6,591 research outputs found
Optical determination and identification of organic shells around nanoparticles: application to silver nanoparticles
We present a simple method to prove the presence of an organic shell around
silver nanoparticles. This method is based on the comparison between optical
extinction measurements of isolated nanoparticles and Mie calculations
predicting the expected wavelength of the Localized Surface Plasmon Resonance
of the nanoparticles with and without the presence of an organic layer. This
method was applied to silver nanoparticles which seemed to be well protected
from oxidation. Further experimental characterization via Surface Enhanced
Raman Spectroscopy (SERS) measurements allowed to identify this protective
shell as ethylene glycol. Combining LSPR and SERS measurements could thus give
proof of both presence and identification for other plasmonic nanoparticles
surrounded by organic shells
Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
After carrying out a protocol for quantum key agreement over a noisy quantum
channel, the parties Alice and Bob must process the raw key in order to end up
with identical keys about which the adversary has virtually no information. In
principle, both classical and quantum protocols can be used for this
processing. It is a natural question which type of protocols is more powerful.
We prove for general states but under the assumption of incoherent
eavesdropping that Alice and Bob share some so-called intrinsic information in
their classical random variables, resulting from optimal measurements, if and
only if the parties' quantum systems are entangled. In addition, we provide
evidence that the potentials of classical and of quantum protocols are equal in
every situation. Consequently, many techniques and results from quantum
information theory directly apply to problems in classical information theory,
and vice versa. For instance, it was previously believed that two parties can
carry out unconditionally secure key agreement as long as they share some
intrinsic information in the adversary's view. The analysis of this purely
classical problem from the quantum information-theoretic viewpoint shows that
this is true in the binary case, but false in general. More explicitly, bound
entanglement, i.e., entanglement that cannot be purified by any quantum
protocol, has a classical counterpart. This "bound intrinsic information"
cannot be distilled to a secret key by any classical protocol. As another
application we propose a measure for entanglement based on classical
information-theoretic quantities.Comment: Accepted for Crypto 2000. 17 page
Unforgeable Noise-Tolerant Quantum Tokens
The realization of devices which harness the laws of quantum mechanics
represents an exciting challenge at the interface of modern technology and
fundamental science. An exemplary paragon of the power of such quantum
primitives is the concept of "quantum money". A dishonest holder of a quantum
bank-note will invariably fail in any forging attempts; indeed, under
assumptions of ideal measurements and decoherence-free memories such security
is guaranteed by the no-cloning theorem. In any practical situation, however,
noise, decoherence and operational imperfections abound. Thus, the development
of secure "quantum money"-type primitives capable of tolerating realistic
infidelities is of both practical and fundamental importance. Here, we propose
a novel class of such protocols and demonstrate their tolerance to noise;
moreover, we prove their rigorous security by determining tight fidelity
thresholds. Our proposed protocols require only the ability to prepare, store
and measure single qubit quantum memories, making their experimental
realization accessible with current technologies.Comment: 18 pages, 5 figure
Recognizing flu-like symptoms from videos
© 2014 Hue Thi et al.; licensee BioMed Central Ltd. Background: Vision-based surveillance and monitoring is a potential alternative for early detection of respiratory disease outbreaks in urban areas complementing molecular diagnostics and hospital and doctor visit-based alert systems. Visible actions representing typical flu-like symptoms include sneeze and cough that are associated with changing patterns of hand to head distances, among others. The technical difficulties lie in the high complexity and large variation of those actions as well as numerous similar background actions such as scratching head, cell phone use, eating, drinking and so on. Results: In this paper, we make a first attempt at the challenging problem of recognizing flu-like symptoms from videos. Since there was no related dataset available, we created a new public health dataset for action recognition that includes two major flu-like symptom related actions (sneeze and cough) and a number of background actions. We also developed a suitable novel algorithm by introducing two types of Action Matching Kernels, where both types aim to integrate two aspects of local features, namely the space-time layout and the Bag-of-Words representations. In particular, we show that the Pyramid Match Kernel and Spatial Pyramid Matching are both special cases of our proposed kernels. Besides experimenting on standard testbed, the proposed algorithm is evaluated also on the new sneeze and cough set. Empirically, we observe that our approach achieves competitive performance compared to the state-of-the-arts, while recognition on the new public health dataset is shown to be a non-trivial task even with simple single person unobstructed view. Conclusions: Our sneeze and cough video dataset and newly developed action recognition algorithm is the first of its kind and aims to kick-start the field of action recognition of flu-like symptoms from videos. It will be challenging but necessary in future developments to consider more complex real-life scenario of detecting these actions simultaneously from multiple persons in possibly crowded environments
Evaluation of large-eddy simulations forced with mesoscale model output for a multi-week period during a measurement campaign
Large-eddy simulations (LESs) of a multi-week period during the HD(CP)2 (High-Definition Clouds and Precipitation for advancing Climate Prediction) Observational Prototype Experiment (HOPE) conducted in Germany are evaluated with respect to mean boundary layer quantities and turbulence statistics. Two LES models are used in a semi-idealized setup through forcing with mesoscale model output to account for the synoptic-scale conditions. Evaluation is performed based on the HOPE observations. The mean boundary layer characteristics like the boundary layer depth are in a principal agreement with observations. Simulating shallow-cumulus layers in agreement with the measurements poses a challenge for both LES models. Variance profiles agree satisfactorily with lidar measurements. The results depend on how the forcing data stemming from mesoscale model output are constructed. The mean boundary layer characteristics become less sensitive if the averaging domain for the forcing is large enough to filter out mesoscale fluctuations. © Author(s) 2017.BMBF/01LK1203BBMBF/01LK1203
- …