68 research outputs found

    Citizen Health Science: Foundations of a New Data Science Arena

    Get PDF
    Psychology has a long tradition of interest and experience in single subject studies, providing a forerunner scientific platform for person-level trends as they contribute to population data science. Building on this long-standing tradition, population health scientists are increasingly concerned with opportunities to draw inferences about the single case, or studies utilizing an ‘N-of-1’. At the same time, citizen scientists with health interests have become more equipped to conduct their own types of N-of-1 studies given new tools such as smart phone tracking and many other mobile health or “mHealth” devices. These advances in the single case or N-of-1 tradition sometimes involve self-tracking of health data and/or self-experimentationwith one’s own health. As networks (increasingly, virtual ones) of people work to maintain or improve their health, a new platform for scientific inquiry has emerged. This paper considers how the confluence of the single case tradition and self-experimentation are key ingredients in a new data science-rich platform, that of citizen health science

    Screening of Intestinal Bacteria for the Presence of Cytochrome P450 with Induction by Phenobarbital

    Get PDF
    Department of Microbiology and Molecular Genetic

    Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

    Get PDF
    A continuous variable ping-pong scheme, which is utilized to generate deterministically private key, is proposed. The proposed scheme is implemented physically by using Gaussian-modulated squeezed states. The deterministic way, i.e., no basis reconciliation between two parties, leads a two-times efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.Comment: 7 pages, 4figure

    A generalization of the Entropy Power Inequality to Bosonic Quantum Systems

    Full text link
    In most communication schemes information is transmitted via travelling modes of electromagnetic radiation. These modes are unavoidably subject to environmental noise along any physical transmission medium and the quality of the communication channel strongly depends on the minimum noise achievable at the output. For classical signals such noise can be rigorously quantified in terms of the associated Shannon entropy and it is subject to a fundamental lower bound called entropy power inequality. Electromagnetic fields are however quantum mechanical systems and then, especially in low intensity signals, the quantum nature of the information carrier cannot be neglected and many important results derived within classical information theory require non-trivial extensions to the quantum regime. Here we prove one possible generalization of the Entropy Power Inequality to quantum bosonic systems. The impact of this inequality in quantum information theory is potentially large and some relevant implications are considered in this work

    Anaplasma phagocytophilum in White-tailed Deer

    Get PDF
    We examined the reservoir potential of white-tailed deer for Anaplasma phagocytophilum. Results suggest that white-tailed deer harbor a variant strain not associated with human infection, but contrary to published reports, white-tailed deer are not a reservoir for strains that cause human disease. These results will affect surveillance studies of vector and reservoir populations

    Gaussian Quantum Information

    Get PDF
    The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits. Quantum computers, quantum cryptography and quantum teleportation are among the most celebrated ideas that have emerged from this new field. It was realized later on that using continuous-variable quantum information carriers, instead of qubits, constitutes an extremely powerful alternative approach to quantum information processing. This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements. Interestingly, such a restriction to the Gaussian realm comes with various benefits, since on the theoretical side, simple analytical tools are available and, on the experimental side, optical components effecting Gaussian processes are readily available in the laboratory. Yet, Gaussian quantum information processing opens the way to a wide variety of tasks and applications, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination. This review reports on the state of the art in this field, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments.Comment: 51 pages, 7 figures, submitted to Reviews of Modern Physic

    Security against individual attacks for realistic quantum key distribution

    Get PDF
    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup which can be used to optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure

    Quantum Optical Systems for the Implementation of Quantum Information Processing

    Get PDF
    We review the field of Quantum Optical Information from elementary considerations through to quantum computation schemes. We illustrate our discussion with descriptions of experimental demonstrations of key communication and processing tasks from the last decade and also look forward to the key results likely in the next decade. We examine both discrete (single photon) type processing as well as those which employ continuous variable manipulations. The mathematical formalism is kept to the minimum needed to understand the key theoretical and experimental results

    The constitution of risk communication in advanced liberal societies

    Get PDF
    This article aims to bring to the fore some of the underlying rationales that inform common conceptions of the constitution of risk communication in academic and policy communities. ‘Normative’, ‘instrumental’ and ‘substantive’ imperatives typically employed in the utilisation of risk communication are first outlined. In light of these considerations a theoretical scheme is subsequently devised leading to the articulation of four fundamental ‘idealised’ models of risk communication termed the ‘risk message’ model, the ‘risk dialogue’ model, the ‘risk field’ model and the ‘risk government’ model respectively. It is contended that the diverse conceptual foundations underlying the orientation of each model suggest a further need for a more contextualised view of risk communication that takes account not only of the strengths and limitations of different formulations and functions of risk communication, but also the underlying knowledge/power dynamics that underlie its constitution. In particular it is hoped that the reflexive theoretical understanding presented here will help to bring some much needed conceptual clarity to academic and policy discourses about the use and utility of risk communication in advanced liberal societies
    corecore