WorldWideScience

Sample records for bob dobinson 1943-2004

  1. Bob Dobinson (1943-2004)

    CERN Multimedia

    Bee, C; Mapelli, L; Wickens, F. J

    It was a great shock to the many friends and colleagues of Bob Dobinson to hear of his sudden and unexpected death in England on Thursday 19th February. Bob came to CERN in April 1968 and his professional interests were always in the area of electronics, instrumentation, networking and computing at the "front-end" of experiments. These interests included Ethernet, right from its very initial use to interconnect computers to his latest work with the Gigabit and 10 Gigabit versions as the basis for data transmission for experiments, both in the DAQ and between computing centres. Bob lived life the way he wanted to, and with great energy. He drove himself hard and generated enthusiasm amongst his collaborators to do the same. Always willing to learn from first principles about topics that interested him, he persisted with questions until he had obtained a full understanding. He was a first-class teacher, and he held positions as Visiting Professor at the Universities of Liverpool and London. He was also an exc...

  2. Bob Dobinson (1943-2004)

    CERN Multimedia

    2004-01-01

    Bob Dobinson died, very unexpectedly, in England on Thursday 19th February. Bob came to CERN as a NATO Fellow in April 1968, directly after gaining his PhD in London. He joined the CERN-Rome Group, carrying out experiments both at the CERN PS and at Serpukhov. He became a CERN fellow before being appointed as a Staff Member in 1971. His professional interests were always in the area of electronics, instrumentation, networking and computing at the "front-end" of experiments. In that context, mention must be made of his outstanding work in driving the CAMAC standard, and his later work on FASTBUS; of his leadership of the European Muon Collaboration's online team and of his support, as a user, for standard PDP-11 data acquisition software; of his interest in Ethernet at all times from its very initial use to inter-connect computers to his latest work with the Gigabit and 10 Gigabit versions as the basis for data transmission within experiments. Bob lived life the way he wanted to, and wit...

  3. Uudised: dokumentaalfilm Bob Dylanist

    Index Scriptorium Estoniae

    2005-01-01

    Viinis 14.-26. oktoobril toimuvast filmifestivalist, mille avafilmiks on Woody Alleni "Match Point". Ka Martin Scorsese portreefilm kultusmuusikust "No Direction Home: Bob Dylan" ning eriprogrammist, milleks on sel aastal Andy Warholi retrospektiiv

  4. Bob miller's math for the GMAT

    CERN Document Server

    Miller, Bob

    2012-01-01

    Maximize Your GMAT Math Score with Bob Miller! REA's updated second edition of Bob Miller's Math for the GMAT is a must for anyone taking the GMAT. Bob Miller has taught math to thousands of students at all educational levels for 30 years. His proven teaching methods will help you master the math section of the GMAT and boost your score! Written in a lively and unique format, Bob Miller's Math for the GMAT prepares GMAT-takers with everything they need to know. Unlike some dull test preps that merely present the material, Bob actually teaches and explains math concepts and ideas. His no-no

  5. Bound beta-decay: BOB

    International Nuclear Information System (INIS)

    For many years exotic decay modes of the neutron have been investigated as possible doorways to the exploration of new physics. The bound beta-decay (BOB) of the neutron into a hydrogen atom and an anti-neutrino offers a very elegant method to study neutrino helicities. However, this rare decay has not yet been observed for the free neutron, owing to the challenge of measuring a decay involving only electrically neutral particles and with an estimated branching ratio of only a few 106 of the three-body decay mode. During the past few years scientists from the TUM E18 Group have developed a novel experimental scheme which addresses all necessary problems associated with the observation of this two-body neutron decay in a very coherent way. The BOB experiment shall be installed at a tangential beam tube of a powerful research reactor such as the SR6 at the FRMII in Garching or H6-H7 beam tube at ILL. This talk will provide insights and ideas on how such an experiment is to be performed.

  6. Neutron bound {beta}- decay- BOB

    Energy Technology Data Exchange (ETDEWEB)

    Gabriel, M.; Berger, M.; Emmerich, R.; Faestermann, T.; Gutsmiedl, E.; Hartmann, F.J.; Paul, S.; Ruschel, S.; Schoen, J.; Schott, W.; Schubert, U.; Trautner, A. [Physik-Department, TUM, 85748 Garching (Germany); Engels, R. [Institut fuer Kernphysik, Forschungszentrum Juelich, 52425 Juelich (Germany); Fierlinger, P. [Excellence Cluster Universe, TUM, 85748 Garching (Germany); Hertenberger, R. [Sektion Physik, LMU, 85748 Garching (Germany); Roehrmoser, R. [FRM2, TUM, 85748 Garching (Germany); Udem, T. [Max-Planck-Institut fuer Quantenphysik, 85748 Garching (Germany)

    2011-07-01

    The bound neutron {beta}-decay(BOB) into a hydrogen atom and an electron antineutrino is investigated.The hyper-fine-state population of the monoenergetic hydrogen atoms (326.3 eV) yields the neutrino left-handed-ness or a possible right-handed admixture and possible small scalar and tensor contributions to the weak force. Preexperiments to measure the BOB H(2s) atoms have been done or are being set up using ionizer and RF discharge proton sources, a Wien filter, Cs and Ar cells, a spin filter, electric counter and accelerating fields, a double focusing magnet and a solar blind PM for the Lyman-{alpha} photons. In a first experiment, the charge exchange of the H(2s) atoms into H{sup -}, offering a selective method to discriminate these states against background, is investigated. In a second step the number of background H(2s) resulting from protons interacting with the walls of the experimental setup are determined. For this a quenching E field and a solar blind PM are used.

  7. Neutron bound β- decay- BOB

    International Nuclear Information System (INIS)

    The bound neutron β-decay(BOB) into a hydrogen atom and an electron antineutrino is investigated.The hyper-fine-state population of the monoenergetic hydrogen atoms (326.3 eV) yields the neutrino left-handed-ness or a possible right-handed admixture and possible small scalar and tensor contributions to the weak force. Preexperiments to measure the BOB H(2s) atoms have been done or are being set up using ionizer and RF discharge proton sources, a Wien filter, Cs and Ar cells, a spin filter, electric counter and accelerating fields, a double focusing magnet and a solar blind PM for the Lyman-α photons. In a first experiment, the charge exchange of the H(2s) atoms into H-, offering a selective method to discriminate these states against background, is investigated. In a second step the number of background H(2s) resulting from protons interacting with the walls of the experimental setup are determined. For this a quenching E field and a solar blind PM are used.

  8. Pista de bobs Innsbruck - Austria

    Directory of Open Access Journals (Sweden)

    Schmidt, W.

    1975-12-01

    Full Text Available The new artificial bob sleigh ice track was constructed on the occasion of the XII Winter Olympics. It is 1330 m long and consists of: straight stretches, right and left turn curves, supporting zones and a circular element with a 267° opening angle. The average slope between the starting point and the goal is 18%. The section of the dike consists of a 1.45 m wide horizontal part and 0.55 m high flanges except in the curves where the flange extends into a circular security arch which serves as a retaining element. For the construction the track was subdivided into 4 m long sections, each one with its own foundation. On this foundation were placed the prefabricated supporting ribs which sustain steel laths, graders of the profile in each section. The cooling pipes were placed hanging down from the ribs by way of distance plates. The complex forms a rigid unit by means of Design Mix. The track is further completed by; he cabins at the starting point and the goal; the power plant for the technical installations; access roads to the starting points for the competing bob-sleighs; roads for transportation of equipment material.La nueva pista de hielo artificial, construida con motivo de la celebración de los XII Juegos Olímpicos de Invierno, tiene 1.330 m de longitud y está formada por: tramos rectos, curvas a derecha e izquierda, zonas de apoyo y un elemento circular con un ángulo de apertura de 267º. La diferencia de altura entre la salida y la llegada es de 97 m, siendo la pendiente media del 18%. El perfil de la pista se halla constituido por una parte horizontal de 1,45 m de anchura y laterales de 0,55 m de alto, excepto en las curvas, en donde el latera! correspondiente se prolonga en un arco circular de seguridad y en elementos de retención. Para la construcción se subdividió el recorrido en secciones de 4 m, que cuentan con su propia cimentación. Sobre ésta se colocaron las nervaduras de apoyo, prefabricadas, que reciben a

  9. Gender roles for Alice and Bob

    Science.gov (United States)

    Harris, Philip

    2013-04-01

    As the head of a department that is striving to achieve bronze status under the Athena SWAN (Scientific Women's Academic Network) programme, I have become extremely sensitive to gender stereotyping, and I am afraid that the "Alice and Bob" image on the cover of your March issue on quantum frontiers set off some alarm bells.

  10. Bob Geldof kutsub üles heategevusele

    Index Scriptorium Estoniae

    2006-01-01

    Heategevusliku kontserdi "Live8" korraldamise eest sai Saksa muusikaauhinna Echo eripreemia iiri laulja Bob Geldof, Echo parima meeslaulja auhinna sai Robbie Williams, parima naisartisti preemia Madonna, bändi parima auhinna briti ansambel Coldplay, parima DVD auhinna austraalia bänd AC/DC albumi "Family Jewels" eest, parimaks uustulnukaks tunnistati saksa noortebänd Tokyo Hotel

  11. Neutron bound beta-decay: BOB

    International Nuclear Information System (INIS)

    An experiment to observe the bound beta-decay (BOB) of the free neutron into a hydrogen atom and an electron anti-neutrino is described. The hyperfine spin state population of the monoenergetic hydrogen atom yields the neutrino left-handedness or possible right-handed admixture as well as possible small scalar and tensor contributions to the weak force. The BOB H(2s) hyperfine states can be separated with a Lamb-Shift Spin Filter. These monoenergetic H(2s) atoms are ionised into H− by charge exchanging within an argon cell. These ions are then separated using an adaptation of a MAC-E Filter. A first experiment is proposed at the FRMII high thermal-neutron flux beam reactor SR6 through-going beam tube, where we will seek to observe this rare neutron decay-mode for the first time and determine the branching ratio. After successful completion, the hyperfine spin state population will be determined, possibly at the ILL high-flux beam reactor through-going beam tube H6–H7, where the thermal neutron flux is a factor of four larger.

  12. Kus ta siis ometi on - see Bob Dylan? / Immo Mihkelson

    Index Scriptorium Estoniae

    Mihkelson, Immo, 1959-

    2008-01-01

    Todd Haynes'i mängufilm muusik Bob Dylanist "Kus on Bob Dylan?" ("I'm Not There") : laulja alter ego kehastavad Ben Whishaw, Christian Bale, Heath Ledger, Cate Blanchett, Richard Gere, Marcus Carl Franklin : Ameerika Ühendriigid 2007. 4. juunil Saku Suurhallis toimuvast kontserdist. Jaak Johanson, Tõnis Mägi, Riho Sibul, Hannes Varblane ameerika lauljast

  13. Obituary: Janet Akyüz Mattei, 1943-2004

    Science.gov (United States)

    Williams, Thomas R.; Willson, Lee Anne

    2004-12-01

    As director of the American Association of Variable Star Observers for thirty years, Janet Mattei led the organization through a series of major improvements and in the process, helped and influenced amateur and professional astronomers around the world. Having successfully tackled many challenges, however, Janet lost her battle with acute myelogenous leukemia on 22 March 2004. One of five children of Bella and Baruk Akyüz, Janet was born on 2 January 1943 in Bodrum, Turkey and received her pre-collegiate education there. She attended Brandeis University from 1962 until 1965 on a full Wein Scholarship, earning a BA in General Science. After eighteen months of supervising a cardiopulmonary laboratory, in 1967 she returned to Turkey to teach physics and mathematics in a high school, and then entered graduate school at Turkey's Ege University. Janet learned of the summer scholarships available at the Maria Mitchell Observatory on Nantucket, and applied to observatory director Dorrit Hoffleit for the opportunity to come back to the United States and learn about variable stars. That summer (1969) she learned to love variable stars, became acquainted with the AAVSO, and met her future husband, Michael Mattei. In 1970, after she earned her master's degree in astronomy at Ege University, Janet entered the University of Virginia where she earned a second master's degree in 1972 with a thesis on T Tauri stars. After receiving her degree in Virginia, Janet married Mike Mattei and became an assistant to Margaret Mayall at AAVSO headquarters. When Mayall decided to retire in 1973, the AAVSO Council asked Janet to assume the helm as director of the association. With such a sudden advance in her responsibilities, Janet had to rapidly learn the management side of running the organization as well as keep up with the day-to-day scientific activities - responding to requests for data, recording observations as pencil-points on paper charts, and predicting future maxima of long period variables. She accelerated a ten-year project to digitize all of AAVSO's archived as well as current data, without which a century of AAVSO observations would now be nearly inaccessible. In the mid-1970s professional interest in the cataclysmic variables began to ramp up. When she received the first requests for an AAVSO visual observing campaign coordinated with observations by orbiting observatories as well as large ground based telescopes, Janet accepted the invitation as both an opportunity and a challenge. AAVSO observers responded marvelously and, coupled with Janet's astute forecasting of when cataclysmic variables were likely to brighten again, the program emerged as one of the major technical successes of her tenure. Many AAVSO members will never forget their excitement when France Córdova came to our Fall meeting in 1978 to announce to the astronomical world that X-rays from SS Cyg had been detected by HEAO-1 on the first occasion after the satellite reached orbit when AAVSO observers reported that the star was brightening to a maximum. It was a moment of tremendous pride for everyone, most of all for Janet. It was a success that was repeated frequently in over six hundred subsequent coordinated observing runs with various satellites. This success greatly increased the impact of AAVSO on current astronomical research, enhanced its reputation, and also provided a more immediate thrill for the observers than the ongoing commitment to monitor slowly varying stars. The late 1970s and early 1980s were a period of substantial inflation in our nation's economy. Furthermore, staff turnover slowed progress with the data processing work, while observations coming to AAVSO from international variable star organizations and independent observers, especially from behind the iron curtain, were increasing rapidly. Faced with rising costs at the same time additional staff was needed to pursue the data processing problems, Janet reacted characteristically: she began taking night courses in management, data processing, fund raising, and other topics that could help her handle the AAVSO work load more efficiently. Nor was her formal education in astronomy quite complete, for during that difficult period she completed writing her dissertation and earned a PhD in astronomy from Ege University in 1982. AAVSO's headquarters on Concord Avenue was increasingly crowded and also insecure, as the historical data were stored in a building that was vulnerable to fire. In August 1985 long-term AAVSO secretary and benefactor Clinton Banker Ford (BAAS, 1994:1602) solved these problems by donating a new headquarters building at 25 Birch Street in Cambridge. Janet managed the move into the AAVSO's present facilities masterfully, and then led planning for a dedication of the building combined with a celebration of the AAVSO's seventy-fifth anniversary. It is a measure of Janet's growth in stature in the professional community that Ricardo Giacconi, then director of the Space Telescope Science Institute, was the keynote speaker for the celebration and it was attended by the leaders of variable star organizations from a number of countries. The meeting marked a major turning point in the affairs of AAVSO as well as in Janet's own outlook. Substantially more confident in her abilities as a manager and leader of the organization, Janet never looked back. Janet's international contacts, through her active participation in the International Astronomical Union (IAU), led her to participate in 1987 as one of the organizers of an IAU colloquium in Paris on the contribution of amateurs to astronomy, the first of her many later involvements in the field of professional-amateur (Pro-Am) cooperation. During that meeting, the Sociétié Astronomique de France (SAF) honored Janet with their Centennial Award for her leadership in variable star astronomy and within the AAVSO. She received an invitation from the Vereniging voor Sterrenkunde, the variable star observers in Belgium for AAVSO to hold its first European meeting in Brussels in July 1990. The meeting proved a huge success, and was followed in 1997 by a second AAVSO European meeting in Sion, Switzerland and a Pan-Pacific meeting in 2003 in Hawaii. Through Janet's leadership, AAVSO reached out to the observers who were already supporting the association with their observations. One of Janet's strong interests was in education. Using a grant from the National Science Foundation, she led efforts to create Hands-On Astrophysics (HOA) based largely on variable stars and AAVSO data. Though it took several years to develop, HOA became the basis for a number of popular teacher workshops and is sure to lead many high school students into careers in science. Janet also helped many future professionals in astronomy, including Karen Meech and Peter Garnavich, and a few in other areas, by providing opportunities for them to work at headquarters during their studies or during an intermission in their formal schooling. Janet was active in, and honored by, other professional and amateur organizations. A member of the American Astronomical Society (AAS), she received the AAS's George van Biesbroeck award in 1993, served on the AAS Annenberg Award Committee (1994-1997) and served as the first chair of the AAS Professional Amateur Cooperation Committee. Also in 1993, the Astronomical League with their Leslie Peltier Award honored Janet for her leadership of the AAVSO and contributions to variable star astronomy. Janet was elected a director of the Astronomical Society of the Pacific (ASP) and served six years in that capacity (1994-2000), co-chairing at least one Pro-Am workshop with the ASP. She was a member of three IAU Commissions over her thirty-five years of membership in that organization. In 1995, Janet was honored by the award of the Royal Astronomical Society's Jackson-Gwilt Medal and was the first recipient of the Giovanni Battista Lacchini Award for collaboration with amateur astronomers from Unione Astrofili Italiana. To honor her professional achievements, an asteroid was named for her (11695 Mattei). She always felt that these awards honored not just of her own work, but also the contributions of the members and observers who make up the AAVSO community. Janet Mattei left a very different AAVSO than the one she took over in 1973. From 150,000 observations arriving annually and being handled on paper, now 500,000 arrive each year and are mostly processed and posted automatically. The association has a substantial endowment and owns its headquarters building in Cambridge, Massachusetts. The historical archive has been put into usable form, following two multi-year investments in digitization and validation. The activities of the AAVSO have been extended to include notifying space and ground observatories that particular objects are erupting and to capturing short-lived gamma ray burst afterglows. The organization's ties to those with similar missions around the world have been strengthened and, increasingly, the AAVSO's International Variable Star Database incorporates their data. Janet's final illness was followed, through email bulletins, by hundreds of her friends and colleagues around the world. Characteristically, during a remission-and-recovery time between treatments, Janet reached out by phone and email to many of her AAVSO associates and friends, and resumed her habit of sending appropriate cards for special occasions. The more than 200 email "memoriam" notes posted on the AAVSO web site after her death show that all who knew her, even if only briefly, considered her a friend, a mentor, or a fine example of a scientist and leader.

  14. Janet Akyüz Mattei (1943-2004)

    Science.gov (United States)

    Pickard, R. D.

    2004-06-01

    It is with great sadness that we report that Dr Janet A. Mattei, the Director of the American Association of Variable Star Observers (AAVSO), died on 2004 March 22 after a seven-month battle with acute myelogenous leukaemia.

  15. Life in the Pinball Machine: Looking Back with Bob Mager

    Science.gov (United States)

    Taylor, Ray

    2005-01-01

    At 81 years old, Robert F. (Bob) Mager is the granddaddy of modern performance analysis and instructional design techniques. Although he has retired from the profession, he is still actively learning. He is currently working on his fourth novel, and is also an award-winning ventriloquist and is taking flamenco lessons. Perhaps best known in the…

  16. CBS newsman Bob Schieffer to deliver Cutchins Distinguished Lecture

    OpenAIRE

    Ho, Sookhan

    2008-01-01

    Veteran CBS newsman Bob Schieffer will give the Cutchins Distinguished Lecture at Virginia Tech on Thursday, March 13, 7:30 p.m., in Burruss Auditorium. The CBS News chief Washington correspondent and anchor and moderator of its Sunday public affairs show "Face The Nation" will give a talk, titled "Washington and the World."

  17. Public lecture | "Science and society" by Bob Jones | 22 May

    CERN Multimedia

    2014-01-01

    Public lecture: "Science and society: the impact of computing at CERN on society" by Bob Jones 22 May at 7.30 p.m. Globe of Science and Innovation Lecture in English, translated in French. Entrance free. Limited number of seats. Reservation essential: +41 22 767 76 76 or cern.reception@cern.ch

  18. TechBC Memory Project: Bob de Wit

    OpenAIRE

    Hendrigan, Holly

    2015-01-01

    Bob de Wit is the subject of this interview. He came to TechBC in 1998 as the Chief Operating Officer of the TechBC Corporation, an applied research commercialization subsidiary of the University. He is now the CEO of the Greater Vancouver Homebuilders Association.

  19. Bob Dewar and turbulence theory: lessons in creativity and courage

    International Nuclear Information System (INIS)

    Some of the contributions that Bob Dewar made to plasma turbulence theory are recounted and put into historical perspective. Some remarks are made on the transition to turbulence and bifurcation analysis of models for the low-high confinement transition in tokamaks. However, the focus of the paper is on renormalized oscillation-center theory, to which Dewar made pioneering, creative and courageous contributions. The relationship of that approach to the formalism of Martin, Siggia, and Rose is discussed briefly. (personal reflection)

  20. Bob Dewar and turbulence theory: lessons in creativity and courage

    Science.gov (United States)

    Krommes, John A.

    2012-01-01

    Some of the contributions that Bob Dewar made to plasma turbulence theory are recounted and put into historical perspective. Some remarks are made on the transition to turbulence and bifurcation analysis of models for the low-high confinement transition in tokamaks. However, the focus of the paper is on renormalized oscillation-center theory, to which Dewar made pioneering, creative and courageous contributions. The relationship of that approach to the formalism of Martin, Siggia, and Rose is discussed briefly.

  1. Acerca de la visita de Bob Dylan a la Argentina

    OpenAIRE

    Miranda, Andrés Nicolás

    2008-01-01

    El arribo y la presentación de Bob Dylan en nuestro país puede ser utilizado como excusa no sólo para repasar los pormenores del hecho en sí, sino también para enlazarlos con una pregunta por el tiempo y un tipo de memoria en tanto categorías básicas al analizar eventos, personas u obras culturales “persistentes”, que atraviesan épocas y transformaciones de su propio campo. Se puede entonces discutir la facilidad con la que se coloca la persistencia cerca del historicismo y suele decirse, por...

  2. Fotograaf Bob Sacha näitab vaatajale maailma uue pilgu läbi / Bob Sacha ; interv. Märten Kross

    Index Scriptorium Estoniae

    Sacha, Bob

    2004-01-01

    Eesti Loova Foto Keskuse pilootprojektina korraldatud National Geographicu fotograafi Bob Sacha seminar toimus Von Krahli teatris. Fotokeskuse asutaja intervjuu Poola päritolu fotoajakirjanikuga tema tööst ja Eesti-muljetest

  3. Kuus näitlejat, üks Bob Dylan / Jaanus Noormets

    Index Scriptorium Estoniae

    Noormets, Jaanus

    2008-01-01

    Todd Haynes'i mängufilm muusik Bob Dylanist "Kus on Bob Dylan?" ("I'm Not There") : laulja alter ego kehastavad Ben Whishaw, Christian Bale, Heath Ledger, Cate Blanchett, Richard Gere, Marcus Carl Franklin : Ameerika Ühendriigid 2007

  4. The B Fields in OB Stars (BOB) Survey

    CERN Document Server

    Morel, T; Fossati, L; Hubrig, S; Langer, N; Przybilla, N; Scholler, M; Carroll, T; Ilyin, I; Irrgang, A; Oskinova, L; Schneider, F R N; Diaz, S Simon; Briquet, M; Gonzalez, J F; Kharchenko, N; Nieva, M -F; Scholz, R -D; de Koter, A; Hamann, W -R; Herrero, A; Apellaniz, J Maiz; Sana, H; Arlt, R; Barba, R; Dufton, P; Kholtygin, A; Mathys, G; Piskunov, A; Reisenegger, A; Spruit, H; Yoon, S -C

    2014-01-01

    The B fields in OB stars (BOB) survey is an ESO large programme collecting spectropolarimetric observations for a large number of early-type stars in order to study the occurrence rate, properties, and ultimately the origin of magnetic fields in massive stars. As of July 2014, a total of 98 objects were observed over 20 nights with FORS2 and HARPSpol. Our preliminary results indicate that the fraction of magnetic OB stars with an organised, detectable field is low. This conclusion, now independently reached by two different surveys, has profound implications for any theoretical model attempting to explain the field formation in these objects. We discuss in this contribution some important issues addressed by our observations (e.g., the lower bound of the field strength) and the discovery of some remarkable objects.

  5. Refining Uranium: Bob Wiseman’s Ecomusicological Puppetry

    Directory of Open Access Journals (Sweden)

    Mark, Andrew

    2014-05-01

    Full Text Available This paper describes Bob Wiseman’s allegorical piece, Uranium, arguing that it accesses emotion to alter the consciousness of percipients. Audiences respond with unusual intensity to Uranium’s tragic environmental narrative. By using puppet theatre, film, comedy, and song to win their trust, Wiseman is able to shock his spectators. With interviews and consideration of the semiotic content of Uranium, I explore possibilities for activation of ecological consciousness through performing arts. Building on the shared ideas of Heinrich von Kleist, Gregory Bateson, and Thomas Turino, I argue that Wiseman offers one particularly useful mechanism to advance environmental concerns and learning through the arts. This paper seeks to bridge environmental and (ethnomusicological thought, and has specific relevance to the growing field of ecomusicology, presenting a musical ethnographic case-study in singer-song-writer activism.

  6. Orphan receptor GPR15/BOB is up-regulated in rheumatoid arthritis

    Science.gov (United States)

    Cartwright, Alison; Schmutz, Caroline; Askari, Ayman; Kuiper, Jan-Herman; Middleton, Jim

    2014-01-01

    Chemokine receptors on leukocytes mediate the recruitment and accumulation of these cells within affected joints in chronic inflammatory diseases such as rheumatoid arthritis (RA). Identification of involved receptors offers potential for development of therapeutic interventions. The objective of this study was to investigate the expression of orphan receptor GPR15/BOB in the synovium of RA and non-RA patients and in peripheral blood of RA patients and healthy donors. GPR15/BOB protein and messenger RNA expression were examined in RA and non-RA synovium by immunofluorescence and reverse-transcription polymerase chain reaction (RT-PCR) respectively. GPR15/BOB expression on peripheral blood leukocytes was analysed by flow cytometry and GPR15/BOB messenger RNA was examined in peripheral blood monocytes by RT-PCR. GPR15/BOB protein was observed in CD68+ and CD14+ macrophages in synovia, with greater expression in RA synovia. GPR15/BOB protein was expressed in all patient synovia whereas in non-RA synovia expression was low or absent. Similarly GPR15/BOB messenger RNA was detected in all RA and a minority of non-RA synovia. GPR15/BOB protein was expressed on peripheral blood leukocytes from RA and healthy individuals with increased expression by monocytes and neutrophils in RA. GPR15/BOB messenger RNA expression was confirmed in peripheral blood monocytes. In conclusion GPR15/BOB is expressed by macrophages in synovial tissue and on monocytes and neutrophils in peripheral blood, and expression is up-regulated in RA patients compared to non-RA controls. This orphan receptor on monocytes/macrophages and neutrophils may play a role in RA pathophysiology. PMID:24725539

  7. Type of Mental of Successful Entrepreneur: A Qualitative Study of Bob Sadinos Experience

    Directory of Open Access Journals (Sweden)

    Agus Masrukhin

    2015-08-01

    Full Text Available This paper was to determine the type of mental of successful businessman Bob Sadino. So he became a major employer in the field of retail and supermarket. The theories used were personality theory and Cash flow Quadrant theory. The theories used were later associated with the analysis results obtained from the field. Research used descriptive qualitative analysis using mental of success. Results show that Bob Sadino had Business owner mental and Investor mental based on Cash flow Quadrant theory.

  8. Poly(vinyl alcohol)–LiBOB complexes for lithium–air cells

    International Nuclear Information System (INIS)

    Highlights: • Mobility and diffusivity can control conductivity even if charge carriers increase. • PVA–LiBOB electrolytes can produce high conductivity in wide temperature range. • Suitable packaging of Li–air cell can reduce moisture interaction with Li metal. -- Abstract: Poly(vinyl alcohol) or PVA complexes with lithium bis(oxalato)borate or LiBOB have been prepared by solution casting. X-ray diffraction reveals that the amorphousness of the polymer increased until 40 wt.% LiBOB salt concentration. The increase in amorphousness is accompanied by a decrease in the glass transition temperature, Tg. The diffusion coefficient of lithium ion obtained from cyclic voltammetry (CV) is 1.98 × 10−8 cm2 s−1. From infrared and impedance spectroscopic studies, it is inferred that conductivity is governed by charge carrier density, ionic mobility and diffusion coefficient for PVA incorporated with 10–40 wt.% LiBOB. However, for the sample with equal weight ratio of PVA and LiBOB, ionic mobility and diffusivity have a greater influence over charge carrier density in determining conductivity at room temperature (RT). PVA can solvate a large amount of salt and for the highest conducting composition of 60 wt.% PVA–40 wt.% LiBOB, conductivity extends from 10−4 S cm−1 at RT (25 °C) to 10−3 S cm−1 at 100 °C. This sample was tested as an electrolyte in a Li–air cell

  9. Bob Bear: A Strategy for Improving Behaviors of Preschoolers Identified as At Risk or Developmentally Delayed

    Science.gov (United States)

    Michael, Meredith; Meese, Ruth L.; Keith, Stephen; Mathews, Rachel

    2009-01-01

    Social learning theory, sociodramatic play, and the use of puppets and stuffed animals may be beneficial for improving social behaviors of preschoolers with and without disabilities. Therefore, this action research study is developed on the belief that a stuffed animal (Bob Bear) will enhance appropriate behaviors for preschool children when used…

  10. Building "Bob": A Project Exploring the Human Body at Western Illinois University Preschool Center

    Science.gov (United States)

    Brouette, Scott

    2008-01-01

    When the children at Western Illinois University Preschool Center embarked on a study of human bodies, they decided to build a life-size model of a body, organ by organ from the inside out, to represent some of the things they were learning. This article describes the building of "Bob," the human body model, highlighting the children's problem…

  11. Trojan-horse attacks on quantum key distribution with classical Bob

    Science.gov (United States)

    Yang, Yu-Guang; Sun, Si-Jia; Zhao, Qian-Qian

    2015-02-01

    Recently, Boyer et al. (Phys Rev Lett 99:140501, 2007) introduced a conceptually novel semi-quantum key distribution scheme (BKM07). Tan et al. (Phys Rev Lett 102:098901, 2009) showed that classical Bob is unable to detect Eve's eavesdropping by giving a special implementation of BKM07 protocol. In the reply, Boyer et al. (Phys Rev Lett 102:098902, 2009) gave a solution against the eavesdropping, i.e., Bob may place a filter that allows only photons with approximately specific frequency to pass just at the expected time . However, their improvement contradicts the descriptions about "classical." If the assumption of "classical" is not considered, we give a delay-photon Trojan-horse attack on BKM07 protocol and its improvement and further present a possible improvement.

  12. Barack Obama Blindness (BOB): Absence of Visual Awareness to a Single Object.

    Science.gov (United States)

    Persuh, Marjan; Melara, Robert D

    2016-01-01

    In two experiments, we evaluated whether a perceiver's prior expectations could alone obliterate his or her awareness of a salient visual stimulus. To establish expectancy, observers first made a demanding visual discrimination on each of three baseline trials. Then, on a fourth, critical trial, a single, salient and highly visible object appeared in full view at the center of the visual field and in the absence of any competing visual input. Surprisingly, fully half of the participants were unaware of the solitary object in front of their eyes. Dramatically, observers were blind even when the only stimulus on display was the face of U.S. President Barack Obama. We term this novel, counterintuitive phenomenon, Barack Obama Blindness (BOB). Employing a method that rules out putative memory effects by probing awareness immediately after presentation of the critical stimulus, we demonstrate that the BOB effect is a true failure of conscious vision. PMID:27047362

  13. Bob and Readers%鲍勃和他的读者

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ Hello! Bob! I am not sure if you still remember me, a reader of Overseas English and a member of the Foreign Language Faculty of Ningbo University. I really like reading your articles. I am writing to ask for your help. I am doing research on the "Chinese Traditional Culture." I would like to get some thoughts from foreigners. I hope you can tell me what you think about it.

  14. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  15. Characterization of pore and crystal structure of synthesized LiBOB with varying quality of raw materials as electrolyte for lithium-ion battery

    Science.gov (United States)

    Lestariningsih, Titik; Ratri, Christin Rina; Wigayati, Etty Marty; Sabrina, Qolby

    2016-02-01

    Characterization of pore structure and crystal structure of the LiB(C2O4)2H2O or LIBOB compound has been performed in this study. These recent years, research regarding LiBOB electrolyte salt have been performed using analytical-grade raw materials, therefore this research was aimed to synthesized LiBOB electrolyte salt using the cheaper and abundant technical-grade raw materials. Lithium hydroxide (LiOH), oxalic acid dihydrate (H2C2O4.2H2O), and boric acid (H3BO3) both in technical-grade and analytical-grade quality were used as raw materials for the synthesis of LiBOB. Crystal structure characterization results of synthesized LiBOB from both technical-grade and analytical-grade raw materials have shown the existence of LiBOB and LiBOB hydrate phase with orthorombic structure. These results were also confirmed by FT-IR analysis, which showed the functional groups of LiBOB compounds. SEM analysis results showed that synthesized LiBOB has spherical structure, while commercial LiBOB has cylindrical structure. Synthesized LiBOB has a similar pore size of commercial LiBOB, i.e. 19 nm (mesoporous material). Surface area of synthesized LiBOB from analytical-grade raw materials and technical-grade materials as well as commercial LIBOB were 88.556 m2/g, 41.524 m2/g, and 108.776 m2/g, respectively. EIS analysis results showed that synthesized LiBOB from technical-grade raw materials has lower conductivity than synthesized LiBOB from analytical-grade raw materials.

  16. Bob W. WHITE : Rumba Rules. The Politics of Dance Music in Mobutu’s Zaire

    OpenAIRE

    Martin, Denis-Constant

    2011-01-01

    Si la musique congolaise est l’une des musiques de danse urbaine les plus populaires d’Afrique, l’une de celles qui a le plus influencé les musiques d’autres pays, elle demeure assez peu étudiée. Parmi les ouvrages qui lui ont été consacrés, on peut retenir ceux de Sylvain Bemba (1984), de Manda Tchebwa (1996) et de Gary Stewart (2000), auxquels il faut ajouter la biographie de Franco par Graeme Ewens (1994). Le livre de Bob White vient donc compléter une bibliographie parcimonieuse et permet...

  17. Up-Regulation of BOB.1/OBF.1 Expression in Normal Germinal Center B Cells and Germinal Center-Derived Lymphomas

    OpenAIRE

    Greiner, Axel; Müller, Kerstin B.; Hess, Jochen; Pfeffer, Klaus; Müller-Hermelink, H. Konrad; Wirth, Thomas

    2000-01-01

    The BOB.1/OBF.1/OCAB.1 protein is a lymphocyte-specific transcriptional coactivator. It interacts with the Oct1 and Oct2 transcription factors and contributes to the transcriptional activity of octamer motifs. The analysis of established B cell lines had suggested that BOB.1/OBF.1 is constitutively expressed at all stages of B cell development. Here we show that expression of BOB.1/OBF.1 is regulated within the B cell lineage. Specifically, germinal center B cells show highly increased BOB.1/...

  18. Alice-Bob Physics: Coherent Solutions of Nonlocal KdV Systems

    CERN Document Server

    Lou, S Y

    2016-01-01

    In natural and social science, many events happened at different space-times may be closely entangled or correlated. Two events, $A$ (Alice) and $B$ (Bob) are defined as correlated if one event is determined by another, say, $B=\\hat{f}A$ for suitable $\\hat{f}$ operators. Can we find these kinds of correlated solutions from the known physically significant models? Alternatively, can we establish/derive some significant physical models to describe these kinds of correlated phenomena? Taking KdV and coupled KdV systems as examples, we can find some types of models (defined as Alice-Bob KdV systems) to exhibit the existence on the correlated solutions linked with two events, event $A=A(x,\\ t)$ and event $B=B(x',\\ t')=\\hat{f}A$ happened at $\\{x,\\ t\\}$ and $\\{x',\\ t'\\}$ respectively. The idea of this letter is valid not only for the physical problems related to the KdV systems but also for all physical problems which can be described by arbitrary continuous or discrete mathematical models.

  19. Study and design of the rotational system of BOB 38 and proposals for the calibration system and the bubble generator

    OpenAIRE

    González, Bernat-Joan Mànuel

    2013-01-01

    BOB « Bubble OBservatory module » is a free lander acoustic motoring device dedicated to the observation of targets in the water column, especially of fluids seeping from the seabed as clouds or plumes of bubbles. BOB design is based on a split-beam echo-sounder.It is deployed using a cable, released around ten metres above sea floor and may be set up by an ROV. Once in place, it scans the sea bottom horizon in accordance to a configurable periodic protocol. For each success...

  20. Sonic Booms on Big Structures (SonicBOBS) Phase I Database; NASA Dryden Sensors

    Science.gov (United States)

    Haering, Edward A., Jr.; Arnac, Sarah Renee

    2010-01-01

    This DVD contains 13 channels of microphone and up to 22 channels of pressure transducer data collected in September, 2009 around several buildings located at Edwards Air Force Base. These data were recorded by NASA Dryden. Not included are data taken by NASA Langley and Gulfstream. Each day's data is in a separate folder and each pass is in a file beginning with "SonicBOBS_" (for microphone data) or "SonicBOBSBB_" (for BADS and BASS data) followed by the month, day, year as two digits each, followed by the hour, minute, sec after midnight GMT. The filename time given is for the END time of the raw recording file. In the case of the microphone data, this time may be several minutes after the sonic boom, and is according to the PC's uncalibrated clock. The Matlab data files have the actual time as provided by a GPS-based IRIG-B signal recorded concurrently with the data. Microphone data is given for 5 seconds prior to 20 seconds after the sonic boom. BADS and BASS data is given for the full recording, 6 seconds for the BADS and 10 seconds for the BASS. As an example of the naming convention, file "SonicBOBS_091209154618.mat" is from September 12, 2009 at 15:46:18 GMT. Note that data taken on September 12, 2009 prior to 01:00:00 GMT was of the Space Shuttle Discovery (a sonic boom of opportunity), which was on September 11, 2009 in local Pacific Daylight Time.

  1. On vision in birds: coordination of head-bobbing and gait stabilises vertical head position in quail

    OpenAIRE

    Nyakatura, John A.; Andrada, Emanuel

    2014-01-01

    Introduction Head-bobbing in birds is a conspicuous behaviour related to vision comprising a hold phase and a thrust phase. The timing of these phases has been shown in many birds, including quail, to be coordinated with footfall during locomotion. We were interested in the biomechanics behind this phenomenon. During terrestrial locomotion in birds, the trunk is subjected to gait-specific vertical oscillations. Without compensation, these vertical oscillations conflict with the demands of vis...

  2. La fotografia tra Arte e Scienza sociale. Arturo Ghergo, Bob Richardson, Bettina Rheims

    Directory of Open Access Journals (Sweden)

    Alessandra Olivares

    2015-12-01

    Full Text Available What does the photography in contemporary visual culture? In the ever increasing interference between art and society, photography took over, as you can see, a leading role in what Enrico Menduni defines the process of "picture show", especially if it isconsidered in its close relationship with the advertising industry. However you cannot ignore the fact that, being closely bound to functions that is responsible, photography is also a social practice. These considerations have a concrete response in the contemporary art. Arturo Ghergo (1901-1959, Bob Richardson (1928-2005 and Bettina Rheims (1952 are artists with very different poetics that while making photographs on commission (for movies, advertising, fashion and magazines told through pictures their time (and the aspects of reality that have characterized reaching high and recognized results of artistic and aesthetic value. They are just three of the many photographers who put us in front of the hybrid status of photography as "a medium [...] inextricably linked to two aspects: aesthetic and sociological" (Dorfles 2012. Discussions on the border between photography-craft and photography-art, which long have marked and restricted the destiny of many photographers, today finally appear anachronistic, but not entirely overcome. We see more and more often a dissolution of identity between the two areas with important examples of the deep connection of the dichotomy between art and social aspects. If it is true that art has always told, interpreted and reflected on the reality that is part, what seems interesting to highlight is the fact that the impact on the collective imaginary that new visual media, photography in primis, have had and continue to have increasingly appears to have no background. Therefore, art has never been so close to life.

  3. Influence of continental advection on aerosol characteristics over Bay of Bengal (BoB) in winter. Results from W-ICARB cruise experiment

    Energy Technology Data Exchange (ETDEWEB)

    Kharol, S.K. [Dept. of Space-Govt. of India, Balanagar, Hyderabad (India). Atmospheric Science Section; Dalhousie Univ., Halifax (Canada). Dept. of Physics and Atmospheric Science; Badarinath, K.V.S.; Sharma, A.R.; Gharai, B. [Dept. of Space-Govt. of India, Balanagar, Hyderabad (India). Atmospheric Science Section; Kaskaoutis, D.G. [Sharda Univ., Greater Noida (India). Research and Technology Development Centre

    2011-07-01

    The transport of aerosols and pollutants from continental India to the adjoining oceanic areas is a major topic of concern and several experimental campaigns have been conducted over the region focusing on aerosol characteristics and their climate implications. The present study analyzes the spectral aerosol optical depth (AOD) variations over Bay of Bengal (BoB) during Winter-Integrated Campaign for Aerosols, gases and Radiation Budget (W-ICARB) from 27 December 2008 to 30 January 2009 and investigates the influence of the adjoining landmass to the marine aerosol field. High AOD{sub 500} values (>0.7) occurred over northern BoB due to outflow of aerosols and pollutants from the densely populated Indo-Gangetic Plains (IGP); low AOD500 (0.1-0.2) was observed in central and southern BoB, far away from the mainland. The Angstrom exponent ''{alpha}'' was observed to be high (>1.2) near coastal waters, indicating relative abundance of accumulation-mode continental aerosols. On the other hand, over southern BoB its values dropped below {proportional_to}0.7. National Center for Environmental Prediction (NCEP) reanalysis data on winds at 850 and 700 hPa, along with airmass trajectories calculated using Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, suggested transport of continental aerosols from central and northern India over the BoB. On the other hand, when the ship was crossing the eastern BoB, the aerosol loading was strongly affected by air-masses originating from Southeast Asia, causing an increase in AOD and {alpha}. Biomass-burning episodes over the region played an important role in the observed aerosol properties. Terra/Aqua Moderate Resolution Imaging Spectroradiometer (MODIS) AOD550 and cruise measured AOD550 showed good agreement (R{sup 2} =0.86 and 0.77, respectively) over BoB, exhibiting similar AOD and spatiotemporal variation. (orig.)

  4. 会见Bob Simpson先生——AMT协会的未来掌门人

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    AMT协会是IMTS2008国际机床展览会的组织者,虽然Bob Simpson先生目前还没有正式成为AMT协会的总裁,但在10月7日以后,他将正式上任。在过去的几个星期里,他一直在了解以前的生产制造情况和贸易协会的详细情况,当然这是一件非常困难的事情。

  5. Electrochemical characteristics of LiMn2O4 in electrolytes based on tetraethylene glycol dimethyl ether-LiBOB mixtures

    International Nuclear Information System (INIS)

    Results of the examination of the electrochemical characteristics of a lithium-manganese spinel in LiBOB-tetraethylene glycol dimethyl ether (tetraglyme) electrolytes as a function of the LiBOB concentration and the cycling and storage temperatures are described. According to the results, the lithium-manganese spinel in electrolytes based on LiBOB-tetraglyme mixtures exhibits a high specific capacity and ability for stable cycling over a wide temperature range. The conductivity of the solutions is governed by the salt concentration, and its temperature dependence is linear in the coordinates of the Vogel-Tamman-Fulcher equation in the temperature range of 10-100 degrees Celsius. The studies were conducted using a lithium anode in 2016 disc cells. (authors)

  6. Hot study: Investigating the risk for violative meat residues in bob veal calves fed colostrum from cows treated at dry-off with cephapirin benzathine

    Science.gov (United States)

    The objective was to complete a pilot study to investigate if violative meat residues are detected in very young bob veal calves that are fed first milking colostrum harvested from cows that were dry treated, on label, with cephapirin benzathine. First milking colostrum was collected from cows that...

  7. Rahvusvaheliselt pärjatud õpivara eesti keeles ja kirjanduses / Helin Puksand, Reet Bobõlski, Margit Ross ; intervjueeris Krista Kerge

    Index Scriptorium Estoniae

    Puksand, Helin, 1970-

    2015-01-01

    Eesti õpivarale antud rahvusvahelised auhinnad: Best European Learning Material Silver Award 2014 Helin Puksandi, Reet Bobõlski ja Margit Rossi eesti keele õpikule "Punkt" (2013) ja Best European Schoolbook Silver Award 2012 samade autorite eesti keele õpikule "Peegel 3" (2011). Best European Schoolbook Bronze Award 2006 Jaanus Vaiksoo, Sirje Toomla ja Kadri Liivese aabitsale "Ilus emakeel" (2005).

  8. The Life And Death Of Bob (a.k.a. Ngc 6397) In An Introductory College-level Astronomy Class For Non-science Majors

    Science.gov (United States)

    Renee'James, C.

    2011-01-01

    We describe the use of Bob (a.k.a NGC 6397) as a conceptual anchor for a semester of "Stars and Galaxies," an introductory college-level astronomy course for non-science majors. NGC 6397 is a Hubble Heritage image, and with a variety of stellar temperatures evident in the colors, it makes a great starter image for a stars and galaxies class. As the semester progresses and student knowledge grows, the same cluster can be used to explore the topics of sizes, temperatures, luminosities, masses, distances, magnitudes, spectral types, HR Diagrams, stellar evolution, determination of cluster age, white dwarfs, blue stragglers... Virtually the entire "stars" part of the "Stars and Galaxies" class can derive from this single example, which anchors student learning to a familiar object throughout the semester. Example discussion questions and personal response (voting) questions are provided, along with comments about the structure of class, assessments, Bob's funeral, and the educational soundness of this approach. We seek collaboration with astronomy educators who would like to adopt "Bob" so that we may gauge whether this approach is measurably different from a more traditional format. "The Life and Death of Bob" was awarded a Gold Star by the Institute for Global and Environmental Strategies in July, 2010, for inspiring uses of Hubble in education.

  9. Expression and significance of the levels of Oct-2 and Bob.1 in the lung tissues B cell of patients with tuberculosis%Oct-2、Bob.1在肺结核组织B细胞中的表达及其意义

    Institute of Scientific and Technical Information of China (English)

    苟继周; 陈心春; 乐晓华; 张香梅; 王正; 杨林

    2012-01-01

    目的 探讨肺结核组织B细胞中Oct-2、Bob.1的表达与机体免疫的关系.方法 采用免疫组织化学检测20例肺结核组织B细胞中Oct-2、Bob.1的表达情况.结果 (1)在肺结核组织生发中心的B细胞中Oct-2和Bob.1主要表达在细胞核;在无形成生发中心聚集的B细胞中,细胞核和细胞浆均呈阳性;(2)肺结核组织B细胞中Oct-2阳性的细胞数明显少于Bob.1阳性的细胞数,Oct-2和Bob.1阳性率分别为:10.8%、65.6%;(3)形成生发中心的肺结核组织B细胞中Oct-2和Bob.1阳性的细胞数明显高于无生发中心形成的肺结核组织,差异有统计学意义(P<0.05).结论 肺结核组织B细胞Oct-2表达低下和/或Oct-2、Bob.1表达不一致可能导致B细胞在发育过程中未能形成生发中心.%Objective To study the relationship between expression level of Oct-2 and Bob. 1 in patient with tuberculosis and their immune system and pathological variation. Methods Expression profile of Oct-2 and Bob. 1 were stained in lung tissues from 20 cases of tuberculosis by immunohistochemistry. Results ( 1 ) Oct-2 and Bob. 1 were mainly expressed in B cells, nucleus of germinal center in patient with tuberculosis, but both markers were expressed in B cells; nucleus and plasma formation without the germinal center. ( 2 ) The positive numbers of Oct-2 were evidently less than that Bob. 1 in lung tissues with tuberculosis and their positive rate were 10. 8% and 65. 6% respectively. ( 3 ) In lung tissues with tuberculosis, the positive numbers of Oct-2 and Bob. 1 in formation of germinal center were significantly higher than without germinal center ( P <0. 05 ). Conclusions In B cells of lung tissues with tuberculosis, the lower expression of Oct-2 and/or Oct-2 and Bob. 1 expression different may be the cause that B cell cannot form germinal center.

  10. B fields in OB stars (BOB): low-resolution FORS2 spectropolarimetry of the first sample of 50 massive stars

    CERN Document Server

    Fossati, L; Schoeller, M; Hubrig, S; Langer, N; Morel, T; Briquet, M; Herrero, A; Przybilla, N; Sana, H; Schneider, F R N; de Koter, A

    2015-01-01

    Within the context of the collaboration "B fields in OB stars (BOB)", we used the FORS2 low-resolution spectropolarimeter to search for a magnetic field in 50 massive stars, including two reference magnetic massive stars. Because of the many controversies of magnetic field detections obtained with the FORS instruments, we derived the magnetic field values with two completely independent reduction and analysis pipelines. We compare and discuss the results obtained from the two pipelines. We obtained a general good agreement, indicating that most of the discrepancies on magnetic field detections reported in the literature are caused by the interpretation of the significance of the results (i.e., 3-4 sigma detections considered as genuine, or not), instead of by significant differences in the derived magnetic field values. By combining our results with past FORS1 measurements of HD46328, we improve the estimate of the stellar rotation period, obtaining P = 2.17950+/-0.00009 days. For HD125823, our FORS2 measurem...

  11. Vision-based estimation of vertical dynamic loading induced by jumping and bobbing crowds on civil structures

    Science.gov (United States)

    Mazzoleni, P.; Zappa, E.

    2012-11-01

    People's motion on civil structures induces dynamic loading that may lead to excessive vibrations. The complete characterization of this force distribution over a wide area due to a large number of people is still an unsolved issue. This work presents a measuring technique for the vertical load estimation in case of jumping and bobbing crowd, based on the evaluation of the vertical inertia of the human body. Laboratory experiments verify the proposed model on a single volunteer through standard inertial sensors and then extend it introducing the non-contact measuring technique. The method validation is carried out in a real environment: a stand of the G. Meazza stadium in Milan, dynamically characterized in terms of frequency response function. The load induced by groups of jumping people is estimated with the proposed method and the resulting structure accelerations are computed: the comparison between measured and estimated vibrations shows a very high correspondence in both time domain and main spectral components and, above all, the performances do not get worse as the number of volunteer increases.

  12. Momentum flow in black-hole binaries. I. Post-Newtonian analysis of the inspiral and spin-induced bobbing

    International Nuclear Information System (INIS)

    A brief overview is presented of a new Caltech/Cornell research program that is exploring the nonlinear dynamics of curved spacetime in binary black-hole collisions and mergers, and of an initial project in this program aimed at elucidating the flow of linear momentum in binary black holes (BBHs). The 'gauge-dependence' (arbitrariness) in the localization of linear momentum in BBHs is discussed, along with the hope that the qualitative behavior of linear momentum will be gauge-independent. Harmonic coordinates are suggested as a possibly preferred foundation for fixing the gauge associated with linear momentum. For a BBH or other compact binary, the Landau-Lifshitz formalism is used to define the momenta of the binary's individual bodies in terms of integrals over the bodies' surfaces or interiors, and define the momentum of the gravitational field (spacetime curvature) outside the bodies as a volume integral over the field's momentum density. These definitions will be used in subsequent papers that explore the internal nonlinear dynamics of BBHs via numerical relativity. This formalism is then used, in the 1.5 post-Newtonian approximation, to explore momentum flow between a binary's bodies and its gravitational field during the binary's orbital inspiral. Special attention is paid to momentum flow and conservation associated with synchronous spin-induced bobbing of the black holes, in the so-called 'extreme-kick configuration' (where two identical black holes have their spins lying in their orbital plane and antialigned).

  13. LiBOB基电解液在锂离子动力电池中的应用%The application of LiBOB based electrolyte in power Li-ion battery

    Institute of Scientific and Technical Information of China (English)

    连芳; 闫坤; 邢桃峰; 仇卫华

    2011-01-01

    The unique advantages of lithium bis(oxalate) borate (LiBOB) as electrolyte salt for power Li-ion battery and the key problems of LiBOB-based electrolyte were summarized. The review was especially focused on the effect of impurities,optimization of its solvents and the compatibility of LiBOB-based electrolyte with LiMn2O4, LiFePO4 electrodes.%介绍了双草酸硼酸锂(LiBOB)作为锂离子动力电池电解质锂盐的独特优势以及LiBOB基电解液应用中的关键问题.主要针对LiBOB基电解液中杂质影响和溶剂优化,以及与LiMnO、LiFePO正极材料的相容性进行了阐述.

  14. 锂离子电池用双草酸硼酸锂的固相合成%Solid phase synthesis of LiBOB for lithium batteries

    Institute of Scientific and Technical Information of China (English)

    张玥; 袁莉; 刘锦平; 李晓磊; 赵洪; 宋晓莉

    2011-01-01

    Synthesis of a new type lithium salt electrolyte—lithium bis ( oxalato ) borate (LiBOB) by solid phase method was introduced in detail. In preparation process,oxalic acid,lithium hydroxide,and boric acid were used as raw materials,whose amount-of-substance ratio was 2. 1: 1: 1. After mixed by ball milling, sintered at 120 ℃, and dehydrated at 240 ℃, LiBOB product could be obtained by purification with ethyl acetate. Analysis results showed the product had a complete crystal structure and a low content of impurities. Thermal analysis proved that its thermal stability was better than that of lithium hexafluorophosphate ( LiPF6 ). Battery assembled by LiBOB prepared electrolyte had a better cycle performance.Furthermore,the prepared LiBOB reached the standard of lithium salt electrolyte used for lithium-ion batteries.%详细介绍了固相法合成的一种新型电解质锂盐--双草酸硼酸锂(LiBOB).制备过程采用草酸、氢氧化锂、硼酸为原料,其物质的量比为2.1:1:1,经球磨混合后高温烧制,烧制温度为120℃、脱水温度为240℃,所得产品经乙酸乙酯提纯后即得产物.产物通过分析测定可知,其杂质含量少且晶体结构完整;并通过热分析证实其热稳定性优于六氟磷酸锂.用其制备的电解液组装的电池,循环性能较好,所制双草酸硼酸锂达到用作电池电解质锂盐的标准.

  15. Shattered Lives / Bob Fisher

    Index Scriptorium Estoniae

    Fisher, Bob

    2001-01-01

    Eesti rahvusest USA ja Kanada filmioperaator Alar Kivilo töötab edukalt Hollywoodis. USA esinduslik filmiajakiri käsitleb põhjalikult tema tööd uue mängufilmiga "The Glass House", mille režissööriks on Daniel Sackheim

  16. Rona Cran, Collage in Twentieth-Century Art, Literature, and Culture. Joseph Cornell, William Burroughs, Frank O’Hara, and Bob Dylan

    OpenAIRE

    Nicolini, Juliette

    2016-01-01

    “There isn’t a 20th century art that was not touched, rethought or merely revamped by the use of [collage]”. In keeping with Pierre Joris’s seminal assertion, Rona Cran’s essay – which is based on her PhD thesis – aims at demonstrating how collage was instrumental in the work of Joseph Cornell, William Burroughs, Frank O’Hara and Bob Dylan. Indeed, many essays in visual arts have been devoted to the analysis of collage as a means to transcend the limits of representation and to open the field...

  17. Surface characterization of the carbon cathode and the lithium anode of Li-O₂ batteries using LiClO₄ or LiBOB salts.

    Science.gov (United States)

    Younesi, Reza; Hahlin, Maria; Edström, Kristina

    2013-02-01

    The surface compositions of a MnO₂ catalyst containing carbon cathode and a Li anode in a Li-O₂ battery were investigated using synchrotron-based photoelectron spectroscopy (PES). Electrolytes comprising LiClO₄ or LiBOB salts in PC or EC:DEC (1:1) solvents were used for this study. Decomposition products from LiClO₄ or LiBOB were observed on the cathode surface when using PC. However, no degradation of LiClO₄ was detected when using EC/DEC. We have demonstrated that both PC and EC/DEC solvents decompose during the cell cycling to form carbonate and ether containing compounds on the surface of the carbon cathode. However, EC/DEC decomposed to a lesser degree compared to PC. PES revealed that a surface layer with a thickness of at least 1-2 nm remained on the MnO₂ catalyst at the end of the charged state. It was shown that the detachment of Kynar binder influences the surface composition of both the carbon cathode and the Li anode of Li-O₂ cells. The PES results indicated that in the charged state the SEI on the Li anode is composed of PEO, carboxylates, carbonates, and LiClO₄ salt. PMID:23336349

  18. B fields in OB stars (BOB): on the detection of weak magnetic fields in the two early B-type stars beta CMa and epsilon CMa

    CERN Document Server

    Fossati, L; Morel, T; Langer, N; Briquet, M; Carroll, T A; Hubrig, S; Nieva, M F; Oskinova, L M; Przybilla, N; Schneider, F R N; Scholler, M; Simon-Diaz, S; Ilyin, I; de Koter, A; Reisenegger, A; Sana, H

    2014-01-01

    Within the context of the "B fields in OB stars (BOB)" collaboration, we used the HARPSpol spectropolarimeter to observe the early B-type stars beta CMa (HD44743; B1 II/III) and epsilon CMa (HD52089; B1.5 II). For both stars, we consistently detected the signature of a weak (<30 G in absolute value) longitudinal magnetic field. We determined the physical parameters of both stars and characterise their X-ray spectrum. For beta CMa, our mode identification analysis led to determining a rotation period of 13.6+/-1.2 days and of an inclination angle of the rotation axis of 57.6+/-1.7 degrees, with respect to the line of sight. On the basis of these measurements and assuming a dipolar field geometry, we derived a best fitting obliquity of ~22 degrees and a dipolar magnetic field strength (Bd) of ~100 G (60

  19. In tribute to Bob Blanchard: Divergent behavioral phenotypes of 16p11.2 deletion mice reared in same-genotype versus mixed-genotype cages.

    Science.gov (United States)

    Yang, Mu; Lewis, Freeman; Foley, Gillian; Crawley, Jacqueline N

    2015-07-01

    Mouse models offer indispensable heuristic tools for studying genetic and environmental causes of neuropsychiatric disorders, including autism. Development of useful animal models of complex human behaviors depends not only on extensive knowledge of the human disease, but also on a deep understanding of animal behavior and ethology. Robert and Caroline Blanchard pioneered a number of elegant social paradigms in rodents. Their early work led to systematic delineations of rodent naturalist defensive behaviors,which were proven to be highly useful models of human psychiatric disorders, including fear and anxiety. Their work using the Visible Burrow System to study social stress in rats represented an unprecedented approach to study biological mechanisms of depression. In recent years, their extensive knowledge of mouse behavior and ethology enabled them to quickly become leading figures in the field of behavioral genetics of autism. To commemorate Robert Blanchard's influences on animal models of human psychiatric disorders, here we describe a study conceptualized and led by Mu Yang who was trained as a graduate student in the Blanchard laboratory in the early 2000s. This investigation focuses on social housing in a genetic mouse model of 16p11.2 deletion syndrome. Heterozygous deletions and duplications of a segment containing about 29 genes on human chromosome 16 appear in approximately 0.5–1% of all cases of autism. 16p11.2 deletion syndrome is also associated with intellectual disabilities and speech impairments. Our previous studies showed that a mouse model of 16p11.2 deletion syndrome exhibited deficits in vocalizations and novel object recognition, as compared to wildtype littermate control cagemates. In the spirit of Bob Blanchard's careful attention to the role of social dominance in rodent behaviors, we became interested in the question of whether behavioral outcomes of a mutation differ when mutants are housed in mixed genotype cages, versus housing only

  20. Pretty Bird by Bob Sinclair

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Recently I was reminded of a story which my mother swears is trus (though she doesn t call me Bobby muchanymore):Back in 1958,when I was just past four years old,my parents gave me a young parakeet.My mother determinedthat our parakeet would learn to talk,and to this end sat at the microphone of a borrowed tape recorder for a full 1/2hour,saying over and over again:“Pretty bird!Pretty bird!Pretty bird!Pretty bird!...”and so on.The resultingtaped message was played for our parakeet at least once pe...

  1. Solid-state method synthesizing and analysis of electrolyte lithium salt LiBOB%电解质锂盐LiBOB的固相法合成及分析

    Institute of Scientific and Technical Information of China (English)

    张丽娟; 李法强

    2010-01-01

    将Li2CO3、H3BO3混匀后4分批加入H2C2O4,再在80~120 ℃下真空干燥20~25 h,得到双草酸硼酸锂(LiBOB)粗产品.含量测定和FT-IR、TG-DTG、XRD、SEM分析的结果表明,经乙腈提纯后的样品不带结晶水,纯度高于99.9%.

  2. LiPF6/LiBOB混合锂盐改善LiFePO4/石墨动力电池高温循环性能研究%Use of LiPF6/LiBOB blend salt for improving cycling performances of LiFePO4/graphite battery at elevated temperature

    Institute of Scientific and Technical Information of China (English)

    宋海申; 赖延清; 李劼; 刘业翔; 张治安

    2013-01-01

    分别以 LiPF6、LiBOB 和 LiPF6/LiBOB 混合盐为电解质,研究了不同电解液对 LiFePO4/石墨动力电池高温循环性能的影响。结果表明,LiBOB 盐抑制了正极溶铁行为,并提高了正极高温循环充放电效率;由于 LiBOB基电解液对正极的保护及在负极表面良好的成膜作用,使得LiFePO4/石墨电池高温循环性能得到明显改善,但是增大了电池阻抗。LiPF6/Li-BOB混合盐可以发挥 LiBOB盐的优点增加正极稳定性,在石墨表面形成致密的 SEI 膜并能够有效改善电池高温循环性能,同时避免了单纯使用 LiBOB盐时阻抗较高的缺点。使用 LiPF6/LiBOB 混合盐,利用LiPF6盐低阻抗特性及 LiBOB盐对正、负电极的保护作用,可以有效提高电池电化学性能。%LiPF6 ,LiBOB and LiPF6/LiBOB blend salt-based electrolytes were investigated for improving cycling performances of LiFePO4/graphite lithium-ion batteries at elevated temperature.It was demonstrated that dis-solution of Fe from LiFePO4 was depressed in LiBOB based electrolyte,and columbic efficiency of LiFePO4/Li cell at elevated temperature was increased;LiBOB was reduced earlier on anode surface,forming compact SEI layer;and the capacity retention of LiFePO4/graphite cells at 55℃ increases with LiBOB concentration due to protective depositions of LiBOB on cathode surface and the SEI layer on anode surface,while the impedance of the cell is increased.LiPF6/LiBOB blend salt-based electrolyte combines the advantages of the different salts and maximizes the performance of cells.When electrolytes with LiPF6/LiBOB blend salt was used,the LiFe-PO4/graphite cells have excellent capacity retention at 55℃,while the impedance was dramatically decreased.

  3. Ed Watson - 1940-2006

    CERN Multimedia

    2006-01-01

    Ed Watson passed away suddenly on 1 August in Geneva, he was 66. He leaves his wife and two children. Ed Watson arrived at CERN in March 1973 to work on digital electronics and CAMAC systems under Bob Dobinson, after many years at Rolls Royce in Scotland. He joined the European Muon Collaboration in 1976, where he played a major role in the design, deployment and running of its data acquisition system (DAQ) with David Botterill, Bob Dobinson, and Vicky White. The CAMAC-ROMULUS system was by far the largest and most advanced of its time, and it became a defining standard for DAQ systems for years to come. Ed was deeply involved in the detailed planning of the control rooms and the experiment cabling, as well as sharing the responsibility for the CAMAC readout system. He had a real talent for trouble shooting and played a vital part in supporting the experiment throughout its lifetime. He offered great moral support to the younger members of the collaboration and helped them a great deal with their work. The...

  4. Ed Watson 1940-2006

    CERN Multimedia

    2006-01-01

    Ed Watson arrived at CERN in March 1973 to work on digital electronics and CAMAC systems under Bob Dobinson, after many years at Rolls Royce in Scotland. He joined the European Muon Collaboration in 1976, where he played a major role in the design, deployment and running of its data acquisition system (DAQ) with David Botterill, Bob Dobinson, and Vicky White. The CAMAC-ROMULUS system was by far the largest and most advanced of its time, and it became a defining standard for DAQ systems for years to come. Ed was deeply involved in the detailed planning of the control rooms and the experiment cabling, as well as sharing the responsibility for the CAMAC readout system. He had a real talent for trouble shooting and played a vital part in supporting the experiment throughout its lifetime. He offered great moral support to the younger members of the collaboration and helped them a great deal with their work. The EMC had a wonderful social life to which Ed was a major contributor - who can forget its barbecues?  In...

  5. Evaluating the Efficacy of Three U.S. Department of Agriculture-Approved Antimicrobial Sprays for Reducing Shiga Toxin-Producing Escherichia coli Surrogate Populations on Bob Veal Carcasses.

    Science.gov (United States)

    2016-06-01

    Effective antimicrobial intervention strategies to reduce Shiga toxin-producing Escherichia coli (STEC) risks associated with veal are needed. This study evaluated the efficacy of lactic acid (4.5%, pH 2.0), Citrilow (pH 1.2), and Beefxide (2.25%, pH 2.3) for reducing STEC surrogates on prerigor and chilled bob veal carcasses and monitored the effects of these interventions on chilled carcass color. Dehided bob veal carcasses were inoculated with a five-strain cocktail of rifampin-resistant, surrogate E. coli bacteria.E. coli surrogates were enumerated after inoculation, after water wash, after prechill carcass antimicrobial spray application, after chilling for 24 h, and after postchill carcass antimicrobial spray application; carcass color was measured throughout the process. A standard carcass water wash (∼50°C) reduced the STEC surrogate population by 0.9 log CFU/cm(2) (P ≤ 0.05). All three antimicrobial sprays applied to prerigor carcasses delivered an additional ∼0.5-log reduction (P ≤ 0.05) of the surrogates. Chilling of carcasses for 24 h reduced (P ≤ 0.05) the surrogate population by an additional ∼0.4 log cycles. The postchill application of the antimicrobial sprays provided no further reductions. Carcass L*, a*, and b* color values were not different (P > 0.05) among carcass treatments. Generally, the types and concentrations of the antimicrobial sprays evaluated herein did not negatively impact visual or instrumental color of chilled veal carcasses. This study demonstrates that warm water washing, followed by a prechill spray treatment with a low-pH chemical intervention, can effectively reduce STEC risks associated with veal carcasses; this provides processors a validated control point in slaughter operations. PMID:27296599

  6. B fields in OB stars (BOB): on the detection of weak magnetic fields in the two early B-type stars β CMa and ɛ CMa. Possible lack of a "magnetic desert" in massive stars

    Science.gov (United States)

    Fossati, L.; Castro, N.; Morel, T.; Langer, N.; Briquet, M.; Carroll, T. A.; Hubrig, S.; Nieva, M. F.; Oskinova, L. M.; Przybilla, N.; Schneider, F. R. N.; Schöller, M.; Simón-Díaz, S.; Ilyin, I.; de Koter, A.; Reisenegger, A.; Sana, H.

    2015-02-01

    Only a small fraction of massive stars seem to host a measurable structured magnetic field, whose origin is still unknown and whose implications for stellar evolution still need to be assessed. Within the context of the "B fields in OB stars (BOB)" collaboration, we used the HARPSpol spectropolarimeter to observe the early B-type stars β CMa (HD 44743; B1 II/III) and ɛ CMa (HD 52089; B1.5II) in December 2013 and April 2014. For both stars, we consistently detected the signature of a weak (constant with time. We determined the physical parameters of both stars and characterise their X-ray spectrum. For the β Cep star β CMa, our mode identification analysis led to determining a rotation period of 13.6 ± 1.2 days and of an inclination angle of the rotation axis of 57.6 ± 1.7°, with respect to the line of sight. On the basis of these measurements and assuming a dipolar field geometry, we derived a best fitting obliquity of about 22° and a dipolar magnetic field strength (Bd) of about 100 G (60 currently available instrumentation and techniques imply that weak fields might be more common than currently observed. Our results show that, if present, even relatively weak magnetic fields are detectable in massive stars and that more observational effort is probably still needed to properly access the magnetic field incidence. Based on observations made with ESO Telescopes at the La Silla Paranal Observatory under programme ID 088.A-9003(A) and ID 191.D-0255(D, F).

  7. Anna Wintour: The Truth behind the Bob

    Science.gov (United States)

    Kloeppel, Tara

    2011-01-01

    While her occupation, and the stereotypes associated with running a fashion magazine, may not initially seem to be worthy of scholastic attention, careful study of Wintour's influence reveals insight into the rhetorical tactics penetrating fashion culture in America, and perhaps more broadly, pop culture in America.

  8. Interview with Bob Cousins - Deputy spokesperson CMS

    CERN Multimedia

    CERN Audiovisual Service

    2008-01-01

    Q. 1. What has it taken to get the LHC project from its beginnings to the verge of first beams? Q. 2. What can be expected to happen on First Beam Day? Q. 3. What happens next in the story? Q. 4. What does this mean to you personally?

  9. "Vulf, prijatel moi!" / Valeria Bobõljova

    Index Scriptorium Estoniae

    Bobõljova, Valeria, 1945-

    1999-01-01

    Varem ilmunud: Molodjozh Estonii : Russki Potshtaljon, 1998, 16. nov., lk. 8. A. Pushkini suhetest Aleksei Wulfiga ja tema emaga, Trigorskoje mõisa perenaise Praskovja Ossipovaga. A. Wulf õppis a-tel 1822 - 1826 Tartu ülikoolis

  10. Interview with Science Education Pioneer Bob Yager

    OpenAIRE

    Stiles, John

    2016-01-01

    In a recent interview, Dr. Yager spoke about his participation in the changing field of science education, the challenges that still persist in implementing exemplary science teaching, STEM Education and his views on the current science education standards.

  11. Aspectos biológicos de Stellifer stellifer (Bloch na pesca artesanal do camarão sete-barbas, Armação do Itapocoroy, Penha, Santa Catarina, Brasil Biological aspects of Stellifer stellifer caught in sea-bob-shrimp's artisanal fishery, Armação do Itapocoroy, Penha, Santa Catarina, Brazil

    Directory of Open Access Journals (Sweden)

    Laura Ribas de Almeida

    2002-06-01

    Full Text Available Stellifer stellifer (Bloch, 1790 is one among the most abundant ictiofauna species which are caught by sea-bob-shrimp's artisanal fishery in Armação do Itapocoroy. Aiming to analyze its population structure, a total of 1459 specimens were collected from July/1996 to August/1997. Stellifer stellifer presented lengths varying between 3,7 and 17,7 cm, macroscopic sex differentiation started from 6,0cm, with a higher frequency of females (sex ratio = 1:3,2. The relationship between length and weight was Wt = 0,0073Lt3,1415. First maturation size was determined for females (7,5 cm and males (8,1 cm. The fishery acts in a similar way on juveniles and adults. Stellifer stellifer presented two spawning seasons, one in spring and another in autumn.

  12. 75 FR 16735 - Action Affecting Export Privileges; Bob Rahimzadeh

    Science.gov (United States)

    2010-04-02

    ... approximately 174 rolls of hog hair filter media, part number HH60130 and valued at approximately $11,687.76... financed approximately 174 rolls of hog hair filter media, part number HH60130 and valued at approximately... Regulations by facilitating or coordinating the export of approximately 185 rolls of hog hair filter...

  13. Snipe Bob: A Game for Android Mobile Phone

    OpenAIRE

    Wu, Danni

    2014-01-01

    Android is an open source operating system based on Linux, which is mainly used in mobile devices. The data at end of 2010 shows that Android system has become the world’s largest Smartphone operating system. Furthermore, in the application store, the downloads of game is the largest of all of the application types. According to the situation above, the Android game has large market. The game development is not only about the programming, but also about the art and creation. The concept is th...

  14. Portret : dotsh ili mat? / Valeria Bobõleva

    Index Scriptorium Estoniae

    Bobõljova, Valeria, 1945-

    2003-01-01

    Moskvas Pushkini-nimelises Kujutava Kunsti Muuseumis oleva Henry Francois Viollier (1750-1829) miniatuurmaalist tundmatu autori poolt maalitud koopia atributsioon. Autor jõuab järeldusele, et maalil on Natalja Ivanovna Gontsharova asemel kujutatud Euphrosine Ulrika von Liphart-Posset

  15. Portret : dotsh ili mat? / Valeria Bobõljova

    Index Scriptorium Estoniae

    Bobõljova, Valeria, 1945-

    2003-01-01

    A.-F. Voilière'i miniatuurportreest, millel senise arvamuse järgi on kujutatud Natalja Nikolajevna Puškina ema Natalja Ivanovna Gontšarova. Artikli autori arvates on see N. N. Puškini vanaema Euphrosyne Ulrika von Lipharti (Posse) portree. Sisaldab ka Natalja Nikolajevna Puškina portreed (1844)

  16. CERN Technology on Display in Nice

    CERN Multimedia

    2000-01-01

    Bob Dobinson (center) and Brian Martin (right) presenting technology transfer from CERN to indus exhibition in Nice. Nice in November was the scene of the EU sponsored Information Science Technologies, IST2000 exhibition, where CERN was invited to present a stand focussing on the benefits to small companies and start-ups from association with CERN and the IST program. Companies from France, Israel and the UK were featured. Network technology standards that CERN has helped to develop have been adopted by the European Space Agency for use in future space vehicles, and these too were on show. The challenges of data acquisition and data handling for the LHC are not insurmountable, but need to be approached with a combination of advanced technology and close industrial collaboration. One important aspect is that of high speed networking, an important component in both on-line and off-line computing (GRIDs). Real time data acquisition systems for the LHC require networks with high throughput, low latency, high rel...

  17. BOB.1 of the channel catfish, Ictalurus punctatus: Not a transcriptional coactivator?

    OpenAIRE

    Richard, Mara L. Lennard; Hikima, Jun-ichi; Wilson, Melanie R.; Miller, Norman W.; Cunningham, Charles; Warr, Gregory W.

    2008-01-01

    Expression of the immunoglobulin heavy chain (IGH) locus of the channel catfish (Ictalurus punctatus)is driven by the Eμ3′ enhancer, whose core region contains two octamer motifs and a μE5 site. Orthologues of the Oct1 and Oct2 transcription factors have been cloned in the channel catfish and shown to bind to the octamer motifs within the core enhancer. While catfish Oct2 is an activator of transcription, catfish Oct1 failed to drive transcription and may act as a negative regulator of IGH tr...

  18. The restitution of the journalist's lost hero status: Lessons learned from Bob Woodward and Carl Bernstein

    OpenAIRE

    Van Gorp, Baldwin

    2014-01-01

    This paper has as objective to give some directions on how journalists can regain their ‘lost hero status’. News outlets have to deal with an audience that lost confident in the news media. This reduced confidence may be explained by a reduced quality of journalism, driven by increased economic pressure, cutbacks in news gathering, and a decreased editorial autonomy. A historical event which is still cited as iconic for the mythical status of journalism is the news coverage about the Wate...

  19. Like Alligators Bobbing for Poodles? A Critical Discussion of Education, ADHD and the Biopsychosocial Perspective

    Science.gov (United States)

    Cooper, Paul

    2008-01-01

    ADHD (Attention Deficit/Hyperactivity Disorder) continues to be a controversial issue among some educationalists. This paper argues that negativity towards the ADHD concept shown by some antagonists is based on outdated thinking and a lack of understanding of the diagnosis and the biopsychosocial paradigm through which it can be usefully…

  20. 78 FR 64048 - Noise Exposure Map Notice for Bob Hope Airport, Burbank, California

    Science.gov (United States)

    2013-10-25

    ... Airport under the provisions of 49 U.S.C. 47501 et. seq (Aviation Safety ] and Noise Abatement Act) and 14... October 10, 2013. Under 49 U.S.C. 47503 of the Aviation Safety and Noise Abatement Act...

  1. M2-F1 fabrication by Grierson Hamilton, Bob Green, and Ed Browne

    Science.gov (United States)

    1962-01-01

    Flight Research Center discretionary funds paid for the M2-F-1's construction. NASA mechanics, sheet-metal smiths, and technicians did much of the work in a curtained-off area of a hangar called the 'Wright Bicycle Shop.' The wingless, lifting body aircraft design was initially conceived as a means of landing an aircraft horizontally after atmospheric reentry. The absence of wings would make the extreme heat of re-entry less damaging to the vehicle. In 1962, Dryden management approved a program to build a lightweight, unpowered lifting body as a prototype to flight test the wingless concept. It would look like a 'flying bathtub,' and was designated the M2-F1, the 'M' referring to 'manned' and 'F' referring to 'flight' version. It featured a plywood shell placed over a tubular steel frame crafted at Dryden. Construction was completed in 1963. The first flight tests of the M2-F1 were over Rogers Dry Lake at the end of a tow rope attached to a hopped-up Pontiac convertible driven at speeds up to about 120 mph. This vehicle needed to be able to tow the M2-F1 on the Rogers Dry Lakebed adjacent to NASA's Flight Research Center (FRC) at a minimum speed of 100 miles per hour. To do that, it had to handle the 400-pound pull of the M2-F1. Walter 'Whitey' Whiteside, who was a retired Air Force maintenance officer working in the FRC's Flight Operations Division, was a dirt-bike rider and hot-rodder. Together with Boyden 'Bud' Bearce in the Procurement and Supply Branch of the FRC, Whitey acquired a Pontiac Catalina convertible with the largest engine available. He took the car to Bill Straup's renowned hot-rod shop near Long Beach for modification. With a special gearbox and racing slicks, the Pontiac could tow the 1,000-pound M2-F1 110 miles per hour in 30 seconds. It proved adequate for the roughly 400 car tows that got the M2-F1 airborne to prove it could fly safely and to train pilots before they were towed behind a C-47 aircraft and released. These initial car-tow tests produced enough flight data about the M2-F1 to proceed with flights behind the C-47 tow plane at greater altitudes. The C-47 took the craft to an altitude of 12,000 where free flights back to Rogers Dry Lake began. Pilot for the first series of flights of the M2-F1 was NASA research pilot Milt Thompson. Typical glide flights with the M2-F1 lasted about two minutes and reached speeds of 110 to l20 mph. A small solid landing rocket, referred to as the 'instant L/D rocket,' was installed in the rear base of the M2-F1. This rocket, which could be ignited by the pilot, provided about 250 pounds of thrust for about 10 seconds. The rocket could be used to extend the flight time near landing if needed. More than 400 ground tows and 77 aircraft tow flights were carried out with the M2-F1. The success of Dryden's M2-F1 program led to NASA's development and construction of two heavyweight lifting bodies based on studies at NASA's Ames and Langley research centers--the M2-F2 and the HL-10, both built by the Northrop Corporation, and the U.S. Air Force's X-24 program, with an X-24A and -B built by Martin. The Lifting Body program also heavily influenced the Space Shuttle program. The M2-F1 program demonstrated the feasibility of the lifting body concept for horizontal landings of atmospheric entry vehicles. It also demonstrated a procurement and management concept for prototype flight test vehicles that produced rapid results at very low cost (approximately $50,000, excluding salaries of government employees assigned to the project).

  2. What Does Batman Think about SpongeBob? Children's Understanding of the Fantasy/Fantasy Distinction

    Science.gov (United States)

    Skolnick, Deena; Bloom, Paul

    2006-01-01

    Young children reliably distinguish reality from fantasy; they know that their friends are real and that Batman is not. But it is an open question whether they appreciate, as adults do, that there are multiple fantasy worlds. We test this by asking children and adults about fictional characters' beliefs about other characters who exist either…

  3. Bob and Jane go to Argentina: The Ethics of Cross-Border Care

    Directory of Open Access Journals (Sweden)

    Williams-Jones, Bryn

    2012-03-01

    Full Text Available This case study presents the story of a typical North American couple searching for fertility treatments on the Internet. This search leads to sites of clinics in other countries, which gets them thinking about traveling abroad for medical services – also known as medical tourism.

  4. KaBOB: ontology-based semantic integration of biomedical databases

    OpenAIRE

    Livingston, Kevin M; Bada, Michael; Baumgartner, William A; HUNTER, LAWRENCE E.

    2015-01-01

    Background The ability to query many independent biological databases using a common ontology-based semantic model would facilitate deeper integration and more effective utilization of these diverse and rapidly growing resources. Despite ongoing work moving toward shared data formats and linked identifiers, significant problems persist in semantic data integration in order to establish shared identity and shared meaning across heterogeneous biomedical data sources. Results We present five pro...

  5. Was Bob Seger Right? Relation Between Boredom in Leisure and [Risky] Sex

    OpenAIRE

    Miller, Jacqueline A.; Caldwell, Linda L.; Weybright, Elizabeth H.; Smith, Edward A.; VERGNANI, TANIA; Wegner, Lisa

    2014-01-01

    This article examines the association between boredom in leisure and risky sexual behaviors among South African youth (N = 1695) using longitudinal data. We hypothesized that youth who were higher on boredom in leisure at the end of ninth grade would be more likely to report engaging in risky sexual behaviors at the beginning of tenth grade. Chi-square results indicate youth, especially male youth who experience high levels of leisure boredom in ninth grade, are more likely to engage in risky...

  6. Wood and Chemistry – or How to Combine Bob Heath's Two Passions into Entomology Research

    Science.gov (United States)

    Plants generally produce complex mixtures of terpenoids that may differ greatly among species. Terpenoids, such C10 monoterpenes and C15 sesquiterpenes, are known to play an important role in the biology and ecology of plants, directly or indirectly influencing their interactions with their biotic e...

  7. Barack Obama Blindness (BOB): Absence of Visual Awareness to a Single Object

    OpenAIRE

    Persuh, Marjan; Melara, Robert D.

    2016-01-01

    In two experiments, we evaluated whether a perceiver’s prior expectations could alone obliterate his or her awareness of a salient visual stimulus. To establish expectancy, observers first made a demanding visual discrimination on each of three baseline trials. Then, on a fourth, critical trial, a single, salient and highly visible object appeared in full view at the center of the visual field and in the absence of any competing visual input. Surprisingly, fully half of the participants were ...

  8. On Using Knowledge about Our Brain: A Conversation with Bob Sylwester.

    Science.gov (United States)

    Brandt, Ron

    1997-01-01

    Today, researchers can learn about blood flow, electromagnetic fields, and chemical composition of the brain by using functional MRI (magnetic resonance imaging). As biologists, medical researchers, and cognitive scientists learn more about brain functions, educators must keep informed, study, and apply what they have learned in the classroom.…

  9. Bob and Jane go to Argentina: The Ethics of Cross-Border Care

    OpenAIRE

    Williams-Jones, Bryn; Behrmann, Jason; Smith, Elise; Martin, Carolina

    2012-01-01

    This case study presents the story of a typical North American couple searching for fertility treatments on the Internet. This search leads to sites of clinics in other countries, which gets them thinking about traveling abroad for medical services – also known as medical tourism.

  10. La fotografia tra Arte e Scienza sociale. Arturo Ghergo, Bob Richardson, Bettina Rheims

    OpenAIRE

    Alessandra Olivares

    2015-01-01

    What does the photography in contemporary visual culture? In the ever increasing interference between art and society, photography took over, as you can see, a leading role in what Enrico Menduni defines the process of "picture show", especially if it isconsidered in its close relationship with the advertising industry. However you cannot ignore the fact that, being closely bound to functions that is responsible, photography is also a social practice. These considerations have a concrete resp...

  11. Sensitive detection of fast, neutral hydrogen atoms for the Bound Beta-Decay (BoB) experiment

    International Nuclear Information System (INIS)

    We are currently exploring methods to detect hydrogen atoms with 325.7 eV kinetic energy. These atoms form the decay signature of the theoretically-predicted three-body decay of the neutron into a hydrogen atom and an anti-neutrino. The challenge in designing and building such a hydrogen detector lies in the small predicted branching ratio for this decay (10-6 of the three-body decay), the low energy of the atoms and the requirement to identify them over background hydrogen. This talk describes our preliminary work investigating three possible detection schemes: quenching of H(2s) atoms and subsequent detection of the resulting Lyman-α photon, charge-exchange of hydrogen atoms in argon gas and laser ionisation.

  12. LiBOB-PC and LiClO4-PC based polymer electrolytes for lithium-ion batteries

    Czech Academy of Sciences Publication Activity Database

    Reiter, Jakub; Dominko, R.; Jakubec, Ivo; Michálek, Jiří

    Tianjin : Tianjin Institute of Power Sources, 2008, s. 487. ISBN N. [International Meeting on Lithium Batteries /14./. Tianjin (CN), 22.06.2008-28.06.2008] R&D Projects: GA AV ČR KJB400320701; GA MŠk LC523 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : polymer electrolytes * Lithium-ion batteries Subject RIV: CA - Inorganic Chemistry

  13. Versatility of continuous-variable asymmetric tripartite entanglement allows Alice and Clare to keep secrets from Bob

    Science.gov (United States)

    Olsen, M. K.; Cavalcanti, E. G.

    2016-07-01

    The fully symmetric Gaussian tripartite entangled pure states will not exhibit two-mode Einstein-Podolsky-Rosen (EPR) steering. This means that any two participants cannot share quantum secrets using the security of one-sided device independent quantum key distribution (1SDI-QKD) without involving the third. They are restricted at most to standard quantum key distribution, which is less secure. Here we demonstrate an asymmetric tripartite system that can exhibit bipartite EPR steering, so that two of the participants can use 1SDI-QKD without involving the other. This is possible because the promiscuity relations of continuous-variable tripartite entanglement are different from those of discrete-variable systems. We analyze these properties for two different systems, showing that the asymmetric system exhibits practical properties not found in the symmetric one.

  14. FERC's pilot project to eliminate the price cap on capacity release: a walk with Bob through 'This Old House'

    International Nuclear Information System (INIS)

    The Federal Energy Regulatory Commission's (FERC) recent attempt to remove the price cap on secondary market products, including released capacity, was described. Unfortunately, lifting the cap was conditional on sound market power analysis and joint filing with an open access local distribution company (LDC). There were few applications, and all but two have been rejected. The two companies whose applications were approved, subsequently decided not to proceed with the project, claiming that the diminished scope of the experiment would prevent the gathering of meaningful data. This author argued that a perfect market power analysis is not necessary; the natural gas market being a secondary market, lifting the price cap at the retail level would provide very good indication of the value of the capacity in the marketplace. From the pipeline's perspective the ultimate goal is to establish market benchmarks to value mainline capacity; this should be the goal of FERC, as well. A variety of arguments in favour of this view were presented; these were supported by illustrative examples based on Canadian experience

  15. Adventures of the Mind Wit and Wisdom with Bob Marriage%心路历程--婚姻

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ Dear Friends, "Marriage" is one of the most complexarrangements that exists in the modern world. It iscommon everywhere. It differs from country to country.Within each country it takes different forms. No twomarriages are exactly alike. Some marriages are theresult of romantic courtships. Other marriages arearranged by parents. Still others are set by tradition orconvenience. Most marriages are between a male and afemale,a husband and a wife. Recently,some marriagesare being sanctioned between two persons of the samegender. These are referred to as "same sex marriages".Insome societies,a man is allowed to be wed to more thanone woman at the same time. This is called"polygamy".

  16. Rethinking Sponge Bob and Ninja Turtles: Popular Culture as Funds of Knowledge for Curriculum Co-Construction

    Science.gov (United States)

    Hedges, Helen

    2011-01-01

    Children's interest in popular culture was clear in my study of interests-based curriculum. Yet, perhaps unsurprisingly, it was a contentious site of curriculum co-construction. This article explores this tension. It argues that interpreting popular culture as "funds of knowledge" might assist teachers to consider a different view of this interest…

  17. Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting

    CERN Document Server

    Kumar, Arun; Uzun, Ersin

    2009-01-01

    When users want to establish wireless communication between/among their devices, the channel has to be bootstrapped first. To prevent any malicious control of or eavesdropping over the communication, the channel is desired to be authenticated and confidential. The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing". When there is no prior security context, e.g., shared secrets, common key servers or public key certificates, device pairing requires user involvement into the process. The idea usually involves leveraging an auxiliary human-perceptible channel to authenticate the data exchanged over the insecure wireless channel. We observe that the focus of prior research has mostly been limited to pairing scenarios where a single user controls both the devices. In this paper, we consider more general and emerging "two-user" scenarios, where two different users establish pairing between their respective devices. Although a num...

  18. Momentum Flow in Black Hole Binaries: I. Post-Newtonian Analysis of the Inspiral and Spin-Induced Bobbing

    CERN Document Server

    Keppel, Drew; Chen, Yanbei; Thorne, Kip S

    2009-01-01

    A brief overview is presented of a new Caltech/Cornell research program that is exploring the nonlinear dynamics of curved spacetime in binary black hole collisions and mergers, and of an initial project in this program aimed at elucidating the flow of linear momentum in black-hole binaries (BBHs). The "gauge-dependence" (arbitrariness) in the localization of linear momentum in BBHs is discussed, along with the hope that the qualitative behavior of linear momentum will be gauge-independent. Harmonic coordinates are suggested as a possibly preferred foundation for fixing the gauge associated with linear momentum. For a BBH or other compact binary, the Landau-Lifshitz formalism is used to define the momenta of the binary's individual bodies in terms of integrals over the bodies' surfaces or interiors, and define the momentum of the gravitational field (spacetime curvature) outside the bodies as a volume integral over the field's momentum density. These definitions will be used in subsequent papers that explore ...

  19. B fields in OB stars (BOB): Detection of a magnetic field in the He-strong star CPD -57° 3509

    Science.gov (United States)

    Przybilla, N.; Fossati, L.; Hubrig, S.; Nieva, M.-F.; Järvinen, S. P.; Castro, N.; Schöller, M.; Ilyin, I.; Butler, K.; Schneider, F. R. N.; Oskinova, L. M.; Morel, T.; Langer, N.; de Koter, A.; BOB Collaboration

    2016-03-01

    Aims: We report the detection of a magnetic field in the helium-strong star CPD -57° 3509 (B2 IV), a member of the Galactic open cluster NGC 3293, and characterise the star's atmospheric and fundamental parameters. Methods: Spectropolarimetric observations with FORS2 and HARPSpol are analysed using two independent approaches to quantify the magnetic field strength. A high-S/N FLAMES/GIRAFFE spectrum is analysed using a hybrid non-LTE model atmosphere technique. Comparison with stellar evolution models constrains the fundamental parameters of the star. Results: We obtain a firm detection of a surface averaged longitudinal magnetic field with a maximum amplitude of about 1 kG. Assuming a dipolar configuration of the magnetic field, this implies a dipolar field strength larger than 3.3 kG. Moreover, the large amplitude and fast variation (within about 1 day) of the longitudinal magnetic field implies that CPD -57° 3509 is spinning very fast despite its apparently slow projected rotational velocity. The star should be able to support a centrifugal magnetosphere, yet the spectrum shows no sign of magnetically confined material; in particular, emission in Hα is not observed. Apparently, the wind is either not strong enough for enough material to accumulate in the magnetosphere to become observable or, alternatively, some leakage process leads to loss of material from the magnetosphere. The quantitative spectroscopic analysis of the star yields an effective temperature and a logarithmic surface gravity of 23 750 ± 250 K and 4.05 ± 0.10, respectively, and a surface helium fraction of 0.28 ± 0.02 by number. The surface abundances of C, N, O, Ne, S, and Ar are compatible with the cosmic abundance standard, whereas Mg, Al, Si, and Fe are depleted by about a factor of 2. This abundance pattern can be understood as the consequence of a fractionated stellar wind. CPD -57° 3509 is one of the most evolved He-strong stars known with an independent age constraint due to its cluster membership. Based on observations made with ESO Telescopes at the La Silla Paranal Observatory under programme ID 191.D-0255(C, E, F, G) and 171.D-0237(A).

  20. BOB CAT: A Large-Scale Review and Delphi Consensus for Management of Barrett’s Esophagus With No Dysplasia, Indefinite for, or Low-Grade Dysplasia

    Science.gov (United States)

    Bennett, Cathy; Moayyedi, Paul; Corley, Douglas A.; DeCaestecker, John; Falck-Ytter, Yngve; Falk, Gary; Vakil, Nimish; Sanders, Scott; Vieth, Michael; Inadomi, John; Aldulaimi, David; Ho, Khek-Yu; Odze, Robert; Meltzer, Stephen J.; Quigley, Eamonn; Gittens, Stuart; Watson, Peter; Zaninotto, Giovanni; Iyer, Prasad G.; Alexandre, Leo; Ang, Yeng; Callaghan, James; Harrison, Rebecca; Singh, Rajvinder; Bhandari, Pradeep; Bisschops, Raf; Geramizadeh, Bita; Kaye, Philip; Krishnadath, Sheila; Fennerty, M. Brian; Manner, Hendrik; Nason, Katie S.; Pech, Oliver; Konda, Vani; Ragunath, Krish; Rahman, Imdadur; Romero, Yvonne; Sampliner, Richard; Siersema, Peter D.; Tack, Jan; Tham, Tony C.K.; Trudgill, Nigel; Weinberg, David S.; Wang, Jean; Wang, Kenneth; Wong, Jennie Y.Y.; Attwood, Stephen; Malfertheiner, Peter; MacDonald, David; Barr, Hugh; Ferguson, Mark K.; Jankowski, Janusz

    2015-01-01

    OBJECTIVES Barrett’s esophagus (BE) is a common premalignant lesion for which surveillance is recommended. This strategy is limited by considerable variations in clinical practice. We conducted an international, multidisciplinary, systematic search and evidence-based review of BE and provided consensus recommendations for clinical use in patients with nondysplastic, indefinite, and low-grade dysplasia (LGD). METHODS We defined the scope, proposed statements, and searched electronic databases, yielding 20,558 publications that were screened, selected online, and formed the evidence base. We used a Delphi consensus process, with an 80% agreement threshold, using GRADE (Grading of Recommendations Assessment, Development and Evaluation) to categorize the quality of evidence and strength of recommendations. RESULTS In total, 80% of respondents agreed with 55 of 127 statements in the final voting rounds. Population endoscopic screening is not recommended and screening should target only very high-risk cases of males aged over 60 years with chronic uncontrolled reflux. A new international definition of BE was agreed upon. For any degree of dysplasia, at least two specialist gastrointestinal (GI) pathologists are required. Risk factors for cancer include male gender, length of BE, and central obesity. Endoscopic resection should be used for visible, nodular areas. Surveillance is not recommended for Management strategies for indefinite dysplasia (IND) and LGD were identified, including a de-escalation strategy for lower-risk patients and escalation to intervention with follow-up for higher-risk patients. CONCLUSIONS In this uniquely large consensus process in gastroenterology, we made key clinical recommendations for the escalation/de-escalation of BE in clinical practice. We made strong recommendations for the prioritization of future research. PMID:25869390

  1. B fields in OB stars (BOB): Detection of a magnetic field in the He-strong star CPD-57{\\deg} 3509

    CERN Document Server

    Przybilla, N; Hubrig, S; Nieva, M -F; Järvinen, S P; Castro, N; Schöller, M; Ilyin, I; Butler, K; Schneider, F R N; Oskinova, L M; Morel, T; Langer, N; de Koter, A

    2016-01-01

    We report the detection of a magnetic field in the helium-strong star CPD-57 3509 (B2 IV), a member of the Galactic open cluster NGC3293, and characterise the star's atmospheric and fundamental parameters. Spectropolarimetric observations with FORS2 and HARPSpol are analysed using two independent approaches to quantify the magnetic field strength. A high-S/N FLAMES/GIRAFFE spectrum is analysed using a hybrid non-LTE model atmosphere technique. Comparison with stellar evolution models constrains the fundamental parameters of the star. We obtain a firm detection of a surface averaged longitudinal magnetic field with a maximum amplitude of about 1 kG. Assuming a dipolar configuration of the magnetic field, this implies a dipolar field strength larger than 3.3 kG. Moreover, the large amplitude and fast variation (within about 1 day) of the longitudinal magnetic field implies that CPD-57 3509 is spinning very fast despite its apparently slow projected rotational velocity. The star should be able to support a centr...

  2. 导电锂盐LiBOB各组分含量的测定%Determination of the component content of conductive lithium salt LiBOB

    Institute of Scientific and Technical Information of China (English)

    韩周祥; 魏剑英; 蔺常辉; 杨志宽

    2006-01-01

    通过各种C2O42-、Li+和B(Ⅲ)的分析方法的对比,提出了LiBOB中各组分含量的一种定量测定方法.K2Cr2O7法测定C2O42-含量、热处理后NaOH滴定法测定B(Ⅲ)含量和热处理后HCl滴定法测定Li+含量的相对误差分别为0.22%、0.54%和0.84%.测定结果准确,方法简单,易于操作,可作为测定LiBOB组分的常规方法.

  3. B fields in OB stars (BOB): Detection of a strong magnetic field in the O9.7 V star HD54879

    CERN Document Server

    Castro, N; Hubrig, S; Simón-Díaz, S; Schöller, M; Ilyin, I; Carrol, T A; Langer, N; Morel, T; Schneider, F R N; Przybilla, N; Herrero, A; de Koter, A; Oskinova, L M; Reisenegger, A; Sana, H

    2015-01-01

    The number of magnetic stars detected among massive stars is small; nevertheless, the role played by the magnetic field in stellar evolution cannot be disregarded. Links between line profile variability, enhancements/depletions of surface chemical abundances, and magnetic fields have been identified for low-mass B-stars, but for the O-type domain this is almost unexplored. Based on FORS2 and HARPS spectropolarimetric data, we present the first detection of a magnetic field in HD54879, a single slowly rotating O9.7 V star. Using two independent and different techniques we obtained the firm detection of a surface average longitudinal magnetic field with a maximum amplitude of about 600 G, in modulus. A quantitative spectroscopic analysis of the star with the stellar atmosphere code FASTWIND results in an effective temperature and a surface gravity of 33000$\\pm1000$ K and 4.0$\\pm0.1$ dex. The abundances of carbon, nitrogen, oxygen, silicon, and magnesium are found to be slightly lower than solar, but compatible ...

  4. Clonal variation of DNA repair in a human glioma cell line This study was supported by the Cancer Research Campaign and the Bob Champion Cancer Trust

    International Nuclear Information System (INIS)

    Clonal heterogeneity in response to ionizing radiation was found for a human glioma cell line, IN859. The authors have investigated the most sensitive clone, the most resistant clone and the parent line for differences in DNA repair fidelity using the method of plasmid reconstitution. Significant differences in repair fidelity were found between the two clones, and between the sensitive clone and the parent line. The resistant clone and the parent lines showed the greater repair fidelity. A comparison of two different restriction enzymes, which cleave the plasmid with blunt or cohesive-ended double-strand breaks, did not reveal differences in repair fidelity. Equal numbers of plasmids were integrated in each cell line, but the sensitive clone showed a higher frequency of misrepair of cleaved plasmid. Misrepair was characterized by partial or complete loss of sequence at the site of plasmid cleavage. It is concluded that the radiosensitive clone exhibits increased misrepair. (author). 15 refs.; 5 figs.; 2 tabs

  5. Epohhi looja jõuab Eestisse / Mari Hiiemäe

    Index Scriptorium Estoniae

    Hiiemäe, Mari

    2008-01-01

    Ameerika lauljast ja heliloojast Bob Dylanist (kontsert 4. juunil Tallinnas Saku Suurhallis). Kinos Sõprus esilinastuvast Bob Dylani elust ja muusikast inspireeritud mängufilmist "Kus on Bob Dylan?"

  6. Descartes da pesca do camarão sete-barbas como fonte de alimento para aves marinhas Sea-bob-shrimp fishery's by-catch as a feeding source for seabirds

    Directory of Open Access Journals (Sweden)

    Joaquim Olinto Branco

    2001-03-01

    Full Text Available From July 1996 to June 1997, in Armação do Itapocoroy, Penha, Santa Catarina State, Brazil, monthly census were done in three areas of traditional fishery and Itacolomis islands. A total of 10021 seabirds were registered, belonging to eight species, five genus and four families. The average number of seabirds per dragging varied between 80,2 and 113,6. Sterna spp, appeared at first in 43,3% of the released by-catch, followed by Larus dominicanus Lichtenstein, 1823, Fregata magnificens Matheus, 1914, Phalacrocorax brasilianus (Humboldt, 1805 and Sula leucogaster Boddaert, 1783. The average size of the fish consumed by the seabirds oscillated from 8,3 cm (Sterna spp. to 18,5 cm (F. magnificens, with an average time from 6,12 to 7,55 minutes per by-catch released. In general, seabirds use 84,0% of the by-catch fish as a feeding source.

  7. Descartes da pesca do camarão sete-barbas como fonte de alimento para aves marinhas Sea-bob-shrimp fishery's by-catch as a feeding source for seabirds

    OpenAIRE

    Joaquim Olinto Branco

    2001-01-01

    From July 1996 to June 1997, in Armação do Itapocoroy, Penha, Santa Catarina State, Brazil, monthly census were done in three areas of traditional fishery and Itacolomis islands. A total of 10021 seabirds were registered, belonging to eight species, five genus and four families. The average number of seabirds per dragging varied between 80,2 and 113,6. Sterna spp, appeared at first in 43,3% of the released by-catch, followed by Larus dominicanus Lichtenstein, 1823, Fregata magnificens Matheus...

  8. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... and cholesterol, control their weight and get regular physical activity. BOB WELTNER: My heart stopped and in theory, ... attack from happening. BOB WELTNER: The type of exercise that I do now is I have a ...

  9. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... BOB WELTNER: My heart stopped and in theory, I guess I was dead. But through the miracles of medical ... happening. BOB WELTNER: The type of exercise that I do now is I have a stationary bike ...

  10. Improvement in Space Food Packaging Methods Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Space Food Systems Laboratory's (SFSL) current Bulk Overwrap Bag (BOB) package, while simple and effective, leaves room for improvement. Currently, BOBs are...

  11. A Bidirectional Teleportation Protocol for Arbitrary Two-qubit State Under the Supervision of a Third Party

    Science.gov (United States)

    Choudhury, Binayak S.; Dhara, Arpan

    2016-04-01

    In this paper we introduce a controlled teleportation protocol for transferring arbitrary two-qubit states bilaterally between Alice and Bob. The bidirectional teleportation protocol is supervised by a controller Charlie. A ten-qubit entangled quantum channel shared between Alice, Bob and Charlie is utilized. The protocol depends on Bell state measurements by Alice and Bob and single-qubit measurements by Charlie.

  12. Zero knowledge convincing protocol on quantum bit is impossible

    OpenAIRE

    Horodecki, Pawel; Horodecki, Michal; Horodecki, Ryszard

    2000-01-01

    Consider two parties: Alice and Bob and suppose that Bob is given a qubit system in a quantum state $\\phi$, unknown to him. Alice knows $\\phi$ and she is supposed to convince Bob that she knows $\\phi$ sending some test message. Is it possible for her to convince Bob providing him "zero knowledge" i. e. no information about $\\phi$ he has? We prove that there is no "zero knowledge" protocol of that kind. In fact it turns out that basing on Alice message, Bob (or third party - Eve - who can inte...

  13. Robert Gilmore, a portrait

    Science.gov (United States)

    Solari, Hernán G.

    2013-01-01

    To present the personality of Bob Gilmore is a formidable task, as his scientific contributions include group theory, laser physics, non-linear dynamics, catastrophe theory, thermodynamics, dynamical systems, quantum theory and more. But even if we succeed in describing his contributions, much of Gilmore's being would be lost. Bob as advisor, Bob as father, Bob as teacher, Bob as scientific communicator reveal as much of Bob Gilmore as his scientific papers and his books. Very much as in the Group Theory so close to him, there is a Robert Gilmore in abstract as well as representations of Robert Gilmore. We will make an attempt to find the "principle of the rule", the abstract level of Robert Gilmore as well as Robert Gilmore, himself, as a representation of the duality science-humanism.

  14. Explaining the mechanism of the quantum speed-up in time-symmetric quantum mechanics

    CERN Document Server

    Castagnoli, Giuseppe

    2011-01-01

    Bob chooses a function and gives to Alice the black box that computes it. Alice, without knowing Bob's choice, should find a character of the function (e. g. its period) by computing its value for different arguments. There is naturally correlation between Bob's choice and the solution found by Alice. We show that, in quantum algorithms, this correlation becomes quantum. This highlights an overlooked quantum measurement problem: sharing between two completely or partly redundant measurements the determination of two completely or partly correlated measurement outcomes. Under a reasonable sharing criteria, all is like Alice, by reading the solution at the end of the algorithm, contributed to the determination of the initial choice of Bob. This contribution, back evolved to before running the algorithm where Bob's choice is located, becomes Alice knowing in advance half of the choice. The quantum algorithm is the quantum superposition of all the possible ways of taking half of Bob's choice and, given the advanc...

  15. Gaussian quantum steering and its asymmetry in curved spacetime

    CERN Document Server

    Wang, Jieci; Jing, Jiliang; Fan, Heng

    2015-01-01

    We study Gaussian quantum steering and its asymmetry in the background of a Schwarzschild black hole. We present a Gaussian channel description of quantum state evolution under the influence of Hawking radiation. We find that thermal noise introduced by Hawking effect will destroy the steerability between an inertial observer Alice and an accelerated observer Bob who hovers outside an event horizon, while it generates steerability between Bob and a hypothetical observer Anti-Bob inside the event horizon. Besides, unlike entanglement behaviors in curved spacetime, here the steering from Alice to Bob suffers from a ``sudden death" and the steering from Anti-Bob to Bob appears a ``sudden birth" with the increasing of Hawking temperature. We also find that the Gaussian steering is always asymmetric and the maximum steering asymmetry can \\emph{ exceed} $\\ln 2$ in curved spacetime, which is quite different from the flat spacetime case [Phys. Rev. Lett. 114, 060403 (2015)] where the steering asymmetry can \\emph{neve...

  16. Entanglement-assisted guessing of complementary measurement outcomes

    OpenAIRE

    Berta, M; Coles, P.J.; Wehner, S.D.C.

    2014-01-01

    Heisenberg's uncertainty principle implies that if one party (Alice) prepares a system and randomly measures one of two incompatible observables, then another party (Bob) cannot perfectly predict the measurement outcomes. This implication assumes that Bob does not possess an additional system that is entangled to the measured one; indeed, the seminal paper of Einstein, Podolsky, and Rosen (EPR) showed that maximal entanglement allows Bob to perfectly win this guessing game. Although not in co...

  17. An equality between entanglement and uncertainty

    OpenAIRE

    Berta, Mario; Coles, Patrick J.; Wehner, Stephanie

    2013-01-01

    Heisenberg's uncertainty principle implies that if one party (Alice) prepares a system and randomly measures one of two incompatible observables, then another party (Bob) cannot perfectly predict the measurement outcomes. This implication assumes that Bob does not possess an additional system that is entangled to the measured one; indeed the seminal paper of Einstein, Podolsky and Rosen (EPR) showed that maximal entanglement allows Bob to perfectly win this guessing game. Although not in cont...

  18. One Is a Claim, Two Is a Defense: Bringing an End to the Equal Opportunity Harasser Defense

    OpenAIRE

    Mark J. McCullough

    2005-01-01

    Consider the following three workplace scenarios. Alice, a female employee at ABC corporation, has been subjected to almost continuous harassment by her immediate supervisor, Bob, for the past two months. Several times each week, Bob makes crude and sexually suggestive comments and, on numerous occasions, Bob has touched Alice inappropriately in the workplace. Assuming Alice attempts to remedy this situation in a reasonable time period and her employer has unreasonably failed “to preven...

  19. Experimental realization of the quantum duel game using linear optical circuits

    Science.gov (United States)

    Balthazar, W. F.; Passos, M. H. M.; Schmidt, A. G. M.; Caetano, D. P.; Huguenin, J. A. O.

    2015-08-01

    We report on the experimental realization of the quantum duel game for two players, Alice and Bob. Using an all optical approach, we have encoded Alice and Bob states in transverse modes and polarization degrees of freedom of a laser beam, respectively. By setting Alice and Bob input states and considering the possibility of Alice performing two shots, we demonstrated the quantum features of the game as well as we recovered the classical version of the game.

  20. δ18O and salinity variability from the last glacial maximum to recent in the Bay of Bengal and Andaman Sea

    Digital Repository Service at National Institute of Oceanography (India)

    Sijinkumar, A.V.; Clemens, S.; Nath, B.N.; Prella, W.; Benshila, Rachid; Lengaigne, M.

    waters in the northern BoB were 2.5 psμ(8%) fresher, Andaman Sea were 3.8 psμ(12%) fresher, and southern BoB were 1.2 psμ(3.5%) fresher. Conversely, during the last glacial maximum (LGM), surface waters in the northern BoB were 2.9 psμ(9%) more saline...

  1. Secure one-way interactive communication

    OpenAIRE

    Aggarwal, Abhinav; Dani, Varsha; Hayes, Thomas; Saia, Jared

    2016-01-01

    Alice and Bob are connected via a two-way binary channel. This paper describes an algorithm to enable Alice to send a message to Bob when 1) an oblivious adversary flips an unknown number of bits, $T$, on the channel; and 2) the message length $L$, and a desired error probability, $\\epsilon$ are public knowledge. With probability at least $1-\\epsilon$, our algorithm ensures that Bob receives the correct message, and that Alice and Bob terminate after sending a total of $L + O \\left( T + \\min ...

  2. Vernal Pool Distribution - Central Valley, 2005 [ds650

    Data.gov (United States)

    California Department of Resources — "Great Valley Vernal Pool Distribution", originally mapped by Bob Holland, 2005. This dataset contains vernal pool areas mapped over Califorina's Central Valley,...

  3. The "Rae Review:" A Critique

    Science.gov (United States)

    Barrett, Ralph V.; Doughty, Howard A.

    2005-01-01

    The subject of this article is the report, "Ontario: A Leader in Learning" (Rae, 2005), presented to the government of Ontario by its principal author and key public face of the document, Bob Rae. The presentation is divided into four main parts: (1) the authors attempt to summarize the political philosophy of Bob Rae, the former Member of…

  4. Asymmetric Bidirectional Controlled Teleportation by Using Six-qubit Cluster State

    Science.gov (United States)

    Li, Yuan-hua; Nie, Li-ping; Li, Xiao-lan; Sang, Ming-huang

    2016-06-01

    We propose a scheme for asymmetric bidirectional controlled teleportation by using a six-qubit cluster state as quantum channel. In our scheme, Alice can transmit an arbitrary two-qubit entangled state to Bob and at the same time Bob can teleport an arbitrary single-qubit state to Alice under the control of the supervisor Charlie.

  5. Bidirectional Quantum Controlled Teleportation by using a Seven-qubit Entangled State

    Science.gov (United States)

    Sang, Ming-huang

    2016-01-01

    We propose a new protocol of bidirectional quantum controlled teleportation by using a seven-qubit entangled state as the quantum channel. That is to say Alice may transmit an arbitrary single-qubit state to Bob and Bob may transmit an arbitrary two-qubit state to Alice via the control of the supervisor Charlie.

  6. Bidirectional Quantum Teleportation by Using Five-qubit Cluster State

    Science.gov (United States)

    Sang, Ming-huang

    2016-03-01

    We propose a scheme for bidirectional quantum teleportation by using a five-qubit cluster state. In our scheme, Alice can transmit an arbitrary two-qubit entangled state to Bob and at the same time Bob can teleport an arbitrary single-qubit state to Alice.

  7. Asymmetric Bidirectional Controlled Teleportation by Using Six-qubit Cluster State

    Science.gov (United States)

    Li, Yuan-hua; Nie, Li-ping; Li, Xiao-lan; Sang, Ming-huang

    2016-02-01

    We propose a scheme for asymmetric bidirectional controlled teleportation by using a six-qubit cluster state as quantum channel. In our scheme, Alice can transmit an arbitrary two-qubit entangled state to Bob and at the same time Bob can teleport an arbitrary single-qubit state to Alice under the control of the supervisor Charlie.

  8. Quantum mutual information and the one-time pad

    International Nuclear Information System (INIS)

    Alice and Bob share a correlated composite quantum system AB. If AB is used as the key for a one-time pad cryptographic system, we show that the maximum amount of information that Alice can send securely to Bob is the quantum mutual information of AB

  9. Protocol for direct counterfactual quantum communication

    OpenAIRE

    Salih, Hatim; Li, Zheng-Hong; Al-Amri, M; Zubairy, M. Suhail

    2012-01-01

    It has long been assumed in physics that for information to travel between two parties in empty space, "Alice" and "Bob", physical particles have to travel between them. Here, using the "chained" quantum Zeno effect, we show how, in the ideal asymptotic limit, information can be transferred between Alice and Bob without any physical particles traveling between them.

  10. Comment on 'quantum dialogue'

    OpenAIRE

    Cai, Qing-Yu

    2004-01-01

    In this comment, we want to emphasize that when the state of the two qubit is $|0>_{B}|1>_{A}$ or $|1>_{A}|0>_{B}$, Bob's Bell basis measurement outcome can not be $|\\phi ^{\\pm}>$. Also, when the product state is $|0> |0>$ or $|1> |1>$, Bob's measurement outcome can not be $|\\psi ^{\\pm}>$.

  11. A Reversible Processor Architecture and its Reversible Logic Design

    DEFF Research Database (Denmark)

    Thomsen, Michael Kirkedal; Axelsen, Holger Bock; Glück, Robert

    2012-01-01

    We describe the design of a purely reversible computing architecture, Bob, and its instruction set, BobISA. The special features of the design include a simple, yet expressive, locally-invertible instruction set, and fully reversible control logic and address calculation. We have designed an arch...

  12. Quantum key distribution by swapping the entanglement of {chi}-type state

    Energy Technology Data Exchange (ETDEWEB)

    Gao Gan, E-mail: gaogan0556@163.co [Department of Electrical Engineering, Tongling University, Tongling 244000 (China)

    2010-06-01

    We propose a quantum key distribution protocol using entanglement swapping of {chi}-type state; in this protocol, Alice and Bob transmit a particle sequence to each other and perform {chi}-type state measurements. Alice's and Bob's roles are completely symmetric.

  13. Comment on "Quantum private comparison of equality protocol without a third party"

    Science.gov (United States)

    He, Guang Ping

    2015-06-01

    Recently, Lin et al. proposed a quantum protocol (Quantum Inf Process 13:239, 2014), which can compare the secret data of Alice and Bob without the help from a third party. Here it will be shown that the protocol is insecure. Both Alice and Bob can learn the secret of the other party without being detected.

  14. Quantum computation: Honesty test

    Science.gov (United States)

    Morimae, Tomoyuki

    2013-11-01

    Alice does not have a quantum computer so she delegates a computation to Bob, who does own one. But how can Alice check whether the computation that Bob performs for her is correct? An experiment with photonic qubits demonstrates such a verification protocol.

  15. Occurrence of large fractions of mercury-resistant bacteria in the Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    De, J.; Ramaiah, N.

    -resistant from the offshore regions of the BOB points to the global nature of mercury pollution. The higher percentages of MRB in the offshore waters of the BOB might signify the already prevalent adverse impact of heavy metals on the metabolic performance...

  16. A secure additive protocol for card players

    CERN Document Server

    Cordon-Franco, Andres; Fernandez-Duque, David; Joosten, Joost J; Soler-Toscano, Fernando

    2011-01-01

    Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d=a+b+c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0,1,..., we investigate general conditions for when Alice or Bob can safely announce the sum of the cards they hold modulo an appropriately chosen integer. We demonstrate that this holds whenever a,b>2 and c=1. Because Cath holds a single card, this also implies that Alice and Bob will learn the card deal from the other player's announcement.

  17. A Method for Transferring an Unknown Quantum State and Its Application

    Institute of Scientific and Technical Information of China (English)

    YAN Feng-Li; HUO Hai-Rui

    2007-01-01

    We suggest a method for transferring an unknown quantum state.In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob.Then she sends the ancillary particle to Bob.When Alice is informed by Bob that the ancillary particle is received,she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel.Depending on the outcome Bob can restore the unknown quantum state,which Alice destroyed,on the ancillary particle successfully.As an application of this method we propose a quantum secure direct communication protocol.By introducing the decoy qubits the security of the scheme is guaranteed.

  18. A Doubly Exponentially Crumbled Cake

    CERN Document Server

    Christ, Tobias; Gebauer, Heidi; Matoušek, Jiří; Uno, Takeaki

    2011-01-01

    We consider the following cake cutting game: Alice chooses a set P of n points in the square (cake) [0,1]^2, where (0,0) is in P; Bob cuts out n axis-parallel rectangles with disjoint interiors, each of them having a point of P as the lower left corner; Alice keeps the rest. It has been conjectured that Bob can always secure at least half of the cake. This remains unsettled, and it is not even known whether Bob can get any positive fraction independent of n. We prove that if Alice can force Bob's share to tend to zero, then she must use very many points; namely, to prevent Bob from gaining more than 1/r of the cake, she needs at least 2^{2^{\\Omega(r)}} points.

  19. Studies on the thermal decomposition kinetics of LiPF6 and LiBC4O8

    Indian Academy of Sciences (India)

    Li Shi-You; Ma Pei-Hua; Cui Xiao-Ling; Ren Qi-Du; Li Fa-Qiang

    2008-03-01

    Thermal decomposition of LiPF6 and LiBC4O8 (lithium bis(oxalate)borate, abbreviated as LiBOB) were studied using TG (thermogravimetry)-DTG (derivative thermogravimetry) method with different heating rate of 5, 10, 20 and 40°C min-1 or at different constant temperature C (109.80, 118.79, 148.41, 176.86 °C for LiPF6 and 278.51, 298.13, 317.65, 336.13 for LiBOB). From the nonisothermal kinetics we calculate that LiPF6 is 1.01, LiBOB is 1.04, LiPF6 is 91907.61 J/mol, and LiBOB is 205179.88 J/mol; from the isothermal kinetics we calculate that n for both LiPF6 and LiBOB are 1, LiPF6 is 91907.61 J/mol, LiBOB is 205179.88 J/mol, lnALiPF6 is 16.89 s-1, and lnALiBOB is 31.96 s-1. The results obtained from the two ways have minor differences and can validate each other.

  20. Influence of circulation parameters on the AOD variations over the Bay of Bengal during ICARB

    Indian Academy of Sciences (India)

    Marina Aloysius; Mannil Mohan; S Suresh Babu; Vijayakumar S Nair; K Parameswaran; K Krishna Moorthy

    2008-07-01

    MODIS (Moderate Resolution Imaging Spectroradiometer) level-3 aerosol data, NCEP (National Centers for Environmental Prediction) reanalysis winds and QuikSCAT ocean surface winds were made use of to examine the role of atmospheric circulation in governing aerosol variations over the Bay of Bengal (BoB) during the first phase of the ICARB (Integrated Campaign for Aerosols, gases and Radiation Budget) campaign (March 18–April 12, 2006). An inter-comparison between MODIS level-3 aerosol optical depth (AOD) data and ship-borne MICROTOPS measurements showed good agreement with correlation 0.92 ( > 0.0001) and a mean MODIS underestimation by 0.01. During the study period, the AOD over BoB showed high values in the northern/north western regions, which reduced towards the central and southern BoB. The wind patterns in lower atmospheric layers (< 850 hPa) indicated that direct transport of aerosols from central India was inhibited by the presence of a high pressure and a divergence over BoB in the lower altitudes. On the other hand, in the upper atmospheric levels, winds from central and northern India stretched south eastwards and converged over BoB with a negative vorticity indicative of a downdraft. These wind patterns pointed to the possibility of aerosol transport from central India to BoB by upper level winds. This mechanism was further confirmed by the significant correlations that AOD variations over BoB showed with aerosol flux convergence and flux vorticity at upper atmospheric levels (600–500 hPa). AOD in central and southern BoB away from continental influences displayed an exponential dependence on the QuikSCAT measured ocean surface wind speed. This study shows that particles transported from central and northern India by upper atmospheric circulations as well as the marine aerosols generated by ocean surface winds contributed to the AOD over the BoB during the first phase of ICARB.

  1. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  2. Quantum m-out-of-n Oblivious Transfer

    OpenAIRE

    Chen, Zhide; Zhu, Hong

    2003-01-01

    In the m-out-of-n oblivious transfer (OT) model, one party Alice sends n bits to another party Bob, Bob can get only m bits from the n bits. However, Alice cannot know which m bits Bob received. Y.Mu[MJV02]} and Naor[Naor01] presented classical m-out-of-n oblivious transfer based on discrete logarithm. As the work of Shor [Shor94], the discrete logarithm can be solved in polynomial time by quantum computers, so such OTs are unsafe to the quantum computer. In this paper, we construct a quantum...

  3. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-04-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  4. Obituary: Robert H. Koch (1929-2010)

    Science.gov (United States)

    Koch, Joanne; Corcoran, Michael; Holenstein, Bruce; Sion, Edward

    2011-12-01

    Robert H. Koch, emeritus professor of astronomy and astrophysics at the University of Pennsylvania, passed away at his home in Ardmore, Pennsylvania on 11 October 2010 after a brief illness. Bob was 80 years old and remained sharp and intellectually engaged with the astronomical community up until the onset of complications from a brain tumor. Bob was born in York, Pennsylvania on 19 December 1929, and graduated from York Catholic High School in 1947. He attended the University of Pennsylvania on a senatorial scholarship, graduating in 1951. After two years in the United States Army, he enrolled in graduate school at the University of Pennsylvania, doing his doctoral research on the photoelectric photometry of R CMa, AO Cas, AS Eri, and XY Leo at the Steward Observatory, University of Arizona in Tucson. Bob would continue this exploration of close binary stars, their atmospheres and interactions, for the rest of his career. Bob met his future spouse, Joanne C. Underwood, while in graduate school in 1957 and they were married in 1959. Bob received his PhD in astronomy in 1959 and moved to Amherst, Massachusetts, where he taught as a member of the Four College Astronomy Department until 1966. Following a year at the University of New Mexico in Albuquerque, Bob joined the Astronomy Department at Penn, teaching and doing research there until his retirement in 1996. Bob's main interests were the study of close and eclipsing binary stars, stellar envelopes and winds, intrinsic variables, transits and occultations, and the Milky Way Galaxy, producing well over 100 refereed publications. Bob was partial to photoelectric photometry and polarimetry, conducting most of his observational research at the University of Pennsylvania Flower and Cook Observatory, and at other ground- and space-based observatories. As an international figure in the area of binary stars, Bob had widespread collaborations with scientists at other institutions, in the US and throughout the world, and

  5. Plaadid / Mari Peegel

    Index Scriptorium Estoniae

    Peegel, Mari, 1978-

    2005-01-01

    Uutest heliplaatidest Neil Tennant/Chris Lowe "Battleship Potemkin", Institute "Distort Yourself", Bob Dylan "No Direction Home", Jem "Finally Woken", Machine Men "Elegies", Jamie Cullum "Catching Tales", Bloodhound Gang "Hefty Fine"

  6. A seismotectonic study of the 21 May 2014 Bay of Bengal intraplate earthquake: Evidence of onshore-offshore tectonic linkage and fracture zone reactivation in the northern Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, G.S.; Radhakrishna, M.; Murthy, K.S.R.

    The earthquake of 21 May 2014 (Mw 6.0) in the northern Bay of Bengal (BOB) highlights the importance of studies on intraplate earthquakes in the oceanic regime for understanding the stress state of the oceanic lithosphere. The epicenter...

  7. Popmuusika / Mart Juur

    Index Scriptorium Estoniae

    Juur, Mart, 1964-

    2006-01-01

    Uutest heliplaatidest Kent "Du & Jag", "Lindstom & Prins Thomas", Taj Mahal "The Essential", Wilco "Kicking elevision - Live In Chicago", Yo-Yo Ma "The Essential", Bob marley & The Wailers "Africa Unite: The Singles", Nine Horses "Snow Borne Sorrow"

  8. Quantum Secure Direct Communication by Using Three-Dimensional Hyperentanglement

    Institute of Scientific and Technical Information of China (English)

    施锦; 龚彦晓; 徐平; 祝世宁; 詹佑邦

    2011-01-01

    We propose two schemes for realizing quantum secure direct communication (QSDC) by using a set of ordered two-photon three-dimensional hyperentangled states entangled in two degrees of freedom (DOFs) as quantum information channels. In the first scheme, the photons from Bob to Alice are transmitted only once. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs single-photon two-DOF Bell bases measurements on her photons. This scheme has better security than former QSDC protocols. In the second scheme, Bob transmits photons to Alice twice. After insuring the security of the quantum channels, Bob encodes the secret message on his photons. Then Alice performs two-photon Bell bases measurements on each DOF. The scheme has more information capacity than former Q,SDC protocols.

  9. Bogi i monstrõ, ili biografija Supermena / Olga Marsheva

    Index Scriptorium Estoniae

    Marsheva, Olga

    2007-01-01

    Ameerika tuntuimad koomiksikunstnikud Larry Hama, Stan Lee, Jerry Seagel, Bob Kain, Frank Miller ja nende loodud tegelaskujud. Ka briti kirjanik Alan Moore, kellele ei meeldi oma kangelastest tehtud ekraniseeringuid vaadata

  10. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... theory, I guess I was dead. But through the miracles of medical science, they managed to revive ... prevent a heart attack from happening. BOB WELTNER: The type of exercise that I do now is ...

  11. Uudiseid maailmast / Ivo Heinloo

    Index Scriptorium Estoniae

    Heinloo, Ivo

    2012-01-01

    Lühisõnumeid muusikamaailmast: Pat Metheny Group tuleb taas kokku. Musta muusika auhinnad Suurbritannias. Bob Marley muusika kui õppevahend inglise keele omandamiseks. Ted Curson 1935-2012. In memoriam David S. Ware. In memoriam Terry Callier

  12. Plaadid / Mari Rebane, Heidi Purga, Tiiu Laks...[jt.

    Index Scriptorium Estoniae

    2008-01-01

    Uutest heliplaatidest Sigur Ros "Heim/Hvart", Jay-Z "American Gangster", Bob Marley and The Wailers "Roots, Rock, Remixed", Ghostface killah "The Big doe Rehab", Backstreet Boys "Unbreakable", Matchbox Twenty "Exile on Mainstream", "Just" Hits 6"

  13. Plaadid / Priit Juurmann

    Index Scriptorium Estoniae

    Juurmann, Priit

    2006-01-01

    Uutest heliplaatidest Alexkid "Caracol", Bob Dylan "Modern Times", Justin Timberlake "Future Sex", Ilves, Pulk ja Rahman "Murõt ei olõ", Audioslave "Revelations", Bill Frisell "Bill Frisell, Ron Carter, Paul Motian", Julie & Khari "Moon Bossa"

  14. Pop / Marek Kallin

    Index Scriptorium Estoniae

    Kallin, Marek

    2005-01-01

    Heliplaatidest: Cardigans "Super Extra Gravity", Earth, Wind & Fire "Illumination", Stevie Wonder "A Time To Love", Shout Out Louds "Howl Howl Gaff Gaff", Goldie Lookin Chain "Safe As Fuck", Ms. Dynamite "Judgement Days", Echosilence "Distorted Horizon", Bob Dylan "No Direction Home"

  15. Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations

    Institute of Scientific and Technical Information of China (English)

    YAN Feng-Li; GAO Ting; LI You-Cheng

    2008-01-01

    @@ We propose a scheme of quantum secret sharing between Alice's group and Bob's group with single photons and unitary transformations. In the protocol, one member in Alice's group prepares a sequence of single photons in one of four different states, while other members directly encode their information on the sequence of single photons via unitary operations; after that, the last member sends the sequence of single photons to Bob's group.Then Bob's, except for the last one, do work similarly. Finally the last member in Bob's group measures the qubits. If the security of the quantum channel is guaranteed by some tests, then the qubit states sent by the last member of Alice's group can be used as key bits for secret sharing. It is shown that this scheme is safe.

  16. The Government’s financial support for fossil fuel companies is being overlooked

    OpenAIRE

    Ward, Bob

    2012-01-01

    Bob Ward explores the subsidies currently doled out by the government to fossil fuel companies and asks why it has not attracted the same degree of criticism as subsidies for the renewable energy industry.

  17. Location-Oblivious Data Transfer with Flying Entangled Qudits

    CERN Document Server

    ,

    2011-01-01

    We present a simple and practical quantum protocol involving two mistrustful agencies in Minkowski space, which allows Alice to transfer data to Bob at a spacetime location that neither can predict in advance. The location depends on both Alice's and Bob's actions. The protocol guarantees unconditionally to Alice that Bob learns the data at a randomly determined location; it guarantees to Bob that Alice will not learn the transfer location even after the protocol is complete. The task implemented, transferring data at a space-time location that remains hidden from the transferrer, has no precise analogue in non-relativistic quantum cryptography. It illustrates further the scope for novel cryptographic applications of relativistic quantum theory.

  18. Progerock-passioon / Mari Laaniste

    Index Scriptorium Estoniae

    Laaniste, Mari, 1977-

    2006-01-01

    Briti ansambli Pink Floydi heliplaadi "The Wall" (1979) filmiversioonist. Muusikafilm "Müür" ("Pink Floyd The Wall") : stsenarist Roger Waters : režissöör Alan Parker Pinki rollis Bob Geldof : Suurbritannia 1982

  19. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... activity. BOB WELTNER: My heart stopped and in theory, I guess I was dead. But through the ... The truth is that heart disease is the number one cause of death among women. And the ...

  20. Pop / Tõnu Kaalep

    Index Scriptorium Estoniae

    Kaalep, Tõnu, 1966-

    2006-01-01

    Uutest heliplaatidest Charlotte Gainsbourg "5.55", Bob Dylan "Modern Times", Orson "Bright Idea", Adem "Love and Other Planets", Basement Jaxx "Crazy Itch Radio", Audioslave "Revelations", Cassius "15 Again", Nitrous "Dominant Force", the Answer "Rise2

  1. 76 FR 17332 - Special Conditions: Embraer S.A.; Model EMB 500; Single-Place Side-Facing Seat Dynamic Test...

    Science.gov (United States)

    2011-03-29

    ... INFORMATION CONTACT: Mr. Bob Stegeman, Federal Aviation Administration, Aircraft Certification Service, Small... inches of energy absorbing protective padding (foam or equivalent), such as Ensolite. 3. Thoracic Trauma..., Small Airplane Directorate, Aircraft Certification Service. BILLING CODE 4910-13-P...

  2. Tappev kuulsus viib Chicago lavale / Andres Laasik

    Index Scriptorium Estoniae

    Laasik, Andres, 1960-

    2003-01-01

    Muusikafilm "Chicago", mille aluseks John Kanderi - Fred Ebb'i muusikal : režissöör Rob Marshall : Ameerika Ühendriigid 2002. 1975.a. selle muusikali Broadwayl lavale toonud Bob Fosse mõjust filmi stiilile

  3. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... attack from happening. BOB WELTNER: The type of exercise that I do now is I have a ... Family Heart Program. When we go to our exercise class each week, they take our blood pressure ...

  4. The effect of semi-permanent eddies on the distribution of mesozooplankton in the central Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Fernandes, V.

    species richness diminished with the dwindling dissolved oxygen concentrations north of 15N. It is inferred that in the intensely stratified surface waters of the central BoB, cold-core eddies are important for promoting considerable biological production...

  5. Quantum Atomic Clock Synchronization: An Entangled Concept of Nonlocal Simultaneity

    Science.gov (United States)

    Abrams, D.; Dowling, J.; Williams, C.; Jozsa, R.

    2000-01-01

    We demonstrate that two spatially separated parties (Alice and Bob) can utilize shared prior quantum entanglement, as well as a classical information channel, to establish a synchronized pair of atomic clocks.

  6. Interannual variability of Kelvin wave propagation in the wave guides of the equatorial Indian Ocean, the coastal Bay of Bengal and the southeastern Arabian Sea during 1993-2006

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, R.R.; GirishKumar, M.S.; Ravichandran, M.; Rao, A.R.; Gopalakrishna, V.V.; Pankajakshan, T.

    of the BoB and the southeastern AS. 5 Acknowledgements Highest appreciation is placed on record for the excellent compilation by several persons and organization of all the data sets utilized in this study. Graphics were generated using Ferret...

  7. Linnud teevad järglastel vahet

    Index Scriptorium Estoniae

    2012-01-01

    Ajakirjas Behavioral Ecology and Sociobiology avaldatud Queensi ülikooli teadlase Bob Montgomerie uuringust, mis tõestas, et isa punarinnad toitsid kaks korda innukamalt oma poegi, kes sündisid säravama sinise varjundiga munadest

  8. Plaadid / Valner Valme

    Index Scriptorium Estoniae

    Valme, Valner, 1970-

    2004-01-01

    Uutest heliplaatidest Handsome Boy Modelling School "White People", Moron, Julies "Premium Par", Harrison, Joel "So Long 2nd Street", General Electrics "Cliquety Kliqk", Razorlight "Up All Night", Bob Marley & Wailers "127 King Street"

  9. Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations

    International Nuclear Information System (INIS)

    We propose a scheme of quantum secret sharing between Alice's group and Bob's group with single photons and unitary transformations. In the protocol, one member in Alice's group prepares a sequence of single photons in one of four different states, while other members directly encode their information on the sequence of single photons via unitary operations; after that, the last member sends the sequence of single photons to Bob's group. Then Bob's, except for the last one, do work similarly. Finally the last member in Bob's group measures the qubits. If the security of the quantum channel is guaranteed by some tests, then the qubit states sent by the last member of Alice's group can be used as key bits for secret sharing. It is shown that this scheme is safe

  10. 新型锂盐--双乙二酸硼酸锂%A New Lithium Salt--Lithium Bis(oxalato)borate

    Institute of Scientific and Technical Information of China (English)

    余碧涛; 仇卫华; 李福燊

    2005-01-01

      介绍了新型锂盐--双乙二酸硼酸锂(LiBOB)的基本性质及其电解液在锂离子电池中的应用研究,并与现在常用的产业化锂盐LiPF6进行比较,总结了LiBOB的优缺点,指出了其进一步的研究方向。%  The reseaches of lithium bis(oxalato)borate (LiBOB) as a salt for lithium-ion batteries are summarized. Its physical and chemical properties and LiBOB-based electrolytes have been introduced in detail and compared with those of LiPF6. The advantages and disadvantages of LiBOB and its research emphases in future are also pointed out.

  11. Doctors Issue Call to Combat Climate Change

    Science.gov (United States)

    ... an uptick in ozone," Alexander said. "As climate change continues, it's going to be harder to maintain the progress we have made." SOURCES: Wayne Riley, M.D., president, American College of Physicians; Bob Doherty, senior vice president of ...

  12. 10. VI avati Tartus Sadamateatris...

    Index Scriptorium Estoniae

    2005-01-01

    Näitus "The 2D Cowboys and a Man from No Man's Land". New Mexico kunstnikud Larry Bob Phillips, Mathew Williams (Mad Dog), Doug Morris (grupeering 2D Cowboys) ja Eesti juurtega Pat Kikut eksponeerivad maali, joonistusi ja kollaazhe

  13. Zpívej, kovboji. Sny, představy (a skutečnost) o Divokém západu

    Czech Academy of Sciences Publication Activity Database

    Jareš, Michal

    2013-01-01

    Roč. 60, č. 6 (2013), s. 455-461. ISSN 0037-6973 Institutional support: RVO:68378068 Keywords : western (genre) * Hurikán, Bob * poetism * Tarantino, Quentin Subject RIV: AJ - Letters, Mass-media, Audiovision

  14. Universally Composable Multiparty Computation with Partially Isolated Parties

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel

    2009-01-01

    assume that a player (Alice) can partially isolate another player (Bob) for a brief portion of the computation and prevent Bob from communicating more than some limited number of bits with the environment. For example, isolation might be achieved by asking Bob to put his functionality on a tamper......It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt an arbitrary number of players. One way to get around this problem is by having a trusted third party generate some......-proof hardware token and assuming that Alice can prevent this token from communicating to the outside world. Alternatively, Alice may interact with Bob directly but in a special office which she administers and where there are no high-bandwidth communication channels to the outside world. We show that, under...

  15. Building and Operating Spacelab: Spacelab Design and Systems Engineering Panel

    Science.gov (United States)

    Roth, Axel; Berge, Klaus; Thirkettle, Alan; Craft, Harry G., Jr.; Benson, Robert

    2000-01-01

    This document is the transcription of the Spacelab Design and Systems Engineering Panel's discussion of the Spacelab program. It includes information on Spacelab's origin and development. The panel includes Klaus Berge, Bob Benson, Allan Thirkettle, and Harry Craft.

  16. Blind Quantum Computation

    CERN Document Server

    Arrighi, P; Arrighi, Pablo; Salvail, Louis

    2003-01-01

    We investigate the possibility of having someone carry out the work of executing a function for you, but without letting him learn anything about your input. Say Alice wants Bob to compute some well-known function f upon her input x, but wants to prevent Bob from learning anything about x. The situation arises for instance if client Alice has limited computational resources in comparison with mistrusted server Bob, or if x is an inherently mobile piece of data. Could there be a protocol whereby Bob is forced to compute f(x) "blindly", i.e. without observing x? We provide such a blind computation protocol for the class of functions which admit an efficient procedure to generate random input-output pairs, e.g. factorization. The setting is quantum, the security is unconditional, the eavesdropper is as malicious as can be. Keywords: Secure Circuit Evaluation, Secure Two-party Computation, Information Hiding, Information gain vs disturbance.

  17. 78 FR 78986 - Changes in Flood Hazard Determinations

    Science.gov (United States)

    2013-12-27

    ... No.:, B- City of Simi Valley, The Honorable Bob Huber, City Hall, 2929 Tapo August 16, 2013 060421 1328). (13-09-1538P). Mayor, City of Simi Canyon Road, Simi Valley, 2929 Tapo Canyon Valley, CA...

  18. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... smoking, control their high blood pressure and cholesterol, control their weight and get regular physical activity. BOB WELTNER: My heart stopped and in theory, I guess I was dead. But through the ...

  19. Blends of lithium bis(oxalato)borate and lithium tetrafluoroborate: Useful substitutes for lithium difluoro(oxalato)borate in electrolytes for lithium metal based secondary batteries?

    International Nuclear Information System (INIS)

    Highlights: • Stability studies at salts with the difluoro(oxalato)borate anion show that ligand exchange occurs under thermal stress at 60 °C. • NMR measurements at solutions of LiBOB/LiBF4 blend electrolytes show that ligand exchange occurs in solutions at room temperature as well. • Formation of traces of LiDFOB in LiBOB/LiBF4 blend electrolytes is responsible for the favorable SEI and excellent lithium cycling. • SEI compositions of blend electrolytes became more similar to the SEI composition of the LiDFOB-based electrolyte with increasing LiBF4 content. • LiBOB/LiBF4 blend electrolytes show a superior lithium cycling performance compared to single salts nearly reaching the performance of LiDFOB based electrolytes. -- Abstract: This work was inspired by the observation that some borates exchange their ligands that are attached to boron. Therefore, we investigated the effect of blends of two salts, lithium bis(oxalato)borate (LiBOB), lithium tetrafluoroborate (LiBF4) on lithium cycling on copper with solutions based on ethylene carbonate (EC) and diethyl carbonate (DEC) (3:7, by wt.). Coulombic efficiencies of dissolution rate (D-rate) tests demonstrated an enhanced performance of LiBOB/LiBF4 blend electrolytes compared to the LiBOB-based and LiBF4-based electrolytes, increasing with increasing LiBF4 content. The coulombic efficiencies of the LiBOB/LiBF4 blend electrolyte with highest LiBF4 content reached almost the coulombic efficiencies of the lithium difluoro(oxalato)borate (LiDFOB) based electrolyte at high current densities in D-rate tests. Voltage drop values, conductivity measurements, and AC impedance measurements show the good performance of the LiBOB/LiBF4 blend electrolytes. The composition of the solid electrolyte interphase (SEI) of the LiBOB/LiBF4 blend electrolytes studied by X-ray photoelectron spectroscopy (XPS) becomes more similar to the composition of the SEI of the LiDFOB-based electrolyte with increasing LiBF4 content. Nuclear

  20. Asymmetric Bidirectional Controlled Teleportation by using a Seven-qubit Entangled State

    Science.gov (United States)

    Hong, Wen-qin

    2016-01-01

    We propose a new protocol of asymmetric bidirectional controlled teleportation by using a seven-qubit entangled state as the quantum channel. That is to say Alice wants to transmit an arbitrary single-qubit state to Bob and Bob wants to transmit an arbitrary two-qubit state to Alice via the control of the supervisor Charlie. One only need perform the Bell-state measurements and single-qubit measurement.

  1. Asymmetric Bidirectional Controlled Teleportation via Seven-qubit Cluster State

    Science.gov (United States)

    Yang, Yu-Quan; Zha, Xin-Wei; Yu, Yan

    2016-05-01

    We propose a new protocol of asymmetric bidirectional controlled teleportation by using a seven-qubit cluster state as the quantum channel. That is to say Alice wants to transmit an arbitrary single-qubit state to Bob and Bob wants to transmit an arbitrary two qubit state to Alice via the control of the supervisor Charlie. One only need perform the Bell-state measurements and single-qubit measurement.

  2. Notes on teleportation in an expanding space

    CERN Document Server

    Feng, Jun; Zhang, Yao-Zhong; Fan, Heng

    2012-01-01

    We investigate the quantum teleportation between a conformal detector Alice and an inertial detector Bob in de Sitter space. We show that the fidelity of the teleportation is degraded for Bob due to the Gibbons-Hawking effect associated with his cosmological event horizon. With a cutoff at Planck-scale, comparing with the standard Bunch-Davies choice, we also show that the possible Planckian physics cause extra modifications to the fidelity of the teleportation process.

  3. Towards the Impossibility of Non-Signalling Privacy Amplification from Time-Like Ordering Constraints

    OpenAIRE

    Arnon-Friedman, Rotem; Hänggi, Esther; Ta-Shma, Amnon

    2012-01-01

    In the past few years there was a growing interest in proving the security of cryptographic protocols, such as key distribution protocols, from the sole assumption that the systems of Alice and Bob cannot signal to each other. This can be achieved by making sure that Alice and Bob perform their measurements in a space-like separated way (and therefore signalling is impossible according to the non-signalling postulate of relativity theory) or even by shielding their apparatus. Unfortunately, i...

  4. Controlled Teleportation of an Unknown N-qubit Entangled GHZ State

    Institute of Scientific and Technical Information of China (English)

    JIANG Wei-Xing; FANG Jian-Xing; ZHU Shi-Qun; SHA Jin-Qiao

    2007-01-01

    A scheme for controlled teleportation of an unknown N-qubit entangled GHZ state from the sender Alice to the distant receiver Bob is proposed. And m-qubit GHZ state is sufficient for the task of control by m spatiallyseparated supervisors. Conditioned on the local operations executed by all participants, Bob can faithfully restore the original state by performing relevant unitary transformations with the aid of some classical message about measurement results. Anyone's absence will absolutely lead to the failure of teleportation.

  5. Covert Communication Gains from Adversary's Ignorance of Transmission Time

    OpenAIRE

    Bash, Boulat A.; Goeckel, Dennis; Towsley, Don

    2014-01-01

    The recent square root law (SRL) for covert communication demonstrates that Alice can reliably transmit $\\mathcal{O}(\\sqrt{n})$ bits to Bob in $n$ uses of an additive white Gaussian noise (AWGN) channel while keeping ineffective any detector employed by the adversary; conversely, exceeding this limit either results in detection by the adversary with high probability or non-zero decoding error probability at Bob. This SRL is under the assumption that the adversary knows when Alice transmits (i...

  6. Blind topological measurement-based quantum computation

    OpenAIRE

    Morimae, Tomoyuki; Fujii, Keisuke

    2011-01-01

    Blind quantum computation is a novel secure quantum-computing protocol that enables Alice, who does not have sufficient quantum technology at her disposal, to delegate her quantum computation to Bob, who has a fully fledged quantum computer, in such a way that Bob cannot learn anything about Alice's input, output and algorithm. A recent proof-of-principle experiment demonstrating blind quantum computation in an optical system has raised new challenges regarding the scalability of blind quantu...

  7. Upconversion based receivers for quantum hacking resistant quantum key distribution

    OpenAIRE

    Jain, Nitin; Kanter, Gregory S.

    2015-01-01

    We propose a novel upconversion (sum frequency generation) based quantum-optical setup that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermor...

  8. No-Concentrating Theorem of Pure Entangled States

    OpenAIRE

    Zhang, Chuan-Wei; Li, Chuan-Feng; Guo, Guang-Can

    1999-01-01

    Suppose two distant observers Alice and Bob share a pure biparticle entangled state secretly chosen from a set, it is shown that Alice (Bob) can probabilistic concentrate the state to a maximally entangled state by applying local operations and classical communication (LQCC) if and only if the states in the set share the same marginal density operator for her (his) subsystem. Applying this result, we present probabilistic superdense coding and show that perfect purification of mixed state is ...

  9. Exact Cost of Redistributing Multipartite Quantum States

    OpenAIRE

    Devetak, Igor; Yard, Jon

    2008-01-01

    How correlated are two quantum systems from the perspective of a third? We answer this by providing an optimal “quantum state redistribution” protocol for multipartite product sources. Specifically, given an arbitrary quantum state of three systems, where Alice holds two and Bob holds one, we identify the cost, in terms of quantum communication and entanglement, for Alice to give one of her parts to Bob. The communication cost gives the first known operational interpretation to quantum condit...

  10. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  11. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x or...

  12. Testing honesty of quantum server

    OpenAIRE

    Morimae, Tomoyuki

    2013-01-01

    Alice, who does not have any sophisticated quantum technology, delegates her quantum computing to Bob, who has a fully-fledged quantum computer. Can she check whether the computation Bob performs for her is correct? She cannot recalculate the result by herself, since she does not have any quantum computer. A recent experiment with photonic qubits suggests she can. Here, I explain the basic idea of the result, and recent developments about secure cloud quantum computing.

  13. Unexpected increasing AOT trends over northwest Bay of Bengal in the early postmonsoon season

    Energy Technology Data Exchange (ETDEWEB)

    Kishcha, P.; Starobinets, B.; Long, Charles N.; Alpert, P.

    2012-12-13

    The main point of our study is that aerosol trends can be created by changes in meteorology without changes in aerosol source strength. Over the 10 year period 2000–2009, in October, Moderate Resolution Imaging Spectroradiometer (MODIS) showed strong increasing aerosol optical thickness (AOT) trends of approximately 14% yr-1 over northwest Bay of Bengal (BoB) in the absence of AOT trends over the east of the Indian subcontinent. This was unexpected because sources of anthropogenic pollution were located over the Indian subcontinent and aerosol transport from the Indian subcontinent to northwest BoB was carried out by prevailing winds. In October, winds over the east of the Indian subcontinent were stronger than winds over northwest BoB, which resulted in wind convergence and accumulation of aerosol particles over northwest BoB. Moreover, there was an increasing trend in wind convergence over northwest BoB. This led to increasing trends in the accumulation of aerosol particles over northwest BoB and, consequently, to strong AOT trends over this area. In contrast to October, November showed no increasing AOT trends over northwest BoB or the nearby Indian subcontinent. The lack of AOT trends over northwest BoB corresponds to a lack of trends in wind convergence in that region. Finally, December domestic heating by the growing population resulted in positive AOT trends of similar magnitude over land and sea. Our findings illustrate that in order to explain and predict trends in regional aerosol loading, meteorological trends should be taken into consideration together with changes in aerosol source strength.

  14. Quantum bit commitment with cheat sensitive binding and approximate sealing

    OpenAIRE

    Li, Yan-Bing; Xu, Sheng-Wei; Huang, Wei; Wan, Zhong-Jie

    2014-01-01

    This paper proposes a cheat sensitive quantum bit commitment (CSQBC) scheme based on single photons, in which Alice commits a bit to Bob. Here, Bob only can cheat the committed bit with probability close to $0$ with the increasing of used single photons' amount. And if Alice altered her committed bit after commitment phase, she will be detected with probability close to $1$ with the increasing of used single photons' amount. The scheme is easy to be realized with nowadays technology.

  15. Bioassay-guided in vitro study of the antileishmanial and cytotoxic properties of Bixa orellana seed extract

    Directory of Open Access Journals (Sweden)

    Marley García

    2014-06-01

    Full Text Available Objective: To investigate the leishmanicidal effect of the Bixa orellana crude seed extract and its fractions against Leishmania amazonensis. Methods: Four main fractions (BO-A, BO-B, BO-C and BO-D were obtained by exhaustion with solvent with increased polarity from the Bixa orellana crude seed extract and 28 sub-fractions. The antileishmanial activity was evaluated in intracellular amastigotes and the cytotoxicity was assessed in murine intraperitoneal macrophages. Results: The BO-A and BO-B fractions showed a good antileishmanial activity with IC50 values of (12.9±4.1 and (12.4±0.3 μg/mL, respectively. The sub-fractions BO-B1 (IC50=(11.8±3.8 μg/mL and BO-B3 [IC50=(13.6±4.7 μg/mL] also proved to have a good leishmanicidal effect. In general, the sub-fractions showed a lower toxicity than the crude extract. A selectivity index of 9 indicated a moderate selectivity of the BO-A, BO-B and BO-C fractions and BO-B1 sub-fraction. Conclusions: Potential of this plant against cutaneous leishmaniasis should be further investigated.

  16. Blind Quantum Computation

    DEFF Research Database (Denmark)

    Salvail, Louis; Arrighi, Pablo

    2006-01-01

    We investigate the possibility of "having someone carry out the work of executing a function for you, but without letting him learn anything about your input". Say Alice wants Bob to compute some known function f upon her input x, but wants to prevent Bob from learning anything about x. The situa......We investigate the possibility of "having someone carry out the work of executing a function for you, but without letting him learn anything about your input". Say Alice wants Bob to compute some known function f upon her input x, but wants to prevent Bob from learning anything about x....... The situation arises for instance if client Alice has limited computational resources in comparison with mistrusted server Bob, or if x is an inherently mobile piece of data. Could there be a protocol whereby Bob is forced to compute f(x) "blindly", i.e. without observing x? We provide such a blind computation...... protocol for the class of functions which admit an efficient procedure to generate random input-output pairs, e.g. factorization. The cheat-sensitive security achieved relies only upon quantum theory being true. The security analysis carried out assumes the eavesdropper performs individual attacks....

  17. Variability of sensible heat flux over the Bay of Bengal and its connection to Indian Ocean Dipole events

    Science.gov (United States)

    Cyriac, Ajitha; Ghoshal, Tarumay; Shaileshbhai, Patel Ramkrushnbhai; Chakraborty, Arun

    2016-03-01

    The Bay of Bengal (BOB) is known to possess complex thermodynamics which show distinct seasonal patterns. Surface heat fluxes in the BOB are very much dependant on upper ocean heat exchanges and wind. Sensible heat flux (SHF) is also one among those fluxes that depends on air-sea temperature difference and wind. However, this study further proves that a strong relationship exists between barrier layer thickness (BLT) and SHF variability that has not been focussed on in earlier literatures. This study also investigates the seasonal as well as inter-annual variability of SHF and its relationship with BLT and sea surface temperature (SST) patterns in more detail with statistical analyses. It is found that both SST and BLT are responsible for the evolution of SHF signal in the BOB although their effects are spatially distributed. During the post monsoon period, freshwater induced enhanced BLT is more related to SHF than the summer time when effect of SST is found to be dominant. During Indian Ocean Dipole (IOD) years, the correlation between SHF and BLT in the eastern BOB is more pronounced compared to SHF and SST. The western BOB however is dominated by SST variations for the respective IOD phase which also contribute to SHF signals there. Northernmost BOB shows high standard deviation due to river discharge effects.

  18. Gaussian quantum steering and its asymmetry in curved spacetime

    Science.gov (United States)

    Wang, Jieci; Cao, Haixin; Jing, Jiliang; Fan, Heng

    2016-06-01

    We study Gaussian quantum steering and its asymmetry in the background of a Schwarzschild black hole. We present a Gaussian channel description of quantum state evolution under the influence of Hawking radiation. We find that thermal noise introduced by the Hawking effect will destroy the steerability between an inertial observer Alice and an accelerated observer Bob who hovers outside the event horizon, while it generates steerability between Bob and a hypothetical observer anti-Bob inside the event horizon. Unlike entanglement behaviors in curved spacetime, here the steering from Alice to Bob suffers from a "sudden death" and the steering from anti-Bob to Bob experiences a "sudden birth" with increasing Hawking temperature. We also find that the Gaussian steering is always asymmetric and the maximum steering asymmetry cannot exceed ln 2 , which means the state never evolves to an extremal asymmetry state. Furthermore, we obtain the parameter settings that maximize steering asymmetry and find that (i) s =arccosh cosh/2r 1 -sinh2r is the critical point of steering asymmetry and (ii) the attainment of maximal steering asymmetry indicates the transition between one-way steerability and both-way steerability for the two-mode Gaussian state under the influence of Hawking radiation.

  19. Bioassay-guided in vitro study of the antileishmanial and cytotoxic properties of Bixa orellana seed extract

    Institute of Scientific and Technical Information of China (English)

    Marley Garca; Ramn Scull; Osmany Cuesta; Galle Boulet; Louis Maes; Paul Cos; Lianet Monzote

    2014-01-01

    Objective:To investigate the leishmanicidal effect of the Bixa orellana crude seed extract and its fractions against Leishmania amazonensis. Methods:Four main fractions (BO-A, BO-B, BO-C and BO-D) were obtained by exhaustion with solvent with increased polarity from the Bixa orellana crude seed extract and 28 sub-fractions. The antileishmanial activity was evaluated in intracellular amastigotes and the cytotoxicity was assessed in murine intraperitoneal macrophages. Results:The BO-A and BO-B fractions showed a good antileishmanial activity with IC50 values of (12.9±4.1) and (12.4±0.3) μg/mL, respectively. The sub-fractions BO-B1 (IC50=(11.8±3.8) μg/mL) and BO-B3 [IC50=(13.6±4.7) μg/mL] also proved to have a good leishmanicidal effect. In general, the sub-fractions showed a lower toxicity than the crude extract. A selectivity index of 9 indicated a moderate selectivity of the BO-A, BO-B and BO-C fractions and BO-B1 sub-fraction. Conclusions: Potential of this plant against cutaneous leishmaniasis should be further investigated.

  20. Air Pollution over North-West Bay of Bengal in the Early Post-Monsoon Season Based on NASA MERRAero Data

    Science.gov (United States)

    Kishcha, Pavel; DaSilva, Arlindo M.; Starobinets, Boris; Alpert, Pinhas

    2013-01-01

    The MERRA Aerosol Reanalysis (MERRAero) has been recently developed at NASA's Global Modeling Assimilation Office (GMAO). This reanalysis is based on a version of the GEOS-5 model radiatively coupled with GOCART aerosols, and it includes assimilation of bias-corrected Aerosol Optical Thickness (AOT) from the MODIS sensor on both Terra and Aqua satellites. Our main finding is that, in October, in the absence of aerosol sources in north-west Bay of Bengal (BoB), MERRAero showed increasing AOT trends over north-west BoB exceeding those over the east of the Ganges basin. The Ganges basin is characterized by significant population growth accompanied by developing industry, agriculture, and increasing transportation: this has resulted in declining air quality. MERRAero data for the period 2002-2009 was used to study AOT trends over north-west Bay of Bengal (BoB) in the early post-monsoon season. This season is characterized by aerosol transport from the Ganges basin to north-west BoB by prevailing winds; and still significant rainfall of over 150 mmmonth. Different aerosol components showed strong increasing AOT trends over north-west BoB. The following factors contributed to the increasing AOT trend over the area in question in October: an increasing number of days when prevailing winds blew from land to sea, resulting in a drier environment and an increase in air pollution over north-west BoB; wind convergence was observed over north-west BoB causing the accumulation of aerosol particles over that region, when prevailing winds blew from land to sea. MERRAero aerosol reanalysis can be used on a global scale.

  1. Effect of the early and late onset of summer monsoon over the Bay of Bengal on Asian precipitation in May

    Science.gov (United States)

    Xing, Nan; Li, Jianping; Wang, Lanning

    2015-12-01

    The impact of early and late Bay of Bengal (BoB) summer monsoon (BoBSM) onset on Asian precipitation in May is investigated. When the BoBSM occurs earlier (later), May rainfall tends to be enhanced (suppressed) in the southern Indian peninsula (SIP), the Indochinese peninsula (ICP), southwest China (SWC) and the South China Sea (SCS), while south China (SC) rainfall tends to be suppressed (enhanced). When the BoBSM occurs earlier than the climatological mean (late April), strong convective activity emerges earlier over the BoB, which causes local strong convective heating earlier. Then, earlier spread of heating in the BoB towards both sides leads to earlier retreat of the subtropical highs in the western Pacific (WPSH) and Indian Ocean outwards the BoB. Thus, compared to the climatological mean, the two subtropical highs present larger retreat outwards the BoB and smaller meridional extent over the SCS and Arabian Sea in May, which contributes to positive heating anomalies over the SCS and Arabian Sea. Therefore, anomalous cyclonic circulations occur over the BoB, SCS and Arabian Sea in May. Anomalous cyclonic circulation is favorable for low-level convergence over the SIP, and thus resulting in local heavy rainfall. Associated with cyclonic circulation anomalies over the BoB and SCS, anomalous low-level convergent winds and ascending flows favor positive precipitation anomalies in the ICP, SWC, and SCS, while anomalous northeasterlies and descending flows affected by the southward retreat of the WPSH lessen SC rainfall. In late onset years the opposite occurs.

  2. δ18O and salinity variability from the Last Glacial Maximum to Recent in the Bay of Bengal and Andaman Sea

    Science.gov (United States)

    Sijinkumar, A. V.; Clemens, Steven; Nath, B. Nagender; Prell, Warren; Benshila, Rachid; Lengaigne, Matthieu

    2016-03-01

    Oxygen isotopes of surface, thermocline and bottom dwelling foraminifera were analysed from two well-dated Andaman Sea cores and combined with nine previously published records from the Bay of Bengal (BoB) and Andaman Sea to create a transect spanning 20°N to 5°N. Combined with temperature estimates and the observed seawater δ18O-salinity relationship, these data are used to estimate past changes in BoB salinity structure. Compared to modern, mid-Holocene (9-6 cal ka BP) surface waters in the northern BoB were 2.5 psμ (8%) fresher, Andaman Sea were 3.8 psμ (12%) fresher, and southern BoB were 1.2 psμ (3.5%) fresher. Conversely, during the last glacial maximum (LGM), surface waters in the northern BoB were 2.9 psμ (9%) more saline while Andaman Sea were essentially unchanged and southern BoB were 1.7 psμ (4.9%) more saline compared to modern. The relative freshness of the Andaman during the last glacial maximum is likely the result of basin morphology during sea level low stand, resulting in reduced surface water mixing with the open BoB as well as shelf emergence, causing increased proximity of the core locations to river outflow. Sensitivity experiments using a regional ocean model indicate that the increased mid-Holocene north to south (20°N to 5°N) salinity gradient can be achieved with a ∼50% increase in precipitation/runoff while the decreased glacial age gradient can be achieved with a ∼50% reduction in precipitation/runoff. During the deglaciation, both surface and thermocline-dwelling species in the Andaman and northern BoB exhibit depleted δ18O within the Younger Dryas (YD), indicating colder and/or more saline conditions. None of the records from the southern BoB site have clear YD structure, possibly due to the combined effects of bioturbation and low sedimentation rates.

  3. Influence of Summer Monsoon on Asymmetric Bimodal Pattern of Tropical Cyclogenesis Frequency over the Bay of Bengal

    Institute of Scientific and Technical Information of China (English)

    XING Wen; HUANG Fei

    2013-01-01

    influence of summer monsoon on tropical cyclone (TC) genesis over the Bay of Bengal (BoB) is explored using an empirical genesis potential (GP) index.The annual cycle of cyclogenesis frequency over the BoB shows an asymmetric bimodal pattern with the maximum genesis number appearing in late October and the second largest in early May.The two peaks correspond to the withdrawal and onset of the BoB summer monsoon,respectively.The semimonthly GP index calculated without TC days over the BoB is consistent with TC genesis frequency,indicating that the index captures the monsoon-induced changes in the environment that are responsible for the seasonal variation of TC genesis frequency.Of the four environmental variables (i.e.,low-level vorticity,mid-level relative humidity,potential intensity,and vertical wind shear) that enter into the GP index,the potential intensity makes the largest contribution to the bimodal distribution,followed by vertical wind shear due to small wind speed during the summer monsoon onset and withdrawal.The difference in TC genesis frequency between autumn and late spring is mainly owing to the relative humidity difference because a divergence (convergence) of horizontal moisture flux associated with cold dry northerlies (warm wet westerlies) dominates the BoB in late spring (autumn).

  4. Blood-ocular barrier damage: use of contrast-enhanced MRI

    International Nuclear Information System (INIS)

    The blood-ocular barrier (BOB) shares similar neuroepithelial origin, microanatomy and functions with the blood-brain barrier. There are many natural (e. g. diabetes, hypertension) or iatrogenic (chemotherapy, retinal photocoagulation) conditions which can cause a BOB breakdown, resulting in visual acuity impairment or loss. The authors examined 42 patients affected by BOB damage in different pathological conditions. All patients previously underwent a conventional fluoroangiographic (FA) study. Nine patients with normal FA exam were evaluated also. Despite normal MRI findings immediately after Gd-DTPA injection, contrast leakage into the vitreous body or into the aqueous fluid was demonstrated in delayed scans (40-50 min after contrast administration), proving the existence of a BOB damage (sensitively 94 %). Although FA exam remains the choice modality in BOB breakdown demonstration, we propose MRI as a useful diagnostic tool when optic media opacity (cataract, haemovitreous, intraocular silicon oil) occurs, preventing direct retinal fundus imaging and/or an early screening tool. (orig.). With 6 figs., 1 tab

  5. Quantum coherence of steered states.

    Science.gov (United States)

    Hu, Xueyuan; Milne, Antony; Zhang, Boyang; Fan, Heng

    2016-01-01

    Lying at the heart of quantum mechanics, coherence has recently been studied as a key resource in quantum information theory. Quantum steering, a fundamental notion originally considered by Schödinger, has also recently received much attention. When Alice and Bob share a correlated quantum system, Alice can perform a local measurement to 'steer' Bob's reduced state. We introduce the maximal steered coherence as a measure describing the extent to which steering can remotely create coherence; more precisely, we find the maximal coherence of Bob's steered state in the eigenbasis of his original reduced state, where maximization is performed over all positive-operator valued measurements for Alice. We prove that maximal steered coherence vanishes for quantum-classical states whilst reaching a maximum for pure entangled states with full Schmidt rank. Although invariant under local unitary operations, maximal steered coherence may be increased when Bob performs a channel. For a two-qubit state we find that Bob's channel can increase maximal steered coherence if and only if it is neither unital nor semi-classical, which coincides with the condition for increasing discord. Our results show that the power of steering for coherence generation, though related to discord, is distinct from existing measures of quantum correlation. PMID:26781214

  6. Quantum measurement information as a key to energy extraction from local vacuums

    International Nuclear Information System (INIS)

    In this paper, a protocol is proposed in which energy extraction from local vacuum states is possible by using quantum measurement information for the vacuum state of quantum fields. In the protocol, Alice, who stays at a spatial point, excites the ground state of the fields by a local measurement. Consequently, wave packets generated by Alice's measurement propagate the vacuum to spatial infinity. Let us assume that Bob stays away from Alice and fails to catch the excitation energy when the wave packets pass in front of him. Next Alice announces her local measurement result to Bob by classical communication. Bob performs a local unitary operation depending on the measurement result. In this process, positive energy is released from the fields to Bob's apparatus of the unitary operation. In the field systems, wave packets are generated with negative energy around Bob's location. Soon afterwards, the negative-energy wave packets begin to chase after the positive-energy wave packets generated by Alice and form loosely bound states.

  7. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    -but-curious SFE protocol whose communication complexity only scales with that of the best insecure protocol for evaluating the desired function, independent of the output size. Our construction relies on a novel way of using iO via a new tool that we call a 'somewhere statistically binding (SSB) hash', and which......We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large...... encrypted database and we want Bob to learn the decrypted data without learning anything else about Alice's key. In a trivial insecure protocol, Alice can just send her short input χA to Bob. However, all known SFE protocols have communication complexity that scales with size of the output y, which can...

  8. Secure Multiterminal Source Coding with Side Information at the Eavesdropper

    CERN Document Server

    Villard, Joffrey

    2011-01-01

    The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate --average uncertainty-- at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. I...

  9. Multi-agent controlled teleportation of multi-qubit quantum information via two-step protocol

    Institute of Scientific and Technical Information of China (English)

    Yang Jie

    2005-01-01

    Utilizing both the general quantum teleportation and the two-step protocol, a new method is presented by which multi-qubit quantum information can be teleported in a much easier way from a sender Alice to a receiver Bob via the control of many agents in a network than by Yang et al's method. In this method, only all the agents collaborate with Bob can the unknown states in Alice's qubits be fully reconstructed in Bob's qubits. Comparisons between the method and Yang et al's method are made. Results show that, in this method, the preparation difficulty of initial states and the identification difficulty of entangled states are considerably reduced, new method is more feasible in technique, and Hadamard operations are not needed at all.

  10. Controlled and secure direct communication using GHZ state and teleportation

    International Nuclear Information System (INIS)

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  11. Probabilistic Teleportation of an Unknown One-Particle State by a Three-Particle General W State

    Institute of Scientific and Technical Information of China (English)

    XIU Xiao-Ming; DONG Li; GAO Ya-Jun

    2007-01-01

    Two schemes for teleporting an unknown one-particle state are proposed when a general W state is utilized as quantum channel.In the first scheme,after the sender (Alice) makes a Bell-state measurement on her particles,the recipient (Bob) performs a Von Neumann measurement and introduces an auxiliary particle,and carries out a unitary transformation on his particle and the auxiliary particle,and performs a Von Neumann measurement on the auxiliary particle to confirm whether the teleportation succeeds or not.In the second scheme,the recipient (Bob) does not need to perform the first Von Neumann measurement or introduce the auxiliary particle,which is necessary in the first scheme.It is shown that the maximal probabilities of successful teleportation of the two schemes are identical if the recipient (Bob) performs an appropriate unitary transformation and adopts a proper particle on which he recovers the quantum information of state to be teleported.

  12. Automatic Program Development

    DEFF Research Database (Denmark)

    Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his...... honor in the Higher-Order and Symbolic Computation Journal in the years 2003 and 2005. Among them there are two papers by Bob: (i) a retrospective view of his research lines, and (ii) a proposal for future studies in the area of the automatic program derivation. The book also includes some papers by...... members of the IFIP Working Group 2.1 of which Bob was an active member. All papers are related to some of the research interests of Bob and, in particular, to the transformational development of programs and their algorithmic derivation from formal specifications. Automatic Program Development offers a...

  13. Environmental influences on Quantum Monty Hall problem

    CERN Document Server

    Khan, Salman; Khan, M K

    2010-01-01

    We reformulate the quantum Monty Hall problem in the presence of decoherence. The decoherence destroys the fairness of the game. A new Nash equilibrium for a particular strategy profile in the presence of decoherence emerges. It is shown that in the presence of decoherence under the action of amplitude damping channel, Bob's winning probability is always higher than three-forth, irrespective of Alice's strategy, if he does not switch to the other door and always wins for a fully decohered case of the channel. Depolarizing channel damps up Bob's winning probability and gets better off if he sticks to his current selection. Phase damping channel leaves the winning probability unaffected. Unlike the classical and the quantum forms of the game, Bob's dominant strategy in the presence of decoherence is not switching.

  14. Optimal continuous variable quantum teleportation protocol for realistic settings

    Science.gov (United States)

    Luiz, F. S.; Rigolin, Gustavo

    2015-03-01

    We show the optimal setup that allows Alice to teleport coherent states | α > to Bob giving the greatest fidelity (efficiency) when one takes into account two realistic assumptions. The first one is the fact that in any actual implementation of the continuous variable teleportation protocol (CVTP) Alice and Bob necessarily share non-maximally entangled states (two-mode finitely squeezed states). The second one assumes that Alice's pool of possible coherent states to be teleported to Bob does not cover the whole complex plane (| α | teleported state. These slight changes in the protocol are currently easy to be implemented and, as we show, give considerable gain in performance for a variety of possible pool of input states with Alice.

  15. Interactive simulations for quantum key distribution

    CERN Document Server

    Kohnle, Antje

    2016-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualization Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different quantum key distribution protocols. The simulations use either...

  16. One Is a Claim, Two Is a Defense: Bringing an End to the Equal Opportunity Harasser Defense

    Directory of Open Access Journals (Sweden)

    Mark J. McCullough

    2005-04-01

    Full Text Available Consider the following three workplace scenarios. Alice, a female employee at ABC corporation, has been subjected to almost continuous harassment by her immediate supervisor, Bob, for the past two months. Several times each week, Bob makes crude and sexually suggestive comments and, on numerous occasions, Bob has touched Alice inappropriately in the workplace. Assuming Alice attempts to remedy this situation in a reasonable time period and her employer has unreasonably failed “to prevent and correct promptly any sexually harassing behavior,” Alice will most likely be able to bring a hostile workplace sex discrimination claim against her employer for Bob’s sexual harassment under Title VII of the Civil Rights Act of 1964.3

  17. Securing Communication via Transmission of Artificial Noise by Both Sides: Bipolar-Beamforming Optimization

    Directory of Open Access Journals (Sweden)

    Yongkai Zhou

    2013-01-01

    Full Text Available The paper considers the secure transmission in a wireless environment in which both the transmitter (Alice and the legitimate receiver (Bob send artificial noise (AN to interfere with the eavesdropper (Eve. Optimal design is analyzed in detail for this AN-by-both-side model to deal with Eve’s stochastic channel condition and random spatial distribution. Bipolar-beamforming is first proposed to jointly design Alice and Bob’s transmitting signals. By optimally assigning the transmitting antenna for Bob and allocating the power ratio between Alice’s information and the AN signal, maximum secrecy capacity can be achieved. Simulation is done to illustrate the process of bipolar-beamforming optimization. Results show that the AN-by-both-side model has good secrecy performance on both average and extreme conditions as Eve approaches Alice or Bob.

  18. Center of mass correction to an error-prone undergraduate centripetal force experiment

    Science.gov (United States)

    Ronhovde, Peter; Sirochman, Rudy

    2003-02-01

    In this undergraduate laboratory experiment we measure the centripetal force acting on a bob in uniform circular motion. As the experiment was originally designed, it consistently yielded large errors due to a subtle twist of the bob as the mass was increased incrementally. This error is due to the fact that the center of mass changes relative position as the mass is incremented; therefore, the spring that provides the centripetal force for the apparatus causes an unintended torque on the bob. A solution to the problem consists of positioning the incremental masses so that the center of mass does not change position. This simple correction provides a useful lesson on redesigning an undergraduate laboratory experiment to obtain better agreement with theory.

  19. Improving the security of secure direct communication based on secret transmitting order of particles

    CERN Document Server

    Li, X H; Zhou, H Y; Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2006-01-01

    We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  20. Transfer of spatial reference frame using singlet states and classical communication

    Science.gov (United States)

    Bahder, Thomas B.

    2016-03-01

    A simple protocol is described for transferring spatial orientation from Alice to Bob (two spatially separated observers). The two observers are assumed to share quantum singlet states and classical communication. The protocol assumes that Alice and Bob have complete free will (measurement independence) and is based on maximizing the Shannon mutual information between Alice and Bob's measurement outcomes. Repeated use of this protocol for each spatial axis of Alice allows transfer of a complete three-dimensional reference frame, up to inversion of each of the axes. The technological complexity of this protocol is similar to that needed for BB84 quantum key distribution and hence is much simpler to implement than recently proposed schemes for transmission of reference frames. A second protocol based on a Bayesian formalism is also discussed.

  1. 修订版《新标准英语》(一起)一(下)Module 6 Unit 1 These snakes are short

    Institute of Scientific and Technical Information of China (English)

    陈羽

    2015-01-01

    教学过程一、Warm-up(热身环节)(略)二、Lead-in(导入环节)1.Show some pictures of dog.Ask Ss what animal is it?借助道具逐个呈现Bob的拼图,引导学生发现并复习学过的chant"Bob,Bob,Bob,it’s an orange dog."同时自然过渡到文本。T:I’ll show you another dog.What color is it?Ss:It’s a yellow dog.T:What else can you see in the picture?Ss:I can see a white cat.T:A dog and a cat,so what’s the matter?

  2. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  3. Remotely and Conclusively Mapping One Finite Set of Qudit States onto Another Assisted by Qubit Entanglements

    Science.gov (United States)

    Chen, Li-Bing; Lu, Hong

    2016-05-01

    Alice and Bob are two remote parties. We propose a probabilistic method which allows Alice to map remotely and conclusively Bob's set of nonorthogonal symmetric d-level quantum states onto another. The procedure we use is a remote positive operator valued measurement (POVM) in Bob's (2 d-1)-level direct sum space. We construct a quantum network for implementing this (2 d-1)-level remote nonunitary POVM with ( d-1) two-level remote unitary rotations. The fact that the two-level remote rotation, which is hired to rotate remotely a basis vector, can been implementing rapidly using only one ebit (a two-level Einstein-Podolsky-Rosen (EPR) pair) and one cbit (classical communication) is notable. This scheme is simpler but with less resource, which will make it more feasible and suitable for large-scale quantum network.

  4. Compressing Mixed-State Sources by Sending Classical Information

    CERN Document Server

    Soljanin, E

    2001-01-01

    We consider visible compression for discrete memoryless sources of mixed quantum states when only classical information can be sent from Alice to Bob. We assume that Bob knows the source statistics, and that Alice and Bob have identical random number generators. We put in an information theoretic framework some recent results on visible compression for sources of states with commuting density operators, and remove the commutativity requirement. We derive a general achievable compression rate, which is for the noncommutative case still higher than the known lower bound. We also present several related problems of classical information theory, and show how they can be used to answer some questions of the mixed state compression problem.

  5. The Onset of the Monsoon over the Bay of Bengal: The Observed Common Features for 2008-2011

    Institute of Scientific and Technical Information of China (English)

    YU Wei-Dong; SHI Jian-Wei; LIU Lin; LI Kui-Ping; LIU Yan-Liang; WANG Hui-Wu

    2012-01-01

    In situ buoy observation data spanning four years (2008-2011) were collected and used to perform a composite analysis of the monsoon onset process in the Bay of Bengal (BOB). The sea surface temperature (SST) in the central BoB increases dramatically during the monsoon transition period and reaches its annual maximum just before the onset of the monsoon. This process is illustrated by the northward-propagating deep convection phase of the intraseasonal oscillation and the establish- ment of a steady southwest wind. It is argued that the SST peak plays a potential role in triggering the onset of the monsoon in the BoB and its vicinity. The general picture of the BoB monsoon onset summarized here reveals the possibility of regional land-ocean-atmosphere interaction. This possibility deserves further examination.

  6. Hiding Quantum Information in the Perfect Code

    CERN Document Server

    Shaw, Bilal A

    2010-01-01

    We present and analyze a protocol for quantum steganography where the sender (Alice) encodes her steganographic information into the error syndromes of the perfect (five-qubit) quantum error-correcting code, and sends it to the receiver (Bob) over a depolarizing channel. Alice and Bob share a classical secret key, and hide quantum information in such a way that to an eavesdropper (Eve) without access to the secret key, the quantum message looks like an innocent codeword with a typical sequence of quantum errors. We calculate the average rate of key consumption, and show how the protocol improves in performance as information is spread over multiple codeword blocks. Alice and Bob utilize different encodings to optimize the average number of steganographic bits that they can send to each other while matching the error statistics of the depolarizing channel.

  7. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    Science.gov (United States)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  8. QKD Quantum Channel Authentication

    CERN Document Server

    Kosloski, J T

    2006-01-01

    Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

  9. Information causality as a physical principle.

    Science.gov (United States)

    Pawłowski, Marcin; Paterek, Tomasz; Kaszlikowski, Dagomir; Scarani, Valerio; Winter, Andreas; Zukowski, Marek

    2009-10-22

    Quantum physics has remarkable distinguishing characteristics. For example, it gives only probabilistic predictions (non-determinism) and does not allow copying of unknown states (no-cloning). Quantum correlations may be stronger than any classical ones, but information cannot be transmitted faster than light (no-signalling). However, these features do not uniquely define quantum physics. A broad class of theories exist that share such traits and allow even stronger (than quantum) correlations. Here we introduce the principle of 'information causality' and show that it is respected by classical and quantum physics but violated by all no-signalling theories with stronger than (the strongest) quantum correlations. The principle relates to the amount of information that an observer (Bob) can gain about a data set belonging to another observer (Alice), the contents of which are completely unknown to him. Using all his local resources (which may be correlated with her resources) and allowing classical communication from her, the amount of information that Bob can recover is bounded by the information volume (m) of the communication. Namely, if Alice communicates m bits to Bob, the total information obtainable by Bob cannot be greater than m. For m = 0, information causality reduces to the standard no-signalling principle. However, no-signalling theories with maximally strong correlations would allow Bob access to all the data in any m-bit subset of the whole data set held by Alice. If only one bit is sent by Alice (m = 1), this is tantamount to Bob's being able to access the value of any single bit of Alice's data (but not all of them). Information causality may therefore help to distinguish physical theories from non-physical ones. We suggest that information causality-a generalization of the no-signalling condition-might be one of the foundational properties of nature. PMID:19847260

  10. Interannual variation of tropical cyclone energy metrics over North Indian Ocean

    Science.gov (United States)

    Mohapatra, M.; Vijay Kumar, V.

    2016-05-01

    There is decreasing trend in the tropical cyclone (TC) number over the North Indian Ocean (NIO) in recent years, though there is increasing trend in the sea surface temperature (SST) which is one of the main environmental parameters for the development and intensification of TCs. Hence, a study has been performed to understand whether any trend exists in other TC parameters such as velocity flux (VF), accumulated cyclone energy (ACE) and power dissipation index (PDI). The interseasonal and interannual variations of VF, ACE and PDI for the NIO as a whole and Bay of Bengal (BOB) and Arabian Sea (AS) are analysed based on the data of 1990-2013 (24 years). Role of large scale features like El Nino southern oscillation (ENSO) and Indian Ocean dipole (IOD) have also been analyzed. The mean ACE per year for TCs [maximum sustained wind of 34 knots (kt) or more] over the NIO is about 13.1 × 104 kt2 including 9.5 × 104 kt2 over the BOB and 3.6 × 104 kt2 over the AS. The mean PDI per year for TCs over the NIO is about 10 × 106 kt3 including 3 × 106 kt3 over the AS and 7 × 106 kt3 over the BOB. The VF, ACE and PDI of TCs are significantly less over BOB during post-monsoon season (Oct.-Dec.) of El Nino years than in La Nina and normal years. The VF for TCs over the BOB during post-monsoon season is significantly less (higher) during positive (negative) IOD years. There is significant decreasing trend at 95 % level of confidence in ACE and PDI of TCs over AS during post-monsoon season and PDI over the BOB and NIO during pre-monsoon season mainly due to similar trend in average intensity of TCs and not due to trends in SST over Nino regions or IOD index.

  11. Winter time chemical characteristics of aerosols over the Bay of Bengal: continental influence.

    Science.gov (United States)

    Aryasree, S; Nair, Prabha R; Girach, I A; Jacob, Salu

    2015-10-01

    As part of the Integrated Campaign for Aerosols, gases and Radiation Budget (ICARB) conducted under the Geosphere Biosphere Programme of Indian Space Research Organisation, ship-based aerosol sampling was carried out over the marine environment of Bay of Bengal (BoB) during the northern winter months of December 2008 to January 2009. About 101 aerosol samples were collected, covering the region from 3.4° to 21° N latitude and 76° to 98° E longitude-the largest area covered-including the south east (SE) BoB for the first time. These samples were subjected to gravimetric and chemical analysis and the total aerosol loading as well the mass concentration of the ionic species namely F(-), Cl(-), Br(-), NO2 (-), NO3 (-), PO4 (2-), SO4 (2-), NH4 (+), etc. and the metallic species, Na, Mg, Ca, K, Al, Fe, Mn, Zn, and Pb were estimated for each sample. Based on the spatial distribution of individual chemical species, the air flow pattern, and airmass back trajectory analysis, the source characteristics of aerosols for different regions of BoB were identified. Significant level of continental pollution was noticed over BoB during winter. While transport of pollution from Indo-Gangetic Plain (IGP) contributed to aerosols over north BoB, those over SE BoB were influenced by SE Asia. A quantitative study on the wind-induced production of sea salt aerosols and a case study on the species dependent effect of rainfall are also presented in this paper. PMID:25994269

  12. A modeling study of the processes of surface salinity seasonal cycle in the Bay of Bengal.

    Digital Repository Service at National Institute of Oceanography (India)

    Akhil, V.P.; Durand, F.; Lengaigne, M.; Vialard, J.; Keerthi, M.G.; Gopalakrishna, V.V.; Deltel, C.; Papa, F.; Montegut, C.deB.

    - ute roughly equally to the total freshwater received by the BoB, north of 15�N (Figure 1c). These freshwater sources are located in the northern BoB (Figures 1a and 1b), resulting in lowest sea sur- face salinity (SSS) there (less than 33 units..., in practical salinity scale). The low salinity surface waters lay above much saltier water (33–34.5 units, depending on the location) below 50 m, resulting in a sharp near-surface haline stratification (Figure 1b). This very strong near-surface halocline...

  13. The pendulum wave machine

    Science.gov (United States)

    Zetie, K. P.

    2015-05-01

    There are many examples on the internet of videos of ‘pendulum wave machines’ and how to make them (for example, www.instructables.com/id/Wave-Pendulum/). The machine is simply a set of pendula of different lengths which, when viewed end on, produce wave-like patterns from the positions of the bobs. These patterns change with time, with new patterns emerging as the bobs change phase. In this article, the physics of the machine is explored and explained, along with tips on how to build such a device.

  14. Probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel and its application in quantum state sharing

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing.

  15. Teleportation of an arbitrary mixture of diagonal states of multiqudit

    International Nuclear Information System (INIS)

    This paper proposes a scheme to teleport an arbitrary mixture of diagonal states of multiqutrit via classical correlation and classical communication. To teleport an arbitrary mixture of diagonal states of N qutrits, N classically correlated pairs of two qutrits are used as channel. The sender (Alice) makes Fourier transform and conditional gate (i.e., XOR(3) gate) on her qutrits and does measurement in appropriate computation bases. Then she sends N ctrits to the receiver (Bob). Based on the received information, Bob performs the corresponding unitary transformation on his qutrits and obtains the teleported state. Teleportation of an arbitrary mixture of diagonal states of multiqudit is also discussed

  16. Certifying entangled measurements in a device-independent way

    CERN Document Server

    Vertesi, Tamas

    2011-01-01

    We study under which conditions it is possible to assert that a joint demolition measurement cannot be simulated by Local Operations and Classical Communication. More concretely, we consider a scenario where two parties, Alice and Bob, send each an unknown state to a third party, Charlie, who in turn interacts with the states in some undisclosed way and then announces an outcome. We show that, under the assumption that Alice and Bob know the dimensionality of their systems, there exist situations where the statistics of the outcomes reveals the nature of Charlie's measurement.

  17. An efficient quantum secret sharing protocol with orthogonal product states

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    An efficient quantum secret sharing protocol with orthogonal product states in the 33 Hilbert space is presented. The particles in the orthogonal product states form two particle sequences. One sequence is sent to Bob and the other is sent to Charlie after rearranging the particle orders. With the help of Alice, Bob and Charlie make the corresponding local measurement to obtain the information of the or- thogonal product states prepared. This protocol has many distinct features such as great capacity and high efficiency.

  18. An upper bound on the second order asymptotic expansion for the quantum communication cost of state redistribution

    Science.gov (United States)

    Datta, Nilanjana; Hsieh, Min-Hsiu; Oppenheim, Jonathan

    2016-05-01

    State redistribution is the protocol in which given an arbitrary tripartite quantum state, with two of the subsystems initially being with Alice and one being with Bob, the goal is for Alice to send one of her subsystems to Bob, possibly with the help of prior shared entanglement. We derive an upper bound on the second order asymptotic expansion for the quantum communication cost of achieving state redistribution with a given finite accuracy. In proving our result, we also obtain an upper bound on the quantum communication cost of this protocol in the one-shot setting, by using the protocol of coherent state merging as a primitive.

  19. Time-ordering dependence of measurements in teleportation

    Science.gov (United States)

    Bertlmann, Reinhold A.; Narnhofer, Heide; Thirring, Walter

    2013-03-01

    We trace back the phenomenon of "delayed-choice entanglement swapping" as it was realized in a recent experiment to the commutativity of the projection operators that are involved in the corresponding measurement process. We also propose an experimental set-up which depends on the order of successive measurements corresponding to noncommutative projection operators. In this case entanglement swapping is used to teleport a quantum state from Alice to Bob, where Bob has now the possibility to examine the noncommutativity within the quantum history.

  20. Probabilistic Teleportation via Entanglement

    Science.gov (United States)

    Li, De-Chao; Shi, Zhong-Ke

    2008-10-01

    With an arbitrary bi-particle entangled mixed state which is shared by Alice (the sender) and Bob (the receiver) acted as a quantum channel, at first, a teleportation protocol that Alice successfully transmits an unknown mixed state to Bob based on a positive operator-valued measurement (POVM) is presented. The upper bound of probability to teleport successfully an unknown mixed state is then investigated, and conclude that it completely depends on the entanglement degree of the bi-particle entangled mixed state as a resource.

  1. Teleportation of an arbitrary mixture of diagonal states of multiqudit

    Science.gov (United States)

    Du, Qian-Hua; Lin, Xiu-Min; Chen, Zhi-Hua; Lin, Gong-Wei; Chen, Li-Bo; Gu, Yong-Jian

    2008-03-01

    This paper proposes a scheme to teleport an arbitrary mixture of diagonal states of multiqutrit via classical correlation and classical communication. To teleport an arbitrary mixture of diagonal states of N qutrits, N classically correlated pairs of two qutrits are used as channel. The sender (Alice) makes Fourier transform and conditional gate (i.e., XOR(3) gate) on her qutrits and does measurement in appropriate computation bases. Then she sends N ctrits to the receiver (Bob). Based on the received information, Bob performs the corresponding unitary transformation on his qutrits and obtains the teleported state. Teleportation of an arbitrary mixture of diagonal states of multiqudit is also discussed.

  2. Teleportation of Three-Qubit State via Six-qubit Cluster State

    Science.gov (United States)

    Yu, Li-zhi; Sun, Shao-xin

    2015-05-01

    A scheme of probabilistic teleportation was proposed. In this scheme, we took a six-qubit nonmaximally cluster state as the quantum channel to teleport an unknown three-qubit entangled state. Based on Bob's three times Bell state measurement (BSM) results, the receiver Bob can by introducing an auxiliary particle and the appropriate transformation to reconstruct the initial state with a certain probability. We found that, the successful transmission probability depend on the absolute value of coefficients of two of six particle cluster state minimum.

  3. Bio pics

    DEFF Research Database (Denmark)

    Nielsen, Jakob Isak

    2011-01-01

    Martin Zandvliets Dirch (2011) har ansporet til at skitsere den biografiske film som genre og knytte nogle kommentarer til dens forskellige udtryksmuligheder. Hovedeksemplerne er Walk the Line (2005) og I’m Not There (2007) om henholdsvis Johnny Cash og Bob Dylan.......Martin Zandvliets Dirch (2011) har ansporet til at skitsere den biografiske film som genre og knytte nogle kommentarer til dens forskellige udtryksmuligheder. Hovedeksemplerne er Walk the Line (2005) og I’m Not There (2007) om henholdsvis Johnny Cash og Bob Dylan....

  4. The Music Muse

    OpenAIRE

    Wilson, Leslie

    1996-01-01

    Ever wonder why two people can sing the same note with the same loudness, but sound completely different? Middle C is middle C no matter who sings it, yet for some reason Lucianno Pavarotti1s middle C sounds richer and more beautiful than Bob Dylan1s middle C, for example. But then again, what is beauty in singing? It is a completely biased and abstract concept. To some, Bob Dylan1s voice may epitomize tonal beauty, while to others his voice may be comparable to fingernails on a chalk board. ...

  5. Observed seasonal and intraseasonal variability of the East India Coastal Current on the continental slope.

    Digital Repository Service at National Institute of Oceanography (India)

    Mukherjee, A.; Shankar, D.; Fernando, V.; Amol, P.; Aparna, S.G.; Fernandes, R.; Michael, G.S.; Khalap, S.T.; Satelkar, N.P.; Agarvadekar, Y.; Gaonkar, M.G.; Tari, A.P.; Kankonkar, A.; Vernekar, S.

    in time and space, particu- larly in the horizontal, make it difficult to interpret the signatures (Shetye et al. 1991b, 1993). 1.2 Theoretical studies The Indian subcontinent splits the NIO into two parts, but a connection between the BoB and the Arabian... to that of the BoB and the EIO (McCreary et al. 1993; Shankar and Shetye 1997; Bruce et al. 1994, 1998; Schott and McCreary 2001; Shankar et al. 2002). 1.3 Satellite altimetry The problem of space-time aliasing of the time- dependent circulation of the bay...

  6. Observed anomalous upwelling in the Lakshadweep Sea during the summer monsoon season of 2005

    Digital Repository Service at National Institute of Oceanography (India)

    Gopalakrishna, V.V.; Rao, R.R.; Nisha, K.; GirishKumar, M.S.; Pankajakshan, T.; Ravichandran, M.; Johnson, Z.; Girish, K.; Aneeshkumar, N.; Srinath, M.; Rajesh, S.; Rajan, C.K.

    that the winds over the equatorial Indian Ocean play an impor- tant role in modulating the circulation features of the north Figure 6b. Daily march of Ekman pumping velocity (C210 C06 ms C01 ) derived from QuikSCAT in the coastal box during the summer monsoon... and traverse around the rim of Bay of Bengal (BoB) and enter the SEAS. In addition, the alongshore winds in the coastal BoB also trigger and modulate the propagating Kelvin waves. The signature of this wave propagation is examined utilizing the satellite...

  7. Solution of Peter Winkler's Pizza Problem

    OpenAIRE

    Cibulka, Josef; Kynčl, Jan; Mészáros, Viola; Stolař, Rudolf; Valtr, Pavel

    2008-01-01

    Bob cuts a pizza into slices of not necessarily equal size and shares it with Alice by alternately taking turns. One slice is taken in each turn. The first turn is Alice's. She may choose any of the slices. In all other turns only those slices can be chosen that have a neighbor slice already eaten. We prove a conjecture of Peter Winkler by showing that Alice has a strategy for obtaining 4/9 of the pizza. This is best possible, that is, there is a cutting and a strategy for Bob to get 5/9 of t...

  8. Chemical characteristics of aerosols in MABL of Bay of Bengal and Arabian Sea during spring inter-monsoon: A comparative study

    Indian Academy of Sciences (India)

    Ashwini Kumar; A K Sudheer; M M Sarin

    2008-07-01

    The chemical composition of aerosols in the Marine Atmospheric Boundary Layer (MABL) of Bay of Bengal (BoB) and Arabian Sea (AS) has been studied during the spring and inter-monsoon (March–May 2006) based on the analysis of water soluble constituents (Na+, NH$^{+}_{4}$, K+, Mg2+, Ca2+, Cl−, NO$^{−}_{3}$ and SO$^{2−}_{4}$), crustal elements (Al, Fe, and Ca) and carbonaceous species (EC, OC). The total suspended particulates (TSP) ranged from 5.2 to 46.6 g m−3 and 8.2 to 46.9 g m−3 during the sampling transects in the BoB and AS respectively. The water-soluble species, on average, accounted for 44% and 33% of TSP over BoB and AS respectively, with dominant contribution of SO$^{2−}_{4}$ over both the oceanic regions. However, distinct differences with respect to elevated abundances of NH$^{+}_{4}$ in the MABL of BoB and that of Na+ and Ca2+ in AS are clearly evident. The non-sea-salt component of SO$^{2−}_{4}$ ranging from 82 to 98% over BoB and 35 to 98% over AS; together with nss-Ca2+/nss-$SO^{2−}_{4}$ equivalent ratios 0.12 to 0.5 and 0.2 to 1.16, respectively, provide evidence for the predominance of anthropogenic constituents and chemical transformation processes occurring within MABL. The concentrations of OC and EC average around 1.9 and 0.4 g m−3 in BoB and exhibit a decreasing trend from north to south; however, abundance of these carbonaceous species are not significantly pronounced over AS. The abundance of Al, used as a proxy for mineral aerosols, varied from 0.2 to 1.9 g m−3 over BoB and AS, with a distinctly different spatial pattern – decreasing north to south in BoB in contrast to an increasing pattern in the Arabian Sea.

  9. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    OpenAIRE

    Deng, Fu-Guo; Li, Xi-Han; Zhou, Hong-Yu; Zhang, Zhan-jun

    2005-01-01

    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \\textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multi-photon one and the other agent Charlie cannot find this cheating as she does not measu...

  10. Certifying entangled measurements in known Hilbert spaces

    International Nuclear Information System (INIS)

    We study under which conditions it is possible to assert that a joint measurement cannot be simulated by local operations and classical communication. More concretely, we consider a scenario where two parties, Alice and Bob, send each a state selected from a labeled set of unknown states to a third party, Charlie, who in turn interacts with the states in some undisclosed way and then announces an outcome. We show that, under the assumption that Alice and Bob know the dimensionality of their systems, there exist situations where the statistics of the outcomes reveals the nature of Charlie's measurement.

  11. Obituary: Ralph Robert Robbins, Jr., 1938-2005

    Science.gov (United States)

    Hemenway, Mary Kay; Jefferys, William H.; Lambert, David L.

    2007-12-01

    Ralph Robert Robbins, Jr., died on 2 December 2005, in Kyle, Texas. His wife, Maria Elena Robbins, his daughters Julia Robbins Kelso and Stephanie Juarez Balles, his son Matthew Juarez, and five grandchildren survive him. Bob was on the faculty at the University of Texas from 1968 until his retirement in 2003. Bob was born in Wichita, Kansas, on 2 September 1938, the only son of Mildred and Ralph Robert Robbins, Sr. Guided by his high school's policy to provide a practical education to children of working-class parents, Bob began high school with a heavy dose of vocational courses until the results of a test indicated his special talent in mathematics. He was awarded a full scholarship to Yale University, graduating magna cum laude in mathematics in 1960. He won the Warner Prize in Mathematics at Yale that year. He received his Ph.D. in 1966 with a dissertation entitled "The Triplet Spectrum of Neutral Helium in Expanding Nebulae" from the University of California at Berkeley. His interest in college teaching was ignited at this time through summer teaching positions at San Mateo California Junior College and the Ohio State University. Following a year at Texas as a McDonald Observatory Post-doctoral Fellow, Bob taught for a year in the physics department of the University of Houston before returning to the University of Texas at Austin as an Assistant Professor of Astronomy in 1968. He was promoted to Associate Professor in 1972. Bob's research in the early 1970s on theoretical studies of helium was of vital importance to astronomers for over three decades. These pioneering calculations became vital to observational astronomers in the mid-1990s as interest grew in the primordial helium produced by the Big Bang. Bob's interest and influence in education was international in scope. In the summers 1968-1970, he was a government consultant in Mathematics in East Pakistan (now Bangladesh). He consulted with the government that was preparing a master plan for technical

  12. Probabilistic remote state preparation by W states

    Institute of Scientific and Technical Information of China (English)

    Liu Jin-Ming; Wang Yu-Zhu

    2004-01-01

    In this paper we consider a scheme for probabilistic remote state preparation of a general qubit by using W states. The scheme consists of the sender, Alice, and two remote receivers Bob and Carol. Alice performs a projective measurement on her qubit in the basis spanned by the state she wants to prepare and its orthocomplement. This allows either Bob or Carol to reconstruct the state with finite success probability. It is shown that for some special ensembles of qubits, the remote state preparation scheme requires only two classical bits, unlike the case in the scheme of quantum teleportation where three classical bits are needed.

  13. Differential-phase-shift quantum key distribution using coherent light

    International Nuclear Information System (INIS)

    Differential-phase-shift quantum key distribution based on two nonorthogonal states is described. A weak coherent pulse train is sent from Alice to Bob, in which the phase of each pulse is randomly modulated by {0,π}. Bob measures the differential phase by a one-bit delay circuit. The system has a simple configuration without the need for an interferometer and a bright reference pulse in Alice's site, unlike the conventional QKD system based on two nonorthogonal states, and has an advantage of improved communication efficiency. The principle of the operation is successfully demonstrated in experiments

  14. A Large-alphabet Quantum Key Distribution Protocol Using Orbital Angular Momentum Entanglement

    Science.gov (United States)

    Zhao, Sheng-Mei; Gong, Long-Yan; Li, Yong-Qiang; Yang, Hua; Sheng, Yu-Bo; Cheng, Wei-Wen

    2013-06-01

    We experimentally demonstrate a quantum key distribution protocol using entangled photon pairs in orbital angular momentum (OAM). Here Alice uses a fixed phase hologram to modulate her OAM state on one photon with a spatial light modulator (SLM), while Bob uses the designed N different phase holograms for his N-based keys on the other photon with his SLM. With coincidences, Alice can fully retrieve the keys sent by Bob without reconciliation. We report the experiment results with N = 3 and OAM eigenmodes |l = ±1>, and discuss the security from the light path and typical attacks.

  15. Marketing Mix Analysis

    OpenAIRE

    Broukal, Radek

    2012-01-01

    This bachelor work descibes analysis of marketing mix used for cream „Bobík“ by Bohušovická mlékárna a.s. The work is divided into two part – research of available literature and practical part. In the first part is literature overview of marketing mix and tools of marketing mix, which are product, price, place, promotion. In the second section of this work are described each tools of marketing mix for the product „Bobík“, ...

  16. Assessment of seasonal and year-to-year surface salinity signals retrieved from SMOS and Aquarius missions in the Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Akhil, V.P.; Lengaigne, M.; Durand, F.; Vialard, J.; Chaitanya, A; Keerthi, M.G.; Gopalakrishna, V.V.; Boutin, J.; de Boyer, M.C.

    The Bay of Bengal (BoB) exhibits a wide range of sea surface salinity (SSS), with very fresh water induced by heavy monsoonal precipitation and river run-offs to the north, and saltier water to the south. This is a particularly challenging region...

  17. Stable carbon and nitrogen isotopic composition of bulk aerosols over India and northern Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Agnihotri, R.; Mandal, T.K.; Karapurkar, S.; Naja, M.; Gadi, R.; Ahammed, Y.N.; Kumar, A.; Saud, T.; Saxena, M.

    aerosols over AS are characterized by significantly higher TC/TN ratios (approx.50 + or - 10) compared to aerosol over Indian cities (5.6 + or - 2.6) as well as over BOB (6.8 + or - 12.5), most likely due to having significant inorganic carbon contributed...

  18. Impact of river discharge on the coastal water pH and pCO2 levels during the Indian Ocean Dipole (IOD) years in the western Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Sarma, V.V.S.S.; Paul, Y.S.; Vani, D.G.; Murty, V.S.N.

    Monthly variations in inorganic carbon components during January 2010–December 2011 in the coastal Bay of Bengal (BoB) were studied in relation to the variations in Godavari River (GR) discharge using ship board measurements, buoy data and satellite...

  19. Quantum secure direct communication via partially entangled states

    Institute of Scientific and Technical Information of China (English)

    Man Zhong-Xiao; Xia Yun-Jie

    2007-01-01

    We present in this paper a quantum secure direct communication (QSDC) protocol by using partially entangled states. In the scheme a third party (Trent) is introduced to authenticate the participants. After authentication, Alice can directly, deterministically and successfully send a secret message to Bob. The security of the scheme is also discussed and confirmed.

  20. Ombuds' Corner: A section leader on a limited-duration contract

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Bob* has been working at CERN for almost four years on a limited-duration contract. Due to the early retirement of one of his colleagues, he was appointed Section Leader very early in his career, as he was the only one who was able to replace this person. As Section Leader, Bob had to provide annual assessments for several staff members, which he did in a very honest and balanced way. When staff members were given their results from the MARS exercise, George – one of Bob’s supervisees – accused Bob of not giving him the promotion he deserved. George had been expecting his MARS appraisal to include work that he claims Bob, being under a limited-durati...

  1. Implement the Rae Report!

    Science.gov (United States)

    Lowy, Frederick

    2005-01-01

    The February 7, 2005 report by the Honorable Bob Rae--"Ontario: A Leader in Learning"--focused national attention, at least fleetingly, on a matter of prime importance to Canada's future: vulnerable state of higher education in this country, a subject that has, unfortunately, largely escaped serious public discussion. Although Mr. Rae, a former…

  2. Geology Museum-Based Learning in Soil Science Education

    Science.gov (United States)

    Mikhailova, E. A.; Tennant, C. H.; Post, C. J.; Cicimurri, C.; Cicimurri, D.

    2013-01-01

    Museums provide unique learning opportunities in soil science. The Bob Campbell Geology Museum in Clemson, SC, features an exhibit of minerals and rocks common in the state and in its geologic history. We developed a hands-on laboratory exercise utilizing an exhibit that gives college students an opportunity to visualize regional minerals and…

  3. Teleportation of Unknown Atomic Entangled States Using GHZ Class States

    International Nuclear Information System (INIS)

    We propose two physical schemes, which can teleport unknown atomic entangled states from user A (Alice) to user B (Bob) via GHZ class states as quantum channel. The two schemes are both based on cavity QED techniques. In the two schemes, teleportation and distillation procedures can be realized simultaneously. The second teleportation scheme is more advantageous than the first one.

  4. Teleportation in the Background of Schwarzschild Space-time

    OpenAIRE

    Ge, Xian-Hui; Shen, You-Gen

    2005-01-01

    Quantum teleportation is investigated between Alice who is far from the horizon and Bob locates near the event horizon of a Schwarzschild black hole. The results show that the fidelity of the teleportation is reduced in this curved space-time. However, high fidelity can still be reached outside a massive black hole.

  5. Teleportation of Two-Particle Entangled State via Cluster State

    Institute of Scientific and Technical Information of China (English)

    LI Da-Chuang; CAO Zhuo-Liang

    2007-01-01

    In this paper,two schemes for teleporting an unknown two-particle entangled state from the sender (Alice)to the receiver (Bob) via a four-particle entangled cluster state are proposed.In these two schemes,the unknown twoparticle entangled state can be teleported perfectly.The successful probabilities and fidelities of the schemes can reach unity.

  6. Reading the Conjuncture

    DEFF Research Database (Denmark)

    Flohr, Mikkel; Harrison, Yannick Nehemiah Antonio

    2016-01-01

    This interview with Bob Jessop covers diverse issues ranging from the challenge of defining the state to problems of conjunctural analysis and political practice. It first explores the state and state power from a strategic-relational perspective and then addresses the relation between economics ...

  7. Monastic Musings

    Institute of Scientific and Technical Information of China (English)

    Francisco; Little

    2015-01-01

    My eyes kept being drawn to the cartoon cutout characters on the bobbing bus ceiling. Mickey Mouse and Pluto werepasted in between metallic paper roses, hearts and butterflies. It all seemed incongruous hovering over an eclectic collection of rural pas- sengers, jabbering in a jarring dialect, crammed into a bus chugging its way into the mountains high above Xining.

  8. New experiment in the advertising world! / Alina Lisina

    Index Scriptorium Estoniae

    Lisina, Alina

    2005-01-01

    Lätis Siguldas viidi läbi kolme reklaamiagentuuri Y&R Garage 4x4, Balta Communication'i ja Metro Leo Burnett'i nädalane seminar, mille käigus loodi ühiselt reklaam Adazhu cipsi'le. Oma teadmisi jagas reklaaminduse maailmaklassi ekspert Bob Kincey

  9. Family Review. Politics and Education: Implications for America's Children and Families.

    Science.gov (United States)

    Lindjord, Denise

    1996-01-01

    Examines the pros and cons of several family-oriented initiatives offered by President Clinton and Senator Bob Dole during their 1996 campaigns. These include tuition tax credits, volunteer tutoring programs, across-the-board tax breaks, and school voucher programs. (HTH)

  10. Guns and Violence. Current Controversies.

    Science.gov (United States)

    Kim, Henny H., Ed.

    This book focuses on gun violence and gun control, presenting both sides of arguments about firearms ownership and gun control. Each of five chapters poses a question about gun control and provides answers for both sides of the question. The following essays are included: (1) "Gun Violence Is Becoming an Epidemic" (Bob Herbert); (2) "Gun Violence…

  11. Blind quantum computation over a collective-noise channel

    Science.gov (United States)

    Takeuchi, Yuki; Fujii, Keisuke; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki

    2016-05-01

    Blind quantum computation (BQC) allows a client (Alice), who only possesses relatively poor quantum devices, to delegate universal quantum computation to a server (Bob) in such a way that Bob cannot know Alice's inputs, algorithm, and outputs. The quantum channel between Alice and Bob is noisy, and the loss over the long-distance quantum communication should also be taken into account. Here we propose to use decoherence-free subspace (DFS) to overcome the collective noise in the quantum channel for BQC, which we call DFS-BQC. We propose three variations of DFS-BQC protocols. One of them, a coherent-light-assisted DFS-BQC protocol, allows Alice to faithfully send the signal photons with a probability proportional to a transmission rate of the quantum channel. In all cases, we combine the ideas based on DFS and the Broadbent-Fitzsimons-Kashefi protocol, which is one of the BQC protocols, without degrading unconditional security. The proposed DFS-based schemes are generic and hence can be applied to other BQC protocols where Alice sends quantum states to Bob.

  12. Quantum key distribution: vulnerable if imperfectly implemented

    Science.gov (United States)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  13. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique

    Science.gov (United States)

    Zhao, Shengmei; Wang, Le; Liang, Wenqiang; Cheng, Weiwen; Gong, Longyan

    2015-10-01

    In this paper, we propose a high performance optical encryption (OE) scheme based on computational ghost imaging (GI) with QR code and compressive sensing (CS) technique, named QR-CGI-OE scheme. N random phase screens, generated by Alice, is a secret key and be shared with its authorized user, Bob. The information is first encoded by Alice with QR code, and the QR-coded image is then encrypted with the aid of computational ghost imaging optical system. Here, measurement results from the GI optical system's bucket detector are the encrypted information and be transmitted to Bob. With the key, Bob decrypts the encrypted information to obtain the QR-coded image with GI and CS techniques, and further recovers the information by QR decoding. The experimental and numerical simulated results show that the authorized users can recover completely the original image, whereas the eavesdroppers can not acquire any information about the image even the eavesdropping ratio (ER) is up to 60% at the given measurement times. For the proposed scheme, the number of bits sent from Alice to Bob are reduced considerably and the robustness is enhanced significantly. Meantime, the measurement times in GI system is reduced and the quality of the reconstructed QR-coded image is improved.

  14. Information Causality is a Special Point in the Dual of the Gray-Wyner Region

    CERN Document Server

    Beigi, Salman

    2011-01-01

    Information Causality contributes to the program of deriving fundamentals of quantum theory from information theoretic principles. It puts restrictions on the amount of information learned by a party (Bob) from the other party (Alice) in a one-way communication scenario as follows. Bob receives an index b, and after a one-way communication from Alice, tries to recover a part of Alice's input. Because of the possibility of cloning, this game in its completely classical form is equivalent to one in which there are several Bobs indexed by b, who are interested in recovering different parts of Alice's input string, after receiving a public message from her. Adding a private message from Alice to each Bob, and assuming that the game is played many times, we obtain the Gray-Wyner problem for which a complete characterization of the achievable region is known. In this paper, we first argue that in the classical case Information Causality is only a single point in the dual of the Gray-Wyner region. Next, we show that...

  15. Reading the Conjuncture: State, Austerity and Social Movements

    DEFF Research Database (Denmark)

    Flohr, Mikkel; Harrison, Yannick Nehemiah Antonio

    2016-01-01

    This interview with Bob Jessop covers diverse issues ranging from the challenge of defining the state to problems of conjunctural analysis and political practice. It first explores the state and state power from a strategic-relational perspective and then addresses the relation between economics ...

  16. The advantage of higher-order theory of mind in the game of limited bidding

    NARCIS (Netherlands)

    De Weerd, H.; Verheij, B.; van Eijck, J.; Verbrugge, L. C.

    2011-01-01

    Higher-order theory of mind is the ability to recursively model mental states of other agents. It is known that adults in general can reason adequately at the second order (covering attributions like "Alice knows that Bob knows that she wrote a novel under pseudonym"), but there are cognitive limits

  17. Security in quantum

    Science.gov (United States)

    RKS

    2016-06-01

    In reply to the physicsworld.com news article “Alice and Bob have their quantum fingerprints checked” (23 March, http://ow.ly/ZQQjB), which described a technique that minimizes the amount of information that must be transferred between two computers to solve a problem.

  18. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  19. Talebob

    DEFF Research Database (Denmark)

    Juel Henrichsen, Peter

    2015-01-01

    Talebob ("Speech Bob") is an interactive language learning tool for pupils (10+ years) helping them practice their pronunciation of simple, highly frequent phrases in Danish. Talebob’s feedback is based on acoustic measurements (for pitch and intensity), presented to the user as helpful...

  20. Balancing the books

    OpenAIRE

    Foster, Allen

    2007-01-01

    Technically the US Food and Drug Administration goes out of business at the end of September, when legislation authorising it expires. The US Congress is working on a new law to address some of the controversies that have dogged the agency in recent years. FDA commissioner Andrew von Eschenbach talks to Bob Roehr

  1. Complete insecurity of quantum protocols for classical two-party computation

    NARCIS (Netherlands)

    H. Buhrman; M. Christandl; C. Schaffner

    2012-01-01

    A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other’s input than what is implied by the value of the function. In this Letter, we show that any quantum prot

  2. Androgyny and Sex Role Perception in Television Situation Comedies.

    Science.gov (United States)

    Whetmore, Edward Jay

    The interrelationships among perceived sex role of self, sex roles of parents and friends, and sex roles of television-situation-comedy characters were investigated by this study. Individual preferences for characters in four TV programs--"All in the Family,""Rhoda,""Mary Tyler Moore," and "The Bob Newhart Show"--were also assessed. Seventy Lewis…

  3. Touching Ghosts: Observing Free Fall from an Infalling Frame of Reference into a Schwarzschild Black Hole

    Science.gov (United States)

    Augousti, A. T.; Gawelczyk, M.; Siwek, A.; Radosz, A.

    2012-01-01

    The problem of communication between observers in the vicinity of a black hole in a Schwarzschild metric is considered. The classic example of an infalling observer Alice and a static distant mother station (MS) is extended to include a second infalling observer Bob, who follows Alice in falling towards the event horizon. Kruskal coordinates are…

  4. Detsibill : D.I.Y. - Do it yourself. White label : DJ Critical. Kuula / DJ Pickney Tiger

    Index Scriptorium Estoniae

    DJ Pickney Tiger, pseud., 1970-

    2007-01-01

    Saksa rockansambli The 4 Sivits kontserdituurist Ida-Saksamaal, Slovakkias ja Tšehhis. DJ Criticali heliplaadist "Mixtape". Heliplaatidest: Muse "Black Holes & Revelations", Beck "The Information", Alice Russell "Under The Munka Moon", Scissor Sisters "Ta-Dah", "Biitparaadid", Fergie "The Dutchess", Sabrina Malheiros "Vibrasons", Bob Dylan "Modern Times", Nelja Ruusua "Ensi-Ilta", Marshmobil "Minx", James Morrison "Undiscovered"

  5. EGEE helping bridge digital divide EGEE'06 Conference preview

    CERN Multimedia

    2006-01-01

    "In this GRIDtoday Q&A, EGEE project director Bob Jones discusses where EGEEE began and where it is now as the project enters the EGEE II era. In addition, Jones previews the EGEE'06 conference, which kicks off Sept. 25 in Geneva, Switzerland, and features for the first time a prominent businee track." (2 pages)

  6. Rohkem tolerantsi / Lauri Kärk

    Index Scriptorium Estoniae

    Kärk, Lauri, 1954-

    2003-01-01

    Berliini 53. filmifestival avati USA muusikaliga "Chicago", mis valmis Rob Marshalli käe all John Kanderi, Fred Ebbi ja Bob Fosse muusikali järgi. Festivali juht Dieter Kosslick rõhutab loosungit "Towards Tolerance", mis olevatki festivali kava alusmõtteks

  7. Book Review: Comparative Education Research: Approaches and Methods

    Directory of Open Access Journals (Sweden)

    Noel Mcginn

    2014-10-01

    Full Text Available Book Review Comparative Education Research: Approaches and Methods (2nd edition By Mark Bray, Bob Adamson and Mark Mason (Eds. (2014, 453p ISBN: 978-988-17852-8-2, Hong Kong: Comparative Education Research Centre and Springer

  8. У "Бездомного Боба" будет свой "Идиот" / Катрин Кисса и Райнер Сарнет ; интервьюировал Борис Тух

    Index Scriptorium Estoniae

    Кисса, Катрин, 1977-

    2010-01-01

    Režissöör Rainer Sarnet teeb filmi F. Dostojevski romaani "Idioot" ainetel. Režissöör, produtsent ning filmistuudio Homeless Bob Production juht Katrin Kissa ja näitleja Tiina Tauraite räägivad filmist

  9. Controlled Quantum Teleportation via the GHZ Entangled Ions in the Ion-Trapped System

    Science.gov (United States)

    Xu, Xiong; Wang, Xiaoxue

    2016-03-01

    In this paper, we present a controlled quantum teleportation protocol. In the protocol, quantum information of an unknown state is faithfully transmitted from a sender (Alice) to a remote receiver (Bob) via the GHZ entangled ions under the control of the supervisor Charlie. The apparent Bell-state measurements that Alice should perform in order to teleport her ions are not needed.

  10. Maintain a Heart Healthy Lifestyle

    Medline Plus

    Full Text Available ... no problem convincing a heart attack survivor to change his or her lifestyle--to quit smoking, control their high blood pressure and cholesterol, control their weight and get regular physical activity. BOB WELTNER: My heart stopped and in theory, I guess I was dead. But through the ...

  11. Building a Culinary Arts Academy

    Science.gov (United States)

    Brown, Robert L.

    2005-01-01

    When Judy Karen Brown (the 2004 Alabama Family and Consumer Sciences Teacher of the Year) arrived at Bob Jones High School (BJHS) in Madison, Alabama, in the summer of 1999, she immediately identified a need to build both student and community interests in family and consumer sciences (FACS). She noticed the student and faculty interest in the…

  12. Teaching Medical Student Psychiatry Through Contemporary Music

    Science.gov (United States)

    Egan, William H.

    1977-01-01

    An audio technique uses contemporary music recordings to illustrate various personality disorders, including: schizoid, paranoid, compulsive, antisocial, and hysterical. The works of Bob Dylan, Paul Simon, Harry Chapin, the Beatles, Janis Ian, James Taylor, Tammy Wynette, and others are cited. (LBH)

  13. Instructor Revs Up Ailing Motorcycle Program

    Science.gov (United States)

    Stevenson, Roy

    2011-01-01

    Bob Monroig smiles every day on his way to work at Lake Washington Technical College (LWTC), high atop a hill overlooking the affluent Seattle suburb of Kirkland, Washington. He's created his own job within a job, where he's the Harley-Davidson University program coordinator and tenured faculty in the Motorcycle, Marine, & Power Equipment Service…

  14. Life cycle of eddies along the western boundary of the Bay of Bengal and their implications

    Digital Repository Service at National Institute of Oceanography (India)

    Nuncio, M.; PrasannaKumar, S.

    . EOFs of SLA showed that annual cycle (EOFs 1 and 2) accounts for 39% of the total variance, while meso-scale eddies contributed up to 25% of the variance. Meso-scale eddies dominate the BOB circulation and are able to enhance the surface chlorophyll...

  15. Women, Girls, and Binge Drinking

    Centers for Disease Control (CDC) Podcasts

    2013-08-01

    Bob Brewer, CDC's Alcohol Program Director, goes on the air to discuss the problem of binge drinking among women and girls.  Created: 8/1/2013 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 8/1/2013.

  16. The Independent School Admissions Director as Tim Wakefield's Catcher

    Science.gov (United States)

    Vachow, Mike

    2012-01-01

    Bob Uecker, the Milwaukee Brewers' quipping radio broadcaster, makes his brief and lackluster career as a major league catcher the subject of much of his humor. About catching the knuckleball, Uecker famously said, "I always thought the knuckleball was the easiest pitch to catch." Of course, there is an even better way to catch a knuckleball, and…

  17. Assisted Cycling Tours

    Science.gov (United States)

    Hollingsworth, Jan Carter

    2008-01-01

    This article discusses Assisted Cycling Tours (ACT), a Westminster, Colorado based 501(c)3, non-profit that is offering the joy of bicycle tours in breathtaking, scenic locations to children and adults with developmental and physical disabilities and their families. ACT was founded by Bob Matter and his son David with a goal of opening up the…

  18. Development of a physiologically based pharmacokinetic model for flunixin in cattle (Bos taurus)

    Science.gov (United States)

    Violative residues of flunixin in tissues from bob veal calves and cull dairy cows has been attributed to noncompliance with the FDA-approved route of administration and withdrawal time, however, the effect of administration route and physiological differences among animals on tissue residue depleti...

  19. On the Responsible Use of Communication Media for Learning

    Science.gov (United States)

    Yeaman, Andrew R. J.

    2009-01-01

    Just as Bob Heinich states that technology makes instruction visible (1970, 1971), putting the professional ethics into practice makes technology visible. The window for social insight into teachers' professional field is open to a particular view at the present. There are learner questions surrounding the use of media which need answering and…

  20. Privacy-Enhanced Methods for Comparing Compressed DNA Sequences

    CERN Document Server

    Eppstein, David; Baldi, Pierre

    2011-01-01

    In this paper, we study methods for improving the efficiency and privacy of compressed DNA sequence comparison computations, under various querying scenarios. For instance, one scenario involves a querier, Bob, who wants to test if his DNA string, $Q$, is close to a DNA string, $Y$, owned by a data owner, Alice, but Bob does not want to reveal $Q$ to Alice and Alice is willing to reveal $Y$ to Bob \\emph{only if} it is close to $Q$. We describe a privacy-enhanced method for comparing two compressed DNA sequences, which can be used to achieve the goals of such a scenario. Our method involves a reduction to set differencing, and we describe a privacy-enhanced protocol for set differencing that achieves absolute privacy for Bob (in the information theoretic sense), and a quantifiable degree of privacy protection for Alice. One of the important features of our protocols, which makes them ideally suited to privacy-enhanced DNA sequence comparison problems, is that the communication complexity of our solutions is pr...

  1. Tsaaride suveresidentsi Peterburi lähedal kerkib eestilik linnaosa / Andres Reimer

    Index Scriptorium Estoniae

    Reimer, Andres

    2011-01-01

    Igor Izraeljani perefirmale Technomar&Adremi kuuluv Venemaa arendusfirma Tareal alustab Petrodvoretsi lähedale rajatavas Vanino linnaosas majade ja korterite müüki. Koostöös kohaliku partneriga arendatavale alale kerkib 142 eramut ja 99 luksuskorterit. Majad on Eesti projekteerijate abiga kavandatud Sergei Bobõlevi AB-s

  2. Session on manufacturing and marketing forest resources to be held in Richmond

    OpenAIRE

    Davis, Lynn

    2006-01-01

    Virginia Tech assistant professor and wood products extension specialist Brian Bond along with professor and forest products marketing extension specialist Bob Smith will offer a unique training session on the manufacturing and marketing of products from lower quality and smaller diameter forest resources.

  3. Emerging Technologies: Learning Objects--Scorn or SCORM?

    Science.gov (United States)

    Godwin-Jones, Robert

    2004-01-01

    In the communities dealing with the design and implementation of on-line teaching and training (higher education, government, industry), SCORM is a hot topic these days. The "Sharable Content Object Reference Model" is a standard for the packaging and deployment of Web-based "learning objects," defined by Bob Banks as "a relatively small, reusable…

  4. How Entertainment Media Aid Learning about the Natural World

    Science.gov (United States)

    Pathmanathan, Sai

    2014-01-01

    Young people can be motivated to learn science using the power of various entertainment media. The author states the need to recognise that they are accessing science through informal learning outside school. With children saying they have learnt from cartoons such as Nickelodeon's SpongeBob SquarePants, it would seem that entertaining…

  5. Pop / Mart Kalvet

    Index Scriptorium Estoniae

    Kalvet, Mart, 1975-

    2007-01-01

    Heliplaatidest: Queens Of The Stone Age "Era Vulgaris", Bob Marley & The Wailers "Exodus: 30th Anniversary Edition", Sophie Ellis Bextor "Trip The Light Fantastic", The Police "The Police", Armand Van Helden "Ghettoblaster", Rihanna "Good Girl Gone Bad", Tiit Kikas "String Theory", Ryan Adams "Easy Tiger"

  6. Recycling the myth that global warming ‘stopped in the mid-1990s’

    OpenAIRE

    Robert E T Ward

    2012-01-01

    The columnist David Rose has frequently told his readers in the ‘Mail on Sunday’ that global warming ‘stopped’ almost two decades ago. Yet as Bob Ward observes, his often repeated claim has no basis in climate science and ought to be challenged.

  7. An Leabharlann : The Irish Library

    OpenAIRE

    Sliney, Marjory

    2010-01-01

    Academic libraries in Challenging Times / John Cox; Public Libraries and the Recession / Liam Ronayne; Social Networks / Jane Burns; Poetry Promotion in Public libraries / Brian Hegarty & Clare Thornley; Conference Reports: Conference on Conceptions of Library and Information Sciencw / Eva Hornung; LILAC 2010 / Aoife Geraghty; Books: Acquisitions; Information Policy; Academic Libraries; Marketing; Student Research Support; News from the Stacks; Obituary – Bob McKee

  8. 78 FR 49768 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Joint Task-Force...

    Science.gov (United States)

    2013-08-15

    ..., Ontario, CANADA; Cinegy, Munich, GERMANY; Cisco, San Jose, CA; Cobalt Digital Inc., Urbana, IL; Coral Sea..., Porter Ranch, CA; James Donahue (Individual), Plainville, MA; DVBLink, Inc., Mount Vernon, IA; Bob Edge..., Ontario, CANADA; European Broadcasting Union, Le Grand-Saconnex, Geneva, SWITZERLAND; EVS...

  9. Siim Nestor soovitab : Toimub selliseid asju... / Siim Nestor

    Index Scriptorium Estoniae

    Nestor, Siim, 1974-

    2005-01-01

    Ameerika ansambel Tha Alkaholiks üritusel "Hip Hop Café" 4. nov. klubis Hollywood, ansambel The Wailers üritusel "The Spirit of Bob Marley" 5. nov. klubis Amigo, hiphopmuusika üritus 9. nov. klubis Privé, üritusel "WHA!?" 5. nov. Rakveres esitlusel uus duubelkogumik "Higha Collection 5"

  10. Using a lithium bis(oxalato) borate additive to improve electrochemical performance of high-voltage spinel LiNi0.5Mn1.5O4 cathodes at 60 °C

    International Nuclear Information System (INIS)

    Highlights: • A robust surface layer is formed on the cathode by oxidative decomposition of lithium bis(oxalate) borate additive. • Oxidative decomposition of electrolytes is suppressed by the lithium bis(oxalate) borate-derived surface layer. • Lithium bis(oxalate) borate as an additive improves cycling performances of high-voltage LiNi0.5Mn1.5O4 cathodes at 60 °C. -- Abstract: Lithium bis(oxalato) borate (LiBOB) is investigated as an additive for the stabilization of a high-voltage cathode–electrolyte interface. It is found that the electrochemical performance of Li/LiNi0.5Mn1.5O4 cells with a LiBOB additive is improved at 60 °C. To confirm the effects of LiBOB on electrolyte oxidative decomposition, the surface chemistry of separators and high-voltage LiNi0.5Mn1.5O4 cathodes cycled in electrolytes with and without a LiBOB additive are examined using ex situ attenuated total reflectance-Fourier transform infrared (ATR-FTIR) spectroscopy and X-ray photoelectron spectroscopy (XPS)

  11. Popmuusika / Valner Valme

    Index Scriptorium Estoniae

    Valme, Valner, 1970-

    2005-01-01

    Uutest heliplaatidest Beta Band "The Best Of", Nickelback "All The Night Reasons", Alanis Morissette "Jagged Little Pill", Bob Dylan "No Direction", Ricky Martin "Life", KTU "8 Armed Monkey", Alicia Keys "Unplugged", John Cale "Black Acetate", Blockhead "Downtown", David Gray "Life in Slow", Eric Clapton "Back Home"

  12. Seasonality and variability of coccolithophore fluxes in response to diverse oceanographic regimes in the Bay of Bengal: Sediment trap results

    Digital Repository Service at National Institute of Oceanography (India)

    Mergulhao, L.P.; Guptha, M.V.S.; Unger, D.; Murty, V.S.N.

    A study on coccolithophores from the sediment trap samples, collected over a period of one year (January 1992–December 1992) from three trap locations in the Bay of Bengal (BOB) were used to understand their production and export processes...

  13. Rasta-revolutsioon : ikka ja jälle. White label : Nikns Suns - Imed. Kuula / DJ Pickney Tiger

    Index Scriptorium Estoniae

    DJ Pickney Tiger, pseud., 1970-

    2007-01-01

    Heliplaadist "Bob Marley And The Wailers. Exodus". Ansamblist. Heliplaatidest: Taraf De Haidouks "Maskarada", Los Desterrados "Tu", Prince "Planet Earth", Manu Chao "La Radiolinia", Kanye West "Graduation", 50 Cent "Curtis", Vaiko Eplik ja Eliit 2", "Shahrukh. The King Khan. Vol 3", Big &Rich "Between Raising Hell and Amazing Graze", Tiit Kikas"String Theory"

  14. Karjas on ohutum elada / Toomas Paul

    Index Scriptorium Estoniae

    Paul, Toomas, 1939-

    2003-01-01

    Vt. ka Paul, Toomas. "Löö esimesena, Freddy!". Eesti Päevaleht, 8. mai 2003. Inimesest kui karjaloomast, inimloomusest ja sallivusest. Ilm. ka: Paul, Toomas. Ole salliv, Bob // Pastishsh & popurrii : ilmavaatlusi / Paul, Toomas. - [Tallinn] : Oomen, 2007. - Lk. 54-58

  15. European car manufacturers’ latest crisis is only one part of the industry’s two-decades of restructuring and decline.

    OpenAIRE

    Hancké, Bob

    2012-01-01

    This week has seen car plant closures in Belgium and the UK, consolidation programmes, including a bail-out for Peugeot and GM/Opel, and a squeeze on the profits of all car manufacturers, including the relatively healthy VW. Bob Hancké takes stock of restructuring in the industry over the last two decades, and finds few reasons to be cheerful

  16. An Attack on "Quantum Secure Direct communication and Authentication With single photons"

    OpenAIRE

    Amerimehr, Ali; Dehkordi, Massoud Hadian

    2016-01-01

    In a recent article, Chang et al. proposed a quantum secure direct communication protocol using single photons (Chinese Sci Bull, 58: 4571-4576). The protocol is equipped with authentication. In this article we present a novel attack on the protocol that can determine the secret key which is already shared between Alice and Bob.

  17. Filmikurioosumid : Kõige, kõige, kõige filmid : Zorrod läbi aegade / Aare Ermel

    Index Scriptorium Estoniae

    Ermel, Aare, 1957-2013

    2002-01-01

    1919. aastal ilmunud Johnston McCulley jutustus "Capistrano needus" pani aluse lugematutele vaeste eest maskis ja pimeduse varjus kättemaksva Zorro lugudele trükisõnas ja kinolinal. Samast tüvest on pärit ka Batmani (looja Bob Kane) ja Supermani lood

  18. Surface freshwater from Bay of Bengal runoff and Indonesian throughflow in the tropical Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sengupta, D.; Raj, B.; Shenoi, S.S.C.

    AS in January-April, moving west at 15-20 cms-1. Analyses of SSH also suggest the presence of several smaller (O(100 km)) eddies. It is possible that BoB freshwater is carried west in these vor- tices, in addition to the NMC. As much as 3 m of runoff accumulates...

  19. Uudised

    Index Scriptorium Estoniae

    2006-01-01

    Giuseppe Verdi ooperi "Maskiball" uuslavastusest Malmös. Kantrilaulja Willie Nelsoni heliplaadist "Cowboys are Frequently Secretly". Helilooja Gustav Mahleri lapselaps Marina Mahler nõuab Austria Galeriilt tagasi Edvard Munchi maali "Suveöö rannas". Jamaical Kingstonis asuvast reggae-laulja Bob Marley sünnimajast, kus asuvad helistuudio ja muuseum

  20. Bioeconomics of Commercial Marine Fisheries of Bay of Bengal: Status and Direction

    Directory of Open Access Journals (Sweden)

    Ahasan Habib

    2014-01-01

    Full Text Available The fishery of the Bay of Bengal (BOB is assumed to be suffering from the overexploitation. This paper aims to assess the sustainability of current level of fishing effort as well as possible changes driven by anthropogenic and climate driven factors. Therefore, the commercial marine fishery of BOB for the period of 1985/86 to 2007/08 is analyzed by applying Gordon-Schaefer Surplus Production Model on time series of total catch and standardized effort. Static reference points such as open-access equilibrium, maximum economic yield, and maximum sustainable yield are established. Assumptions about potential climatic and anthropogenic effects on r (intrinsic growth rate and K (carrying capacity of BOB fishery have been made under three different reference equilibriums. The results showed that the fishery is not biologically overexploited; however, it is predicted to be passing a critical situation, in terms of achieving reference points in the near future. But, on the other hand, economic overfishing started several years before. Higher fishing effort, and inadequate institutional and legal framework have been the major bottlenecks for the proper management of BOB fisheries and these may leads fishery more vulnerable against changing marine realm. Thus, the present study calls for policy intervention to rescue the stock from the existing high fishing pressure that would lead to depletion.

  1. Plaadid / Toomas Puna

    Index Scriptorium Estoniae

    Puna, Toomas, 1975-

    2007-01-01

    Uutest heliplaatidest Armand Van Helden "Ghettoblaster", Queens of the Stone Age "ERA Vulgaris", Tuberkuloited "Mis sa teed", Zeb "Stop the Earth, I Want to Get Off", Frankie Valentine "The World of What", Ryan Adams "Easy Tiger", Bob Sinclar "Soundz of Freedom"

  2. Gloria Ladson-Billings: Biographical Information and List of References

    Science.gov (United States)

    Fecho, Bob

    2007-01-01

    This resource was developed by the National Writing Project's (NWP's) African American Learners Project and written by Bob Fecho from the Red Clay Writing Project in Georgia, in anticipation of the 2007 Urban Sites Conference keynote address by Dr. Gloria Ladson-Billings. Fecho discusses Ladson-Billings' 2006 American Educational Research…

  3. Entanglement, Einstein-Podolsky-Rosen correlations, Bell nonlocality, and steering

    International Nuclear Information System (INIS)

    In a recent work [Phys. Rev. Lett. 98, 140402 (2007)] we defined 'steering', a type of quantum nonlocality that is logically distinct from both nonseparability and Bell nonlocality. In the bipartite setting, it hinges on the question of whether Alice can affect Bob's state at a distance through her choice of measurement. More precisely and operationally, it hinges on the question of whether Alice, with classical communication, can convince Bob that they share an entangled state under the circumstances that Bob trusts nothing that Alice says. We argue that if she can, then this demonstrates the nonlocal effect first identified in the famous Einstein-Podolsky-Rosen paper [Phys. Rev. 47, 777 (1935)] as a universal effect for pure entangled states. This ability of Alice to remotely prepare Bob's state was subsequently called steering by Schroedinger, whose terminology we adopt. The phenomenon of steering has been largely overlooked, and prior to our work had not even been given a rigorous definition that is applicable to mixed states as well as pure states. Armed with our rigorous definition, we proved that steerable states are a strict subset of the entangled states, and a strict superset of the states that can exhibit Bell nonlocality. In this work we expand on these results and provide further examples of steerable states. We also elaborate on the connection with the original EPR paradox

  4. 78 FR 35094 - Denial of Motor Vehicle Defect Petition, DP12-001

    Science.gov (United States)

    2013-06-11

    ... final drive unit on BMW K1200LT .'' FOR FURTHER INFORMATION CONTACT: Bob Young, Office of Defects... flawed assembly controls of the final drive unit on BMW K1200LT '' and to require BMW to ``recall the.... Cimino, requesting NHTSA to investigate repeated final drive bearing failure on certain BMW K1200LT...

  5. Teach Kids about Numbers All around Us

    Science.gov (United States)

    Hudson, Hannah Trierweiler

    2011-01-01

    Recognizing the role numbers play in people's everyday lives is crucial to students' math understanding now and down the road. That's why Bob Krech, a curriculum specialist in New Jersey's West Windsor-Plainsboro district, likes to teach a lesson he calls "Numbers All Around Us." This lesson uses real-world examples to show that numbers help…

  6. Experimental realization of counterfactual quantum cryptography

    International Nuclear Information System (INIS)

    In counterfactual quantum key distribution (CQKD) information is transferred, in a secure way, between Alice and Bob even when no particle carrying the information is in fact transmitted between them. In this letter we fully implement the scheme for CQKD proposed in [1], demonstrating for the first time that information can be transmitted between two parties without the transmission of a carrier

  7. Ellerhein tegi ajalugu! / Kaie Tanner

    Index Scriptorium Estoniae

    Tanner, Kaie, 1975-

    2009-01-01

    XI rahvusvahelisest koorifestivalist Tallinn 2009. Festivalimuljetest ka Grand Prix võitnud tütarlastekoori Ellerhein dirigent Tiia-Ester Loitme, festivali kunstiline juht Aarne Saluveer, žürii esimees Bob Chilcott ja žürii liige Mikk Üleoja. Konkursi tulemused

  8. The Highly Engaged School: A Successful Model for Professional Development

    Science.gov (United States)

    Meyer, Bob

    2015-01-01

    Author Bob Meyer, head of the Fay School (Texas) compares professional development strategies in his school to programs in other schools, which he feels are mostly prescriptive in nature, and are based on a deficit model--focused on fixing, rather than developing--and, thus, are not always inspiring. Here Meyer describes the professional…

  9. Analysis of Pendulum Period with an iPod Touch/iPhone

    Science.gov (United States)

    Briggle, Justin

    2013-01-01

    We describe the use of Apple's iPod touch/iPhone, acting as the pendulum bob, as a means of measuring pendulum period, making use of the device's three-axis digital accelerometer and the freely available SPARKvue app from PASCO scientific. The method can be readily incorporated into an introductory physics laboratory experiment.…

  10. 76 FR 24523 - Sun & Lake Pharmacy, Inc.; D/B/A the Medicine Shoppe; Revocation of Registration

    Science.gov (United States)

    2011-05-02

    ... (quoting Bob's Pharmacy & Diabetic Supplies, 74 FR 19599, 19601 (2009); United Prescriptions Servs., Inc., 72 FR 50397, 50408 (2007)). Moreover, the ALJ also cited Agency precedent that, under the CSA, ``a... the Internet, 66 FR 21181 (2001), which explained four widely accepted elements for establishing...

  11. Sõltumatud suurused / Märt Milter

    Index Scriptorium Estoniae

    Milter, Märt

    1999-01-01

    Uute heliuplaatide Beulah "When Your Heartstrings Break", Wisdom Of Harry "Stars Of Super 8", Bardo Pont "Set And Setting", Manatee "Easy", Whispering Bob "Don"t Bring Me Down", Dustball "Like Monkeys Do", Calc "Not Involved", Ronnie Spector "She Talks To Rainbows EP" Everything But The Girl "Five Fathoms", GusGus "This Is Normal", Groove Armada "Vertigo", "DJ-Kicks" tutvustus

  12. The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks

    CERN Document Server

    Svozil, K

    2005-01-01

    The feasibility of the interlock protocol to prevent against man-in-the-middle attacks on quantum cryptography is discussed. If an eavesdropper succeeds to compromise the quantum as well as the classical channels and mimicks the receiver "Bob" for the sender "Alice" and vice versa, one defense strategy not requiring authentication is the successive, temporally interlocked partial transmission of the entire encrypted message.

  13. The Man-in-the-Middle Defence

    Science.gov (United States)

    Anderson, Ross

    The man-in-the-middle defence is all about rehabilitating Charlie. For 20 years we’ve worried about this guy in the middle, Charlie, who’s forever intercalating himself into the communications between Alice and Bob, and people have been very judgemental about poor Charlie, saying that Charlie is a wicked person. Well, we’re not entirely convinced.

  14. Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

    OpenAIRE

    Svozil, Karl

    2005-01-01

    If an eavesdropper succeeds in compromising the quantum as well as the classical channels and mimics the receiver "Bob" for the sender "Alice" and vice versa, one defence strategy is the successive, temporally interlocked partial transmission of the entire encrypted message.

  15. Linking Indian rivers vs Bay of Bengal monsoon Activity

    Digital Repository Service at National Institute of Oceanography (India)

    Rajamani, V.; Mohanty, U.C.; Ramesh, R.; Bhat, G.S.; Vinayachandran, P.N.; Sengupta, D.; PrasannaKumar, S.; Kolli, R.K.

    was arranged for a focused discussion on the followi ng: If the pr o posed river linkages were to r e duce the total annual run - off into the BOB or the rate at which run - off is r e leased into it, then do river linkages have any significant...

  16. Putting Big Data to Work: Community Colleges Use Detailed Reports to Design Smarter Workforce Training and Education Programs

    Science.gov (United States)

    Woods, Bob

    2013-01-01

    In this article, Bob Woods reports that "Big data" is all the rage on college campuses, and it makes sense that administrators would use what they know to boost student outcomes. Woods points out that community colleges around the country are using the data: (1) to guide the systematic expansion of its curriculum, providing targeted…

  17. Extremely large anthropogenic-aerosol contribution to total aerosol load over the Bay of Bengal during winter season

    Directory of Open Access Journals (Sweden)

    D. G. Kaskaoutis

    2011-07-01

    Full Text Available Ship-borne observations of spectral aerosol optical depth (AOD have been carried out over the entire Bay of Bengal (BoB as part of the W-ICARB cruise campaign during the period 27 December 2008–30 January 2009. The results reveal a pronounced temporal and spatial variability in the optical characteristics of aerosols mainly due to anthropogenic emissions and their dispersion controlled by local meteorology. The highest aerosol amount, with mean AOD500>0.4, being even above 1.0 on specific days, is found close to the coastal regions in the western and northern parts of BoB. In these regions the Ångström exponent is also found to be high (~1.2–1.25 indicating transport of strong anthropogenic emissions from continental regions, while very high AOD500 (0.39±0.07 and α380–870 values (1.27±0.09 are found over the eastern BoB. Except from the large α380–870 values, an indication of strong fine-mode dominance is also observed from the AOD curvature, which is negative in the vast majority of the cases, suggesting dominance of an anthropogenic-pollution aerosol type. On the other hand, clean maritime conditions are rather rare over the region, while the aerosol types are further examined through a classification scheme based on the relationship between α and dα. It was found that even for the same α values the fine-mode dominance is larger for higher AODs showing the strong continental influence over the marine environment of BoB. Furthermore, there is also an evidence of aerosol-size growth under more turbid conditions indicative of coagulation and/or humidification over specific BoB regions. The results obtained using OPAC model show significant fraction of soot aerosols (~6 %–8 % over the eastern and northwestern BoB, while coarse-mode sea salt particles are found to dominate in the southern parts of BoB.

  18. Quantum authentication based on the randomness of measurement bases in BB84

    International Nuclear Information System (INIS)

    Full text: The establishment of a secret key between two legitimate end points of a communication link, let us name them Alice and Bob, using Quantum key distribution (QKD) is unconditionally secure thanks to Quantum Physics laws.However, the various QKD protocols do not intend to provide the authentication of the end points: Alice cannot be sure that she is communicating with Bob and reciprocally. Therefore, these protocols are subjects to various attacks. The most obvious attack is the man-in-the-middle attack in which an eavesdropper, let us name her Eve, stands in the middle of the communication link. Alice communicates with Eve meanwhile she thinks she communicate with Bob. And Bob communicates with Eve meanwhile he thinks he is communicating with Alice. Eve, acting as a relay, can read all the communications between Alice and Bob and retransmit them. To prevent this kind of attack, the solution is to authenticate the two end points of the communication link. One solution is that Alice and Bob share an authentication key prior to the communication. In order to improve the security, Alice and Bob must share a set of authentication one-time keys. One-time key means that the key has to be used only once because each time a key is used, the eavesdropper Eve can gain a few information on the key. Re-using the same key many times would finally reveal the key to Eve. However, Eve can simulate many times the authentication process with Alice. Each time Eve simulates the authentication process, one of the pre-positioned keys is depleted leading to the exhaustion of the set of pre-positioned keys. This type of attack is named Denial of Service attack. In this work, we propose to use the randomness of the measurement bases in BB84 to build an authentication scheme based on the existence of a prepositioned authentication key. This authentication scheme can be used with BB84 but also with any other Quantum Key Distribution protocols. It is protected against the Denial of

  19. ASYMMETRIC-LEAVES2 and an ortholog of eukaryotic NudC domain proteins repress expression of AUXIN-RESPONSE-FACTOR and class 1 KNOX homeobox genes for development of flat symmetric leaves in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Nanako Ishibashi

    2012-01-01

    Leaf primordia form around the shoot apical meristem, which consists of indeterminate stem cells. Upon initiation of leaf development, adaxial-abaxial patterning is crucial for appropriate lateral expansion, via cellular proliferation, and the formation of flat symmetric leaves. Many genes that specify such patterning have been identified, but regulation by upstream factors of the expression of relevant effector genes remains poorly understood. In Arabidopsis thaliana, ASYMMETRIC LEAVES2 (AS2 and AS1 play important roles in repressing transcription of class 1 KNOTTED1-like homeobox (KNOX genes and leaf abaxial-determinant effector genes. We report here a mutation, designated enhancer of asymmetric leaves2 and asymmetric leaves1 (eal, that is associated with efficient generation of abaxialized filamentous leaves on the as2 or as1 background. Levels of transcripts of many abaxial-determinant genes, including ETTIN (ETT/AUXIN RESPONSE FACTOR3 (ARF3, and all four class 1 KNOX genes were markedly elevated in as2 eal shoot apices. Rudimentary patterning in as2 eal leaves was suppressed by the ett mutation. EAL encodes BOBBER1 (BOB1, an Arabidopsis ortholog of eukaryotic NudC domain proteins. BOB1 was expressed in plant tissues with division potential and bob1 mutations resulted in lowered levels of transcripts of some cell-cycle genes and decreased rates of cell division in shoot and root apices. Coordinated cellular proliferation, supported by BOB1, and repression of all class 1 KNOX genes, ETT/ARF3 by AS2 (AS1 and BOB1 might be critical for repression of the indeterminate state and of aberrant abaxialization in the presumptive adaxial domain of leaf primordia, which might ensure the formation of flat symmetric leaves.

  20. The role of ENSO and MJO on rapid intensification of tropical cyclones in the Bay of Bengal during October-December

    Science.gov (United States)

    Girishkumar, M. S.; Suprit, K.; Vishnu, S.; Prakash, V. P. Thanga; Ravichandran, M.

    2015-05-01

    The influence of El Niño/Southern Oscillation (ENSO) and Madden-Julian Oscillation (MJO) and their combined effect on the rapid intensification (RI) of tropical cyclones (TCs) in the Bay of Bengal (BoB) during the primary cyclone season (October-December) is investigated. An empirical index, called genesis potential index (GPI), is used to quantify the relative importance of four environmental parameters responsible for the modulation of TCs characteristics. The analysis shows that TC frequency and RI of TC's is higher in La Niña than El Niño regime during the primary TC season in the BoB. The combined effect of enhancement (reduction) in mid-tropospheric humidity (primary factor) and relative vorticity (secondary factor) played a major role in the enhancement (reduction) of the TC activity under La Niña (El Niño) regime. In addition, when the MJO is active over the BoB (phases 3-4; characterized by enhanced convective activity in the BoB) under La Niña regime, environmental conditions were more conducive for enhancement of TC activity and RI of TCs compared to corresponding MJO phase under El Niño regime. Increase in mid-tropospheric humidity and reduction in vertical wind shear were identified as the primary and secondary factors enhancing the likelihood of RI of TCs in the BoB during phases 3-4 of MJO under La Niña regime. Further, the role of accumulated tropical cyclone heat potential (ATCHP) on the RI of TC during primary TC season is also investigated. Our analysis demonstrates that ATCHP is large for TCs which undergo RI compared to TCs not undergoing RI.

  1. Possible role of pre-monsoon sea surface warming in driving the summer monsoon onset over the Bay of Bengal

    Science.gov (United States)

    Li, Kuiping; Liu, Yanliang; Yang, Yang; Li, Zhi; Liu, Baochao; Xue, Liang; Yu, Weidong

    2016-08-01

    Sea surface temperature (SST) reaches its annual maximum just before the summer monsoon onset and collapses soon after in the central areas of the Bay of Bengal (BoB). Here, the impact of the peak in the pre-monsoon SST on triggering the earliest monsoon onset in the BoB is investigated, with a focus on the role they play in driving the first-branch northward-propagating intra-seasonal oscillations (FNISOs) over the equatorial Eastern Indian Ocean (EIO). During the calm pre-monsoon period, sea surface warming in the BoB could increase the surface equivalent potential temperature (θe) in several ways. Firstly, warming of the sea surface heats the surface air through sensible heating, which forces the air temperature to follow the SST. The elevated air surface temperature accounts for 30 % of the surface θe growth. Furthermore, the elevated air temperature raises the water vapor capacity of the surface air to accommodate more water vapor. Constrained by the observation that the surface relative humidity is maintained nearly constant during the monsoon transition period, the surface specific humidity exhibits a significant increase, according to the Clausius-Clapeyron relationship. Budget analysis indicates that the additional moisture is primarily obtained from sea surface evaporation, which also exhibits a weak increasing trend due to the sea surface warming. In this way, it contributes about 70 % to the surface θe growth. The rapid SST increase during the pre-monsoon period preconditions the summer monsoon onset over the BoB through its contributions to significantly increase the surface θe, which eventually establishes the meridional asymmetry of the atmospheric convective instability in the EIO. The pre-established greater convective instability leads to the FNISO convections, and the summer monsoon is triggered in the BoB region.

  2. Oligo(ethylene glycol)-functionalized disiloxanes as electrolytes for lithium-ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhengcheng; Dong, Jian; Amine, Khalil [Chemical Sciences and Engineering Division, Argonne National Laboratory, 9700 South Cass Avenue, Argonne, IL 60439 (United States); West, Robert [Organosilicon Research Center, Department of Chemistry, University of Wisconsin-Madison, 1101 University Avenue, Madison, WI 53706 (United States)

    2010-09-15

    Functionalized disiloxane compounds were synthesized by attaching oligo(ethylene glycol) chains, -(CH{sub 2}CH{sub 2}O)-{sub n}, n = 2-7, via hydrosilation, dehydrocoupling, and nucleophilic substitution reactions and were examined as non-aqueous electrolyte solvents in lithium-ion cells. The compounds were fully characterized by {sup 1}H, {sup 13}C, and {sup 29}Si nuclear magnetic resonance (NMR) spectroscopy. Upon doping with lithium bis(oxalato)borate (LiBOB) or LiPF{sub 6}, the disiloxane electrolytes showed conductivities up to 6.2 x 10{sup -4} S cm{sup -1} at room temperature. The thermal behavior of the electrolytes was studied by differential scanning calorimetry, which revealed very low glass transition temperatures before and after LiBOB doping and much higher thermal stability compared to organic carbonate electrolytes. Cyclic voltammetry measurements showed that disiloxane-based electrolytes with 0.8 M LiBOB salt concentration are stable to 4.7 V. The LiBOB/disiloxane combinations were found to be good electrolytes for lithium-ion cells; unlike LiPF{sub 6}, LiBOB can provide a good passivation film on the graphite anode. The LiPF{sub 6}/disiloxane electrolyte was enabled in lithium-ion cells by adding 1 wt% vinyl ethylene carbonate (VEC). Full cell performance tests with LiNi{sub 0.80}Co{sub 0.15}Al{sub 0.05}O{sub 2} as the cathode and mesocarbon microbead (MCMB) graphite as the anode show stable cyclability. The results demonstrate that disiloxane-based electrolytes have considerable potential as electrolytes for use in lithium-ion batteries. (author)

  3. An integrated campaign for investigation of winter-time continental haze over Indo-Gangetic Basin and its radiative effects

    Energy Technology Data Exchange (ETDEWEB)

    Das, Sanat Kumar, E-mail: sanatkrdas@gmail.com [Environmental Sciences Section, Bose Institute, Kolkata (India); Center for Astroparticle Physics and Space Science, Bose Institute, Kolkata (India); Chatterjee, Abhijit [Environmental Sciences Section, Bose Institute, Kolkata (India); Center for Astroparticle Physics and Space Science, Bose Institute, Kolkata (India); National Facility on Astroparticle Physics and Space Science, Darjeeling (India); Ghosh, Sanjay K. [Center for Astroparticle Physics and Space Science, Bose Institute, Kolkata (India); National Facility on Astroparticle Physics and Space Science, Darjeeling (India); Raha, Sibaji [Environmental Sciences Section, Bose Institute, Kolkata (India); Center for Astroparticle Physics and Space Science, Bose Institute, Kolkata (India); National Facility on Astroparticle Physics and Space Science, Darjeeling (India)

    2015-11-15

    An outflow of continental haze occurs from Indo-Gangetic Basin (IGB) in the North to Bay of Bengal (BoB) in the South. An integrated campaign was organized to investigate this continental haze during December 2013–February 2014 at source and remote regions within IGB to quantify its radiative effects. Measurements were carried out at three locations in eastern India; 1) Kalas Island, Sundarban (21.68°N, 88.57°E) — an isolated island along the north-east coast of BoB, 2) Kolkata (22.57°N, 88.42°E) — an urban metropolis and 3) Siliguri (26.70°N, 88.35°E) — an urban region at the foothills of eastern Himalayas. Ground-based AOD (at 0.5 μm) is observed to be maximum (1.25 ± 0.18) over Kolkata followed by Siliguri (0.60 ± 0.17) and minimum over Sundarban (0.53 ± 0.18). Black carbon concentration is found to be maximum at Kolkata (21.6 ± 6.6 μg·m{sup −3}) with almost equal concentrations at Siliguri (12.6 ± 5.2 μg·m{sup −3}) and Sundarban (12.3 ± 3.0 μg·m{sup −3}). Combination of MODIS-AOD and back-trajectories analysis shows an outflow of winter-time continental haze originating from central IGB and venting out through Sundarban towards BoB. This continental haze with high extinction coefficient is identified up to central BoB using CALIPSO observations and is found to contribute ~ 75% to marine AOD over central BoB. This haze produces significantly high aerosol radiative forcing within the atmosphere over Kolkata (75.4 Wm{sup −2}) as well as over Siliguri and Sundarban (40 Wm{sup −2}) indicating large forcing over entire IGB, from foothills of the Himalayas to coastal region. This winter-time continental haze also causes about similar radiative heating (1.5 K·day{sup −1}) from Siliguri to Sundarban which is enhanced over Kolkata (3 K·day{sup −1}) due to large emission of local urban aerosols. This high aerosol heating over entire IGB and coastal region of BoB can have considerable impact on the monsoonal circulation and more

  4. An integrated campaign for investigation of winter-time continental haze over Indo-Gangetic Basin and its radiative effects

    International Nuclear Information System (INIS)

    An outflow of continental haze occurs from Indo-Gangetic Basin (IGB) in the North to Bay of Bengal (BoB) in the South. An integrated campaign was organized to investigate this continental haze during December 2013–February 2014 at source and remote regions within IGB to quantify its radiative effects. Measurements were carried out at three locations in eastern India; 1) Kalas Island, Sundarban (21.68°N, 88.57°E) — an isolated island along the north-east coast of BoB, 2) Kolkata (22.57°N, 88.42°E) — an urban metropolis and 3) Siliguri (26.70°N, 88.35°E) — an urban region at the foothills of eastern Himalayas. Ground-based AOD (at 0.5 μm) is observed to be maximum (1.25 ± 0.18) over Kolkata followed by Siliguri (0.60 ± 0.17) and minimum over Sundarban (0.53 ± 0.18). Black carbon concentration is found to be maximum at Kolkata (21.6 ± 6.6 μg·m−3) with almost equal concentrations at Siliguri (12.6 ± 5.2 μg·m−3) and Sundarban (12.3 ± 3.0 μg·m−3). Combination of MODIS-AOD and back-trajectories analysis shows an outflow of winter-time continental haze originating from central IGB and venting out through Sundarban towards BoB. This continental haze with high extinction coefficient is identified up to central BoB using CALIPSO observations and is found to contribute ~ 75% to marine AOD over central BoB. This haze produces significantly high aerosol radiative forcing within the atmosphere over Kolkata (75.4 Wm−2) as well as over Siliguri and Sundarban (40 Wm−2) indicating large forcing over entire IGB, from foothills of the Himalayas to coastal region. This winter-time continental haze also causes about similar radiative heating (1.5 K·day−1) from Siliguri to Sundarban which is enhanced over Kolkata (3 K·day−1) due to large emission of local urban aerosols. This high aerosol heating over entire IGB and coastal region of BoB can have considerable impact on the monsoonal circulation and more importantly, such haze transported over to

  5. Obituary: Robert C. Bless (1927 - 2015)

    Science.gov (United States)

    Surrounded by his loving family, Robert Charles Bless died at home on November 29th, three days before his 88th birthday. He was born in Ithaca, NY on Dec. 3, 1927 to a Russian father, Arthur Aaron Bless, and a French mother, Eva Chantrell Bless. Bob spent many summers on the family farm in the South of France, where he gained a great pride and joy in his French heritage, large extended family, and mother tongue. As a child growing up in Gainesville, FL, Bob's first job was snake wrangling, earning 10 cents per foot, with an added bonus for the more venomous species. Young Robbie took daily adventures in the Florida woods and swamps, armed only with pockets full of pecans and oranges. He enjoyed spending time at the family's lake cabin, where he learned to sail and helped his father plant acres of trees to grow their timber plantation. As a first generation immigrant, Bob's father received a PhD in physics, which inspired Bob to pursue an extensive educational route in astrophysics. Bob excelled in academics, graduating high school at the age of 16 and the University of Florida (B.Sc.) at 19. His path to graduate school was interrupted by a diagnosis of tuberculosis that forced him into a Florida sanitorium for one year. During this time, Bob made the most of what he described as the most dismal part of life by advocating for patient rights, initiating an inter-sanitorium newsletter, and gaining skills and experience in community organization and leadership - qualities that would later inform his leadership in academe. After being one of the first successfully treated tuberculosis patients in the US, Bob went on to earn a M.Sc. from Cornell University, and received his PhD degree in Astronomy from the University of Michigan in 1958. That same year, Bob joined the staff of the Astronomy Department of the University of Wisconsin (UW), Madison. It was there that Bob met Diane McQueen. Despite Bob's Dodge Dart and what has been described as the worst first date in

  6. Application of Boron-Based Lithium Salt for Li-Ion Battery%硼基锂盐电解质在锂离子电池中的应用

    Institute of Scientific and Technical Information of China (English)

    仇卫华; 阎坤; 连芳; 乔亚非

    2011-01-01

    Electrolyte is considered as one of the key materials to decide the performance of Li-ion batteries.Novel boron-based lithium salts have attracted people' s interests because of its varieties and environmental-friendly property. Lithium bis(oxalato) borate (LiBOB) , as one of boron-based lithium salts, is believed to be a candidate for commercial LiPF6 due to its good film-forming property and high thermal stability. In the paper, the new development of boron-based lithium salts is introduced, and LiBOB is also evaluated as lithium salt of electrolyte for Li-ion battery. The main influencing factors of LiBOB-based electrolyte are summarized. Especially, it has focused on the compatibility of LiBOB-based electrolyte with anode and metal oxide cathode. The application of LiBOBbased polymer electrolyte and LiBOB plastic chip electrolyte are introduced.%电解质材料是锂离子电池的关键材料之一,它直接影响电池的性能.新型硼酸锂盐由于种类繁多且环境友好而越来越引起人们的重视.双草酸硼酸锂(LiBOB)是一种新型的锂盐,具有很好的成膜性能和热稳定性,是一种很有潜力替代现有商品化锂盐LiPF6的物质.本文介绍了近期新型硼基锂盐的发展状况,归纳了LiBOB基电解质的研究概况,综述了影响LiBOB基电解质的因素,讨论了LiBOB与正负极材料的相容性,并对LiBOB基聚合物电解质和LiBOB塑晶电解质的应用进行了介绍.

  7. Seasonal forecasting of tropical cyclogenesis over the North Indian Ocean

    Science.gov (United States)

    Pattanaik, D. R.; Mohapatra, M.

    2016-03-01

    Over the North Indian Ocean (NIO) and particularly over the Bay of Bengal (BoB), the post-monsoon season from October to December (OND) are known to produce tropical cyclones, which cause damage to life and property over India and many neighbouring countries. The variability of frequency of cyclonic disturbances (CDs) during OND season is found to be associated with variability of previous large-scale features during monsoon season from June to September, which is used to develop seasonal forecast model of CDs frequency over the BoB and NIO based on principal component regression (PCR). Six dynamical/thermodynamical parameters during previous June-August, viz., (i) sea surface temperature (SST) over the equatorial central Pacific, (ii) sea level pressure (SLP) over the southeastern equatorial Indian Ocean, (iii) meridional wind over the eastern equatorial Indian Ocean at 850 hPa, (iv) strength of upper level easterly, (v) strength of monsoon westerly over North Indian Ocean at 850 hPa, and (vi) SST over the northwest Pacific having significant and stable relationship with CDs over BoB in subsequent OND season are used in PCR model for a training period of 40 years (1971-2010) and the latest four years (2011-2014) are used for validation. The PCR model indicates highly significant correlation coefficient of 0.77 (0.76) between forecast and observed frequency of CD over the BoB (NIO) for the whole period of 44 years and is associated with the root mean square error and mean absolute error ≤ 1 CD. With respect to the category forecast of CD frequency over BoB and NIO, the Hit score is found to be about 63% and the Relative Operating Curves (ROC) for above and below normal forecast is found to be having much better forecast skill than the climatology. The PCR model performs very well, particularly for the above and below normal CD year over the BoB and the NIO, during the test period from 2011 to 2014.

  8. EDITORIAL: Stability and nonlinear dynamics of plasmas: A symposium celebrating Professor Robert Dewar's accomplishments in plasma physics Stability and nonlinear dynamics of plasmas: A symposium celebrating Professor Robert Dewar's accomplishments in plasma physics

    Science.gov (United States)

    Bhattacharjee, Amitava

    2012-01-01

    To celebrate Professor Robert Dewar's 65th birthday, a Symposium was held on 31 October 2009 in Atlanta, Georgia, just before the 51st Annual Meeting of the Division of Plasma Physics of the American Physical Society. The Symposium was attended by many of Bob's colleagues, friends, postdoctoral colleagues and students (present and former). Boyd Blackwell, Anthony Cooper, Chris Hegna, Stuart Hudson, John Krommes, Alexander Pletzer, Ellen Zweibel, and I gave talks that covered various aspects of Bob's wide-ranging scholarship, and his leadership in the Australian and the US fusion program. At the Symposium, Bob gave an insightful talk, published in this issue as a paper with D Leykam. This paper makes available for the first time unpublished results from Bob's M Sc Thesis on a general method for calculating the potential around a `dressed' test particle in an isotropic and collisionless plasma. The paper is interesting not only because it provides a glimpse of the type of elegant applied mathematics that we have come to associate with Bob, but also because he discusses some leitmotifs in his intellectual evolution since the time he was a graduate student at the University of Melbourne and Princeton University. Through his early encounter with quantum field theory, Bob appreciated the power of Lagrangian and Hamiltonian formalisms, which he used with great effectiveness in nonlinear dynamics and plasma physics. A question that animates much of his work is one that underlies the `dressed' particle problem: if one is given a Hamiltonian with an unperturbed (or `bare') part and an interaction part, how is one to obtain a canonical transformation to `the oscillation centre' thatwould reduce the interaction part to an irreducible residual part while incorporating the rest in a renormalized zeroth-order Hamiltonian? One summer in Princeton, I worked with Bob on a possible variational formulation for this problem, and failed. I was daunted enough by my failure that I turned

  9. Tributes to Professor Robert Berkley Harper

    Directory of Open Access Journals (Sweden)

    Carl G. Cooper

    2004-04-01

    Full Text Available In 1977, I began teaching at The University of Pittsburgh Law School and in short order one of my closest friends during my tenure there was Professor Robert “Bob” Harper. I wondered when I was hired whether I was selected because I looked strikingly similar to Bob, and perhaps the faculty thought my favoring Professor Harper would make my assimilation into the law school faculty that much easier. Students constantly called me Professor Harper and, indeed, many on the faculty called me Bob for several years; I never bothered to correct them. I thought if they paid that little attention to detail in law school, I would just let them go through life missing some of the finer points their education, and life for that matter, has to offer.

  10. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    Science.gov (United States)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  11. Noise effect on fidelity of two-qubit teleportation

    International Nuclear Information System (INIS)

    We investigate the effect of noise on a class of four-qubit entangled channels for two-qubit teleportation from Alice to Bob. These entangled channels include both parallel Bell pairs and inseparable channels with genuine multipartite entanglement. For the situation where only Bob's share of the entangled channel is subject to decoherence, we show by deriving a general expression for the teleported state that teleportation using noisy inseparable channels is equivalent to teleportation using noisy Bell pairs. When Alice's qubits are also subject to noise, we find that the inseparable channels never give a higher teleportation fidelity than Bell pairs, even in the presence of collective noise. Our results can shed some light on practical two-qubit teleportation.

  12. Bidirectional controlled teleportation by using nine-qubit entangled state in noisy environments

    Science.gov (United States)

    Li, Yuan-hua; Jin, Xian-min

    2016-02-01

    A theoretical scheme is proposed to implement bidirectional quantum controlled teleportation (BQCT) by using a nine-qubit entangled state as a quantum channel, where Alice may transmit an arbitrary two-qubit state called qubits A_1 and A_2 to Bob; and at the same time, Bob may also transmit an arbitrary two-qubit state called qubits B_1 and B_2 to Alice via the control of the supervisor Charlie. Based on our channel, we explicitly show how the bidirectional quantum controlled teleportation protocol works. And we show this bidirectional quantum controlled teleportation scheme may be determinate and secure. Taking the amplitude-damping noise and the phase-damping noise as typical noisy channels, we analytically derive the fidelities of the BQCT process and show that the fidelities in these two cases only depend on the amplitude parameter of the initial state and the decoherence noisy rate.

  13. Notes on teleportation in an expanding space

    Energy Technology Data Exchange (ETDEWEB)

    Feng, Jun, E-mail: tsunfeng@iphy.ac.cn [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Yang, Wen-Li [Institute of Modern Physics, Northwest University, Xian 710069 (China); Zhang, Yao-Zhong [School of Mathematics and Physics, The University of Queensland, Brisbane, QLD 4072 (Australia); Fan, Heng, E-mail: hfan@iphy.ac.cn [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China)

    2013-02-26

    We investigate the quantum teleportation between a conformal detector Alice and an inertial detector Bob in de Sitter space in two schemes, (i) one uses free scalar modes and (ii) one utilizes cavity to store qubit. We show that the fidelity of the teleportation is degraded for Bob in both cases. While the fidelity-loss is due to the Gibbons–Hawking effect associated with his cosmological horizon in the scheme (i), the entanglement decreases in the scheme (ii) because the ability to entangle the cavities is reduced by the spacetime curvature. With a cutoff at Planck-scale, comparing with the standard Bunch–Davies choice, we also show that the possible Planckian physics cause extra modifications to the fidelity of the teleportation protocol in both schemes.

  14. Quantum duel revisited

    International Nuclear Information System (INIS)

    We revisit the quantum two-person duel. In this problem, both Alice and Bob each possess a spin-1/2 particle which models dead and alive states for each player. We review the Abbott and Flitney result—now considering non-zero α1 and α2 in order to decide if it is better for Alice to shoot or not the second time—and we also consider a duel where players do not necessarily start alive. This simple assumption allows us to explore several interesting special cases, namely how a dead player can win the duel shooting just once, or how can Bob revive Alice after one shot, and the better strategy for Alice—being either alive or in a superposition of alive and dead states—fighting a dead opponent. (paper)

  15. An Efficient Scheme for Multiparty Multi-particle State Sharing

    International Nuclear Information System (INIS)

    We present an efficient scheme for sharing an arbitrary m-qubit state with n agents. In our scheme, the sender Alice first shares m Bell states with the agent Bob, who is designated to recover the original m-qubit state. Furthermore, Alice introduces n - 1 auxiliary particles in the initial state |0), applies Hadamard (H) gate and Controlled-Not (CNOT) gate operations on the particles, which make them entangled with one of m particle pairs in Bell states, and then sends them to the controllers (i.e., other n - 1 agents), where each controller only holds one particle in hand. After Alice performing m Bell-basis measurements and each controller a single-particle measurement, the recover Bob can obtain the original unknown quantum state by applying the corresponding local unitary operations on his particles. Its intrinsic efficiency for qubits approaches 100%, and the total efficiency really approaches the maximal value. (general)

  16. Detecting genuine multipartite entanglement in steering scenarios

    Science.gov (United States)

    Jebaratnam, C.

    2016-05-01

    Einstein-Podolsky-Rosen (EPR) steering is a form of quantum nonlocality which is intermediate between entanglement and Bell nonlocality. EPR steering is a resource for quantum key distribution that is device independent on only one side in that it certifies bipartite entanglement when one party's device is not characterized while the other party's device is fully characterized. In this work, we introduce two types of genuine tripartite EPR steering, and derive two steering inequalities to detect them. In a semi-device-independent scenario where only the dimensions of two parties are assumed, the correlations which violate one of these inequalities also certify genuine tripartite entanglement. It is known that Alice can demonstrate bipartite EPR steering to Bob if and only if her measurement settings are incompatible. We demonstrate that quantum correlations can also detect tripartite EPR steering from Alice to Bob and Charlie, even if Charlie's measurement settings are compatible.

  17. Measurement of marine productivity using 15N and 13C tracers: Some methodological aspects

    Indian Academy of Sciences (India)

    Naveen Gandhi; Sanjeev Kumar; S Prakash; R Ramesh; M S Sheshshayee

    2011-02-01

    Various experiments involving the measurement of new, regenerated and total productivity using 15N and 13C tracers were carried out in the Bay of Bengal (BOB) and in the Arabian Sea. Results from 15N tracer experiments indicate that nitrate uptake can be underestimated by experiments with incubation time > 4 hours. Indirect evidence suggests pico- and nano-phytoplankton, on their dominance over microphytoplankton, can also influence the f-ratios. Difference in energy requirement for assimilation of different nitrogen compounds decides the preferred nitrogen source during the early hours of incubation. Variation in light intensity during incubation also plays a significant role in the assimilation of nitrogen. Results from time course experiments with both 15N and 13C tracers suggest that photoinhibition appears significant in BOB and the Arabian Sea during noon. A significant correlation has been found in the productivity values obtained using 15N and 13C tracers.

  18. Démonstration expérimentale d'une distribution quantique de clé par codage temporel

    Science.gov (United States)

    Boucher, W.; Debuisschert, T.

    2006-10-01

    Nous avons démontré expérimentalement la transmission quantique de clé par codage temporel. Alice envoie des impulsions cohérentes atténuées. La clé est codée dans l'instant de détection des photons chez Bob. Une mesure de la durée de cohérence par moyen interférométrique permet d'assurer un fonctionnement en régime quantique. Nous avons mesuré un taux d'erreur quantique de 3.3% et une chute relative de contraste de l'interféromètre de 8.4%. Ces valeurs permettent d'évaluer un avantage d'information de 0.49 bit/impulsion pour Alice et Bob par rapport à un espion éventuel.

  19. Secure quantum communication using classical correlated channel

    Science.gov (United States)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-07-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  20. An Error Probability Approach to MIMO Wiretap Channels

    CERN Document Server

    Belfiore, Jean-Claude

    2011-01-01

    We consider MIMO (Multiple Input Multiple Output) wiretap channels, where a legitimate transmitter Alice is communicating with a legitimate receiver Bob in the presence of an eavesdropper Eve, and communication is done via MIMO channels. We suppose that Alice's strategy is to use a codebook which has a lattice structure, which then allows her to perform coset encoding. We analyze Eve's probability of correctly decoding the message Alice meant to Bob, and from minimizing this probability, we derive a code design criterion for MIMO lattice wiretap codes. The case of block fading channels is treated similarly, and fast fading channels are derived as a particular case. The Alamouti code is carefully studied as an illustration of the analysis provided.

  1. Finding order in complexity: themes from the career of Dr. Robert F. Wagner

    Science.gov (United States)

    Myers, Kyle J.

    2009-02-01

    Over the course of his long and productive career, Dr. Robert F. Wagner built a framework for the evaluation of imaging systems based on a task-based, decision theoretic approach. His most recent contributions involved the consideration of the random effects associated with multiple readers of medical images and the logical extension of this work to the problem of the evaluation of multiple competing classifiers in statistical pattern recognition. This contemporary work expanded on familiar themes from Bob's many SPIE presentations in earlier years. It was driven by the need for practical solutions to current problems facing FDA'S Center for Devices and Radiological Health and the medical imaging community regarding the assessment of new computer-aided diagnosis tools and Bob's unique ability to unify concepts across a range of disciplines as he gave order to increasingly complex problems in our field.

  2. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known...... as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. Device-independent two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We...

  3. Timelike information broadcasting in cosmology

    CERN Document Server

    Blasco, Ana; Martin-Benito, Mercedes; Martin-Martinez, Eduardo

    2015-01-01

    We study the transmission of information and correlations through quantum fields in cosmological backgrounds. With this aim, we make use of quantum information tools to quantify the classical and quantum correlations induced by a quantum massless scalar field in two particle detectors, one located in the early universe (Alice's) and the other located at a later time (Bob's). In particular, we focus on two phenomena: a) the consequences on the transmission of information of the violations of the strong Huygens principle for quantum fields, and b) the analysis of the field vacuum correlations via correlation harvesting from Alice to Bob. We will study a standard cosmological model first and then assess whether these results also hold if we use other than the general relativistic dynamics. As a particular example, we will study the transmission of information through the Big Bounce, that replaces the Big Bang, in the effective dynamics of Loop Quantum Cosmology.

  4. Timelike information broadcasting in cosmology

    Science.gov (United States)

    Blasco, Ana; Garay, Luis J.; Martín-Benito, Mercedes; Martín-Martínez, Eduardo

    2016-01-01

    We study the transmission of information and correlations through quantum fields in cosmological backgrounds. With this aim, we make use of quantum information tools to quantify the classical and quantum correlations induced by a quantum massless scalar field in two particle detectors, one located in the early universe (Alice's) and the other located at a later time (Bob's). In particular, we focus on two phenomena: (a) the consequences on the transmission of information of the violations of the strong Huygens principle for quantum fields, and (b) the analysis of the field vacuum correlations via correlation harvesting from Alice to Bob. We will study a standard cosmological model first and then assess whether these results also hold if we use other than the general relativistic dynamics. As a particular example, we will study the transmission of information through the big bounce, that replaces the big bang, in the effective dynamics of loop quantum cosmology.

  5. Quantum duel revisited

    Science.gov (United States)

    Schmidt, Alexandre G. M.; Paiva, Milena M.

    2012-03-01

    We revisit the quantum two-person duel. In this problem, both Alice and Bob each possess a spin-1/2 particle which models dead and alive states for each player. We review the Abbott and Flitney result—now considering non-zero α1 and α2 in order to decide if it is better for Alice to shoot or not the second time—and we also consider a duel where players do not necessarily start alive. This simple assumption allows us to explore several interesting special cases, namely how a dead player can win the duel shooting just once, or how can Bob revive Alice after one shot, and the better strategy for Alice—being either alive or in a superposition of alive and dead states—fighting a dead opponent.

  6. Lower Bounds for Quantum Oblivious Transfer

    CERN Document Server

    Chailloux, André; Sikora, Jamie

    2010-01-01

    Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the dishonest players' cheating. Finding the optimal security parameters in such protocols is an important open question. In this paper we show that every 1-out-of-2 oblivious transfer protocol allows a dishonest party to cheat with probability bounded below by a constant strictly larger than 1/2. Alice's cheating is defined as her probability of guessing Bob's index, and Bob's cheating is defined as his probability of guessing both input bits of Alice. In our proof, we relate these cheating probabilities to the cheating probabilities of a coin flipping protocol and conclude by using Kitaev's coin flipping lower bound. Then, we present an oblivious transfer protocol with two messages and cheating probabilities at most 3/4. Last, we extend Kitaev's semidefinite programming formulation to more general primitives, where the security is against a...

  7. The Impossibility of Pseudo-Telepathy Without Quantum Entanglement

    CERN Document Server

    Galliard, V; Tapp, A; Galliard, Viktor; Wolf, Stefan; Tapp, Alain

    2002-01-01

    Imagine that Alice and Bob, unable to communicate, are both given a 16-bit string such that the strings are either equal, or they differ in exactly 8 positions. Both parties are then supposed to output a 4-bit string in such a way that these short strings are equal if and only if the original longer strings given to them were equal as well. It is known that this task can be fulfilled without failure and without communication if Alice and Bob share 4 maximally entangled quantum bits. We show that, on the other hand, they CANNOT win the same game with certainty if they only share classical bits, even if it is an unlimited number. This means that for fulfilling this particular distributed task, quantum entanglement can completely replace communication. This phenomenon has been called pseudo-telepathy. The results of this paper complete the analysis of the first proposed game of this type between two players.

  8. The distribution of the chaetognath population and its interaction with environmental characteristics in the Bay of Bengal and the Arabian Sea.

    Digital Repository Service at National Institute of Oceanography (India)

    Nair, V.R.; Kusum, K.K.; Gireesh, R.; Nair, M.

    of the thermocline (BT) to 300 m, 300 – 500 m and 500 – 1000 m, based on the temperature and density characteristics of the water column. In the BoB, MLD was determined as the depth where the density difference from the surface was 0.2 kg m-3 (Shetye et al. 1996... : TC : BT – 300 m : 300 – 500 m : 500 – 1000 m did not show much variation between the BoB (142 : 55 : 2 : 1.6 : 1 and 147 : 33 : 1.6 : 2 : 1 at SIM and SM, respectively) and the AS (112 : 29 : 4 : 1.3 : 1 and 157 : 25 : 2 : 4 : 1 at SM and FIM...

  9. Using brand characters to promote young children's liking of and purchase requests for fruit.

    Science.gov (United States)

    de Droog, Simone M; Valkenburg, Patti M; Buijzen, Moniek

    2011-01-01

    The aim of this experiment was to investigate whether brand characters can enhance children's liking of and purchase request intent for fruit compared to candy. The authors assigned 216 preschool students between the ages of 4 and 6 years to 9 experimental conditions in which they were presented with a healthy snack (chopped bananas) and an unhealthy snack (banana candy). The packages of these snacks portrayed a familiar character (i.e., Dora from Dora the Explorer or SpongeBob from SpongeBob SquarePants), an unfamiliar character, or no character (control group). The authors' results showed that brand characters can increase children's liking of and purchase request intent for fruit up to a level similar to candy. However, the effects on liking and purchase request intent did not differ between familiar and unfamiliar characters. These results may be helpful for future marketing campaigns to promote children's consumption of healthy foods. PMID:21058143

  10. The Rain Keeps Falling

    Directory of Open Access Journals (Sweden)

    Deborah Rose

    2013-08-01

    Full Text Available The force of disaster hit me in the heart when, as a young woman, I heard Bob Dylan sing ‘Hard Rain’. In a voice stunned by violence, the young man reports on a multitude of forces that drag the world into catastrophe. In the 1960s I heard the social justice in the song. In 2004 the environmental issues ambush me. The song starts and ends in the dying world of trees and rivers. The poet’s words in both domains of justice are eerily prophetic. They call across the music, and across the years, saying that a hard rain is coming. The words bear no story at all; they give us a series of compelling images, an account of impending calamity. The artistry of the poet—Bob (Billy Boy Dylan—offers sequences of reports that, like Walter Benjamin’s storm from paradise, pile wreckage upon wreckage.

  11. Randomization for Security in Half-Duplex Two-Way Gaussian Channels

    CERN Document Server

    Gamal, Aly El; Gamal, Hesham El

    2009-01-01

    This paper develops a new physical layer framework for secure two-way wireless communication in the presence of a passive eavesdropper, i.e., Eve. Our approach achieves perfect information theoretic secrecy via a novel randomized scheduling and power allocation scheme. The key idea is to allow Alice and Bob to send symbols at random time instants. While Alice will be able to determine the symbols transmitted by Bob, Eve will suffer from ambiguity regarding the source of any particular symbol. This desirable ambiguity is enhanced, in our approach, by randomizing the transmit power level. Our theoretical analysis, in a 2-D geometry, reveals the ability of the proposed approach to achieve relatively high secure data rates under mild conditions on the spatial location of Eve. These theoretical claims are then validated by experimental results using IEEE 802.15.4-enabled sensor boards in different configurations, motivated by the spatial characteristics of Wireless Body Area Networks (WBAN).

  12. Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao-Long; ZHANG Yue-Xia; GAO Ke-Lin

    2005-01-01

    A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss.

  13. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

    Science.gov (United States)

    Huang, Jing-Zheng; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Li, Hong-Wei; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2013-06-01

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

  14. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  15. CERT TST December 2015 Visit Summary

    Energy Technology Data Exchange (ETDEWEB)

    Little, Robert Currier [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bailey, Teresa S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gamblin, G. Todd [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Olinger, Chad Tracy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Pautz, Shawn D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, Alan B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-25

    The annual PSAAP II TST visit to Texas A&M’s CERT Center was held on December 1-3, 2015. The agenda for the visit is attached. Non-TAMU attendees were: TST Members – Teresa Bailey (LLNL), Todd Gamblin (LLNL), Bob Little (LANL) – Chair, Chad Olinger (LANL), Shawn Pautz (SNL), Alan Williams (SNL);Other Lab staff – Skip Kahler (LANL), Ana Kupresanin (LLNL), and Rob Lowrie (LANL); AST Members – Nelson Hoffman (LANL) and Bob Voigt (Leidos) The TST wishes to express our appreciation to all involved with CERT for the high-quality posters and presentations and for the attention to logistics that enabled a successful visit. We have broken our comments into four sections: (1) Kudos, (2) Recommendations, (3) Feedback on Priorities for April Review, and (4) Follow-Up Activities with Labs.

  16. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    need to combine their strengths. Moreover, we need to ensure that the protocol implementation coincides with the formal model that we verify using such tools. This thesis shows that we can simplify the formal verification of protocols in several ways. First, we introduce an Alice and Bob style language...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...... robust implementations in different languages. Moreover, SPS has the "ultimate” formal semantics for Alice and Bob notation in the presence of an arbitrary set of cryptographic operators and their algebraic theory. Despite its generality, this semantics is mathematically simpler than any previous attempt...

  17. Quantum locking of classical correlations and quantum discord of classical-quantum states

    CERN Document Server

    Boixo, S; Cavalcanti, D; Modi, K; Winter, A

    2011-01-01

    A locking protocol between two parties is as follows: Alice gives an encrypted classical message to Bob which she does not want Bob to be able to read until she gives him the key. If Alice is using classical resources, and she wants to approach unconditional security, then the key and the message must have comparable sizes. But if Alice prepares a quantum state, the size of the key can be comparatively negligible. This effect is called quantum locking. Entanglement does not play a role in this quantum advantage. We show that, in this scenario, the quantum discord quantifies the advantage of the quantum protocol over the corresponding classical one for any classical-quantum state.

  18. EPR Steering inequalities with Communication Assistance

    Science.gov (United States)

    Nagy, Sándor; Vértesi, Tamás

    2016-01-01

    In this paper, we investigate the communication cost of reproducing Einstein-Podolsky-Rosen (EPR) steering correlations arising from bipartite quantum systems. We characterize the set of bipartite quantum states which admits a local hidden state model augmented with c bits of classical communication from an untrusted party (Alice) to a trusted party (Bob). In case of one bit of information (c = 1), we show that this set has a nontrivial intersection with the sets admitting a local hidden state and a local hidden variables model for projective measurements. On the other hand, we find that an infinite amount of classical communication is required from an untrusted Alice to a trusted Bob to simulate the EPR steering correlations produced by a two-qubit maximally entangled state. It is conjectured that a state-of-the-art quantum experiment would be able to falsify two bits of communication this way. PMID:26880376

  19. One-to-One Mapping between Steering and Joint Measurability Problems.

    Science.gov (United States)

    Uola, Roope; Budroni, Costantino; Gühne, Otfried; Pellonpää, Juha-Pekka

    2015-12-01

    Quantum steering refers to the possibility for Alice to remotely steer Bob's state by performing local measurements on her half of a bipartite system. Two necessary ingredients for steering are entanglement and incompatibility of Alice's measurements. In particular, it is known that for the case of pure states of maximal Schmidt rank the problem of steerability for Bob's assemblage is equivalent to the problem of joint measurability for Alice's observables. We show that such an equivalence holds in general; namely, the steerability of any assemblage can always be formulated as a joint measurability problem, and vice versa. We use this connection to introduce steering inequalities from joint measurability criteria and develop quantifiers for the incompatibility of measurements. PMID:26684101

  20. Demonstration of the blood-ocular barrier integrity by contrast-enhanced MR imaging: A preliminary study

    International Nuclear Information System (INIS)

    In five Rhesus monkeys we assessed the potential for monitoring the blood-ocular barrier (BOB) with Gd-DTPA-enhanced MR imaging. Unilateral opening of the BOB was achieved by infusion of mannitol into the internal carotid artery. This was followed immediately by Gd-DTPA, 0.2 mmol/kg, given intravenously. T-l weighted MR images (Picken unit, 0.5 T, SE 500/40, 5-mm thickness, 15cm FOV) obtained before and within one-half hour after injection of Gd-DTPA demonstrated marked enhancement (2-to 17-fold) of the anterior and posterior chambers of the challenged eye, representing leakage of Gd-DTPA into those chambers. Animals remained free of ocular side effects

  1. Generalized Secure Distributed Source Coding with Side Information

    CERN Document Server

    Salimi, Somayeh; Aref, Mohammad Reza

    2010-01-01

    In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources of Alice and Charlie. Furthermore, different special cases are discussed where the inner and outer bounds match. Our model covers the previously obtained results as well.

  2. Robust Anti-Collective Noise Quantum Secure Direct Dialogue Using Logical Bell States

    Science.gov (United States)

    Wu, Di; Lv, Hong-Jun; Xie, Guang-Jun

    2016-01-01

    In this paper we propose two quantum secure direct dialogue (QSDD) schemes with logical Bell states which can resist collective noise. The two users Alice and Bob encode their secret messages with the help of unitary operations. Compared with many quantum secure direct communication (QSDC), there is no strict information sender and receiver in these schemes, one logical Bell state can be operated twice by Alice and Bob based on what messages they prefer to encode. As a result, the two users are able to share their messages mutually, so the efficiency of communication is improved. By rearranging the order of particles and inserting decoy photons, our protocols are able to avoid the information leakage and detect eavesdropping, and they can be proved to have unconditional security.

  3. Surface buoyancy flux in Bay of Bengal and Arabian Sea

    Directory of Open Access Journals (Sweden)

    G. Anitha

    2008-03-01

    Full Text Available The seasonal variation of thermal, haline, net surface buoyancy flux, the Monin-Obukhov length (M-O length, L and stability parameter, i.e. the ratio of M-O length to mixed layer depth (h were studied in the Bay of Bengal (BoB and the Arabian Sea (AS for the years 2003 and 2004 using Argo temperature and salinity profiles. The relative quantitative influence of winds to surface buoyancy and the applicability of scaling mixed layer using M-O length in BoB and AS was brought out. Rotation and light penetration modify the mixed layer depth from M-O length during shoaling in spring giving L/h<1.

  4. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    CERN Document Server

    Deng, F G; Deng, Fu-Guo; Zhou, Hong-Yu

    2005-01-01

    Security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang et al. [Phys. Rev. A \\textbf{71}, 044301 (2005)] is analyzed in the case that the agent who prepares the quantum signal, say Bob wants to eavesdrop the information about the unitary operations done by the other agent, Charlie by using a Trojan horse attack. Bob can replace the single-photon signal with a multi-photon one and Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.

  5. Teleportation of the one-qubit state with environment-disturbed recovery operations

    CERN Document Server

    Hu, Ming-Liang

    2011-01-01

    We study standard protocol $\\mathcal{P}_0$ for teleporting the one-qubit state with both the transmission process of the two qubits constitute the quantum channel and the recovery operations performed by Bob disturbed by the decohering environment. The results revealed that Bob's imperfect operations do not eliminate the possibility of nonclassical teleportation fidelity provided he shares an ideal channel state with Alice, while the transmission process is constrained by a critical time $t_{0,c}$ longer than which will result in failure of $\\mathcal{P}_0$ if the two qubits are corrupted by the decohering environment. Moreover, we found that under the condition of the same decoherence rate $\\gamma$, the teleportation protocol is significantly more fragile when it is executed under the influence of the noisy environment than those under the influence of the dissipative and dephasing environments.

  6. Entanglement and final state of a black hole under general unitary transformation

    CERN Document Server

    Ahn, Doyeol

    2010-01-01

    Final state of a black hole is studied by taking into account a general unitary evolution of a black hole matter state. It is found that the mixedness decreases under general unitary transformation when the initial matter state was in mixed state and the mean fidelity at the evaporation is smaller than the fidelity of the quantum teleportation by the factor of inverse square of the number of states of a black hole. The change of entanglement Alice-Bob pair at evaporation is also studied by calculating the entanglement fidelity and eigenvalues of the partial transposed block density matrix. We assumed that Alice fell onto the black hole when the hole was formed while Bob is maintaining the safe distance from the black hole. It is found that the entanglement fidelity is inversely proportional to the square of the Hilbert space dimension N and the entanglement can survive the evaporation process.

  7. Fiber based quantum cryptography with continuous variables

    International Nuclear Information System (INIS)

    Quantum Key Distribution (QKD) offers a secure method of sharing a secret key between two parties, commonly called Alice and Bob. In general, there are two different kinds of QKD protocols either with discrete variables or with continuous variables. We implement a continuous variable protocol with binary encoded coherent states, which offers convenient state preparation and measurement. No entanglement source is present in our prepare and measure scheme. However, the nonorthogonality of the signal states, encoded by discrete phase and amplitude modulation, leads to effective entanglement. The encoded states (ES) and the Local Oscillator (LO) are sent from Alice to Bob via a single optical fiber using time multiplexing. Thereby, scattering from the LO into the ES, which generates noise, is prevented. Subsequently, we measure both conjugate quadratures of the ES by homodyne detection and generate the raw key using postselection

  8. Security of direct communication quantum channel with feedback

    Science.gov (United States)

    Usenko, Constantin V.

    2015-01-01

    In the direct communication quantum channels, the authorized recipient (Bob) and the non-authorized recipient (Eve) have different abilities for verification of received information. Bob can apply the feedback to commit the sender (Alice) to perform verification. Eve has to use for verification an indirect method based on the measurement of a set of incompatible observables enough for determination of the coding basis used by Alice. In the protocol of direct communication, regular modification of coding basis and masking it with an equilibrium in average information carrier density matrix prevents reconstruction of coding basis by the results of Eve’s measurements of an arbitrary set of observables. This provides unconditional security of the channel.

  9. China's Wealth: First National Economic Census

    Institute of Scientific and Technical Information of China (English)

    LUOYUANJUN

    2005-01-01

    ""When I first arrived in Beijing, I felt China was already a developed country."" This was American traveler Bob's first impression of China. But as he found out,first impressions aren't always true. ""When I saw western China, I got confused; the economic situation there is completely different from that of the capital.I really wonder what the true state of the Chinese economy is."" Bob is not alone.The Chinese economy has become the subject of much global debate. In 2004, the Chinese central government carried out a national economic census covering Chinese business and industry.Its aim was to collect a comprehensive range of accurate economic data in order to get a clearer picture of the country's economic make-up.

  10. Dynamics of Entropy in Quantum-like Model of Decision Making

    Science.gov (United States)

    Basieva, Irina; Khrennikov, Andrei; Asano, Masanari; Ohya, Masanori; Tanaka, Yoshiharu

    2011-03-01

    We present a quantum-like model of decision making in games of the Prisoner's Dilemma type. By this model the brain processes information by using representation of mental states in complex Hilbert space. Driven by the master equation the mental state of a player, say Alice, approaches an equilibrium point in the space of density matrices. By using this equilibrium point Alice determines her mixed (i.e., probabilistic) strategy with respect to Bob. Thus our model is a model of thinking through decoherence of initially pure mental state. Decoherence is induced by interaction with memory and external environment. In this paper we study (numerically) dynamics of quantum entropy of Alice's state in the process of decision making. Our analysis demonstrates that this dynamics depends nontrivially on the initial state of Alice's mind on her own actions and her prediction state (for possible actions of Bob.)

  11. Assessing the suitability of benthic foraminiferal morpho-groups to reconstruct paleomonsoon from Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Manasa, M.; Saraswat, R.; Nigam, R.

    inorganic carbon analysis is ±0.95%. Total carbon (TC) was measured with a CE NCS 2500 elemental analyzer. Suitability of benthic foraminiferal morpho-groups to reconstruct paleomonsoon from BoB 575 In order to identify the relationship between various... benthic foraminifera (AABF), (d) rounded symmetrical benthic foraminifera (RSBF), (e) agglutinated foraminifera, (f) Nonions, (g) Asterorotalids, (h) organic carbon (Corg), and (i) total inorganic carbon (TIC) in the continental shelf region...

  12. OCA-B integrates B cell antigen receptor-, CD40L- and IL 4-mediated signals for the germinal center pathway of B cell development.

    OpenAIRE

    Qin, X F; Reichlin, A; Luo, Y.; Roeder, R. G.; Nussenzweig, M.C.

    1998-01-01

    Many of the key decisions in lymphocyte differentiation and activation are dependent on integration of antigen receptor and co-receptor signals. Although there is significant understanding of these receptors and their signaling pathways, little is known about the molecular requirements for signal integration at the level of activation of gene expression. Here we show that in primary B cells, expression of the B-cell specific transcription coactivator OCA-B (also known as OBF-1 or Bob-1) is re...

  13. Non-Gaussian continuous-variable teleportation

    OpenAIRE

    Marian, Paulina; Marian, Tudor A.

    2008-01-01

    We have recently shown that the output field in the Braunstein-Kimble protocol of teleportation is a superposition of two fields: the input one and a field created by Alice's measurement and by displacement of the state at Bob's station by using the classical information provided by Alice. We study here the noise added by teleportation and compare its influence in the Gaussian and non-Gaussian settings.

  14. Quantum teleportation scheme by selecting one of multiple output ports

    OpenAIRE

    Ishizaka, Satoshi; Hiroshima, Tohya

    2009-01-01

    The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state, and (ii) the state is also optimized as well as...

  15. Quantum teleportation with nonclassical correlated states in noninertial frames

    OpenAIRE

    Mehri-Dehnavi, Hossein; Rahimi, Robabeh; Mohammadzadeh, Hosein; Ebadi, Zahra; Mirza, Behrouz

    2012-01-01

    Quantum teleportation is studied in noninertial frame, for fermionic case, when Alice and Bob share a general nonclassical correlated state. In noninertial frames two fidelities of teleportation are given. It is found that the average fidelity of teleportation from a separable and nonclassical correlated state is increasing with the amount of nonclassical correlation of the state. However, for any particular nonclassical correlated state, the fidelity of teleportation decreases by increasing ...

  16. The emissions reduction commitments set out by the U.S. and China are welcome steps towards avoiding dangerous climate change

    OpenAIRE

    Ward, Bob

    2014-01-01

    On 12 November President Obama and China’s President Xi Jinping announced a commitment that the two countries would reduce their greenhouse gas emissions beyond what had been previously promised. Bob Ward looks at the agreement, writing that while it bodes well for next year’s Paris climate change summit, stronger commitments will be needed for emissions to stay below the warming limit.

  17. Heartland Payment Systems: lessons learned from a data breach

    OpenAIRE

    Julia S. Cheney

    2010-01-01

    On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems (HPS or Heartland), Robert (Bob) Carr, to lead this discussion and to share his experiences stemming from the data breach at his company in late 2008 and, as important, to discuss lessons learned as a result of this event. The former director of the Payment Cards Center, Peter Burns, ...

  18. Contextualizing Homeschooling Data: A Response to Rudner

    OpenAIRE

    Kariane Mari Welner; Kevin G. Welner

    1999-01-01

    Rudner (1999) presents the results of a survey and testing program, administered by Bob Jones University (BJU), for homeschooling students. In this response, we applaud Rudner's contribution to building a greater understanding of the homeschooling movement. However, we also voice a strong concern that what Rudner contributed with one hand, he took back with the other. We contend that Rudner's analysis of the BJU data fails to offer a straightforward explanation of important and striking limit...

  19. The XXIIIrd Phage/Virus Assembly Meeting

    OpenAIRE

    Serwer, Philip

    2014-01-01

    The XXIIIrd Phage/Virus Assembly (PVA) meeting returned to its birthplace in Lake Arrowhead, CA on September 8–13, 2013 (Fig. 1). The original meeting occurred in 1968, organized by Bob Edgar (Caltech, Pasadena, CA USA), Fred Eiserling (University of California, Los Angeles, Los Angeles, CA USA) and Bill Wood (Caltech, Pasadena, CA USA). The organizers of the 2013 meeting were Bill Gelbart (University of California, Los Angeles, Los Angeles, CA USA) and Jack Johnson (Scripps Research Institut...

  20. EFFECT OF THE INDIAN PENINSULA ON THE COURSE OF THE ASIAN TROPICAL SUMMER MONSOON

    Institute of Scientific and Technical Information of China (English)

    徐海明; 何金海; 董敏

    2001-01-01

    In terms of the NCAR Community Climate Model (CCM3), the effect of the Indian Peninsula on the course of the Asian tropical summer monsoon is simulated in this paper, and numerical experimental results show that the Indian Peninsula plays a critical role in the establishment process of the Asian tropical summer monsoon. When the CCM3 includes the Indian Peninsula,the model successfully simulates out the course of the Asian tropical summer monsoon, i.e. the South China Sea (SCS) summer monsoon at first bursts in middle May, while the Indian monsoon just establishes until middle June. However when the Indian Peninsula topography is deleted in the model, the Indian and SCS summer monsoons almost simultaneously establish in late May.Numerical results further indicate that in the former experiment the sensible heating of the Indian Peninsula warms the air above and produces evident temperature contrast between the peninsula and its adjacent SCS and Bay of Bengal (BOB), which results in the strengthening and maintenance of the BOB trough in the low-middle layer of the troposphere in the end of spring and early summer and thus the earliest establishment of the Asian tropical summer monsoon in the SCS in middle May. However, the Indian summer monsoon just establishes until middle June when the strong west wind over the Arabian Sea shifts northwards and cancels out the influence of the northwest flow behind the BOB trough. In the latter experiment the effect of Tibetan Plateau only produces a very weak BOB trough, and thus the SCS and Indian summer monsoons almost simultaneously establish.

  1. Discrepancies in Different Precipitation Data Products in the Bay of Bengal during Summer Monsoon Season

    OpenAIRE

    Li Qi; Yuqing Wang

    2015-01-01

    In the east Bay of Bengal (BoB), the precipitation maximum always lies near the eastern coast on the windward side of Mountain Araka Yoma in the summer monsoon season. In this study, different precipitation products are compared in terms of their representation of the offshore rainfall maximum feature in this region. Climatologically, all products examined present similar rainfall distribution except for the CMAP. Significant discrepancies among different products are found in the interannual...

  2. Bringing inorganic chemistry to life with inspiration from R. J. P. Williams

    OpenAIRE

    Hill, H. Allen O.; Sadler, Peter J.

    2016-01-01

    Our appreciation of the scholarly ideas and thinking of Bob Williams is illustrated here by a few of the areas in which he inspired us. His journey to bring inorganic chemistry to life began with an early interest in analytical chemistry, rationalising the relative stabilities of metal coordination complexes (The Irving-Williams Series), and elucidating the organometallic redox chemistry of vitamin B12. He (and Vallee) recognised that metal ions are in energised (entatic) states in proteins a...

  3. Influence of cerebellar stereotactic stimulation on left–right electrodermal information transference in a patient with cerebral palsy

    OpenAIRE

    Bob P; Galanda T; Jombik P; Raboch J; Galanda M

    2013-01-01

    Petr Bob,1,2 Tomas Galanda,3 Peter Jombik,4 Jiri Raboch,1 Miroslav Galanda31Center for Neuropsychiatric Research of Traumatic Stress, Department of Psychiatry, 1st Faculty of Medicine, Charles University, Prague, Czech Republic; 2Central European Institute of Technology, Faculty of Medicine, Masaryk University, Brno, Czech Republic; 3Department of Neurosurgery, Slovak Medical University, Roosevelt Hospital, Banska Bystrica, Slovak Republic; 4Department of Neurology, Laboratory of Clinical Neu...

  4. Quantum Key Distribution with Qubits Encoded in Qutrit

    OpenAIRE

    Kumar, R; Demkowicz-Dobrzanski, R.; Banaszek, K.

    2012-01-01

    We present a novel one-way quantum key distribution protocol based on 3-dimensional quantum state, a qutrit, that encodes two qubits in its 2-dimensional subspaces. The qubits hold the classical bit information that has to be shared between the legitimate users. Alice sends such a qutrit to Bob where he decodes one of the qubit and measures it along the random Pauli basis. This scheme has higher secure key rate at longer transmission distance than the standard BB84 protocol.

  5. Experimental Quantum Key Distribution over 14.8 km in a Special Optical Fibre

    Institute of Scientific and Technical Information of China (English)

    桂有珍; 韩正甫; 莫小范; 郭光灿

    2003-01-01

    We present an experimental set-up for quantum key distribution in a special optical fibre at the wavelength of850nm. The system employs the BB84 protocol to establish a secret key between Alice and Bob over 14.8km.The key is encoded in the phase of very weak laser of average photon number 0.11 per pulse. The measured error rate is lower than 10%.

  6. Sacrificing Steve : how I killed the Crocodile Hunter

    Directory of Open Access Journals (Sweden)

    Carman, Luke

    2010-01-01

    Full Text Available Bob Hodge and Vijay Mishra argue that the complex issues of illegitimacy at the core of Australian identity are repressed through a continual process of cyclical silencing, where traces of a shameful past are exorcised by a focus on images of a mythologised ‘legend’, embodied in characters such as 'The Man from Snowy River'. This article explores such a 'schizophrenic' cycle in relation to the life, death and resurrection of Steve 'Crocodile Hunter' Irwin.

  7. Wi likkle but wi tallawah : narratives of nation branding: intellectual property governance and identity politics in Jamaica

    OpenAIRE

    2008-01-01

    The structure of this thesis is fourfold, yet intrinsically intertwined. Firstly, it identifies and examines in detail Jamaica’s strong and highly identifiable worldwide image and symbolic narrative. On the one hand, Jamaica is the home of Bob Marley, reggae and Rastafarianism, as well as being a tropical sultry island-dream boasting sun, sand and sea. On the other hand, Jamaica is also associated with violent crime and virulent homophobia. Based on the romanticized and imaginary notion that ...

  8. Self-regulation is not working to keep British media factual about climate change

    OpenAIRE

    Robert E T Ward

    2012-01-01

    Scientists and social scientists working on climate change are increasingly concerned about the way in which the issue is reported in the UK national media. Bob Ward argues that Britain’s self-regulating press and weakly monitored broadcast outputs are unable to handle instances of blatant factual misrepresentation. As a result some media outlets can continuously fabricate controversy and denounce constructive environmental policies.

  9. Investigations of an intense aerosol loading during 2007 cyclone SIDR - A study using satellite data and ground measurements over Indian region

    Digital Repository Service at National Institute of Oceanography (India)

    Badarinath, K.V.S.; Kharol, S.K.; Sharma, A.R.; Ramaswamy, V.; Kaskaoutis, D.G.; Kambezidis, H.D.

    upwind of BoB consists of cement factories, thermal power plants (coal- based), steel plants, etc (Satheesh, 2002). This general characteristic ofaerosolshoweverwasstronglymodifiedduringthepassageofthe cyclone SIDR and thus rendering its investigation a... properties and ground reaching solar irradiance at urban area of Hyderabad during the cyclone period. It is believed that the present study will improve the scientific knowledge regarding the interactions between atmospheric aerosol loading and severe...

  10. Observed year-to-year sea surface salinity variability in the Bay of Bengal during the 2009–2014 period

    Digital Repository Service at National Institute of Oceanography (India)

    Chaitanya, A.V.S.; Durand, F.; Mathew, S.; Gopalakrishna, V.V.; Papa, F.; Lengaigne, M.; Vialard, J.; KranthiKumar, C.; Venkatesan, R.

    there. By fall, the 32 isohaline has been displaced southward by several hundreds of kilometers, in particular along the eastern and western boundaries. The southward-flowing ocean boundary currents play a key role in the southward export... by small-scale advection of riverine and atmospheric freshwater by ocean turbulent circulation. Rao et al. (2011) also suggested a dominant role of oceanic circulation over air-sea freshwater fluxes on SSS intraseasonal variability in the BoB based...

  11. THE EXPERT’S OPINION

    OpenAIRE

    Ming-te Lu

    1997-01-01

    Robert (Bob) L. Carlson is Head of Information Technology for Hongkong and Shanghai Bank in Asia/Pacific. He is responsible for managing and directing computing activities in over 20 Asian countries and telecommunications networks for the HKBC Group Worldwide. Carlson is a technology executive with 30 years experience in managing all aspects of technology in a variety of industries in the USA, Europe, and Asia. After college graduation, he began his career with American Airlines when the SABR...

  12. Advancing Systems Thinking in Evaluation: A Review of Four Publications.

    OpenAIRE

    Margaret B. Hargreaves; Donna Podems

    2012-01-01

    This article reviews four books published in 2010 and 2011 on the topic of systems thinking in evaluation: Developmental Evaluation: Applying Complexity Concepts to Enhance Innovation and Use by Michael Q. Patton; Purposeful Program Theory: Effective Use of Theories of Change and Logic Models by Sue Funnell and Patricia Rogers; Systems Concepts in Action: A Practitioner's Toolkit by Bob Williams and Richard Hummelbrunner, and Evaluation in the Face of Uncertainty: Anticipating Surprise and Re...

  13. Connecting every bit of knowledge: The structure of Wikipedia's First Link Network

    OpenAIRE

    Ibrahim, Mark; Christopher M. Danforth; Dodds, Peter Sheridan

    2016-01-01

    Apples, porcupines, and the most obscure Bob Dylan song--is every topic a few clicks from Philosophy? Within Wikipedia, the surprising answer is yes: nearly all paths lead to Philosophy. Wikipedia is the largest, most meticulously indexed collection of human knowledge ever amassed. More than information about a topic, Wikipedia is a web of naturally emerging relationships. By following the first link in each article, we algorithmically construct a directed network of all 4.7 million articles:...

  14. Human resource challenges in home care: Putting client need first

    OpenAIRE

    Attfield, Bob

    2012-01-01

    This video clip comprises one of the 4 presentations of the PANEL SESSION: “Human Resource Challenges in Home Care” held at the 21st Annual John K. Friesen Conference, "Innovations in Home Care: A Public Policy Perspective," MAY 16-17, 2012, Vancouver, BC. Presented by Bob Attfield, Regional Director Western Canada, We Care Home Health Services. It is well known that jurisdictions with more comprehensive and integrated home care delivery systems are able to extend independent living f...

  15. Effect of Captive Environment on Plasma Cortisol Level and Behavioral Pattern of Bengal Tigers (Panthera tigris tigris)

    OpenAIRE

    S. Sajjad, U. Farooq1*, M. Anwar, A. Khurshid2 and S.A. Bukhari1

    2011-01-01

    Captive environment in zoological parks often do not provide optimum conditions for natural behaviors due to spatial constraints and negative public reaction. These factors elicit stereotypic behavior in tigers such as pacing, head bobbing and aimless repetition of some movements, and are considered to be an indication of stress. The present study was conducted to assess the effect of captivity on the plasma cortisol level and behavioral pattern in Bengal tigers (Panthera tigris tigris). Tige...

  16. Synesthetic associations and psychosensory symptoms of temporal epilepsy

    OpenAIRE

    Neckar M; Bob P

    2016-01-01

    Marcel Neckar, Petr Bob Center for Neuropsychiatric Research of Traumatic Stress, Department of Psychiatry, First Faculty of Medicine, Charles University, Prague, Czech Republic Background: Synesthesia manifests as unusual associative connections that may cause intriguing experiences due to various cross-modal connections, for example, a sound may be experienced as color. Several findings indicate that temporal lobe seizures or seizure-like conditions and increased excitability may influenc...

  17. You can patent that? Are patents on computer programs and business methods good for the new economy?

    OpenAIRE

    Robert M. Hunt

    2001-01-01

    In other parts of the economy, firms are increasingly turning to patents to protect not just physical inventions but more abstract ones such as computer programs or ways of doing business. Just two decades ago such patents would have been impossible to obtain, let alone enforce. In "You Can Patent That? Are Patents on Computer Programs and Business Methods Good for the New Economy?" Bob Hunt describes the changes in patent law that have given rise to this phenomenon.

  18. Knokin On Heaven's Door--敲开天堂的门

    Institute of Scientific and Technical Information of China (English)

    卢超

    2005-01-01

    @@ 第一次听到这首歌,是从Guns N'Roses的专辑开始的,尽管后来得知这首作品的原作者并非Guns N'Roses而是Bob Dylan,但每当听到这首歌的时候我还是会想到Guns N'Roses.

  19. Book review: who is worthy of protection? Gender-based asylum and US immigration politics by Meghana Nayak

    OpenAIRE

    Kao, M. Bob

    2016-01-01

    In Who is Worthy of Protection? Gender-Based Asylum and US Immigration Politics, Meghana Nayak examines gender-based asylum in the United States, focusing on the narratives through which certain asylees are framed as being more ‘worthy’ than others. While M. Bob Kao welcomes Nayak’s recommendations regarding how feminist scholars can productively intervene in the asylum process, he nonetheless questions whether all of these arguments can be equally put into practice by lawyers navigating the ...

  20. Pile-ou-face et mise-en-gage de bit quantique : bornes optimales, constructions pratiques et sécurité calculatoire

    OpenAIRE

    Chailloux, André

    2011-01-01

    Quantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my...

  1. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    Science.gov (United States)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  2. There are doubts about Syriza’s plans for recovery in Greece, but refocusing on upmarket tourism might offer a new growth strategy

    OpenAIRE

    Hancké, Bob

    2013-01-01

    Alexis Tsipras, the president of the Left-wing Syriza party in Greece, recently visited the LSE for a lecture and seminar. Bob Hancké, who attended the event, raises some questions about Syriza’s plans for recovery. He also reopens the debate on Greek exports in the tourism industry, arguing that Greece might be able to generate new growth by upgrading its tourist facilities.

  3. Privacy-Preserving Distance Computation and Proximity Testing on Earth, Done Right

    OpenAIRE

    Šeděnka Jaroslav; Gasti Paolo

    2014-01-01

    In recent years, the availability of GPS-enabled smartphones have made location-based services extremely popular. A multitude of applications rely on location information to provide a wide range of services. Location information is, however, extremely sensitive and can be easily abused. In this paper, we introduce the first protocols for secure computation of distance and for proximity testing over a sphere. Our secure distance protocols allow two parties, Alice and Bob, to determine their mu...

  4. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  5. Damping in quantum love affairs

    CERN Document Server

    Bagarello, Fabio

    2011-01-01

    In a series of recent papers we have used an operatorial technique to describe stock markets and, in a different context, {\\em love affairs} and their time evolutions. The strategy proposed so far does not allow any dumping effect. In this short note we show how, within the same framework, a strictly non periodic or quasi-periodic effect can be introduced in the model by describing in some details a linear Alice-Bob love relation with damping.

  6. Continuous variable quantum cryptography using coherent states

    OpenAIRE

    Grosshans, Frédéric; Grangier, Philippe

    2002-01-01

    5 pages, 1 figure. In v2 minor rewriting for clarity, references added International audience We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50 %, but they do not rely on "non-classical" features...

  7. Sources of black carbon aerosols in South Asia and surrounding regions during the Integrated Campaign for Aerosols, Gases and Radiation Budget (ICARB)

    OpenAIRE

    Kumar, R.; M. C. Barth; Nair, V. S.; G. G. Pfister; S. Suresh Babu; Satheesh, S. K.; Krishna Moorthy, K.; Carmichael, G R; Lu, Z.; D. G. Streets

    2015-01-01

    This study examines differences in the surface black carbon (BC) aerosol loading between the Bay of Bengal (BoB) and the Arabian Sea (AS) and identifies dominant sources of BC in South Asia and surrounding regions during March–May 2006 (Integrated Campaign for Aerosols, Gases and Radiation Budget, ICARB) period. A total of 13 BC tracers are introduced in the Weather Research and Forecasting Model coupled with Chemistry to address these objectives. The model reproduced the te...

  8. Distribution of ozone and its precursors over Bay of Bengal during winter 2009: role of meteorology

    Directory of Open Access Journals (Sweden)

    L. M. David

    2011-09-01

    Full Text Available Measurements of ozone and NO2 were carried out in the marine environment of the Bay of Bengal (BoB during the winter months, December 2008–January 2009, as part of the second Integrated Campaign for Aerosols, gases and Radiation Budget conducted under the Geosphere Biosphere Programme of the Indian Space Research Organization. The ozone mixing ratio was found to be high in the head and the southeast BoB with a mean value of 61 ± 7 ppb and 53 ± 6 ppb, respectively. The mixing ratios of NO2 and CO were also relatively high in these regions. The spatial patterns were examined in the light of airflow patterns, air mass back trajectories and other meteorological conditions and satellite retrieved maps of tropospheric ozone, NO2, CO, and fire count in and around the region. The distribution of these gases was strongly associated with the transport from the adjoining land mass. The anthropogenic activities and forest fires/biomass burning over the Indo Gangetic Plains and other East Asian regions contribute to ozone and its precursors over the BoB. Similarity in the spatial pattern suggests that their source regions could be more or less the same. Most of the diurnal patterns showed decrease of the ozone mixing ratio during noon/afternoon followed by a nighttime increase and a morning high. Over this oceanic region, photochemical production of ozone involving NO2 was not very active. Water vapour played a major role in controlling the variation of ozone. An attempt is made to simulate ozone level over the north and south BoB using the photochemical box model (NCAR-MM. The present observed features were compared with those measured during the earlier cruises conducted in different seasons.

  9. Impact of Frozen Storage on the Anthocyanin and Polyphenol Content of American Elderberry Fruit Juice

    OpenAIRE

    Johnson, Mitch C.; Thomas, Andrew L.; Greenlief, C. Michael

    2015-01-01

    The effects of frozen storage on the anthocyanin and polyphenol content of elderberry fruit juice are investigated. Juice from three genotypes of American elderberry (Adams II, Bob Gordon, and Wyldewood) was screened for total phenolic (TP) and total monomeric anthocyanin (TMA) content with spectrophotometric methods. The individual anthocyanin content (IAC) of the juice was tested by coupling solid phase extraction with ultra-performance liquid chromatography/tandem mass spectrometry. Juice ...

  10. Detecting faked continuous variable entanglement using one-sided device-independent entanglement witnesses

    OpenAIRE

    Opanchuk, Bogdan; Arnaud, Ludovic; Reid, Margaret D.

    2013-01-01

    We demonstrate the principle of one-sided device-independent continuous variable (CV) quantum information. In situations of no trust, we show by enactment how the use of standard CV entanglement criteria can mislead Charlie into thinking Alice and Bob share entanglement, when the data is actually generated classically using a Local Hidden Variable theory based on the Wigner function. We distinguish between criteria that demonstrate CV entanglement, and criteria that demonstrate the CV Einstei...

  11. Letter to the Editor: Robert W. Evans

    Science.gov (United States)

    Johnston, A.

    2000-12-01

    I read the Letters page of the latest issue of the JBAA (2000 October) with some amusement. My very good friend Bob Evans had, according to the letter header, not only been elevated to the clergy, but had also transferred his nationality from Kiwi to Aussie. While he'll probably overlook the religious error he may not be so sanguine about being mistaken for an Australian.

  12. "Ta!"酸梅奖

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    朱莉前夫之女被控误杀1岁女童 安吉丽娜·朱莉(Angelina Jolie)前夫比利·鲍伯·松顿(Billy Bob Thornton)的长女阿曼达·布鲁姆菲尔乐德(Amanda Brumfield),日前被控误杀1岁女童奥莉维亚(Olivia)。

  13. Logical Harmonies

    OpenAIRE

    Glover, Richard

    2013-01-01

    1. Logical Harmonies 2 3:50 Philip Thomas (piano) 2. Beatings in a Linear Process 6:02 Ensemble Portmanto 3. Contracting Triads in Temperaments from 12-24 5:17 Bob Gilmore (keyboard) 4. Cello with Clarinet and Piano 6:50 Seth Woods (cello) Jonathan Sage (clarinet) Philip Thomas (piano) 5. Imperfect Harmony 10:38 Dominic Lash (double bass) 6. Gradual Music 9:00 musikFabrik 7. Logical Harmonies 1 ...

  14. Efficient bounds on quantum-communication rates via their reduced variants

    International Nuclear Information System (INIS)

    We investigate one-way communication scenarios where Bob operating on his component can transfer some subsystem to the environment. We define reduced versions of quantum-communication rates and, further, prove upper bounds on a one-way quantum secret key, distillable entanglement, and quantum-channel capacity by means of their reduced versions. It is shown that in some cases they drastically improve their estimation.

  15. Sacrificing Steve: How I Killed the Crocodile Hunter

    OpenAIRE

    Luke Carman

    2010-01-01

    Bob Hodge and Vijay Mishra argue that the complex issues of illegitimacy at the core of Australian identity are repressed through a continual process of cyclical silencing, where traces of a shameful past are exorcised by a focus on images of a mythologised ‘legend’, embodied in characters such as 'The Man from Snowy River'. This article explores such a 'schizophrenic' cycle in relation to the life, death and resurrection of Steve 'Crocodile Hunter' Irwin.

  16. Sacrificing Steve: How I Killed the Crocodile Hunter

    Directory of Open Access Journals (Sweden)

    Luke Carman

    2010-09-01

    Full Text Available Bob Hodge and Vijay Mishra argue that the complex issues of illegitimacy at the core of Australian identity are repressed through a continual process of cyclical silencing, where traces of a shameful past are exorcised by a focus on images of a mythologised ‘legend’, embodied in characters such as 'The Man from Snowy River'. This article explores such a 'schizophrenic' cycle in relation to the life, death and resurrection of Steve 'Crocodile Hunter' Irwin.

  17. Black Holes, Black Swans, Black Magic: the Emerging Arts of Project Execution

    OpenAIRE

    Prieto, Bob

    2013-01-01

    Fluor Corporation executive to give Vecellio LectureBlacksburg, VA , September 16, 2013 Virginia Tech College of Engineering Bob Prieto, senior vice president, Fluor Corporation, will present the 2013 Vecellio Distinguished Lecture, titled “Black Holes, Black Swans, Black Magic: the Emerging Arts of Project Execution,” on Friday, Oct. 11 at 4 p.m. in Torgersen 2150. His talk will provide a whirlwind tour of some of the growing challenges in construction project execution and some of the emerg...

  18. Requirement of optical coherence for continuous-variable quantum teleportation

    OpenAIRE

    Rudolph, Terry; Sanders, Barry C.

    2001-01-01

    We show that the sender (Alice) and the receiver (Bob) each require coherent devices in order to achieve unconditional continuous variable quantum teleportation (CVQT), and this requirement cannot be achieved with conventional laser sources, even in principle. The appearance of successful CVQT in recent experiments is due to interpreting the measurement record fallaciously in terms of one preferred ensemble (or decomposition) of the correct density matrix describing the state. Our analysis is...

  19. The gender wage gap in four countries

    OpenAIRE

    Daly, Anne; Kawaguchi, Akira; Meng, Xin; Mumford, Karen

    2006-01-01

    In a series of studies written during the 1980s Bob Gregory and his co-authors compared the gender wage gap in Australia with that found in other countries. They found it was not the difference in human capital endowments that explained different gender wage gaps but rather the rewards for these endowments. They concluded that country-specific factors, especially the institutional environment, were important in explaining the gender wage gap. This study updates Gregory's work by comparing the...

  20. Partial list of bipartite Bell inequalities with four binary settings

    Energy Technology Data Exchange (ETDEWEB)

    Brunner, Nicolas [Group of Applied Physics, University of Geneva (Switzerland)], E-mail: nicolas.brunner@physics.unige.ch; Gisin, Nicolas [Group of Applied Physics, University of Geneva (Switzerland)

    2008-04-28

    We give a partial list of 26 tight Bell inequalities for the case where Alice and Bob choose among four two-outcome measurements. All tight Bell inequalities with less settings are reviewed as well. For each inequality we compute numerically the maximal quantum violation, the resistance to noise and the minimal detection efficiency required for closing the detection loophole. Surprisingly, most of these inequalities are outperformed by the CHSH inequality.

  1. Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol

    OpenAIRE

    Woodhead, Erik; Pironio, Stefano

    2012-01-01

    The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the states and in the alignment of the measurement bases with respect to this ideal situation. Various security proofs take into account (at least partially) such errors, i.e., show how Alice and Bob can...

  2. Electrolytes for lithium ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Vaughey, John; Jansen, Andrew N.; Dees, Dennis W.

    2014-08-05

    A family of electrolytes for use in a lithium ion battery. The genus of electrolytes includes ketone-based solvents, such as, 2,4-dimethyl-3-pentanone; 3,3-dimethyl 2-butanone(pinacolone) and 2-butanone. These solvents can be used in combination with non-Lewis Acid salts, such as Li.sub.2[B.sub.12F.sub.12] and LiBOB.

  3. Spain’s labour market reforms are unlikely to lead to economic growth or a drop in unemployment

    OpenAIRE

    Hancké, Bob

    2013-01-01

    In early 2012, Spain introduced labour market reforms aimed at boosting competitiveness and economic performance. Bob Hancké looks at recent claims that these reforms have started to boost the Spanish economy, finding that they may have boosted productivity at the expense of weaker companies that have been affected by the crisis. He writes that as long as productivity growth outstrips economic growth, it is unlikely that unemployment will fall.

  4. Counterfactual distribution of Schrödinger cat states

    Science.gov (United States)

    Shenoy-Hejamadi, Akshata; Srikanth, R.

    2015-12-01

    In the counterfactual cryptography scheme proposed by Noh, the sender Alice probabilistically transmits classical information to the receiver Bob without the physical travel of a particle. Here we generalize this idea to the distribution of quantum entanglement. The key insight is to replace their classical input choices with quantum superpositions. We further show that the scheme can be generalized to counterfactually distribute multipartite cat states.

  5. Time reversal and exchange symmetries of unitary gate capacities

    OpenAIRE

    Harrow, Aram W.; Shor, Peter W.

    2005-01-01

    Unitary gates are an interesting resource for quantum communication in part because they are always invertible and are intrinsically bidirectional. This paper explores these two symmetries: time-reversal and exchange of Alice and Bob. We will present examples of unitary gates that exhibit dramatic separations between forward and backward capacities (even when the back communication is assisted by free entanglement) and between entanglement-assisted and unassisted capacities, among many others...

  6. Does the balance scorecard work: an empirical investigation

    OpenAIRE

    Neely, Andrew

    2008-01-01

    Commentators suggest that between 30 and 60% of large US firms have adopted the Balanced Scorecard, first described by Bob Kaplan and David Norton in their seminal Harvard Business Review paper of 1992 (Kaplan and Norton, 1992; Marr et al, 2004). Empirical evidence that explores the performance impact of the balanced scorecard, however, is extremely rare and much that is available is anecdotal at best. This paper reports a study that set out to explore the performance impact of...

  7. Quantum secure direct communication network with hyperentanglement

    International Nuclear Information System (INIS)

    We propose a quantum secure direct communication protocol with entanglement swapping and hyperentanglement. Any two users, Alice and Bob, can communicate with each other in a quantum network, even though there is no direct quantum channel between them. The trust center, Trent, who provides a quantum channel to link them by performing entanglement swapping, cannot eavesdrop on their communication. This protocol provides a high channel capacity because it uses hyperentanglement, which can be generated using a beta barium borate crystal. (general)

  8. Crossing Boundaries: Towards Cultural Political Economy

    OpenAIRE

    Jessop, Bob; Labrousse, Agnès; Lamarche, Thomas; Vercueil, Julien

    2012-01-01

    Bob Jessop is Distinguished Professor of Sociology at Lancaster University, United Kingdom. He has worked for many years on theories of the state and state power, critical political economy (including the régulation theory), critical realism, critical discourse analysis, and questions of governance and governance failure. He currently holds a 3-year professorial research fellowship from the Economic and Social Research Council (UK) to study the crisis of crisis-management in relation to the N...

  9. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  10. Classical Information Storage in an n-Level Quantum System

    Science.gov (United States)

    Frenkel, Péter E.; Weiner, Mihály

    2015-12-01

    A game is played by a team of two—say Alice and Bob—in which the value of a random variable x is revealed to Alice only, who cannot freely communicate with Bob. Instead, she is given a quantum n-level system, respectively a classical n-state system, which she can put in possession of Bob in any state she wishes. We evaluate how successfully they managed to store and recover the value of x by requiring Bob to specify a value z and giving a reward of value f ( x, z) to the team. We show that whatever the probability distribution of x and the reward function f are, when using a quantum n-level system, the maximum expected reward obtainable with the best possible team strategy is equal to that obtainable with the use of a classical n-state system. The proof relies on mixed discriminants of positive matrices and—perhaps surprisingly—an application of the Supply-Demand Theorem for bipartite graphs. As a corollary, we get an infinite set of new, dimension dependent inequalities regarding positive operator valued measures and density operators on complex n-space. As a further corollary, we see that the greatest value, with respect to a given distribution of x, of the mutual information I ( x; z) that is obtainable using an n-level quantum system equals the analogous maximum for a classical n-state system.

  11. Climate-Adapted Soil Cultivation as an Aspect for Sustainable Farming – Task-Technology-Fit of a Decision Support System

    Directory of Open Access Journals (Sweden)

    Welf Guenther-Lübbers

    2013-03-01

    Full Text Available Due to global climate change and its impact on local weather conditions, decision support systems are becoming more important in agriculture. Such systems allow farmers to adapt more effectively to the complex changes affecting their farms. Marginal production sites must apply new tillage strategies adapted to new climatic conditions. Information about proper strategy adjustments is often disseminated through agricultural extension services and journals. A new internet information platform, KlimaBob, which focuses on climate-flexible tillage, was established under the auspices of the Innovation Network of Climate Change Adaptation Brandenburg Berlin. Successful and permanent introduction of such a system requires analysis and verification of its acceptance among individual farmers. This study addresses this need by applying the established task-technology fit approach. A survey was conducted among farmers in the Brandenburg region. The resulting data provided the basis for a structural equation model that explains and evaluates the task-technology fit of the KlimaBob platform. The results indicate that the performance spectrum of the system exerts a strong influence on the task-technology fit when assessed by both the name characteristics of KlimaBob and the individual characteristics of users (for example, time management, technology affinity and risk attitude.

  12. Comparative study of lithium bis(oxalato)borate and lithium bis(fluorosulfonyl)imide on lithium manganese oxide spinel lithium-ion batteries

    International Nuclear Information System (INIS)

    Highlights: • The cycling properties with the additive-containing electrolytes show much improved at 55 °C. • LiBOB or LiFSI inhibits detrimental reaction of the electrolyte at high temperature. • LiFSI-containing electrolyte increases electrochemical stability and compatibility. - Abstract: The comparative study of lithium bis(oxalato)borate (LiBOB) and lithium bis(fluorosulfonyl)imide (LiFSI) used as an additive in the performance of lithium manganese oxide spinel (LiMn2O4) cathode was systematically investigated at elevated temperature. The results indicated that a solid-electrolyte interphase (SEI) film on cathode produced by the oxidation of the LiFSI additive is more robust and stable against Mn dissolution problem during cycling at 55 °C compared with the SEI formed by the oxidation of the Blank and the LiBOB-added electrolyte. LiFSI aids in stabilizing the electrolyte by trapping the PF5, i.e., sequestering the radical which tends to oxidize EC and DEC electrolyte solvents. Thus, oxidation is suppressed on the cathode, as evidenced by scanning electron microscopy (SEM), inductively coupled plasma-atomic emission spectrometry (ICP-AES) and X-ray photoelectron spectroscopy (XPS). As a result, HF generation is suppressed, which results in less Mn dissolution from the spinel cathode

  13. Comparative study of lithium bis(oxalato)borate and lithium bis(fluorosulfonyl)imide on lithium manganese oxide spinel lithium-ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Renheng [School of Metallurgy and Environment, Central South University, Changsha 410083 (China); Li, Xinhai, E-mail: Xinhaili_csu@126.com [School of Metallurgy and Environment, Central South University, Changsha 410083 (China); Wang, Zhixing; Guo, Huajun; Su, Mingru [School of Metallurgy and Environment, Central South University, Changsha 410083 (China); Hou, Tao [Jiangxi Youli New Materials Co., Ltd, Pingxiang, Jiangxi 337000 (China)

    2015-03-05

    Highlights: • The cycling properties with the additive-containing electrolytes show much improved at 55 °C. • LiBOB or LiFSI inhibits detrimental reaction of the electrolyte at high temperature. • LiFSI-containing electrolyte increases electrochemical stability and compatibility. - Abstract: The comparative study of lithium bis(oxalato)borate (LiBOB) and lithium bis(fluorosulfonyl)imide (LiFSI) used as an additive in the performance of lithium manganese oxide spinel (LiMn{sub 2}O{sub 4}) cathode was systematically investigated at elevated temperature. The results indicated that a solid-electrolyte interphase (SEI) film on cathode produced by the oxidation of the LiFSI additive is more robust and stable against Mn dissolution problem during cycling at 55 °C compared with the SEI formed by the oxidation of the Blank and the LiBOB-added electrolyte. LiFSI aids in stabilizing the electrolyte by trapping the PF{sub 5}, i.e., sequestering the radical which tends to oxidize EC and DEC electrolyte solvents. Thus, oxidation is suppressed on the cathode, as evidenced by scanning electron microscopy (SEM), inductively coupled plasma-atomic emission spectrometry (ICP-AES) and X-ray photoelectron spectroscopy (XPS). As a result, HF generation is suppressed, which results in less Mn dissolution from the spinel cathode.

  14. Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals

    CERN Document Server

    Villard, Joffrey; Shamai, Shlomo

    2011-01-01

    The problem of secure lossy source-channel wiretapping with arbitrarily correlated side informations at both receivers is investigated. This scenario consists of an encoder (referred to as Alice) that wishes to compress a source and send it through a noisy channel to a legitimate receiver (referred to as Bob). In this context, Alice must simultaneously satisfy the desired requirements on the distortion level at Bob, and the equivocation rate at the eavesdropper (referred to as Eve). This setting can be seen as a generalization of the conventional problems of secure source coding with side information at the decoders, and the wiretap channel. Inner and outer bounds on the rate-distortion-equivocation region for the case of arbitrary channels and side informations are derived. In some special cases of interest, it is shown that separation holds. By means of an appropriate coding, the presence of any statistical difference among the side informations, the channel noises, and the distortion at Bob can be fully ex...

  15. Secrecy extraction from no-signaling correlations

    International Nuclear Information System (INIS)

    Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual security proofs suppose that the authorized partners, Alice and Bob, have a perfect knowledge and control of their quantum systems and devices; for instance, they must be sure that the logical bits have been encoded in true qubits and not in higher dimensional systems. In this paper, we present an approach that circumvents this strong assumption. We define protocols, both for the case of bits and for generic d-dimensional outcomes, in which the security is guaranteed by the very structure of the Alice-Bob correlations, under the no-signaling condition. The idea is that if the correlations cannot be produced by shared randomness, then Eve has poor knowledge of Alice's and Bob's symbols. The present study assumes on the one hand that the eavesdropper Eve performs only individual attacks (this is a limitation to be removed in further work), and on the other hand that Eve can distribute any correlation compatible with the no-signaling condition (in this sense her power is greater than what quantum physics allows). Under these assumptions, we prove that the protocols defined here allow extracting secrecy from noisy correlations, when these correlations violate a Bell-type inequality by a sufficiently large amount. The region in which secrecy extraction is possible extends within the region of correlations achievable by measurements on entangled quantum states

  16. Ombuds’ corner: Controlling our own stress

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Bob* has been working at CERN for years. During his career he developed many skills, being now an expert technician, the kind of person who can handle all urgencies. He is always ready to help and everyone appreciates him a lot. When asked for some kind of immediate help, his answer is most of the time: “I will take care of it”. Of course everyone having a problem loves such an answer! After a reorganization done in his region of CERN, Bob found himself working with new people, not knowing as much as he did their way around. Without noticing it at the beginning, Bob started to respond to more and more requests. What happened? His mobile phone was interrupting hi...

  17. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

    International Nuclear Information System (INIS)

    In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2→3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2→3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2→3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources

  18. Communicating through Probabilities: Does Quantum Theory Optimize the Transfer of Information?

    Directory of Open Access Journals (Sweden)

    William K. Wootters

    2013-08-01

    Full Text Available A quantum measurement can be regarded as a communication channel, in which the parameters of the state are expressed only in the probabilities of the outcomes of the measurement. We begin this paper by considering, in a non-quantum-mechanical setting, the problem of communicating through probabilities. For example, a sender, Alice, wants to convey to a receiver, Bob, the value of a continuous variable, θ, but her only means of conveying this value is by sending Bob a coin in which the value of θ is encoded in the probability of heads. We ask what the optimal encoding is when Bob will be allowed to flip the coin only a finite number of times. As the number of tosses goes to infinity, we find that the optimal encoding is the same as what nature would do if we lived in a world governed by real-vector-space quantum theory. We then ask whether the problem might be modified, so that the optimal communication strategy would be consistent with standard, complex-vector-space quantum theory.

  19. A brand new science for the planet

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    “When the problem gets complicated, networking is the solution”. This is nothing new in principle but what Bob Bishop has in mind is one of those novelties that have the potential to change the course of history. He proposes to start networking sciences to create new knowledge. All this for the benefit – and the survival – of the planet.   At the end of the fifteenth and the start of the sixteenth centuries, Leonardo da Vinci was not only an engineer but also a painter, a mathematician and an architect. But in more recent years the sciences have evolved more towards specialization. “We have been treating the sciences as separate stovepipes and silos for over 200 years”, says Bob Bishop, former CEO at Silicon Graphics and a physicist with more than 40 years’ experience in scientific, technical and engineering computing. On 29 January, Bob Bishop visited CERN and gave a seminar on the role of computing in climate science. He is ...

  20. CERN CINE CLUB

    CERN Multimedia

    CERN CINE CLUB

    2010-01-01

    CERN CINE CLUB Thursday 24 June 2010 at 20:30 / Jeudi 24 Juin 2010 à 20:30 CERN Main Auditorium / Amphithéâtre Principal   The Raggedy Rawney By/de : Bob Hoskins (UK, 1988) - 104 min With/avec: Dexter Fletcher, Bob Hoskins, David Hill, Zoe Nathanson, Zoe Wanamaker Bob Hoskins makes his directorial debut with this lyrical, mystical fable about the strength of family and the transcendence of love. When a young military recruit named Tom goes AWOL after his first taste of battle, he must disguise himself with face paint and women’s clothing to avoid being captured by his vengeful commanding officer. He is instead discovered and taken in by Darky, the leader of an eccentric group of traveling gypsies, who thinks he is a «rawney», a half-mad, half-magical woman who brings good fortune. But when Tom begins a love affair with Darky’s daughter, he sets off a chain reaction of events that will soon put all of their lives in grave ...

  1. Behavior of Bali Starling at Bali Barat National Park and Nusa Penida Island (PERILAKU JALAK BALI DI TAMAN NASIONAL BALI BARAT DAN PULAU NUSA PENIDA

    Directory of Open Access Journals (Sweden)

    Sudaryanto .

    2015-10-01

    Full Text Available Jalak Bali (Leucopsar rothschildi sejak tahun 1966 dimasukan oleh International Union forConservation of Nature (IUCN Red List of Threatened Species dan Convention on International Trade inEndangered Species of Wild Fauna and Flora (CITES. Jalak Bali dikelompokan sebagai satwa terancampunah dengan kategori kritis (Critically Endangered dan di Indonesia telah dilindungi sejak tahun 1970.Tujuan penelitian ini adalah untuk mengetahui perilaku Jalak Bali di Taman Nasional Bali Barat danPulau Nusa Penida untuk konservasi burung tersebut. Metode yang digunakan adalah scan samplingdengan instataneous sampling. Perilaku Jalak Bali di Taman Nasional Bali Barat terdiri dari terbang17%, makan buah 3%, makan serangga 1%, menelisik bulu 15%, menegakkan jambul 6%, bobbing 7%,berkicau 40%, minum 0,5%, dan berjalan 10%. Sementara di Nusa Penida pada musim hujan terdiriterbang 13%, makan buah 19%, makan serangga 4%, menelisik bulu 7%, menegakkan jambul 7%, bobbing8%, berkicau 11%, minum 1%, 1% mandi, berjalan 16% , bersarang 2%, mengeram 9% dan mengasuh anak3%, dan di Nusa Penida pada musim kemarau terdiri terbang 11%, makan buah 9%, makan serangga21%, menelisik bulu 7%, menegakkan jambul 6%, bobbing 7%, berkicau 9%, minum 2%, mandi 1%, berjalan18% , dan bersarang 8%. Jalak Bali berkembang biak di Nusa Penida pada musim hujan dan musimkemarau, tetapi di Taman Nasional Bali Barat pada musim hujan.

  2. Biased causal inseparable game

    CERN Document Server

    Bhattacharya, Some Sankar

    2015-01-01

    Here we study the \\emph{causal inseparable} game introduced in [\\href{http://www.nature.com/ncomms/journal/v3/n10/full/ncomms2076.html}{Nat. Commun. {\\bf3}, 1092 (2012)}], but it's biased version. Two separated parties, Alice and Bob, generate biased bits (say input bit) in their respective local laboratories. Bob generates another biased bit (say decision bit) which determines their goal: whether Alice has to guess Bob's bit or vice-verse. Under the assumption that events are ordered with respect to some global causal relation, we show that the success probability of this biased causal game is upper bounded, giving rise to \\emph{biased causal inequality} (BCI). In the \\emph{process matrix} formalism, which is locally in agreement with quantum physics but assume no global causal order, we show that there exist \\emph{inseparable} process matrices that violate the BCI for arbitrary bias in the decision bit. In such scenario we also derive the maximal violation of the BCI under local operations involving tracele...

  3. Communication Tasks with Infinite Quantum-Classical Separation.

    Science.gov (United States)

    Perry, Christopher; Jain, Rahul; Oppenheim, Jonathan

    2015-07-17

    Quantum resources can be more powerful than classical resources-a quantum computer can solve certain problems exponentially faster than a classical computer, and computing a function of two parties' inputs can be done with exponentially less communication with quantum messages than with classical ones. Here we consider a task between two players, Alice and Bob where quantum resources are infinitely more powerful than their classical counterpart. Alice is given a string of length n, and Bob's task is to exclude certain combinations of bits that Alice might have. If Alice must send classical messages, then she must reveal nearly n bits of information to Bob, but if she is allowed to send quantum bits, the amount of information she must reveal goes to zero with increasing n. Next, we consider a version of the task where the parties may have access to entanglement. With this assistance, Alice only needs to send a constant number of bits, while without entanglement, the number of bits Alice must send grows linearly with n. The task is related to the Pusey-Barrett-Rudolph theorem which arises in the context of the foundations of quantum theory. PMID:26230777

  4. Oblivious Polynomial Evaluation

    Institute of Scientific and Technical Information of China (English)

    Hong-Da Li; Dong-Yao Ji; Deng-Guo Feng; Bao Li

    2004-01-01

    The problem of two-party oblivious polynomial evaluation(OPE)is studied,where one party(Alice)has a polynomial P(x)and the other party(Bob)with an input x wants to learn P(x)in such an oblivious way that Bob obtains P(x)without learning any additional information about P except what is implied by P(x)and Alice does not know Bob's input x.The former OPE protocols are based on an intractability assumption except for OT protocols.In fact,evaluating P(x)is equivalent to computing the product of the coefficient vectors(a0,...,an)and(1,...,xn).Using this idea,an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol.Compared with the existing OPE protocol,another characteristic of the proposed protocols is the degree of the polynomial is private.Another OPE protocol works in case of existence of untrusted third party.

  5. Feasibility of 300 km Quantum Key Distribution with Entangled States

    CERN Document Server

    Scheidl, Thomas; Fedrizzi, Alessandro; Ramelow, Sven; Ma, Xiao-Song; Herbst, Thomas; Prevedel, Robert; Ratschbacher, Lothar; Kofler, Johannes; Jennewein, Thomas; Zeilinger, Anton; 10.1088/1367-2630/11/8/085002

    2010-01-01

    A significant limitation of practical quantum key distribution (QKD) setups is currently their limited operational range. It has recently been emphasized (X. Ma, C.-H. F. Fung, and H.-K. Lo., Phys. Rev. A, 76:012307, 2007) that entanglement-based QKD systems can tolerate higher channel losses than systems based on weak coherent laser pulses (WCP), in particular when the source is located symmetrically between the two communicating parties, Alice and Bob. In the work presented here, we experimentally study this important advantage by implementing different entanglement-based QKD setups on a 144~km free-space link between the two Canary Islands of La Palma and Tenerife. We established three different configurations where the entangled photon source was placed at Alice's location, asymmetrically between Alice and Bob and symmetrically in the middle between Alice and Bob, respectively. The resulting quantum channel attenuations of 35~dB, 58~dB and 71~dB, respectively, significantly exceed the limit for WCP system...

  6. Towards Holographic Quantum Energy Teleportation

    CERN Document Server

    Giataganas, Dimitrios; Liu, Pei-Hua

    2016-01-01

    We propose a protocol of quantum energy teleportation (QET) for holographic conformal field theory (CFT) in 3-dimensional anti-de Sitter space with or without black hole. A generic QET protocol contains two steps: (i) Alice injects the energy into ground state by performing local measurement; (ii) the distant Bob extracts energy by performing local operation according to Alice's measurement outcome. In our holographic protocol, we mimic the step (i) by local projection of an interval of CFT ground state into an excited state described by Banados geometry. For the step (ii) we adopt the surface/state duality to evaluate the energy extraction by local deformation of UV surface as the holographic dual of Bob's local unitary operations. Our results show that this protocol always gains energy extraction. Moreover, the ratio of Bob's extraction energy density to the energy density of the excited state after Alice's local projection is a positive semi-definite and bounded function of the UV surface deformation profi...

  7. A controlled quantum teleportation scheme with identity certification%一种可控量子隐形传态身份认证的方案

    Institute of Scientific and Technical Information of China (English)

    龚敬; 谭晓青

    2013-01-01

    提出了一种实现可控量子隐形传态身份认证的方案.可信第三方Charlie利用纠缠交换原理对接收者Bob进行身份认证,在确定Bob的合法身份并将消息反馈给发送者Alice后,Alice再对量子信息进行传送.本方案能有效解决假冒身份攻击,从而保证量子信息传送的安全性.%This paper proposed a controlled quantum teleportation scheme with identity certification. The receiver Bob was identified by entanglement swapping principle from the trusted Charlie. After the sender Alice gets the feedback from Charlie, and Charlie can make sure the identity of Bob and then send the quantum information to Bob. The scheme could prevent forgery attack effectively to ensure the security of quantum information transmission.

  8. Optimal bounds for parity-oblivious random access codes

    Science.gov (United States)

    Chailloux, André; Kerenidis, Iordanis; Kundu, Srijita; Sikora, Jamie

    2016-04-01

    Random access coding is an information task that has been extensively studied and found many applications in quantum information. In this scenario, Alice receives an n-bit string x, and wishes to encode x into a quantum state {ρ }x, such that Bob, when receiving the state {ρ }x, can choose any bit i\\in [n] and recover the input bit x i with high probability. Here we study two variants: parity-oblivious random access codes (RACs), where we impose the cryptographic property that Bob cannot infer any information about the parity of any subset of bits of the input apart from the single bits x i ; and even-parity-oblivious RACs, where Bob cannot infer any information about the parity of any even-size subset of bits of the input. In this paper, we provide the optimal bounds for parity-oblivious quantum RACs and show that they are asymptotically better than the optimal classical ones. Our results provide a large non-contextuality inequality violation and resolve the main open problem in a work of Spekkens et al (2009 Phys. Rev. Lett. 102 010401). Second, we provide the optimal bounds for even-parity-oblivious RACs by proving their equivalence to a non-local game and by providing tight bounds for the success probability of the non-local game via semidefinite programming. In the case of even-parity-oblivious RACs, the cryptographic property holds also in the device independent model.

  9. Correlation-assisted quantum communication

    International Nuclear Information System (INIS)

    Quantum dense coding is considered to be one of the most remarkable demonstrations of the existence of quantum entanglement. In this paper, we analyze the role of correlations (both classical and quantum) in quantum communication protocols. We study how the capacity of a single-qubit quantum channel depends on correlations between Alice and Bob. In particular, we consider a scenario when Alice and Bob share a pair of qubits in a state such that Alice's qubit is in the state described by the density operator ρ=(1/2)1+n-vector·σ-vector. We evaluate a capacity of the noiseless channel for two cases: (1) when Bob performs measurement just on the particle received from Alice, and (2) in the case when he utilizes correlations that have been established prior to the communication. We present a simple classical scenario which might serve as a prototype of quantum dense coding. We generalize our results also for qudits. In addition, we address some aspects of the issue of security in correlation-assisted communication protocols

  10. Bay of Bengal: coupling of pre-monsoon tropical cyclones with the monsoon onset in Myanmar

    Science.gov (United States)

    Fosu, Boniface O.; Wang, Shih-Yu Simon

    2015-08-01

    The pre-monsoon tropical cyclone (TC) activity and the monsoon evolution in the Bay of Bengal (BoB) are both influenced by the Madden-Julian Oscillation (MJO), but the two do not always occur in unison. This study examines the conditions that allow the MJO to modulate the monsoon onset in Myanmar and TC activity concurrently. Using the APHRODITE gridded precipitation and the ERA-Interim reanalysis datasets, composite evolutions of monsoon rainfall and TC genesis are constructed for the period of 1979-2010. It is found that the MJO exhibits a strong interannual variability in terms of phase and intensity, which in some years modulate the conditions for BoB TCs to shortly precede or form concurrently with the monsoon onset in Myanmar. Such a modulation is absent in years of weaker MJO events. Further understanding of the interannual variability of MJO activity could facilitate the prediction of the monsoon onset and TC formation in the BoB.

  11. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution.

    Science.gov (United States)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-16

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios. PMID:26550855

  12. Choice of measurement as the secret

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Qin, Su-Juan; Huang, Wei; Liu, Feng; Wen, Qiao-Yan

    2014-04-01

    Recently, Kalev et al. [A. Kalev, A. Mann, and M. Revzen, Phys. Rev. Lett. 110, 260502 (2013)., 10.1103/PhysRevLett.110.260502] proposed a quantum (public) communication protocol with an interesting encoding style, where the signal is encoded in the choice of the measurement basis of one of the communicating parties (Bob) and Bob's measurement results are irrelevant for the communication. As we know, one of the main advantages of quantum technique in communication over the classical one is the higher security. Therefore, as Kalev et al. have mentioned in their paper, an interesting open question is whether one could and how to utilize this new encoding style to design a secure communication protocol, i.e., translate the choice of measurement into the secret. Here we propose a quantum key distribution protocol, which is a secure communication protocol, with this encoding style, where Bob's measurement results are still irrelevant. Furthermore, the security of the proposed protocol in the zero-error case has been proved.

  13. Determination of the bond-angle distribution in vitreous B2O3 by 11B double rotation (DOR) NMR spectroscopy

    International Nuclear Information System (INIS)

    The B-O-B bond angle distributions for both ring and non-ring boron sites in vitreous B2O3 have been determined by 11B double rotation (DOR) NMR and multiple-quantum (MQ) DOR NMR. The [B3O6] boroxol rings are observed to have a mean internal B-O-B angle of 120.0±0.7 deg. with a small standard deviation, σR=3.2±0.4 deg., indicating that the rings are near-perfect planar, hexagonal structures. The rings are linked predominantly by non-ring [BO3] units, which share oxygens with the boroxol ring, with a mean Bring-O-Bnon-ring angle of 135.1±0.6 deg. and σNR=6.7±0.4 deg. In addition, the fraction of boron atoms, f, which reside in the boroxol rings has been measured for this sample as f=0.73±0.01. - Graphical abstract: Connectivities and B-O-B bond angle distributions of ring and non-ring boron atoms in v-B2O3 have been determined by 11B double rotation (DOR) NMR, multiple-quantum (MQ) DOR NMR and spin-diffusion DOR. Near-perfect planar, hexagonal [B3O6] boroxol rings are shown to be present. Display Omitted

  14. The Effect of Ionospheric Models on Electromagnetic Pulse Locations

    Energy Technology Data Exchange (ETDEWEB)

    Fenimore, Edward E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Triplett, Laurie A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-01

    Locations of electromagnetic pulses (EMPs) determined by time-of-arrival (TOA) often have outliers with significantly larger errors than expected. In the past, these errors were thought to arise from high order terms in the Appleton-Hartree equation. We simulated 1000 events randomly spread around the Earth into a constellation of 22 GPS satellites. We used four different ionospheres: “simple” where the time delay goes as the inverse of the frequency-squared, “full Appleton-Hartree”, the “BobRD integrals” and a full raytracing code. The simple and full Appleton-Hartree ionospheres do not show outliers whereas the BobRD and raytracing do. This strongly suggests that the cause of the outliers is not additional terms in the Appleton-Hartree equation, but rather is due to the additional path length due to refraction. A method to fix the outliers is suggested based on fitting a time to the delays calculated at the 5 GPS frequencies with BobRD and simple ionospheres. The difference in time is used as a correction to the TOAs.

  15. Near-surface salinity and stratification in the north Bay of Bengal from moored observations

    Science.gov (United States)

    Sengupta, Debasis; Bharath Raj, G. N.; Ravichandran, M.; Sree Lekha, J.; Papa, Fabrice

    2016-05-01

    A thin layer of fresh water from summer monsoon rain and river runoff in the Bay of Bengal (BoB) has profound influence on air-sea interaction across the south Asian region, but the mechanisms that sustain the low-salinity layer are as yet unknown. Using the first long time series of high-frequency observations from a mooring in the north BoB and satellite salinity data, we show that fresh water from major rivers is transported by large-scale flow and eddies, and shallow salinity stratification persists from summer through the following winter. The moored observations show frequent 0.2-1.2 psu salinity jumps with time scales of 10 min to days, due to O(1-10) km submesoscale salinity fronts moving past the mooring. In winter, satellite sea surface temperature shows 10 km wide filaments of cool water, in line with moored data. Rapid salinity and temperature changes at the mooring are highly coherent, suggesting slumping of salinity-dominated fronts. Based on these observations, we propose that submesoscale fronts may be one of the important drivers for the persistent fresh layer in the north BoB.

  16. TEMPO-mediated oxidized winter melon-based carbonaceous aerogel as an ultralight 3D support for enhanced photodegradation of organic pollutants.

    Science.gov (United States)

    Miao, Miao; Wang, Gangling; Cao, Shaomei; Feng, Xin; Fang, Jianhui; Shi, Liyi

    2015-10-14

    Natural biomass based carbonaceous aerogels are becoming promising lightweight, biodegradable matrices to supersede traditional support materials in realizing future sustainable photochemistry and environmental protection. Herein, flower-like BiOBr loaded onto an ultralight TEMPO-mediated oxidized carbonaceous aerogel (BOB@OWMCA) support was successfully prepared using the edible winter melon as source material via a simple solvothermal method. The three-dimensional sponge-like OWMCA with surface functionalization displayed an ultralow density (17.7 mg cm(-3)) and large special surface area (30.6 m(2) g(-1)). The BiOBr was homogeneously anchored on the surface of the hierarchical porous OWMCA and the material exhibited synergetic properties of the BiOBr photocatalyst and OWMCA support to strengthen its photodegradation capacity. The results indicated that the as-prepared BOB@OWMCA composite demonstrated an outstanding adsorption and photodegradation capacity for organic pollutants (rhodamine B) under visible light irradiation. Of importance here, the BOB@OWMCA composite showed a prominent advantage for easy collection and separation from the aqueous system, making it a promising candidate as a robust visible light responsive photocatalyst for a range of applications. PMID:26344492

  17. Quantum steganography with noisy quantum channels

    International Nuclear Information System (INIS)

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  18. Association constants in solutions of lithium salts in butyrolactone and a mixture of propylene carbonate with 1,2-dimethoxyethane (1 : 1), according to conductometric data

    Science.gov (United States)

    Chernozhuk, T. V.; Sherstyuk, Yu. S.; Novikov, D. O.; Kalugin, O. N.

    2016-02-01

    A conductometric study is performed with solutions of lithium bis(oxalato)borate (LiBOB) in γ-butyrolactone (γ-BL) at 278.15-388.15 K and lithium bis(trifluoromethylsulfonyl)imide (LiTFSI), LiBOB, and lithium tetrafluoroborate (LiBF4) in mixtures of propylene carbonate and 1,2-dimethoxyethane (PC + 1,2-DME) (1 : 1) at 278.15-348.15 K. Limiting molar electrical conductivities (LMECs) and association constants ( K a) in the studied solutions of electrolytes are determined using the Lee-Wheaton equation. The effect temperature, the nature of the solvent, and the properties of the anion have on the conductivity and interparticle interactions in solutions of lithium salts in γ-BL and PC + 1,2-DME (1 : 1) is established. It was concluded that the studied solutions are characterized by low values of their association constants. It was found that the BOB;- anion destroys the structure of the solvent.The thickness of the dynamic solvation shell of ions (Δ R) remains constant for both solvents over the studied range of temperatures, and Δ R is significantly greater for Li+ than for other ions.

  19. Semiquantum Key Distribution Using Entangled States

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Sheng; ZHANG Quan; TANG Chao-Jing

    2011-01-01

    Recently,Boyer et al.presented a novel semiquantum key distribution protocol [Phys.Rev.Lett.99 (2007) 140501]by using four quantum states,each of which is randomly prepared in the Z or X basis.Here we present a semiquantum key distribution protocol by using maximally entangled states in which quantum Alice shares a secret key with classical Bob.Quantum Alice has the ability to prepare Bell states and perform Bell basis or computational basis measurement.Classical Bob is restricted to measuring,preparing a particle in the computational basis,reflecting or reordering the particles.The qubit efficiency of the protocol improves to 50% and the protocol can be modified to a measure-resend protocol or a protocol without quantum memory.We also show that the protocol is secure against eavesdropping.Quantum key distribution (QKD) is one of the most promising applications of quantum information science.The goal of QKD is to allow two legitimate parties,Alice and Bob,to generate a secret key over a long distance,in the presence of an eavesdropper,Eve,who interferes with the signals.The security of QKD is based on the fundamental laws of physics.%Recently, Boyer et al. Presented a novel semiquantum key distribution protocol [Phys. Rev. Lett. 99 (2007) 140501] by using four quantum states, each of which is randomly prepared in the Z or X basis. Here we present a semi-quantum key distribution protocol by using maximally entangled states in which quantum Alice shares a secret key with classical Bob. Quantum Alice has the ability to prepare Bell states and perform Bell basis or computational basis measurement. Classical Bob is restricted to measuring, preparing a particle in the computational basis, reflecting or reordering the particles. The qubit efficiency of the protocol improves to 50% and the protocol can be modified to a measure-resend protocol or a protocol without quantum memory. We also show that the protocol is secure against eavesdropping.

  20. Obituary: Robert E. Fried, 1930-2003

    Science.gov (United States)

    Mannery, Edward J.; Szkody, Paula

    2004-12-01

    Professionals and friends knew him as Captain Bob; he was the captain of his airplane, Birdie, and of his observatory, Braeside. He was a man of many talents, and he incorporated those talents into his two main passions in life: flying planes and doing astronomical research. Bob was born on December 14, 1930 in St. Paul, Minnesota to parents Dr. Louis and Emily Fried. His interest in astronomy began after he moved to Atlanta in the late 1950's as a pilot for Delta Airlines. It was there he joined the Atlanta Astronomy Club in 1960 and went on to become its President and also the President of the Astronomical League. Wanting a larger and better telescope than the usual department store variety, he took the advice of Patrick Moore, who suggested he build one himself. So he did. He obtained a military blank for a 16-inch Cassegrain and ground and polished the optics while the heavy parts were machined in the Delta Airlines shops after hours. His observatory protruded from the roof of his home and featured a modified silo dome, while the observer's controls were reminiscent of an airplane cockpit. When it became obvious that the Atlanta climate offered little support for serious Astronomy, Bob moved his family and observatory to a higher, clearer site in the Rockies. There he built a new dome on Flagstaff Mountain near Boulder. Subsequent to meeting and conspiring with fellow enthusiast Edward Mannery, who became his lifelong collaborator, Bob upgraded his system for digital photometry and began to obtain magnitudes to a few percent accuracy. After grumbling about the windy and cloudy weather of the Rockies, Bob tried a site near Lowell Observatory and then finally settled on the best home for Braeside in 1976, a short walk through the pines from the US Naval Observatory. He ultimately created a building he dubbed "The Monastery" after Mt. Wilson, that housed a bedroom, darkroom, electronics shop, machine shop, library and telescope control console and upgraded his

  1. Essay: In Memory of Robert Siemann

    International Nuclear Information System (INIS)

    Bob Siemann came to SLAC from Cornell in 1991. With the support from Burton Richter, then Director of SLAC, he took on a leadership role to formulate an academic program in accelerator physics at SLAC and the development of its accelerator faculty. Throughout his career he championed accelerator physics as an independent academic discipline, a vision that he fought so hard for and never retreated from. He convinced Stanford University and SLAC to create a line of tenured accelerator physics faculty and over the years he also regularly taught classes at Stanford and the U.S. Particle Accelerator School. After the shutdown of the SSC Laboratory, I returned to SLAC in 1993 to join the accelerator faculty he was forming. He had always visualized a need to have a professional academic journal for the accelerator field, and played a pivotal role in creating the journal Physical Review Special Topics - Accelerators and Beams, now the community standard for accelerator physics after nine years of his editorship. Today, Bob's legacy of accelerator physics as an independent academic discipline continues at SLAC as well as in the community, from which we all benefit. Bob was a great experimentalist. He specialized in experimental techniques and instrumentation, but what he wanted to learn is physics. If he had to learn theory - heaven forbid - to reach that goal, he would not hesitate one second to do so. In fact, he had written several theoretical papers as results of these efforts. Now this is what I call a true experimentalist. Ultimately, however, I think it was experimental instruments that he loved most. His eyes widened when he talked about his instruments. Prompted by a question, he would proceed to a nearby blackboard, with a satisfying grin, and draw his experimental device in a careful thinking manner, then describe his experiment and educate the questioner with some insightful physics. These moments were most enjoyable, to him and the questioner alike. When I

  2. Essay: In Memory of Robert Siemann

    Energy Technology Data Exchange (ETDEWEB)

    Chao, Alexander W.; /SLAC

    2011-11-14

    Bob Siemann came to SLAC from Cornell in 1991. With the support from Burton Richter, then Director of SLAC, he took on a leadership role to formulate an academic program in accelerator physics at SLAC and the development of its accelerator faculty. Throughout his career he championed accelerator physics as an independent academic discipline, a vision that he fought so hard for and never retreated from. He convinced Stanford University and SLAC to create a line of tenured accelerator physics faculty and over the years he also regularly taught classes at Stanford and the U.S. Particle Accelerator School. After the shutdown of the SSC Laboratory, I returned to SLAC in 1993 to join the accelerator faculty he was forming. He had always visualized a need to have a professional academic journal for the accelerator field, and played a pivotal role in creating the journal Physical Review Special Topics - Accelerators and Beams, now the community standard for accelerator physics after nine years of his editorship. Today, Bob's legacy of accelerator physics as an independent academic discipline continues at SLAC as well as in the community, from which we all benefit. Bob was a great experimentalist. He specialized in experimental techniques and instrumentation, but what he wanted to learn is physics. If he had to learn theory - heaven forbid - to reach that goal, he would not hesitate one second to do so. In fact, he had written several theoretical papers as results of these efforts. Now this is what I call a true experimentalist! Ultimately, however, I think it was experimental instruments that he loved most. His eyes widened when he talked about his instruments. Prompted by a question, he would proceed to a nearby blackboard, with a satisfying grin, and draw his experimental device in a careful thinking manner, then describe his experiment and educate the questioner with some insightful physics. These moments were most enjoyable, to him and the questioner alike. When I

  3. Air Pollution Over the Ganges Basin and Northwest Bay of Bengal in the Early Postmonsoon Season Based on NASA MERRAero Data

    Science.gov (United States)

    Kishcha, Pavel; Da Silva, Arlindo M.; Starobinets, Boris; Alpert, Pinhas

    2014-01-01

    The MERRA Aerosol Reanalysis (MERRAero) has been recently developed at NASA's Global Modeling Assimilation Office. This reanalysis is based on a version of the Goddard Earth Observing System-5 (GEOS-5) model radiatively coupled with Goddard Chemistry, Aerosol, Radiation, and Transport aerosols, and it includes assimilation of bias-corrected aerosol optical thickness (AOT) from the Moderate Resolution Imaging Spectroradiometer (MODIS) sensor on both Terra and Aqua satellites. In October over the period 2002-2009, MERRAero showed that AOT was lower over the east of the Ganges basin than over the northwest of the Ganges basin: this was despite the fact that the east of the Ganges basin should have produced higher anthropogenic aerosol emissions because of higher population density, increased industrial output, and transportation. This is evidence that higher aerosol emissions do not always correspond to higher AOT over the areas where the effects of meteorological factors on AOT dominate those of aerosol emissions. MODIS AOT assimilation was essential for correcting modeled AOT mainly over the northwest of the Ganges basin, where AOT increments were maximal. Over the east of the Ganges basin and northwest Bay of Bengal (BoB), AOT increments were low and MODIS AOT assimilation did not contribute significantly to modeled AOT. Our analysis showed that increasing AOT trends over northwest BoB (exceeding those over the east of the Ganges basin) were reproduced by GEOS-5, not because of MODIS AOT assimilation butmainly because of the model capability of reproducing meteorological factors contributing to AOT trends. Moreover, vertically integrated aerosol mass flux was sensitive to wind convergence causing aerosol accumulation over northwest BoB.

  4. Characterization of the regulatory network of BoMYB2 in controlling anthocyanin biosynthesis in purple cauliflower.

    Science.gov (United States)

    Chiu, Li-Wei; Li, Li

    2012-10-01

    Purple cauliflower (Brassica oleracea L. var. botrytis) Graffiti represents a unique mutant in conferring ectopic anthocyanin biosynthesis, which is caused by the tissue-specific activation of BoMYB2, an ortholog of Arabidopsis PAP2 or MYB113. To gain a better understanding of the regulatory network of anthocyanin biosynthesis, we investigated the interaction among cauliflower MYB-bHLH-WD40 network proteins and examined the interplay of BoMYB2 with various bHLH transcription factors in planta. Yeast two-hybrid studies revealed that cauliflower BoMYBs along with the other regulators formed the MYB-bHLH-WD40 complexes and BobHLH1 acted as a bridge between BoMYB and BoWD40-1 proteins. Different BoMYBs exhibited different binding activity to BobHLH1. Examination of the BoMYB2 transgenic lines in Arabidopsis bHLH mutant backgrounds demonstrated that TT8, EGL3, and GL3 were all involved in the BoMYB2-mediated anthocyanin biosynthesis. Expression of BoMYB2 in Arabidopsis caused up-regulation of AtTT8 and AtEGL3 as well as a subset of anthocyanin structural genes encoding flavonoid 3'-hydroxylase, dihydroflavonol 4-reductase, and leucoanthocyanidin dioxygenase. Taken together, our results show that MYB-bHLH-WD40 network transcription factors regulated the bHLH gene expression, which may represent a critical feature in the control of anthocyanin biosynthesis. BoMYB2 together with various BobHLHs specifically regulated the late anthocyanin biosynthetic pathway genes for anthocyanin biosynthesis. Our findings provide additional information for the complicated regulatory network of anthocyanin biosynthesis and the transcriptional regulation of transcription factors in vegetable crops. PMID:22644767

  5. Accelerating the spread of laboratory quality improvement efforts in Botswana

    Directory of Open Access Journals (Sweden)

    Kelebeletse O. Mokobela

    2014-09-01

    Full Text Available Background: In 2002, the Ministry of Health (MoH of Botswana began its journey toward laboratory accreditation in an effort to enhance the quality of laboratory services. Aftera difficult start, the MoH recognised the need for a more practical and sustainable method for change that could be implemented nationally; they therefore adopted the Strengthening Laboratory Management Toward Accreditation (SLMTA programme.Objective: This study describes the spread of laboratory quality improvement efforts in Botswana.Methods: Eight laboratories were enrolled into the SLMTA programme in 2010, which included a series of workshops and improvement projects conducted over nine months. Four of these laboratories received supplementary training and focused mentorship from the Botswana Bureau of Standards (BOBS. Laboratory performance was measured at baseline and exit using the World Health Organization Regional Office for Africa’s StepwiseLaboratory Quality Improvement Process Towards Accreditation (SLIPTA checklist. One laboratory did not receive an exit audit and was thus excluded from the analysis.Results: An 18 percentage-point improvement was observed when comparing the median baseline score (53% to the median exit score (71% for the seven laboratories. Laboratories that received additional training and mentorship from BOBS improved 21 percentage points, whilst non-BOBS-mentored laboratories improved eight percentage points. Hospital management buy-in and strong laboratory staff camaraderie were found to be essential forthe positive changes observed.Conclusion: SLMTA facilitated improvements in laboratory quality management systems,yielding immediate and measurable results. This study suggests that pairing the SLMTA programme with additional training and mentorship activities may lead to further increases in laboratory performance; and that SLMTA is a practical approach to extending quality improvement to MOH laboratories.

  6. Enhanced charging capability of lithium metal batteries based on lithium bis(trifluoromethanesulfonyl)imide-lithium bis(oxalato)borate dual-salt electrolytes

    Energy Technology Data Exchange (ETDEWEB)

    Xiang, Hongfa; Shi, Pengcheng; Bhattacharya, Priyanka; Chen, Xilin; Mei, Donghai; Bowden, Mark E.; Zheng, Jianming; Zhang, Jiguang; Xu, Wu

    2016-06-30

    Rechargeable lithium (Li) metal batteries with conventional LiPF6-carbonate electrolytes have been reported to fail quickly at charging current densities of about 1.0 mA cm-2 and above. In this work, we demonstrate the rapid charging capability of the Li||LiNi0.8Co0.15Al0.05O2 (NCA) cells enabled by a dual-salt electrolyte of LiTFSI-LiBOB in a carbonate solvent mixture. It is found that the thickness of solid electrolyte interphase (SEI) layer on Li metal anode largely increases with increasing charging current density. However, the cells using the LiTFSI-LiBOB dual-salt electrolyte significantly outperforms those using the LiPF6 electrolyte at high charging current densities. At the charging current density of 1.50 mA cm-2, the Li||NCA cells with the dual-salt electrolyte can still deliver a discharge capacity of 131 mAh g-1 and a capacity retention of 80% after 100 cycles, while those with the LiPF6 electrolyte start to show fast capacity fading after the 30th cycle and only exhibit a low capacity of 25 mAh g-1 and a low retention of 15% after 100 cycles. The reasons for the good chargeability and cycling stability of the cells using LiTFSI-LiBOB dual-salt electrolyte can be attributed to the good film-formation ability of the electrolyte on lithium metal anode and the highly conductive nature of the sulfur-rich interphase layer.

  7. Enhanced charging capability of lithium metal batteries based on lithium bis(trifluoromethanesulfonyl)imide-lithium bis(oxalato)borate dual-salt electrolytes

    Science.gov (United States)

    Xiang, Hongfa; Shi, Pengcheng; Bhattacharya, Priyanka; Chen, Xilin; Mei, Donghai; Bowden, Mark E.; Zheng, Jianming; Zhang, Ji-Guang; Xu, Wu

    2016-06-01

    Rechargeable lithium (Li) metal batteries with conventional LiPF6-carbonate electrolytes have been reported to fail quickly at charging current densities of about 1.0 mA cm-2 and above. In this work, we demonstrate the rapid charging capability of Li||LiNi0.8Co0.15Al0.05O2 (NCA) cells can be enabled by a dual-salt electrolyte of lithium bis(trifluoromethanesulfonyl)imide (LiTFSI) and lithium bis(oxalato)borate (LiBOB) in a carbonate solvent mixture. The cells using the LiTFSI-LiBOB dual-salt electrolyte significantly outperform those using the LiPF6 electrolyte at high charging current densities. At the charging current density of 1.50 mA cm-2, the Li||NCA cells with the dual-salt electrolyte can still deliver a discharge capacity of 131 mAh g-1 and a capacity retention of 80% after 100 cycles. The Li||NCA cells with the LiPF6 electrolyte start to show fast capacity fading after the 30th cycle and only exhibit a low capacity of 25 mAh g-1 and a low retention of 15% after 100 cycles. The reasons for the good chargeability and cycling stability of the cells using the LiTFSI-LiBOB dual-salt electrolyte can be attributed to the good film-formation ability of the electrolyte on the Li metal anode and the highly conductive nature of the sulfur-rich interphase layer.

  8. Apparatus and method for measuring viscosity

    Science.gov (United States)

    Murphy, Jr., Robert J.

    1986-01-01

    The present invention is directed to an apparatus and method for measuring the viscosity of a fluid. This apparatus and method is particularly useful for the measurement of the viscosity of a liquid in a harsh environment characterized by high temperature and the presence of corrosive or deleterious gases and vapors which adversely affect conventional ball or roller bearings. The apparatus and method of the present invention employ one or more flexural or torsional bearings to suspend a bob capable of limited angular motion within a rotatable sleeve suspended from a stationary frame.

  9. Asiakaslähtöinen markkinointi : Käsityöyrityksen keinot

    OpenAIRE

    Ainasoja, Anja

    2015-01-01

    Opinnäytetyössä haluttiin saada selville kuinka käsityöyrittäjät voisivat markkinoinnissaan ottaa paremmin huomioon heidän asiakkaansa. Tutkimusongelma oli: kuinka käsityöyritykset pystyisivät markkinoimaan tuotteitaan ja yritystään asiakaslähtöisesti. Asiakaslähtöistä markkinointia ja käsityöyrityksen keinoja siihen tarkasteltiin Bob Lauterbornin 4C-mallin avulla. Opinnäytetyö on toiminnallinen ja se muodostuu asiakaslähtöiseen markkinointiin liittyvien osa- alueiden teoriasta käsityöyr...

  10. Swipe this! the guide to great touchscreen game design

    CERN Document Server

    Rogers, Scott

    2012-01-01

    Learn to design games for tablets from a renowned game designer! Eager to start designing games for tablets but not sure where to start? Look no further! Gaming guru Scott Rogers has his finger on the pulse of tablet game design and is willing to impart his wisdom and secrets for designing exciting and successful games. As the creator of such venerable games as God of War, the SpongeBob Squarepants series, and Pac-Man World, to name a few, Rogers writes from personal experience and in this unique book, he hands you the tools to create your own tablet games for the iPad, Android tablets, Ninten

  11. Analysis of pendulum period with an iPod touch/iPhone

    Science.gov (United States)

    Briggle, Justin

    2013-05-01

    We describe the use of Apple’s iPod touch/iPhone, acting as the pendulum bob, as a means of measuring pendulum period, making use of the device’s three-axis digital accelerometer and the freely available SPARKvue app from PASCO scientific. The method can be readily incorporated into an introductory physics laboratory experiment. Moreover, the principles described may be carried out with any number of smartphone devices containing an integrated accelerometer and paired with an appropriate application for collecting and sending accelerometer data as a comma-separated value file.

  12. OS X Mavericks for dummies

    CERN Document Server

    LeVitus, Bob

    2013-01-01

    Coast through OS X Mavericks with help from Dr. Mac and For Dummies Ready to make friends with Mavericks? Then, Dr. Mac's your man. Author and longtime Mac guru, Bob "Dr. Mac" LeVitus shares his witty insights and helpful tips in this full-color update to his bestselling OS X guide. You'll learn the basics of working with the Dock, Launchpad, and Mission Control before moving on to setting up your e-mail, surfing with Safari, organizing your files, and customizing OS X Mavericks for all you need your Mac to do. Familiarizes you with OS X essentials like navigating the desktop, connecting to

  13. Standard Quantum Teleportation and Controlled Quantum Teleportation of an Arbitrary N-Qubit Information State

    Science.gov (United States)

    Verma, Vikram; Prakash, Hari

    2016-04-01

    We explicitly present precise and simple protocols for standard quantum teleportation and controlled quantum teleportation of an arbitrary N-qubit information state and analyse the case of perfect teleportation using general quantum channels and measurement bases. We find condition on resource quantum channel and Bell states for achieving perfect quantum teleportation. We also find the unitary transformation required to be done by Bob for perfect quantum teleportation and discuss the connection with others related works. We also discuss how perfect controlled quantum teleportation demands a correct choice of the measurement basis of additional party.

  14. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  15. Bidirectional teleportation of a pure EPR state by using GHZ states

    Science.gov (United States)

    Hassanpour, Shima; Houshmand, Monireh

    2016-02-01

    In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.

  16. Entanglement concentration and teleportation of multipartite entangled states in an ion trap

    Institute of Scientific and Technical Information of China (English)

    Pan Chang-Ning; Fang Mao-Fa

    2007-01-01

    We propose an effective scheme for the entanglement concentration of a four-particle state via entanglement swapping in an ion trap. Taking the maximally entangled state after concentration as a quantum channel, we can faithfully and determinatively teleport quantum entangled states from Alice to Bob without the joint Bell-state measurement. In the process of constructing the quantum channel, we adopt entanglement swapping to avoid the decrease of entanglement during the distribution of particles. Thus our scheme provides a new prospect for quantum teleportation over a longer distance. Furthermore, the success probability of our scheme is 1.0.

  17. Teleportation of Multi-qudit Entangled States

    Institute of Scientific and Technical Information of China (English)

    ZHAN Xiao-Gui; LI Hong-Mei; ZENG Hao-Sheng

    2006-01-01

    @@ We propose a method to realize the teleportation of an unknown entangled state that consists of many qudits through a partially entangled-qudit quantum channel with the help of 2 log2 d-bit classical communication. The operations used in the teleportation process include a generalized Bell-state measurement and a series of singlequdit π-measurements performed by Alice, a series of generalized qudit-Pauli gates and two-level unitary gates,as well as a qubit measurement performed by Bob. For a maximally entangled quantum channel, the successful probability of the teleportation becomes unit.

  18. Tripartite Quantum Controlled Teleportation via Seven-Qubit Cluster State

    Science.gov (United States)

    Li, Wei; Zha, Xin-Wei; Qi, Jian-Xia

    2016-04-01

    In this paper, a theoretical scheme for tripartite quantum controlled teleportation is presented using the entanglement property of seven-qubit cluster state. This means that Alice wants to transmit a entangled state of particle a to Bob, Charlie wants to transmit a entangled state of particle b to David and Edison wants to transmit a entangled state of particle c to Ford via the control of the supervisor. In the end, we compared the aspects of quantum resource consumption, operation complexity, classical resource consumption, quantum information bits transmitted, success probability and efficiency with other schemes.

  19. Teleportation of n-Particle State via n Pairs of EPR Channels

    Institute of Scientific and Technical Information of China (English)

    CAO Min; ZHU Shi-Qun; FANG Jian-Xing

    2004-01-01

    The teleportation of an arbitrary n-particle state (n ≥ 1) is proposed if n pairs of identical EPR states are utilized as quantum channels. Independent Bell state measurements are performed for joint measurement. By using a special Latin square of order 2n(n ≥ 1), explicit expressions of outcomes after the Bell state measurements by Alice (sender) and the corresponding unitary transformations by Bob (receiver) can be derived. It is shown that the teleportation of n-particle state can be implemented by a series of single-qubit teleportation.

  20. Synoptic weather conditions during BOBMEX

    Indian Academy of Sciences (India)

    S R Kalsi

    2003-06-01

    We document the flow features, which are associated with the important synoptic systems that affected the Bay of Bengal (BoB) and its neighbourhood and controlled the convective activity there during BOBMEX. The monsoon during July and August, 1999 was subdued. It was slightly more active in the initial phase of BOBMEX that commenced on 15th July 1999 and continued up to first week of August 1999 but weakened during the second half of August. The convection was accordingly affected, reducing the rainfall over India. There were several active and weak spells of convection over the Bay of Bengal that manifested in five low pressure systems, of which twobecame depressions.