1,288 research outputs found

    The Swastika: A Prophetic Symbol.

    Get PDF

    Computationally Efficient Implementation of Convolution-based Locally Adaptive Binarization Techniques

    Full text link
    One of the most important steps of document image processing is binarization. The computational requirements of locally adaptive binarization techniques make them unsuitable for devices with limited computing facilities. In this paper, we have presented a computationally efficient implementation of convolution based locally adaptive binarization techniques keeping the performance comparable to the original implementation. The computational complexity has been reduced from O(W2N2) to O(WN2) where WxW is the window size and NxN is the image size. Experiments over benchmark datasets show that the computation time has been reduced by 5 to 15 times depending on the window size while memory consumption remains the same with respect to the state-of-the-art algorithmic implementation

    Real-time capabilities of a digital analyzer for mixed-field assay using scintillation detectors

    Get PDF
    Scintillation detectors offer a single-step detection method for fast neutrons and necessitate real-time acquisition, whereas this is redundant in two-stage thermal detection systems using helium-3 and lithium-6, where the fast neutrons need to be thermalized prior to detection. The relative affordability of scintillation detectors and the associated fast digital acquisition systems have enabled entirely new measurement setups that can consist of sizeable detector arrays. These detectors in most cases rely on photomultiplier tubes, which have significant tolerances and result in variations in detector response functions. The detector tolerances and other environmental instabilities must be accounted for in measurements that depend on matched detector performance. This paper presents recent advances made to a high-speed FPGA-based digitizer. The technology described offers a complete solution for fast-neutron scintillation detectors by integrating multichannel high-speed data acquisition technology with dedicated detector high-voltage supplies. This configuration has significant advantages for large detector arrays that require uniform detector responses. We report on bespoke control software and firmware techniques that exploit real-time functionality to reduce setup and acquisition time, increase repeatability, and reduce statistical uncertainties

    Recovery of 150-250 MeV/nuc Cosmic Ray Helium Nuclei Intensities Between 2004-2010 Near the Earth, at Voyager 2 and Voyager 1 in the Heliosheath - A Two Zone Helioshpere

    Full text link
    The recovery of cosmic ray He nuclei of energy ~150-250 MeV/nuc in solar cycle #23 from 2004 to 2010 has been followed at the Earth using IMP and ACE data and at V2 between 74-92 AU and also at V1 beyond the heliospheric termination shock (91-113 AU). The correlation coefficient between the intensities at the Earth and at V1 during this time period is remarkable (0.921), after allowing for a ~0.9 year delay due to the solar wind propagation time from the Earth to the outer heliosphere. To describe the intensity changes and to predict the absolute intensities measured at all three locations we have used a simple spherically symmetric (no drift) two-zone heliospheric transport model with specific values for the diffusion coefficient in both the inner and outer zones. The diffusion coefficient in the outer zone, assumed to be the heliosheath from about 90 to 120 (130) AU, is determined to be ~5 times smaller than that in the inner zone out to 90 AU. This means the Heliosheath acts much like a diffusing barrier in this model. The absolute magnitude of the intensities and the intensity changes at V1 and the Earth are described to within a few percent by a diffusion coefficient that varies with time by a factor ~4 in the inner zone and only a factor of ~1.5 in the outer zone over the time period from 2004-2010. For V2 the observed intensities follow a curve that is as much as 25% higher than the calculated intensities at the V2 radius and at times the observed V2 intensities are equal to those at V1. At least one-half of the difference between the calculated and observed intensities between V1 and V2 can be explained if the heliosphere is squashed by ~10% in distance (non-spherical) so that the HTS location is closer to the Sun in the direction of V2 compared to V1.Comment: 13 Pages, 8 Figure

    Dynamics of entanglement between two trapped atoms

    Get PDF
    We investigate the dynamics of entanglement between two continuous variable quantum systems. The model system consists of two atoms in a harmonic trap which are interacting by a simplified s-wave scattering. We show, that the dynamically created entanglement changes in a steplike manner. Moreover, we introduce local operators which allow us to violate a Bell-CHSH inequality adapted to the continuous variable case. The correlations show nonclassical behavior and almost reach the maximal quantum mechanical value. This is interesting since the states prepared by this interaction are very different from any EPR-like state.Comment: 9 page

    Assembly-based inference of B-cell receptor repertoires from short read RNA sequencing data with V'DJer

    Get PDF
    Motivation: B-cell receptor (BCR) repertoire profiling is an important tool for understanding the biology of diverse immunologic processes. Current methods for analyzing adaptive immune receptor repertoires depend upon PCR amplification of VDJ rearrangements followed by long read amplicon sequencing spanning the VDJ junctions. While this approach has proven to be effective, it is frequently not feasible due to cost or limited sample material. Additionally, there are many existing datasets where short-read RNA sequencing data are available but PCR amplified BCR data are not. Results: We present here V'DJer, an assembly-based method that reconstructs adaptive immune receptor repertoires from short-read RNA sequencing data. This method captures expressed BCR loci from a standard RNA-seq assay. We applied this method to 473 Melanoma samples from The Cancer Genome Atlas and demonstrate V'DJer's ability to accurately reconstruct BCR repertoires from short read mRNA-seq data

    Secure quantum key distribution using squeezed states

    Get PDF
    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e^r=1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel.Comment: 19 pages, 3 figures, RevTeX and epsf, new section on channel losse

    Assessment of pollen rewards by foraging bees

    Get PDF
    This is the author accepted manuscript. The final version is available from Wiley via the DOI in this record.The removal of pollen by flower-visiting insects is costly to plants, not only in terms of production, but also via lost reproductive potential. Modern angiosperms have evolved various reward strategies to limit these costs, yet many plant species still offer pollen as a sole or major reward for pollinating insects. 2. The benefits plants gain by offering pollen as a reward for pollinating are defined by the behaviour of their pollinators, some of which feed on the pollen at the flower, while others collect pollen to provision offspring. 3. We explore how pollen impacts on the behaviour and foraging decisions of pollen-collecting bees, drawing comparisons with what is known for nectar rewards. This question is of particular interest since foraging bees typically do not ingest pollen during collection, meaning the sensory pathways involved in evaluating this resource are not immediately obvious. 4. Previous research focussed on whether foraging bees can determine the quality of pollen sources offered by different plant species, and attempted to infer the mechanisms underpinning such evaluations, mainly through observations of collection preferences in the field 5. More recent experimental research has started to focus on if pollen itself can mediate the detection of, and learning about, pollen sources and associated floral cues. 6. We review advancements in the understanding of how bees forage for pollen and respond to variation in pollen quality, and discuss future directions for studying how this ancestral floral food reward shapes the behaviour of pollinating insects

    Subtyping sub-Saharan esophageal squamous cell carcinoma by comprehensive molecular analysis

    Get PDF
    Esophageal squamous cell carcinoma (ESCC) is endemic in regions of sub-Saharan Africa (SSA), where it is the third most common cancer. Here, we describe whole-exome tumor/normal sequencing and RNA transcriptomic analysis of 59 patients with ESCC in Malawi. We observed similar genetic aberrations as reported in Asian and North American cohorts, including mutations of TP53, CDKN2A, NFE2L2, CHEK2, NOTCH1, FAT1, and FBXW7. Analyses for nonhuman sequences did not reveal evidence for infection with HPV or other occult pathogens. Mutational signature analysis revealed common signatures associated with aging, cytidine deaminase activity (APOBEC), and a third signature of unknown origin, but signatures of inhaled tobacco use, aflatoxin and mismatch repair were notably absent. Based on RNA expression analysis, ESCC could be divided into 3 distinct subtypes, which were distinguished by their expression of cell cycle and neural transcripts. This study demonstrates discrete subtypes of ESCC in SSA, and suggests that the endemic nature of this disease reflects exposure to a carcinogen other than tobacco and oncogenic viruses

    Ponderomotive entangling of atomic motions

    Get PDF
    We propose the use of ponderomotive forces to entangle the motions of different atoms. Two situations are analyzed: one where the atoms belong to the same optical cavity and interact with the same radiation field mode; the other where each atom is placed in own optical cavity and the output field of one cavity enters the other.Comment: Revtex file, five pages, two eps figure
    corecore