386 research outputs found
Universal quantum computation with unlabeled qubits
We show that an n-th root of the Walsh-Hadamard transform (obtained from the
Hadamard gate and a cyclic permutation of the qubits), together with two
diagonal matrices, namely a local qubit-flip (for a fixed but arbitrary qubit)
and a non-local phase-flip (for a fixed but arbitrary coefficient), can do
universal quantum computation on n qubits. A quantum computation, making use of
n qubits and based on these operations, is then a word of variable length, but
whose letters are always taken from an alphabet of cardinality three.
Therefore, in contrast with other universal sets, no choice of qubit lines is
needed for the application of the operations described here. A quantum
algorithm based on this set can be interpreted as a discrete diffusion of a
quantum particle on a de Bruijn graph, corrected on-the-fly by auxiliary
modifications of the phases associated to the arcs.Comment: 6 page
"Of Mice and Measures": A Project to Improve How We Advance Duchenne Muscular Dystrophy Therapies to the Clinic
A new line of dystrophic mdx mice on the DBA/2J (D2) background has emerged as a candidate to study the efficacy of therapeutic approaches for Duchenne muscular dystrophy (DMD). These mice harbor genetic polymorphisms that appear to increase the severity of the dystropathology, with disease modifiers that also occur in DMD patients, making them attractive for efficacy studies and drug development. This workshop aimed at collecting and consolidating available data on the pathological features and the natural history of these new D2/mdx mice, for comparison with classic mdx mice and controls, and to identify gaps in information and their potential value. The overall aim is to establish guidance on how to best use the D2/mdx mouse model in preclinical studies
Recommended from our members
Securitizing the Muslim Brotherhood: state violence and authoritarianism in Egypt after the Arab Spring
Unprecedented levels of state violence against the Muslim Brotherhood, and the widespread acceptance of this violence by Egyptians following the July 2013 military coup, have been under-examined by scholars of both critical security studies and Middle East politics, reflecting implicit assumptions that state violence is unexceptional beyond Europe. This article explores how the deployment of such levels of violence was enabled by a securitization process in which the Egyptian military successfully appropriated popular opposition to Muslim Brotherhood rule, constructing the group as an existential threat to Egypt and justifying special measures against it. The article builds on existing critiques of the Eurocentrism of securitization theory, alongside the writings of Antonio Gramsci, to further refine its application to non-democratic contexts. In addition to revealing the exceptionalism of state violence against the Muslim Brotherhood and highlighting the important role of nominally non-state actors in constructing the Muslim Brotherhood as a threat to Egypt, the article also signals the role of securitization in re-establishing authoritarian rule in the wake of the 2011 uprising. Thus, we argue that securitization not only constitutes a break from ‘normal politics’ but may also be integral to the reconstitution of ‘normal politics’ following a period of transition
Embedding complete binary trees into star networks
Abstract. Star networks have been proposed as a possible interconnection network for massively parallel computers. In this paper we investigate embeddings of complete binary trees into star networks. Let G and H be two networks represented by simple undirected graphs. An embedding of G into H is an injective mapping f from the vertices of G into the vertices of H. The dilation of the embedding is the maximum distance between f(u), f(v) taken over all edges (u, v) of G. Low dilation embeddings of binary trees into star graphs correspond to efficient simulations of parallel algorithms that use the binary tree topology, on parallel computers interconnected with star networks. First, we give a construction of embeddings of dilation 1 of complete binary trees into n-dimensional star graphs. These trees are subgraphs of star graphs. Their height is fl(n log n), which is asymptotically optimal. Constructions of embeddings of complete binary trees of dilation 28 and 26 + 1, for 8 > 1, into star graphs are then given. The use of larger dilation allows embeddings of trees of greater height into star graphs. For example, the difference of the heights of the trees embedded with dilation 2 and 1 is greater than n/2. All these constructions can be modified to yield embeddings of dilation 1, and 26, for ~ > 1, of complete binary trees into pancake graphs. Our results show that massively parallel computers interconnected with star networks are well suited for efficient simulations of parallel algorithms with complete binary tree topology
The heart of Rett syndrome: A quantitative analysis of cardiac repolarization
BACKGROUND: Rett syndrome (RTT) is a developmental encephalopathy disorder that is associated with a high incidence of sudden death presumably from cardiorespiratory etiologies. Electrocardiogram (ECG) abnormalities, such as prolonged heart-rate corrected QT (QTc) interval, are markers of cardiac repolarization and are associated with potentially lethal ventricular arrhythmias. This study investigates the cardiac repolarization characteristics of RTT patients, including QTc and T-wave morphology characteristics.
METHODS: A retrospective quantitative analysis on 110 RTT patients and 124 age and sex-matched healthy controls was conducted.
RESULTS: RTT patients had longer QTc, more abnormal T-wave morphology, and greater heterogeneity of cardiac repolarization parameters compared to controls. Even RTT patients without prolonged QTc had more abnormal ECG and T-wave characteristics than controls. Among RTT patients,
CONCLUSIONS: Cardiac repolarization abnormalities are present in RTT patients, even without long QTc. T-wave morphology is related to RTT genotype and may be predictive of mortality. These findings could be used to help the management and monitoring of RTT patients
Authoritarian Regime Learning: Comparative Insights from the Arab Uprisings
This paper examines the learning of authoritarian regimes in the early phase of the Arab uprisings. Differentiating conceptually between learning and policy change, we analyze and compare the authoritarian regimes of Algeria, Bahrain, Jordan, and Syria and their reactions to the challenge of "late riser" oppositional protests. We first show that the four regimes initiated very diverse measures in the domains of repression, material co-optation, and legal reforms. With regard to the sources of learning, we find that proximity is a determining factor, in terms of both geography and political similarity. Using the case of Bahrain, we then demonstrate that structural factors such as internal power structures, regional and international pressures, or state capacity can decisively constrain the implementation of learning-induced policy change. Overall, the paper aims to contribute to the emerging research on the international dimension of authoritarian regimes in the Middle East and beyond
The battle over Syria's reconstruction
Reconstruction is becoming the new battleground in the Syrian conflict—its continuation by other means. It is instrumentalized by the regime as a way to reconsolidate its control over the country and by rival regional and international powers to shape the internal balance of power and establish spheres of influence in the country. The paper examines the Asad regime’s practices, including co-optation of militia leaders via reconstruction concessions and use of reconstruction to clear strategic areas of opposition-dominated urban settlements. The paper then surveys how the geopolitical struggle in Syria has produced an asymmetry as regards reconstruction: those powers that lost the geo-political contest on the ground seek to use geo-economic superiority to reverse the geo-political outcome. Then the impact of proxy wars and spheres of influence in the country on the security context for reconstruction is examined. Finally, the reconstruction initiatives of the various external parties are assessed, including Russia, Iran and Turkey as well as the spoiler role by which the US seeks to obstruct reconstruction that would spell victory in Syria for its Russian and Iranian rivals.PostprintPeer reviewe
Serial Examination of an Inducible and Reversible Dilated Cardiomyopathy in Individual Adult Drosophila
Recent work has demonstrated that Drosophila can be used as a model of dilated cardiomyopathy, defined as an enlarged cardiac chamber at end-diastole when the heart is fully relaxed and having an impaired systolic function when the heart is fully contracted. Gene mutations that cause cardiac dysfunction in adult Drosophila can result from abnormalities in cardiac development or alterations in post-developmental heart function. To clarify the contribution of transgene expression to post-developmental cardiac abnormalities, we applied strategies to examine the temporal and spacial effects of transgene expression on cardiac function. We engineered transgenic Drosophila based on the well-characterized temperature-sensitive Gal80 protein in the context of the bipartite Gal4/UAS transgenic expression system in Drosophila employing the cardiac specific driver, tinCΔ4-Gal4. Then, we developed a strategy using optical coherence tomography to serially measure cardiac function in the individual flies over time course of several days. As a proof of concept we examined the effects of the expression of a human mutant delta-sarcoglycan associated with familial heart failure and observed a reversible, post-developmental dilated cardiomyopathy in Drosophila. Our results show that the unique imaging strategy based on the non-destructive, non-invasive properties of optical coherence tomography can be applied to serially examine cardiac function in individual adult flies. Furthermore, the induction and reversal of cardiac transgene expression can be investigated in adult flies thereby providing insight into the post-developmental effects of transgene expression
Task swapping networks in distributed systems
In this paper we propose task swapping networks for task reassignments by
using task swappings in distributed systems. Some classes of task reassignments
are achieved by using iterative local task swappings between software agents in
distributed systems. We use group-theoretic methods to find a minimum-length
sequence of adjacent task swappings needed from a source task assignment to a
target task assignment in a task swapping network of several well-known
topologies.Comment: This is a preprint of a paper whose final and definite form is
published in: Int. J. Comput. Math. 90 (2013), 2221-2243 (DOI:
10.1080/00207160.2013.772985
- …
