262 research outputs found
Effective Three-Body Interactions in Jaynes-Cummings-Hubbard Systems
A generalisation of the Jaynes-Cummings-Hubbard model for coupled-cavity
arrays is introduced, where the embedded two-level system in each cavity is
replaced by a -type three-level system. We demonstrate that the resulting
effective polariton-polariton interactions at each site are both two-body and
three-body. By tuning the ratio of the two transition dipole matrix elements,
we show that the strength and sign of the two-body interaction can be
controlled whilst maintaining a three-body repulsion. We then proceed to
demonstrate how different two-body and three-body interactions alter the mean
field superfluid-Mott insulator phase diagram, with the possible emergence of a
pair superfluid phase in the two-body attractive regime.Comment: 10 pages, 4 figures, accepted for publication in Scientific Reports;
v3 - revised manuscrip
Recommended from our members
Reasoning with Streamed Uncertain Information from Unreliable Sources
Humans or intelligent software agents are increasingly faced with the challenge of making decisions based on large volumes of streaming information from diverse sources. Decision makers must process the observed information by inferring additional information, estimating its reliability, and orienting it for decision making. Processing streaming trust framework, when fact is getting created and inferred is a process in online mode and our paper works effciently in online mode. In online mode, someone initiates a query and gets an output based on the query. In this paper we have mainly shown that unstructured reports from unreliable and heterogeneous sources are processed to generate structured information in Controlled English. Uncertainty in the information is modelled using Subjective Logic that allows statistical inference over uncertain information. Trustworthiness of information is modelled and conflicts are resolved before fusion. This process is totally undertaken on streaming information resulting in new facts being inferred from incoming information which immediately goes through trust assessment framework and trust is propagated to the inferred fact. In this paper, we propose a comprehensive framework where unstructured reports are streamed from heterogeneous and potentially untrustworthy information sources. These reports are processed to extract valuable uncertain information, which is represented using Controlled Natural Language
and Subjective Logic. Additional information is inferred using deduction and abduction operations over subjective opinions derived from the reports. Before fusing extracted and inferred opinions, the framework estimates trustworthiness of these opinions, detects conflicts between them, and resolve these conflicts by analysing evidence about the reliability of their sources. Lastly, we describe an implementation of the framework using International Technology Alliance (ITA) assets (Information Fabric Services and Controlled English Fact Store) and present an experimental evaluation that quantifies the efficiency with respect to accuracy and overhead of the proposed framework
Recommended from our members
Location attestation and access control for mobile devices using GeoXACML
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions to various sectors including healthcare. In controlling access to the sensitive data such as medical records, it is important to guarantee that the data is accessed by the right person for the right reason. Location of access requestor can be a good indication for his/her eligibility and reasons for accessing the data. To reason with geospatial information for access control, Geospatial XACML (eXtensible Access Control Markup Language) is proposed as a standard. However, there is no available implementation and architecture for reasoning with Geospatial XACML policies. This paper proposes to extend XACML with geohashing to implement geospatial policies. It also proposes an architecture for checking reliability of the geospatial information provided by clients. With a case study, we demonstrate how our framework can be used to control the privacy and data access of health service data in handheld devices
A prospective cohort study to evaluate the correlates of polypharmacy and its association with depression among elderly patients
Background: Polypharmacy is a reliable indicator of irrational prescribing particularly among elderly. Polypharmacy increases the risk of adverse drug reactions (ADRs) exponentially imposing higher economic burden. Addressing and evaluating the prescribing practices in elderly will rationalize the drug utilization leading to improvement in quality of health care. The present study was taken to evaluate the determinants of polypharmacy and its association with depression, defined as a 15 item geriatric depression scale (GDS) >6, in elderly patients.Methods: This prospective cohort study was conducted at department of medicine, Victoria hospital, Bengaluru 100 patients aged 60 and above years was enrolled. Relevant data regarding patients’ demographic details, smoking and alcohol consumption, medical diagnosis and drug details were collected. Geriatric Depression Scale was used to diagnose depression.Results: Out of 100 patients screened, 36% were males and 64% were females. Polypharmacy was noted in 73% of the elderly, of which 43% had cumulative co morbidity (≥4 diagnoses). 68% were found to have a GDS score of ≥6, which corresponded to Depression. Patients with depression (GDS score ≥6) had 1.54 (OR-1.54, 95% CI-0.59-4.01) times more risk of encountering polypharmacy (≥4 drugs). Cumulative co-morbidity (OR-1.52, 95% CI-1.08–2.11, p <0.05) was identified as an independent correlate of polypharmacy.Conclusions: Increasing age, males, Cumulative comorbidity of ≥4 diagnoses and geriatric depression were found to be the positive correlates of polypharmacy in elderly. Though geriatric depression increases the odds of encountering polypharmacy, it does not affect drug consumption directly; rather it is an important index of cumulative co-morbidity which influences polypharmacy significantly
Recommended from our members
A review paper on preserving privacy in mobile environments
Technology is improving day-by-day and so is the usage of mobile devices. Every activity that would involve manual and paper transactions can now be completed in seconds using your fingertips. On one hand, life has become fairly convenient with the help of mobile devices, whereas on the other hand security of the data and the transactions occurring in the process have been under continuous threat. This paper, re-evaluates the different policies and procedures used for preserving the privacy of sensitive data and device location.. Policy languages have been very vital in the mobile environments as they can be extended/used significantly for sending/receiving any data. In the mobile environment users always go to service providers to access various services. Hence, communications between the service providers and mobile handsets needs to be secured. Also, the data access control needs to be in place. A section of this paper will review the communication paths and channels and their related access criteria. This paper is a contribution to the mobile domain, showing the possible attacks related to privacy and the various mechanisms used to preserve the end-user privacy. In addition, it also gives acomparison of the different privacy preserving methods in mobile environments to provide guidance to the readers. Finally, the paper summarises future research challenges in the area of privacy preservation. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solution at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from multiple data sources (taxicabs, Smartphones)
Location Security -- Where to Enforce?
Enforcing security in location based services is very crucial in the current mobile world. Past literature has examined both location and identity obfuscation techniques in order to optimally tradeoff security/privacy with utility − this primarily addresses the ‘how to enforce location security problem’; however, it does not address the ‘where to enforce location security problem’. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solutions at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from various data sources (taxicabs, Smartphones). Our results show that while device-based solutions do not require trust in the edge location server, they either suffer from high false positive rate (about 25% probability of not meeting the desired security requirement) or low utility (about 600 meters higher error in obfuscated location data)
- …