557 research outputs found

    Modeling of high entropy alloys of refractory elements

    Get PDF
    Reverting the traditional process of developing new alloys based on one or two single elements with minority additions, the study of high entropy alloys (HEA) (equimolar combinations of many elements) has become a relevant and interesting new field of research due to their tendency to form solid solutions with particular properties in the absence of intermetallic phases. Theoretical or modeling studies at the atomic level on specific HEA, describing the formation, structure, and properties of these alloys are limited due to the large number of constituents involved. In this work we focus on HEA with refractory elements showing atomistic modeling results for W-Nb-Mo-Ta and W-Nb-Mo-Ta-V HEA, for which experimental background exists. An atomistic modeling approach is applied for the determination of the role of each element and identification of the interactions and features responsible for the transition to the high entropy regime. Results for equimolar alloys of 4 and 5 refractory elements, for which experimental results exist, are shown. A straightforward algorithm is introduced to interpret the transition to the high entropy regime.Fil: del Grosso, Mariela Fernanda. Comisión Nacional de Energía Atómica; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; ArgentinaFil: Bozzolo, G.. Loyola University Maryland (lum);Fil: Mosca, H. O.. Comisión Nacional de Energía Atómica; Argentin

    A method of enciphering quantum states

    Get PDF
    In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confirm that the qubits are transmitted between them correctly by measuring a signature. If Eve measures m qubits one by one from n enciphered qubits and sends alternative ones (the Intercept/Resend attack), a probability that Alice and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for decryption and the signature are given by classical binary strings and they are disclosed through a public channel. Enciphering classical information by this method is equivalent to the one-time pad method with distributing a classical key (random binary string) by the BB84 protocol. If Eve takes away qubits, Alice and Bob lose the original quantum information. If we apply our method to a state in iteration, Eve's success probability decreases exponentially. We cannot examine security against the case that Eve makes an attack with using entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two references, several clarifying sentences are added in Sec. 5, typos corrected, a new proof is provided in Appendix A and it is shorter than the old one. v3: 23 pages, one section is adde

    The Association between Childhood Obesity and Cardiovascular Changes in 10 Years Using Special Data Science Analysis

    Get PDF
    The increasing prevalence of overweight and obesity is a worldwide problem, with several well-known consequences that might start to develop early in life during childhood. The present research based on data from children that have been followed since birth in a previously established cohort study (Generation XXI, Porto, Portugal), taking advantage of State-of-the-Art (SoA) data science techniques and methods, including Neural Architecture Search (NAS), explainable Artificial Intelligence (XAI), and Deep Learning (DL), aimed to explore the hidden value of data, namely on electrocardiogram (ECG) records performed during follow-up visits. The combination of these techniques allowed us to clarify subtle cardiovascular changes already present at 10 years of age, which are evident from ECG analysis and probably induced by the presence of obesity. The proposed novel combination of new methodologies and techniques is discussed, as well as their applicability in other health domains.João Rala Cordeiro received support from Fundação para a Ciência e Tecnologia (PhD Research Scholarship reference 2020.07443.BD)

    Optimality of private quantum channels

    Full text link
    We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel E\cal E and von Neumann entropy of the ciphertext state ϱ(0)\varrho^{(0)}. Based on these bounds we have shown that decomposition of private quantum channels into orthogonal unitaries (if exists) is optimizing the entropy. For non-ancillary single qubit PQC we have derived the optimal entropy for arbitrary set of plaintexts. In particular, we have shown that except when the (closure of the) set of plaintexts contains all states, one bit key is sufficient. We characterized and analyzed all the possible single qubit private quantum channels for arbitrary set of plaintexts. For the set of plaintexts consisting of all qubit states we have characterized all possible approximate private quantum channels and we have derived the relation between the security parameter and the corresponding minimal entropy.Comment: no commen

    A Very Intense Neutrino Super Beam Experiment for Leptonic CP Violation Discovery based on the European Spallation Source Linac: A Snowmass 2013 White Paper

    Full text link
    Very intense neutrino beams and large neutrino detectors will be needed in order to enable the discovery of CP violation in the leptonic sector. We propose to use the proton linac of the European Spallation Source currently under construction in Lund, Sweden to deliver, in parallel with the spallation neutron production, a very intense, cost effective and high performance neutrino beam. The baseline program for the European Spallation Source linac is that it will be fully operational at 5 MW average power by 2022, producing 2 GeV 2.86 ms long proton pulses at a rate of 14 Hz. Our proposal is to upgrade the linac to 10 MW average power and 28 Hz, producing 14 pulses/s for neutron production and 14 pulses/s for neutrino production. Furthermore, because of the high current required in the pulsed neutrino horn, the length of the pulses used for neutrino production needs to be compressed to a few μ\mus with the aid of an accumulator ring. A long baseline experiment using this Super Beam and a megaton underground Water Cherenkov detector located in existing mines 300-600 km from Lund will make it possible to discover leptonic CP violation at 5 σ\sigma significance level in up to 50% of the leptonic Dirac CP-violating phase range. This experiment could also determine the neutrino mass hierarchy at a significance level of more than 3 σ\sigma if this issue will not already have been settled by other experiments by then. The mass hierarchy performance could be increased by combining the neutrino beam results with those obtained from atmospheric neutrinos detected by the same large volume detector. This detector will also be used to measure the proton lifetime, detect cosmological neutrinos and neutrinos from supernova explosions. Results on the sensitivity to leptonic CP violation and the neutrino mass hierarchy are presented.Comment: 28 page

    Damping of supernova neutrino transitions in stochastic shock-wave density profiles

    Full text link
    Supernova neutrino flavor transitions during the shock wave propagation are known to encode relevant information not only about the matter density profile but also about unknown neutrino properties, such as the mass hierarchy (normal or inverted) and the mixing angle theta_13. While previous studies have focussed on "deterministic" density profiles, we investigate the effect of possible stochastic matter density fluctuations in the wake of supernova shock waves. In particular, we study the impact of small-scale fluctuations on the electron (anti)neutrino survival probability, and on the observable spectra of inverse-beta-decay events in future water-Cherenkov detectors. We find that such fluctuations, even with relatively small amplitudes, can have significant damping effects on the flavor transition pattern, and can partly erase the shock-wave imprint on the observable time spectra, especially for sin^2(theta_13) > O(10^-3).Comment: v2 (23 pages, including 6 eps figures). Typos removed, references updated, matches the published versio

    Dark Matter Search in the Edelweiss Experiment

    Get PDF
    Preliminary results obtained with 320g bolometers with simultaneous ionization and heat measurements are described. After a few weeks of data taking, data accumulated with one of these detectors are beginning to exclude the upper part of the DAMA region. Prospects for the present run and the second stage of the experiment, EDELWEISS-II, using an innovative reversed cryostat allowing data taking with 100 detectors, are briefly described.Comment: IDM 2000, 3rd International Workshop on the Identification of Dark Matter, York (GB), 18-22/09/2000, v2.0 minor modification

    Bridging topological and functional information in protein interaction networks by short loops profiling

    Get PDF
    Protein-protein interaction networks (PPINs) have been employed to identify potential novel interconnections between proteins as well as crucial cellular functions. In this study we identify fundamental principles of PPIN topologies by analysing network motifs of short loops, which are small cyclic interactions of between 3 and 6 proteins. We compared 30 PPINs with corresponding randomised null models and examined the occurrence of common biological functions in loops extracted from a cross-validated high-confidence dataset of 622 human protein complexes. We demonstrate that loops are an intrinsic feature of PPINs and that specific cell functions are predominantly performed by loops of different lengths. Topologically, we find that loops are strongly related to the accuracy of PPINs and define a core of interactions with high resilience. The identification of this core and the analysis of loop composition are promising tools to assess PPIN quality and to uncover possible biases from experimental detection methods. More than 96% of loops share at least one biological function, with enrichment of cellular functions related to mRNA metabolic processing and the cell cycle. Our analyses suggest that these motifs can be used in the design of targeted experiments for functional phenotype detection.This research was supported by the Biotechnology and Biological Sciences Research Council (BB/H018409/1 to AP, ACCC and FF, and BB/J016284/1 to NSBT) and by the Leukaemia & Lymphoma Research (to NSBT and FF). SSC is funded by a Leukaemia & Lymphoma Research Gordon Piller PhD Studentship
    corecore