667 research outputs found
Structures 2 - The response of a clamped circular plate to impulsive loads
Computer analysis of clamped circular plate response to axisymmetric impulsive loa
Structures i- the response of beams and rings to high-intensity, short-duration loading
Computer programs for determining response of beams and rings to high intensity, short duration loadin
Operation manual for the NOTS-NASA Rocket- Motor Acoustic Test Facility steady-state resonance tests with flow
Operation manual for steady state resonance tests through flow at rocket motor acoustic test facilit
Model for reflection and transmission matrices of nanowire end facets
Nanowires show a large potential for various electrooptical devices, such as
light emitting diodes, solar cells and nanowire lasers. We present a direct
method developed to calculate the modal reflection and transmission matrix at
the end facets of a waveguide of arbitrary cross section, resulting in a
generalized version of the Fresnel equations. The reflection can be
conveniently computed using Fast Fourier Transforms. We demonstrate that the
reflection is qualitatively described by two main parameters, the modal field
confinement and the average Fresnel reflection of the plane waves constituting
the waveguide mode.Comment: 11 pages,14 figure
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
Secure gated detection scheme for quantum cryptography
Several attacks have been proposed on quantum key distribution systems with
gated single-photon detectors. The attacks involve triggering the detectors
outside the center of the detector gate, and/or using bright illumination to
exploit classical photodiode mode of the detectors. Hence a secure detection
scheme requires two features: The detection events must take place in the
middle of the gate, and the detector must be single-photon sensitive. Here we
present a technique called bit-mapped gating, which is an elegant way to force
the detections in the middle of the detector gate by coupling detection time
and quantum bit error rate. We also discuss how to guarantee single-photon
sensitivity by directly measuring detector parameters. Bit-mapped gating also
provides a simple way to measure the detector blinding parameter in security
proofs for quantum key distribution systems with detector efficiency mismatch,
which up until now has remained a theoretical, unmeasurable quantity. Thus if
single-photon sensitivity can be guaranteed within the gates, a detection
scheme with bit-mapped gating satisfies the assumptions of the current security
proofs.Comment: 7 pages, 3 figure
On the electromagnetic properties of active media
Several results concerning active media or metamaterials are proved and
discussed. In particular, we consider the permittivity, permeability, wave
vector, and refractive index, and discuss stability, refraction, gain, and
fundamental limitations resulting from causality
Effects of detector efficiency mismatch on security of quantum cryptosystems
We suggest a type of attack on quantum cryptosystems that exploits variations
in detector efficiency as a function of a control parameter accessible to an
eavesdropper. With gated single-photon detectors, this control parameter can be
the timing of the incoming pulse. When the eavesdropper sends short pulses
using the appropriate timing so that the two gated detectors in Bob's setup
have different efficiencies, the security of quantum key distribution can be
compromised. Specifically, we show for the Bennett-Brassard 1984 (BB84)
protocol that if the efficiency mismatch between 0 and 1 detectors for some
value of the control parameter gets large enough (roughly 15:1 or larger), Eve
can construct a successful faked-states attack causing a quantum bit error rate
lower than 11%. We also derive a general security bound as a function of the
detector sensitivity mismatch for the BB84 protocol. Experimental data for two
different detectors are presented, and protection measures against this attack
are discussed.Comment: v3: identical to the journal version. However, after publication we
have discovered that Eq. 11 is incorrect: the available bit rate after
privacy amplification is reduced even in the case (QBER)=0 [see Quant. Inf.
Comp. 7, 73 (2007)
Medically relevant Acinetobacter species require a type II secretion system and specific membrane-associated chaperones for the export of multiple substrates and full virulence
Acinetobacter baumannii, A. nosocomialis, and A. pittii have recently emerged as opportunistic human pathogens capable of causing severe human disease; however, the molecular mechanisms employed by Acinetobacter to cause disease remain poorly understood. Many pathogenic members of the genus Acinetobacter contain genes predicted to encode proteins required for the biogenesis of a type II secretion system (T2SS), which have been shown to mediate virulence in many Gram-negative organisms. Here we demonstrate that Acinetobacter nosocomialis strain M2 produces a functional T2SS, which is required for full virulence in both the Galleria mellonella and murine pulmonary infection models. Importantly, this is the first bona fide secretion system shown to be required for virulence in Acinetobacter. Using bioinformatics, proteomics, and mutational analyses, we show that Acinetobacter employs its T2SS to export multiple substrates, including the lipases LipA and LipH as well as the protease CpaA. Furthermore, the Acinetobacter T2SS, which is found scattered amongst five distinct loci, does not contain a dedicated pseudopilin peptidase, but instead relies on the type IV prepilin peptidase, reinforcing the common ancestry of these two systems. Lastly, two of the three secreted proteins characterized in this study require specific chaperones for secretion. These chaperones contain an N-terminal transmembrane domain, are encoded adjacently to their cognate effector, and their disruption abolishes type II secretion of their cognate effector. Bioinformatic analysis identified putative chaperones located adjacent to multiple previously known type II effectors from several Gram-negative bacteria, which suggests that T2SS chaperones constitute a separate class of membrane-associated chaperones mediating type II secretion
- …