Fault-tolerant linear optics quantum computation by error-detecting quantum state transfer [PDF]
A scheme for linear optical implementation of fault-tolerant quantum computation is proposed, which is based on an error-detecting code. Each computational step is mediated by transfer of quantum information into an ancilla system embedding error ...
C.-Y. Lu +3 more
core +2 more sources
Mechanisms of IgE‐mediated food allergy and the role of allergen‐specific B cells
Food allergy arises when allergen‐specific B cells preferentially produce immunoglobulin E (IgE) antibodies against harmless foods. This article explains the mechanisms driving IgE‐mediated reactions, highlights the central role of these B cells, and discusses how natural tolerance (NT) and oral immunotherapy (OIT) can reshape allergic immune responses.
Juan‐Felipe López +2 more
wiley +1 more source
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
Secret sharing is one of the most important cryptographic primitives used for data outsourcing. The threshold-based secret sharing scheme is one of the well-known secret sharing schemes in cryptography.
Dong Chen, Wei Lu, Weiwei Xing, Na Wang
doaj +1 more source
Optimal Dividend Payments for the Piecewise-Deterministic Poisson Risk Model
This paper considers the optimal dividend payment problem in piecewise-deterministic compound Poisson risk models. The objective is to maximize the expected discounted dividend payout up to the time of ruin. We provide a comparative study in this general
Chao Zhu +7 more
core +1 more source
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Compress-and-Estimate Source Coding for a Vector Gaussian Source
We consider the remote vector source coding problem in which a vector Gaussian source is to be estimated from noisy linear measurements. For this problem, we derive the performance of the compress-and-estimate (CE) coding scheme and compare it to the ...
Goldsmith, Andrea +3 more
core +1 more source
Complete next-to-leading order calculation for pion production in nucleon-nucleon collisions at threshold [PDF]
Based on a counting scheme that explicitly takes into account the large momentum sqrt(M m_pi) characteristic for pion production in nucleon-nucleon collisions we calculate all diagrams for the reaction NN --> NN pi at threshold up to next-to-leading ...
B.Y. Park +21 more
core +2 more sources
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source
Efficiency identity-based threshold group signature scheme
Threshold group signature was used to guarantee the security of the collective decision.To improve the efficiency,a new identity-based cryptography threshold group signature scheme was proposed basing on bilinear pairing and secret sharing.In this scheme,
LIU Hong-wei 1 +3 more
doaj +2 more sources
New key management scheme of wireless sensor networks based on key relation table
Aimed at some security properties on key management for multicast such as forward confidentiality,backward confidentiality,resisting conspiracy-analysis,expansibility and robustness,and furthermore the obvious character of en-ergy-constraint,a new key ...
HUANG Hai-ping1 +3 more
doaj

