1,508 research outputs found
Decoy State Quantum Key Distribution With Modified Coherent State
To beat PNS attack, decoy state quantum key distribution (QKD) based on
coherent state has been studied widely. We present a decoy state QKD protocol
with modified coherent state (MCS). By destruction quantum interference, MCS
with fewer multi-photon events can be get, which may improve key bit rate and
security distance of QKD. Through numerical simulation, we show about 2-dB
increment on security distance for BB84 protocol.Comment: 4 pages, 4 figure
Beating the Clauser-Horne-Shimony-Holt and the Svetlichny games with Optimal States
We study the relation between the maximal violation of Svetlichny's
inequality and the mixedness of quantum states and obtain the optimal state
(i.e., maximally nonlocal mixed states, or MNMS, for each value of linear
entropy) to beat the Clauser-Horne-Shimony-Holt and the Svetlichny games. For
the two-qubit and three-qubit MNMS, we showed that these states are also the
most tolerant state against white noise, and thus serve as valuable quantum
resources for such games. In particular, the quantum prediction of the MNMS
decreases as the linear entropy increases, and then ceases to be nonlocal when
the linear entropy reaches the critical points and for the
two- and three-qubit cases, respectively. The MNMS are related to classical
errors in experimental preparation of maximally entangled states.Comment: 7 pages, 3 figures; minor changes; accepted in Physical Review
Experimental Decoy Quantum Key Distribution Up To 130KM Fiber
Decoy State Quantum Key Distribution (QKD), being capable of beating PNS
attack and uncon- ditionally secure, have become an attractive one recently.
But, in many QKD systems, disturbances of transmission channel make quantum bit
error rate (QBER) increase which limits both security distance and key bit rate
of real-life decoy state QKD systems. We demonstrate the two-intensity decoy
QKD with one-way Faraday-Michelson phase modulation system, which is free of
channel dis- turbance and keeps interference fringe visibility (99%) long
period, near 130KM single mode optical fiber in telecom (1550 nm) wavelength.
This is longest distance fiber decoy state QKD system based on two intensity
protocol.Comment: 4 pages, 2figure
WSO/UV: World Space Observatory/Ultraviolet
We summarize the capabilities of the World Space Observatory (UV) Project
(WSO/UV). An example of the importance of this project (with a planned launch
date of 2007/8) for the study of Classical Novae is given.Comment: 4 pages, To appear in the proceeedings of the "Classical Nova
Explosions" conference, eds. M. Hernanz and J. Jose, AI
Lajishankou Ophiolite Complex: Implications for Paleozoic Multiple Accretionary and Collisional Events in the South Qilian Belt
The Lajishan ophiolite complex in the Qilian Orogen is one of several ophiolites situated between the Qaidam and North China blocks that record episodic closure of the Proto-Tethyan Ocean. Detailed field relations and geochemical and geochronological studies are critical to unraveling the tectonic processes responsible for an extensive period of intraoceanic subduction that produced juvenile ophiolite/island arc terranes, which were obducted onto continental margins during ocean closure. The Lajishankou ophiolite complex crops out along the northern margin of the South Qilian belt and was thrust over a Neoproterozoic-Ordovician passive margin sequence that was deposited upon the Proterozoic Central Qilian block. The mafic rocks in Lajishankou ophiolite complex are the most abundant slices and can be categorized into three distinct groups based on petrological, geochemical, and geochronological characteristics: massive island arc tholeiites, 509-Ma back-arc dolerite dykes, and 491-Ma pillow basaltic and dolerite slices that are of seamount origin in a back-arc basin. These results, together with spatial relationships, indicate that the Cambrian island arc rocks, ophiolite complex, and accretionary complex developed between 530 and 480 Ma as a single, intraoceanic arc-basin system as a result of south directed subduction of the Proto-Tethyan Ocean prior to Early Ordovician obduction of this system onto the Central Qilian block. Final continental amalgamation involved continental collision of the Central Qilian block with the Qaidam block during the Late Ordovician. This model solves the long-lasting discussion on the emplacement of the Lajishan ophiolite and contributes to an improved understanding of multiple accretionary and collisional processes in the Qilian Orogen
Attacking practical quantum key distribution system with wavelength dependent beam splitter and multi-wavelength sources
Unconditional security of quantum key distribution protocol can be guaranteed
by the basic property of quantum mechanics. Unfortunately, the practical
quantum key distribution system always have some imperfections, and the
practical system may be attacked if the imperfection can be controlled by the
eavesdropper Eve. Applying the fatal security loophole introduced by the
imperfect beam splitter's wavelength dependent optical property, we propose
wavelength-dependent attacking model, which can be applied to almost all
practical quantum key distribution systems with the passive state modulation
and photon state detection after the practical beam splitter. Utilizing our
attacking model, we experimentally demonstrate the attacking system based on
practical polarization encoding quantum key distribution system with almost
100% success probability. Our result demonstrate that all practical devices
require tightened security inspection for avoiding side channel attacks in
practical quantum key distribution experimental realizations
Decoy states for quantum key distribution based on decoherence-free subspaces
Quantum key distribution with decoherence-free subspaces has been proposed to
overcome the collective noise to the polarization modes of photons flying in
quantum channel. Prototype of this scheme have also been achieved with
parametric-down conversion source. However, a novel type of
photon-number-splitting attack we proposed in this paper will make the
practical implementations of this scheme insecure since the parametric-down
conversion source may emit multi-photon pairs occasionally. We propose decoy
states method to make these implementations immune to this attack. And with
this decoy states method, both the security distance and key bit rate will be
increased.Comment: 6 pages,1 figur
Presence of virus neutralizing antibodies in cerebral spinal fluid correlates with non-lethal rabies in dogs.
BACKGROUND: Rabies is traditionally considered a uniformly fatal disease after onset of clinical manifestations. However, increasing evidence indicates that non-lethal infection as well as recovery from flaccid paralysis and encephalitis occurs in laboratory animals as well as humans.
METHODOLOGY/PRINCIPAL FINDINGS: Non-lethal rabies infection in dogs experimentally infected with wild type dog rabies virus (RABV, wt DRV-Mexico) correlates with the presence of high level of virus neutralizing antibodies (VNA) in the cerebral spinal fluid (CSF) and mild immune cell accumulation in the central nervous system (CNS). By contrast, dogs that succumbed to rabies showed only little or no VNA in the serum or in the CSF and severe inflammation in the CNS. Dogs vaccinated with a rabies vaccine showed no clinical signs of rabies and survived challenge with a lethal dose of wild-type DRV. VNA was detected in the serum, but not in the CSF of immunized dogs. Thus the presence of VNA is critical for inhibiting virus spread within the CNS and eventually clearing the virus from the CNS.
CONCLUSIONS/SIGNIFICANCE: Non-lethal infection with wt RABV correlates with the presence of VNA in the CNS. Therefore production of VNA within the CNS or invasion of VNA from the periphery into the CNS via compromised blood-brain barrier is important for clearing the virus infection from CNS, thereby preventing an otherwise lethal rabies virus infection
Recommended from our members
Modification of a Constitutive to Glucose-Responsive Liver-Specific Promoter Resulted in Increased Efficacy of Adeno-Associated Virus Serotype 8-Insulin Gene Therapy of Diabetic Mice
We have previously used a hepatotropic adeno-associated viral (AAV) vector with a modified human insulin gene to treat diabetic mice. The HLP (hybrid liver-specific promoter) used was constitutively active and non-responsive to glucose. In this study, we examined the effects of addition of glucose responsive elements (R3G) and incorporation of a 3′ albumin enhancer (3′iALB) on insulin expression. In comparison with the original promoter, glucose responsiveness was only observed in the modified promoters in vitro with a 36 h lag time before the peak expression. A 50% decrease in the number of viral particles at 5 × 109 vector genome (vg)/mouse was required by AAV8-R3GHLP-hINSco to reduce the blood sugar level to near normoglycemia when compared to the original AAV8-HLP-hINSco that needed 1 × 1010 vg/mouse. The further inclusion of an 860 base-pairs 3′iALB enhancer component in the 3′ untranslated region increased the in vitro gene expression significantly but this increase was not observed when the packaged virus was systemically injected in vivo. The addition of R3G to the HLP promoter in the AAV8-human insulin vector increased the insulin expression and secretion, thereby lowering the required dosage for basal insulin treatment. This in turn reduces the risk of liver toxicity and cost of vector production
- …