20 research outputs found
Upper bounds for the secure key rate of decoy state quantum key distribution
The use of decoy states in quantum key distribution (QKD) has provided a
method for substantially increasing the secret key rate and distance that can
be covered by QKD protocols with practical signals. The security analysis of
these schemes, however, leaves open the possibility that the development of
better proof techniques, or better classical post-processing methods, might
further improve their performance in realistic scenarios. In this paper, we
derive upper bounds on the secure key rate for decoy state QKD. These bounds
are based basically only on the classical correlations established by the
legitimate users during the quantum communication phase of the protocol. The
only assumption about the possible post-processing methods is that double click
events are randomly assigned to single click events. Further we consider only
secure key rates based on the uncalibrated device scenario which assigns
imperfections such as detection inefficiency to the eavesdropper. Our analysis
relies on two preconditions for secure two-way and one-way QKD: The legitimate
users need to prove that there exists no separable state (in the case of
two-way QKD), or that there exists no quantum state having a symmetric
extension (one-way QKD), that is compatible with the available measurements
results. Both criteria have been previously applied to evaluate single-photon
implementations of QKD. Here we use them to investigate a realistic source of
weak coherent pulses. The resulting upper bounds can be formulated as a convex
optimization problem known as a semidefinite program which can be efficiently
solved. For the standard four-state QKD protocol, they are quite close to known
lower bounds, thus showing that there are clear limits to the further
improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
31st Annual Meeting and Associated Programs of the Society for Immunotherapy of Cancer (SITC 2016) : part two
Background
The immunological escape of tumors represents one of the main ob- stacles to the treatment of malignancies. The blockade of PD-1 or CTLA-4 receptors represented a milestone in the history of immunotherapy. However, immune checkpoint inhibitors seem to be effective in specific cohorts of patients. It has been proposed that their efficacy relies on the presence of an immunological response. Thus, we hypothesized that disruption of the PD-L1/PD-1 axis would synergize with our oncolytic vaccine platform PeptiCRAd.
Methods
We used murine B16OVA in vivo tumor models and flow cytometry analysis to investigate the immunological background.
Results
First, we found that high-burden B16OVA tumors were refractory to combination immunotherapy. However, with a more aggressive schedule, tumors with a lower burden were more susceptible to the combination of PeptiCRAd and PD-L1 blockade. The therapy signifi- cantly increased the median survival of mice (Fig. 7). Interestingly, the reduced growth of contralaterally injected B16F10 cells sug- gested the presence of a long lasting immunological memory also against non-targeted antigens. Concerning the functional state of tumor infiltrating lymphocytes (TILs), we found that all the immune therapies would enhance the percentage of activated (PD-1pos TIM- 3neg) T lymphocytes and reduce the amount of exhausted (PD-1pos TIM-3pos) cells compared to placebo. As expected, we found that PeptiCRAd monotherapy could increase the number of antigen spe- cific CD8+ T cells compared to other treatments. However, only the combination with PD-L1 blockade could significantly increase the ra- tio between activated and exhausted pentamer positive cells (p= 0.0058), suggesting that by disrupting the PD-1/PD-L1 axis we could decrease the amount of dysfunctional antigen specific T cells. We ob- served that the anatomical location deeply influenced the state of CD4+ and CD8+ T lymphocytes. In fact, TIM-3 expression was in- creased by 2 fold on TILs compared to splenic and lymphoid T cells. In the CD8+ compartment, the expression of PD-1 on the surface seemed to be restricted to the tumor micro-environment, while CD4 + T cells had a high expression of PD-1 also in lymphoid organs. Interestingly, we found that the levels of PD-1 were significantly higher on CD8+ T cells than on CD4+ T cells into the tumor micro- environment (p < 0.0001).
Conclusions
In conclusion, we demonstrated that the efficacy of immune check- point inhibitors might be strongly enhanced by their combination with cancer vaccines. PeptiCRAd was able to increase the number of antigen-specific T cells and PD-L1 blockade prevented their exhaus- tion, resulting in long-lasting immunological memory and increased median survival
Simulating Material Requirements Planning on LOTUS 1-2-3
This paper discusses the suitability of simulating material requirements- planning (MRP) problems on Lotus 1-2-3. It gives an example of such a simulation, suggests techniques to enhance user-friendliness, and proposes that students may be assigned to work with the template in number-entering mode or formula-entering mode. Because learning is profoundly affected by the extent to which students are motivated for performance or motivated for learning, the two modes may Induce different motivations, and consequently, lead to different effects on learning
Neutralism and selectionism: a network-based reconciliation
Neutralism and selectionism are extremes of an explanatory spectrum for understanding patterns of molecular evolution and the emergence of evolutionary innovation. Although recent genome-scale data from protein-coding genes argue against neutralism, molecular engineering and protein evolution data argue that neutral mutations and mutational robustness are important for evolutionary innovation. Here I propose a reconciliation in which neutral mutations prepare the ground for later evolutionary adaptation. Key to this perspective is an explicit understanding of molecular phenotypes that has only become accessible in recent years
The Shaman and the Spirits: The Meaning of the Word 'ling' in the Jiuge Poems
In all major dictionaries the first entry for the Chinese word 'ling' is 'shaman' (wu). This meaning of the word is based on Wang Yi's interpretation of two Jiuge poems in the Chuci collection. The present article investigates the possibility of this identification and concludes that there is no evidence to support Wang Yi's opinion. On the other hand, there is ample evidence to suggest that the accepted meanings of ling (spirit, numinous, magical) and the general characteristics of the Chinese shaman are indeed interrelated in many respects