3,902 research outputs found
Nonlinear interactions with an ultrahigh flux of broadband entangled photons
We experimentally demonstrate sum-frequency generation (SFG) with entangled
photon-pairs, generating as many as 40,000 SFG photons per second, visible even
to the naked eye. The nonclassical nature of the interaction is exhibited by a
linear intensity-dependence of the nonlinear process. The key element in our
scheme is the generation of an ultrahigh flux of entangled photons while
maintaining their nonclassical properties. This is made possible by generating
the down-converted photons as broadband as possible, orders of magnitude wider
than the pump. This approach is readily applicable for other nonlinear
interactions, and may be applicable for various quantum-measurement tasks.Comment: 4 pages, 2 figures, Accepted to Phys. Rev. Let
Secret-Sharing for NP
A computational secret-sharing scheme is a method that enables a dealer, that
has a secret, to distribute this secret among a set of parties such that a
"qualified" subset of parties can efficiently reconstruct the secret while any
"unqualified" subset of parties cannot efficiently learn anything about the
secret. The collection of "qualified" subsets is defined by a Boolean function.
It has been a major open problem to understand which (monotone) functions can
be realized by a computational secret-sharing schemes. Yao suggested a method
for secret-sharing for any function that has a polynomial-size monotone circuit
(a class which is strictly smaller than the class of monotone functions in P).
Around 1990 Rudich raised the possibility of obtaining secret-sharing for all
monotone functions in NP: In order to reconstruct the secret a set of parties
must be "qualified" and provide a witness attesting to this fact.
Recently, Garg et al. (STOC 2013) put forward the concept of witness
encryption, where the goal is to encrypt a message relative to a statement "x
in L" for a language L in NP such that anyone holding a witness to the
statement can decrypt the message, however, if x is not in L, then it is
computationally hard to decrypt. Garg et al. showed how to construct several
cryptographic primitives from witness encryption and gave a candidate
construction.
One can show that computational secret-sharing implies witness encryption for
the same language. Our main result is the converse: we give a construction of a
computational secret-sharing scheme for any monotone function in NP assuming
witness encryption for NP and one-way functions. As a consequence we get a
completeness theorem for secret-sharing: computational secret-sharing scheme
for any single monotone NP-complete function implies a computational
secret-sharing scheme for every monotone function in NP
Heart rate variability before and after cycle exercise in relation to different body positions
The purpose of this study was to assess the effect of three different body positions on HRV measures following short-term submaximal exercise. Thirty young healthy males performed submaximal cycling for five minutes on three different occasions. Measures of HRV were obtained from 5-min R to R wave intervals before the exercise (baseline) and during the last five minutes of a 15 min recovery (post-exercise) in three different body positions (seated, supine, supine with elevated legs). Measures of the mean RR normal-to-normal intervals (RRNN), the standard deviation of normal-to-normal intervals (SDNN), the root mean square of successive differences (RMSSD) and the low-frequency (LF) and the high-frequency (HF) spectral power were analyzed. Post-exercise RRNN, RMSSD were significantly higher in the two supine positions (p 0.05). Post-exercise time domain measures of HRV (RRNN, SDNN, RMSSD) were significantly lower compared with baseline values (p < 0.01) regardless body position. Post-exercise ln LF and ln HF in all three positions remained significantly reduced during recovery compared to baseline values (p < 0.01). The present study suggests that 15 minutes following short-term submaximal exercise most of the time and frequency domain HRV measures have not returned to pre-exercise values. Modifications in autonomic cardiac regulation induced by body posture present at rest remained after exercise, but the post-exercise differences among the three positions did not resemble the ones established at res
Non-Relativistic Gravitation: From Newton to Einstein and Back
We present an improvement to the Classical Effective Theory approach to the
non-relativistic or Post-Newtonian approximation of General Relativity. The
"potential metric field" is decomposed through a temporal Kaluza-Klein ansatz
into three NRG-fields: a scalar identified with the Newtonian potential, a
3-vector corresponding to the gravito-magnetic vector potential and a 3-tensor.
The derivation of the Einstein-Infeld-Hoffmann Lagrangian simplifies such that
each term corresponds to a single Feynman diagram providing a clear physical
interpretation. Spin interactions are dominated by the exchange of the
gravito-magnetic field. Leading correction diagrams corresponding to the 3PN
correction to the spin-spin interaction and the 2.5PN correction to the
spin-orbit interaction are presented.Comment: 10 pages, 3 figures. v2: published version. v3: Added a computation
of Einstein-Infeld-Hoffmann in higher dimensions within our improved ClEFT
which partially confirms and partially corrects a previous computation. See
notes added at end of introductio
Transcription factor interactions explain the context-dependent activity of CRX binding sites
The effects of transcription factor binding sites (TFBSs) on the activity of a cis-regulatory element (CRE) depend on the local sequence context. In rod photoreceptors, binding sites for the transcription factor (TF) Cone-rod homeobox (CRX) occur in both enhancers and silencers, but the sequence context that determines whether CRX binding sites contribute to activation or repression of transcription is not understood. To investigate the context-dependent activity of CRX sites, we fit neural network-based models to the activities of synthetic CREs composed of photoreceptor TFBSs. The models revealed that CRX binding sites consistently make positive, independent contributions to CRE activity, while negative homotypic interactions between sites cause CREs composed of multiple CRX sites to function as silencers. The effects of negative homotypic interactions can be overcome by the presence of other TFBSs that either interact cooperatively with CRX sites or make independent positive contributions to activity. The context-dependent activity of CRX sites is thus determined by the balance between positive heterotypic interactions, independent contributions of TFBSs, and negative homotypic interactions. Our findings explain observed patterns of activity among genomic CRX-bound enhancers and silencers, and suggest that enhancers may require diverse TFBSs to overcome negative homotypic interactions between TFBSs
Matched Asymptotic Expansion for Caged Black Holes - Regularization of the Post-Newtonian Order
The "dialogue of multipoles" matched asymptotic expansion for small black
holes in the presence of compact dimensions is extended to the Post-Newtonian
order for arbitrary dimensions. Divergences are identified and are regularized
through the matching constants, a method valid to all orders and known as
Hadamard's partie finie. It is closely related to "subtraction of
self-interaction" and shows similarities with the regularization of quantum
field theories. The black hole's mass and tension (and the "black hole
Archimedes effect") are obtained explicitly at this order, and a Newtonian
derivation for the leading term in the tension is demonstrated. Implications
for the phase diagram are analyzed, finding agreement with numerical results
and extrapolation shows hints for Sorkin's critical dimension - a dimension
where the transition turns second order.Comment: 28 pages, 5 figures. v2:published versio
Repercussions of the COVID-19 pandemic on child and adolescent mental health: A matter of concern—A joint statement from EAP and ECPCP
COVID-19 pandemic and the consequent rigid social distancing measures implemented, including school closures, have heavily impacted children's and adolescents' psychosocial wellbeing, and their mental health problems significantly increased. However, child and adolescent mental health were already a serious problem before the Pandemic all over the world. COVID-19 is not just a pandemic, it is a syndemic and mentally or socially disadvantaged children and adolescents are the most affected. Non-Communicable Diseases (NCDs) and previous mental health issues are an additional worsening condition. Even though many countries have responded with decisive efforts to scale-up mental health services, a more integrated and community-based approach to mental health is required. EAP and ECPCP makes recommendations to all the stakeholders to take action to promote, protect and care for the mental health of a generation
Pathogenic variants in CRX have distinct cis-regulatory effects on enhancers and silencers in photoreceptors
Dozens of variants in the gene for the homeodomain transcription factor (TF) cone-rod homeobox
PseudoGeneQuest – Service for identification of different pseudogene types in the human genome
<p>Abstract</p> <p>Background</p> <p>Pseudogenes, nonfunctional copies of genes, evolve fast due the lack of evolutionary pressures and thus appear in several different forms. PseudoGeneQuest is an online tool to search the human genome for a given query sequence and to identify different types of pseudogenes as well as novel genes and gene fragments.</p> <p>Description</p> <p>The service can detect pseudogenes, that have arisen either by retrotransposition or segmental genome duplication, many of which are not listed in the public pseudogene databases. The service has a user-friendly web interface and uses a powerful computer cluster in order to perform parallel searches and provide relatively fast runtimes despite exhaustive database searches and analyses.</p> <p>Conclusion</p> <p>PseudoGeneQuest is a versatile tool for detecting novel pseudogene candidates from the human genome. The service searches human genome sequences for five types of pseudogenes and provides an output that allows easy further analysis of observations. In addition to the result file the system provides visualization of the results linked to Ensembl Genome Browser. PseudoGeneQuest service is freely available.</p
- …