3,714 research outputs found

    A Composite Likelihood-based Approach for Change-point Detection in Spatio-temporal Process

    Full text link
    This paper develops a unified, accurate and computationally efficient method for change-point inference in non-stationary spatio-temporal processes. By modeling a non-stationary spatio-temporal process as a piecewise stationary spatio-temporal process, we consider simultaneous estimation of the number and locations of change-points, and model parameters in each segment. A composite likelihood-based criterion is developed for change-point and parameters estimation. Asymptotic theories including consistency and distribution of the estimators are derived under mild conditions. In contrast to classical results in fixed dimensional time series that the asymptotic error of change-point estimator is Op(1)O_{p}(1), exact recovery of true change-points is guaranteed in the spatio-temporal setting. More surprisingly, the consistency of change-point estimation can be achieved without any penalty term in the criterion function. A computational efficient pruned dynamic programming algorithm is developed for the challenging criterion optimization problem. Simulation studies and an application to U.S. precipitation data are provided to demonstrate the effectiveness and practicality of the proposed method

    Analyzing a language-driven content-based language teaching textbook using sociocultural theory

    Get PDF
    The Asian EFL (English as a foreign language) classroom is famous for its reliance on textbooks to prepare students for high-stakes examinations. It is therefore of importance to ensure the quality of EFL textbooks for quality learning and teaching. While much previous research has been done about pre-use, in-use, and post-use textbook evaluation, there has not been any study about how sociocultural theory may be used as an analytical tool to evaluate EFL textbooks at these different stages of evaluation. The teaching philosophies of different teachers can be rooted in different learning theories, such as constructivism and sociocultural theory. Teachers, thus, need to be sensitive to their own beliefs in terms of learning theories to choose textbooks in a theoretically principled way. This study aims at demonstrating how a Hong Kong high school language-driven content-based language teaching (CBLT) textbook can be analysed in terms of sociocultural theory. The study is guided by the following research question: What are the principles from sociocultural theory which echo the overall design of a Hong Kong CBLT textbook? CBLT is increasingly popular worldwide, especially in Southeast Asia; yet, there are few CBLT textbooks for the English subject in the Asian market. A required textbook of a Hong Kong high school was closely analyzed, with thematic analysis used for analysis. The results of this study show that this textbook exhibits many features of sociocultural theory, such as use of cognitive tools to help promote high-order thinking and use of collaborative talk and then private talk to promote internalization

    Security proof of quantum key distribution with detection efficiency mismatch

    Full text link
    In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time domains and in various experimental set-ups. More importantly, we prove the unconditional security of QKD even with detection efficiency mismatch. We explicitly show how the key generation rate is characterized by the maximal detection efficiency ratio between the two detectors. Furthermore, we prove that by randomly switching the bit assignments of the detectors, the effect of detection efficiency mismatch can be completely eliminated.Comment: 35 pages, 7 figure

    Experience with posttransplant lymphoproliferative disorders in solid organ transplant recipients

    Get PDF
    Nearly 6000 solid organ transplants have been performed at the University of Pittsburgh since 1981. Posttransplant lymphoproliferative disorders (PTLD) have occurred in 131 patients, at a frequency of 2.2%. The majority of cases manifest within 6 months following allograft, but individual lesions may arise several years thereafter. From 1981 to 1989, cyclosporine-A (CsA) served as the primary immunosuppressant in this population. In March of 1989, FK506 was introduced for clinical trials. Since that time, 1421 patients have received FK506 either for primary immunosuppression or as rescue therapy. The frequency of PTLD in this subpopulation is 1.5%. PTLD arising under FK506-containing regimens have clinicopathologic features similar to those arising with CsA immunosuppression. The frequency of PTLD at this point in time is approximately 1%, in kidney allograft patients, 2.7% in liver, 3.3% in heart and 3.8%, in heart/lung or lung recipients. An understanding of the range of histologic appearance is important for the diagnosis of PTLD, especially when it involves the allograft itself. Immunoglobulin heavy chain gene analysis shows that lesions with no rearrangements or with a rearrangement in only a small proportion of cells are more likely to respond to reduced immunosuppression than are those with clonal rearrangement involving a high proportion of cells. However, this distinction is not absolute, and a trial of reduced immunosuppression appears to be indicated regardless of clonal status

    Practical issues in quantum-key-distribution postprocessing

    Get PDF
    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source. © 2010 The American Physical Society.published_or_final_versio

    Statistical fluctuation analysis for measurement-device-independent quantum key distribution

    Get PDF
    published_or_final_versio

    Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel

    Get PDF
    In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against general attacks. © 2011 American Physical Society.published_or_final_versio
    corecore