5,347 research outputs found

    Nonlinear quantum state transformation of spin-1/2

    Get PDF
    A non-linear quantum state transformation is presented. The transformation, which operates on pairs of spin-1/2, can be used to distinguish optimally between two non-orthogonal states. Similar transformations applied locally on each component of an entangled pair of spin-1/2 can be used to transform a mixed nonlocal state into a quasi-pure maximally entangled singlet state. In both cases the transformation makes use of the basic building block of the quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included

    Quantum Cloning, Eavesdropping and Bell's inequality

    Get PDF
    We analyze various eavesdropping strategies on a quantum cryptographic channel. We present the optimal strategy for an eavesdropper restricted to a two-dimensional probe, interacting on-line with each transmitted signal. The link between safety of the transmission and the violation of Bell's inequality is discussed. We also use a quantum copying machine for eavesdropping and for broadcasting quantum information.Comment: LaTex, 13 pages, with 6 Postscript figure

    Voice Feminization: Voice Therapy vs. Surgical Intervention: A Systematic Review

    Get PDF
    Abstract Purpose: Transgender individuals often seek to alter their vocal characteristics. For Male to Female (MtF) transgender individuals, attaining a feminine voice may be particularly challenging. The objective of this systematic review is to determine whether MtF transgender individuals who receive voice feminization therapy alone or Wendler’s Glottoplasty (WG) surgical intervention with subsequent voice therapy yield greater outcomes in frequency and self-perception. Method: A systematic review of the literature was conducted by using PubMed and Ovid to search terms pertaining to voice feminization. The articles were reviewed and appraised by the authors for inclusionary criteria, exclusionary criteria, and quality. Inclusionary criteria included: 1) adult MtF Transgender individuals, 2) pre and post measures of fundamental frequency (fo), 3) post puberty age, 4) measure of perception of femininity, and 5) patients who underwent WG (articles pertaining to surgical intervention only). Results: A total of 82 articles were identified and 12 met inclusionary criteria for this systematic review. Overall, the quality of the studies was moderate. Outcome measures included frequency range and frequency gain. The authors were unable to compare measurements of self-perception and perception of femininity due to the variability in assessments. Conclusions: Patients who opted for surgical intervention experienced a greater increase in fo but a decrease in frequency range. Conversely, patients who participated in voice feminization therapy alone were found to exhibit smaller gains in fo and an increase in frequency range. This implies that both voice feminization therapy and surgical intervention are effective methods for increasing the frequency of voice. Limitations of this research include the subjective nature of self-perception measures, variability in measurements of perception of femininity, and overall limited research regarding this population.https://scholarworks.uvm.edu/csdms/1009/thumbnail.jp

    Overdressed & Underprotected: The Not-So Glamorous Side of the United States Fashion Industry Without Explicit Copyright Protection

    Get PDF
    The complexity of fashion designs goes far beyond what is currently trending in Vogue. Intellectual property laws should seek to provide designers with an opportunity to completely protect their work, as well as ensure that fashion designers’ designs will not be replicated and sold for a fraction of the price. Inherent limitations with alternate forms of intellectual property protection emphasize the need for a bright-line rule for copyright protection over fashion designs. To best protect new designers and small brands within the U.S. fashion industry, there must be a standard that explicitly includes and defines accessibility to copyright protection for fashion designs. Developing a well-understood rule for copyright protection that can be consistently and unambiguously applied would grant many designers within the U.S. fashion industry an opportunity that they may never otherwise be able to obtain, simply because of the size and scope of fast fashion. Additionally, there would be copious benefits to the global environment and the national economy. Therefore, in order to promote the continued success and future evolution of fashion design within the United States, a bright-line rule must be established and dependably applied to cases regarding copyright protection in the fashion industry

    Adeno-associated virus type 2 as vector for human gene therapy: Characterization of virus-host interactions

    Get PDF
    Vectors based on adeno-associated virus type 2 (AAV) offer considerable promise for somatic gene therapy of various diseases (e.g. cystic fibrosis, hemophilia B, cancer). Limitations, however, still exist and require further improvement. The study presented here addresses two major problems that hamper a widespread use of AAV in human gene therapy: First, the loss of site-specific integration of recombinant AAV vectors (rAAV) due to the deletion of the rep gene, and secondly, the potential neutralization of AAV gene therapy vectors by preexisting antibodies. It could be demonstrated that site-specific integration of a transgene encoding rAAV vector can be efficiently restored by providing rep as plasmid DNA in trans. Based on these findings, a rAAV vector was developed where a plasmid coding for Rep was coupled as polylysine/DNA complex (PLL/DNA) directly to the capsid of the virion and co-transduction of such a PLL/DNA coupled to AAV was shown. Thus, providing rep-DNA as PLL/DNA should allow rAAV vectors to integrate specifically at chromosome 19. To characterize immunogenic domains of the AAV capsid and to develop strategies to circumvent neutralization by antibodies, AAV capsid mutants carrying peptide insertions in surface exposed loop regions were investigated in binding and neutralization assays. Three positions could be identified in the AAV capsid (at aa 534, 573, and 578 of the VP1 protein) where binding and neutralization of the virus by human serum samples was markedly reduced. These result suggest that capsid modifications could help to overcome binding and neutralization by human antisera in clinical gene therapy applications

    Wild Connections

    Get PDF
    My work is about the variety of relationships occurring in nature, whether it is the small delicate touch of a bumblebee landing on a flower to collect pollen, or the struggle between native and invasive plants fighting for survival in the prairies. “Wild Connections” is a visual response to learning about the inner workings of various ecosystems and placing emphasis on those which I find deserving of more awareness. Using traditional and experimental printmaking methods, I capture the relaxing elegance of the habitats and simplistic beauty of their creatures to place emphasis on their importance in our environment. Occasionally subtle color is used to add dimension or enhance the subject, other times the lack of color reiterates what is more significant. Exaggeration of scale focuses attention onto the subject and its environment, revealing an idealized portrayal of their relationship. I like knowing how I impact the world, and how the world impacts me as well. Learning more about the flora and fauna surrounding me, I am compelled to share their stories and showcase their role in maintaining the environment. My hope is to continue highlighting these issues and bring forth action that encourages conservation of these species

    Unambiguous state discrimination in quantum cryptography with weak coherent states

    Full text link
    The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination. We explore quantitatively the limits for secure QKD imposed by this fact taking into account that the receiver can monitor to some extend the photon number statistics of the signals even with todays standard detection schemes. We compare our attack to the beamsplitting attack and show that security against beamsplitting attack does not necessarily imply security against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of beamsplitting attac

    An Adaptive Threshold in Mammalian Neocortical Evolution

    Full text link
    Expansion of the neocortex is a hallmark of human evolution. However, it remains an open question what adaptive mechanisms facilitated its expansion. Here we show, using gyrencephaly index (GI) and other physiological and life-history data for 102 mammalian species, that gyrencephaly is an ancestral mammalian trait. We provide evidence that the evolution of a highly folded neocortex, as observed in humans, requires the traversal of a threshold of 10^9 neurons, and that species above and below the threshold exhibit a bimodal distribution of physiological and life-history traits, establishing two phenotypic groups. We identify, using discrete mathematical models, proliferative divisions of progenitors in the basal compartment of the developing neocortex as evolutionarily necessary and sufficient for generating a fourteen-fold increase in daily prenatal neuron production and thus traversal of the neuronal threshold. We demonstrate that length of neurogenic period, rather than any novel progenitor-type, is sufficient to distinguish cortical neuron number between species within the same phenotypic group.Comment: Currently under review; 38 pages, 5 Figures, 13 Supplementary Figures, 2 Table
    • …
    corecore