standardisation. Yet, analyses of what field interviewers actually do show that they still need to deploy the same interpersonal skills and resourcefulness to secure and maintain interviews as they did 45 years previously
Poverty in the UK: Advancing paradata analysis and open access
This project aimed to provide open access to data from Peter Townsend’s 1967-68 Poverty in the UK (PinUK) landmark UK survey, and to enhance the capacity to use it, through innovative analysis of micro paradata and comparative analysis of macro paradata. This is the final report
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
- …