1,102 research outputs found

    'Living in translation': A conversation with Eva Hoffman

    Get PDF

    Polarization and frequency disentanglement of photons via stochastic polarization mode dispersion

    Full text link
    We investigate the quantum decoherence of frequency and polarization variables of photons via polarization mode dispersion in optical fibers. By observing the analogy between the propagation equation of the field and the Schr\"odinger equation, we develop a master equation under Markovian approximation and analytically solve for the field density matrix. We identify distinct decay behaviors for the polarization and frequency variables for single-photon and two-photon states. For the single photon case, purity functions indicate that complete decoherence for each variable is possible only for infinite fiber length. For entangled two-photon states passing through separate fibers, entanglement associated with each variable can be completely destroyed after characteristic finite propagation distances. In particular, we show that frequency disentanglement is independent of the initial polarization status. For propagation of two photons in a common fiber, the evolution of a polarization singlet state is addressed. We show that while complete polarization disentanglement occurs at a finite propagation distance, frequency entanglement could survive at any finite distance for gaussian states.Comment: 2 figure

    Viewpoint: ‘When black lives matter all lives will matter’ − a teacher and three students discuss the BLM movement

    Get PDF
    The Black Lives Matter (BLM) movement is generating a new appetite for understanding the ubiquity of systemic racism. In this short piece, a professor and three newly graduated students from different racialized groups reflect on the reproduction of social inequalities in key institutions and on what decolonization means for the nation, not just for education

    Bacterial susceptibility and resistance to modelin-5.

    Get PDF
    Modelin-5 (M5-NH ) killed with a minimum lethal concentration (MLC) of 5.86 μM and strongly bound its cytoplasmic membrane (CM) with a of 23.5 μM. The peptide adopted high levels of amphiphilic α-helical structure (75.0%) and penetrated the CM hydrophobic core (8.0 mN m ). This insertion destabilised CM structure increased lipid packing and decreased fluidity (Δ 0) and promoted only low levels of lysis (24.3%). The insertion and lysis of the CM by M5-NH showed a strong negative correlation with its lysyl phosphatidylglycerol (Lys-PG) content ( > 0.98). In combination, these data suggested that Lys-PG mediated mechanisms inhibited the membranolytic action of M5-NH against , thereby rendering the organism resistant to the peptide. These results are discussed in relation to structure/function relationships of M5-NH and CM lipids that underpin bacterial susceptibility and resistance to the peptide

    Security against eavesdropping in quantum cryptography

    Get PDF
    In this article we deal with the security of the BB84 quantum cryptography protocol over noisy channels using generalized privacy amplification. For this we estimate the fraction of bits needed to be discarded during the privacy amplification step. This estimate is given for two scenarios, both of which assume the eavesdropper to access each of the signals independently and take error correction into account. One scenario does not allow a delay of the eavesdropper's measurement of a measurement probe until he receives additional classical information. In this scenario we achieve a sharp bound. The other scenario allows a measurement delay, so that the general attack of an eavesdropper on individual signals is covered. This bound is not sharp but allows a practical implementation of the protocol.Comment: 11 pages including 3 figures, contains new results not contained in my Phys. Rev. A pape

    PEGylated graphene oxide for tumor-targeted delivery of paclitaxel.

    Get PDF
    AIM: The graphene oxide (GO) sheet has been considered one of the most promising carbon derivatives in the field of material science for the past few years and has shown excellent tumor-targeting ability, biocompatibility and low toxicity. We have endeavored to conjugate paclitaxel (PTX) to GO molecule and investigate its anticancer efficacy. MATERIALS & METHODS: We conjugated the anticancer drug PTX to aminated PEG chains on GO sheets through covalent bonds to get GO-PEG-PTX complexes. The tissue distribution and anticancer efficacy of GO-PEG-PTX were then investigated using a B16 melanoma cancer-bearing C57 mice model. RESULTS: The GO-PEG-PTX complexes exhibited excellent water solubility and biocompatibility. Compared with the traditional formulation of PTX (Taxol®), GO-PEG-PTX has shown prolonged blood circulation time as well as high tumor-targeting and -suppressing efficacy. CONCLUSION: PEGylated graphene oxide is an excellent nanocarrier for paclitaxel for cancer targeting

    Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts

    Full text link
    We discuss the potential of quantum key distribution (QKD) for long distance communication by proposing a new analysis of the errors caused by dark counts. We give sufficient conditions for a considerable improvement of the key generation rates and the security thresholds of well-known QKD protocols such as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state protocol. This analysis is applicable to other QKD protocols like Bennett 1992. We examine two scenarios: a sender using a perfect single-photon source and a sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse reconciliation as suggested by Nicolas Gisi

    How paradata can illuminate technical, social and professional role changes between the Poverty in the UK (1967/1968) and Poverty and Social Exclusion in the UK (2012) surveys

    Get PDF
    This article brings together analyses of the micro paradata ‘by-products’ from the 1967/1968 Poverty in the United Kingdom (PinUK) and 2012 Poverty and Social Exclusion in the UK (PSE) surveys to explore changes in the conditions of production over this 45 year period. We highlight technical, social and professional role continuities and changes, shaped by the institutionalisation of survey researchers, the professionalization of the field interviewer, and economisation. While there are similarities between the surveys in that field interviewers were and are at the bottom of the research hierarchy, we demonstrate an increasing segregation between the core research team and field interviewers. In PinUK the field interviewers are visible in the paper survey booklets; through their handwritten notes on codes and in written marginalia they can ‘talk’ to the central research team. In PSE they are absent from the computer mediated data, and from communication with the central team. We argue that, while there have been other benefits to field interviewers, their relational labour has become less visible in a shift from the exercise of observational judgement to an emphasis on standardisation. Yet, analyses of what field interviewers actually do show that they still need to deploy the same interpersonal skills and resourcefulness to secure and maintain interviews as they did 45 years previously

    Poverty in the UK: Advancing paradata analysis and open access

    Get PDF
    This project aimed to provide open access to data from Peter Townsend’s 1967-68 Poverty in the UK (PinUK) landmark UK survey, and to enhance the capacity to use it, through innovative analysis of micro paradata and comparative analysis of macro paradata. This is the final report

    Security proof of a three-state quantum key distribution protocol without rotational symmetry

    Get PDF
    Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0_z> and |1_z>, can contribute to key generation and the third state, |+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result on the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the BB84 protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol; while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
    • …
    corecore