6,057 research outputs found

    Stacking the Equiangular Spiral

    Get PDF
    We present an algorithm that adapts the mature Stack and Draw (SaD) methodology for fabricating the exotic Equiangular Spiral Photonic Crystal Fiber. (ES-PCF) The principle of Steiner chains and circle packing is exploited to obtain a non-hexagonal design using a stacking procedure based on Hexagonal Close Packing. The optical properties of the proposed structure are promising for SuperContinuum Generation. This approach could make accessible not only the equiangular spiral but also other quasi-crystal PCF through SaD

    Studies on the white clover mosaic virus

    Get PDF

    Studies on the structure of poliovirus

    Get PDF
    Electron micrographs of poliovirus using negative staining technique and rotation technique suggest that the virus probably has 42 morphological subunits and 240 structural units or polypeptides. The structural units may also represent two different types of proteins

    Verifying proofs in constant depth

    Get PDF
    In this paper we initiate the study of proof systems where verification of proofs proceeds by NC circuits. We investigate the question which languages admit proof systems in this very restricted model. Formulated alternatively, we ask which languages can be enumerated by NC functions. Our results show that the answer to this problem is not determined by the complexity of the language. On the one hand, we construct NC proof systems for a variety of languages ranging from regular to NP-complete. On the other hand, we show by combinatorial methods that even easy regular languages such as Exact-OR do not admit NC proof systems. We also present a general construction of proof systems for regular languages with strongly connected NFA's

    Ad Hoc Multi-Input Functional Encryption

    Get PDF
    Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself. For flexibility and security, we envision schemes that allow sources to supply encrypted data, such that at any point a dynamically-chosen subset of sources can allow an agreed-upon joint function of their data to be computed by the aggregator. A primitive called multi-input functional encryption (MIFE), due to Goldwasser et al. (EUROCRYPT 2014), comes close, but has two main limitations: - it requires trust in a third party, who is able to decrypt all the data, and - it requires function arity to be fixed at setup time and to be equal to the number of parties. To drop these limitations, we introduce a new notion of ad hoc MIFE. In our setting, each source generates its own public key and issues individual, function-specific secret keys to an aggregator. For successful decryption, an aggregator must obtain a separate key from each source whose ciphertext is being computed upon. The aggregator could obtain multiple such secret-keys from a user corresponding to functions of varying arity. For this primitive, we obtain the following results: - We show that standard MIFE for general functions can be bootstrapped to ad hoc MIFE for free, i.e. without making any additional assumption. - We provide a direct construction of ad hoc MIFE for the inner product functionality based on the Learning with Errors (LWE) assumption. This yields the first construction of this natural primitive based on a standard assumption. At a technical level, our results are obtained by combining standard MIFE schemes and two-round secure multiparty computation (MPC) protocols in novel ways highlighting an interesting interplay between MIFE and two-round MPC

    Phase-matched four wave mixing and quantum beam splitting of matter waves in a periodic potential

    Full text link
    We show that the dispersion properties imposed by an external periodic potential ensure both energy and quasi-momentum conservation such that correlated pairs of atoms can be generated by four wave mixing from a Bose-Einstein condensate moving in an optical lattice potential. In our numerical solution of the Gross-Pitaevskii equation, a condensate with initial quasi-momentum k_0 is transferred almost completely (>95%) into a pair of correlated atomic components with quasi-momenta k_1 and k_2, if the system is seeded with a smaller number of atoms with the appropriate quasi-momentum k_1.Comment: 4 pages, 4 figures, version accepted for publication in Phys. Rev. A, Rapid Communication

    Head injury at a tertiary referral centre in the Eastern Region of Nepal

    Get PDF
    Background: The purpose of this epidemiologic study was to determine the pattern and characteristics of head injuries and to establish an epidemiologic data bank for designing preventive strategies for head injuries in the eastern region of Nepal.Patients and Methods: This retrospective review was done at B.P.Koirala institute of Health Sciences, Dharan, Nepal. All the patients with head injury admitted to the Department of Surgery between the periods January 2005 to December 2005 were included in the study.Results: The study population consisted of 334 patients who sustained head injuries. Their ages ranged from 1 to 88 with a mean age of 28.53 years. The majority (66.3%), were young adults in the 2nd to 5th decades The male to female sex ratio was 2.6:1. Road traffic crushes were the most common cause (43.4%) followed by fall from heights (30.8%). X-ray of skull showed lesions in 114 cases (49.8%) such as depressed fracture (11.4%) and linear fracture (24.0%). Common lesions on CT scan included cerebral contusion (21.6%), extradural haematoma (20.9%), linear fracture (23.8%), subarachnoid haemorrhage (18.5%) and pnemocephalus (11.2%). Forty patients (12.0%) sustained moderate head injury. There were 15 deaths. One patient had associated intra-abdominal injury (splenic rupture) and two patient sustained pulmonary trauma and succumbed to haemothorax and aspiration.Conclusion: A clearer understanding of the patterns of head injuries will assist health care providers to plan and manage the treatment of traumatic facial injuries. Such epidemiological information can also be used to guide the future funding of public health programs geared toward prevention

    A Cost-based Optimizer for Gradient Descent Optimization

    Full text link
    As the use of machine learning (ML) permeates into diverse application domains, there is an urgent need to support a declarative framework for ML. Ideally, a user will specify an ML task in a high-level and easy-to-use language and the framework will invoke the appropriate algorithms and system configurations to execute it. An important observation towards designing such a framework is that many ML tasks can be expressed as mathematical optimization problems, which take a specific form. Furthermore, these optimization problems can be efficiently solved using variations of the gradient descent (GD) algorithm. Thus, to decouple a user specification of an ML task from its execution, a key component is a GD optimizer. We propose a cost-based GD optimizer that selects the best GD plan for a given ML task. To build our optimizer, we introduce a set of abstract operators for expressing GD algorithms and propose a novel approach to estimate the number of iterations a GD algorithm requires to converge. Extensive experiments on real and synthetic datasets show that our optimizer not only chooses the best GD plan but also allows for optimizations that achieve orders of magnitude performance speed-up.Comment: Accepted at SIGMOD 201

    Size-dependence of Strong-Coupling Between Nanomagnets and Photonic Cavities

    Full text link
    The coherent dynamics of a coupled photonic cavity and a nanomagnet is explored as a function of nanomagnet size. For sufficiently strong coupling eigenstates involving highly entangled photon and spin states are found, which can be combined to create coherent states. As the size of the nanomagnet increases its coupling to the photonic mode also monotonically increases, as well as the number of photon and spin states involved in the system's eigenstates. For small nanomagnets the crystalline anisotropy of the magnet strongly localized the eigenstates in photon and spin number, quenching the potential for coherent states. For a sufficiently large nanomagnet the macrospin approximation breaks down and different domains of the nanomagnet may couple separately to the photonic mode. Thus the optimal nanomagnet size is just below the threshold for failure of the macrospin approximation.Comment: 10 pages, 7 figure
    corecore