23,183 research outputs found
Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement
We present a way for symmetric multiparty-controlled teleportation of an
arbitrary two-particle entangled state based on Bell-basis measurements by
using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an
arbitrary two-particle entangled state to a distant receiver, an arbitrary one
of the agents via the control of the others in a network. It will be
shown that the outcomes in the cases that is odd or it is even are
different in principle as the receiver has to perform a controlled-not
operation on his particles for reconstructing the original arbitrary entangled
state in addition to some local unitary operations in the former. Also we
discuss the applications of this controlled teleporation for quantum secret
sharing of classical and quantum information. As all the instances can be used
to carry useful information, its efficiency for qubits approaches the maximal
value.Comment: 9 pages, 3 figures; the revised version published in Physical Review
A 72, 022338 (2005). The detail for setting up a GHZ-state quantum channel is
adde
Low Expression of DYRK2 (Dual Specificity Tyrosine Phosphorylation Regulated Kinase 2) Correlates with Poor Prognosis in Colorectal Cancer.
Dual-specificity tyrosine-phosphorylation-regulated kinase 2 (DYRK2) is a member of dual-specificity kinase family, which could phosphorylate both Ser/Thr and Tyr substrates. The role of DYRK2 in human cancer remains controversial. For example, overexpression of DYRK2 predicts a better survival in human non-small cell lung cancer. In contrast, amplification of DYRK2 gene occurs in esophageal/lung adenocarcinoma, implying the role of DYRK2 as a potential oncogene. However, its clinical role in colorectal cancer (CRC) has not been explored. In this study, we analyzed the expression of DYRK2 from Oncomine database and found that DYRK2 level is lower in primary or metastatic CRC compared to adjacent normal colon tissue or non-metastatic CRC, respectively, in 6 colorectal carcinoma data sets. The correlation between DYRK2 expression and clinical outcome in 181 CRC patients was also investigated by real-time PCR and IHC. DYRK2 expression was significantly down-regulated in colorectal cancer tissues compared with adjacent non-tumorous tissues. Functional studies confirmed that DYRK2 inhibited cell invasion and migration in both HCT116 and SW480 cells and functioned as a tumor suppressor in CRC cells. Furthermore, the lower DYRK2 levels were correlated with tumor sites (P = 0.023), advanced clinical stages (P = 0.006) and shorter survival in the advanced clinical stages. Univariate and multivariate analyses indicated that DYRK2 expression was an independent prognostic factor (P < 0.001). Taking all, we concluded that DYRK2 a novel prognostic biomarker of human colorectal cancer
Deformable Object Tracking with Gated Fusion
The tracking-by-detection framework receives growing attentions through the
integration with the Convolutional Neural Networks (CNNs). Existing
tracking-by-detection based methods, however, fail to track objects with severe
appearance variations. This is because the traditional convolutional operation
is performed on fixed grids, and thus may not be able to find the correct
response while the object is changing pose or under varying environmental
conditions. In this paper, we propose a deformable convolution layer to enrich
the target appearance representations in the tracking-by-detection framework.
We aim to capture the target appearance variations via deformable convolution,
which adaptively enhances its original features. In addition, we also propose a
gated fusion scheme to control how the variations captured by the deformable
convolution affect the original appearance. The enriched feature representation
through deformable convolution facilitates the discrimination of the CNN
classifier on the target object and background. Extensive experiments on the
standard benchmarks show that the proposed tracker performs favorably against
state-of-the-art methods
Sub-TeV proton beam generation by ultra-intense laser irradiation of foil-and-gas target
A two-phase proton acceleration scheme using an ultra-intense laser pulse irradiating a proton foil with a tenuous heavier-ion plasma behind it is presented. The foil electrons are compressed and pushed out as a thin dense layer by the radiation pressure and propagate in the plasma behind at near the light speed. The protons are in turn accelerated by the resulting space-charge field and also enter the backside plasma, but without the formation of a quasistationary double layer. The electron layer is rapidly weakened by the space-charge field. However, the laser pulse originally behind it now snowplows the backside-plasma electrons and creates an intense electrostatic wakefield. The latter can stably trap and accelerate the pre-accelerated proton layer there for a very long distance and thus to very high energies. The two-phase scheme is verified by particle-in-cell simulations and analytical modeling, which also suggests that a 0.54 TeV proton beam can be obtained with a 10(23) W/cm(2) laser pulse. (C) 2012 American Institute of Physics. [doi:10.1063/1.3684658]Physics, Fluids & PlasmasSCI(E)EI0ARTICLE2null1
Multiparty Quantum Secret Report
A multiparty quantum secret report scheme is proposed with quantum
encryption. The boss Alice and her agents first share a sequence of
(+1)-particle Greenberger--Horne--Zeilinger (GHZ) states that only Alice
knows which state each (+1)-particle quantum system is in. Each agent
exploits a controlled-not (CNot) gate to encrypt the travelling particle by
using the particle in the GHZ state as the control qubit. The boss Alice
decrypts the travelling particle with a CNot gate after performing a
operation on her particle in the GHZ state or not. After the GHZ states (the
quantum key) are used up, the parties check whether there is a vicious
eavesdropper, say Eve, monitoring the quantum line, by picking out some samples
from the GHZ states shared and measure them with two measuring bases. After
confirming the security of the quantum key, they use the GHZ states remained
repeatedly for next round of quantum communication. This scheme has the
advantage of high intrinsic efficiency for qubits and the total efficiency.Comment: 4 pages, no figure
- …