4,646 research outputs found
Recommended from our members
Mass spectrometry imaging of glucosinolates in arabidopsis flowers and siliques
Glucosinolates are multi-functional plant secondary metabolites which play a vital role in plant defence and are, as dietary compounds, important to human health and livestock well-being. Knowledge of the tissue-specific regulation of their biosynthesis and accumulation is essential for plant breeding programs. Here, we report that in Arabidopsis thaliana, glucosinolates are accumulated differentially in specific cells of reproductive organs. Using matrix-assisted laser desorption/ionization (MALDI) mass spectrometry imaging (MSI), distribution patterns of three selected compounds, 4-methylsulfinylbutyl
(glucoraphanin), indol-3-ylmethyl (glucobrassicin), and 4-benzoyloxybutyl glucosinolates, were mapped in the tissues of whole flower buds, sepals and siliques. The results show that tissue localization patterns of aliphatic glucosinolate glucoraphanin and 4-benzoyloxybutyl glucosinolate were similar, but indole glucosinolate glucobrassicin had different localisation, indicating a possible difference in function. The high resolution images obtained by a complementary approach, cryo-SEM Energy Dispersive X-ray analysis (cryo-SEM-EDX), confirmed increased concentration of sulphur in areas with elevated amounts of glucosinolates, and allowed identifying the cell types implicated in accumulation of glucosinolates. High concentration of sulphur was found in S-cells adjacent to the phloem in pedicels and siliques, indicating the presence of glucosinolates. Moreover, both MALDI MSI and cryo-SEM-EDX analyses indicated accumulation of glucosinolates in cells on the outer surface of the sepals, suggesting that a layer of glucosinolate-accumulating epidermal cells protects the whole of the developing flower, in addition to the S-cells, which protect the phloem. This research demonstrates the high potential of MALDI MSI for understanding the cell-specific compartmentation of plant metabolites and its regulation
Area laws for the entanglement entropy - a review
Physical interactions in quantum many-body systems are typically local:
Individual constituents interact mainly with their few nearest neighbors. This
locality of interactions is inherited by a decay of correlation functions, but
also reflected by scaling laws of a quite profound quantity: The entanglement
entropy of ground states. This entropy of the reduced state of a subregion
often merely grows like the boundary area of the subregion, and not like its
volume, in sharp contrast with an expected extensive behavior. Such "area laws"
for the entanglement entropy and related quantities have received considerable
attention in recent years. They emerge in several seemingly unrelated fields,
in the context of black hole physics, quantum information science, and quantum
many-body physics where they have important implications on the numerical
simulation of lattice models. In this Colloquium we review the current status
of area laws in these fields. Center stage is taken by rigorous results on
lattice models in one and higher spatial dimensions. The differences and
similarities between bosonic and fermionic models are stressed, area laws are
related to the velocity of information propagation, and disordered systems,
non-equilibrium situations, classical correlation concepts, and topological
entanglement entropies are discussed. A significant proportion of the article
is devoted to the quantitative connection between the entanglement content of
states and the possibility of their efficient numerical simulation. We discuss
matrix-product states, higher-dimensional analogues, and states from
entanglement renormalization and conclude by highlighting the implications of
area laws on quantifying the effective degrees of freedom that need to be
considered in simulations.Comment: 28 pages, 2 figures, final versio
Public-Key Encryption Schemes with Auxiliary Inputs
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. ProceedingsWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems.
As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.National Science Foundation (U.S.) (Grant CCF-0514167)National Science Foundation (U.S.) (Grant CCF-0635297)National Science Foundation (U.S.) (Grant NSF-0729011)Israel Science Foundation (700/08)Chais Family Fellows Progra
Entanglement between particle partitions in itinerant many-particle states
We review `particle partitioning entanglement' for itinerant many-particle
systems. This is defined as the entanglement between two subsets of particles
making up the system. We identify generic features and mechanisms of particle
entanglement that are valid over whole classes of itinerant quantum systems. We
formulate the general structure of particle entanglement in many-fermion ground
states, analogous to the `area law' for the more usually studied entanglement
between spatial regions. Basic properties of particle entanglement are first
elucidated by considering relatively simple itinerant models. We then review
particle-partitioning entanglement in quantum states with more intricate
physics, such as anyonic models and quantum Hall states.Comment: review, about 20 pages. Version 2 has minor revisions
Mental disorders as networks of problems:A review of recent insights
Purpose: The network perspective on psychopathology understands mental disorders as complex networks of interacting symptoms. Despite its recent debut, with conceptual foundations in 2008 and empirical foundations in 2010, the framework has received considerable attention and recognition in the last years. Methods: This paper provides a review of all empirical network studies published between 2010 and 2016 and discusses them according to three main themes: comorbidity, prediction, and clinical intervention. Results: Pertaining to comorbidity, the network approach provides a powerful new framework to explain why certain disorders may co-occur more often than others. For prediction, studies have consistently found that symptom networks of people with mental disorders show different characteristics than that of healthy individuals, and preliminary evidence suggests that networks of healthy people show early warning signals before shifting into disordered states. For intervention, centrality—a metric that measures how connected and clinically relevant a symptom is in a network—is the most commonly studied topic, and numerous studies have suggested that targeting the most central symptoms may offer novel therapeutic strategies. Conclusions: We sketch future directions for the network approach pertaining to both clinical and methodological research, and conclude that network analysis has yielded important insights and may provide an important inroad towards personalized medicine by investigating the network structures of individual patients
Quantum harmonic oscillator systems with disorder
We study many-body properties of quantum harmonic oscillator lattices with
disorder. A sufficient condition for dynamical localization, expressed as a
zero-velocity Lieb-Robinson bound, is formulated in terms of the decay of the
eigenfunction correlators for an effective one-particle Hamiltonian. We show
how state-of-the-art techniques for proving Anderson localization can be used
to prove that these properties hold in a number of standard models. We also
derive bounds on the static and dynamic correlation functions at both zero and
positive temperature in terms of one-particle eigenfunction correlators. In
particular, we show that static correlations decay exponentially fast if the
corresponding effective one-particle Hamiltonian exhibits localization at low
energies, regardless of whether there is a gap in the spectrum above the ground
state or not. Our results apply to finite as well as to infinite oscillator
systems. The eigenfunction correlators that appear are more general than those
previously studied in the literature. In particular, we must allow for
functions of the Hamiltonian that have a singularity at the bottom of the
spectrum. We prove exponential bounds for such correlators for some of the
standard models
Persistent spins in the linear diffusion approximation of phase ordering and zeros of stationary gaussian processes
The fraction r(t) of spins which have never flipped up to time t is studied
within a linear diffusion approximation to phase ordering. Numerical
simulations show that, even in this simple context, r(t) decays with time like
a power-law with a non-trival exponent which depends on the space
dimension. The local dynamics at a given point is a special case of a
stationary gaussian process of known correlation function and the exponent
is shown to be determined by the asymptotic behavior of the
probability distribution of intervals between consecutive zero-crossings of
this process. An approximate way of computing this distribution is proposed, by
taking the lengths of the intervals between successive zero-crossings as
independent random variables. The approximation gives values of the exponent
in close agreement with the results of simulations.Comment: 10 pages, 2 postscript files. Submitted to PRL. Reference screwup
correcte
Recommended from our members
Do robotic and non-robotic arm movement training drive motor recovery after stroke by a common neural mechanism? Experimental evidence and a computational model.
Different dose-matched, upper extremity rehabilitation training techniques, including robotic and non-robotic techniques, can result in similar improvement in movement ability after stroke, suggesting they may elicit a common drive for recovery. Here we report experimental results that support the hypothesis of a common drive, and develop a computational model of a putative neural mechanism for the common drive. We compared weekly motor control recovery during robotic and unassisted movement training techniques after chronic stroke (n = 27), as assessed with quantitative measures of strength, speed, and coordination. The results showed that recovery in both groups followed an exponential time course with a time constant of about 4-5 weeks. Despite the greater range and speed of movement practiced by the robot group, motor recovery was very similar between the groups. The premise of the computational model is that improvements in motor control are caused by improvements in the ability to activate spared portions of the damaged corticospinal system, as learned by a biologically plausible search algorithm. Robot-assisted and unassisted training would in theory equally drive this search process
Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer
open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form.
In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most complexity instead of , where is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly
On the Quantum Complexity of the Continuous Hidden Subgroup Problem
The Hidden Subgroup Problem (HSP) aims at capturing all problems that are susceptible to be solvable in quantum polynomial time following the blueprints of Shor's celebrated algorithm. Successful solutions to this problems over various commutative groups allow to efficiently perform number-theoretic tasks such as factoring or finding discrete logarithms.
The latest successful generalization (Eisentrager et al. STOC 2014) considers the problem of finding a full-rank lattice as the hidden subgroup of the continuous vector space Rm
, even for large dimensions m
. It unlocked new cryptanalytic algorithms (Biasse-Song SODA 2016, Cramer et al. EUROCRYPT 2016 and 2017), in particular to find mildly short vectors in ideal lattices.
The cryptanalytic relevance of such a problem raises the question of a more refined and quantitative complexity analysis. In the light of the increasing physical difficulty of maintaining a large entanglement of qubits, the degree of concern may be different whether the above algorithm requires only linearly many qubits or a much larger polynomial amount of qubits.
This is the question we start addressing with this work. We propose a detailed analysis of (a variation of) the aforementioned HSP algorithm, and conclude on its complexity as a function of all the relevant parameters. Incidentally, our work clarifies certain claims from the extended abstract of Eisentrager et al
- …