43,378 research outputs found

    A low-power opportunistic communication protocol for wearable applications

    Get PDF
    © 2015 IEEE.Recent trends in wearable applications demand flexible architectures being able to monitor people while they move in free-living environments. Current solutions use either store-download-offline processing or simple communication schemes with real-time streaming of sensor data. This limits the applicability of wearable applications to controlled environments (e.g, clinics, homes, or laboratories), because they need to maintain connectivity with the base station throughout the monitoring process. In this paper, we present the design and implementation of an opportunistic communication framework that simplifies the general use of wearable devices in free-living environments. It relies on a low-power data collection protocol that allows the end user to opportunistically, yet seamlessly manage the transmission of sensor data. We validate the feasibility of the framework by demonstrating its use for swimming, where the normal wireless communication is constantly interfered by the environment

    Microstructural evolution in materials during thermal processing

    Get PDF
    Copyright © 2012 Joseph K. L. Lai et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This article has been made available through the Brunel Open Access Publishing Fund.This article is made available through the Brunel Open Access Publishing Fund

    Real-time food intake classification and energy expenditure estimation on a mobile device

    Get PDF
    © 2015 IEEE.Assessment of food intake has a wide range of applications in public health and life-style related chronic disease management. In this paper, we propose a real-time food recognition platform combined with daily activity and energy expenditure estimation. In the proposed method, food recognition is based on hierarchical classification using multiple visual cues, supported by efficient software implementation suitable for realtime mobile device execution. A Fischer Vector representation together with a set of linear classifiers are used to categorize food intake. Daily energy expenditure estimation is achieved by using the built-in inertial motion sensors of the mobile device. The performance of the vision-based food recognition algorithm is compared to the current state-of-the-art, showing improved accuracy and high computational efficiency suitable for realtime feedback. Detailed user studies have also been performed to demonstrate the practical value of the software environment

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Combining Physical galaxy models with radio observations to constrain the SFRs of high-z dusty star forming galaxies

    Get PDF
    We complement our previous analysis of a sample of z~1-2 luminous and ultra-luminous infrared galaxies ((U)LIRGs), by adding deep VLA radio observations at 1.4 GHz to a large data-set from the far-UV to the sub-mm, including Spitzer and Herschel data. Given the relatively small number of (U)LIRGs in our sample with high S/N radio data, and to extend our study to a different family of galaxies, we also include 6 well sampled near IR-selected BzK galaxies at z~1.5. From our analysis based on the radiative transfer spectral synthesis code GRASIL, we find that, while the IR luminosity may be a biased tracer of the star formation rate (SFR) depending on the age of stars dominating the dust heating, the inclusion of the radio flux offers significantly tighter constraints on SFR. Our predicted SFRs are in good agreement with the estimates based on rest-frame radio luminosity and the Bell (2003) calibration. The extensive spectro-photometric coverage of our sample allows us to set important constraints on the SF history of individual objects. For essentially all galaxies we find evidence for a rather continuous SFR and a peak epoch of SF preceding that of the observation by a few Gyrs. This seems to correspond to a formation redshift of z~5-6. We finally show that our physical analysis may affect the interpretation of the SFR-M* diagram, by possibly shifting, with respect to previous works, the position of the most dust obscured objects to higher M* and lower SFRs.Comment: 26 pages, 15 figures, 3 tables, accepted for publication in MNRAS on Dec. 4th, 201

    Implementation of two-party protocols in the noisy-storage model

    Get PDF
    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guideline

    Vacuum ultraviolet photoabsorption of prime ice analogues of Pluto and Charon

    Get PDF
    Here we present the first Vacuum UltraViolet (VUV) photoabsorption spectra of ice analogues of Pluto and Charon ice mixtures. For Pluto the ice analogue is an icy mixture containing nitrogen (N2), carbon monoxide (CO), methane (CH4) and water (H2O) prepared with a 100:1:1:3 ratio, respectively. Photoabsorption of icy mixtures with and without H2O were recorded and no significant changes in the spectra due to presence of H2O were observed. For Charon a VUV photoabsorption spectra of an ice analogue containing ammonia (NH3) and H2O prepared with a 1:1 ratio was recorded, a spectrum of ammonium hydroxide (NH4OH) was also recorded. These spectra may help to interpret the P-Alice data from New Horizons

    Revival of quantum correlations without system-environment back-action

    Get PDF
    Revivals of quantum correlations have often been explained in terms of back-action on quantum systems by their quantum environment(s). Here we consider a system of two independently evolving qubits, each locally interacting with a classical random external field. The environments of the qubits are also independent, and there is no back-action on the qubits. Nevertheless, entanglement, quantum discord and classical correlations between the two qubits may revive in this model. We explain the revivals in terms of correlations in a classical-quantum state of the environments and the qubits. Although classical states cannot store entanglement on their own, they can play a role in storing and reviving entanglement. It is important to know how the absence of back-action, or modelling an environment as classical, affects the kind of system time evolutions one is able to describe. We find a class of global time evolutions where back-action is absent and for which there is no loss of generality in modelling the environment as classical. Finally, we show that the revivals can be connected with the increase of a parameter used to quantify non-Markovianity of the single-qubit dynamics.Comment: 8 pages, 4 figures; this version to appear in Phys. Rev.

    Entanglement degradation in the solid state: interplay of adiabatic and quantum noise

    Get PDF
    We study entanglement degradation of two non-interacting qubits subject to independent baths with broadband spectra typical of solid state nanodevices. We obtain the analytic form of the concurrence in the presence of adiabatic noise for classes of entangled initial states presently achievable in experiments. We find that adiabatic (low frequency) noise affects entanglement reduction analogously to pure dephasing noise. Due to quantum (high frequency) noise, entanglement is totally lost in a state-dependent finite time. The possibility to implement on-chip both local and entangling operations is briefly discussed.Comment: Replaced with published version. Minor change
    corecore