667 research outputs found

    Structures 2 - The response of a clamped circular plate to impulsive loads

    Get PDF
    Computer analysis of clamped circular plate response to axisymmetric impulsive loa

    Structures i- the response of beams and rings to high-intensity, short-duration loading

    Get PDF
    Computer programs for determining response of beams and rings to high intensity, short duration loadin

    Operation manual for the NOTS-NASA Rocket- Motor Acoustic Test Facility steady-state resonance tests with flow

    Get PDF
    Operation manual for steady state resonance tests through flow at rocket motor acoustic test facilit

    Model for reflection and transmission matrices of nanowire end facets

    Full text link
    Nanowires show a large potential for various electrooptical devices, such as light emitting diodes, solar cells and nanowire lasers. We present a direct method developed to calculate the modal reflection and transmission matrix at the end facets of a waveguide of arbitrary cross section, resulting in a generalized version of the Fresnel equations. The reflection can be conveniently computed using Fast Fourier Transforms. We demonstrate that the reflection is qualitatively described by two main parameters, the modal field confinement and the average Fresnel reflection of the plane waves constituting the waveguide mode.Comment: 11 pages,14 figure

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Secure gated detection scheme for quantum cryptography

    Full text link
    Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate, and the detector must be single-photon sensitive. Here we present a technique called bit-mapped gating, which is an elegant way to force the detections in the middle of the detector gate by coupling detection time and quantum bit error rate. We also discuss how to guarantee single-photon sensitivity by directly measuring detector parameters. Bit-mapped gating also provides a simple way to measure the detector blinding parameter in security proofs for quantum key distribution systems with detector efficiency mismatch, which up until now has remained a theoretical, unmeasurable quantity. Thus if single-photon sensitivity can be guaranteed within the gates, a detection scheme with bit-mapped gating satisfies the assumptions of the current security proofs.Comment: 7 pages, 3 figure

    On the electromagnetic properties of active media

    Full text link
    Several results concerning active media or metamaterials are proved and discussed. In particular, we consider the permittivity, permeability, wave vector, and refractive index, and discuss stability, refraction, gain, and fundamental limitations resulting from causality

    Effects of detector efficiency mismatch on security of quantum cryptosystems

    Full text link
    We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have different efficiencies, the security of quantum key distribution can be compromised. Specifically, we show for the Bennett-Brassard 1984 (BB84) protocol that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough (roughly 15:1 or larger), Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%. We also derive a general security bound as a function of the detector sensitivity mismatch for the BB84 protocol. Experimental data for two different detectors are presented, and protection measures against this attack are discussed.Comment: v3: identical to the journal version. However, after publication we have discovered that Eq. 11 is incorrect: the available bit rate after privacy amplification is reduced even in the case (QBER)=0 [see Quant. Inf. Comp. 7, 73 (2007)

    Medically relevant Acinetobacter species require a type II secretion system and specific membrane-associated chaperones for the export of multiple substrates and full virulence

    Get PDF
    Acinetobacter baumannii, A. nosocomialis, and A. pittii have recently emerged as opportunistic human pathogens capable of causing severe human disease; however, the molecular mechanisms employed by Acinetobacter to cause disease remain poorly understood. Many pathogenic members of the genus Acinetobacter contain genes predicted to encode proteins required for the biogenesis of a type II secretion system (T2SS), which have been shown to mediate virulence in many Gram-negative organisms. Here we demonstrate that Acinetobacter nosocomialis strain M2 produces a functional T2SS, which is required for full virulence in both the Galleria mellonella and murine pulmonary infection models. Importantly, this is the first bona fide secretion system shown to be required for virulence in Acinetobacter. Using bioinformatics, proteomics, and mutational analyses, we show that Acinetobacter employs its T2SS to export multiple substrates, including the lipases LipA and LipH as well as the protease CpaA. Furthermore, the Acinetobacter T2SS, which is found scattered amongst five distinct loci, does not contain a dedicated pseudopilin peptidase, but instead relies on the type IV prepilin peptidase, reinforcing the common ancestry of these two systems. Lastly, two of the three secreted proteins characterized in this study require specific chaperones for secretion. These chaperones contain an N-terminal transmembrane domain, are encoded adjacently to their cognate effector, and their disruption abolishes type II secretion of their cognate effector. Bioinformatic analysis identified putative chaperones located adjacent to multiple previously known type II effectors from several Gram-negative bacteria, which suggests that T2SS chaperones constitute a separate class of membrane-associated chaperones mediating type II secretion
    corecore