22,371 research outputs found

    Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

    Full text link
    We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1n+1 agents via the control of the others in a network. It will be shown that the outcomes in the cases that nn is odd or it is even are different in principle as the receiver has to perform a controlled-not operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubits approaches the maximal value.Comment: 9 pages, 3 figures; the revised version published in Physical Review A 72, 022338 (2005). The detail for setting up a GHZ-state quantum channel is adde

    Low Expression of DYRK2 (Dual Specificity Tyrosine Phosphorylation Regulated Kinase 2) Correlates with Poor Prognosis in Colorectal Cancer.

    Get PDF
    Dual-specificity tyrosine-phosphorylation-regulated kinase 2 (DYRK2) is a member of dual-specificity kinase family, which could phosphorylate both Ser/Thr and Tyr substrates. The role of DYRK2 in human cancer remains controversial. For example, overexpression of DYRK2 predicts a better survival in human non-small cell lung cancer. In contrast, amplification of DYRK2 gene occurs in esophageal/lung adenocarcinoma, implying the role of DYRK2 as a potential oncogene. However, its clinical role in colorectal cancer (CRC) has not been explored. In this study, we analyzed the expression of DYRK2 from Oncomine database and found that DYRK2 level is lower in primary or metastatic CRC compared to adjacent normal colon tissue or non-metastatic CRC, respectively, in 6 colorectal carcinoma data sets. The correlation between DYRK2 expression and clinical outcome in 181 CRC patients was also investigated by real-time PCR and IHC. DYRK2 expression was significantly down-regulated in colorectal cancer tissues compared with adjacent non-tumorous tissues. Functional studies confirmed that DYRK2 inhibited cell invasion and migration in both HCT116 and SW480 cells and functioned as a tumor suppressor in CRC cells. Furthermore, the lower DYRK2 levels were correlated with tumor sites (P = 0.023), advanced clinical stages (P = 0.006) and shorter survival in the advanced clinical stages. Univariate and multivariate analyses indicated that DYRK2 expression was an independent prognostic factor (P < 0.001). Taking all, we concluded that DYRK2 a novel prognostic biomarker of human colorectal cancer

    Deformable Object Tracking with Gated Fusion

    Full text link
    The tracking-by-detection framework receives growing attentions through the integration with the Convolutional Neural Networks (CNNs). Existing tracking-by-detection based methods, however, fail to track objects with severe appearance variations. This is because the traditional convolutional operation is performed on fixed grids, and thus may not be able to find the correct response while the object is changing pose or under varying environmental conditions. In this paper, we propose a deformable convolution layer to enrich the target appearance representations in the tracking-by-detection framework. We aim to capture the target appearance variations via deformable convolution, which adaptively enhances its original features. In addition, we also propose a gated fusion scheme to control how the variations captured by the deformable convolution affect the original appearance. The enriched feature representation through deformable convolution facilitates the discrimination of the CNN classifier on the target object and background. Extensive experiments on the standard benchmarks show that the proposed tracker performs favorably against state-of-the-art methods

    Sub-TeV proton beam generation by ultra-intense laser irradiation of foil-and-gas target

    Get PDF
    A two-phase proton acceleration scheme using an ultra-intense laser pulse irradiating a proton foil with a tenuous heavier-ion plasma behind it is presented. The foil electrons are compressed and pushed out as a thin dense layer by the radiation pressure and propagate in the plasma behind at near the light speed. The protons are in turn accelerated by the resulting space-charge field and also enter the backside plasma, but without the formation of a quasistationary double layer. The electron layer is rapidly weakened by the space-charge field. However, the laser pulse originally behind it now snowplows the backside-plasma electrons and creates an intense electrostatic wakefield. The latter can stably trap and accelerate the pre-accelerated proton layer there for a very long distance and thus to very high energies. The two-phase scheme is verified by particle-in-cell simulations and analytical modeling, which also suggests that a 0.54 TeV proton beam can be obtained with a 10(23) W/cm(2) laser pulse. (C) 2012 American Institute of Physics. [doi:10.1063/1.3684658]Physics, Fluids & PlasmasSCI(E)EI0ARTICLE2null1

    Multiparty Quantum Secret Report

    Full text link
    A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her MM agents first share a sequence of (MM+1)-particle Greenberger--Horne--Zeilinger (GHZ) states that only Alice knows which state each (MM+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a σx\sigma_x operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measure them with two measuring bases. After confirming the security of the quantum key, they use the GHZ states remained repeatedly for next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for qubits and the total efficiency.Comment: 4 pages, no figure
    corecore