Sample records for decoy state quantum

  1. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  2. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  3. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  4. Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations

    NASA Astrophysics Data System (ADS)

    Zhu, Jian-Rong; Li, Jian; Zhang, Chun-Mei; Wang, Qin

    2017-10-01

    The decoy-state method has been widely used in commercial quantum key distribution (QKD) systems. In view of the practical decoy-state QKD with both source errors and statistical fluctuations, we propose a universal model of full parameter optimization in biased decoy-state QKD with phase-randomized sources. Besides, we adopt this model to carry out simulations of two widely used sources: weak coherent source (WCS) and heralded single-photon source (HSPS). Results show that full parameter optimization can significantly improve not only the secure transmission distance but also the final key generation rate. And when taking source errors and statistical fluctuations into account, the performance of decoy-state QKD using HSPS suffered less than that of decoy-state QKD using WCS.

  5. Simple scheme to implement decoy-state reference-frame-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Chunmei; Zhu, Jianrong; Wang, Qin

    2018-06-01

    We propose a simple scheme to implement decoy-state reference-frame-independent quantum key distribution (RFI-QKD), where signal states are prepared in Z, X, and Y bases, decoy states are prepared in X and Y bases, and vacuum states are set to no bases. Different from the original decoy-state RFI-QKD scheme whose decoy states are prepared in Z, X and Y bases, in our scheme decoy states are only prepared in X and Y bases, which avoids the redundancy of decoy states in Z basis, saves the random number consumption, simplifies the encoding device of practical RFI-QKD systems, and makes the most of the finite pulses in a short time. Numerical simulations show that, considering the finite size effect with reasonable number of pulses in practical scenarios, our simple decoy-state RFI-QKD scheme exhibits at least comparable or even better performance than that of the original decoy-state RFI-QKD scheme. Especially, in terms of the resistance to the relative rotation of reference frames, our proposed scheme behaves much better than the original scheme, which has great potential to be adopted in current QKD systems.

  6. Finite-data-size study on practical universal blind quantum computation

    NASA Astrophysics Data System (ADS)

    Zhao, Qiang; Li, Qiong

    2018-07-01

    The universal blind quantum computation with weak coherent pulses protocol is a practical scheme to allow a client to delegate a computation to a remote server while the computation hidden. However, in the practical protocol, a finite data size will influence the preparation efficiency in the remote blind qubit state preparation (RBSP). In this paper, a modified RBSP protocol with two decoy states is studied in the finite data size. The issue of its statistical fluctuations is analyzed thoroughly. The theoretical analysis and simulation results show that two-decoy-state case with statistical fluctuation is closer to the asymptotic case than the one-decoy-state case with statistical fluctuation. Particularly, the two-decoy-state protocol can achieve a longer communication distance than the one-decoy-state case in this statistical fluctuation situation.

  7. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

    PubMed Central

    Liu, Li; Guo, Fen-Zhuo; Qin, Su-Juan; Wen, Qiao-Yan

    2017-01-01

    Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen. PMID:28198808

  8. Decoy-state quantum key distribution with biased basis choice

    PubMed Central

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states. PMID:23948999

  9. Decoy-state quantum key distribution with biased basis choice.

    PubMed

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

  10. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  11. Making the decoy-state measurement-device-independent quantum key distribution practically useful

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin

    2016-04-01

    The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

  12. Optimized decoy state QKD for underwater free space communication

    NASA Astrophysics Data System (ADS)

    Lopes, Minal; Sarwade, Nisha

    Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.

  13. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.

    PubMed

    Mao, Chen-Chen; Zhou, Xing-Yu; Zhu, Jian-Rong; Zhang, Chun-Hui; Zhang, Chun-Mei; Wang, Qin

    2018-05-14

    Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.

  14. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.

    PubMed

    Liu, Li; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2017-09-12

    Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.

  15. Biased three-intensity decoy-state scheme on the measurement-device-independent quantum key distribution using heralded single-photon sources.

    PubMed

    Zhang, Chun-Hui; Zhang, Chun-Mei; Guo, Guang-Can; Wang, Qin

    2018-02-19

    At present, most of the measurement-device-independent quantum key distributions (MDI-QKD) are based on weak coherent sources and limited in the transmission distance under realistic experimental conditions, e.g., considering the finite-size-key effects. Hence in this paper, we propose a new biased decoy-state scheme using heralded single-photon sources for the three-intensity MDI-QKD, where we prepare the decoy pulses only in X basis and adopt both the collective constraints and joint parameter estimation techniques. Compared with former schemes with WCS or HSPS, after implementing full parameter optimizations, our scheme gives distinct reduced quantum bit error rate in the X basis and thus show excellent performance, especially when the data size is relatively small.

  16. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  17. Beating the photon-number-splitting attack in practical quantum cryptography.

    PubMed

    Wang, Xiang-Bin

    2005-06-17

    We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.

  18. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  19. Decoy-state quantum key distribution with polarized photons over 200 km.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Jian; Cai, Wen-Qi; Wan, Xu; Chen, Luo-Kan; Wang, Jin-Hong; Liu, Shu-Bin; Liang, Hao; Yang, Lin; Peng, Cheng-Zhi; Chen, Kai; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-04-12

    We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.

  20. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  1. Getting something out of nothing in the measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tan, Yong-Gang; Cai, Qing-Yu; Yang, Hai-Feng; Hu, Yao-Hua

    2015-11-01

    Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcomes are generated from the dark counts, no entanglement is actually obtained. However, secure key bits can still be proven to be generated from these measurement outcomes. Especially, we will give numerical studies on the contributions of dark counts to the key generation rate in practical decoy state MDI-QKD where a signal source, a weaker decoy source and a vacuum decoy source are used by either legitimate key distributer.

  2. Round-robin differential-phase-shift quantum key distribution with heralded pair-coherent sources

    NASA Astrophysics Data System (ADS)

    Wang, Le; Zhao, Shengmei

    2017-04-01

    Round-robin differential-phase-shift (RRDPS) quantum key distribution (QKD) scheme provides an effective way to overcome the signal disturbance from the transmission process. However, most RRDPS-QKD schemes use weak coherent pulses (WCPs) as the replacement of the perfect single-photon source. Considering the heralded pair-coherent source (HPCS) can efficiently remove the shortcomings of WCPs, we propose a RRDPS-QKD scheme with HPCS in this paper. Both infinite-intensity decoy-state method and practical three-intensity decoy-state method are adopted to discuss the tight bound of the key rate of the proposed scheme. The results show that HPCS is a better candidate for the replacement of the perfect single-photon source, and both the key rate and the transmission distance are greatly increased in comparison with those results with WCPs when the length of the pulse trains is small. Simultaneously, the performance of the proposed scheme using three-intensity decoy states is close to that result using infinite-intensity decoy states when the length of pulse trains is small.

  3. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  4. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  5. Passive decoy-state quantum key distribution with practical light sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Curty, Marcos; Ma, Xiongfeng; Qi, Bing

    2010-02-15

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simplemore » threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.« less

  6. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  7. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  8. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  9. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  10. Efficient quantum dialogue without information leakage

    NASA Astrophysics Data System (ADS)

    Yin, Ai-Han; Tang, Zhi-Hui; Chen, Dong

    2015-02-01

    A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.

  11. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  12. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber.

    PubMed

    Yin, Hua-Lei; Chen, Teng-Yun; Yu, Zong-Wen; Liu, Hui; You, Li-Xing; Zhou, Yi-Heng; Chen, Si-Jing; Mao, Yingqiu; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Hao; Li, Ming Jun; Nolan, Daniel; Zhou, Fei; Jiang, Xiao; Wang, Zhen; Zhang, Qiang; Wang, Xiang-Bin; Pan, Jian-Wei

    2016-11-04

    Measurement-device-independent quantum key distribution (MDIQKD) with the decoy-state method negates security threats of both the imperfect single-photon source and detection losses. Lengthening the distance and improving the key rate of quantum key distribution (QKD) are vital issues in practical applications of QKD. Herein, we report the results of MDIQKD over 404 km of ultralow-loss optical fiber and 311 km of a standard optical fiber while employing an optimized four-intensity decoy-state method. This record-breaking implementation of the MDIQKD method not only provides a new distance record for both MDIQKD and all types of QKD systems but also, more significantly, achieves a distance that the traditional Bennett-Brassard 1984 QKD would not be able to achieve with the same detection devices even with ideal single-photon sources. This work represents a significant step toward proving and developing feasible long-distance QKD.

  13. Quantum communications system with integrated photonic devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Peterson, Charles Glen; Newell, Raymond Thorson

    Security is increased in quantum communication (QC) systems lacking a true single-photon laser source by encoding a transmitted optical signal with two or more decoy-states. A variable attenuator or amplitude modulator randomly imposes average photon values onto the optical signal based on data input and the predetermined decoy-states. By measuring and comparing photon distributions for a received QC signal, a single-photon transmittance is estimated. Fiber birefringence is compensated by applying polarization modulation. A transmitter can be configured to transmit in conjugate polarization bases whose states of polarization (SOPs) can be represented as equidistant points on a great circle on themore » Poincare sphere so that the received SOPs are mapped to equidistant points on a great circle and routed to corresponding detectors. Transmitters are implemented in quantum communication cards and can be assembled from micro-optical components, or transmitter components can be fabricated as part of a monolithic or hybrid chip-scale circuit.« less

  14. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  15. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2017-03-01

    We show how to calculate the secure final key rate in the four-intensity decoy-state measurement-device-independent quantum key distribution protocol with both source errors and statistical fluctuations with a certain failure probability. Our results rely only on the range of only a few parameters in the source state. All imperfections in this protocol have been taken into consideration without assuming any specific error patterns of the source.

  16. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  17. FPGA and USB based control board for quantum random number generator

    NASA Astrophysics Data System (ADS)

    Wang, Jian; Wan, Xu; Zhang, Hong-Fei; Gao, Yuan; Chen, Teng-Yun; Liang, Hao

    2009-09-01

    The design and implementation of FPGA-and-USB-based control board for quantum experiments are discussed. The usage of quantum true random number generator, control- logic in FPGA and communication with computer through USB protocol are proposed in this paper. Programmable controlled signal input and output ports are implemented. The error-detections of data frame header and frame length are designed. This board has been used in our decoy-state based quantum key distribution (QKD) system successfully.

  18. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-05-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0‧⟩ state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0‧⟩. By using the |0‧⟩ state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province of China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province of China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  19. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  20. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  1. Three-party quantum secure direct communication against collective noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  2. Decoy-state quantum key distribution with more than three types of photon intensity pulses

    NASA Astrophysics Data System (ADS)

    Chau, H. F.

    2018-04-01

    The decoy-state method closes source security loopholes in quantum key distribution (QKD) using a laser source. In this method, accurate estimates of the detection rates of vacuum and single-photon events plus the error rate of single-photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1 % relative error. Here I report an experimentally feasible way that greatly improves these estimates and hence increases the one-way key rate of the BB84 QKD protocol with unbiased bases selection by at least 20% on average in realistic settings. The major tricks are the use of more than three types of photon intensities plus the fact that estimating bounds of the above detection and error rates is numerically stable, although these bounds are related to the inversion of a high condition number matrix.

  3. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources

    PubMed Central

    Wang, Qin; Zhou, Xing-Yu; Guo, Guang-Can

    2016-01-01

    In this paper, we put forward a new approach towards realizing measurement-device-independent quantum key distribution with passive heralded single-photon sources. In this approach, both Alice and Bob prepare the parametric down-conversion source, where the heralding photons are labeled according to different types of clicks from the local detectors, and the heralded ones can correspondingly be marked with different tags at the receiver’s side. Then one can obtain four sets of data through using only one-intensity of pump light by observing different kinds of clicks of local detectors. By employing the newest formulae to do parameter estimation, we could achieve very precise prediction for the two-single-photon pulse contribution. Furthermore, by carrying out corresponding numerical simulations, we compare the new method with other practical schemes of measurement-device-independent quantum key distribution. We demonstrate that our new proposed passive scheme can exhibit remarkable improvement over the conventional three-intensity decoy-state measurement-device-independent quantum key distribution with either heralded single-photon sources or weak coherent sources. Besides, it does not need intensity modulation and can thus diminish source-error defects existing in several other active decoy-state methods. Therefore, if taking intensity modulating errors into account, our new method will show even more brilliant performance. PMID:27759085

  4. Long-distance measurement-device-independent multiparty quantum communication.

    PubMed

    Fu, Yao; Yin, Hua-Lei; Chen, Teng-Yun; Chen, Zeng-Bing

    2015-03-06

    The Greenberger-Horne-Zeilinger (GHZ) entanglement, originally introduced to uncover the extreme violation of local realism against quantum mechanics, is an important resource for multiparty quantum communication tasks. But the low intensity and fragility of the GHZ entanglement source in current conditions have made the practical applications of these multiparty tasks an experimental challenge. Here we propose a feasible scheme for practically distributing the postselected GHZ entanglement over a distance of more than 100 km for experimentally accessible parameter regimes. Combining the decoy-state and measurement-device-independent protocols for quantum key distribution, we anticipate that our proposal suggests an important avenue for practical multiparty quantum communication.

  5. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  6. Simple and high-speed polarization-based QKD

    NASA Astrophysics Data System (ADS)

    Grünenfelder, Fadri; Boaron, Alberto; Rusca, Davide; Martin, Anthony; Zbinden, Hugo

    2018-01-01

    We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.

  7. How to implement decoy-state quantum key distribution for a satellite uplink with 50-dB channel loss

    NASA Astrophysics Data System (ADS)

    Meyer-Scott, Evan; Yan, Zhizhong; MacDonald, Allison; Bourgoin, Jean-Philippe; Hübel, Hannes; Jennewein, Thomas

    2011-12-01

    Quantum key distribution (QKD) takes advantage of fundamental properties of quantum physics to allow two distant parties to share a secret key; however, QKD is hampered by a distance limitation of a few hundred kilometers on Earth. The most immediate solution for global coverage is to use a satellite, which can receive separate QKD transmissions from two or more ground stations and act as a trusted node to link these ground stations. In this article we report on a system capable of performing QKD in the high loss regime expected in an uplink to a satellite using weak coherent pulses and decoy states. Such a scenario profits from the simplicity of its receiver payload, but has so far been considered to be infeasible due to very high transmission losses (40-50 dB). The high loss is overcome by implementing an innovative photon source and advanced timing analysis. Our system handles up to 57 dB photon loss in the infinite key limit, confirming the viability of the satellite uplink scenario. We emphasize that while this system was designed with a satellite uplink in mind, it could just as easily overcome high losses on any free space QKD link.

  8. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  9. Quantum state sharing against the controller's cheating

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  10. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  11. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  12. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  13. Satellite-to-ground quantum key distribution.

    PubMed

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-09-07

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD-a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

  14. Modeling, Simulation, and Analysis of a Decoy State Enabled Quantum Key Distribution System

    DTIC Science & Technology

    2015-03-26

    through the fiber , we assume Alice and Bob have correct basis alignment and timing control for reference frame correction and precise photon detection...optical components ( laser , polarization modulator, electronic variable optical attenuator, fixed optical attenuator, fiber channel, beamsplitter...generated by the laser in the CPG propagate through multiple optical components, each with a unique propagation delay before reaching the OPM. Timing

  15. Prefixed-threshold real-time selection method in free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong

    2018-03-01

    Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.

  16. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  17. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    NASA Astrophysics Data System (ADS)

    Wang, Le; Zhao, Sheng-Mei; Gong, Long-Yan; Cheng, Wei-Wen

    2015-12-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003), the Natural Science Research Foundation for Universities of Jiangsu Province of China (Grant No. 11KJA510002), the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011), and the Innovation Program of Graduate Education of Jiangsu Province, China (Grant No. KYLX0810). Gong Long-Yan is partially supported by Qinglan Project of Jiangsu Province, China.

  18. Decoy state method for quantum cryptography based on phase coding into faint laser pulses

    NASA Astrophysics Data System (ADS)

    Kulik, S. P.; Molotkov, S. N.

    2017-12-01

    We discuss the photon number splitting attack (PNS) in systems of quantum cryptography with phase coding. It is shown that this attack, as well as the structural equations for the PNS attack for phase encoding, differs physically from the analogous attack applied to the polarization coding. As far as we know, in practice, in all works to date processing of experimental data has been done for phase coding, but using formulas for polarization coding. This can lead to inadequate results for the length of the secret key. These calculations are important for the correct interpretation of the results, especially if it concerns the criterion of secrecy in quantum cryptography.

  19. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    NASA Astrophysics Data System (ADS)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  20. Strong light illumination on gain-switched semiconductor lasers helps the eavesdropper in practical quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Fei, Yang-yang; Meng, Xiang-dong; Gao, Ming; Yang, Yi; Wang, Hong; Ma, Zhi

    2018-07-01

    The temperature of the semiconductor diode increases under strong light illumination whether thermoelectric cooler is installed or not, which changes the output wavelength of the laser (Lee et al., 2017). However, other characteristics also vary as temperature increases. These variations may help the eavesdropper in practical quantum key distribution systems. We study the effects of temperature increase on gain-switched semiconductor lasers by simulating temperature dependent rate equations. The results show that temperature increase may cause large intensity fluctuation, decrease the output intensity and lead the signal state and decoy state distinguishable. We also propose a modified photon number splitting attack by exploiting the effects of temperature increase. Countermeasures are also proposed.

  1. Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-01

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  2. One-sided measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  3. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

    PubMed

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-16

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  4. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  5. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  6. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  7. Quantum key distribution over 120 km using ultrahigh purity single-photon source and superconducting single-photon detectors.

    PubMed

    Takemoto, Kazuya; Nambu, Yoshihiro; Miyazawa, Toshiyuki; Sakuma, Yoshiki; Yamamoto, Tsuyoshi; Yorozu, Shinichi; Arakawa, Yasuhiko

    2015-09-25

    Advances in single-photon sources (SPSs) and single-photon detectors (SPDs) promise unique applications in the field of quantum information technology. In this paper, we report long-distance quantum key distribution (QKD) by using state-of-the-art devices: a quantum-dot SPS (QD SPS) emitting a photon in the telecom band of 1.5 μm and a superconducting nanowire SPD (SNSPD). At the distance of 100 km, we obtained the maximal secure key rate of 27.6 bps without using decoy states, which is at least threefold larger than the rate obtained in the previously reported 50-km-long QKD experiment. We also succeeded in transmitting secure keys at the rate of 0.307 bps over 120 km. This is the longest QKD distance yet reported by using known true SPSs. The ultralow multiphoton emissions of our SPS and ultralow dark count of the SNSPD contributed to this result. The experimental results demonstrate the potential applicability of QD SPSs to practical telecom QKD networks.

  8. Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding

    PubMed Central

    Liang, Wen-Ye; Wang, Shuang; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; Yao, Yao; Huang, Jing-Zheng; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust. PMID:24402550

  9. Threshold quantum secret sharing based on single qubit

    NASA Astrophysics Data System (ADS)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  10. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    NASA Astrophysics Data System (ADS)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  11. Quantum key distribution over 120 km using ultrahigh purity single-photon source and superconducting single-photon detectors

    PubMed Central

    Takemoto, Kazuya; Nambu, Yoshihiro; Miyazawa, Toshiyuki; Sakuma, Yoshiki; Yamamoto, Tsuyoshi; Yorozu, Shinichi; Arakawa, Yasuhiko

    2015-01-01

    Advances in single-photon sources (SPSs) and single-photon detectors (SPDs) promise unique applications in the field of quantum information technology. In this paper, we report long-distance quantum key distribution (QKD) by using state-of-the-art devices: a quantum-dot SPS (QD SPS) emitting a photon in the telecom band of 1.5 μm and a superconducting nanowire SPD (SNSPD). At the distance of 100 km, we obtained the maximal secure key rate of 27.6 bps without using decoy states, which is at least threefold larger than the rate obtained in the previously reported 50-km-long QKD experiment. We also succeeded in transmitting secure keys at the rate of 0.307 bps over 120 km. This is the longest QKD distance yet reported by using known true SPSs. The ultralow multiphoton emissions of our SPS and ultralow dark count of the SNSPD contributed to this result. The experimental results demonstrate the potential applicability of QD SPSs to practical telecom QKD networks. PMID:26404010

  12. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  13. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  14. A Quantum-Based Similarity Method in Virtual Screening.

    PubMed

    Al-Dabbagh, Mohammed Mumtaz; Salim, Naomie; Himmat, Mubarak; Ahmed, Ali; Saeed, Faisal

    2015-10-02

    One of the most widely-used techniques for ligand-based virtual screening is similarity searching. This study adopted the concepts of quantum mechanics to present as state-of-the-art similarity method of molecules inspired from quantum theory. The representation of molecular compounds in mathematical quantum space plays a vital role in the development of quantum-based similarity approach. One of the key concepts of quantum theory is the use of complex numbers. Hence, this study proposed three various techniques to embed and to re-represent the molecular compounds to correspond with complex numbers format. The quantum-based similarity method that developed in this study depending on complex pure Hilbert space of molecules called Standard Quantum-Based (SQB). The recall of retrieved active molecules were at top 1% and top 5%, and significant test is used to evaluate our proposed methods. The MDL drug data report (MDDR), maximum unbiased validation (MUV) and Directory of Useful Decoys (DUD) data sets were used for experiments and were represented by 2D fingerprints. Simulated virtual screening experiment show that the effectiveness of SQB method was significantly increased due to the role of representational power of molecular compounds in complex numbers forms compared to Tanimoto benchmark similarity measure.

  15. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jian-Yu; Yang, Bin; Liao, Sheng-Kai; Zhang, Liang; Shen, Qi; Hu, Xiao-Fang; Wu, Jin-Cai; Yang, Shi-Ji; Jiang, Hao; Tang, Yan-Lin; Zhong, Bo; Liang, Hao; Liu, Wei-Yue; Hu, Yi-Hua; Huang, Yong-Mei; Qi, Bo; Ren, Ji-Gang; Pan, Ge-Sheng; Yin, Juan; Jia, Jian-Jun; Chen, Yu-Ao; Chen, Kai; Peng, Cheng-Zhi; Pan, Jian-Wei

    2013-05-01

    Quantum key distribution (QKD) provides the only intrinsically unconditional secure method for communication based on the principle of quantum mechanics. Compared with fibre-based demonstrations, free-space links could provide the most appealing solution for communication over much larger distances. Despite significant efforts, all realizations to date rely on stationary sites. Experimental verifications are therefore extremely crucial for applications to a typical low Earth orbit satellite. To achieve direct and full-scale verifications of our set-up, we have carried out three independent experiments with a decoy-state QKD system, and overcome all conditions. The system is operated on a moving platform (using a turntable), on a floating platform (using a hot-air balloon), and with a high-loss channel to demonstrate performances under conditions of rapid motion, attitude change, vibration, random movement of satellites, and a high-loss regime. The experiments address wide ranges of all leading parameters relevant to low Earth orbit satellites. Our results pave the way towards ground-satellite QKD and a global quantum communication network.

  16. Semi-quantum Dialogue Based on Single Photons

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  17. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  18. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    NASA Astrophysics Data System (ADS)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  19. Airborne target tracking algorithm against oppressive decoys in infrared imagery

    NASA Astrophysics Data System (ADS)

    Sun, Xiechang; Zhang, Tianxu

    2009-10-01

    This paper presents an approach for tracking airborne target against oppressive infrared decoys. Oppressive decoy lures infrared guided missile by its high infrared radiation. Traditional tracking algorithms have degraded stability even come to tracking failure when airborne target continuously throw out many decoys. The proposed approach first determines an adaptive tracking window. The center of the tracking window is set at a predicted target position which is computed based on uniform motion model. Different strategies are applied for determination of tracking window size according to target state. The image within tracking window is segmented and multi features of candidate targets are extracted. The most similar candidate target is associated to the tracking target by using a decision function, which calculates a weighted sum of normalized feature differences between two comparable targets. Integrated intensity ratio of association target and tracking target, and target centroid are examined to estimate target state in the presence of decoys. The tracking ability and robustness of proposed approach has been validated by processing available real-world and simulated infrared image sequences containing airborne targets and oppressive decoys.

  20. Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations

    NASA Astrophysics Data System (ADS)

    Liu, Kang; Li, Jian; Zhu, Jian-Rong; Zhang, Chun-Mei; Wang, Qin

    2017-12-01

    Not Available Project supported by the National Key Research and Development Program of China (Grant No. 2017YFA0304100), the National Natural Science Foundation of China (Grant Nos. 61475197, 61590932, 11774180, and 61705110), the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant Nos. 15KJA120002 and 17KJB140016), the Outstanding Youth Project of Jiangsu Province, China (Grant No. BK20150039), the Natural Science Foundation of Jiangsu Province, China (Grant No. BK20170902), and the Science Fund from the Nanjing University of Posts and Telecommunications, China (Grant No. NY217006).

  1. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  2. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  3. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fung, C.-H.F.; Lo, H.-K.

    2006-10-15

    Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less

  4. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  5. Trustworthiness of detectors in quantum key distribution with untrusted detectors

    DOE PAGES

    Qi, Bing

    2015-02-25

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less

  6. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    PubMed

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  7. Discrimination of Native-like States of Membrane Proteins with Implicit Membrane-based Scoring Functions.

    PubMed

    Dutagaci, Bercem; Wittayanarakul, Kitiyaporn; Mori, Takaharu; Feig, Michael

    2017-06-13

    A scoring protocol based on implicit membrane-based scoring functions and a new protocol for optimizing the positioning of proteins inside the membrane was evaluated for its capacity to discriminate native-like states from misfolded decoys. A decoy set previously established by the Baker lab (Proteins: Struct., Funct., Genet. 2006, 62, 1010-1025) was used along with a second set that was generated to cover higher resolution models. The Implicit Membrane Model 1 (IMM1), IMM1 model with CHARMM 36 parameters (IMM1-p36), generalized Born with simple switching (GBSW), and heterogeneous dielectric generalized Born versions 2 (HDGBv2) and 3 (HDGBv3) were tested along with the new HDGB van der Waals (HDGBvdW) model that adds implicit van der Waals contributions to the solvation free energy. For comparison, scores were also calculated with the distance-scaled finite ideal-gas reference (DFIRE) scoring function. Z-scores for native state discrimination, energy vs root-mean-square deviation (RMSD) correlations, and the ability to select the most native-like structures as top-scoring decoys were evaluated to assess the performance of the scoring functions. Ranking of the decoys in the Baker set that were relatively far from the native state was challenging and dominated largely by packing interactions that were captured best by DFIRE with less benefit of the implicit membrane-based models. Accounting for the membrane environment was much more important in the second decoy set where especially the HDGB-based scoring functions performed very well in ranking decoys and providing significant correlations between scores and RMSD, which shows promise for improving membrane protein structure prediction and refinement applications. The new membrane structure scoring protocol was implemented in the MEMScore web server ( http://feiglab.org/memscore ).

  8. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  9. Metropolitan all-pass and inter-city quantum communication network.

    PubMed

    Chen, Teng-Yun; Wang, Jian; Liang, Hao; Liu, Wei-Yue; Liu, Yang; Jiang, Xiao; Wang, Yuan; Wan, Xu; Cai, Wei-Qi; Ju, Lei; Chen, Luo-Kan; Wang, Liu-Jun; Gao, Yuan; Chen, Kai; Peng, Cheng-Zhi; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-12-20

    We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km.

  10. Measurement-device-independent quantum key distribution with multiple crystal heralded source with post-selection

    NASA Astrophysics Data System (ADS)

    Chen, Dong; Shang-Hong, Zhao; MengYi, Deng

    2018-03-01

    The multiple crystal heralded source with post-selection (MHPS), originally introduced to improve the single-photon character of the heralded source, has specific applications for quantum information protocols. In this paper, by combining decoy-state measurement-device-independent quantum key distribution (MDI-QKD) with spontaneous parametric downconversion process, we present a modified MDI-QKD scheme with MHPS where two architectures are proposed corresponding to symmetric scheme and asymmetric scheme. The symmetric scheme, which linked by photon switches in a log-tree structure, is adopted to overcome the limitation of the current low efficiency of m-to-1 optical switches. The asymmetric scheme, which shows a chained structure, is used to cope with the scalability issue with increase in the number of crystals suffered in symmetric scheme. The numerical simulations show that our modified scheme has apparent advances both in transmission distance and key generation rate compared to the original MDI-QKD with weak coherent source and traditional heralded source with post-selection. Furthermore, the recent advances in integrated photonics suggest that if built into a single chip, the MHPS might be a practical alternative source in quantum key distribution tasks requiring single photons to work.

  11. SCUD: fast structure clustering of decoys using reference state to remove overall rotation.

    PubMed

    Li, Hongzhi; Zhou, Yaoqi

    2005-08-01

    We developed a method for fast decoy clustering by using reference root-mean-squared distance (rRMSD) rather than commonly used pairwise RMSD (pRMSD) values. For 41 proteins with 2000 decoys each, the computing efficiency increases nine times without a significant change in the accuracy of near-native selections. Tests on additional protein decoys based on different reference conformations confirmed this result. Further analysis indicates that the pRMSD and rRMSD values are highly correlated (with an average correlation coefficient of 0.82) and the clusters obtained from pRMSD and rRMSD values are highly similar (the representative structures of the top five largest clusters from the two methods are 74% identical). SCUD (Structure ClUstering of Decoys) with an automatic cutoff value is available at http://theory.med.buffalo.edu. (c) 2005 Wiley Periodicals, Inc.

  12. Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference.

    PubMed

    Gleim, A V; Egorov, V I; Nazarov, Yu V; Smirnov, S V; Chistyakov, V V; Bannik, O I; Anisimov, A A; Kynev, S M; Ivanova, A E; Collins, R J; Kozlov, S A; Buller, G S

    2016-02-08

    A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs the BB84 protocol with a strong reference to generate secure bits at a rate of 16.5 kbit/s with an error of 0.5% over an optical channel of 10 dB loss, and 18 bits/s with an error of 0.75% over 25 dB of channel loss. To the best of our knowledge, these results represent the highest channel loss reported for secure quantum key distribution using the subcarrier wave approach. A passive unidirectional scheme has been used to compensate for the polarization dependence of the phase modulators in the receiver module, which resulted in a high visibility of 98.8%. The system is thus fully insensitive to polarization fluctuations and robust to environmental changes, making the approach promising for use in optical telecommunication networks. Further improvements in secure key rate and transmission distance can be achieved by implementing the decoy states protocol or by optimizing the mean photon number used in line with experimental parameters.

  13. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim

    2015-03-01

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  14. Satellite-Relayed Intercontinental Quantum Network.

    PubMed

    Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei

    2018-01-19

    We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.

  15. Satellite-Relayed Intercontinental Quantum Network

    NASA Astrophysics Data System (ADS)

    Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei

    2018-01-01

    We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ˜kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.

  16. Examination of China’s performance and thematic evolution in quantum cryptography research using quantitative and computational techniques

    PubMed Central

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China’s quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001–2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China’s QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China’s performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China’s performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China’s H-index (a normalized indicator) has surpassed all other countries’ over the last several years. The second phase of analysis shows how China’s main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China’s QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research. PMID:29385151

  17. Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques.

    PubMed

    Olijnyk, Nicholas V

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China's quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001-2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China's QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China's performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China's performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China's H-index (a normalized indicator) has surpassed all other countries' over the last several years. The second phase of analysis shows how China's main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China's QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research.

  18. Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization.

    PubMed

    Tanaka, Akihiro; Fujiwara, Mikio; Nam, Sae W; Nambu, Yoshihiro; Takahashi, Seigo; Maeda, Wakako; Yoshino, Ken-ichiro; Miki, Shigehito; Baek, Burm; Wang, Zhen; Tajima, Akio; Sasaki, Masahide; Tomita, Akihisa

    2008-07-21

    We demonstrated ultra fast BB84 quantum key distribution (QKD) transmission at 625 MHz clock rate through a 97 km field-installed fiber using practical clock synchronization based on wavelength-division multiplexing (WDM). We succeeded in over-one-hour stable key generation at a high sifted key rate of 2.4 kbps and a low quantum bit error rate (QBER) of 2.9%. The asymptotic secure key rate was estimated to be 0.78- 0.82 kbps from the transmission data with the decoy method of average photon numbers 0, 0.15, and 0.4 photons/pulse.

  19. Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors

    NASA Astrophysics Data System (ADS)

    Navarrete, Álvaro; Wang, Wenyuan; Xu, Feihu; Curty, Marcos

    2018-04-01

    The experimental characterization of multi-photon quantum interference effects in optical networks is essential in many applications of photonic quantum technologies, which include quantum computing and quantum communication as two prominent examples. However, such characterization often requires technologies which are beyond our current experimental capabilities, and today's methods suffer from errors due to the use of imperfect sources and photodetectors. In this paper, we introduce a simple experimental technique to characterize multi-photon quantum interference by means of practical laser sources and threshold single-photon detectors. Our technique is based on well-known methods in quantum cryptography which use decoy settings to tightly estimate the statistics provided by perfect devices. As an illustration of its practicality, we use this technique to obtain a tight estimation of both the generalized Hong‑Ou‑Mandel dip in a beamsplitter with six input photons and the three-photon coincidence probability at the output of a tritter.

  20. Design considerations of high-performance InGaAs/InP single-photon avalanche diodes for quantum key distribution.

    PubMed

    Ma, Jian; Bai, Bing; Wang, Liu-Jun; Tong, Cun-Zhu; Jin, Ge; Zhang, Jun; Pan, Jian-Wei

    2016-09-20

    InGaAs/InP single-photon avalanche diodes (SPADs) are widely used in practical applications requiring near-infrared photon counting such as quantum key distribution (QKD). Photon detection efficiency and dark count rate are the intrinsic parameters of InGaAs/InP SPADs, due to the fact that their performances cannot be improved using different quenching electronics given the same operation conditions. After modeling these parameters and developing a simulation platform for InGaAs/InP SPADs, we investigate the semiconductor structure design and optimization. The parameters of photon detection efficiency and dark count rate highly depend on the variables of absorption layer thickness, multiplication layer thickness, excess bias voltage, and temperature. By evaluating the decoy-state QKD performance, the variables for SPAD design and operation can be globally optimized. Such optimization from the perspective of specific applications can provide an effective approach to design high-performance InGaAs/InP SPADs.

  1. Inconclusive quantum measurements and decisions under uncertainty

    NASA Astrophysics Data System (ADS)

    Yukalov, Vyacheslav; Sornette, Didier

    2016-04-01

    We give a mathematical definition for the notion of inconclusive quantum measurements. In physics, such measurements occur at intermediate stages of a complex measurement procedure, with the final measurement result being operationally testable. Since the mathematical structure of Quantum Decision Theory has been developed in analogy with the theory of quantum measurements, the inconclusive quantum measurements correspond, in Quantum Decision Theory, to intermediate stages of decision making in the process of taking decisions under uncertainty. The general form of the quantum probability for a composite event is the sum of a utility factor, describing a rational evaluation of the considered prospect, and of an attraction factor, characterizing irrational, subconscious attitudes of the decision maker. Despite the involved irrationality, the probability of prospects can be evaluated. This is equivalent to the possibility of calculating quantum probabilities without specifying hidden variables. We formulate a general way of evaluation, based on the use of non-informative priors. As an example, we suggest the explanation of the decoy effect. Our quantitative predictions are in very good agreement with experimental data.

  2. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  3. Purely Structural Protein Scoring Functions Using Support Vector Machine and Ensemble Learning.

    PubMed

    Mirzaei, Shokoufeh; Sidi, Tomer; Keasar, Chen; Crivelli, Silvia

    2016-08-24

    The function of a protein is determined by its structure, which creates a need for efficient methods of protein structure determination to advance scientific and medical research. Because current experimental structure determination methods carry a high price tag, computational predictions are highly desirable. Given a protein sequence, computational methods produce numerous 3D structures known as decoys. However, selection of the best quality decoys is challenging as the end users can handle only a few ones. Therefore, scoring functions are central to decoy selection. They combine measurable features into a single number indicator of decoy quality. Unfortunately, current scoring functions do not consistently select the best decoys. Machine learning techniques offer great potential to improve decoy scoring. This paper presents two machine-learning based scoring functions to predict the quality of proteins structures, i.e., the similarity between the predicted structure and the experimental one without knowing the latter. We use different metrics to compare these scoring functions against three state-of-the-art scores. This is a first attempt at comparing different scoring functions using the same non-redundant dataset for training and testing and the same features. The results show that adding informative features may be more significant than the method used.

  4. Hydrophobic potential of mean force as a solvation function for protein structure prediction.

    PubMed

    Lin, Matthew S; Fawzi, Nicolas Lux; Head-Gordon, Teresa

    2007-06-01

    We have developed a solvation function that combines a Generalized Born model for polarization of protein charge by the high dielectric solvent, with a hydrophobic potential of mean force (HPMF) as a model for hydrophobic interaction, to aid in the discrimination of native structures from other misfolded states in protein structure prediction. We find that our energy function outperforms other reported scoring functions in terms of correct native ranking for 91% of proteins and low Z scores for a variety of decoy sets, including the challenging Rosetta decoys. This work shows that the stabilizing effect of hydrophobic exposure to aqueous solvent that defines the HPMF hydration physics is an apparent improvement over solvent-accessible surface area models that penalize hydrophobic exposure. Decoys generated by thermal sampling around the native-state basin reveal a potentially important role for side-chain entropy in the future development of even more accurate free energy surfaces.

  5. Quantum correlations of lights in macroscopic environments

    NASA Astrophysics Data System (ADS)

    Sua, Yong Meng

    This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity P b(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM 00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations +/- cos2(theta1 +/- theta 2) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130+/-5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell's inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-pair experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.

  6. Adaptive spatial filtering for daytime satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  7. A decoy chain deployment method based on SDN and NFV against penetration attack

    PubMed Central

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257

  8. A decoy chain deployment method based on SDN and NFV against penetration attack.

    PubMed

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.

  9. Scalable quantum information processing with photons and atoms

    NASA Astrophysics Data System (ADS)

    Pan, Jian-Wei

    Over the past three decades, the promises of super-fast quantum computing and secure quantum cryptography have spurred a world-wide interest in quantum information, generating fascinating quantum technologies for coherent manipulation of individual quantum systems. However, the distance of fiber-based quantum communications is limited due to intrinsic fiber loss and decreasing of entanglement quality. Moreover, probabilistic single-photon source and entanglement source demand exponentially increased overheads for scalable quantum information processing. To overcome these problems, we are taking two paths in parallel: quantum repeaters and through satellite. We used the decoy-state QKD protocol to close the loophole of imperfect photon source, and used the measurement-device-independent QKD protocol to close the loophole of imperfect photon detectors--two main loopholes in quantum cryptograph. Based on these techniques, we are now building world's biggest quantum secure communication backbone, from Beijing to Shanghai, with a distance exceeding 2000 km. Meanwhile, we are developing practically useful quantum repeaters that combine entanglement swapping, entanglement purification, and quantum memory for the ultra-long distance quantum communication. The second line is satellite-based global quantum communication, taking advantage of the negligible photon loss and decoherence in the atmosphere. We realized teleportation and entanglement distribution over 100 km, and later on a rapidly moving platform. We are also making efforts toward the generation of multiphoton entanglement and its use in teleportation of multiple properties of a single quantum particle, topological error correction, quantum algorithms for solving systems of linear equations and machine learning. Finally, I will talk about our recent experiments on quantum simulations on ultracold atoms. On the one hand, by applying an optical Raman lattice technique, we realized a two-dimensional spin-obit (SO) coupling and topological bands with ultracold bosonic atoms. A controllable crossover between 2D and 1D SO couplings is studied, and the SO effects and nontrivial band topology are observe. On the other hand, utilizing a two-dimensional spin-dependent optical superlattice and a single layer of atom cloud, we directly observed the four-body ring-exchange coupling and the Anyonic fractional statistics.

  10. DecoyFinder: an easy-to-use python GUI application for building target-specific decoy sets.

    PubMed

    Cereto-Massagué, Adrià; Guasch, Laura; Valls, Cristina; Mulero, Miquel; Pujadas, Gerard; Garcia-Vallvé, Santiago

    2012-06-15

    Decoys are molecules that are presumed to be inactive against a target (i.e. will not likely bind to the target) and are used to validate the performance of molecular docking or a virtual screening workflow. The Directory of Useful Decoys database (http://dud.docking.org/) provides a free directory of decoys for use in virtual screening, though it only contains a limited set of decoys for 40 targets.To overcome this limitation, we have developed an application called DecoyFinder that selects, for a given collection of active ligands of a target, a set of decoys from a database of compounds. Decoys are selected if they are similar to active ligands according to five physical descriptors (molecular weight, number of rotational bonds, total hydrogen bond donors, total hydrogen bond acceptors and the octanol-water partition coefficient) without being chemically similar to any of the active ligands used as an input (according to the Tanimoto coefficient between MACCS fingerprints). To the best of our knowledge, DecoyFinder is the first application designed to build target-specific decoy sets. A complete description of the software is included on the application home page. A validation of DecoyFinder on 10 DUD targets is provided as Supplementary Table S1. DecoyFinder is freely available at http://URVnutrigenomica-CTNS.github.com/DecoyFinder.

  11. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2014-07-25

    link in a free- space channel through a marine environment (such as loss, noise and turbulence) and (2) parametrically calculating the secret key rate...width. Parametric calculations of the expected secret key rate As can be seen in Figure 6, the secret key rate of the BB84 protocol in the presence...Figure 9 shows the effect of various detriments on the secret -kay rate, for laser-decoy BB84. Figure 9: Effects of detriments on secret-key rate

  12. RADER: a RApid DEcoy Retriever to facilitate decoy based assessment of virtual screening.

    PubMed

    Wang, Ling; Pang, Xiaoqian; Li, Yecheng; Zhang, Ziying; Tan, Wen

    2017-04-15

    Evaluation of the capacity for separating actives from challenging decoys is a crucial metric of performance related to molecular docking or a virtual screening workflow. The Directory of Useful Decoys (DUD) and its enhanced version (DUD-E) provide a benchmark for molecular docking, although they only contain a limited set of decoys for limited targets. DecoyFinder was released to compensate the limitations of DUD or DUD-E for building target-specific decoy sets. However, desirable query template design, generation of multiple decoy sets of similar quality, and computational speed remain bottlenecks, particularly when the numbers of queried actives and retrieved decoys increases to hundreds or more. Here, we developed a program suite called RApid DEcoy Retriever (RADER) to facilitate the decoy-based assessment of virtual screening. This program adopts a novel database-management regime that supports rapid and large-scale retrieval of decoys, enables high portability of databases, and provides multifaceted options for designing initial query templates from a large number of active ligands and generating subtle decoy sets. RADER provides two operational modes: as a command-line tool and on a web server. Validation of the performance and efficiency of RADER was also conducted and is described. RADER web server and a local version are freely available at http://rcidm.org/rader/ . lingwang@scut.edu.cn or went@scut.edu.cn . Supplementary data are available at Bioinformatics online. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  13. Adaptive spatial filtering of daytime sky noise in a satellite quantum key distribution downlink receiver

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2016-02-01

    Spatial filtering is an important technique for reducing sky background noise in a satellite quantum key distribution downlink receiver. Atmospheric turbulence limits the extent to which spatial filtering can reduce sky noise without introducing signal losses. Using atmospheric propagation and compensation simulations, the potential benefit of adaptive optics (AO) to secure key generation (SKG) is quantified. Simulations are performed assuming optical propagation from a low-Earth-orbit satellite to a terrestrial receiver that includes AO. Higher-order AO correction is modeled assuming a Shack-Hartmann wavefront sensor and a continuous-face-sheet deformable mirror. The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain wave-optics hardware emulator. SKG rates are calculated for a decoy-state protocol as a function of the receiver field of view for various strengths of turbulence, sky radiances, and pointing angles. The results show that at fields of view smaller than those discussed by others, AO technologies can enhance SKG rates in daylight and enable SKG where it would otherwise be prohibited as a consequence of background optical noise and signal loss due to propagation and turbulence effects.

  14. Spectrum-based method to generate good decoy libraries for spectral library searching in peptide identifications.

    PubMed

    Cheng, Chia-Ying; Tsai, Chia-Feng; Chen, Yu-Ju; Sung, Ting-Yi; Hsu, Wen-Lian

    2013-05-03

    As spectral library searching has received increasing attention for peptide identification, constructing good decoy spectra from the target spectra is the key to correctly estimating the false discovery rate in searching against the concatenated target-decoy spectral library. Several methods have been proposed to construct decoy spectral libraries. Most of them construct decoy peptide sequences and then generate theoretical spectra accordingly. In this paper, we propose a method, called precursor-swap, which directly constructs decoy spectral libraries directly at the "spectrum level" without generating decoy peptide sequences by swapping the precursors of two spectra selected according to a very simple rule. Our spectrum-based method does not require additional efforts to deal with ion types (e.g., a, b or c ions), fragment mechanism (e.g., CID, or ETD), or unannotated peaks, but preserves many spectral properties. The precursor-swap method is evaluated on different spectral libraries and the results of obtained decoy ratios show that it is comparable to other methods. Notably, it is efficient in time and memory usage for constructing decoy libraries. A software tool called Precursor-Swap-Decoy-Generation (PSDG) is publicly available for download at http://ms.iis.sinica.edu.tw/PSDG/.

  15. Using decoy effects to influence an online brand choice: the role of price-quality trade-offs.

    PubMed

    Hsu, Huei-Chen; Liu, Wen-Liang

    2011-04-01

    This research aims to investigate decoy effects on online brand choices. To assess the influence of decoys, we test decoy effects on three constructs-product involvement, judgment conditions, and decoy conditions-within an online experiment. A survey of 635 Internet users and a 2 × 2 × 3 ANOVA between-subjects experimental design is used to guide the research design and the systematic analysis procedure. A major finding of this study is that a standard decoy seems to have a significant effect on an advertised (target) brand for high-involvement products; from the survey, it is also apparent that competitors can also use inferior decoys to increase brand preference for low-involvement products.

  16. Development of novel decoy oligonucleotides: advantages of circular dumb-bell decoy.

    PubMed

    Tomita, Naruya; Tomita, Tetsuya; Yuyama, Kazuhiko; Tougan, Takahiro; Tajima, Tsuyoshi; Ogihara, Toshio; Morishita, Ryuichi

    2003-04-01

    The inhibition of specific transcription regulatory proteins is a novel approach to regulate gene expression. The transcriptional activities of DNA binding proteins can be inhibited by the use of double-stranded oligonucleotides (ODNs) that compete for binding to their specific target sequences in promoters and enhancers. Transfection of this cis-element double-stranded ODN, referred to as decoy ODN, has been reported to be a powerful tool that provides a new class of anti-gene strategies to gene therapy and permits examination of specific gene regulation. We have demonstrated the usefulness of this decoy ODN strategy in animal models of restenosis, myocardial infarction, glomerulonephritis and rheumatoid arthritis. However, one of the major limitations of decoy ODN technology is the rapid degradation of phosphodiester ODNs by intracellular nucleases. To date, several different types of double-stranded decoy ODNs have been developed to overcome this issue. Circular dumb-bell (CD) double-stranded decoy ODNs that were developed to resolve this issue have attracted a high level of interest. In this review, the applications of decoy ODN strategy and the advantages of modified CD double-stranded decoy ODNs will be discussed.

  17. Protein Loop Structure Prediction Using Conformational Space Annealing.

    PubMed

    Heo, Seungryong; Lee, Juyong; Joo, Keehyoung; Shin, Hang-Cheol; Lee, Jooyoung

    2017-05-22

    We have developed a protein loop structure prediction method by combining a new energy function, which we call E PLM (energy for protein loop modeling), with the conformational space annealing (CSA) global optimization algorithm. The energy function includes stereochemistry, dynamic fragment assembly, distance-scaled finite ideal gas reference (DFIRE), and generalized orientation- and distance-dependent terms. For the conformational search of loop structures, we used the CSA algorithm, which has been quite successful in dealing with various hard global optimization problems. We assessed the performance of E PLM with two widely used loop-decoy sets, Jacobson and RAPPER, and compared the results against the DFIRE potential. The accuracy of model selection from a pool of loop decoys as well as de novo loop modeling starting from randomly generated structures was examined separately. For the selection of a nativelike structure from a decoy set, E PLM was more accurate than DFIRE in the case of the Jacobson set and had similar accuracy in the case of the RAPPER set. In terms of sampling more nativelike loop structures, E PLM outperformed E DFIRE for both decoy sets. This new approach equipped with E PLM and CSA can serve as the state-of-the-art de novo loop modeling method.

  18. Directory of Useful Decoys, Enhanced (DUD-E): Better Ligands and Decoys for Better Benchmarking

    PubMed Central

    2012-01-01

    A key metric to assess molecular docking remains ligand enrichment against challenging decoys. Whereas the directory of useful decoys (DUD) has been widely used, clear areas for optimization have emerged. Here we describe an improved benchmarking set that includes more diverse targets such as GPCRs and ion channels, totaling 102 proteins with 22886 clustered ligands drawn from ChEMBL, each with 50 property-matched decoys drawn from ZINC. To ensure chemotype diversity, we cluster each target’s ligands by their Bemis–Murcko atomic frameworks. We add net charge to the matched physicochemical properties and include only the most dissimilar decoys, by topology, from the ligands. An online automated tool (http://decoys.docking.org) generates these improved matched decoys for user-supplied ligands. We test this data set by docking all 102 targets, using the results to improve the balance between ligand desolvation and electrostatics in DOCK 3.6. The complete DUD-E benchmarking set is freely available at http://dude.docking.org. PMID:22716043

  19. Role of decoy molecules in neuronal ischemic preconditioning

    PubMed Central

    Panneerselvam, Mathivadhani; Patel, Piyush M.; Roth, David M.; Kidd, Michael W.; Chin-Lee, Blake; Head, Brian P.; Niesman, Ingrid R.; Inoue, Satoki; Patel, Hemal H.; Davis, Daniel P.

    2011-01-01

    Decoy receptors bind with TNF related apoptosis inducing ligands (TRAIL) but do not contain the cytoplasmic domains necessary to transduce apoptotic signals. We hypothesized that decoy receptors may confer neuronal protection against lethal ischemia after ischemic preconditioning (IPC). Mixed cortical neurons were exposed to IPC one day prior to TRAIL treatment or lethal ischemia. IPC increased decoy receptor but reduced death receptor expression compared to lethal ischemia. IPC-induced increase in decoy receptor expression was reduced by prior treatment with CAPE, a nuclear factor-kappa B inhibitor (NFκB). Expression of decoy molecules, dependent on NFκB, may mediate neuronal survival induced by IPC. PMID:21315738

  20. CyClus: a fast, comprehensive cylindrical interface approximation clustering/reranking method for rigid-body protein-protein docking decoys.

    PubMed

    Omori, Satoshi; Kitao, Akio

    2013-06-01

    We propose a fast clustering and reranking method, CyClus, for protein-protein docking decoys. This method enables comprehensive clustering of whole decoys generated by rigid-body docking using cylindrical approximation of the protein-proteininterface and hierarchical clustering procedures. We demonstrate the clustering and reranking of 54,000 decoy structures generated by ZDOCK for each complex within a few minutes. After parameter tuning for the test set in ZDOCK benchmark 2.0 with the ZDOCK and ZRANK scoring functions, blind tests for the incremental data in ZDOCK benchmark 3.0 and 4.0 were conducted. CyClus successfully generated smaller subsets of decoys containing near-native decoys. For example, the number of decoys required to create subsets containing near-native decoys with 80% probability was reduced from 22% to 50% of the number required in the original ZDOCK. Although specific ZDOCK and ZRANK results were demonstrated, the CyClus algorithm was designed to be more general and can be applied to a wide range of decoys and scoring functions by adjusting just two parameters, p and T. CyClus results were also compared to those from ClusPro. Copyright © 2013 Wiley Periodicals, Inc.

  1. An improved method to detect correct protein folds using partial clustering.

    PubMed

    Zhou, Jianjun; Wishart, David S

    2013-01-16

    Structure-based clustering is commonly used to identify correct protein folds among candidate folds (also called decoys) generated by protein structure prediction programs. However, traditional clustering methods exhibit a poor runtime performance on large decoy sets. We hypothesized that a more efficient "partial" clustering approach in combination with an improved scoring scheme could significantly improve both the speed and performance of existing candidate selection methods. We propose a new scheme that performs rapid but incomplete clustering on protein decoys. Our method detects structurally similar decoys (measured using either C(α) RMSD or GDT-TS score) and extracts representatives from them without assigning every decoy to a cluster. We integrated our new clustering strategy with several different scoring functions to assess both the performance and speed in identifying correct or near-correct folds. Experimental results on 35 Rosetta decoy sets and 40 I-TASSER decoy sets show that our method can improve the correct fold detection rate as assessed by two different quality criteria. This improvement is significantly better than two recently published clustering methods, Durandal and Calibur-lite. Speed and efficiency testing shows that our method can handle much larger decoy sets and is up to 22 times faster than Durandal and Calibur-lite. The new method, named HS-Forest, avoids the computationally expensive task of clustering every decoy, yet still allows superior correct-fold selection. Its improved speed, efficiency and decoy-selection performance should enable structure prediction researchers to work with larger decoy sets and significantly improve their ab initio structure prediction performance.

  2. Prevention of Asthma Exacerbation in a Mouse Model by Simultaneous Inhibition of NF-κB and STAT6 Activation Using a Chimeric Decoy Strategy.

    PubMed

    Miyake, Tetsuo; Miyake, Takashi; Sakaguchi, Makoto; Nankai, Hirokazu; Nakazawa, Takahiro; Morishita, Ryuichi

    2018-03-02

    Transactivation of inflammatory and immune mediators in asthma is tightly regulated by nuclear factor κB (NF-κB) and signal transducer and activator of transcription 6 (STAT6). Therefore, we investigated the efficacy of simultaneous inhibition of NF-κB and STAT6 using a chimeric decoy strategy to prevent asthma exacerbation. The effects of decoy oligodeoxynucleotides were evaluated using an ovalbumin-induced mouse asthma model. Ovalbumin-sensitized mice received intratracheal administration of decoy oligodeoxynucleotides 3 days before ovalbumin challenge. Fluorescent-dye-labeled decoy oligodeoxynucleotides could be detected in lymphocytes and macrophages in the lung, and activation of NF-κB and STAT6 was inhibited by chimeric decoy oligodeoxynucleotide transfer. Consequently, treatment with chimeric or NF-κB decoy oligodeoxynucleotides protected against methacholine-induced airway hyperresponsiveness, whereas the effect of chimeric decoy oligodeoxynucleotides was significantly greater than that of NF-κB decoy oligodeoxynucleotides. Treatment with chimeric decoy oligodeoxynucleotides suppressed airway inflammation through inhibition of overexpression of interleukin-4 (IL-4), IL-5, and IL-13 and inflammatory infiltrates. Histamine levels in the lung were reduced via suppression of mast cell accumulation. A significant reduction in mucin secretion was observed due to suppression of MUC5AC gene expression. Interestingly, the inhibitory effects on IL-5, IL-13, and histamine secretion were achieved by transfer of chimeric decoy oligodeoxynucleotides only. This novel therapeutic approach could be useful to treat patients with various types of asthma. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  3. An improved method to detect correct protein folds using partial clustering

    PubMed Central

    2013-01-01

    Background Structure-based clustering is commonly used to identify correct protein folds among candidate folds (also called decoys) generated by protein structure prediction programs. However, traditional clustering methods exhibit a poor runtime performance on large decoy sets. We hypothesized that a more efficient “partial“ clustering approach in combination with an improved scoring scheme could significantly improve both the speed and performance of existing candidate selection methods. Results We propose a new scheme that performs rapid but incomplete clustering on protein decoys. Our method detects structurally similar decoys (measured using either Cα RMSD or GDT-TS score) and extracts representatives from them without assigning every decoy to a cluster. We integrated our new clustering strategy with several different scoring functions to assess both the performance and speed in identifying correct or near-correct folds. Experimental results on 35 Rosetta decoy sets and 40 I-TASSER decoy sets show that our method can improve the correct fold detection rate as assessed by two different quality criteria. This improvement is significantly better than two recently published clustering methods, Durandal and Calibur-lite. Speed and efficiency testing shows that our method can handle much larger decoy sets and is up to 22 times faster than Durandal and Calibur-lite. Conclusions The new method, named HS-Forest, avoids the computationally expensive task of clustering every decoy, yet still allows superior correct-fold selection. Its improved speed, efficiency and decoy-selection performance should enable structure prediction researchers to work with larger decoy sets and significantly improve their ab initio structure prediction performance. PMID:23323835

  4. Amelioration of collagen-induced arthritis using antigen-loaded dendritic cells modified with NF-κB decoy oligodeoxynucleotides

    PubMed Central

    Jiang, Hongmei; Hu, Henggui; Zhang, Yali; Yue, Ping; Ning, Lichang; Zhou, Yan; Shi, Ping; Yuan, Rui

    2017-01-01

    Dendritic cells (DCs) play an important role in the initiation of autoimmunity in rheumatoid arthritis (RA); therefore, the use of DCs needs to be explored to develop new therapeutic approaches for RA. Here, we investigated the therapeutic effect of bovine type II collagen (BIIC)-loaded DCs modified with NF-κB decoy oligodeoxynucleotides (ODNs) on collagen-induced arthritis (CIA) in rats and explored the underlying mechanisms. DCs treated with BIIC and NF-κB decoy ODNs exhibited features of immature DCs with low levels of costimulatory molecule (CD80 and CD86) expression. The development of arthritis in rats with CIA injected with BIIC + NF-κB decoy ODN-propagated DCs (BIIC–decoy DCs) was significantly ameliorated compared to that in rats injected with BIIC-propagated DCs or phosphate-buffered saline. We also found that the BIIC–decoy DCs exerted antiarthritis effects by inhibiting self-lymphocyte proliferative response and suppressing IFN-γ and anti-BIIC antibody production and inducing IL-10 antibody production. Additionally, antihuman serum antibodies were successfully produced in the rats treated with BIIC–decoy DCs but not in those treated with NF-κB decoy ODN-propagated DCs; moreover, the BIIC–decoy DCs did not affect immune function in the normal rats. These findings suggested that NF-κB decoy ODN-modified DCs loaded with a specific antigen might offer a practical method for the treatment of human RA. PMID:29075103

  5. Decoy Oligonucleotide Rescues IGF1R Expression from MicroRNA-223 Suppression

    PubMed Central

    Wang, Rong; He, Bao Mei; Qi, Bing; Xu, Chang Jun; Wu, Xing Zhong

    2013-01-01

    A mature miRNA generally suppresses hundreds of mRNA targets. To evaluate the selective effect of synthetic oligonucleotide decoys on hsa-miR-223 activity, reporters containing 3’ untranslated regions (UTR) of IGF1R, FOXO1, POLR3G, FOXO3, CDC27, FBXW7 and PAXIP1 mRNAs were constructed for the luciferase assay. The oligonucleotide decoys were designed and synthesized according to mature miR-223 sequence and its target mRNA sequence. Quantitative RT-PCR & western analysis were used to measure miR-223-targeted mRNA expression, Interestingly, apart from the antisense oligonucleotide, decoy nucleotides which were complementary to the 5’, central or 3’ region of mature miR-223 suppressed miR-223 targeting the 3’UTR of IGF1R, FOXO1, FOXO3, CDC27, POLR3G, and FBXW7 mRNAs and rescued the expression of these genes to varying degrees from miR-223 suppression at both mRNA and protein levels. All decoys had no effect on PAXIP1 which was not targeted by miR-223. The decoy 1 that was based on the sequence of IGF1R 3’UTR rescued the expression of IGF1R more significantly than other decoy nucleotides except the antisense decoy 4. Decoy 1 also rescued the expression of FOXO3 and POLR3G of which their 3’UTRs have similar binding sites for miR-223 with IGF1R 3’UTR. However decoy 1 failed to recover Sp1, CDC27 and FBXW7 expression. These data support that the sequence-specific decoy oligonucleotides might represent exogenous competing RNA which selectively inhibits microRNA targeting. PMID:24324762

  6. Decoy oligonucleotide rescues IGF1R expression from MicroRNA-223 suppression.

    PubMed

    Wu, Li Hui; Cai, Qian Qian; Dong, Yi Wei; Wang, Rong; He, Bao Mei; Qi, Bing; Xu, Chang Jun; Wu, Xing Zhong

    2013-01-01

    A mature miRNA generally suppresses hundreds of mRNA targets. To evaluate the selective effect of synthetic oligonucleotide decoys on hsa-miR-223 activity, reporters containing 3' untranslated regions (UTR) of IGF1R, FOXO1, POLR3G, FOXO3, CDC27, FBXW7 and PAXIP1 mRNAs were constructed for the luciferase assay. The oligonucleotide decoys were designed and synthesized according to mature miR-223 sequence and its target mRNA sequence. Quantitative RT-PCR & western analysis were used to measure miR-223-targeted mRNA expression, Interestingly, apart from the antisense oligonucleotide, decoy nucleotides which were complementary to the 5', central or 3' region of mature miR-223 suppressed miR-223 targeting the 3'UTR of IGF1R, FOXO1, FOXO3, CDC27, POLR3G, and FBXW7 mRNAs and rescued the expression of these genes to varying degrees from miR-223 suppression at both mRNA and protein levels. All decoys had no effect on PAXIP1 which was not targeted by miR-223. The decoy 1 that was based on the sequence of IGF1R 3'UTR rescued the expression of IGF1R more significantly than other decoy nucleotides except the antisense decoy 4. Decoy 1 also rescued the expression of FOXO3 and POLR3G of which their 3'UTRs have similar binding sites for miR-223 with IGF1R 3'UTR. However decoy 1 failed to recover Sp1, CDC27 and FBXW7 expression. These data support that the sequence-specific decoy oligonucleotides might represent exogenous competing RNA which selectively inhibits microRNA targeting.

  7. Effectiveness Evaluation Method of Anti-Radiation Missile against Active Decoy

    NASA Astrophysics Data System (ADS)

    Tang, Junyao; Cao, Fei; Li, Sijia

    2017-06-01

    In the problem of anti-radiation missile against active decoy, whether the ARM can effectively kill the target radiation source and bait is an important index for evaluating the operational effectiveness of the missile. Aiming at this problem, this paper proposes a method to evaluate the effect of ARM against active decoy. Based on the calculation of ARM’s ability to resist the decoy, the paper proposes a method to evaluate the decoy resistance based on the key components of the hitting radar. The method has the advantages of scientific and reliability.

  8. Heparin octasaccharide decoy liposomes inhibit replication of multiple viruses

    PubMed Central

    Hendricks, Gabriel L.; Velazquez, Lourdes; Pham, Serena; Qaisar, Natasha; Delaney, James C.; Viswanathan, Karthik; Albers, Leila; Comolli, James C.; Shriver, Zachary; Knipe, David M.; Kurt-Jones, Evelyn A.; Fygenson, Deborah K.; Trevejo, Jose M.

    2016-01-01

    Heparan sulfate (HS) is a ubiquitous glycosaminoglycan that serves as a cellular attachment site for a number of significant human pathogens, including respiratory syncytial virus (RSV), human parainfluenza virus 3 (hPIV3), and herpes simplex virus (HSV). Decoy receptors can target pathogens by binding to the receptor pocket on viral attachment proteins, acting as ‘molecular sinks’ and preventing the pathogen from binding to susceptible host cells. Decoy receptors functionalized with HS could bind to pathogens and prevent infection, so we generated decoy liposomes displaying HS-octasaccharide (HS-octa). These decoy liposomes significantly inhibited RSV, hPIV3, and HSV infectivity in vitro to a greater degree than the original HS-octa building block. The degree of inhibition correlated with the density of HS-octa displayed on the liposome surface. Decoy liposomes with HS-octa inhibited infection of viruses to a greater extent than either full-length heparin or HS-octa alone. Decoy liposomes were effective when added prior to infection or following the initial infection of cells in vitro. By targeting the well-conserved receptor-binding sites of HS-binding viruses, decoy liposomes functionalized with HS-octa are a promising therapeutic antiviral agent and illustrate the utility of the liposome delivery platform. PMID:25637710

  9. Quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-07-15

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDCmore » source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses.« less

  10. New glycoproteomics software, GlycoPep Evaluator, generates decoy glycopeptides de novo and enables accurate false discovery rate analysis for small data sets.

    PubMed

    Zhu, Zhikai; Su, Xiaomeng; Go, Eden P; Desaire, Heather

    2014-09-16

    Glycoproteins are biologically significant large molecules that participate in numerous cellular activities. In order to obtain site-specific protein glycosylation information, intact glycopeptides, with the glycan attached to the peptide sequence, are characterized by tandem mass spectrometry (MS/MS) methods such as collision-induced dissociation (CID) and electron transfer dissociation (ETD). While several emerging automated tools are developed, no consensus is present in the field about the best way to determine the reliability of the tools and/or provide the false discovery rate (FDR). A common approach to calculate FDRs for glycopeptide analysis, adopted from the target-decoy strategy in proteomics, employs a decoy database that is created based on the target protein sequence database. Nonetheless, this approach is not optimal in measuring the confidence of N-linked glycopeptide matches, because the glycopeptide data set is considerably smaller compared to that of peptides, and the requirement of a consensus sequence for N-glycosylation further limits the number of possible decoy glycopeptides tested in a database search. To address the need to accurately determine FDRs for automated glycopeptide assignments, we developed GlycoPep Evaluator (GPE), a tool that helps to measure FDRs in identifying glycopeptides without using a decoy database. GPE generates decoy glycopeptides de novo for every target glycopeptide, in a 1:20 target-to-decoy ratio. The decoys, along with target glycopeptides, are scored against the ETD data, from which FDRs can be calculated accurately based on the number of decoy matches and the ratio of the number of targets to decoys, for small data sets. GPE is freely accessible for download and can work with any search engine that interprets ETD data of N-linked glycopeptides. The software is provided at https://desairegroup.ku.edu/research.

  11. Fine-scale features on bioreplicated decoys of the emerald ash borer provide necessary visual verisimilitude

    NASA Astrophysics Data System (ADS)

    Domingue, Michael J.; Pulsifer, Drew P.; Narkhede, Mahesh S.; Engel, Leland G.; Martín-Palma, Raúl J.; Kumar, Jayant; Baker, Thomas C.; Lakhtakia, Akhlesh

    2014-03-01

    The emerald ash borer (EAB), Agrilus planipennis, is an invasive tree-killing pest in North America. Like other buprestid beetles, it has an iridescent coloring, produced by a periodically layered cuticle whose reflectance peaks at 540 nm wavelength. The males perform a visually mediated ritualistic mating flight directly onto females poised on sunlit leaves. We attempted to evoke this behavior using artificial visual decoys of three types. To fabricate decoys of the first type, a polymer sheet coated with a Bragg-stack reflector was loosely stamped by a bioreplicating die. For decoys of the second type, a polymer sheet coated with a Bragg-stack reflector was heavily stamped by the same die and then painted green. Every decoy of these two types had an underlying black absorber layer. Decoys of the third type were produced by a rapid prototyping machine and painted green. Fine-scale features were absent on the third type. Experiments were performed in an American ash forest infested with EAB, and a European oak forest home to a similar pest, the two-spotted oak borer (TSOB), Agrilus biguttatus. When pinned to leaves, dead EAB females, dead TSOB females, and bioreplicated decoys of both types often evoked the complete ritualized flight behavior. Males also initiated approaches to the rapidly prototyped decoy, but would divert elsewhere without making contact. The attraction of the bioreplicated decoys was also demonstrated by providing a high dc voltage across the decoys that stunned and killed approaching beetles. Thus, true bioreplication with fine-scale features is necessary to fully evoke ritualized visual responses in insects, and provides an opportunity for developing insecttrapping technologies.

  12. Adaptation of Decoy Fusion Strategy for Existing Multi-Stage Search Workflows

    NASA Astrophysics Data System (ADS)

    Ivanov, Mark V.; Levitsky, Lev I.; Gorshkov, Mikhail V.

    2016-09-01

    A number of proteomic database search engines implement multi-stage strategies aiming at increasing the sensitivity of proteome analysis. These approaches often employ a subset of the original database for the secondary stage of analysis. However, if target-decoy approach (TDA) is used for false discovery rate (FDR) estimation, the multi-stage strategies may violate the underlying assumption of TDA that false matches are distributed uniformly across the target and decoy databases. This violation occurs if the numbers of target and decoy proteins selected for the second search are not equal. Here, we propose a method of decoy database generation based on the previously reported decoy fusion strategy. This method allows unbiased TDA-based FDR estimation in multi-stage searches and can be easily integrated into existing workflows utilizing popular search engines and post-search algorithms.

  13. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  14. From Extraction of Local Structures of Protein Energy Landscapes to Improved Decoy Selection in Template-Free Protein Structure Prediction.

    PubMed

    Akhter, Nasrin; Shehu, Amarda

    2018-01-19

    Due to the essential role that the three-dimensional conformation of a protein plays in regulating interactions with molecular partners, wet and dry laboratories seek biologically-active conformations of a protein to decode its function. Computational approaches are gaining prominence due to the labor and cost demands of wet laboratory investigations. Template-free methods can now compute thousands of conformations known as decoys, but selecting native conformations from the generated decoys remains challenging. Repeatedly, research has shown that the protein energy functions whose minima are sought in the generation of decoys are unreliable indicators of nativeness. The prevalent approach ignores energy altogether and clusters decoys by conformational similarity. Complementary recent efforts design protein-specific scoring functions or train machine learning models on labeled decoys. In this paper, we show that an informative consideration of energy can be carried out under the energy landscape view. Specifically, we leverage local structures known as basins in the energy landscape probed by a template-free method. We propose and compare various strategies of basin-based decoy selection that we demonstrate are superior to clustering-based strategies. The presented results point to further directions of research for improving decoy selection, including the ability to properly consider the multiplicity of native conformations of proteins.

  15. Targeting a KH-domain protein with RNA decoys.

    PubMed

    Makeyev, Aleksandr V; Eastmond, Dawn L; Liebhaber, Stephen A

    2002-09-01

    RNA-binding proteins are involved in the regulation of many aspects of eukaryotic gene expression. Targeted interference with RNA-protein interactions could offer novel approaches to modulation of expression profiles, alteration of developmental pathways, and reversal of certain disease processes. Here we investigate a decoy strategy for the study of the alphaCP subgroup of KH-domain RNA-binding proteins. These poly(C)-binding proteins have been implicated in a wide spectrum of posttranscriptional controls. Three categories of RNA decoys to alphaCPs were studied: poly(C) homopolymers, native mRNA-binding sites, and a high-affinity structure selected from a combinatorial library. Native chemistry was found to be essential for alphaCP decoy action. Because alphaCP proteins are found in both the nucleus and cytoplasm, decoy cassettes were incorporated within both nuclear (U1 snRNA) and cytoplasmic (VA1 RNA) RNA frameworks. Several sequences demonstrated optimal decoy properties when assayed for protein-binding and decoy bioactivity in vitro. A subset of these transcripts was shown to mediate targeted inhibition of alphaCP-dependent translation when expressed in either the nucleus or cytoplasm of transfected cells. Significantly, these studies establish the feasibility of developing RNA decoys that can selectively target biologic functions of abundant and widely expressed RNA binding proteins.

  16. Targeting a KH-domain protein with RNA decoys.

    PubMed Central

    Makeyev, Aleksandr V; Eastmond, Dawn L; Liebhaber, Stephen A

    2002-01-01

    RNA-binding proteins are involved in the regulation of many aspects of eukaryotic gene expression. Targeted interference with RNA-protein interactions could offer novel approaches to modulation of expression profiles, alteration of developmental pathways, and reversal of certain disease processes. Here we investigate a decoy strategy for the study of the alphaCP subgroup of KH-domain RNA-binding proteins. These poly(C)-binding proteins have been implicated in a wide spectrum of posttranscriptional controls. Three categories of RNA decoys to alphaCPs were studied: poly(C) homopolymers, native mRNA-binding sites, and a high-affinity structure selected from a combinatorial library. Native chemistry was found to be essential for alphaCP decoy action. Because alphaCP proteins are found in both the nucleus and cytoplasm, decoy cassettes were incorporated within both nuclear (U1 snRNA) and cytoplasmic (VA1 RNA) RNA frameworks. Several sequences demonstrated optimal decoy properties when assayed for protein-binding and decoy bioactivity in vitro. A subset of these transcripts was shown to mediate targeted inhibition of alphaCP-dependent translation when expressed in either the nucleus or cytoplasm of transfected cells. Significantly, these studies establish the feasibility of developing RNA decoys that can selectively target biologic functions of abundant and widely expressed RNA binding proteins. PMID:12358435

  17. Heparin octasaccharide decoy liposomes inhibit replication of multiple viruses.

    PubMed

    Hendricks, Gabriel L; Velazquez, Lourdes; Pham, Serena; Qaisar, Natasha; Delaney, James C; Viswanathan, Karthik; Albers, Leila; Comolli, James C; Shriver, Zachary; Knipe, David M; Kurt-Jones, Evelyn A; Fygenson, Deborah K; Trevejo, Jose M; Wang, Jennifer P; Finberg, Robert W

    2015-04-01

    Heparan sulfate (HS) is a ubiquitous glycosaminoglycan that serves as a cellular attachment site for a number of significant human pathogens, including respiratory syncytial virus (RSV), human parainfluenza virus 3 (hPIV3), and herpes simplex virus (HSV). Decoy receptors can target pathogens by binding to the receptor pocket on viral attachment proteins, acting as 'molecular sinks' and preventing the pathogen from binding to susceptible host cells. Decoy receptors functionalized with HS could bind to pathogens and prevent infection, so we generated decoy liposomes displaying HS-octasaccharide (HS-octa). These decoy liposomes significantly inhibited RSV, hPIV3, and HSV infectivity in vitro to a greater degree than the original HS-octa building block. The degree of inhibition correlated with the density of HS-octa displayed on the liposome surface. Decoy liposomes with HS-octa inhibited infection of viruses to a greater extent than either full-length heparin or HS-octa alone. Decoy liposomes were effective when added prior to infection or following the initial infection of cells in vitro. By targeting the well-conserved receptor-binding sites of HS-binding viruses, decoy liposomes functionalized with HS-octa are a promising therapeutic antiviral agent and illustrate the utility of the liposome delivery platform. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Significance of increased expression of decoy receptor 3 in chronic liver disease.

    PubMed

    Kim, S; Kotoula, V; Hytiroglou, P; Zardavas, D; Zhang, L

    2009-08-01

    Considerable evidence has indicated that apoptosis plays an important role in hepatocyte death in chronic liver disease. However, the cellular and molecular mechanisms underlying liver regeneration in these diseases are largely unknown. Plausibly, certain molecules expressed to counteract apoptosis might provide survival advantage of certain liver cells. Therefore, we investigated a possible expression of decoy receptor 3 of the tumour necrosis factor receptor family in chronic liver diseases since decoy receptor 3 is known to inhibit apoptosis mediated by pro-apoptotic tumour necrosis factor family ligands including Fas ligand. A series of liver biopsies from patients with different stages of fibrosis were subjected to immunohistochemistry and in situ hybridization. Both decoy receptor 3 protein and mRNA were mainly expressed in biliary epithelial cells and infiltrating lymphocytes in the diseased livers. Most noticeably, intense decoy receptor 3 expression was observed in newly developing biliary ductules in regenerative nodules as well as dysplastic nodules of cirrhotic livers. In addition, decoy receptor 3 secretion in hepatocellular carcinoma cells in culture was via the activation of mitogen-activated protein kinases. Decoy receptor 3 was specifically expressed in chronic liver diseases and hepatocellular carcinoma cells, and decoy receptor 3 might facilitate the survival of liver cells by exerting its anti-apoptotic activity during the progression of liver cirrhosis and hepatocarcinogenesis.

  19. Cytokine Decoy and Scavenger Receptors as Key Regulators of Immunity and Inflammation

    PubMed Central

    Bonecchi, Raffaella; Garlanda, Cecilia; Mantovani, Alberto; Riva, Federica

    2017-01-01

    IL-1R2 was the first decoy receptor to be described. Subsequently receptors which act as pure decoys or scavengers or trigger dampening of cytokine signaling have been described for cytokines and chemokines. Here we review the current understanding of the mode of action and significance in pathology of the chemokine atypical receptor ACKR2, the IL-1 decoy receptor IL-1R2 and the atypical IL-1 receptor family IL-1R8. Decoy and scavenger receptors with no or atypical signaling have emerged as a general strategy conserved in evolution to tune the action of cytokines, chemokines and growth factors. PMID:27498604

  20. Placental expression of D6 decoy receptor in preeclampsia

    PubMed Central

    Cho, Geum Joon; Lee, Eun Sung; Jin, Hye Mi; Lee, Ji Hye; Kim, Yeun Sun; Seol, Hyun-Joo; Hong, Soon-Cheol; Kim, Hai-Joong

    2015-01-01

    Objective The purpose of this study was to investigate the expression of the D6 decoy receptor that can bind chemokines and target them for degradation, resulting in inhibition of inflammation in placentas from preeclamptic and normal pregnancies. Methods The current study was carried out in 35 pregnant women (23 patients with preeclampsia and 12 healthy, normotensive pregnant women) during the third trimester of pregnancy. The expressions of D6 decoy receptor in the placenta were determined with real time reverse transcriptase polymerase chain reaction and western blotting. Results The mRNA and protein of D6 decoy receptor were detected in all of placentas from preeclamptic and normal pregnancies. Placental D6 decoy receptor mRNA expression was significantly lower in patients with preeclampsia than in patients with normal pregnancies. Western blot analyses revealed decreased protein expression in cases of preeclampsia. Conclusion The expression of the D6 decoy receptor in preeclamptic placentas was significantly lower than in normal placentas. Further studies are needed to clarify the underlying mechanisms that link decreased expression of placental D6 decoy receptor and preeclampsia. PMID:26430656

  1. A decoy trap for breeding-season mallards in North Dakota

    USGS Publications Warehouse

    Sharp, D.E.; Lokemoen, J.T.

    1987-01-01

    A modified decoy trap was effective for capturing wild adult male and female mallards (Anas platyrhynchos) during the 1980-81 breeding seasons in North Dakota. Key features contributing to the trap's success included a central decoy cylinder, large capture compartments with spring-door openings, an adjustable trigger mechanism with a balanced door attachment that was resistant to trap movement, and the use of F1, wild-stock or game-farm female decoys.

  2. The Decoy Effect as a Nudge: Boosting Hand Hygiene With a Worse Option.

    PubMed

    Li, Meng; Sun, Yan; Chen, Hui

    2018-05-01

    This article provides the first test of the decoy effect as a nudge to influence real-world behavior. The decoy effect is the phenomenon that an additional but worse option can boost the appeal of an existing option. It has been widely demonstrated in hypothetical choices, but its usefulness in real-world settings has been subject to debate. In three longitudinal experiments in food-processing factories, we tested two decoy sanitation options that were worse than the existing sanitizer spray bottle. Results showed that the presence of a decoy, but not an additional copy of the original sanitizer bottle in a different color, drastically increased food workers' hand sanitizer use from the original sanitizer bottle and, consequently, improved workers' passing rate in hand sanitary tests from 60% to 70% to above 90% for 20 days. These findings indicate that the decoy effect can be a powerful nudge technique to influence real-world behavior.

  3. A STAT3-decoy oligonucleotide induces cell death in a human colorectal carcinoma cell line by blocking nuclear transfer of STAT3 and STAT3-bound NF-κB

    PubMed Central

    2011-01-01

    Background The transcription factor STAT3 (signal transducer and activator of transcription 3) is frequently activated in tumor cells. Activated STAT3 forms homodimers, or heterodimers with other TFs such as NF-κB, which becomes activated. Cytoplasmic STAT3 dimers are activated by tyrosine phosphorylation; they interact with importins via a nuclear localization signal (NLS) one of which is located within the DNA-binding domain formed by the dimer. In the nucleus, STAT3 regulates target gene expression by binding a consensus sequence within the promoter. STAT3-specific decoy oligonucleotides (STAT3-decoy ODN) that contain this consensus sequence inhibit the transcriptional activity of STAT3, leading to cell death; however, their mechanism of action is unclear. Results The mechanism of action of a STAT3-decoy ODN was analyzed in the colon carcinoma cell line SW 480. These cells' dependence on activated STAT3 was verified by showing that cell death is induced by STAT3-specific siRNAs or Stattic. STAT3-decoy ODN was shown to bind activated STAT3 within the cytoplasm, and to prevent its translocation to the nucleus, as well as that of STAT3-associated NF-κB, but it did not prevent the nuclear transfer of STAT3 with mutations in its DNA-binding domain. The complex formed by STAT3 and the STAT3-decoy ODN did not associate with importin, while STAT3 alone was found to co-immunoprecipitate with importin. Leptomycin B and vanadate both trap STAT3 in the nucleus. They were found here to oppose the cytoplasmic trapping of STAT3 by the STAT3-decoy ODN. Control decoys consisting of either a mutated STAT3-decoy ODN or a NF-κB-specific decoy ODN had no effect on STAT3 nuclear translocation. Finally, blockage of STAT3 nuclear transfer correlated with the induction of SW 480 cell death. Conclusions The inhibition of STAT3 by a STAT3-decoy ODN, leading to cell death, involves the entrapment of activated STAT3 dimers in the cytoplasm. A mechanism is suggested whereby this entrapment is due to STAT3-decoy ODN's inhibition of active STAT3/importin interaction. These observations point to the high potential of STAT3-decoy ODN as a reagent and to STAT3 nucleo-cytoplasmic shuttling in tumor cells as a potential target for effective anti-cancer compounds. PMID:21486470

  4. Binding free energy analysis of protein-protein docking model structures by evERdock.

    PubMed

    Takemura, Kazuhiro; Matubayasi, Nobuyuki; Kitao, Akio

    2018-03-14

    To aid the evaluation of protein-protein complex model structures generated by protein docking prediction (decoys), we previously developed a method to calculate the binding free energies for complexes. The method combines a short (2 ns) all-atom molecular dynamics simulation with explicit solvent and solution theory in the energy representation (ER). We showed that this method successfully selected structures similar to the native complex structure (near-native decoys) as the lowest binding free energy structures. In our current work, we applied this method (evERdock) to 100 or 300 model structures of four protein-protein complexes. The crystal structures and the near-native decoys showed the lowest binding free energy of all the examined structures, indicating that evERdock can successfully evaluate decoys. Several decoys that show low interface root-mean-square distance but relatively high binding free energy were also identified. Analysis of the fraction of native contacts, hydrogen bonds, and salt bridges at the protein-protein interface indicated that these decoys were insufficiently optimized at the interface. After optimizing the interactions around the interface by including interfacial water molecules, the binding free energies of these decoys were improved. We also investigated the effect of solute entropy on binding free energy and found that consideration of the entropy term does not necessarily improve the evaluations of decoys using the normal model analysis for entropy calculation.

  5. Binding free energy analysis of protein-protein docking model structures by evERdock

    NASA Astrophysics Data System (ADS)

    Takemura, Kazuhiro; Matubayasi, Nobuyuki; Kitao, Akio

    2018-03-01

    To aid the evaluation of protein-protein complex model structures generated by protein docking prediction (decoys), we previously developed a method to calculate the binding free energies for complexes. The method combines a short (2 ns) all-atom molecular dynamics simulation with explicit solvent and solution theory in the energy representation (ER). We showed that this method successfully selected structures similar to the native complex structure (near-native decoys) as the lowest binding free energy structures. In our current work, we applied this method (evERdock) to 100 or 300 model structures of four protein-protein complexes. The crystal structures and the near-native decoys showed the lowest binding free energy of all the examined structures, indicating that evERdock can successfully evaluate decoys. Several decoys that show low interface root-mean-square distance but relatively high binding free energy were also identified. Analysis of the fraction of native contacts, hydrogen bonds, and salt bridges at the protein-protein interface indicated that these decoys were insufficiently optimized at the interface. After optimizing the interactions around the interface by including interfacial water molecules, the binding free energies of these decoys were improved. We also investigated the effect of solute entropy on binding free energy and found that consideration of the entropy term does not necessarily improve the evaluations of decoys using the normal model analysis for entropy calculation.

  6. Ultrasound microbubble-mediated transfection of NF-κB decoy oligodeoxynucleotide into gingival tissues inhibits periodontitis in rats in vivo

    PubMed Central

    Yamaguchi, Hiroyuki; Hosomichi, Jun; Suzuki, Jun-ichi; Hatano, Kasumi; Usumi-Fujita, Risa; Shimizu, Yasuhiro; Kaneko, Sawa; Ono, Takashi

    2017-01-01

    Periodontitis is a chronic infectious disease for which the fundamental treatment is to reduce the load of subgingival pathogenic bacteria by debridement. However, previous investigators attempted to implement a nuclear factor kappa B (NF-κB) decoy oligodeoxynucleotide (ODN) as a suppressor of periodontitis progression. Although we recently reported the effectiveness of the ultrasound-microbubble method as a tool for transfecting the NF-κB decoy ODN into healthy rodent gingival tissue, this technique has not yet been applied to the pathological gingiva of periodontitis animal models. Therefore, the aim of this study was to investigate the effectiveness of the technique in transfecting the NF-κB decoy ODN into rats with ligature-induced periodontitis. Micro computed tomography (micro-CT) analysis demonstrated a significant reduction in alveolar bone loss following treatment with the NF-κB decoy ODN in the experimental group. RT-PCR showed that NF-κB decoy ODN treatment resulted in significantly reduced expression of inflammatory cytokine transcripts within rat gingival tissues. Thus, we established a transcutaneous transfection model of NF-κB decoy ODN treatment of periodontal tissues using the ultrasound-microbubble technique. Our findings suggest that the NF-κB decoy ODN could be used as a significant suppressor of gingival inflammation and periodontal disease progression. PMID:29091721

  7. Prediction of Early BK Virus Infection in Kidney Transplant Recipients by the Number of Cells With Intranuclear Inclusion Bodies (Decoy Cells)

    PubMed Central

    Yamada, Yoshiteru; Tsuchiya, Tomohiro; Inagaki, Isao; Seishima, Mitsuru; Deguchi, Takashi

    2018-01-01

    Background BK virus (BKV) is the cause of nephropathy. Because BKV nephropathy can progress to graft loss, early diagnosis of BKV infection is very important. In this study, we aimed to investigate the utility of quantifying cells with intranuclear inclusion bodies (decoy cells) in urinary sediment for the screening and monitoring of BKV infection in renal transplant recipients at our hospital. Methods This was a retrospective single-center study. Urine sediment examination was performed at each outpatient visit, and the number of decoy cells was measured in the whole microscopic field. Patients (n = 41) were divided into the BK viremia group (blood positive for BKV DNA by polymerase chain reaction [PCR]) and non-BK viremia group (blood negative for BKV DNA by PCR), and the decoy cell count in urinary sediments was examined. Results The maximum decoy cell count was significantly higher (P = 0.04) in the BK viremia group than in the non-BK viremia group. In the receiver operating characteristic curve for the maximum decoy cells, the cutoff value was 507 cells. The area under the receiver operating characteristic curve was 0.8774 (95% confidence interval, 0.7739-0.9810). The number of decoy cells at the time of appearance in the BK viremia group was not significantly different from that in the non-BK viremia group. However, the BK viremia group showed an increasing trend, whereas the non-BK viremia group showed a decreasing trend, in the number of decoy cells. There was a positive correlation between the number of decoy cells and the data from the urine BKV-DNA PCR quantification (correlation coefficient [r] = 0.74). Conclusions Measurement of decoy cells in urinary sediments may predict early BKV infection, and if performed quickly, it may be useful for screening and continuous monitoring of BKV infection in renal transplant recipients. PMID:29464201

  8. The Decoy Effect Within Alcohol Purchasing Decisions.

    PubMed

    Monk, Rebecca L; Qureshi, Adam W; Leatherbarrow, Thomas; Hughes, Annalise

    2016-08-23

    The decoy effect is the phenomenon where the introduction of a third choice to a decision dyad changes the distribution of preferences between options. Examine whether this effect exists in alcohol purchasing decisions and whether testing context impacts this. Fifty-two participants tested in either a bar or library context and were asked to choose one of a series of beer and water deals presented for timed intervals. In some cases, two options were presented (with similar attractiveness) and in other cases a third, less preferable, decoy option was added. A basic decoy effect in both alcohol and water purchasing decisions. Specifically, there were reductions in the selection of both the original options when the decoy was added into choice dyads. A significant interaction demonstrated in the bar context there was a significant difference such that there was a slight increase in participants selecting the most cost effective option when the decoy was added, and a simultaneous decrease in those choosing the moderately cost effective option. There were no such differences observed in the library condition. The same product may be perceived differently across contexts and, as such, consumers in a pub environment may be particularly vulnerable to the decoy effect.

  9. The cis decoy against the estrogen response element suppresses breast cancer cells via target disrupting c-fos not mitogen-activated protein kinase activity.

    PubMed

    Wang, Li Hua; Yang, Xiao Yi; Zhang, Xiaohu; Mihalic, Kelly; Xiao, Weihua; Farrar, William L

    2003-05-01

    Breast cancer, the most common malignancy in women, has been demonstrated to be associated with the steroid hormone estrogen and its receptor (ER), a ligand-activated transcription factor. Therefore, we developed a phosphorothiolate cis-element decoy against the estrogen response element (ERE decoy) to target disruption of ER DNA binding and transcriptional activity. Here, we showed that the ERE decoy potently ablated the 17beta-estrogen-inducible cell proliferation and induced apoptosis of human breast carcinoma cells by functionally affecting expression of c-fos gene and AP-1 luciferase gene reporter activity. Specificity of the decoy was demonstrated by its ability to directly block ER binding to a cis-element probe and transactivation. Moreover, the decoy failed to inhibit ER-mediated mitogen-activated protein kinase signaling pathways and cell growth of ER-negative breast cancer cells. Taken together, these data suggest that estrogen-mediated cell growth of breast cancer cells can be preferentially restricted via targeted disruption of ER at the level of DNA binding by a novel and specific decoy strategy applied to steroid nuclear receptors.

  10. Nuclear factor-kappa B decoy suppresses nerve injury and improves mechanical allodynia and thermal hyperalgesia in a rat lumbar disc herniation model.

    PubMed

    Suzuki, Munetaka; Inoue, Gen; Gemba, Takefumi; Watanabe, Tomoko; Ito, Toshinori; Koshi, Takana; Yamauchi, Kazuyo; Yamashita, Masaomi; Orita, Sumihisa; Eguchi, Yawara; Ochiai, Nobuyasu; Kishida, Shunji; Takaso, Masashi; Aoki, Yasuchika; Takahashi, Kazuhisa; Ohtori, Seiji

    2009-07-01

    Nuclear factor-kappa B (NF-kappaB) is a gene transcriptional regulator of inflammatory cytokines. We investigated the transduction efficiency of NF-kappaB decoy to dorsal root ganglion (DRG), as well as the decrease in nerve injury, mechanical allodynia, and thermal hyperalgesia in a rat lumbar disc herniation model. Forty rats were used in this study. NF-kappaB decoy-fluorescein isothiocyanate (FITC) was injected intrathecally at the L5 level in five rats, and its transduction efficiency into DRG measured. In another 30 rats, mechanical pressure was placed on the DRG at the L5 level and nucleus pulposus harvested from the rat coccygeal disc was transplanted on the DRG. Rats were classified into three groups of ten animals each: a herniation + decoy group, a herniation + oligo group, and a herniation only group. For behavioral testing, mechanical allodynia and thermal hyperalgesia were evaluated. In 15 of the herniation rats, their left L5 DRGs were resected, and the expression of activating transcription factor 3 (ATF-3) and calcitonin gene-related peptide (CGRP) was evaluated immunohistochemically compared to five controls. The total transduction efficiency of NF-kappaB decoy-FITC in DRG neurons was 10.8% in vivo. The expression of CGRP and ATF-3 was significantly lower in the herniation + decoy group than in the other herniation groups. Mechanical allodynia and thermal hyperalgesia were significantly suppressed in the herniation + decoy group. NF-kappaB decoy was transduced into DRGs in vivo. NF-kappaB decoy may be useful as a target for clarifying the mechanism of sciatica caused by lumbar disc herniation.

  11. Ultrasound Targeted Microbubble Destruction-Mediated Delivery of a Transcription Factor Decoy Inhibits STAT3 Signaling and Tumor Growth

    PubMed Central

    Kopechek, Jonathan A.; Carson, Andrew R.; McTiernan, Charles F.; Chen, Xucai; Hasjim, Bima; Lavery, Linda; Sen, Malabika; Grandis, Jennifer R.; Villanueva, Flordeliza S.

    2015-01-01

    Signal transducer and activator of transcription 3 (STAT3) is constitutively activated in many cancers where it acts to promote tumor progression. A STAT3-specific transcription factor decoy has been developed to suppress STAT3 downstream signaling, but a delivery strategy is needed to improve clinical translation. Ultrasound-targeted microbubble destruction (UTMD) has been shown to enhance image-guided local delivery of molecular therapeutics to a target site. The objective of this study was to deliver STAT3 decoy to squamous cell carcinoma (SCC) tumors using UTMD to disrupt STAT3 signaling and inhibit tumor growth. Studies performed demonstrated that UTMD treatment with STAT3 decoy-loaded microbubbles inhibited STAT3 signaling in SCC cells in vitro. Studies performed in vivo demonstrated that UTMD treatment with STAT3 decoy-loaded microbubbles induced significant tumor growth inhibition (31-51% reduced tumor volume vs. controls, p < 0.05) in mice bearing SCC tumors. Furthermore, expression of STAT3 downstream target genes (Bcl-xL and cyclin D1) was significantly reduced (34-39%, p < 0.05) in tumors receiving UTMD treatment with STAT3 decoy-loaded microbubbles compared to controls. In addition, the quantity of radiolabeled STAT3 decoy detected in tumors eight hours after treatment was significantly higher with UTMD treatment compared to controls (70-150%, p < 0.05). This study demonstrates that UTMD can increase delivery of a transcription factor decoy to tumors in vivo and that the decoy can inhibit STAT3 signaling and tumor growth. These results suggest that UTMD treatment holds potential for clinical use to increase the concentration of a transcription factor signaling inhibitor in the tumor. PMID:26681983

  12. 'Decoy' and 'non-decoy' functions of DcR3 promote malignant potential in human malignant fibrous histiocytoma cells.

    PubMed

    Toda, Mitsunori; Kawamoto, Teruya; Ueha, Takeshi; Kishimoto, Kenta; Hara, Hitomi; Fukase, Naomasa; Onishi, Yasuo; Harada, Risa; Minoda, Masaya; Kurosaka, Masahiro; Akisue, Toshihiro

    2013-09-01

    Decoy receptor 3 (DcR3) is a soluble secreted protein that belongs to the tumor necrosis factor receptor (TNFR) superfamily. DcR3 inhibits the Fas ligand (FasL)/Fas apoptotic pathway by binding to FasL, competitively with Fas receptor. Previous studies have reported that overexpression of DcR3 has been detected in various human malignancies and that DcR3 functions as a 'decoy' for FasL to inhibit FasL-induced apoptosis. In addition, recent studies have revealed that DcR3 has 'non-decoy' functions to promote tumor cell migration and invasion, suggesting that DcR3 may play important roles in tumor progression by decoy and non-decoy functions. We have previously reported that overexpression of DcR3 was observed in human malignant fibrous histiocytoma (MFH), however, the roles of DcR3 in MFH have not been studied. In the present study, to elucidate the roles of DcR3 in tumor progression of MFH, we examined the effects of DcR3 inhibition on cell apoptosis, migration and invasion in human MFH cells. siRNA knockdown of DcR3 enhanced the FasL-induced apoptotic activity and significantly decreased cell migration and invasion with a decrease in the activation of phosphatidylinositol 3 kinase (PI3K)/Akt and matrix metalloproteinase (MMP)-2. The findings in this study strongly suggest that DcR3 plays important roles in tumor progression of human MFH by decoy as well as non-decoy functions and that DcR3 may serve as a potent therapeutic target for human MFH.

  13. DEKOIS: demanding evaluation kits for objective in silico screening--a versatile tool for benchmarking docking programs and scoring functions.

    PubMed

    Vogel, Simon M; Bauer, Matthias R; Boeckler, Frank M

    2011-10-24

    For widely applied in silico screening techniques success depends on the rational selection of an appropriate method. We herein present a fast, versatile, and robust method to construct demanding evaluation kits for objective in silico screening (DEKOIS). This automated process enables creating tailor-made decoy sets for any given sets of bioactives. It facilitates a target-dependent validation of docking algorithms and scoring functions helping to save time and resources. We have developed metrics for assessing and improving decoy set quality and employ them to investigate how decoy embedding affects docking. We demonstrate that screening performance is target-dependent and can be impaired by latent actives in the decoy set (LADS) or enhanced by poor decoy embedding. The presented method allows extending and complementing the collection of publicly available high quality decoy sets toward new target space. All present and future DEKOIS data sets will be made accessible at www.dekois.com.

  14. Target-decoy Based False Discovery Rate Estimation for Large-scale Metabolite Identification.

    PubMed

    Wang, Xusheng; Jones, Drew R; Shaw, Timothy I; Cho, Ji-Hoon; Wang, Yuanyuan; Tan, Haiyan; Xie, Boer; Zhou, Suiping; Li, Yuxin; Peng, Junmin

    2018-05-23

    Metabolite identification is a crucial step in mass spectrometry (MS)-based metabolomics. However, it is still challenging to assess the confidence of assigned metabolites. In this study, we report a novel method for estimating false discovery rate (FDR) of metabolite assignment with a target-decoy strategy, in which the decoys are generated through violating the octet rule of chemistry by adding small odd numbers of hydrogen atoms. The target-decoy strategy was integrated into JUMPm, an automated metabolite identification pipeline for large-scale MS analysis, and was also evaluated with two other metabolomics tools, mzMatch and mzMine 2. The reliability of FDR calculation was examined by false datasets, which were simulated by altering MS1 or MS2 spectra. Finally, we used the JUMPm pipeline coupled with the target-decoy strategy to process unlabeled and stable-isotope labeled metabolomic datasets. The results demonstrate that the target-decoy strategy is a simple and effective method for evaluating the confidence of high-throughput metabolite identification.

  15. Evaluation of a novel virtual screening strategy using receptor decoy binding sites.

    PubMed

    Patel, Hershna; Kukol, Andreas

    2016-08-23

    Virtual screening is used in biomedical research to predict the binding affinity of a large set of small organic molecules to protein receptor targets. This report shows the development and evaluation of a novel yet straightforward attempt to improve this ranking in receptor-based molecular docking using a receptor-decoy strategy. This strategy includes defining a decoy binding site on the receptor and adjusting the ranking of the true binding-site virtual screen based on the decoy-site screen. The results show that by docking against a receptor-decoy site with Autodock Vina, improved Receiver Operator Characteristic Enrichment (ROCE) was achieved for 5 out of fifteen receptor targets investigated, when up to 15 % of a decoy site rank list was considered. No improved enrichment was seen for 7 targets, while for 3 targets the ROCE was reduced. The extent to which this strategy can effectively improve ligand prediction is dependent on the target receptor investigated.

  16. First-in-human trial of a STAT3 decoy oligonucleotide in head and neck tumors: implications for cancer therapy

    PubMed Central

    Sen, Malabika; Thomas, Sufi. M.; Kim, Seungwon; Yeh, Joanne I.; Ferris, Robert L.; Johnson, Jonas T.; Duvvuri, Umamaheswar; Lee, Jessica; Sahu, Nivedita; Joyce, Sonali; Freilino, Maria L.; Shi, Haibin; Li, Changyou; Ly, Danith; Rapireddy, Srinivas; Etter, Jonathan P.; Li, Pui-Kai; Wang, Lin; Chiosea, Simion; Seethala, Raja R.; Gooding, William. E.; Chen, Xiaomin; Kaminski, Naftali; Pandit, Kusum; Johnson, Daniel. E.; Grandis, Jennifer R.

    2013-01-01

    Despite evidence implicating transcription factors, including STAT3, in oncogenesis, these proteins have been regarded as “undruggable”. We developed a decoy targeting STAT3 and performed a phase 0 trial. Expression levels of STAT3 target genes were decreased in the head and neck cancers following injection with the STAT3 decoy compared with tumors receiving saline control. Decoys have not been amenable to systemic administration due to instability. To overcome this barrier, we linked the oligonucleotide strands using hexa-ethyleneglycol spacers. This cyclic STAT3 decoy bound with high affinity to STAT3 protein, reduced cellular viability, and suppressed STAT3 target gene expression in cancer cells. Intravenous injection of the cyclic STAT3 decoy inhibited xenograft growth and downregulated STAT3 target genes in the tumors. These results provide the first demonstration of a successful strategy to inhibit tumor STAT3 signaling via systemic administration of a selective STAT3 inhibitor, thereby paving the way for broad clinical development. PMID:22719020

  17. Inhibition of androgen receptor by decoy molecules delays progression to castration-recurrent prostate cancer.

    PubMed

    Myung, Jae-Kyung; Wang, Gang; Chiu, Helen H L; Wang, Jun; Mawji, Nasrin R; Sadar, Marianne D

    2017-01-01

    Androgen receptor (AR) is a member of the steroid receptor family and a therapeutic target for all stages of prostate cancer. AR is activated by ligand binding within its C-terminus ligand-binding domain (LBD). Here we show that overexpression of the AR NTD to generate decoy molecules inhibited both the growth and progression of prostate cancer in castrated hosts. Specifically, it was shown that lentivirus delivery of decoys delayed hormonal progression in castrated hosts as indicated by increased doubling time of tumor volume, prolonged time to achieve pre-castrate levels of serum prostate-specific antigen (PSA) and PSA nadir. These clinical parameters are indicative of delayed hormonal progression and improved therapeutic response and prognosis. Decoys reduced the expression of androgen-regulated genes that correlated with reduced in situ interaction of the AR with androgen response elements. Decoys did not reduce levels of AR protein or prevent nuclear localization of the AR. Nor did decoys interact directly with the AR. Thus decoys did not inhibit AR transactivation by a dominant negative mechanism. This work provides evidence that the AR NTD plays an important role in the hormonal progression of prostate cancer and supports the development of AR antagonists that target the AR NTD.

  18. Inhibition of androgen receptor by decoy molecules delays progression to castration-recurrent prostate cancer

    PubMed Central

    Myung, Jae-Kyung; Wang, Gang; Chiu, Helen H. L.; Wang, Jun; Mawji, Nasrin R.; Sadar, Marianne D.

    2017-01-01

    Androgen receptor (AR) is a member of the steroid receptor family and a therapeutic target for all stages of prostate cancer. AR is activated by ligand binding within its C-terminus ligand-binding domain (LBD). Here we show that overexpression of the AR NTD to generate decoy molecules inhibited both the growth and progression of prostate cancer in castrated hosts. Specifically, it was shown that lentivirus delivery of decoys delayed hormonal progression in castrated hosts as indicated by increased doubling time of tumor volume, prolonged time to achieve pre-castrate levels of serum prostate-specific antigen (PSA) and PSA nadir. These clinical parameters are indicative of delayed hormonal progression and improved therapeutic response and prognosis. Decoys reduced the expression of androgen-regulated genes that correlated with reduced in situ interaction of the AR with androgen response elements. Decoys did not reduce levels of AR protein or prevent nuclear localization of the AR. Nor did decoys interact directly with the AR. Thus decoys did not inhibit AR transactivation by a dominant negative mechanism. This work provides evidence that the AR NTD plays an important role in the hormonal progression of prostate cancer and supports the development of AR antagonists that target the AR NTD. PMID:28306720

  19. A population-based evolutionary search approach to the multiple minima problem in de novo protein structure prediction

    PubMed Central

    2013-01-01

    Background Elucidating the native structure of a protein molecule from its sequence of amino acids, a problem known as de novo structure prediction, is a long standing challenge in computational structural biology. Difficulties in silico arise due to the high dimensionality of the protein conformational space and the ruggedness of the associated energy surface. The issue of multiple minima is a particularly troublesome hallmark of energy surfaces probed with current energy functions. In contrast to the true energy surface, these surfaces are weakly-funneled and rich in comparably deep minima populated by non-native structures. For this reason, many algorithms seek to be inclusive and obtain a broad view of the low-energy regions through an ensemble of low-energy (decoy) conformations. Conformational diversity in this ensemble is key to increasing the likelihood that the native structure has been captured. Methods We propose an evolutionary search approach to address the multiple-minima problem in decoy sampling for de novo structure prediction. Two population-based evolutionary search algorithms are presented that follow the basic approach of treating conformations as individuals in an evolving population. Coarse graining and molecular fragment replacement are used to efficiently obtain protein-like child conformations from parents. Potential energy is used both to bias parent selection and determine which subset of parents and children will be retained in the evolving population. The effect on the decoy ensemble of sampling minima directly is measured by additionally mapping a conformation to its nearest local minimum before considering it for retainment. The resulting memetic algorithm thus evolves not just a population of conformations but a population of local minima. Results and conclusions Results show that both algorithms are effective in terms of sampling conformations in proximity of the known native structure. The additional minimization is shown to be key to enhancing sampling capability and obtaining a diverse ensemble of decoy conformations, circumventing premature convergence to sub-optimal regions in the conformational space, and approaching the native structure with proximity that is comparable to state-of-the-art decoy sampling methods. The results are shown to be robust and valid when using two representative state-of-the-art coarse-grained energy functions. PMID:24565020

  20. Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights

    PubMed Central

    Domingue, Michael J.; Lakhtakia, Akhlesh; Pulsifer, Drew P.; Hall, Loyal P.; Badding, John V.; Bischof, Jesse L.; Martín-Palma, Raúl J.; Imrei, Zoltán; Janik, Gergely; Mastro, Victor C.; Hazen, Missy; Baker, Thomas C.

    2014-01-01

    Recent advances in nanoscale bioreplication processes present the potential for novel basic and applied research into organismal behavioral processes. Insect behavior potentially could be affected by physical features existing at the nanoscale level. We used nano-bioreplicated visual decoys of female emerald ash borer beetles (Agrilus planipennis) to evoke stereotypical mate-finding behavior, whereby males fly to and alight on the decoys as they would on real females. Using an industrially scalable nanomolding process, we replicated and evaluated the importance of two features of the outer cuticular surface of the beetle’s wings: structural interference coloration of the elytra by multilayering of the epicuticle and fine-scale surface features consisting of spicules and spines that scatter light into intense strands. Two types of decoys that lacked one or both of these elements were fabricated, one type nano-bioreplicated and the other 3D-printed with no bioreplicated surface nanostructural elements. Both types were colored with green paint. The light-scattering properties of the nano-bioreplicated surfaces were verified by shining a white laser on the decoys in a dark room and projecting the scattering pattern onto a white surface. Regardless of the coloration mechanism, the nano-bioreplicated decoys evoked the complete attraction and landing sequence of Agrilus males. In contrast, males made brief flying approaches toward the decoys without nanostructured features, but diverted away before alighting on them. The nano-bioreplicated decoys were also electroconductive, a feature used on traps such that beetles alighting onto them were stunned, killed, and collected. PMID:25225359

  1. STAT3 Oligonucleotide Inhibits Tumor Angiogenesis in Preclinical Models of Squamous Cell Carcinoma

    PubMed Central

    Klein, Jonah D.; Sano, Daisuke; Sen, Malabika; Myers, Jeffrey N.; Grandis, Jennifer R.; Kim, Seungwon

    2014-01-01

    Purpose Signal transducer and activator of transcription 3 (STAT3) has shown to play a critical role in head and neck squamous cell carcinoma (HNSCC) and we have recently completed clinical trials of STAT3 decoy oligonucleotide in patients with recurrent or metastatic HNSCC. However, there is limited understanding of the role of STAT3 in modulating other aspects of tumorigenesis such as angiogenesis. In this study, we aimed to examine the effects of STAT3 decoy oligonucleotide on tumor angiogenesis. Experimental Design A STAT3 decoy oligonucleotide and small interfering RNA (siRNA) were used to inhibit STAT3 in endothelial cells in vitro and in vivo. The biochemical effects of STAT3 inhibition were examined in conjunction with the consequences on proliferation, migration, apoptotic staining, and tubule formation. Additionally, we assessed the effects of STAT3 inhibition on tumor angiogenesis using murine xenograft models. Results STAT3 decoy oligonucleotide decreased proliferation, induces apoptosis, decreased migration, and decreased tubule formation of endothelial cells in vitro. The STAT3 decoy oligonucleotide also inhibited tumor angiogenesis in murine tumor xenografts. Lastly, our data suggest that the antiangiogenic effects of STAT3 decoy oligonucleotide were mediatedthrough the inhibition of both STAT3 and STAT1. Conclusions The STAT3 decoy oligonucleotidewas found to be an effective antiangiogenic agent, which is likely to contribute to the overall antitumor effects of this agent in solid tumors.Taken together with the previously demonstrated antitumor activity of this agent, STAT3 decoy oligonucleotide represents a promising single agent approach to targeting both the tumor and vascular compartments in various malignancies. PMID:24404126

  2. ROTAS: a rotamer-dependent, atomic statistical potential for assessment and prediction of protein structures.

    PubMed

    Park, Jungkap; Saitou, Kazuhiro

    2014-09-18

    Multibody potentials accounting for cooperative effects of molecular interactions have shown better accuracy than typical pairwise potentials. The main challenge in the development of such potentials is to find relevant structural features that characterize the tightly folded proteins. Also, the side-chains of residues adopt several specific, staggered conformations, known as rotamers within protein structures. Different molecular conformations result in different dipole moments and induce charge reorientations. However, until now modeling of the rotameric state of residues had not been incorporated into the development of multibody potentials for modeling non-bonded interactions in protein structures. In this study, we develop a new multibody statistical potential which can account for the influence of rotameric states on the specificity of atomic interactions. In this potential, named "rotamer-dependent atomic statistical potential" (ROTAS), the interaction between two atoms is specified by not only the distance and relative orientation but also by two state parameters concerning the rotameric state of the residues to which the interacting atoms belong. It was clearly found that the rotameric state is correlated to the specificity of atomic interactions. Such rotamer-dependencies are not limited to specific type or certain range of interactions. The performance of ROTAS was tested using 13 sets of decoys and was compared to those of existing atomic-level statistical potentials which incorporate orientation-dependent energy terms. The results show that ROTAS performs better than other competing potentials not only in native structure recognition, but also in best model selection and correlation coefficients between energy and model quality. A new multibody statistical potential, ROTAS accounting for the influence of rotameric states on the specificity of atomic interactions was developed and tested on decoy sets. The results show that ROTAS has improved ability to recognize native structure from decoy models compared to other potentials. The effectiveness of ROTAS may provide insightful information for the development of many applications which require accurate side-chain modeling such as protein design, mutation analysis, and docking simulation.

  3. A Range-Normalization Model of Context-Dependent Choice: A New Model and Evidence

    PubMed Central

    Camerer, Colin

    2012-01-01

    Most utility theories of choice assume that the introduction of an irrelevant option (called the decoy) to a choice set does not change the preference between existing options. On the contrary, a wealth of behavioral data demonstrates the dependence of preference on the decoy and on the context in which the options are presented. Nevertheless, neural mechanisms underlying context-dependent preference are poorly understood. In order to shed light on these mechanisms, we design and perform a novel experiment to measure within-subject decoy effects. We find within-subject decoy effects similar to what have been shown previously with between-subject designs. More importantly, we find that not only are the decoy effects correlated, pointing to similar underlying mechanisms, but also these effects increase with the distance of the decoy from the original options. To explain these observations, we construct a plausible neuronal model that can account for decoy effects based on the trial-by-trial adjustment of neural representations to the set of available options. This adjustment mechanism, which we call range normalization, occurs when the nervous system is required to represent different stimuli distinguishably, while being limited to using bounded neural activity. The proposed model captures our experimental observations and makes new predictions about the influence of the choice set size on the decoy effects, which are in contrast to previous models of context-dependent choice preference. Critically, unlike previous psychological models, the computational resource required by our range-normalization model does not increase exponentially as the set size increases. Our results show that context-dependent choice behavior, which is commonly perceived as an irrational response to the presence of irrelevant options, could be a natural consequence of the biophysical limits of neural representation in the brain. PMID:22829761

  4. Targeting the MET oncogene by concomitant inhibition of receptor and ligand via an antibody-"decoy" strategy.

    PubMed

    Basilico, Cristina; Modica, Chiara; Maione, Federica; Vigna, Elisa; Comoglio, Paolo M

    2018-04-25

    MET, a master gene sustaining "invasive growth," is a relevant target for cancer precision therapy. In the vast majority of tumors, wild-type MET behaves as a "stress-response" gene and relies on the ligand (HGF) to sustain cell "scattering," invasive growth and apoptosis protection (oncogene "expedience"). In this context, concomitant targeting of MET and HGF could be crucial to reach effective inhibition. To test this hypothesis, we combined an anti-MET antibody (MvDN30) inducing "shedding" (i.e., removal of MET from the cell surface), with a "decoy" (i.e., the soluble extracellular domain of the MET receptor) endowed with HGF-sequestering ability. To avoid antibody/decoy interaction-and subsequent neutralization-we identified a single aminoacid in the extracellular domain of MET-lysine 842-that is critical for MvDN30 binding and engineered the corresponding recombinant decoyMET (K842E). DecoyMET K842E retains the ability to bind HGF with high affinity and inhibits HGF-induced MET phosphorylation. In HGF-dependent cellular models, MvDN30 antibody and decoyMET K842E used in combination cooperate in restraining invasive growth, and synergize in blocking cancer cell "scattering." The antibody and the decoy unbridle apoptosis of colon cancer stem cells grown in vitro as spheroids. In a preclinical model, built by orthotopic transplantation of a human pancreatic carcinoma in SCID mice engineered to express human HGF, concomitant treatment with antibody and decoy significantly reduces metastatic spread. The data reported indicate that vertical targeting of the MET/HGF axis results in powerful inhibition of ligand-dependent MET activation, providing proof of concept in favor of combined target therapy of MET "expedience." © 2018 UICC.

  5. Antitumor effect of nuclear factor-κB decoy transfer by mannose-modified bubble lipoplex into macrophages in mouse malignant ascites

    PubMed Central

    Kono, Yusuke; Kawakami, Shigeru; Higuchi, Yuriko; Maruyama, Kazuo; Yamashita, Fumiyoshi; Hashida, Mitsuru

    2014-01-01

    Patients with malignant ascites (MAs) display several symptoms, such as dyspnea, nausea, pain, and abdominal tenderness, resulting in a significant reduction in their quality of life. Tumor-associated macrophages (TAMs) play a crucial role in MA progression. Because TAMs have a tumor-promoting M2 phenotype, conversion of the M2 phenotypic function of TAMs would be promising for MA treatment. Nuclear factor-κB (NF-κB) is a master regulator of macrophage polarization. Here, we developed targeted transfer of a NF-κB decoy into TAMs by ultrasound (US)-responsive, mannose-modified liposome/NF-κB decoy complexes (Man-PEG bubble lipoplexes) in a mouse peritoneal dissemination model of Ehrlich ascites carcinoma. In addition, we investigated the effects of NF-κB decoy transfection into TAMs on MA progression and mouse survival rates. Intraperitoneal injection of Man-PEG bubble lipoplexes and US exposure transferred the NF-κB decoy into TAMs effectively. When the NF-κB decoy was delivered into TAMs by this method in the mouse peritoneal dissemination model, mRNA expression of the Th2 cytokine interleukin (IL)-10 in TAMs was decreased significantly. In contrast, mRNA levels of Th1 cytokines (IL-12, tumor necrosis factor-α, and IL-6) were increased significantly. Moreover, the expression level of vascular endothelial growth factor in ascites was suppressed significantly, and peritoneal angiogenesis showed a reduction. Furthermore, NF-κB decoy transfer into TAMs significantly decreased the ascitic volume and number of Ehrlich ascites carcinoma cells in ascites, and prolonged mouse survival. In conclusion, we transferred a NF-κB decoy efficiently by Man-PEG bubble lipoplexes with US exposure into TAMs, which may be a novel approach for MA treatment. PMID:24850474

  6. Systemic Administration of a Cyclic Signal Transducer and Activator of Transcription 3 (STAT3) Decoy Oligonucleotide Inhibits Tumor Growth without Inducing Toxicological Effects

    PubMed Central

    Sen, Malabika; Paul, Kathleen; Freilino, Maria L; Li, Hua; Li, Changyou; Johnson, Daniel E; Wang, Lin; Eiseman, Julie; Grandis, Jennifer R

    2014-01-01

    Hyperactivation of signal transducer and activator of transcription 3 (STAT3) has been linked to tumorigenesis in most malignancies, including head and neck squamous cell carcinoma. Intravenous delivery of a chemically modified cyclic STAT3 decoy oligonucleotide with improved serum and thermal stability demonstrated antitumor efficacy in conjunction with downmodulation of STAT3 target gene expression such as cyclin D1 and Bcl-XL in a mouse model of head and neck squamous cell carcinoma. The purpose of the present study was to determine the toxicity and dose-dependent antitumor efficacy of the cyclic STAT3 decoy after multiple intravenous doses in Foxn1 nu mice in anticipation of clinical translation. The two doses (5 and 10 mg/kg) of cyclic STAT3 decoy demonstrated a significant decrease in tumor volume compared with the control groups (mutant cyclic STAT3 decoy or saline) in conjunction with downmodulation of STAT3 target gene expression. There was no dose-dependent effect of cyclic STAT3 decoy on tumor volume or STAT3 target gene expression. There were no significant changes in body weights between the groups during the dosing period, after the dosing interval or on the day of euthanasia. No hematology or clinical chemistry parameters suggested toxicity of the cyclic STAT3 decoy compared with saline control. No gross or histological pathological abnormalities were noted at necropsy in any of the animals. These findings suggest a lack of toxicity of intravenous administration of a cyclic STAT3 decoy oligonucleotide. In addition, comparable antitumor effects indicate a lack of dose response at the two dose levels investigated. PMID:24395569

  7. Inhibiting host-pathogen interactions using membrane-based nanostructures.

    PubMed

    Bricarello, Daniel A; Patel, Mira A; Parikh, Atul N

    2012-06-01

    Virulent strains of bacteria and viruses recognize host cells by their plasma membrane receptors and often exploit the native translocation machinery to invade the cell. A promising therapeutic concept for early interruption of pathogen infection is to subvert this pathogenic trickery using exogenously introduced decoys that present high-affinity mimics of cellular receptors. This review highlights emerging applications of molecularly engineered lipid-bilayer-based nanostructures, namely (i) functionalized liposomes, (ii) supported colloidal bilayers or protocells and (iii) reconstituted lipoproteins, which display functional cellular receptors in optimized conformational and aggregative states. These decoys outcompete host cell receptors by preferentially binding to and neutralizing virulence factors of both bacteria and viruses, thereby promising a new approach to antipathogenic therapy. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. Targeted Blockage of Signal Transducer and Activator of Transcription 5 Signaling Pathway with Decoy Oligodeoxynucleotides Suppresses Leukemic K562 Cell Growth

    PubMed Central

    Wang, Xiaozhong; Zeng, Jianming; Shi, Mei; Zhao, Shiqiao; Bai, Weijun; Cao, Weixi; Tu, Zhiguang; Huang, Zonggan

    2011-01-01

    The protein signal transducer and activator of transcription 5 (STAT5) of the JAK/STAT pathway is constitutively activated because of its phosphorylation by tyrosine kinase activity of fusion protein BCR-ABL in chronic myelogenous leukemia (CML) cells. This study investigated the potential therapeutic effect of STAT5 decoy oligodeoxynucleotides (ODN) using leukemia K562 cells as a model. Our results showed that transfection of 21-mer-long STAT5 decoy ODN into K562 cells effectively inhibited cell proliferation and induced cell apoptosis. Further, STAT5 decoy ODN downregulated STAT5 targets bcl-xL, cyclinD1, and c-myc at both mRNA and protein levels in a sequence-specific manner. Collectively, these data demonstrate the therapeutic effect of blocking the STAT5 signal pathway by cis-element decoy for cancer characterized by constitutive STAT5 activation. Thus, our study provides support for STAT5 as a potential target downstream of BCR-ABL for CML treatment and helps establish the concept of targeting STAT5 by decoy ODN as a novel therapy approach for imatinib-resistant CML. PMID:21091189

  9. Conformational Sampling of a Biomolecular Rugged Energy Landscape.

    PubMed

    Rydzewski, Jakub; Jakubowski, Rafal; Nicosia, Giuseppe; Nowak, Wieslaw

    2018-01-01

    The protein structure refinement using conformational sampling is important in hitherto protein studies. In this paper, we examined the protein structure refinement by means of potential energy minimization using immune computing as a method of sampling conformations. The method was tested on the x-ray structure and 30 decoys of the mutant of [Leu]Enkephalin, a paradigmatic example of the biomolecular multiple-minima problem. In order to score the refined conformations, we used a standard potential energy function with the OPLSAA force field. The effectiveness of the search was assessed using a variety of methods. The robustness of sampling was checked by the energy yield function which measures quantitatively the number of the peptide decoys residing in an energetic funnel. Furthermore, the potential energy-dependent Pareto fronts were calculated to elucidate dissimilarities between peptide conformations and the native state as observed by x-ray crystallography. Our results showed that the probed potential energy landscape of [Leu]Enkephalin is self-similar on different metric scales and that the local potential energy minima of the peptide decoys are metastable, thus they can be refined to conformations whose potential energy is decreased by approximately 250 kJ/mol.

  10. Integration of decoy domains derived from protein targets of pathogen effectors into plant immune receptors is widespread.

    PubMed

    Kroj, Thomas; Chanclud, Emilie; Michel-Romiti, Corinne; Grand, Xavier; Morel, Jean-Benoit

    2016-04-01

    Plant immune receptors of the class of nucleotide-binding and leucine-rich repeat domain (NLR) proteins can contain additional domains besides canonical NB-ARC (nucleotide-binding adaptor shared by APAF-1, R proteins, and CED-4 (NB-ARC)) and leucine-rich repeat (LRR) domains. Recent research suggests that these additional domains act as integrated decoys recognizing effectors from pathogens. Proteins homologous to integrated decoys are suspected to be effector targets and involved in disease or resistance. Here, we scrutinized 31 entire plant genomes to identify putative integrated decoy domains in NLR proteins using the Interpro search. The involvement of the Zinc Finger-BED type (ZBED) protein containing a putative decoy domain, called BED, in rice (Oryza sativa) resistance was investigated by evaluating susceptibility to the blast fungus Magnaporthe oryzae in rice over-expression and knock-out mutants. This analysis showed that all plants tested had integrated various atypical protein domains into their NLR proteins (on average 3.5% of all NLR proteins). We also demonstrated that modifying the expression of the ZBED gene modified disease susceptibility. This study suggests that integration of decoy domains in NLR immune receptors is widespread and frequent in plants. The integrated decoy model is therefore a powerful concept to identify new proteins involved in disease resistance. Further in-depth examination of additional domains in NLR proteins promises to unravel many new proteins of the plant immune system. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  11. NF-κB Decoy Oligodeoxynucleotide Enhanced Osteogenesis in Mesenchymal Stem Cells Exposed to Polyethylene Particle

    PubMed Central

    Lin, Tzu-Hua; Sato, Taishi; Barcay, Katherine R.; Waters, Heather; Loi, Florence; Zhang, Ruth; Pajarinen, Jukka; Egashira, Kensuke; Yao, Zhenyu

    2015-01-01

    Excessive generation of wear particles after total joint replacement may lead to local inflammation and periprosthetic osteolysis. Modulation of the key transcription factor NF-κB in immune cells could potentially mitigate the osteolytic process. We previously showed that local delivery of ultrahigh-molecular-weight polyethylene (UHMWPE) particles recruited osteoprogenitor cells and reduced osteolysis. However, the biological effects of modulating the NF-κB signaling pathway on osteoprogenitor/mesenchymal stem cells (MSCs) remain unclear. Here we showed that decoy oligodeoxynucleotide (ODN) increased cell viability when primary murine MSCs were exposed to UHMWPE particles, but had no effects on cellular apoptosis. Decoy ODN increased transforming growth factor-beta 1 (TGF-β1) and osteoprotegerin (OPG) in MSCs exposed to UHMWPE particles. Mechanistic studies showed that decoy ODN upregulated OPG expression through a TGF-β1-dependent pathway. By measuring the alkaline phosphatase activity, osteocalcin levels, Runx2 and osteopontin expression, and performing a bone mineralization assay, we found that decoy ODN increased MSC osteogenic ability when the cells were exposed to UHMWPE particles. Furthermore, the cellular response to decoy ODN and UHMWPE particles with regard to cell phenotype, cell viability, and osteogenic ability was confirmed using primary human MSCs. Our results suggest that modulation of wear particle-induced inflammation by NF-κB decoy ODN had no adverse effects on MSCs and may potentially further mitigate periprosthetic osteolysis by protecting MSC viability and osteogenic ability. PMID:25518013

  12. Orthopaedic wear particle-induced bone loss and exogenous macrophage infiltration is mitigated by local infusion of NF-κB decoy oligodeoxynucleotide.

    PubMed

    Lin, Tzuhua; Pajarinen, Jukka; Nabeshima, Akira; Córdova, Luis A; Loi, Florence; Gibon, Emmanuel; Lu, Laura; Nathan, Karthik; Jämsen, Eemeli; Yao, Zhenyu; Goodman, Stuart B

    2017-11-01

    Excessive production of wear particles from total joint replacements induces chronic inflammation, macrophage infiltration, and consequent bone loss (periprosthetic osteolysis). This inflammation and bone remodeling are critically regulated by the transcription factor NF-κB. We previously demonstrated that inhibition of NF-κB signaling by using the decoy oligodeoxynucleotide (ODN) mitigates polyethylene wear particle-induced bone loss using in vitro and in vivo models. However, the mechanisms of NF-κB decoy ODN action, and in particular its impact on systemic macrophage recruitment, remain unknown. In the current study, this systemic macrophage infiltration was examined in our established murine femoral continuous particle infusion model. RAW264.7 murine macrophages expressing a luciferase reporter gene were injected into the systemic circulation. Quantification of bioluminescence showed that NF-κB decoy ODN reduced the homing of these reporter macrophages into the distal femurs exposed to continuous particle delivery. Particle-induced reduction in bone mineral density at the distal diaphysis of the femur was also mitigated by infusion of decoy ODN. Histological staining showed that the decoy ODN infusion decreased osteoclast and macrophage numbers, but had no significant effects on osteoblasts. Local infusion of NF-κB decoy ODN reduced systemic macrophage infiltration and mitigated particle-induced bone loss, thus providing a potential strategy to treat periprosthetic osteolysis. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part A: 105A: 3169-3175, 2017. © 2017 Wiley Periodicals, Inc.

  13. Selective targeting of a TNFR decoy receptor pharmaceutical to the primate brain as a receptor-specific IgG fusion protein.

    PubMed

    Boado, Ruben J; Hui, Eric Ka-Wai; Lu, Jeff Zhiqiang; Zhou, Qing-Hui; Pardridge, William M

    2010-03-01

    Decoy receptors, such as the human tumor necrosis factor receptor (TNFR), are potential new therapies for brain disorders. However, decoy receptors are large molecule drugs that are not transported across the blood-brain barrier (BBB). To enable BBB transport of a TNFR decoy receptor, the human TNFR-II extracellular domain was re-engineered as a fusion protein with a chimeric monoclonal antibody (MAb) against the human insulin receptor (HIR). The HIRMAb acts as a molecular Trojan horse to ferry the TNFR therapeutic decoy receptor across the BBB. The HIRMAb-TNFR fusion protein was expressed in stably transfected CHO cells, and was analyzed with electrophoresis, Western blotting, size exclusion chromatography, and binding assays for the HIR and TNFalpha. The HIRMAb-TNFR fusion protein was radio-labeled by trititation, in parallel with the radio-iodination of recombinant TNFR:Fc fusion protein, and the proteins were co-injected in the adult Rhesus monkey. The TNFR:Fc fusion protein did not cross the primate BBB in vivo, but the uptake of the HIRMAb-TNFR fusion protein was high and 3% of the injected dose was taken up by the primate brain. The TNFR was selectively targeted to brain, relative to peripheral organs, following fusion to the HIRMAb. This study demonstrates that decoy receptors may be re-engineered as IgG fusion proteins with a BBB molecular Trojan horse that selectively targets the brain, and enables penetration of the BBB in vivo. IgG-decoy receptor fusion proteins represent a new class of human neurotherapeutics. Copyright 2010 Elsevier B.V. All rights reserved.

  14. Sialylneolacto-N-tetraose c (LSTc)-bearing Liposomal Decoys Capture Influenza A Virus*

    PubMed Central

    Hendricks, Gabriel L.; Weirich, Kim L.; Viswanathan, Karthik; Li, Jing; Shriver, Zachary H.; Ashour, Joseph; Ploegh, Hidde L.; Kurt-Jones, Evelyn A.; Fygenson, Deborah K.; Finberg, Robert W.; Comolli, James C.; Wang, Jennifer P.

    2013-01-01

    Influenza is a severe disease in humans and animals with few effective therapies available. All strains of influenza virus are prone to developing drug resistance due to the high mutation rate in the viral genome. A therapeutic agent that targets a highly conserved region of the virus could bypass resistance and also be effective against multiple strains of influenza. Influenza uses many individually weak ligand binding interactions for a high avidity multivalent attachment to sialic acid-bearing cells. Polymerized sialic acid analogs can form multivalent interactions with influenza but are not ideal therapeutics due to solubility and toxicity issues. We used liposomes as a novel means for delivery of the glycan sialylneolacto-N-tetraose c (LSTc). LSTc-bearing decoy liposomes form multivalent, polymer-like interactions with influenza virus. Decoy liposomes competitively bind influenza virus in hemagglutination inhibition assays and inhibit infection of target cells in a dose-dependent manner. Inhibition is specific for influenza virus, as inhibition of Sendai virus and respiratory syncytial virus is not observed. In contrast, monovalent LSTc does not bind influenza virus or inhibit infectivity. LSTc decoy liposomes prevent the spread of influenza virus during multiple rounds of replication in vitro and extend survival of mice challenged with a lethal dose of virus. LSTc decoy liposomes co-localize with fluorescently tagged influenza virus, whereas control liposomes do not. Considering the conservation of the hemagglutinin binding pocket and the ability of decoy liposomes to form high avidity interactions with influenza hemagglutinin, our decoy liposomes have potential as a new therapeutic agent against emerging influenza strains. PMID:23362274

  15. Oxidized ultrashort nanotubes as carbon scaffolds for the construction of cell-penetrating NF-kappaB decoy molecules.

    PubMed

    Crinelli, Rita; Carloni, Elisa; Menotta, Michele; Giacomini, Elisa; Bianchi, Marzia; Ambrosi, Gianluca; Giorgi, Luca; Magnani, Mauro

    2010-05-25

    Oligonucleotide (ODN) decoys are synthetic ODNs containing the DNA binding sequence of a transcription factor. When delivered to cells, these molecules can compete with endogenous sequences for binding the transcription factor, thus inhibiting its ability to activate the expression of target genes. Modulation of gene expression by decoy ODNs against nuclear factor-kappaB (NF-kappaB), a transcription factor regulating many genes involved in immunity, has been achieved in a variety of immune/inflammatory disorders. However, the successful use of transcription factor decoys depends on an efficient means to bring the synthetic DNA to target cells. It is known that single-walled carbon nanotubes (SWCNTs), under certain conditions, are able to cross the cell membrane. Thus, we have evaluated the possibility to functionalize SWCNTs with decoy ODNs against NF-kappaB in order to improve their intracellular delivery. To couple ODNs to CNTs, we have exploited the carbodiimide chemistry which allows covalent binding of amino-modified ODNs to carboxyl groups introduced onto SWCNTs through oxidation. The effective binding of ODNs to nanotubes has been demonstrated by a combination of microscopic, spectroscopic, and electrophoretic techniques. The uptake and subcellular distribution of ODN decoys bound to SWCNTs was analyzed by fluorescence microscopy. ODNs were internalized into macrophages and accumulated in the cytosol. Moreover, no cytotoxicity associated with SWCNT administration was observed. Finally, NF-kappaB-dependent gene expression was significantly reduced in cells receiving nanomolar concentrations of SWCNT-NF-kappaB decoys compared to cells receiving SWCNTs or SWCNTs functionalized with a nonspecific ODN sequence, demonstrating both efficacy and specificity of the approach.

  16. Evolutionary Analysis of Functional Divergence among Chemokine Receptors, Decoy Receptors, and Viral Receptors

    PubMed Central

    Daiyasu, Hiromi; Nemoto, Wataru; Toh, Hiroyuki

    2012-01-01

    Chemokine receptors (CKRs) function in the inflammatory response and in vertebrate homeostasis. Decoy and viral receptors are two types of CKR homologs with modified functions from those of the typical CKRs. The decoy receptors are able to bind ligands without signaling. On the other hand, the viral receptors show constitutive signaling without ligands. We examined the sites related to the functional difference. At first, the decoy and viral receptors were each classified into five groups, based on the molecular phylogenetic analysis. A multiple amino acid sequence alignment between each group and the CKRs was then constructed. The difference in the amino acid composition between the group and the CKRs was evaluated as the Kullback–Leibler (KL) information value at each alignment site. The KL information value is considered to reflect the difference in the functional constraints at the site. The sites with the top 5% of KL information values were selected and mapped on the structure of a CKR. The comparisons with decoy receptor groups revealed that the detected sites were biased on the intracellular side. In contrast, the sites detected from the comparisons with viral receptor groups were found on both the extracellular and intracellular sides. More sites were found in the ligand binding pocket in the analyses of the viral receptor groups, as compared to the decoy receptor groups. Some of the detected sites were located in the GPCR motifs. For example, the DRY motif of the decoy receptors was often degraded, although the motif of the viral receptors was basically conserved. The observations for the viral receptor groups suggested that the constraints in the pocket region are loose and that the sites on the intracellular side are different from those for the decoy receptors, which may be related to the constitutive signaling activity of the viral receptors. PMID:22855685

  17. Decoy receptor 3: a pleiotropic immunomodulator and biomarker for inflammatory diseases, autoimmune diseases and cancer.

    PubMed

    Lin, Wan-Wan; Hsieh, Shie-Liang

    2011-04-01

    Recently, several decoy molecules belonging to tumor necrosis factor receptor superfamily (TNFRSF) have been identified, including decoy receptor 1 (DcR1), decoy receptor 2 (DcR2), and decoy receptor 3 (DcR3). One of the tumor necrosis factor superfamily (TNFSF) members, TNF-related apoptosis-inducing ligand (TRAIL), binds to DcR1 and DcR2, which are membranous receptors with a truncated cytoplasmic domain, thus unable to transduce TRAIL-mediated signaling. In contrast to DcR1 and DcR2, DcR3 is a soluble receptor capable of neutralizing the biological effects of three other TNFSF members: Fas ligand (FasL/TNFSF6/CD95L), LIGHT (TNFSF14) and TNF-like molecule 1A (TL1A/TNFSF15). Since FasL is a potent apoptosis- and inflammation-inducing factor, LIGHT is involved in apoptosis and inflammation, and TL1A is a T cell costimulator and is involved in gut inflammation, DcR3 can be defined as an immunomodulator on the basis of its neutralizing effects on FasL, LIGHT, and TL1A. Initial studies demonstrated that DcR3 expression is elevated in tumors cells; however, later work showed that DcR3 expression is also upregulated in inflammatory diseases, where serum DcR3 levels correlate with disease progression. In addition to its neutralizing effect, DcR3 also acts as an effector molecule to modulate cell function via 'non-decoy' activities. This review focuses on the immunomodulatory effects of DcR3 via 'decoy' and 'non-decoy' functions, and discusses the potential of DcR3 as a biomarker to predict cancer invasion and inflammation progression. We also discuss the possible utility of recombinant DcR3 as a therapeutic agent to control autoimmune diseases, as well as the potential to attenuate tumor progression by inhibiting DcR3 expression. Copyright © 2011 Elsevier Inc. All rights reserved.

  18. 'Decoy peptide' region (RIFLKRMPSI) of prorenin prosegment plays a crucial role in prorenin binding to the (pro)renin receptor.

    PubMed

    Nabi, A H M Nurun; Biswas, Kazal Boron; Nakagawa, Tsutomu; Ichihara, Atsuhiro; Inagami, Tadashi; Suzuki, Fumiaki

    2009-07-01

    This study investigated a role of decoy peptide region (R10PIFLKRMPSI19P) in prorenin prosegment for prorenin binding to the (pro)renin receptor using the surface plasmon resonance technique. Three kinds of anti-receptor antibodies labeled as anti-107/121, anti-221/235 and anti-His tag antibody were prepared. The respective antigens D107SVANSIHSLFSEET121 (close to the N-terminal side of receptor), E221IGKRYGEDSEQFRD235 (N-terminal side of the transmembrane part of receptor) and 10xHis sequence (C-terminus) were designed based on the sequence of the receptor. These antibodies were immobilized on the CM5 sensor chip by amine coupling and allowed to bind to the receptor. Human prorenin, renin and the decoy bound to the receptor associated with antibodies. Their association (ka) and dissociation (kd) rate constants were measured and the dissociation constants (KD) were determined using Langmuir 1:1 kinetic binding model. The KD for interaction of prorenin and receptor associated to anti-107/121, anti-221/235 and anti-His tag antibodies were 2.9, 1.2 and 7.8 nM, respectively and for renin they were 9.3, 4.4 and 7.1 nM. The decoy bound to the respective immobilized receptor-antibody complexes at KD's of 6.2, 3.5 and 15.2 nM. Prorenin, renin and decoy had lower KD at the nanomolar ranges compared to those of L1PPTD4P in the prorenin prosegment and A248KKRLFDYVV257 in the C-domain of mature renin. The decoy reduced the binding of not only prorenin but also renin to (P)RR. These data are direct evidence that prorenin, renin and the peptides bind to (P)RR and the decoy reduces prorenin binding, supporting our hypothesis that decoy peptide region has a crucial role in prorenin binding.

  19. Evolutionary Analysis of Functional Divergence among Chemokine Receptors, Decoy Receptors, and Viral Receptors.

    PubMed

    Daiyasu, Hiromi; Nemoto, Wataru; Toh, Hiroyuki

    2012-01-01

    Chemokine receptors (CKRs) function in the inflammatory response and in vertebrate homeostasis. Decoy and viral receptors are two types of CKR homologs with modified functions from those of the typical CKRs. The decoy receptors are able to bind ligands without signaling. On the other hand, the viral receptors show constitutive signaling without ligands. We examined the sites related to the functional difference. At first, the decoy and viral receptors were each classified into five groups, based on the molecular phylogenetic analysis. A multiple amino acid sequence alignment between each group and the CKRs was then constructed. The difference in the amino acid composition between the group and the CKRs was evaluated as the Kullback-Leibler (KL) information value at each alignment site. The KL information value is considered to reflect the difference in the functional constraints at the site. The sites with the top 5% of KL information values were selected and mapped on the structure of a CKR. The comparisons with decoy receptor groups revealed that the detected sites were biased on the intracellular side. In contrast, the sites detected from the comparisons with viral receptor groups were found on both the extracellular and intracellular sides. More sites were found in the ligand binding pocket in the analyses of the viral receptor groups, as compared to the decoy receptor groups. Some of the detected sites were located in the GPCR motifs. For example, the DRY motif of the decoy receptors was often degraded, although the motif of the viral receptors was basically conserved. The observations for the viral receptor groups suggested that the constraints in the pocket region are loose and that the sites on the intracellular side are different from those for the decoy receptors, which may be related to the constitutive signaling activity of the viral receptors.

  20. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

    NASA Astrophysics Data System (ADS)

    Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa

    2018-03-01

    Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.

  1. Effects of intratracheal administration of nuclear factor-kappaB decoy oligodeoxynucleotides on long-term cigarette smoke-induced lung inflammation and pathology in mice

    PubMed Central

    2009-01-01

    To determine if nuclear factor-κB (NF-κB) activation may be a key factor in lung inflammation and respiratory dysfunction, we investigated whether NF-κB can be blocked by intratracheal administration of NF-κB decoy oligodeoxynucleotides (ODNs), and whether decoy ODN-mediated NF-κB inhibition can prevent smoke-induced lung inflammation, respiratory dysfunction, and improve pathological alteration in the small airways and lung parenchyma in the long-term smoke-induced mouse model system. We also detected changes in transcriptional factors. In vivo, the transfection efficiency of NF-κB decoy ODNs to alveolar macrophages in BALF was measured by fluorescein isothiocyanate (FITC)-labeled NF-κB decoy ODNs and flow cytometry post intratracheal ODN administration. Pulmonary function was measured by pressure sensors, and pathological changes were assessed using histology and the pathological Mias software. NF-κB and activator protein 1(AP-1) activity was detected by the electrophoretic motility shift assay (EMSA). Mouse cytokine and chemokine pulmonary expression profiles were investigated by enzyme-linked immunosorbent assay (ELISA) in bronchoalveolar lavage fluid (BALF) and lung tissue homogenates, respectively, after repeated exposure to cigarette smoke. After 24 h, the percentage of transfected alveolar macrophages was 30.00 ± 3.30%. Analysis of respiratory function indicated that transfection of NF-κB decoy ODNs significantly impacted peak expiratory flow (PEF), and bronchoalveolar lavage cytology displayed evidence of decreased macrophage infiltration in airways compared to normal saline-treated or scramble NF-κB decoy ODNs smoke exposed mice. NF-κB decoy ODNs inhibited significantly level of macrophage inflammatory protein (MIP) 1α and monocyte chemoattractant protein 1(MCP-1) in lung homogenates compared to normal saline-treated smoke exposed mice. In contrast, these NF-κB decoy ODNs-treated mice showed significant increase in the level of tumor necrosis factor-α(TNF-α) and pro-MMP-9(pro-matrix metalloproteinase-9) in mice BALF. Further measurement revealed administration of NF-κB decoy ODNs did not prevent pathological changes. These findings indicate that NF-κB activation play an important role on the recruitment of macrophages and pulmonary dysfunction in smoke-induced chronic lung inflammation, and with the exception of NF-κB pathway, there might be complex mechanism governing molecular dynamics of pro-inflammatory cytokines expression and structural changes in small airways and pulmonary parenchyma in vivo. PMID:19706153

  2. Design and Implementation of Decoy Enhanced Dynamic Virtualization Networks

    DTIC Science & Technology

    2016-12-12

    From - To) 12/12/2016 Final 07/01/2015-08/31/2016 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Design and Implementation of Decoy Enhanced Dynamic...TELEPHONE NUMBER (Include area code) 703-993-1715 Standard Form 298 (Rev . 8/98) Prescribed by ANSI Std . Z39.18 " Design and Implementation of...8 2 Design and Implementation ofDecoy Enhanced Dynamic Virtualization Networks 1 Major Goals The relatively static configurations of networks and

  3. Monitoring of West Nile virus, Usutu virus and Meaban virus in waterfowl used as decoys and wild raptors in southern Spain.

    PubMed

    Jurado-Tarifa, E; Napp, S; Lecollinet, S; Arenas, A; Beck, C; Cerdà-Cuéllar, M; Fernández-Morente, M; García-Bocanegra, I

    2016-12-01

    In the last decade, the number of emerging flaviviruses described worldwide has increased considerably, with wild birds acting as the main reservoir hosts of these viruses. We carried out an epidemiological survey to determine the seroprevalence of antigenically related flaviviruses, particularly West Nile virus (WNV), Usutu virus (USUV) and Meaban virus (MBV), in waterfowl used as decoys and wild raptors in Andalusia (southern Spain), the region considered to have the highest risk of flaviviruses circulation in Spain. The overall flaviviruses seroprevalence according to bELISA was 13.0% in both in decoys (n=1052) and wild raptors (n=123). Specific antibodies against WNV, USUV and MBV were confirmed by micro virus neutralization tests in 12, 38 and 4 of the seropositive decoys, respectively. This is the first study on WNV and USUV infections in decoys and the first report of MBV infections in waterfowl and raptors. Moreover we report the first description of WNV infections in short-toed snake eagle (Circaetus gallicus) and Montagu's harrier (Circus pygargus). The seropositivity obtained indicates widespread but not homogeneous distribution of WNV and USUV in Andalusia. The results also confirm endemic circulation of WNV, USUV and MBV in both decoys and wild raptors in southern Spain. Our results highlight the need to implement surveillance and control programs not only for WNV but also for other related flaviviruses. Further research is needed to determine the eco-epidemiological role that waterfowl and wild raptors play in the transmission of emerging flaviviruses, especially in decoys, given their close interactions with humans. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Intrathecal administration of AYX2 DNA decoy produces a long-term pain treatment in rat models of chronic pain by inhibiting the KLF6, KLF9, and KLF15 transcription factors

    PubMed Central

    Klukinov, Michael; Harris, Scott; Manning, Donald C; Xie, Simon; Pascual, Conrado; Taylor, Bradley K; Donahue, Renee R; Yeomans, David C

    2017-01-01

    Background Nociception is maintained by genome-wide regulation of transcription in the dorsal root ganglia—spinal cord network. Hence, transcription factors constitute a promising class of targets for breakthrough pharmacological interventions to treat chronic pain. DNA decoys are oligonucleotides and specific inhibitors of transcription factor activities. A methodological series of in vivo–in vitro screening cycles was performed with decoy/transcription factor couples to identify targets capable of producing a robust and long-lasting inhibition of established chronic pain. Decoys were injected intrathecally and their efficacy was tested in the spared nerve injury and chronic constriction injury models of chronic pain in rats using repetitive von Frey testing. Results Results demonstrated that a one-time administration of decoys binding to the Kruppel-like transcription factors (KLFs) 6, 9, and 15 produces a significant and weeks–month long reduction in mechanical hypersensitivity compared to controls. In the spared nerve injury model, decoy efficacy was correlated to its capacity to bind KLF15 and KLF9 at a specific ratio, while in the chronic constriction injury model, efficacy was correlated to the combined binding capacity to KLF6 and KLF9. AYX2, an 18-bp DNA decoy binding KLF6, KLF9, and KLF15, was optimized for clinical development, and it demonstrated significant efficacy in these models. Conclusions These data highlight KLF6, KLF9, and KLF15 as transcription factors required for the maintenance of chronic pain and illustrate the potential therapeutic benefits of AYX2 for the treatment of chronic pain. PMID:28814144

  5. Decoy trapping and rocket-netting for northern pintails in spring

    USGS Publications Warehouse

    Grand, James B.; Fondell, Thomas F.

    1994-01-01

    Decoy traps and rocket-nets were compared for capturing Northern Pintails (Anas acuta: hereafter pintails) during May 1991 on the Yukon Flats, Alaska. Males were captured at similar rates using both methods (1.38 vs. 1.07 males/trap d, respectively), but baited rocket-nets were more efficient than decoy traps for capturing females (0.52 vs. 0.12 females/trap d). There were no significant differences in masses of pintails captured by each method.

  6. Potential role of DNA methylation as a facilitator of target search processes for transcription factors through interplay with methyl-CpG-binding proteins

    PubMed Central

    Kemme, Catherine A.; Marquez, Rolando; Luu, Ross H.

    2017-01-01

    Abstract Eukaryotic genomes contain numerous non-functional high-affinity sequences for transcription factors. These sequences potentially serve as natural decoys that sequester transcription factors. We have previously shown that the presence of sequences similar to the target sequence could substantially impede association of the transcription factor Egr-1 with its targets. In this study, using a stopped-flow fluorescence method, we examined the kinetic impact of DNA methylation of decoys on the search process of the Egr-1 zinc-finger protein. We analyzed its association with an unmethylated target site on fluorescence-labeled DNA in the presence of competitor DNA duplexes, including Egr-1 decoys. DNA methylation of decoys alone did not affect target search kinetics. In the presence of the MeCP2 methyl-CpG-binding domain (MBD), however, DNA methylation of decoys substantially (∼10-30-fold) accelerated the target search process of the Egr-1 zinc-finger protein. This acceleration did not occur when the target was also methylated. These results suggest that when decoys are methylated, MBD proteins can block them and thereby allow Egr-1 to avoid sequestration in non-functional locations. This effect may occur in vivo for DNA methylation outside CpG islands (CGIs) and could facilitate localization of some transcription factors within regulatory CGIs, where DNA methylation is rare. PMID:28486614

  7. Structure and decoy-mediated inhibition of the SOX18/Prox1-DNA interaction

    PubMed Central

    Klaus, Miriam; Prokoph, Nina; Girbig, Mathias; Wang, Xuecong; Huang, Yong-Heng; Srivastava, Yogesh; Hou, Linlin; Narasimhan, Kamesh; Kolatkar, Prasanna R.; Francois, Mathias; Jauch, Ralf

    2016-01-01

    The transcription factor (TF) SOX18 drives lymphatic vessel development in both embryogenesis and tumour-induced neo-lymphangiogenesis. Genetic disruption of Sox18 in a mouse model protects from tumour metastasis and established the SOX18 protein as a molecular target. Here, we report the crystal structure of the SOX18 DNA binding high-mobility group (HMG) box bound to a DNA element regulating Prox1 transcription. The crystals diffracted to 1.75Å presenting the highest resolution structure of a SOX/DNA complex presently available revealing water structure, structural adjustments at the DNA contact interface and non-canonical conformations of the DNA backbone. To explore alternatives to challenging small molecule approaches for targeting the DNA-binding activity of SOX18, we designed a set of five decoys based on modified Prox1-DNA. Four decoys potently inhibited DNA binding of SOX18 in vitro and did not interact with non-SOX TFs. Serum stability, nuclease resistance and thermal denaturation assays demonstrated that a decoy circularized with a hexaethylene glycol linker and terminal phosphorothioate modifications is most stable. This SOX decoy also interfered with the expression of a luciferase reporter under control of a SOX18-dependent VCAM1 promoter in COS7 cells. Collectively, we propose SOX decoys as potential strategy for inhibiting SOX18 activity to disrupt tumour-induced neo-lymphangiogenesis. PMID:26939885

  8. Optimal visual simulation of the self-tracking combustion of the infrared decoy based on the particle system

    NASA Astrophysics Data System (ADS)

    Hu, Qi; Duan, Jin; Wang, LiNing; Zhai, Di

    2016-09-01

    The high-efficiency simulation test of military weapons has a very important effect on the high cost of the actual combat test and the very demanding operational efficiency. Especially among the simulative emulation methods of the explosive smoke, the simulation method based on the particle system has generated much attention. In order to further improve the traditional simulative emulation degree of the movement process of the infrared decoy during the real combustion cycle, this paper, adopting the virtual simulation platform of OpenGL and Vega Prime and according to their own radiation characteristics and the aerodynamic characteristics of the infrared decoy, has simulated the dynamic fuzzy characteristics of the infrared decoy during the real combustion cycle by using particle system based on the double depth peeling algorithm and has solved key issues such as the interface, coordinate conversion and the retention and recovery of the Vega Prime's status. The simulation experiment has basically reached the expected improvement purpose, effectively improved the simulation fidelity and provided theoretical support for improving the performance of the infrared decoy.

  9. Progressive calibration and averaging for tandem mass spectrometry statistical confidence estimation: Why settle for a single decoy?

    PubMed Central

    Keich, Uri; Noble, William Stafford

    2017-01-01

    Estimating the false discovery rate (FDR) among a list of tandem mass spectrum identifications is mostly done through target-decoy competition (TDC). Here we offer two new methods that can use an arbitrarily small number of additional randomly drawn decoy databases to improve TDC. Specifically, “Partial Calibration” utilizes a new meta-scoring scheme that allows us to gradually benefit from the increase in the number of identifications calibration yields and “Averaged TDC” (a-TDC) reduces the liberal bias of TDC for small FDR values and its variability throughout. Combining a-TDC with “Progressive Calibration” (PC), which attempts to find the “right” number of decoys required for calibration we see substantial impact in real datasets: when analyzing the Plasmodium falciparum data it typically yields almost the entire 17% increase in discoveries that “full calibration” yields (at FDR level 0.05) using 60 times fewer decoys. Our methods are further validated using a novel realistic simulation scheme and importantly, they apply more generally to the problem of controlling the FDR among discoveries from searching an incomplete database. PMID:29326989

  10. Deception Algorithm. Appendices

    DTIC Science & Technology

    1994-06-30

    NOT. THE RAIN AND MUD MADE QUITE SLIPPERY. COULDHAVE BEEN QUITE A FEW INJURIES WHEN LUGGING THE DECOY AROUND. 1111 37106 HF7A HFCMT IN MOPP4 IT WAS... 10 TIMES. 1009 35115 HF5A FFCMT THE TARGET BACKGROUND HELPED GIVE AWAY THE DECOYS BECAUSE THEY WERE PUT UP ON THE SIDE OF A HILL. COLOR WAS DARKER...FFENGCMT I ENGAGED TARGETS THAT I THOUGHT WERE DECOYS APPROXIMATELY 10 TIMES BECAUSE OF RANGE TO TARGET. I COULD NOT ID MOST OF THE TIME AT NIGHT AT LONG

  11. Two New Tools for Glycopeptide Analysis Researchers: A Glycopeptide Decoy Generator and a Large Data Set of Assigned CID Spectra of Glycopeptides.

    PubMed

    Lakbub, Jude C; Su, Xiaomeng; Zhu, Zhikai; Patabandige, Milani W; Hua, David; Go, Eden P; Desaire, Heather

    2017-08-04

    The glycopeptide analysis field is tightly constrained by a lack of effective tools that translate mass spectrometry data into meaningful chemical information, and perhaps the most challenging aspect of building effective glycopeptide analysis software is designing an accurate scoring algorithm for MS/MS data. We provide the glycoproteomics community with two tools to address this challenge. The first tool, a curated set of 100 expert-assigned CID spectra of glycopeptides, contains a diverse set of spectra from a variety of glycan types; the second tool, Glycopeptide Decoy Generator, is a new software application that generates glycopeptide decoys de novo. We developed these tools so that emerging methods of assigning glycopeptides' CID spectra could be rigorously tested. Software developers or those interested in developing skills in expert (manual) analysis can use these tools to facilitate their work. We demonstrate the tools' utility in assessing the quality of one particular glycopeptide software package, GlycoPep Grader, which assigns glycopeptides to CID spectra. We first acquired the set of 100 expert assigned CID spectra; then, we used the Decoy Generator (described herein) to generate 20 decoys per target glycopeptide. The assigned spectra and decoys were used to test the accuracy of GlycoPep Grader's scoring algorithm; new strengths and weaknesses were identified in the algorithm using this approach. Both newly developed tools are freely available. The software can be downloaded at http://glycopro.chem.ku.edu/GPJ.jar.

  12. Structure-Based Rational Design of a Toll-like Receptor 4 (TLR4) Decoy Receptor with High Binding Affinity for a Target Protein

    PubMed Central

    Lee, Sang-Chul; Hong, Seungpyo; Park, Keunwan; Jeon, Young Ho; Kim, Dongsup; Cheong, Hae-Kap; Kim, Hak-Sung

    2012-01-01

    Repeat proteins are increasingly attracting much attention as alternative scaffolds to immunoglobulin antibodies due to their unique structural features. Nonetheless, engineering interaction interface and understanding molecular basis for affinity maturation of repeat proteins still remain a challenge. Here, we present a structure-based rational design of a repeat protein with high binding affinity for a target protein. As a model repeat protein, a Toll-like receptor4 (TLR4) decoy receptor composed of leucine-rich repeat (LRR) modules was used, and its interaction interface was rationally engineered to increase the binding affinity for myeloid differentiation protein 2 (MD2). Based on the complex crystal structure of the decoy receptor with MD2, we first designed single amino acid substitutions in the decoy receptor, and obtained three variants showing a binding affinity (KD) one-order of magnitude higher than the wild-type decoy receptor. The interacting modes and contributions of individual residues were elucidated by analyzing the crystal structures of the single variants. To further increase the binding affinity, single positive mutations were combined, and two double mutants were shown to have about 3000- and 565-fold higher binding affinities than the wild-type decoy receptor. Molecular dynamics simulations and energetic analysis indicate that an additive effect by two mutations occurring at nearby modules was the major contributor to the remarkable increase in the binding affinities. PMID:22363519

  13. Potential role of DNA methylation as a facilitator of target search processes for transcription factors through interplay with methyl-CpG-binding proteins.

    PubMed

    Kemme, Catherine A; Marquez, Rolando; Luu, Ross H; Iwahara, Junji

    2017-07-27

    Eukaryotic genomes contain numerous non-functional high-affinity sequences for transcription factors. These sequences potentially serve as natural decoys that sequester transcription factors. We have previously shown that the presence of sequences similar to the target sequence could substantially impede association of the transcription factor Egr-1 with its targets. In this study, using a stopped-flow fluorescence method, we examined the kinetic impact of DNA methylation of decoys on the search process of the Egr-1 zinc-finger protein. We analyzed its association with an unmethylated target site on fluorescence-labeled DNA in the presence of competitor DNA duplexes, including Egr-1 decoys. DNA methylation of decoys alone did not affect target search kinetics. In the presence of the MeCP2 methyl-CpG-binding domain (MBD), however, DNA methylation of decoys substantially (∼10-30-fold) accelerated the target search process of the Egr-1 zinc-finger protein. This acceleration did not occur when the target was also methylated. These results suggest that when decoys are methylated, MBD proteins can block them and thereby allow Egr-1 to avoid sequestration in non-functional locations. This effect may occur in vivo for DNA methylation outside CpG islands (CGIs) and could facilitate localization of some transcription factors within regulatory CGIs, where DNA methylation is rare. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  14. Decoys Selection in Benchmarking Datasets: Overview and Perspectives

    PubMed Central

    Réau, Manon; Langenfeld, Florent; Zagury, Jean-François; Lagarde, Nathalie; Montes, Matthieu

    2018-01-01

    Virtual Screening (VS) is designed to prospectively help identifying potential hits, i.e., compounds capable of interacting with a given target and potentially modulate its activity, out of large compound collections. Among the variety of methodologies, it is crucial to select the protocol that is the most adapted to the query/target system under study and that yields the most reliable output. To this aim, the performance of VS methods is commonly evaluated and compared by computing their ability to retrieve active compounds in benchmarking datasets. The benchmarking datasets contain a subset of known active compounds together with a subset of decoys, i.e., assumed non-active molecules. The composition of both the active and the decoy compounds subsets is critical to limit the biases in the evaluation of the VS methods. In this review, we focus on the selection of decoy compounds that has considerably changed over the years, from randomly selected compounds to highly customized or experimentally validated negative compounds. We first outline the evolution of decoys selection in benchmarking databases as well as current benchmarking databases that tend to minimize the introduction of biases, and secondly, we propose recommendations for the selection and the design of benchmarking datasets. PMID:29416509

  15. Notch Decoys that Selectively Block Dll/Notch or Jagged/Notch Disrupt Angiogenesis by Unique Mechanisms to Inhibit Tumor Growth

    PubMed Central

    Kangsamaksin, Thaned; Murtomaki, Aino; Kofler, Natalie M.; Cuervo, Henar; Chaudhri, Reyhaan A.; Tattersall, Ian W.; Rosenstiel, Paul E.; Shawber, Carrie J.; Kitajewski, Jan

    2015-01-01

    A pro-angiogenic role for Jagged-dependent activation of Notch signaling in the endothelium has yet to be described. Using proteins that encoded different NOTCH1 EGF-like repeats, we identified unique regions of DLL-class and JAG-class ligand/receptor interactions, and developed Notch decoys that function as ligand-specific Notch inhibitors. N110-24 decoy blocked JAG1/JAG2-mediated NOTCH1 signaling, angiogenic sprouting in vitro and retinal angiogenesis, demonstrating JAG-dependent Notch signal activation promotes angiogenesis. In tumors, N110-24 decoy reduced angiogenic sprouting, vessel perfusion, pericyte coverage, and tumor growth. JAG/NOTCH signaling uniquely inhibited expression of anti-angiogenic sVEFGFR-1/sFlt-1. N11-13 decoy interfered with DLL1/DLL4-mediated NOTCH1 signaling and caused endothelial hypersprouting in vitro, in retinal angiogenesis and in tumors. Thus, blockade of JAG- or DLL-mediated Notch signaling inhibits angiogenesis by distinct mechanisms. JAG/Notch signaling positively regulates angiogenesis by suppressing sVEGFR-1/sFlt-1 and promoting mural/endothelial cell interactions. Blockade of JAG-class ligands represents a novel, viable therapeutic approach to block tumor angiogenesis and growth. PMID:25387766

  16. Aptamer-Mediated Codelivery of Doxorubicin and NF-κB Decoy Enhances Chemosensitivity of Pancreatic Tumor Cells

    PubMed Central

    Porciani, David; Tedeschi, Lorena; Marchetti, Laura; Citti, Lorenzo; Piazza, Vincenzo; Beltram, Fabio; Signore, Giovanni

    2015-01-01

    Aptamers able to bind efficiently cell-surface receptors differentially expressed in tumor and in healthy cells are emerging as powerful tools to perform targeted anticancer therapy. Here, we present a novel oligonucleotide chimera, composed by an RNA aptamer and a DNA decoy. Our assembly is able to (i) target tumor cells via an antitransferrin receptor RNA aptamer and (ii) perform selective codelivery of a chemotherapeutic drug (Doxorubicin) and of an inhibitor of a cell-survival factor, the nuclear factor κB decoy oligonucleotide. Both payloads are released under conditions found in endolysosomal compartments (low pH and reductive environment). Targeting and cytotoxicity of the oligonucleotidic chimera were assessed by confocal microscopy, cell viability, and Western blot analysis. These data indicated that the nuclear factor κB decoy does inhibit nuclear factor κB activity and ultimately leads to an increased therapeutic efficacy of Doxorubicin selectively in tumor cells. PMID:25919089

  17. Adaptive Machine Vision.

    DTIC Science & Technology

    1992-06-18

    developed by Fukushima . The system has potential use for SDI target/decoy discrimination. For testing purposes, simulated angle-angle and range-Doppler...properties and computational requirements of the Neocognitron, a patern recognition neural network developed by Fukushima . The RADONN effort builds upon...and Information Processing, 17-21 June 1991, Plymouth State College, Plymouth, New Hampshire.) 5.0 References 1. Kunihiko Fukushima , Sei Miyake, and

  18. Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics.

    PubMed

    Keich, Uri; Kertesz-Farkas, Attila; Noble, William Stafford

    2015-08-07

    Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications.

  19. Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics

    PubMed Central

    2016-01-01

    Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications. PMID:26152888

  20. Novel nonlinear knowledge-based mean force potentials based on machine learning.

    PubMed

    Dong, Qiwen; Zhou, Shuigeng

    2011-01-01

    The prediction of 3D structures of proteins from amino acid sequences is one of the most challenging problems in molecular biology. An essential task for solving this problem with coarse-grained models is to deduce effective interaction potentials. The development and evaluation of new energy functions is critical to accurately modeling the properties of biological macromolecules. Knowledge-based mean force potentials are derived from statistical analysis of proteins of known structures. Current knowledge-based potentials are almost in the form of weighted linear sum of interaction pairs. In this study, a class of novel nonlinear knowledge-based mean force potentials is presented. The potential parameters are obtained by nonlinear classifiers, instead of relative frequencies of interaction pairs against a reference state or linear classifiers. The support vector machine is used to derive the potential parameters on data sets that contain both native structures and decoy structures. Five knowledge-based mean force Boltzmann-based or linear potentials are introduced and their corresponding nonlinear potentials are implemented. They are the DIH potential (single-body residue-level Boltzmann-based potential), the DFIRE-SCM potential (two-body residue-level Boltzmann-based potential), the FS potential (two-body atom-level Boltzmann-based potential), the HR potential (two-body residue-level linear potential), and the T32S3 potential (two-body atom-level linear potential). Experiments are performed on well-established decoy sets, including the LKF data set, the CASP7 data set, and the Decoys “R”Us data set. The evaluation metrics include the energy Z score and the ability of each potential to discriminate native structures from a set of decoy structures. Experimental results show that all nonlinear potentials significantly outperform the corresponding Boltzmann-based or linear potentials, and the proposed discriminative framework is effective in developing knowledge-based mean force potentials. The nonlinear potentials can be widely used for ab initio protein structure prediction, model quality assessment, protein docking, and other challenging problems in computational biology.

  1. Does life history predict risk-taking behavior of wintering dabbling ducks?

    USGS Publications Warehouse

    Ackerman, Joshua T.; Eadie, J.M.; Moore, T.G.

    2006-01-01

    Life-history theory predicts that longer-lived, less fecund species should take fewer risks when exposed to predation than shorter-lived, more fecund species. We tested this prediction for seven species of dabbling ducks (Anas) by measuring the approach behavior (behavior of ducks when approaching potential landing sites) of 1099 duck flocks during 37 hunting trials and 491 flocks during 13 trials conducted immediately after the 1999-2000 waterfowl hunting season in California, USA. We also experimentally manipulated the attractiveness of the study site by using two decoy treatments: (1) traditional, stationary decoys only, and (2) traditional decoys in conjunction with a mechanical spinning-wing decoy. Approach behavior of ducks was strongly correlated with their life history. Minimum approach distance was negatively correlated with reproductive output during each decoy treatment and trial type. Similarly, the proportion of flocks taking risk (approaching landing sites to within 45 m) was positively correlated with reproductive output. We found similar patterns of approach behavior in relation to other life-history parameters (i.e., adult female body mass and annual adult female survival rate). Thus, species characterized by a slower life-history strategy (e.g., Northern Pintail [A. acuta]) were more risk-averse than species with a faster life-history strategy (e.g., Cinnamon Teal [A. cyanoptera]). Furthermore, although we were able to reduce risk-averseness using the spinning-wing decoy, we were unable to override the influence of life history on risk-taking behavior. Alternative explanations did not account for the observed correlation between approach behavior and life-history parameters. These results suggest that life history influences the risk-taking behavior of dabbling ducks and provide an explanation for the differential vulnerability of waterfowl to harvest. ?? The Cooper Ornithological Society 2006.

  2. Residue contacts predicted by evolutionary covariance extend the application of ab initio molecular replacement to larger and more challenging protein folds.

    PubMed

    Simkovic, Felix; Thomas, Jens M H; Keegan, Ronan M; Winn, Martyn D; Mayans, Olga; Rigden, Daniel J

    2016-07-01

    For many protein families, the deluge of new sequence information together with new statistical protocols now allow the accurate prediction of contacting residues from sequence information alone. This offers the possibility of more accurate ab initio (non-homology-based) structure prediction. Such models can be used in structure solution by molecular replacement (MR) where the target fold is novel or is only distantly related to known structures. Here, AMPLE, an MR pipeline that assembles search-model ensembles from ab initio structure predictions ('decoys'), is employed to assess the value of contact-assisted ab initio models to the crystallographer. It is demonstrated that evolutionary covariance-derived residue-residue contact predictions improve the quality of ab initio models and, consequently, the success rate of MR using search models derived from them. For targets containing β-structure, decoy quality and MR performance were further improved by the use of a β-strand contact-filtering protocol. Such contact-guided decoys achieved 14 structure solutions from 21 attempted protein targets, compared with nine for simple Rosetta decoys. Previously encountered limitations were superseded in two key respects. Firstly, much larger targets of up to 221 residues in length were solved, which is far larger than the previously benchmarked threshold of 120 residues. Secondly, contact-guided decoys significantly improved success with β-sheet-rich proteins. Overall, the improved performance of contact-guided decoys suggests that MR is now applicable to a significantly wider range of protein targets than were previously tractable, and points to a direct benefit to structural biology from the recent remarkable advances in sequencing.

  3. An Unbiased Method To Build Benchmarking Sets for Ligand-Based Virtual Screening and its Application To GPCRs

    PubMed Central

    2015-01-01

    Benchmarking data sets have become common in recent years for the purpose of virtual screening, though the main focus had been placed on the structure-based virtual screening (SBVS) approaches. Due to the lack of crystal structures, there is great need for unbiased benchmarking sets to evaluate various ligand-based virtual screening (LBVS) methods for important drug targets such as G protein-coupled receptors (GPCRs). To date these ready-to-apply data sets for LBVS are fairly limited, and the direct usage of benchmarking sets designed for SBVS could bring the biases to the evaluation of LBVS. Herein, we propose an unbiased method to build benchmarking sets for LBVS and validate it on a multitude of GPCRs targets. To be more specific, our methods can (1) ensure chemical diversity of ligands, (2) maintain the physicochemical similarity between ligands and decoys, (3) make the decoys dissimilar in chemical topology to all ligands to avoid false negatives, and (4) maximize spatial random distribution of ligands and decoys. We evaluated the quality of our Unbiased Ligand Set (ULS) and Unbiased Decoy Set (UDS) using three common LBVS approaches, with Leave-One-Out (LOO) Cross-Validation (CV) and a metric of average AUC of the ROC curves. Our method has greatly reduced the “artificial enrichment” and “analogue bias” of a published GPCRs benchmarking set, i.e., GPCR Ligand Library (GLL)/GPCR Decoy Database (GDD). In addition, we addressed an important issue about the ratio of decoys per ligand and found that for a range of 30 to 100 it does not affect the quality of the benchmarking set, so we kept the original ratio of 39 from the GLL/GDD. PMID:24749745

  4. An unbiased method to build benchmarking sets for ligand-based virtual screening and its application to GPCRs.

    PubMed

    Xia, Jie; Jin, Hongwei; Liu, Zhenming; Zhang, Liangren; Wang, Xiang Simon

    2014-05-27

    Benchmarking data sets have become common in recent years for the purpose of virtual screening, though the main focus had been placed on the structure-based virtual screening (SBVS) approaches. Due to the lack of crystal structures, there is great need for unbiased benchmarking sets to evaluate various ligand-based virtual screening (LBVS) methods for important drug targets such as G protein-coupled receptors (GPCRs). To date these ready-to-apply data sets for LBVS are fairly limited, and the direct usage of benchmarking sets designed for SBVS could bring the biases to the evaluation of LBVS. Herein, we propose an unbiased method to build benchmarking sets for LBVS and validate it on a multitude of GPCRs targets. To be more specific, our methods can (1) ensure chemical diversity of ligands, (2) maintain the physicochemical similarity between ligands and decoys, (3) make the decoys dissimilar in chemical topology to all ligands to avoid false negatives, and (4) maximize spatial random distribution of ligands and decoys. We evaluated the quality of our Unbiased Ligand Set (ULS) and Unbiased Decoy Set (UDS) using three common LBVS approaches, with Leave-One-Out (LOO) Cross-Validation (CV) and a metric of average AUC of the ROC curves. Our method has greatly reduced the "artificial enrichment" and "analogue bias" of a published GPCRs benchmarking set, i.e., GPCR Ligand Library (GLL)/GPCR Decoy Database (GDD). In addition, we addressed an important issue about the ratio of decoys per ligand and found that for a range of 30 to 100 it does not affect the quality of the benchmarking set, so we kept the original ratio of 39 from the GLL/GDD.

  5. Clinical Utility of Urinary Cytology to Detect BK Viral Nephropathy.

    PubMed

    Nankivell, Brian J; Renthawa, Jasveen; Jeoffreys, Neisha; Kable, Kathy; O'Connell, Philip J; Chapman, Jeremy R; Wong, Germaine; Sharma, Raghwa N

    2015-08-01

    Reactivation of BK polyoma virus can result in destructive viral allograft nephropathy (BKVAN) with limited treatment options. Screening programs using surrogate markers of viral replication are important preventive strategies, guiding immunosuppression reduction. We prospectively evaluated the diagnostic test performance of urinary decoy cells and urinary SV40T immunochemistry of exfoliated cells, to screen for BKVAN, (defined by reference histology with SV40 immunohistochemistry, n = 704 samples), compared with quantitative viremia, from 211 kidney and 141 kidney-pancreas transplant recipients. The disease prevalence of BKVAN was 2.6%. Decoy cells occurred in 95 of 704 (13.5%) samples, with a sensitivity of 66.7%, specificity of 88.6%, positive predictive value (PPV) of 11.7%, and negative predictive value of 98.5% to predict histologically proven BKVAN. Quantification of decoy cells improved the PPV to 32.1% (10 ≥ cells threshold). Immunohistochemical staining of urinary exfoliated cells for SV40T improved sensitivity to 85.7%, detecting atypical or degenerate infected cells (specificity of 92.3% and PPV of 33.3%), but was hampered by technical failures. Viremia occurred in 90 of 704 (12.8%) with sensitivity of 96.3%, specificity of 90.3%, PPV of 31.5%, and negative predictive value of 99.8%. The receiver-operator curve performance of quantitative viremia surpassed decoy cells (area under the curve of 0.95 and 0.79, respectively, P = 0.0018 for differences). Combining decoy cell and BK viremia in a diagnostic matrix improved prediction of BKVAN and diagnostic risk stratification, especially for high-level positive results. Although quantified decoy cells are acceptable surrogate markers of BK viral replication with unexceptional test performances, quantitative viremia displayed superior test characteristics and is suggested as the screening test of choice.

  6. An engineered Axl 'decoy receptor' effectively silences the Gas6-Axl signaling axis

    DOE PAGES

    Kariolis, Mihalis S.; Miao, Yu Rebecca; Jones, Douglas S.; ...

    2014-09-21

    Aberrant signaling through the Axl receptor tyrosine kinase has been associated with a myriad of human diseases, most notably metastatic cancer, identifying Axl and its ligand Gas6 as important therapeutic targets. Using rational and combinatorial approaches, we engineered an Axl ‘decoy receptor’ that binds Gas6 with high affinity and inhibits its function, offering an alternative approach from drug discovery efforts that directly target Axl. Four mutations within this high affinity Axl variant caused structural alterations in side chains across the Gas6/Axl binding interface, stabilizing a conformational change on Gas6. When reformatted as an Fc-fusion, the engineered decoy receptor bound tomore » Gas6 with femtomolar affinity, an 80-fold improvement compared to the wild-type Axl receptor, allowing effective sequestration of Gas6 and specific abrogation of Axl signaling. Additionally, increased Gas6 binding affinity was critical and correlative with the ability of decoy receptors to potently inhibit metastasis and disease progression in vivo.« less

  7. Countermeasure effectiveness against an intelligent imaging infrared anti-ship missile

    NASA Astrophysics Data System (ADS)

    Gray, Greer J.; Aouf, Nabil; Richardson, Mark; Butters, Brian; Walmsley, Roy

    2013-02-01

    Ship self defense against heat-seeking anti-ship missiles is of great concern to modern naval forces. One way of protecting ships against these threats is to use infrared (IR) offboard countermeasures. These decoys need precise placement to maximize their effectiveness, and simulation is an invaluable tool used in determining optimum deployment strategies. To perform useful simulations, high-fidelity models of missiles are required. We describe the development of an imaging IR anti-ship missile model for use in countermeasure effectiveness simulations. The missile model's tracking algorithm is based on a target recognition system that uses a neural network to discriminate between ships and decoys. The neural network is trained on shape- and intensity-based features extracted from simulated imagery. The missile model is then used within ship-decoy-missile engagement simulations, to determine how susceptible it is to the well-known walk-off seduction countermeasure technique. Finally, ship survivability is improved by adjusting the decoy model to increase its effectiveness against the tracker.

  8. Why Do Irrelevant Alternatives Matter? An fMRI-TMS Study of Context-Dependent Preferences.

    PubMed

    Chung, Hui-Kuan; Sjöström, Tomas; Lee, Hsin-Ju; Lu, Yi-Ta; Tsuo, Fu-Yun; Chen, Tzai-Shuen; Chang, Chi-Fu; Juan, Chi-Hung; Kuo, Wen-Jui; Huang, Chen-Ying

    2017-11-29

    Both humans and animals are known to exhibit a violation of rationality known as "decoy effect": introducing an irrelevant option (a decoy) can influence choices among other (relevant) options. Exactly how and why decoys trigger this effect is not known. It may be an example of fast heuristic decision-making, which is adaptive in natural environments, but may lead to biased choices in certain markets or experiments. We used fMRI and transcranial magnetic stimulation to investigate the neural underpinning of the decoy effect of both sexes. The left ventral striatum was more active when the chosen option dominated the decoy. This is consistent with the hypothesis that the presence of a decoy option influences the valuation of other options, making valuation context-dependent even when choices appear fully rational. Consistent with the idea that control is recruited to prevent heuristics from producing biased choices, the right inferior frontal gyrus, often implicated in inhibiting prepotent responses, connected more strongly with the striatum when subjects successfully overrode the decoy effect and made unbiased choices. This is further supported by our transcranial magnetic stimulation experiment: subjects whose right inferior frontal gyrus was temporarily disrupted made biased choices more often than a control group. Our results suggest that the neural basis of the decoy effect could be the context-dependent activation of the valuation area. But the differential connectivity from the frontal area may indicate how deliberate control monitors and corrects errors and biases in decision-making. SIGNIFICANCE STATEMENT Standard theories of rational decision-making assume context-independent valuations of available options. Motivated by the importance of this basic assumption, we used fMRI to study how the human brain assigns values to available options. We found activity in the valuation area to be consistent with the hypothesis that values depend on irrelevant aspects of the environment, even for subjects whose choices appear fully rational. Such context-dependent valuations may lead to biased decision-making. We further found differential connectivity from the frontal area to the valuation area depending on whether biases were successfully overcome. This suggests a mechanism for making rational choices despite the potential bias. Further support was obtained by a transcranial magnetic stimulation experiment, where subjects whose frontal control was temporarily disrupted made biased choices more often than a control group. Copyright © 2017 the authors 0270-6474/17/3711647-15$15.00/0.

  9. Genetic diversity and antimicrobial resistance of Campylobacter and Salmonella strains isolated from decoys and raptors.

    PubMed

    Jurado-Tarifa, E; Torralbo, A; Borge, C; Cerdà-Cuéllar, M; Ayats, T; Carbonero, A; García-Bocanegra, I

    2016-10-01

    Infections caused by thermotolerant Campylobacter spp. and Salmonella spp. are the leading causes of human gastroenteritis worldwide. Wild birds can act as reservoirs of both pathogens. A survey was carried out to determine the prevalence, genetic diversity and antimicrobial resistance of thermotolerant Campylobacter and Salmonella in waterfowl used as decoys and wild raptors in Andalusia (Southern Spain). The overall prevalence detected for Campylobacter was 5.9% (18/306; CI95%: 3.25-8.52) in decoys and 2.3% (9/387; CI95%: 0.82-3.83) in wild raptors. Isolates were identified as C. jejuni, C. coli and C. lari in both bird groups. Salmonella was isolated in 3.3% (10/306; CI95%: 2.3-4.3) and 4.6% (18/394; CI95%: 3.5-5.6) of the decoys and raptors, respectively. Salmonella Enteritidis and Typhimurium were the most frequently identified serovars, although Salmonella serovars Anatum, Bredeney, London and Mikawasima were also isolated. Pulsed-field gel electrophoresis analysis of isolates showed higher genetic diversity within Campylobacter species compared to Salmonella serovars. Campylobacter isolates showed resistance to gentamicin, ciprofloxacin and tetracycline, while resistance to erythromycin and tetracycline was found in Salmonella isolates. The results indicate that both decoys and raptors can act as natural carriers of Campylobacter and Salmonella in Spain, which may have important implications for public and animal health. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. 2035 Air Dominance Requirements for State-On-State Conflict

    DTIC Science & Technology

    2011-02-16

    story.jsp?id=news/ awst /2011/01/10/AW_01_10_ 2011_p58-280833.xml&channel=misc (accessed 3 Jan 2011). Bilbro, James. “Technology Readiness Levels.” JB...channel = awst &id =news/aw121508p2.xml&headline=null&prev=10. (accessed 3 January 2011). Global Security.org. “Miniature Air-Launched Decoy (MALD...Battle.” Center for Strategic and Budgetary Assessment, http://www.csba online.com/4Publications/PubLibrary/ R .20100518.Slides_AirSea_Batt/ R .20100518

  11. Individual differences in decision making by foraging hummingbirds.

    PubMed

    Morgan, Kate V; Hurly, T Andrew; Healy, Susan D

    2014-11-01

    For both humans and animals preference for one option over others can be influenced by the context in which the options occur. In animals, changes in preference could be due to comparative decision-making or to changes in the energy state of the animal when making decisions. We investigated which of these possibilities better explained the response of wild hummingbirds to the addition of a decoy option to a set of two options by presenting Rufous hummingbirds (Selasphorus rufus) with a foraging experiment with two treatments. In each treatment the birds were presented with a binary choice between two options and a trinary choice with three options. In treatment one the binary choice was between a volume option and a concentration option, whereas in treatment two the same volume option was presented alongside an alternative concentration option. In the trinary choice, birds were presented with the same options as in the binary choice plus one of two inferior options. Birds changed their preferences when a poorer option was added to the choice set: birds increased their preference for the same option when in the presence of either decoy. Which option differed across individuals and the changes in preference were not readily explained by either energy maximisation or the decoy effect. The consistency in response within individuals, however, would suggest that the individual itself brings an extra dimension to context-dependent decision-making. This article is part of a Special Issue entitled: Cognition in the wild. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Predicting protein complex geometries with a neural network.

    PubMed

    Chae, Myong-Ho; Krull, Florian; Lorenzen, Stephan; Knapp, Ernst-Walter

    2010-03-01

    A major challenge of the protein docking problem is to define scoring functions that can distinguish near-native protein complex geometries from a large number of non-native geometries (decoys) generated with noncomplexed protein structures (unbound docking). In this study, we have constructed a neural network that employs the information from atom-pair distance distributions of a large number of decoys to predict protein complex geometries. We found that docking prediction can be significantly improved using two different types of polar hydrogen atoms. To train the neural network, 2000 near-native decoys of even distance distribution were used for each of the 185 considered protein complexes. The neural network normalizes the information from different protein complexes using an additional protein complex identity input neuron for each complex. The parameters of the neural network were determined such that they mimic a scoring funnel in the neighborhood of the native complex structure. The neural network approach avoids the reference state problem, which occurs in deriving knowledge-based energy functions for scoring. We show that a distance-dependent atom pair potential performs much better than a simple atom-pair contact potential. We have compared the performance of our scoring function with other empirical and knowledge-based scoring functions such as ZDOCK 3.0, ZRANK, ITScore-PP, EMPIRE, and RosettaDock. In spite of the simplicity of the method and its functional form, our neural network-based scoring function achieves a reasonable performance in rigid-body unbound docking of proteins. Proteins 2010. (c) 2009 Wiley-Liss, Inc.

  13. Evidence For A Sex Pheromone in Bark Beetle Parasitoid Roptrocerus xylophagorum

    Treesearch

    Brian T. Sullivan

    2002-01-01

    Male Roptrocerus xylophagorum (Ratzeburg) (Hymenoptera: Pteromalidae) exhibited courtship and mating behaviors including wing fanning, antennation, mounting, and copulation attempts when exposed to glass bulb decoys coated with a whole-body extract of females in hexane, acetone, or methanol. Activity of extract-treated decoys declined gradually over...

  14. Double-stranded RNA transcribed from vector-based oligodeoxynucleotide acts as transcription factor decoy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao, Xiao; Gang, Yi; Department of Infectious Diseases, Tangdu Hospital, Fourth Military Medical University, Xi’an 710038, Shaanxi Province

    2015-02-06

    Highlights: • A shRNA vector based transcription factor decoy, VB-ODN, was designed. • VB-ODN for NF-κB inhibited cell viability in HEK293 cells. • VB-ODN inhibited expression of downstream genes of target transcription factors. • VB-ODN may enhance nuclear entry ratio for its feasibility of virus production. - Abstract: In this study, we designed a short hairpin RNA vector-based oligodeoxynucleotide (VB-ODN) carrying transcription factor (TF) consensus sequence which could function as a decoy to block TF activity. Specifically, VB-ODN for Nuclear factor-κB (NF-κB) could inhibit cell viability and decrease downstream gene expression in HEK293 cells without affecting expression of NF-κB itself.more » The specific binding between VB-ODN produced double-stranded RNA and NF-κB was evidenced by electrophoretic mobility shift assay. Moreover, similar VB-ODNs designed for three other TFs also inhibit their downstream gene expression but not that of themselves. Our study provides a new design of decoy for blocking TF activity.« less

  15. Linear high-boost fusion of Stokes vector imagery for effective discrimination and recognition of real targets in the presence of multiple identical decoys

    NASA Astrophysics Data System (ADS)

    El-Saba, Aed; Sakla, Wesam A.

    2010-04-01

    Recently, the use of imaging polarimetry has received considerable attention for use in automatic target recognition (ATR) applications. In military remote sensing applications, there is a great demand for sensors that are capable of discriminating between real targets and decoys. Accurate discrimination of decoys from real targets is a challenging task and often requires the fusion of various sensor modalities that operate simultaneously. In this paper, we use a simple linear fusion technique known as the high-boost fusion method for effective discrimination of real targets in the presence of multiple decoys. The HBF assigns more weight to the polarization-based imagery in forming the final fused image that is used for detection. We have captured both intensity and polarization-based imagery from an experimental laboratory arrangement containing a mixture of sand/dirt, rocks, vegetation, and other objects for the purpose of simulating scenery that would be acquired in a remote sensing military application. A target object and three decoys that are identical in physical appearance (shape, surface structure and color) and different in material composition have also been placed in the scene. We use the wavelet-filter joint transform correlation (WFJTC) technique to perform detection between input scenery and the target object. Our results show that use of the HBF method increases the correlation performance metrics associated with the WFJTC-based detection process when compared to using either the traditional intensity or polarization-based images.

  16. Estimation and correction of visibility bias in aerial surveys of wintering ducks

    USGS Publications Warehouse

    Pearse, A.T.; Gerard, P.D.; Dinsmore, S.J.; Kaminski, R.M.; Reinecke, K.J.

    2008-01-01

    Incomplete detection of all individuals leading to negative bias in abundance estimates is a pervasive source of error in aerial surveys of wildlife, and correcting that bias is a critical step in improving surveys. We conducted experiments using duck decoys as surrogates for live ducks to estimate bias associated with surveys of wintering ducks in Mississippi, USA. We found detection of decoy groups was related to wetland cover type (open vs. forested), group size (1?100 decoys), and interaction of these variables. Observers who detected decoy groups reported counts that averaged 78% of the decoys actually present, and this counting bias was not influenced by either covariate cited above. We integrated this sightability model into estimation procedures for our sample surveys with weight adjustments derived from probabilities of group detection (estimated by logistic regression) and count bias. To estimate variances of abundance estimates, we used bootstrap resampling of transects included in aerial surveys and data from the bias-correction experiment. When we implemented bias correction procedures on data from a field survey conducted in January 2004, we found bias-corrected estimates of abundance increased 36?42%, and associated standard errors increased 38?55%, depending on species or group estimated. We deemed our method successful for integrating correction of visibility bias in an existing sample survey design for wintering ducks in Mississippi, and we believe this procedure could be implemented in a variety of sampling problems for other locations and species.

  17. A Scalable Approach for Protein False Discovery Rate Estimation in Large Proteomic Data Sets.

    PubMed

    Savitski, Mikhail M; Wilhelm, Mathias; Hahne, Hannes; Kuster, Bernhard; Bantscheff, Marcus

    2015-09-01

    Calculating the number of confidently identified proteins and estimating false discovery rate (FDR) is a challenge when analyzing very large proteomic data sets such as entire human proteomes. Biological and technical heterogeneity in proteomic experiments further add to the challenge and there are strong differences in opinion regarding the conceptual validity of a protein FDR and no consensus regarding the methodology for protein FDR determination. There are also limitations inherent to the widely used classic target-decoy strategy that particularly show when analyzing very large data sets and that lead to a strong over-representation of decoy identifications. In this study, we investigated the merits of the classic, as well as a novel target-decoy-based protein FDR estimation approach, taking advantage of a heterogeneous data collection comprised of ∼19,000 LC-MS/MS runs deposited in ProteomicsDB (https://www.proteomicsdb.org). The "picked" protein FDR approach treats target and decoy sequences of the same protein as a pair rather than as individual entities and chooses either the target or the decoy sequence depending on which receives the highest score. We investigated the performance of this approach in combination with q-value based peptide scoring to normalize sample-, instrument-, and search engine-specific differences. The "picked" target-decoy strategy performed best when protein scoring was based on the best peptide q-value for each protein yielding a stable number of true positive protein identifications over a wide range of q-value thresholds. We show that this simple and unbiased strategy eliminates a conceptual issue in the commonly used "classic" protein FDR approach that causes overprediction of false-positive protein identification in large data sets. The approach scales from small to very large data sets without losing performance, consistently increases the number of true-positive protein identifications and is readily implemented in proteomics analysis software. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  18. Exploring the Stability of Ligand Binding Modes to Proteins by Molecular Dynamics Simulations: A Cross-docking Study.

    PubMed

    Liu, Kai; Kokubo, Hironori

    2017-10-23

    Docking has become an indispensable approach in drug discovery research to predict the binding mode of a ligand. One great challenge in docking is to efficiently refine the correct pose from various putative docking poses through scoring functions. We recently examined the stability of self-docking poses under molecular dynamics (MD) simulations and showed that equilibrium MD simulations have some capability to discriminate between correct and decoy poses. Here, we have extended our previous work to cross-docking studies for practical applications. Three target proteins (thrombin, heat shock protein 90-alpha, and cyclin-dependent kinase 2) of pharmaceutical interest were selected. Three comparable poses (one correct pose and two decoys) for each ligand were then selected from the docking poses. To obtain the docking poses for the three target proteins, we used three different protocols, namely: normal docking, induced fit docking (IFD), and IFD against the homology model. Finally, five parallel MD equilibrium runs were performed on each pose for the statistical analysis. The results showed that the correct poses were generally more stable than the decoy poses under MD. The discrimination capability of MD depends on the strategy. The safest way was to judge a pose as being stable if any one run among five parallel runs was stable under MD. In this case, 95% of the correct poses were retained under MD, and about 25-44% of the decoys could be excluded by the simulations for all cases. On the other hand, if we judge a pose as being stable when any two or three runs were stable, with the risk of incorrectly excluding some correct poses, approximately 31-53% or 39-56% of the two decoys could be excluded by MD, respectively. Our results suggest that simple equilibrium simulations can serve as an effective filter to exclude decoy poses that cannot be distinguished by docking scores from the computationally expensive free-energy calculations.

  19. A Scalable Approach for Protein False Discovery Rate Estimation in Large Proteomic Data Sets

    PubMed Central

    Savitski, Mikhail M.; Wilhelm, Mathias; Hahne, Hannes; Kuster, Bernhard; Bantscheff, Marcus

    2015-01-01

    Calculating the number of confidently identified proteins and estimating false discovery rate (FDR) is a challenge when analyzing very large proteomic data sets such as entire human proteomes. Biological and technical heterogeneity in proteomic experiments further add to the challenge and there are strong differences in opinion regarding the conceptual validity of a protein FDR and no consensus regarding the methodology for protein FDR determination. There are also limitations inherent to the widely used classic target–decoy strategy that particularly show when analyzing very large data sets and that lead to a strong over-representation of decoy identifications. In this study, we investigated the merits of the classic, as well as a novel target–decoy-based protein FDR estimation approach, taking advantage of a heterogeneous data collection comprised of ∼19,000 LC-MS/MS runs deposited in ProteomicsDB (https://www.proteomicsdb.org). The “picked” protein FDR approach treats target and decoy sequences of the same protein as a pair rather than as individual entities and chooses either the target or the decoy sequence depending on which receives the highest score. We investigated the performance of this approach in combination with q-value based peptide scoring to normalize sample-, instrument-, and search engine-specific differences. The “picked” target–decoy strategy performed best when protein scoring was based on the best peptide q-value for each protein yielding a stable number of true positive protein identifications over a wide range of q-value thresholds. We show that this simple and unbiased strategy eliminates a conceptual issue in the commonly used “classic” protein FDR approach that causes overprediction of false-positive protein identification in large data sets. The approach scales from small to very large data sets without losing performance, consistently increases the number of true-positive protein identifications and is readily implemented in proteomics analysis software. PMID:25987413

  20. Effects of decoy molecules targeting NF-kappaB transcription factors in Cystic fibrosis IB3–1 cells

    PubMed Central

    Finotti, Alessia; Borgatti, Monica; Bezzerri, Valentino; Nicolis, Elena; Lampronti, Ilaria; Dechecchi, Maria; Mancini, Irene; Cabrini, Giulio; Saviano, Michele; Avitabile, Concetta; Romanelli, Alessandra; Gambari, Roberto

    2012-01-01

    One of the clinical features of cystic fibrosis (CF) is a deep inflammatory process, which is characterized by production and release of cytokines and chemokines, among which interleukin 8 (IL-8) represents one of the most important. Accordingly, there is a growing interest in developing therapies against CF to reduce the excessive inflammatory response in the airways of CF patients. Since transcription factor NF-kappaB plays a critical role in IL-8 expression, the transcription factor decoy (TFD) strategy might be of interest. In order to demonstrate that TFD against NF-kappaB interferes with the NF-kappaB pathway we proved, by chromatin immunoprecipitation (ChIP) that treatment with TFD oligodeoxyribonucleotides of cystic fibrosis IB3–1 cells infected with Pseudomonas aeruginosa leads to a decrease occupancy of the Il-8 gene promoter by NF-kappaB factors. In order to develop more stable therapeutic molecules, peptide nucleic acids (PNAs) based agents were considered. In this respect PNA-DNA-PNA (PDP) chimeras are molecules of great interest from several points of view: (1) they can be complexed with liposomes and microspheres; (2) they are resistant to DNases, serum and cytoplasmic extracts; (3) they are potent decoy molecules. By using electrophoretic mobility shift assay and RT-PCR analysis we have demonstrated that (1) the effects of PDP/PDP NF-kappaB decoy chimera on accumulation of pro-inflammatory mRNAs in P.aeruginosa infected IB3–1 cells reproduce that of decoy oligonucleotides; in particular (2) the PDP/PDP chimera is a strong inhibitor of IL-8 gene expression; (3) the effect of PDP/PDP chimeras, unlike those of ODN-based decoys, are observed even in the absence of protection with lipofectamine. These informations are of great impact, in our opinion, for the development of stable molecules to be used in non-viral gene therapy of cystic fibrosis. PMID:22772035

  1. EDITORIAL: Focus on Quantum Cryptography: Theory and Practice FOCUS ON QUANTUM CRYPTOGRAPHY: THEORY AND PRACTICE

    NASA Astrophysics Data System (ADS)

    Lütkenhaus, N.; Shields, A. J.

    2009-04-01

    Quantum cryptography, and especially quantum key distribution (QKD), is steadily progressing to become a viable tool for cryptographic services. In recent years we have witnessed a dramatic increase in the secure bit rate of QKD, as well as its extension to ever longer fibre- and air-based links and the emergence of metro-scale trusted networks. In the foreseeable future even global-scale communications may be possible using quantum repeaters or Earth-satellite links. A handful of start-ups and some bigger companies are already active in the field. The launch of an initiative to form industrial standards for QKD, under the auspices of the European Telecommunication Standards Institute, described in the paper by Laenger and Lenhart in this Focus Issue, can be taken as a sign of the growing commercial interest. Recent progress has seen an increase in the secure bit rate of QKD links, by orders of magnitude, to over 1 Mb s-1. This has resulted mainly from an improvement in the detection technology. Here changes in the way conventional semiconductor detectors are gated, as well as the development of novel devices based on non-linear processes and superconducting materials, are leading the way. Additional challenges for QKD at GHz clock rates include the design of high speed electronics, remote synchronization and high rate random number generation. Substantial effort is being devoted to increasing the range of individual links, which is limited by attenuation and other losses in optical fibres and air links. An important advance in the past few years has been the introduction of protocols with the same scaling as an ideal single-photon set-up. The good news is that these schemes use standard optical devices, such as weak laser pulses. Thanks to these new protocols and improvements in the detection technology, the range of a single fibre link can exceed a few hundred km. Outstanding issues include proving the unconditional security of some of the schemes. Much of the work done to date relates to point-to-point links. Another recent advance has been the development of trusted networks for QKD. This is important for further increasing the range of the technology, and for overcoming denial-of-service attacks on an individual link. It is interesting to see that the optimization of QKD devices differs for point-to-point and network applications. Network operation is essential for widespread adoption of the technology, as it can dramatically reduce the deployment costs and allow connection flexibility. Also important is the multiplexing of the quantum signals with conventional network traffic. For the future, quantum repeaters should be developed for longer range links. On the theoretical side, different approaches to security proofs have recently started to converge, offering several paradigms of the same basic idea. Our improved theoretical understanding places more stringent demands on the QKD devices. We are aware by now that finite size effects in key generation arise not only from parameter estimation. It will not be possible to generate a key from just a few hundred received signals. It is a stimulating challenge for the theory of security proofs to develop lean proof strategies that work with finite signal block sizes. As QKD advances to a real-world cryptographic solution, side channel attacks must be carefully analysed. Theoretical security proofs for QKD schemes are so far based on physical models of these devices. It is in the nature of models that any real implementation will deviate from this model, creating a potential weakness for an eavesdropper to exploit. There are two solutions to this problem: the traditional path of refining the models to reduce the deviations, or the radically different approach of device-independent security proofs, in which none or only a few well controlled assumptions about the devices are made. Clearly, it is desirable to find security proofs that require only minimal or fairly general model descriptions and are based on observable tests during the run of QKD sessions. It is now 25 years since the first proposal for QKD was published and 20 since the first experimental realization. The intervening years have brought several technological and theoretical advances, which have driven new insights into the application of quantum theory to the wider field of information technology. We are looking forward to the new twists and turns this field will take in the next 25 years! Focus on Quantum Cryptography: Theory and Practice Contents Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space A Leverrier, E Karpov, P Grangier and N J Cerf Optical networking for quantum key distribution and quantum communications T E Chapuran, P Toliver, N A Peters, J Jackel, M S Goodman, R J Runser, S R McNown, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, C G Peterson, K T Tyagi, L Mercer and H Dardy Proof-of-concept of real-world quantum key distribution with quantum frames I Lucio-Martinez, P Chan, X Mo, S Hosier and W Tittel Composability in quantum cryptography Jörn Müller-Quade and Renato Renner Distributed authentication for randomly compromised networks Travis R Beals, Kevin P Hynes and Barry C Sanders Feasibility of 300 km quantum key distribution with entangled states Thomas Scheidl, Rupert Ursin, Alessandro Fedrizzi, Sven Ramelow, Xiao-Song Ma, Thomas Herbst, Robert Prevedel, Lothar Ratschbacher, Johannes Kofler, Thomas Jennewein and Anton Zeilinger Decoy-state quantum key distribution with both source errors and statistical fluctuations Xiang-Bin Wang, Lin Yang, Cheng-Zhi Peng and Jian-Wei Pan High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres D Stucki, N Walenta, F Vannel, R T Thew, N Gisin, H Zbinden, S Gray, C R Towery and S Ten Topological optimization of quantum key distribution networks R Alléaume, F Roueff, E Diamanti and N Lütkenhaus The SECOQC quantum key distribution network in Vienna M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, T Debuisschert, E Diamanti, M Dianati, J F Dynes, S Fasel, S Fossier, M Fürst, J-D Gautier, O Gay, N Gisin, P Grangier, A Happe, Y Hasani, M Hentschel, H Hübel, G Humer, T Länger, M Legré, R Lieger, J Lodewyck, T Lorünser, N Lütkenhaus, A Marhold, T Matyus, O Maurhart, L Monat, S Nauerth, J-B Page, A Poppe, E Querasser, G Ribordy, S Robyr, L Salvail, A W Sharpe, A J Shields, D Stucki, M Suda, C Tamas, T Themel, R T Thew, Y Thoma, A Treiber, P Trinkler, R Tualle-Brouri, F Vannel, N Walenta, H Weier, H Weinfurter, I Wimberger, Z L Yuan, H Zbinden and A Zeilinger Stable quantum key distribution with active polarization control based on time-division multiplexing J Chen, G Wu, L Xu, X Gu, E Wu and H Zeng Controlling passively quenched single photon detectors by bright light Vadim Makarov Information leakage via side channels in freespace BB84 quantum cryptography Sebastian Nauerth, Martin Fürst, Tobias Schmitt-Manderbach, Henning Weier and Harald Weinfurter Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger and Gaby Lenhart Entangled quantum key distribution with a biased basis choice Chris Erven, Xiongfeng Ma, Raymond Laflamme and Gregor Weihs Finite-key analysis for practical implementations of quantum key distribution Raymond Y Q Cai and Valerio Scarani Field test of a continuous-variable quantum key distribution prototype S Fossier, E Diamanti, T Debuisschert, A Villing, R Tualle-Brouri and P Grangier Physics and application of photon number resolving detectors based on superconducting parallel nanowires F Marsili, D Bitauld, A Gaggero, S Jahanmirinejad, R Leoni, F Mattioli and A Fiore Device-independent quantum key distribution secure against collective attacks Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar and Valerio Scarani 1310 nm differential-phase-shift QKD system using superconducting single-photon detectors Lijun Ma, S Nam, Hai Xu, B Baek, Tiejun Chang, O Slattery, A Mink and Xiao Tang Practical gigahertz quantum key distribution based on avalanche photodiodes Z L Yuan, A R Dixon, J F Dynes, A W Sharpe and A J Shields Simple security proof of quantum key distribution based on complementarity M Koashi Feasibility of satellite quantum key distribution C Bonato, A Tomaello, V Da Deppo, G Naletto and P Villoresi Programmable instrumentation and gigahertz signaling for single-photon quantum communication systems Alan Mink, Joshua C Bienfang, Robert Carpenter, Lijun Ma, Barry Hershman, Alessandro Restelli and Xiao Tang Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation G B Xavier, N Walenta, G Vilela de Faria, G P Temporão, N Gisin, H Zbinden and J P von der Weid Feasibility of free space quantum key distribution with coherent polarization states D Elser, T Bartley, B Heim, Ch Wittmann, D Sych and G Leuchs A fully automated entanglement-based quantum cryptography system for telecom fiber networks Alexander Treiber, Andreas Poppe, Michael Hentschel, Daniele Ferrini, Thomas Lorünser, Edwin Querasser, Thomas Matyus, Hannes Hübel and Anton Zeilinger Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt and K T Tyagi Clock synchronization by remote detection of correlated photon pairs Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Megabits secure key rate quantum key distribution Q Zhang, H Takesue, T Honjo, K Wen, T Hirohata, M Suyama, Y Takiguchi, H Kamada, Y Tokura, O Tadanaga, Y Nishida, M Asobe and Y Yamamoto Practical long-distance quantum key distribution system using decoy levels D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T Tyagi, K P McCabe, S Nam, B Baek, R H Hadfield, R J Hughes and J E Nordholt Detector decoy quantum key distribution Tobias Moroder, Marcos Curty and Norbert Lütkenhaus Daylight operation of a free space, entanglement-based quantum key distribution system Matthew P Peloso, Ilja Gerhardt, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes Benjamin Miquel and Hiroki Takesue

  2. LuciPHOr: Algorithm for Phosphorylation Site Localization with False Localization Rate Estimation Using Modified Target-Decoy Approach*

    PubMed Central

    Fermin, Damian; Walmsley, Scott J.; Gingras, Anne-Claude; Choi, Hyungwon; Nesvizhskii, Alexey I.

    2013-01-01

    The localization of phosphorylation sites in peptide sequences is a challenging problem in large-scale phosphoproteomics analysis. The intense neutral loss peaks and the coexistence of multiple serine/threonine and/or tyrosine residues are limiting factors for objectively scoring site patterns across thousands of peptides. Various computational approaches for phosphorylation site localization have been proposed, including Ascore, Mascot Delta score, and ProteinProspector, yet few address direct estimation of the false localization rate (FLR) in each experiment. Here we propose LuciPHOr, a modified target-decoy-based approach that uses mass accuracy and peak intensities for site localization scoring and FLR estimation. Accurate estimation of the FLR is a difficult task at the individual-site level because the degree of uncertainty in localization varies significantly across different peptides. LuciPHOr carries out simultaneous localization on all candidate sites in each peptide and estimates the FLR based on the target-decoy framework, where decoy phosphopeptides generated by placing artificial phosphorylation(s) on non-candidate residues compete with the non-decoy phosphopeptides. LuciPHOr also reports approximate site-level confidence scores for all candidate sites as a means to localize additional sites from multiphosphorylated peptides in which localization can be partially achieved. Unlike the existing tools, LuciPHOr is compatible with any search engine output processed through the Trans-Proteomic Pipeline. We evaluated the performance of LuciPHOr in terms of the sensitivity and accuracy of FLR estimates using two synthetic phosphopeptide libraries and a phosphoproteomic dataset generated from complex mouse brain samples. PMID:23918812

  3. Inorganic Kernel-Reconstituted Lipoprotein Biomimetic Nanovehicles Enable Efficient Targeting “Trojan Horse” Delivery of STAT3-Decoy Oligonucleotide for Overcoming TRAIL Resistance

    PubMed Central

    Shi, Kai; Xue, Jianxiu; Fang, Yan; Bi, Hongshu; Gao, Shan; Yang, Dongjuan; Lu, Anqi; Li, Yuai; Chen, Yao; Ke, Liyuan

    2017-01-01

    Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) can selectively induce apoptosis in a variety of tumor cells, but not most normal cells. Nevertheless, its therapeutic potential is limited due to the frequent occurrence of resistance in tumor cells, especially hepatocellular carcinoma cell lines. Therefore, we investigated the reversal effect of STAT3-decoy oligonucleotides (ODNs) on TRAIL resistance. Methods. Considering that the drawback of poor cellular permeability and rapid degradation in vivo limited ODNs' further clinical applications, we developed a biomimetic calcium phosphate-reconstituted low density lipoprotein nanovehicle (CaP@LDL) that would serve as a “Trojan horse” to carry STAT3-decoy ODNs into tumor cells and then regulate TRAIL-induced apoptosis. Results. In comparison with native ODNs, the reconstituted CaP@LDL packaged ODNs showed significantly increased serum stability, cellular transfection, in vitro synergistic cytotoxicity and apoptosis in hepatoma cells, while there was no cytotoxicity to normal cells. The improved TRAIL sensitization is attributed to blocking of STAT3 signaling and consequent expression of the downstream target antiapoptotic gene. Following systemic administration, CaP@LDL displayed LDL-mimicking pharmacokinetic behavior such as attenuated blood clearance as well as enhanced accumulation in tumor and hepatorenal sites. With the synergistic combination of decoyODN/CaP@LDL, TRAIL dramatically inhibited hepatic tumor growth in a xenograft model and induced significant tumor apoptosis in vivo. Conclusion. These results suggested that CaP@LDL-mediated STAT3-decoy ODN delivery might be a promising new strategy for reversing TRAIL resistance in hepatocellular carcinoma therapy. PMID:29158840

  4. Epigenetic inactivation of TRAIL decoy receptors at 8p12-21.3 commonly deleted region confers sensitivity to Apo2L/trail-Cisplatin combination therapy in cervical cancer.

    PubMed

    Narayan, Gopeshwar; Xie, Dongxu; Ishdorj, Ganchimeg; Scotto, Luigi; Mansukhani, Mahesh; Pothuri, Bhavana; Wright, Jason D; Kaufmann, Andreas M; Schneider, Achim; Arias-Pulido, Hugo; Murty, Vundavalli V

    2016-02-01

    Multiple chromosomal regions are affected by deletions in cervical cancer (CC) genomes, but their consequence and target gene involvement remains unknown. Our single nucleotide polymorphism (SNP) array identified 8p copy number losses localized to an 8.4 Mb minimal deleted region (MDR) in 36% of CC. The 8p MDR was associated with tumor size, treatment outcome, and with multiple HPV infections. Genetic, epigenetic, and expression analyses of candidate genes at MDR identified promoter hypermethylation and/or inactivation of decoy receptors TNFRSF10C and TNFRSF10D in the majority of CC patients. TNFRSF10C methylation was also detected in precancerous lesions suggesting that this change is an early event in cervical tumorigenesis. We further demonstrate here that CC cell lines exhibiting downregulated expression of TNFRSF10C and/or TNFRSF10D effectively respond to TRAIL-induced apoptosis and this affect was synergistic in combination with DNA damaging chemotherapeutic drugs. We show that the CC cell lines harboring epigenetic inactivation of TRAIL decoy receptors effectively activate downstream caspases suggesting a critical role of inactivation of these genes in efficient execution of extrinsic apoptotic pathway and therapy response. Therefore, these findings shed new light on the role of genetic/epigenetic defects in TRAIL decoy receptor genes in the pathogenesis of CC and provide an opportunity to explore strategies to test decoy receptor gene inactivation as a biomarker of response to Apo2L/TRAIL-combination therapy. © 2015 Wiley Periodicals, Inc.

  5. Inorganic Kernel-Reconstituted Lipoprotein Biomimetic Nanovehicles Enable Efficient Targeting "Trojan Horse" Delivery of STAT3-Decoy Oligonucleotide for Overcoming TRAIL Resistance.

    PubMed

    Shi, Kai; Xue, Jianxiu; Fang, Yan; Bi, Hongshu; Gao, Shan; Yang, Dongjuan; Lu, Anqi; Li, Yuai; Chen, Yao; Ke, Liyuan

    2017-01-01

    Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) can selectively induce apoptosis in a variety of tumor cells, but not most normal cells. Nevertheless, its therapeutic potential is limited due to the frequent occurrence of resistance in tumor cells, especially hepatocellular carcinoma cell lines. Therefore, we investigated the reversal effect of STAT3-decoy oligonucleotides (ODNs) on TRAIL resistance. Methods . Considering that the drawback of poor cellular permeability and rapid degradation in vivo limited ODNs' further clinical applications, we developed a biomimetic calcium phosphate-reconstituted low density lipoprotein nanovehicle (CaP@LDL) that would serve as a "Trojan horse" to carry STAT3-decoy ODNs into tumor cells and then regulate TRAIL-induced apoptosis. Results . In comparison with native ODNs, the reconstituted CaP@LDL packaged ODNs showed significantly increased serum stability, cellular transfection, in vitro synergistic cytotoxicity and apoptosis in hepatoma cells, while there was no cytotoxicity to normal cells. The improved TRAIL sensitization is attributed to blocking of STAT3 signaling and consequent expression of the downstream target antiapoptotic gene. Following systemic administration, CaP@LDL displayed LDL-mimicking pharmacokinetic behavior such as attenuated blood clearance as well as enhanced accumulation in tumor and hepatorenal sites. With the synergistic combination of decoyODN/CaP@LDL, TRAIL dramatically inhibited hepatic tumor growth in a xenograft model and induced significant tumor apoptosis in vivo . Conclusion. These results suggested that CaP@LDL-mediated STAT3-decoy ODN delivery might be a promising new strategy for reversing TRAIL resistance in hepatocellular carcinoma therapy.

  6. A role for NF-κB–dependent gene transactivation in sunburn

    PubMed Central

    Abeyama, Kazuhiro; Eng, William; Jester, James V.; Vink, Arie A.; Edelbaum, Dale; Cockerell, Clay J.; Bergstresser, Paul R.; Takashima, Akira

    2000-01-01

    Exposure of skin to ultraviolet (UV) radiation is known to induce NF-κB activation, but the functional role for this pathway in UV-induced cutaneous inflammation remains uncertain. In this study, we examined whether experimentally induced sunburn reactions in mice could be prevented by blocking UV-induced, NF-κB–dependent gene transactivation with oligodeoxynucleotides (ODNs) containing the NF-κB cis element (NF-κB decoy ODNs). UV-induced secretion of IL-1, IL-6, TNF-α, and VEGF by skin-derived cell lines was inhibited by the decoy ODNs, but not by the scrambled control ODNs. Systemic or local injection of NF-κB decoy ODNs also inhibited cutaneous swelling responses to UV irradiation. Moreover, local UV-induced inflammatory changes (swelling, leukocyte infiltration, epidermal hyperplasia, and accumulation of proinflammatory cytokines) were all inhibited specifically by topically applied decoy ODNs. Importantly, these ODNs had no effect on alternative types of cutaneous inflammation caused by irritant or allergic chemicals. These results indicate that sunburn reactions culminate from inflammatory events that are triggered by UV-activated transcription of NF-κB target genes, rather than from nonspecific changes associated with tissue damage. PMID:10862790

  7. Toward pest control via mass production of realistic decoys of insects

    NASA Astrophysics Data System (ADS)

    Pulsifer, Drew P.; Lakhtakia, Akhlesh; Kumar, Jayant; Baker, Thomas C.; Martín-Palma, Raúl J.

    2012-04-01

    The emerald ash borer (EAB), Agrilus planipennis, is an invasive species of beetles threatening the ash trees of North America. The species exhibits a mating behavior in which a flying male will first spot a stationary female at rest and then execute a pouncing maneuver to dive sharply onto her. The pouncing behavior appears to be cued by some visual signal from the top surface of the female's body. We have adopted bioreplication techniques to fabricate artificial visual decoys that could be used to detect, monitor, and slow the spread of EAB populations across North America. Using a negative die made of nickel and a positive die made of a hard polymer, we have stamped a polymer sheet to produce these decoys. Our bioreplication procedure is industrially scalable.

  8. Wild bird mortality and West Nile virus surveillance: Biases associated with detection, reporting, and carcass persistence

    USGS Publications Warehouse

    Ward, M.R.; Stallknecht, D.E.; Willis, J.; Conroy, M.J.; Davidson, W.R.

    2006-01-01

    Surveillance targeting dead wild birds, in particular American crows (Corvus brachyrhynchos), plays a critical role in West Nile virus (WNV) surveillance in the United States. Using crow decoy surrogates, detection and reporting of crow carcasses within urban and rural environments of DeKalb County, Georgia were assessed for potential biases that might occur in the county's WNV surveillance program. In each of two replicated trials, during July and September 2003, 400 decoys were labeled with reporting instructions and distributed along randomly chosen routes throughout designated urban and rural areas within DeKalb County. Information-theoretic methods were used to compare alternative models incorporating the effects of area and trial on probabilities of detection and reporting. The model with the best empirical support included the effects of area on both detection and reporting of decoys. The proportion of decoys detected in the urban area (0.605, SE=0.024) was approximately twice that of the rural area (0.293, SE =0.023), and the proportion of decoys reported in the urban area (0.273, SE =0.023) was approximately three times that of the rural area (0.103, SE=0.028). These results suggest that human density and associated factors can substantially influence dead crow detection and reporting and, thus, the perceived distribution of WNV. In a second and separate study, the persistence and fate of American crow and house sparrow (Passer domesticus) carcasses were assessed in urban and rural environments in Athens-Clarke, Madison, and Oconee counties, Georgia. Two replicated trials using 96 carcasses of each species were conducted during July and September 2004. For a portion of the carcasses, motion sensitive cameras were used to monitor scavenging species visits. Most carcasses (82%) disappeared or were decayed by the end of the 6-day study. Carcass persistence averaged 1.6 days in rural areas and 2.1 days in urban areas. We analyzed carcass persistence rates using a known-fate model framework in program MARK. Model selection based on Akaike's Information Criteria (AIC) indicated that the best model explaining carcass persistence rates included species and number of days of exposure; however, the model including area and number of days of exposure received approximately equal support. Model-averaged carcass persistence rates were higher for urban areas and for crow carcasses. Six mammalian and one avian species were documented scavenging upon carcasses. Dead wild birds could represent potential sources of oral WNV exposure to these scavenging species. Species composition of the scavenger assemblage was similar in urban and rural areas but "scavenging pressure" was greater in rural areas. ?? Wildlife Disease Association 2006.

  9. Improving predicted protein loop structure ranking using a Pareto-optimality consensus method.

    PubMed

    Li, Yaohang; Rata, Ionel; Chiu, See-wing; Jakobsson, Eric

    2010-07-20

    Accurate protein loop structure models are important to understand functions of many proteins. Identifying the native or near-native models by distinguishing them from the misfolded ones is a critical step in protein loop structure prediction. We have developed a Pareto Optimal Consensus (POC) method, which is a consensus model ranking approach to integrate multiple knowledge- or physics-based scoring functions. The procedure of identifying the models of best quality in a model set includes: 1) identifying the models at the Pareto optimal front with respect to a set of scoring functions, and 2) ranking them based on the fuzzy dominance relationship to the rest of the models. We apply the POC method to a large number of decoy sets for loops of 4- to 12-residue in length using a functional space composed of several carefully-selected scoring functions: Rosetta, DOPE, DDFIRE, OPLS-AA, and a triplet backbone dihedral potential developed in our lab. Our computational results show that the sets of Pareto-optimal decoys, which are typically composed of approximately 20% or less of the overall decoys in a set, have a good coverage of the best or near-best decoys in more than 99% of the loop targets. Compared to the individual scoring function yielding best selection accuracy in the decoy sets, the POC method yields 23%, 37%, and 64% less false positives in distinguishing the native conformation, indentifying a near-native model (RMSD < 0.5A from the native) as top-ranked, and selecting at least one near-native model in the top-5-ranked models, respectively. Similar effectiveness of the POC method is also found in the decoy sets from membrane protein loops. Furthermore, the POC method outperforms the other popularly-used consensus strategies in model ranking, such as rank-by-number, rank-by-rank, rank-by-vote, and regression-based methods. By integrating multiple knowledge- and physics-based scoring functions based on Pareto optimality and fuzzy dominance, the POC method is effective in distinguishing the best loop models from the other ones within a loop model set.

  10. Improving predicted protein loop structure ranking using a Pareto-optimality consensus method

    PubMed Central

    2010-01-01

    Background Accurate protein loop structure models are important to understand functions of many proteins. Identifying the native or near-native models by distinguishing them from the misfolded ones is a critical step in protein loop structure prediction. Results We have developed a Pareto Optimal Consensus (POC) method, which is a consensus model ranking approach to integrate multiple knowledge- or physics-based scoring functions. The procedure of identifying the models of best quality in a model set includes: 1) identifying the models at the Pareto optimal front with respect to a set of scoring functions, and 2) ranking them based on the fuzzy dominance relationship to the rest of the models. We apply the POC method to a large number of decoy sets for loops of 4- to 12-residue in length using a functional space composed of several carefully-selected scoring functions: Rosetta, DOPE, DDFIRE, OPLS-AA, and a triplet backbone dihedral potential developed in our lab. Our computational results show that the sets of Pareto-optimal decoys, which are typically composed of ~20% or less of the overall decoys in a set, have a good coverage of the best or near-best decoys in more than 99% of the loop targets. Compared to the individual scoring function yielding best selection accuracy in the decoy sets, the POC method yields 23%, 37%, and 64% less false positives in distinguishing the native conformation, indentifying a near-native model (RMSD < 0.5A from the native) as top-ranked, and selecting at least one near-native model in the top-5-ranked models, respectively. Similar effectiveness of the POC method is also found in the decoy sets from membrane protein loops. Furthermore, the POC method outperforms the other popularly-used consensus strategies in model ranking, such as rank-by-number, rank-by-rank, rank-by-vote, and regression-based methods. Conclusions By integrating multiple knowledge- and physics-based scoring functions based on Pareto optimality and fuzzy dominance, the POC method is effective in distinguishing the best loop models from the other ones within a loop model set. PMID:20642859

  11. Vulnerability of nontarget goose species to hunting with electronic snow goose calls

    USGS Publications Warehouse

    Caswell, J.H.; Afton, A.D.; Caswell, F.D.

    2003-01-01

    Since 1999, use of electronic calls has been legal for hunting lesser snow geese (Chen caerulescens caerulescens; hereafter snow geese) during special seasons or times of day when other waterfowl species could not be hunted in prairie Canada. Prior to expanding the use of electronic calls for hunting snow geese during fall hunting seasons, effects of these calls on nontarget goose species must be examined. Accordingly, we examined the vulnerability of Canada (Branta canadensis) and white-fronted geese (Anser albifrons) (dark geese) to electronic snow goose calls and 3 goose decoy sets (dark, mixed, and white) during the 1999 fall hunting seasons in Manitoba and Saskatchewan. Canada geese were 2.3 times more likely to fly within gun range (P<0.001) and the mean number killed/hour/hunter was 2.5 times greater (P=0.043) during control periods when hunters were silent or used traditional calling methods (i.e., hand-held and voice calls) than when hunters used electronic snow goose calls. Flock response and kill rate for Canada geese declined as proportions of white decoys increased in decoy sets (P<0.001). White-fronted geese were 1.8 times more likely to fly within gun range (P=0.050) and the mean number killed/hour/hunter was 5.0 times greater (P=0.022) during control periods than during periods when electronic snow goose calls were used. Flock response for white-fronted geese also declined as the proportion of white decoys increased in decoy sets (P<0.001). The legalization of electronic snow goose calls during fall hunting seasons in prairie Canada should not result in increased harvest of nontarget dark geese.

  12. Surveillance of influenza viruses in waterfowl used as decoys in Andalusia, Spain.

    PubMed

    Jurado-Tarifa, Estefanía; Napp, Sebastian; Gómez-Pacheco, Juan Manuel; Fernández-Morente, Manuel; Jaén-Téllez, Juan Antonio; Arenas, Antonio; García-Bocanegra, Ignacio

    2014-01-01

    A longitudinal study was carried out to determine the seroprevalence of avian influenza viruses (AIVs) in waterfowl used as decoys in Andalusia, southern Spain. A total of 2319 aquatic birds from 193 flocks were analyzed before and after the hunting season 2011-2012. In the first sampling, 403 out of 2319 (18.0%, CI95%: 15.8-19.0) decoys showed antibodies against AIVs by ELISA. The AI seroprevalence was significantly higher in geese (21.0%) than in ducks (11.7%) (P<0.001). Besides, the spatial distribution of AIVs was not homogeneous as significant differences among regions were observed. The prevalence of antibodies against AIVs subtypes H5 and H7 were 1.1% and 0.3%, respectively, using hemagglutination inhibition test (HI). The overall and H5 seroprevalences slightly increased after the hunting period (to 19.2% and 1.4%, respectively), while the H7 seroprevalence remained at the same level (0.3%). The proportion of flocks infected by AIVs was 65.3%, while 11.2% and 4.9% of flocks were positive for H5 and H7, respectively. Viral shedding was not detected in any of the 47 samples positive by both ELISA and HI, tested by RRT-PCR. The individual incidence after the hunting season was 3.4%. The fact that 57 animals seroconverted, 15 of which were confirmed by HI (12 H5 and 3 H7), was indication of contact with AIVs during the hunting period. The results indicate that waterfowl used as decoys are frequently exposed to AIVs and may be potentially useful as sentinels for AIVs monitoring. The seroprevalence detected and the seropositivity against AIVs H5 and H7, suggest that decoys can act as reservoirs of AIVs, which may be of animal and public health concern.

  13. A SELEX-Screened Aptamer of Human Hepatitis B Virus RNA Encapsidation Signal Suppresses Viral Replication

    PubMed Central

    Feng, Hui; Beck, Jürgen; Nassal, Michael; Hu, Kang-hong

    2011-01-01

    Background The specific interaction between hepatitis B virus (HBV) polymerase (P protein) and the ε RNA stem-loop on pregenomic (pg) RNA is crucial for viral replication. It triggers both pgRNA packaging and reverse transcription and thus represents an attractive antiviral target. RNA decoys mimicking ε in P protein binding but not supporting replication might represent novel HBV inhibitors. However, because generation of recombinant enzymatically active HBV polymerase is notoriously difficult, such decoys have as yet not been identified. Methodology/Principal Findings Here we used a SELEX approach, based on a new in vitro reconstitution system exploiting a recombinant truncated HBV P protein (miniP), to identify potential ε decoys in two large ε RNA pools with randomized upper stem. Selection of strongly P protein binding RNAs correlated with an unexpected strong enrichment of A residues. Two aptamers, S6 and S9, displayed particularly high affinity and specificity for miniP in vitro, yet did not support viral replication when part of a complete HBV genome. Introducing S9 RNA into transiently HBV producing HepG2 cells strongly suppressed pgRNA packaging and DNA synthesis, indicating the S9 RNA can indeed act as an ε decoy that competitively inhibits P protein binding to the authentic ε signal on pgRNA. Conclusions/Significance This study demonstrates the first successful identification of human HBV ε aptamers by an in vitro SELEX approach. Effective suppression of HBV replication by the S9 aptamer provides proof-of-principle for the ability of ε decoy RNAs to interfere with viral P-ε complex formation and suggests that S9-like RNAs may further be developed into useful therapeutics against chronic hepatitis B. PMID:22125633

  14. Residue contacts predicted by evolutionary covariance extend the application of ab initio molecular replacement to larger and more challenging protein folds

    PubMed Central

    Simkovic, Felix; Thomas, Jens M. H.; Keegan, Ronan M.; Winn, Martyn D.; Mayans, Olga; Rigden, Daniel J.

    2016-01-01

    For many protein families, the deluge of new sequence information together with new statistical protocols now allow the accurate prediction of contacting residues from sequence information alone. This offers the possibility of more accurate ab initio (non-homology-based) structure prediction. Such models can be used in structure solution by molecular replacement (MR) where the target fold is novel or is only distantly related to known structures. Here, AMPLE, an MR pipeline that assembles search-model ensembles from ab initio structure predictions (‘decoys’), is employed to assess the value of contact-assisted ab initio models to the crystallographer. It is demonstrated that evolutionary covariance-derived residue–residue contact predictions improve the quality of ab initio models and, consequently, the success rate of MR using search models derived from them. For targets containing β-structure, decoy quality and MR performance were further improved by the use of a β-strand contact-filtering protocol. Such contact-guided decoys achieved 14 structure solutions from 21 attempted protein targets, compared with nine for simple Rosetta decoys. Previously encountered limitations were superseded in two key respects. Firstly, much larger targets of up to 221 residues in length were solved, which is far larger than the previously benchmarked threshold of 120 residues. Secondly, contact-guided decoys significantly improved success with β-sheet-rich proteins. Overall, the improved performance of contact-guided decoys suggests that MR is now applicable to a significantly wider range of protein targets than were previously tractable, and points to a direct benefit to structural biology from the recent remarkable advances in sequencing. PMID:27437113

  15. Effects of Smad decoy ODN on shear stress-induced atherosclerotic ApoE-/-mouse

    PubMed Central

    An, Hyun-Jin; Lee, Woo-Ram; Kim, Kyung-Hyun; Kim, Jung-Yeon; Kim, Woon-Hae; Park, Kwan-Kyu; Youn, Sung Won

    2015-01-01

    Atherosclerosis is a complex disease which involves both genetic and environmental factors in its development and progression. Shear stress is the drag force per unit area acting on the endothelium as a result of blood flow, and it plays a critical role in plaque location and progression. TGF-β1 is often regarded to have pro-atherosclerotic effect on vascular disease. TGF-β1 downstream targets Smad, for regulating a set of genes associated with atherosclerosis. Therefore, modulation of TGF-β1 and Smad expression may be the important targets for the prevention and treatment of shear stress-induced vascular disease. However, the precise mechanism of the anti-atherosclerotic effects of novel therapeutic approach has not been elucidated by using animal models regarding the shear stress-induced vascular disease. Therefore, we designed to test whether Smad decoy ODN would prevent the development of atherosclerosis in the shear stress-induced ApoE-/-mice on a western diet. We examined the effect of cast placement on the development of atherosclerosis, and the carotid artery was harvested at the sacrifice to observe histological changes. Also, we evaluated the impact of Smad decoy ODN in the regulation of genes expression related to atherosclerosis, including TGF-β1, PAI-1, and α-SMA. Our results showed that western diet with cast placement developed atherosclerosis in ApoE-/-mouse. Also, administration of Smad decoy ODN decreases the expression of TGF-β1, PAI-1, and α-SMA. These results demonstrate the potential of Smad decoy ODN to prevent the progression of atherosclerosis in ApoE-/-mouse model with western diet and shear stress. PMID:26097583

  16. Decoy receptor 3: an endogenous immunomodulator in cancer growth and inflammatory reactions.

    PubMed

    Hsieh, Shie-Liang; Lin, Wan-Wan

    2017-06-19

    Decoy receptor 3 (DcR3), also known as tumor necrosis factor receptor (TNFR) superfamily member 6b (TNFRSF6B), is a soluble decoy receptor which can neutralize the biological functions of three members of tumor necrosis factor superfamily (TNFSF): Fas ligand (FasL), LIGHT, and TL1A. In addition to 'decoy' function, recombinant DcR3.Fc is able to modulate the activation and differentiation of dendritic cells (DCs) and macrophages via 'non-decoy' action. DcR3-treated DCs skew T cell differentiation into Th2 phenotype, while DcR3-treated macrophages behave M2 phenotype. DcR3 is upregulated in various cancer cells and several inflammatory tissues, and is regarded as a potential biomarker to predict inflammatory disease progression and cancer metastasis. However, whether DcR3 is a pathogenic factor or a suppressor to attenuate inflammatory reactions, has not been discussed comprehensively yet. Because mouse genome does not have DcR3, it is not feasible to investigate its physiological functions by gene-knockout approach. However, DcR3-mediated effects in vitro are determined via overexpressing DcR3 or addition of recombinant DcR3.Fc fusion protein. Moreover, CD68-driven DcR3 transgenic mice are used to investigate DcR3-mediated systemic effects in vivo. Upregulation of DcR3 during inflammatory reactions exerts negative-feedback to suppress inflammation, while tumor cells hijack DcR3 to prevent apoptosis and promote tumor growth and invasion. Thus, 'switch-on' of DcR3 expression may be feasible for the treatment of inflammatory diseases and enhance tissue repairing, while 'switch-off' of DcR3 expression can enhance tumor apoptosis and suppress tumor growth in vivo.

  17. Decoy receptor 3 is a prognostic factor in renal cell cancer.

    PubMed

    Macher-Goeppinger, Stephan; Aulmann, Sebastian; Wagener, Nina; Funke, Benjamin; Tagscherer, Katrin E; Haferkamp, Axel; Hohenfellner, Markus; Kim, Sunghee; Autschbach, Frank; Schirmacher, Peter; Roth, Wilfried

    2008-10-01

    Decoy receptor 3 (DcR3) is a soluble protein that binds to and inactivates the death ligand CD95L. Here, we studied a possible association between DcR3 expression and prognosis in patients with renal cell carcinomas (RCCs). A tissue microarray containing RCC tumor tissue samples and corresponding normal tissue samples was generated. Decoy receptor 3 expression in tumors of 560 patients was examined by immunohistochemistry. The effect of DcR3 expression on disease-specific survival and progression-free survival was assessed using univariate analysis and multivariate Cox regression analysis. Decoy receptor 3 serum levels were determined by ELISA. High DcR3 expression was associated with high-grade (P = .005) and high-stage (P = .048) RCCs. The incidence of distant metastasis (P = .03) and lymph node metastasis (P = .002) was significantly higher in the group with high DcR3 expression. Decoy receptor 3 expression correlated negatively with disease-specific survival (P < .001) and progression-free survival (P < .001) in univariate analyses. A multivariate Cox regression analysis retained DcR3 expression as an independent prognostic factor that outperformed the Karnofsky performance status. In patients with high-stage RCCs expressing DcR3, the 2-year survival probability was 25%, whereas in patients with DcR3-negative tumors, the survival probability was 65% (P < .001). Moreover, DcR3 serum levels were significantly higher in patients with high-stage localized disease (P = .007) and metastatic disease (P = .001). DcR3 expression is an independent prognostic factor of RCC progression and mortality. Therefore, the assessment of DcR3 expression levels offers valuable prognostic information that could be used to select patients for adjuvant therapy studies.

  18. NF-kappaB transcription factor is required for inhibitory avoidance long-term memory in mice.

    PubMed

    Freudenthal, Ramiro; Boccia, Mariano M; Acosta, Gabriela B; Blake, Mariano G; Merlo, Emiliano; Baratti, Carlos M; Romano, Arturo

    2005-05-01

    Although it is generally accepted that memory consolidation requires regulation of gene expression, only a few transcription factors (TFs) have been clearly demonstrated to be specifically involved in this process. Increasing research data point to the participation of the Rel/nuclear factor-kappaB (NF-kappaB) family of TFs in memory and neural plasticity. Here we found that two independent inhibitors of NF-kappaB induced memory impairment in the one-trial step-through inhibitory avoidance paradigm in mice: post-training administration of the drug sulfasalazine and 2 h pretraining administration of a double-stranded DNA oligonucleotide containing the NF-kappaB consensus sequence (kappaB decoy). Conversely, one base mutation of the kappaB decoy (mut-kappaB decoy) injection did not affect long-term memory. Accordingly, the kappaB decoy inhibited NF-kappaB in hippocampus 2 h after injection but no inhibition was found with mut-kappaB decoy administration. A temporal course of hippocampal NF-kappaB activity after training was determined. Unexpectedly, an inhibition of NF-kappaB was found 15 min after training in shocked and unshocked groups when compared with the naïve group. Hippocampal NF-kappaB was activated 45 min after training in both shocked and unshocked groups, decreasing 1 h after training and returning to basal levels 2 and 4 h after training. On the basis of the latter results, we propose that activation of NF-kappaB in hippocampus is part of the molecular mechanism involved in the storage of contextual features that constitute the conditioned stimulus representation. The results presented here provide the first evidence to support NF-kappaB activity being regulated in hippocampus during consolidation, stressing the role of this TF as a conserved molecular mechanism for memory storage.

  19. L-3 Com AVISYS civil aviation self-protection system

    NASA Astrophysics Data System (ADS)

    Carey, Jim

    2006-05-01

    In early 2004, L-3 Com AVISYS Corporation (hereinafter referred to as L-3 AVISYS or AVISYS) completed a contract for the integration and deployment of an advanced Infrared Countermeasures self-protection suite for a Head of State Airbus A340 aircraft. This initial L-3 AVISYS IRCM Suite was named WIPPS (Widebody Integrated Platform Protection System). The A340 WIPPS installation provisions were FAA certified with the initial deployment of the modified aircraft. WIPPS is unique in that it utilizes a dual integrated missile warning subsystem to produce a robust, multi-spectral, ultra-low false alarm rate threat warning capability. WIPPS utilizes the Thales MWS-20 Pulsed Doppler Radar Active MWS and the EADS AN/AAR-60 Ultraviolet Passive MWS. These MWS subsystems are integrated through an L-3 AVISYS Electronic Warfare Control Set (EWCS). The EWCS also integrates the WIPPS MWS threat warning information with the A340 flight computer data to optimize ALE-47 Countermeasure Dispensing System IR decoy dispensing commands, program selection and timing. WIPPS utilizes standard and advanced IR Decoys produced by ARMTEC Defense and Alloy Surfaces. WIPPS demonstrated that when IR decoy dispensing is controlled by threat range and time-to-go information provided by an Active MWS, unsurpassed self protection levels are achievable. Recognizing the need for high volume civil aviation protection, L-3 AVISYS configured a variant of WIPPS optimized for commercial airline reliability requirements, safety requirements, supportability and most importantly, affordability. L-3 AVISYS refers to this IRCM suite as CAPS (Commercial Airliner Protection System). CAPS has been configured for applications to all civil aircraft ranging from the small Regional Jets to the largest Wide-bodies. This presentation and paper will provide an overview of the initial WIPPS IRCM Suite and the important factors that were considered in defining the CAPS configuration.

  20. Design Architectures for Optically Multiplexed Imaging

    DTIC Science & Technology

    2015-09-16

    which single task is the highest priority task ∗ according to Equation 16. In es- sence , the task that is most often predicted to be of the...deployment (or a null deployment from inaction), our features consisted of pairwise relationships between each placed decoy and each missile. For each...de- coy/missile pairing, we have features describing whether a decoy had been placed such that the missile would be suc- cessfully distracted by

  1. A selective decoy-doxorubicin complex for targeted co-delivery, STAT3 probing and synergistic anti-cancer effect.

    PubMed

    Wang, Shao-Jen; Hou, Yung-Te; Chen, Lin-Chi

    2015-09-04

    A novel selective decoy oligodeoxynucleotide (dODN)-doxorubicin (DOX) complex is reported for cancer theranostics. It eliminates the use of a ligand or carrier for targeted delivery and disassembles into therapeutic dODN and DOX upon encountering over-activated STAT3 in cancer cells. Hence, in situ STAT3 probing and synergistic anti-cancer effect are attained at the same time.

  2. HTS for SMFS, organohalide respiration, new epigenetic mark, and a decoy receptor.

    PubMed

    2014-10-23

    Each month, Chemistry & Biology Select highlights a selection of research reports from the recent literature. These highlights are a snapshot of interesting research done across the field of chemical biology. This month's Select highlights an on-chip platform for high-throughput force microscopy, a structural view of organohalide respiration, evidence that 5-hydroxymethylcytosine is an epigenetic mark, and use of a decoy receptor to thwart oncogene signaling.

  3. Exploring the stability of ligand binding modes to proteins by molecular dynamics simulations.

    PubMed

    Liu, Kai; Watanabe, Etsurou; Kokubo, Hironori

    2017-02-01

    The binding mode prediction is of great importance to structure-based drug design. The discrimination of various binding poses of ligand generated by docking is a great challenge not only to docking score functions but also to the relatively expensive free energy calculation methods. Here we systematically analyzed the stability of various ligand poses under molecular dynamics (MD) simulation. First, a data set of 120 complexes was built based on the typical physicochemical properties of drug-like ligands. Three potential binding poses (one correct pose and two decoys) were selected for each ligand from self-docking in addition to the experimental pose. Then, five independent MD simulations for each pose were performed with different initial velocities for the statistical analysis. Finally, the stabilities of ligand poses under MD were evaluated and compared with the native one from crystal structure. We found that about 94% of the native poses were maintained stable during the simulations, which suggests that MD simulations are accurate enough to judge most experimental binding poses as stable properly. Interestingly, incorrect decoy poses were maintained much less and 38-44% of decoys could be excluded just by performing equilibrium MD simulations, though 56-62% of decoys were stable. The computationally-heavy binding free energy calculation can be performed only for these survived poses.

  4. Funnel traps capture a higher proportion of juvenile Great Tits Parus major than automatic traps

    USGS Publications Warehouse

    Senar, J.C.; Domenech, J.; Conroy, M.J.

    1999-01-01

    We compared capture rates of Great Tits at funnel traps, where several birds can be captured at once so that some decoy effect may appear, to those obtained at automatic traps, where only one bird can be trapped at a time, at trapping stations in northeastern Spain. Juvenile birds were mainly captured at funnel traps (79% of juvenile captures), whereas adult plumaged birds were captured at both types of traps (51% of captures were at the funnel traps) (test between ages, P<0.001). Juvenile Great Tits had lower body condition as measured by ptilochronology (P<0.01). These birds are more easily trapped in funnel traps, which may be acting as decoy traps, and thus are vulnerable to the same kinds of biases (eg age or body condition) that have been previously documented for decoy traps.

  5. Pictorial and conceptual representation of glimpsed pictures.

    PubMed

    Potter, Mary C; Staub, Adrian; O'Connor, Daniel H; Potter, Mary C

    2004-06-01

    Pictures seen in a rapid sequence are remembered briefly, but most are forgotten within a few seconds (M. C. Potter. A. Staub, J. Rado. & D. H. O'Connor. 2002). The authors investigated the pictorial and conceptual components of this fleeting memory by presenting 5 pictured scenes and immediately testing recognition of verbal titles (e.g., people at a table) or recognition of the pictures themselves. Recognition declined during testing, but initial performance was higher and the decline steeper when pictures were tested. A final experiment included test decoy pictures that were conceptually similar to but visually distinct from the original pictures. Yeses to decoys were higher than yeses to other distractors. Fleeting memory for glimpsed pictures has a strong conceptual component (conceptual short-term memory), but there is additional highly volatile pictorial memory (pictorial short-term memory) that is not tapped hy a gist title or decoy picture. ((c) 2004 APA, all rights reserved)

  6. Cues used by the black fly, Simulium annulus, for attraction to the common loon (Gavia immer).

    PubMed

    Weinandt, Meggin L; Meyer, Michael; Strand, Mac; Lindsay, Alec R

    2012-12-01

    The parasitic relationship between a black fly, Simulium annulus, and the common loon (Gavia immer) has been considered one of the most exclusive relationships between any host species and a black fly species. To test the host specificity of this blood-feeding insect, we made a series of bird decoy presentations to black flies on loon-inhabited lakes in northern Wisconsin, U.S.A. To examine the importance of chemical and visual cues for black fly detection of and attraction to hosts, we made decoy presentations with and without chemical cues. Flies attracted to the decoys were collected, identified to species, and quantified. Results showed that S. annulus had a strong preference for common loon visual and chemical cues, although visual cues from Canada geese (Branta canadensis) and mallards (Anas platyrynchos) did attract some flies in significantly smaller numbers. © 2012 The Society for Vector Ecology.

  7. Dual GPCR and GAG mimicry by the M3 chemokine decoy receptor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexander-Brett, Jennifer M.; Fremont, Daved H.

    2008-09-23

    Viruses have evolved a myriad of evasion strategies focused on undermining chemokine-mediated immune surveillance, exemplified by the mouse {gamma}-herpesvirus 68 M3 decoy receptor. Crystal structures of M3 in complex with C chemokine ligand 1/lymphotactin and CC chemokine ligand 2/monocyte chemoattractant protein 1 reveal that invariant chemokine features associated with G protein-coupled receptor binding are primarily recognized by the decoy C-terminal domain, whereas the N-terminal domain (NTD) reconfigures to engage divergent basic residue clusters on the surface of chemokines. Favorable electrostatic forces dramatically enhance the association kinetics of chemokine binding by M3, with a primary role ascribed to acidic NTD regionsmore » that effectively mimic glycosaminoglycan interactions. Thus, M3 employs two distinct mechanisms of chemical imitation to potently sequester chemokines, thereby inhibiting chemokine receptor binding events as well as the formation of chemotactic gradients necessary for directed leukocyte trafficking.« less

  8. LeEix1 functions as a decoy receptor to attenuate LeEix2 signaling.

    PubMed

    Bar, Maya; Sharfman, Miya; Avni, Adi

    2011-03-01

    The receptors for the fungal elicitor EIX (LeEix1 and LeEix2) belong to a class of leucine-rich repeat cell-surface glycoproteins with a signal for receptor-mediated endocytosis. Both receptors are able to bind the EIX elicitor while only the LeEix2 receptor mediates defense responses. We show that LeEix1 acts as a decoy receptor and attenuates EIX induced internalization and signaling of the LeEix2 receptor. We demonstrate that BAK1 binds LeEix1 but not LeEix2. In plants where BAK1 was silenced, LeEix1 was no longer able to attenuate plant responses to EIX, indicating that BAK1 is required for this attenuation. We suggest that LeEix1 functions as a decoy receptor for LeEix2, a function which requires the kinase activity of BAK1.

  9. Conformational heterogeneity of the SAM-I riboswitch transcriptional ON state: a chaperone-like role for S-adenosyl methionine.

    PubMed

    Huang, Wei; Kim, Joohyun; Jha, Shantenu; Aboul-Ela, Fareed

    2012-05-18

    Riboswitches are promising targets for the design of novel antibiotics and engineering of portable genetic regulatory elements. There is evidence that variability in riboswitch properties allows tuning of expression for genes involved in different stages of biosynthetic pathways by mechanisms that are not currently understood. Here, we explore the mechanism for tuning of S-adenosyl methionine (SAM)-I riboswitch folding. Most SAM-I riboswitches function at the transcriptional level by sensing the cognate ligand SAM. SAM-I riboswitches orchestrate the biosynthetic pathways of cysteine, methionine, SAM, and so forth. We use base-pair probability predictions to examine the secondary-structure folding landscape of several SAM-I riboswitch sequences. We predict different folding behaviors for different SAM-I riboswitch sequences. We identify several "decoy" base-pairing interactions involving 5' riboswitch residues that can compete with the formation of a P1 helix, a component of the ligand-bound "transcription OFF" state, in the absence of SAM. We hypothesize that blockage of these interactions through SAM contacts contributes to stabilization of the OFF state in the presence of ligand. We also probe folding patterns for a SAM-I riboswitch RNA using constructs with different 3' truncation points experimentally. Folding was monitored through fluorescence, susceptibility to base-catalyzed cleavage, nuclear magnetic resonance, and indirectly through SAM binding. We identify key decision windows at which SAM can affect the folding pathway towards the OFF state. The presence of decoy conformations and differential sensitivities to SAM at different transcript lengths is crucial for SAM-I riboswitches to modulate gene expression in the context of global cellular metabolism. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. An Effectiveness Analysis of the Tactical Employment of Decoys

    DTIC Science & Technology

    1994-06-03

    desert made it impossible to hide the dense concentration of vehicles in the three assembly areas: 1st Armoured Division in Assembly Area (AA) Murrayfield...North, 24th Armoured Brigade in AA Murrayfield South, and 10th Armoured Division in AA Melting Pot. However, an ingenious combination of decoys and...hood, configured to resemble an ammo carrier, was often draped over tanks to disguise thenm12 To reinforce the story that the British main attack would

  11. G4-DNA Formation in the HRAS Promoter and Rational Design of Decoy Oligonucleotides for Cancer Therapy

    PubMed Central

    Membrino, Alexandro; Cogoi, Susanna; Pedersen, Erik B.; Xodo, Luigi E.

    2011-01-01

    HRAS is a proto-oncogene involved in the tumorigenesis of urinary bladder cancer. In the HRAS promoter we identified two G-rich elements, hras-1 and hras-2, that fold, respectively, into an antiparallel and a parallel quadruplex (qhras-1, qhras-2). When we introduced in sequence hras-1 or hras-2 two point mutations that block quadruplex formation, transcription increased 5-fold, but when we stabilized the G-quadruplexes by guanidinium phthalocyanines, transcription decreased to 20% of control. By ChIP we found that sequence hras-1 is bound only by MAZ, while hras-2 is bound by MAZ and Sp1: two transcription factors recognizing guanine boxes. We also discovered by EMSA that recombinant MAZ-GST binds to both HRAS quadruplexes, while Sp1-GST only binds to qhras-1. The over-expression of MAZ and Sp1 synergistically activates HRAS transcription, while silencing each gene by RNAi results in a strong down-regulation of transcription. All these data indicate that the HRAS G-quadruplexes behave as transcription repressors. Finally, we designed decoy oligonucleotides mimicking the HRAS quadruplexes, bearing (R)-1-O-[4-(1-Pyrenylethynyl) phenylmethyl] glycerol and LNA modifications to increase their stability and nuclease resistance (G4-decoys). The G4-decoys repressed HRAS transcription and caused a strong antiproliferative effect, mediated by apoptosis, in T24 bladder cancer cells where HRAS is mutated. PMID:21931711

  12. Suppression of wear particle induced pro-inflammatory cytokine and chemokine production in macrophages via NF-κB decoy oligodeoxynucleotide: A preliminary report

    PubMed Central

    Lin, Tzu-hua; Yao, Zhenyu; Sato, Taishi; Keeney, Michael; Li, Chenguang; Pajarinen, Jukka; Yang, Fan; Egashira, Kensuke; Goodman, Stuart B.

    2014-01-01

    Total joint replacement (TJR) is a very cost-effective surgery for end-stage arthritis. One important goal is to decrease the revision rate especially because TJR has been extended to younger patients. Continuous production of ultra-high molecular weight polyethylene (UHMWPE) wear particles induces macrophage infiltration and chronic inflammation, which can lead to peri-prosthetic osteolysis. Targeting individual pro-inflammatory cytokines directly has not reversed the osteolytic process in clinical trials, due to compensatory upregulation of other pro-inflammatory factors. We hypothesized that targeting the important transcription factor NF-κB could mitigate the inflammatory response to wear particles, potentially diminishing osteolysis. In the current study, we suppressed NF-κB activity in mouse RAW264.7 and human THP1 macrophage cell lines, as well as primary mouse and human macrophages, via competitive binding with double strand decoy oligodeoxynucleotide (ODN) containing an NF-κB binding element. We found that macrophage exposure to UHMWPE particles induced multiple pro-inflammatory cytokine and chemokine expression including TNF-α, MCP1, MIP1α and others. Importantly, the decoy ODN significantly suppressed the induced cytokine and chemokine expression in both murine and human macrophages, and resulted in suppression of macrophage recruitment. The strategic use of decoy NF-κB ODN, delivered locally, could potentially diminish particle-induced peri-prosthetic osteolysis. PMID:24814879

  13. MAZ-binding G4-decoy with locked nucleic acid and twisted intercalating nucleic acid modifications suppresses KRAS in pancreatic cancer cells and delays tumor growth in mice

    PubMed Central

    Cogoi, Susanna; Zorzet, Sonia; Rapozzi, Valentina; Géci, Imrich; Pedersen, Erik B.; Xodo, Luigi E.

    2013-01-01

    KRAS mutations are primary genetic lesions leading to pancreatic cancer. The promoter of human KRAS contains a nuclease-hypersensitive element (NHE) that can fold in G4-DNA structures binding to nuclear proteins, including MAZ (myc-associated zinc-finger). Here, we report that MAZ activates KRAS transcription. To knockdown oncogenic KRAS in pancreatic cancer cells, we designed oligonucleotides that mimic one of the G-quadruplexes formed by NHE (G4-decoys). To increase their nuclease resistance, two locked nucleic acid (LNA) modifications were introduced at the 3′-end, whereas to enhance the folding and stability, two polycyclic aromatic hydrocarbon units (TINA or AMANY) were inserted internally, to cap the quadruplex. The most active G4-decoy (2998), which had two para-TINAs, strongly suppressed KRAS expression in Panc-1 cells. It also repressed their metabolic activity (IC50 = 520 nM), and it inhibited cell growth and colony formation by activating apoptosis. We finally injected 2998 and control oligonucleotides 5153, 5154 (2 nmol/mouse) intratumorally in SCID mice bearing a Panc-1 xenograft. After three treatments, 2998 reduced tumor xenograft growth by 64% compared with control and increased the Kaplan–Meier median survival time by 70%. Together, our data show that MAZ-specific G4-decoys mimicking a KRAS quadruplex are promising for pancreatic cancer therapy. PMID:23471001

  14. Surveillance of Influenza Viruses in Waterfowl Used As Decoys in Andalusia, Spain

    PubMed Central

    Jurado-Tarifa, Estefanía; Napp, Sebastian; Gómez-Pacheco, Juan Manuel; Fernández-Morente, Manuel; Jaén-Téllez, Juan Antonio; Arenas, Antonio; García-Bocanegra, Ignacio

    2014-01-01

    A longitudinal study was carried out to determine the seroprevalence of avian influenza viruses (AIVs) in waterfowl used as decoys in Andalusia, southern Spain. A total of 2319 aquatic birds from 193 flocks were analyzed before and after the hunting season 2011–2012. In the first sampling, 403 out of 2319 (18.0%, CI95%: 15.8–19.0) decoys showed antibodies against AIVs by ELISA. The AI seroprevalence was significantly higher in geese (21.0%) than in ducks (11.7%) (P<0.001). Besides, the spatial distribution of AIVs was not homogeneous as significant differences among regions were observed. The prevalence of antibodies against AIVs subtypes H5 and H7 were 1.1% and 0.3%, respectively, using hemagglutination inhibition test (HI). The overall and H5 seroprevalences slightly increased after the hunting period (to 19.2% and 1.4%, respectively), while the H7 seroprevalence remained at the same level (0.3%). The proportion of flocks infected by AIVs was 65.3%, while 11.2% and 4.9% of flocks were positive for H5 and H7, respectively. Viral shedding was not detected in any of the 47 samples positive by both ELISA and HI, tested by RRT-PCR. The individual incidence after the hunting season was 3.4%. The fact that 57 animals seroconverted, 15 of which were confirmed by HI (12 H5 and 3 H7), was indication of contact with AIVs during the hunting period. The results indicate that waterfowl used as decoys are frequently exposed to AIVs and may be potentially useful as sentinels for AIVs monitoring. The seroprevalence detected and the seropositivity against AIVs H5 and H7, suggest that decoys can act as reservoirs of AIVs, which may be of animal and public health concern. PMID:24901946

  15. Mechanisms of the prevention and inhibition of the progression and development of non-alcoholic steatohepatitis by genetic and pharmacological decoy receptor 3 supplementation.

    PubMed

    Lee, Pei-Chang; Yang, Ling-Yu; Wang, Ying-Wen; Huang, Shiang-Fen; Lee, Kuei-Chuan; Hsieh, Yun-Cheng; Yang, Ying-Ying; Hsieh, Shie-Liang; Hou, Ming-Chih; Lin, Han-Chieh; Lee, Fa-Yuah; Lee, Shou-Dong

    2017-11-01

    Treatment of non-alcoholic steatohepatitis (NASH) is difficult due to the absence of a proven treatment and its comprehensive mechanisms. In the NASH animal model, upregulated hepatic inflammation and oxidative stress, with the resultant M1 polarization of macrophages as well as imbalanced adipocytokines, all accelerate NASH progression. As a member of the tumor necrosis factor receptor superfamily, decoy receptor 3 (DcR3) not only neutralizes the death ligands, but also performs immune modulations. In this study, we aimed to investigate the possible non-decoy effects of DcR3 on diet-induced NASH mice. Methionine- and choline-deficient (MCD) diet feeding for 9 weeks was applied to induce NASH in BALB/c mice. Decoy receptor 3 heterozygous transgenesis or pharmacological pretreatment with DcR3a for 1 month were designed as interventions. Intrahepatic inflammatory status as well as macrophage polarization, oxidative stress, and steatosis as well as lipogenic gene expression and fibrotic status were analyzed. Additionally, acute effects of DcR3a on HepG2 cells, Hep3B cells, and primary mouse hepatocytes in various MCD medium-stimulated changes were also evaluated. Both DcR3 genetic and pharmacologic supplement significantly reduced MCD diet-induced hepatic M1 polarization. In addition, DcR3 supplement attenuated MCD diet-increased hepatic inflammation, oxidative stress, adipocytokine imbalance, steatosis, and fibrogenesis. Moreover, acute DcR3a incubation in HepG2 cells, Hep3B cells, and mouse hepatocytes could normalize the expression of genes related to lipid oxidation along with inflammation and oxidative stress. The ability of DcR3 to attenuate hepatic steatosis and inflammation through its non-decoy effects of immune modulation and oxidative stress attenuation makes it a potential treatment for NASH. © 2017 The Japan Society of Hepatology.

  16. Structural basis of GM-CSF and IL-2 sequestration by the viral decoy receptor GIF

    PubMed Central

    Felix, Jan; Kandiah, Eaazhisai; De Munck, Steven; Bloch, Yehudi; van Zundert, Gydo C.P.; Pauwels, Kris; Dansercoer, Ann; Novanska, Katka; Read, Randy J.; Bonvin, Alexandre M.J.J.; Vergauwen, Bjorn; Verstraete, Kenneth; Gutsche, Irina; Savvides, Savvas N.

    2016-01-01

    Subversion of the host immune system by viruses is often mediated by molecular decoys that sequester host proteins pivotal to mounting effective immune responses. The widespread mammalian pathogen parapox Orf virus deploys GIF, a member of the poxvirus immune evasion superfamily, to antagonize GM-CSF (granulocyte macrophage colony-stimulating factor) and IL-2 (interleukin-2), two pleiotropic cytokines of the mammalian immune system. However, structural and mechanistic insights into the unprecedented functional duality of GIF have remained elusive. Here we reveal that GIF employs a dimeric binding platform that sequesters two copies of its target cytokines with high affinity and slow dissociation kinetics to yield distinct complexes featuring mutually exclusive interaction footprints. We illustrate how GIF serves as a competitive decoy receptor by leveraging binding hotspots underlying the cognate receptor interactions of GM-CSF and IL-2, without sharing any structural similarity with the cytokine receptors. Our findings contribute to the tracing of novel molecular mimicry mechanisms employed by pathogenic viruses. PMID:27819269

  17. Sound segregation via embedded repetition is robust to inattention.

    PubMed

    Masutomi, Keiko; Barascud, Nicolas; Kashino, Makio; McDermott, Josh H; Chait, Maria

    2016-03-01

    The segregation of sound sources from the mixture of sounds that enters the ear is a core capacity of human hearing, but the extent to which this process is dependent on attention remains unclear. This study investigated the effect of attention on the ability to segregate sounds via repetition. We utilized a dual task design in which stimuli to be segregated were presented along with stimuli for a "decoy" task that required continuous monitoring. The task to assess segregation presented a target sound 10 times in a row, each time concurrent with a different distractor sound. McDermott, Wrobleski, and Oxenham (2011) demonstrated that repetition causes the target sound to be segregated from the distractors. Segregation was queried by asking listeners whether a subsequent probe sound was identical to the target. A control task presented similar stimuli but probed discrimination without engaging segregation processes. We present results from 3 different decoy tasks: a visual multiple object tracking task, a rapid serial visual presentation (RSVP) digit encoding task, and a demanding auditory monitoring task. Load was manipulated by using high- and low-demand versions of each decoy task. The data provide converging evidence of a small effect of attention that is nonspecific, in that it affected the segregation and control tasks to a similar extent. In all cases, segregation performance remained high despite the presence of a concurrent, objectively demanding decoy task. The results suggest that repetition-based segregation is robust to inattention. (c) 2016 APA, all rights reserved).

  18. “Quantumness” versus “classicality” of quantum states and quantum protocols

    NASA Astrophysics Data System (ADS)

    Brodutch, Aharon; Groisman, Berry; Kenigsberg, Dan; Mor, Tal

    Entanglement is one of the pillars of quantum mechanics and quantum information processing, and as a result, the quantumness of nonentangled states has typically been overlooked and unrecognized until the last decade. We give a robust definition for the classicality versus quantumness of a single multipartite quantum state, a set of states, and a protocol using quantum states. We show a variety of nonentangled (separable) states that exhibit interesting quantum properties, and we explore the “zoo” of separable states; several interesting subclasses are defined based on the diagonalizing bases of the states, and their nonclassical behavior is investigated.

  19. Determination of an effective scoring function for RNA-RNA interactions with a physics-based double-iterative method.

    PubMed

    Yan, Yumeng; Wen, Zeyu; Zhang, Di; Huang, Sheng-You

    2018-05-18

    RNA-RNA interactions play fundamental roles in gene and cell regulation. Therefore, accurate prediction of RNA-RNA interactions is critical to determine their complex structures and understand the molecular mechanism of the interactions. Here, we have developed a physics-based double-iterative strategy to determine the effective potentials for RNA-RNA interactions based on a training set of 97 diverse RNA-RNA complexes. The double-iterative strategy circumvented the reference state problem in knowledge-based scoring functions by updating the potentials through iteration and also overcame the decoy-dependent limitation in previous iterative methods by constructing the decoys iteratively. The derived scoring function, which is referred to as DITScoreRR, was evaluated on an RNA-RNA docking benchmark of 60 test cases and compared with three other scoring functions. It was shown that for bound docking, our scoring function DITScoreRR obtained the excellent success rates of 90% and 98.3% in binding mode predictions when the top 1 and 10 predictions were considered, compared to 63.3% and 71.7% for van der Waals interactions, 45.0% and 65.0% for ITScorePP, and 11.7% and 26.7% for ZDOCK 2.1, respectively. For unbound docking, DITScoreRR achieved the good success rates of 53.3% and 71.7% in binding mode predictions when the top 1 and 10 predictions were considered, compared to 13.3% and 28.3% for van der Waals interactions, 11.7% and 26.7% for our ITScorePP, and 3.3% and 6.7% for ZDOCK 2.1, respectively. DITScoreRR also performed significantly better in ranking decoys and obtained significantly higher score-RMSD correlations than the other three scoring functions. DITScoreRR will be of great value for the prediction and design of RNA structures and RNA-RNA complexes.

  20. Monotonically increasing functions of any quantum correlation can make all multiparty states monogamous

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Salini, K.; Prabhu, R.; Sen, Aditi

    2014-09-15

    Monogamy of quantum correlation measures puts restrictions on the sharability of quantum correlations in multiparty quantum states. Multiparty quantum states can satisfy or violate monogamy relations with respect to given quantum correlations. We show that all multiparty quantum states can be made monogamous with respect to all measures. More precisely, given any quantum correlation measure that is non-monogamic for a multiparty quantum state, it is always possible to find a monotonically increasing function of the measure that is monogamous for the same state. The statement holds for all quantum states, whether pure or mixed, in all finite dimensions and formore » an arbitrary number of parties. The monotonically increasing function of the quantum correlation measure satisfies all the properties that are expected for quantum correlations to follow. We illustrate the concepts by considering a thermodynamic measure of quantum correlation, called the quantum work deficit.« less

  1. Differentiation of AmpC beta-lactamase binders vs. decoys using classification kNN QSAR modeling and application of the QSAR classifier to virtual screening

    NASA Astrophysics Data System (ADS)

    Hsieh, Jui-Hua; Wang, Xiang S.; Teotico, Denise; Golbraikh, Alexander; Tropsha, Alexander

    2008-09-01

    The use of inaccurate scoring functions in docking algorithms may result in the selection of compounds with high predicted binding affinity that nevertheless are known experimentally not to bind to the target receptor. Such falsely predicted binders have been termed `binding decoys'. We posed a question as to whether true binders and decoys could be distinguished based only on their structural chemical descriptors using approaches commonly used in ligand based drug design. We have applied the k-Nearest Neighbor ( kNN) classification QSAR approach to a dataset of compounds characterized as binders or binding decoys of AmpC beta-lactamase. Models were subjected to rigorous internal and external validation as part of our standard workflow and a special QSAR modeling scheme was employed that took into account the imbalanced ratio of inhibitors to non-binders (1:4) in this dataset. 342 predictive models were obtained with correct classification rate (CCR) for both training and test sets as high as 0.90 or higher. The prediction accuracy was as high as 100% (CCR = 1.00) for the external validation set composed of 10 compounds (5 true binders and 5 decoys) selected randomly from the original dataset. For an additional external set of 50 known non-binders, we have achieved the CCR of 0.87 using very conservative model applicability domain threshold. The validated binary kNN QSAR models were further employed for mining the NCGC AmpC screening dataset (69653 compounds). The consensus prediction of 64 compounds identified as screening hits in the AmpC PubChem assay disagreed with their annotation in PubChem but was in agreement with the results of secondary assays. At the same time, 15 compounds were identified as potential binders contrary to their annotation in PubChem. Five of them were tested experimentally and showed inhibitory activities in millimolar range with the highest binding constant Ki of 135 μM. Our studies suggest that validated QSAR models could complement structure based docking and scoring approaches in identifying promising hits by virtual screening of molecular libraries.

  2. Cheminformatics meets molecular mechanics: a combined application of knowledge-based pose scoring and physical force field-based hit scoring functions improves the accuracy of structure-based virtual screening.

    PubMed

    Hsieh, Jui-Hua; Yin, Shuangye; Wang, Xiang S; Liu, Shubin; Dokholyan, Nikolay V; Tropsha, Alexander

    2012-01-23

    Poor performance of scoring functions is a well-known bottleneck in structure-based virtual screening (VS), which is most frequently manifested in the scoring functions' inability to discriminate between true ligands vs known nonbinders (therefore designated as binding decoys). This deficiency leads to a large number of false positive hits resulting from VS. We have hypothesized that filtering out or penalizing docking poses recognized as non-native (i.e., pose decoys) should improve the performance of VS in terms of improved identification of true binders. Using several concepts from the field of cheminformatics, we have developed a novel approach to identifying pose decoys from an ensemble of poses generated by computational docking procedures. We demonstrate that the use of target-specific pose (scoring) filter in combination with a physical force field-based scoring function (MedusaScore) leads to significant improvement of hit rates in VS studies for 12 of the 13 benchmark sets from the clustered version of the Database of Useful Decoys (DUD). This new hybrid scoring function outperforms several conventional structure-based scoring functions, including XSCORE::HMSCORE, ChemScore, PLP, and Chemgauss3, in 6 out of 13 data sets at early stage of VS (up 1% decoys of the screening database). We compare our hybrid method with several novel VS methods that were recently reported to have good performances on the same DUD data sets. We find that the retrieved ligands using our method are chemically more diverse in comparison with two ligand-based methods (FieldScreen and FLAP::LBX). We also compare our method with FLAP::RBLB, a high-performance VS method that also utilizes both the receptor and the cognate ligand structures. Interestingly, we find that the top ligands retrieved using our method are highly complementary to those retrieved using FLAP::RBLB, hinting effective directions for best VS applications. We suggest that this integrative VS approach combining cheminformatics and molecular mechanics methodologies may be applied to a broad variety of protein targets to improve the outcome of structure-based drug discovery studies.

  3. Multi-dimensional quantum state sharing based on quantum Fourier transform

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Tso, Raylin; Dai, Yuewei

    2018-03-01

    A scheme of multi-dimensional quantum state sharing is proposed. The dealer performs the quantum SUM gate and the quantum Fourier transform to encode a multi-dimensional quantum state into an entanglement state. Then the dealer distributes each participant a particle of the entanglement state, to share the quantum state among n participants. In the recovery, n-1 participants measure their particles and supply their measurement results; the last participant performs the unitary operation on his particle according to these measurement results and can reconstruct the initial quantum state. The proposed scheme has two merits: It can share the multi-dimensional quantum state and it does not need the entanglement measurement.

  4. TRAIL Death Receptor-4, Decoy Receptor-1 and Decoy Receptor-2 Expression on CD8+ T Cells Correlate with the Disease Severity in Patients with Rheumatoid Arthritis

    PubMed Central

    2010-01-01

    Background Rheumatoid Arthritis (RA) is a chronic autoimmune inflammatory disorder. Although the pathogenesis of disease is unclear, it is well known that T cells play a major role in both development and perpetuation of RA through activating macrophages and B cells. Since the lack of TNF-Related Apoptosis Inducing Ligand (TRAIL) expression resulted in defective thymocyte apoptosis leading to an autoimmune disease, we explored evidence for alterations in TRAIL/TRAIL receptor expression on peripheral T lymphocytes in the molecular mechanism of RA development. Methods The expression of TRAIL/TRAIL receptors on T cells in 20 RA patients and 12 control individuals were analyzed using flow cytometry. The correlation of TRAIL and its receptor expression profile was compared with clinical RA parameters (RA activity scored as per DAS28) using Spearman Rho Analysis. Results While no change was detected in the ratio of CD4+ to CD8+ T cells between controls and RA patient groups, upregulation of TRAIL and its receptors (both death and decoy) was detected on both CD4+ and CD8+ T cells in RA patients compared to control individuals. Death Receptor-4 (DR4) and the decoy receptors DcR1 and DcR2 on CD8+ T cells, but not on CD4+ T cells, were positively correlated with patients' DAS scores. Conclusions Our data suggest that TRAIL/TRAIL receptor expression profiles on T cells might be important in revelation of RA pathogenesis. PMID:20799941

  5. Xenoepitope substitution avoids deceptive imprinting and broadens the immune response to foot-and-mouth disease virus.

    PubMed

    Szczepanek, Steven M; Barrette, Roger W; Rood, Debra; Alejo, Diana; Silbart, Lawrence K

    2012-04-01

    Many RNA viruses encode error-prone polymerases which introduce mutations into B and T cell epitopes, providing a mechanism for immunological escape. When regions of hypervariability are found within immunodominant epitopes with no known function, they are referred to as "decoy epitopes," which often deceptively imprint the host's immune response. In this work, a decoy epitope was identified in the foot-and-mouth disease virus (FMDV) serotype O VP1 G-H loop after multiple sequence alignment of 118 isolates. A series of chimeric cyclic peptides resembling the type O G-H loop were prepared, each bearing a defined "B cell xenoepitope" from another virus in place of the native decoy epitope. These sequences were derived from porcine respiratory and reproductive syndrome virus (PRRSV), from HIV, or from a presumptively tolerogenic sequence from murine albumin and were subsequently used as immunogens in BALB/c mice. Cross-reactive antibody responses against all peptides were compared to a wild-type peptide and ovalbumin (OVA). A broadened antibody response was generated in animals inoculated with the PRRSV chimeric peptide, in which virus binding of serum antibodies was also observed. A B cell epitope mapping experiment did not reveal recognition of any contiguous linear epitopes, raising the possibility that the refocused response was directed to a conformational epitope. Taken together, these results indicate that xenoepitope substitution is a novel method for immune refocusing against decoy epitopes of RNA viruses such as FMDV as part of the rational design of next-generation vaccines.

  6. Function of OPG as a traffic regulator for RANKL is crucial for controlled osteoclastogenesis.

    PubMed

    Aoki, Shigeki; Honma, Masashi; Kariya, Yoshiaki; Nakamichi, Yuko; Ninomiya, Tadashi; Takahashi, Naoyuki; Udagawa, Nobuyuki; Suzuki, Hiroshi

    2010-09-01

    The amount of the receptor activator of NF-κB ligand (RANKL) on the osteoblastic cell surface is considered to determine the magnitude of the signal input to osteoclast precursors and the degree of osteoclastogenesis. Previously, we have shown that RANKL is localized predominantly in lysosomal organelles, but little is found on the osteoblastic cell surface, and consequently, the regulated subcellular trafficking of RANKL in osteoblastic cells is important for controlled osteoclastogenesis. Here we have examined the involvement of osteoprotegerin (OPG), which is currently recognized as a decoy receptor for RANKL, in the regulation of RANKL behavior. It was suggested that OPG already makes a complex with RANKL in the Golgi apparatus and that the complex formation is necessary for RANKL sorting to the secretory lysosomes. It was also shown that each structural domain of OPG is indispensable for exerting OPG function as a traffic regulator. In particular, the latter domains of OPG, whose physiologic functions have been unclear, were indicated to sort RANKL molecules to lysosomes from the Golgi apparatus. In addition, the overexpression of RANK-OPG chimeric protein, which retained OPG function as a decoy receptor but lost the function as a traffic regulator, inhibited endogenous OPG function as a traffic regulator selectively in osteoblastic cells and resulted in the upregulation of osteoclastogenic ability despite the increased number of decoy receptor molecules. Conclusively, OPG function as a traffic regulator for RANKL is crucial for regulating osteoclastogenesis at least as well as that as a decoy receptor. © 2010 American Society for Bone and Mineral Research.

  7. Reduction of Blood Pressure by AT1 Receptor Decoy Peptides.

    PubMed

    Re, Richard N; Chen, Ben; Alam, Jawed; Cook, Julia L

    2013-01-01

    We previously identified the binding of the chaperone protein gamma-aminobutyric acid receptor-associated protein (GABARAP) to a sequence on the carboxy-terminus of the angiotensin II AT1 receptor (AT1R) and showed that this binding enhances AT1R trafficking to the cell surface as well as angiotensin signaling. In this study, we treated sodium-depleted mice with decoy peptides consisting either of a fusion of the cell-penetrating peptide penetratin and the GABARAP/AT1R binding sequence or penetratin fused to a mutated AT1R sequence. We used telemetry to measure blood pressure. Systolic and diastolic pressure fell during the 24 hours following decoy peptide injection but not after control peptide injection. Active cell-penetrating decoy peptide decreased 24-hour average systolic blood pressure from 129.8 ± 4.7 mmHg to 125.0 ± 6.0 mmHg (mean ± standard deviation). Diastolic blood pressure fell from 99.0 ± 7.1 mmHg to 95.0 ± 9.2 mmHg (n=5). Administration of the control peptide raised systolic blood pressure from 128.7 ± 1.3 mmHg to 131.7 ± 2.9 mmHg and diastolic pressure from 93.9 ± 4.5 mmHg to 95.9 ± 4.2 mmHg (n=5). The decreases in both systolic and diastolic blood pressure after active peptide administration were statistically significant compared to control peptide administration (P<0.05, two-tailed Wilcoxon rank-sum test). These results indicate the physiological and potentially therapeutic relevance of inhibitors of GABARAP/AT1R binding.

  8. Abstract quantum computing machines and quantum computational logics

    NASA Astrophysics Data System (ADS)

    Chiara, Maria Luisa Dalla; Giuntini, Roberto; Sergioli, Giuseppe; Leporini, Roberto

    2016-06-01

    Classical and quantum parallelism are deeply different, although it is sometimes claimed that quantum Turing machines are nothing but special examples of classical probabilistic machines. We introduce the concepts of deterministic state machine, classical probabilistic state machine and quantum state machine. On this basis, we discuss the question: To what extent can quantum state machines be simulated by classical probabilistic state machines? Each state machine is devoted to a single task determined by its program. Real computers, however, behave differently, being able to solve different kinds of problems. This capacity can be modeled, in the quantum case, by the mathematical notion of abstract quantum computing machine, whose different programs determine different quantum state machines. The computations of abstract quantum computing machines can be linguistically described by the formulas of a particular form of quantum logic, termed quantum computational logic.

  9. A Template-Based Protein Structure Reconstruction Method Using Deep Autoencoder Learning.

    PubMed

    Li, Haiou; Lyu, Qiang; Cheng, Jianlin

    2016-12-01

    Protein structure prediction is an important problem in computational biology, and is widely applied to various biomedical problems such as protein function study, protein design, and drug design. In this work, we developed a novel deep learning approach based on a deeply stacked denoising autoencoder for protein structure reconstruction. We applied our approach to a template-based protein structure prediction using only the 3D structural coordinates of homologous template proteins as input. The templates were identified for a target protein by a PSI-BLAST search. 3DRobot (a program that automatically generates diverse and well-packed protein structure decoys) was used to generate initial decoy models for the target from the templates. A stacked denoising autoencoder was trained on the decoys to obtain a deep learning model for the target protein. The trained deep model was then used to reconstruct the final structural model for the target sequence. With target proteins that have highly similar template proteins as benchmarks, the GDT-TS score of the predicted structures is greater than 0.7, suggesting that the deep autoencoder is a promising method for protein structure reconstruction.

  10. Decoy Strategies: The Structure of TL1A:DcR3 Complex

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C Zhan; Y Patskovsky; Q Yan

    2011-12-31

    Decoy Receptor 3 (DcR3), a secreted member of the Tumor Necrosis Factor (TNF) receptor superfamily, neutralizes three different TNF ligands: FasL, LIGHT, and TL1A. Each of these ligands engages unique signaling receptors which direct distinct and critical immune responses. We report the crystal structures of the unliganded DcR3 ectodomain and its complex with TL1A, as well as complementary mutagenesis and biochemical studies. These analyses demonstrate that DcR3 interacts with invariant backbone and side-chain atoms in the membrane-proximal half of TL1A which supports recognition of its three distinct TNF ligands. Additional features serve as antideterminants that preclude interaction with other membersmore » of the TNF superfamily. This mode of interaction is unique among characterized TNF:TNFR family members and provides a mechanistic basis for the broadened specificity required to support the decoy function of DcR3, as well as for the rational manipulation of specificity and affinity of DcR3 and its ligands.« less

  11. Serum decoy receptor 3 level: a predictive marker for nodal metastasis and survival among oral cavity cancer patients.

    PubMed

    Tu, Hsi-Feng; Liu, Chung-Ji; Liu, Shyun-Yeu; Chen, Yu-Ping; Yu, En-Hao; Lin, Shu-Chun; Chang, Kuo-Wei

    2011-03-01

    Validating markers for prediction of nodal metastasis could be beneficial in treatment of oral cavity cancer. Decoy receptor 3 (DcR3), locus on 20q13, functions as a death decoy inhibiting apoptosis mediated by the tumor necrosis factor receptor (TNFR) family. This study analyzed the serum level of DcR3 in relationship to the clinical parameters of oral cavity cancer patients together with detection of DcR3 genomic copy number in primary and recurrent tumors. Elevated serum DcR3 was associated with nodal metastasis and worse prognosis. Gain of DcR3 copy number was detected in 17% of primary tumor tissue but not found in healthy areca chewers. Tissue from recurrent tumors showed more frequent DcR3 copy number alteration (48%) than the paired primary tumor tissue. Serum DcR3 level is a predictor for the nodal metastasis and survival among oral cavity cancer patients and the DcR3 copy number alteration could underlie oral carcinogenesis progression. Copyright © 2010 Wiley Periodicals, Inc.

  12. Docking ligands into flexible and solvated macromolecules. 7. Impact of protein flexibility and water molecules on docking-based virtual screening accuracy.

    PubMed

    Therrien, Eric; Weill, Nathanael; Tomberg, Anna; Corbeil, Christopher R; Lee, Devin; Moitessier, Nicolas

    2014-11-24

    The use of predictive computational methods in the drug discovery process is in a state of continual growth. Over the last two decades, an increasingly large number of docking tools have been developed to identify hits or optimize lead molecules through in-silico screening of chemical libraries to proteins. In recent years, the focus has been on implementing protein flexibility and water molecules. Our efforts led to the development of Fitted first reported in 2007 and further developed since then. In this study, we wished to evaluate the impact of protein flexibility and occurrence of water molecules on the accuracy of the Fitted docking program to discriminate active compounds from inactive compounds in virtual screening (VS) campaigns. For this purpose, a total of 171 proteins cocrystallized with small molecules representing 40 unique enzymes and receptors as well as sets of known ligands and decoys were selected from the Protein Data Bank (PDB) and the Directory of Useful Decoys (DUD), respectively. This study revealed that implementing displaceable crystallographic or computationally placed particle water molecules and protein flexibility can improve the enrichment in active compounds. In addition, an informed decision based on library diversity or research objectives (hit discovery vs lead optimization) on which implementation to use may lead to significant improvements.

  13. Preparation of freezing quantum state for quantum coherence

    NASA Astrophysics Data System (ADS)

    Yang, Lian-Wu; Man, Zhong-Xiao; Zhang, Ying-Jie; Han, Feng; Du, Shao-jiang; Xia, Yun-Jie

    2018-06-01

    We provide a method to prepare the freezing quantum state for quantum coherence via unitary operations. The initial product state consists of the control qubit and target qubit; when it satisfies certain conditions, the initial product state converts into the particular Bell diagonal state under the unitary operations, which have the property of freezing of quantum coherence under quantum channels. We calculate the frozen quantum coherence and corresponding quantum correlations, and find that the quantities are determined by the control qubit only when the freezing phenomena occur.

  14. Non-Markovian Complexity in the Quantum-to-Classical Transition

    PubMed Central

    Xiong, Heng-Na; Lo, Ping-Yuan; Zhang, Wei-Min; Feng, Da Hsuan; Nori, Franco

    2015-01-01

    The quantum-to-classical transition is due to environment-induced decoherence, and it depicts how classical dynamics emerges from quantum systems. Previously, the quantum-to-classical transition has mainly been described with memory-less (Markovian) quantum processes. Here we study the complexity of the quantum-to-classical transition through general non-Markovian memory processes. That is, the influence of various reservoirs results in a given initial quantum state evolving into one of the following four scenarios: thermal state, thermal-like state, quantum steady state, or oscillating quantum nonstationary state. In the latter two scenarios, the system maintains partial or full quantum coherence due to the strong non-Markovian memory effect, so that in these cases, the quantum-to-classical transition never occurs. This unexpected new feature provides a new avenue for the development of future quantum technologies because the remaining quantum oscillations in steady states are decoherence-free. PMID:26303002

  15. Distribution of Bell-inequality violation versus multiparty-quantum-correlation measures

    NASA Astrophysics Data System (ADS)

    Sharma, Kunal; Das, Tamoghna; Sen (de), Aditi; Sen, Ujjwal

    Violation of a Bell inequality guarantees the existence of quantum correlations in a shared quantum state. A pure bipartite quantum state, having nonvanishing quantum correlation, always violates a Bell inequality. Such correspondence is absent for multipartite pure quantum states in the case of multipartite correlation function Bell inequalities with two settings at each site. We establish a connection between the monogamy of Bell-inequality violation and multiparty quantum correlations for shared multisite quantum states. We believe that the relation is generic, as it is true for a number of different multisite measures that are defined from radically different perspectives. Precisely, we quantify the multisite-quantum-correlation content in the states by generalized geometric measure, a genuine multisite entanglement measure, as well as three monogamybased multiparty-quantum-correlation measures, viz., 3-tangle, quantum-discord score, and quantum-work-deficit score. We find that generalized Greenberger-Horne-Zeilinger states and another single-parameter family of states, which we refer to as the special Greenberger-Horne-Zeilinger states, have the status of extremal states in such relations.

  16. Distribution of Bell-inequality violation versus multiparty-quantum-correlation measures

    NASA Astrophysics Data System (ADS)

    Sharma, Kunal; Das, Tamoghna; SenDe, Aditi; Sen, Ujjwal

    2016-06-01

    Violation of a Bell inequality guarantees the existence of quantum correlations in a shared quantum state. A pure bipartite quantum state, having nonvanishing quantum correlation, always violates a Bell inequality. Such correspondence is absent for multipartite pure quantum states in the case of multipartite correlation function Bell inequalities with two settings at each site. We establish a connection between the monogamy of Bell-inequality violation and multiparty quantum correlations for shared multisite quantum states. We believe that the relation is generic, as it is true for a number of different multisite measures that are defined from radically different perspectives. Precisely, we quantify the multisite-quantum-correlation content in the states by generalized geometric measure, a genuine multisite entanglement measure, as well as three monogamy-based multiparty-quantum-correlation measures, viz., 3-tangle, quantum-discord score, and quantum-work-deficit score. We find that generalized Greenberger-Horne-Zeilinger states and another single-parameter family of states, which we refer to as the special Greenberger-Horne-Zeilinger states, have the status of extremal states in such relations.

  17. Optimizing physical energy functions for protein folding.

    PubMed

    Fujitsuka, Yoshimi; Takada, Shoji; Luthey-Schulten, Zaida A; Wolynes, Peter G

    2004-01-01

    We optimize a physical energy function for proteins with the use of the available structural database and perform three benchmark tests of the performance: (1) recognition of native structures in the background of predefined decoy sets of Levitt, (2) de novo structure prediction using fragment assembly sampling, and (3) molecular dynamics simulations. The energy parameter optimization is based on the energy landscape theory and uses a Monte Carlo search to find a set of parameters that seeks the largest ratio deltaE(s)/DeltaE for all proteins in a training set simultaneously. Here, deltaE(s) is the stability gap between the native and the average in the denatured states and DeltaE is the energy fluctuation among these states. Some of the energy parameters optimized are found to show significant correlation with experimentally observed quantities: (1) In the recognition test, the optimized function assigns the lowest energy to either the native or a near-native structure among many decoy structures for all the proteins studied. (2) Structure prediction with the fragment assembly sampling gives structure models with root mean square deviation less than 6 A in one of the top five cluster centers for five of six proteins studied. (3) Structure prediction using molecular dynamics simulation gives poorer performance, implying the importance of having a more precise description of local structures. The physical energy function solely inferred from a structural database neither utilizes sequence information from the family of the target nor the outcome of the secondary structure prediction but can produce the correct native fold for many small proteins. Copyright 2003 Wiley-Liss, Inc.

  18. Memory-built-in quantum cloning in a hybrid solid-state spin register

    NASA Astrophysics Data System (ADS)

    Wang, W.-B.; Zu, C.; He, L.; Zhang, W.-G.; Duan, L.-M.

    2015-07-01

    As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provides an important strategy for eavesdropping in quantum cryptography. We report an experiment that realizes cloning of quantum states from an electron spin to a nuclear spin in a hybrid solid-state spin register with near-optimal fidelity. The nuclear spin provides an ideal memory qubit at room temperature, which stores the cloned quantum states for a millisecond under ambient conditions, exceeding the lifetime of the original quantum state carried by the electron spin by orders of magnitude. The realization of a cloning machine with built-in quantum memory provides a key step for application of quantum cloning in quantum information science.

  19. Memory-built-in quantum cloning in a hybrid solid-state spin register.

    PubMed

    Wang, W-B; Zu, C; He, L; Zhang, W-G; Duan, L-M

    2015-07-16

    As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provides an important strategy for eavesdropping in quantum cryptography. We report an experiment that realizes cloning of quantum states from an electron spin to a nuclear spin in a hybrid solid-state spin register with near-optimal fidelity. The nuclear spin provides an ideal memory qubit at room temperature, which stores the cloned quantum states for a millisecond under ambient conditions, exceeding the lifetime of the original quantum state carried by the electron spin by orders of magnitude. The realization of a cloning machine with built-in quantum memory provides a key step for application of quantum cloning in quantum information science.

  20. Einstein-Podolsky-Rosen-steering swapping between two Gaussian multipartite entangled states

    NASA Astrophysics Data System (ADS)

    Wang, Meihong; Qin, Zhongzhong; Wang, Yu; Su, Xiaolong

    2017-08-01

    Multipartite Einstein-Podolsky-Rosen (EPR) steering is a useful quantum resource for quantum communication in quantum networks. It has potential applications in secure quantum communication, such as one-sided device-independent quantum key distribution and quantum secret sharing. By distributing optical modes of a multipartite entangled state to space-separated quantum nodes, a local quantum network can be established. Based on the existing multipartite EPR steering in a local quantum network, secure quantum communication protocol can be accomplished. In this manuscript, we present swapping schemes for EPR steering between two space-separated Gaussian multipartite entangled states, which can be used to connect two space-separated quantum networks. Two swapping schemes, including the swapping between a tripartite Greenberger-Horne-Zeilinger (GHZ) entangled state and an EPR entangled state and that between two tripartite GHZ entangled states, are analyzed. Various types of EPR steering are presented after the swapping of two space-separated independent multipartite entanglement states without direct interaction, which can be used to implement quantum communication between two quantum networks. The presented schemes provide technical reference for more complicated quantum networks with EPR steering.

  1. Quantifying matrix product state

    NASA Astrophysics Data System (ADS)

    Bhatia, Amandeep Singh; Kumar, Ajay

    2018-03-01

    Motivated by the concept of quantum finite-state machines, we have investigated their relation with matrix product state of quantum spin systems. Matrix product states play a crucial role in the context of quantum information processing and are considered as a valuable asset for quantum information and communication purpose. It is an effective way to represent states of entangled systems. In this paper, we have designed quantum finite-state machines of one-dimensional matrix product state representations for quantum spin systems.

  2. Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Wu, Shengyao; Wang, Mingming; Sun, Le; Wang, Xiaojun

    2017-12-01

    As one of important research branches of quantum communication, deterministic remote state preparation (DRSP) plays a significant role in quantum network. Quantum noises are prevalent in quantum communication, and it can seriously affect the safety and reliability of quantum communication system. In this paper, we study the effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via different quantum channels including the χ state, Brown state and GHZ state. Firstly, the output states and fidelities of three DRSP algorithms via different quantum entangled channels in four noisy environments, including amplitude-damping, phase-damping, bit-flip and depolarizing noise, are presented, respectively. And then, the effects of noises on three kinds of preparation algorithms in the same noisy environment are discussed. In final, the theoretical analysis proves that the effect of noise in the process of quantum state preparation is only related to the noise type and the size of noise factor and independent of the different entangled quantum channels. Furthermore, another important conclusion is given that the effect of noise is also independent of how to distribute intermediate particles for implementing DRSP through quantum measurement during the concrete preparation process. These conclusions will be very helpful for improving the efficiency and safety of quantum communication in a noisy environment.

  3. Memory-built-in quantum cloning in a hybrid solid-state spin register

    PubMed Central

    Wang, W.-B.; Zu, C.; He, L.; Zhang, W.-G.; Duan, L.-M.

    2015-01-01

    As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provides an important strategy for eavesdropping in quantum cryptography. We report an experiment that realizes cloning of quantum states from an electron spin to a nuclear spin in a hybrid solid-state spin register with near-optimal fidelity. The nuclear spin provides an ideal memory qubit at room temperature, which stores the cloned quantum states for a millisecond under ambient conditions, exceeding the lifetime of the original quantum state carried by the electron spin by orders of magnitude. The realization of a cloning machine with built-in quantum memory provides a key step for application of quantum cloning in quantum information science. PMID:26178617

  4. Experimental Machine Learning of Quantum States

    NASA Astrophysics Data System (ADS)

    Gao, Jun; Qiao, Lu-Feng; Jiao, Zhi-Qiang; Ma, Yue-Chi; Hu, Cheng-Qiu; Ren, Ruo-Jing; Yang, Ai-Lin; Tang, Hao; Yung, Man-Hong; Jin, Xian-Min

    2018-06-01

    Quantum information technologies provide promising applications in communication and computation, while machine learning has become a powerful technique for extracting meaningful structures in "big data." A crossover between quantum information and machine learning represents a new interdisciplinary area stimulating progress in both fields. Traditionally, a quantum state is characterized by quantum-state tomography, which is a resource-consuming process when scaled up. Here we experimentally demonstrate a machine-learning approach to construct a quantum-state classifier for identifying the separability of quantum states. We show that it is possible to experimentally train an artificial neural network to efficiently learn and classify quantum states, without the need of obtaining the full information of the states. We also show how adding a hidden layer of neurons to the neural network can significantly boost the performance of the state classifier. These results shed new light on how classification of quantum states can be achieved with limited resources, and represent a step towards machine-learning-based applications in quantum information processing.

  5. Quantumness-generating capability of quantum dynamics

    NASA Astrophysics Data System (ADS)

    Li, Nan; Luo, Shunlong; Mao, Yuanyuan

    2018-04-01

    We study quantumness-generating capability of quantum dynamics, where quantumness refers to the noncommutativity between the initial state and the evolving state. In terms of the commutator of the square roots of the initial state and the evolving state, we define a measure to quantify the quantumness-generating capability of quantum dynamics with respect to initial states. Quantumness-generating capability is absent in classical dynamics and hence is a fundamental characteristic of quantum dynamics. For qubit systems, we present an analytical form for this measure, by virtue of which we analyze several prototypical dynamics such as unitary dynamics, phase damping dynamics, amplitude damping dynamics, and random unitary dynamics (Pauli channels). Necessary and sufficient conditions for the monotonicity of quantumness-generating capability are also identified. Finally, we compare these conditions for the monotonicity of quantumness-generating capability with those for various Markovianities and illustrate that quantumness-generating capability and quantum Markovianity are closely related, although they capture different aspects of quantum dynamics.

  6. Two-qubit quantum cloning machine and quantum correlation broadcasting

    NASA Astrophysics Data System (ADS)

    Kheirollahi, Azam; Mohammadi, Hamidreza; Akhtarshenas, Seyed Javad

    2016-11-01

    Due to the axioms of quantum mechanics, perfect cloning of an unknown quantum state is impossible. But since imperfect cloning is still possible, a question arises: "Is there an optimal quantum cloning machine?" Buzek and Hillery answered this question and constructed their famous B-H quantum cloning machine. The B-H machine clones the state of an arbitrary single qubit in an optimal manner and hence it is universal. Generalizing this machine for a two-qubit system is straightforward, but during this procedure, except for product states, this machine loses its universality and becomes a state-dependent cloning machine. In this paper, we propose some classes of optimal universal local quantum state cloners for a particular class of two-qubit systems, more precisely, for a class of states with known Schmidt basis. We then extend our machine to the case that the Schmidt basis of the input state is deviated from the local computational basis of the machine. We show that more local quantum coherence existing in the input state corresponds to less fidelity between the input and output states. Also we present two classes of a state-dependent local quantum copying machine. Furthermore, we investigate local broadcasting of two aspects of quantum correlations, i.e., quantum entanglement and quantum discord, defined, respectively, within the entanglement-separability paradigm and from an information-theoretic perspective. The results show that although quantum correlation is, in general, very fragile during the broadcasting procedure, quantum discord is broadcasted more robustly than quantum entanglement.

  7. MicroRNA-433 Dampens Glucocorticoid Receptor Signaling, Impacting Circadian Rhythm and Osteoblastic Gene Expression.

    PubMed

    Smith, Spenser S; Dole, Neha S; Franceschetti, Tiziana; Hrdlicka, Henry C; Delany, Anne M

    2016-10-07

    Serum glucocorticoids play a critical role in synchronizing circadian rhythm in peripheral tissues, and multiple mechanisms regulate tissue sensitivity to glucocorticoids. In the skeleton, circadian rhythm helps coordinate bone formation and resorption. Circadian rhythm is regulated through transcriptional and post-transcriptional feedback loops that include microRNAs. How microRNAs regulate circadian rhythm in bone is unexplored. We show that in mouse calvaria, miR-433 displays robust circadian rhythm, peaking just after dark. In C3H/10T1/2 cells synchronized with a pulse of dexamethasone, inhibition of miR-433 using a tough decoy altered the period and amplitude of Per2 gene expression, suggesting that miR-433 regulates rhythm. Although miR-433 does not directly target the Per2 3'-UTR, it does target two rhythmically expressed genes in calvaria, Igf1 and Hif1α. miR-433 can target the glucocorticoid receptor; however, glucocorticoid receptor protein abundance was unaffected in miR-433 decoy cells. Rather, miR-433 inhibition dramatically enhanced glucocorticoid signaling due to increased nuclear receptor translocation, activating glucocorticoid receptor transcriptional targets. Last, in calvaria of transgenic mice expressing a miR-433 decoy in osteoblastic cells (Col3.6 promoter), the amplitude of Per2 and Bmal1 mRNA rhythm was increased, confirming that miR-433 regulates circadian rhythm. miR-433 was previously shown to target Runx2, and mRNA for Runx2 and its downstream target, osteocalcin, were also increased in miR-433 decoy mouse calvaria. We hypothesize that miR-433 helps maintain circadian rhythm in osteoblasts by regulating sensitivity to glucocorticoid receptor signaling. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  8. Dual Agonist Surrobody Simultaneously Activates Death Receptors DR4 and DR5 to Induce Cancer Cell Death.

    PubMed

    Milutinovic, Snezana; Kashyap, Arun K; Yanagi, Teruki; Wimer, Carina; Zhou, Sihong; O'Neil, Ryann; Kurtzman, Aaron L; Faynboym, Alexsandr; Xu, Li; Hannum, Charles H; Diaz, Paul W; Matsuzawa, Shu-ichi; Horowitz, Michael; Horowitz, Lawrence; Bhatt, Ramesh R; Reed, John C

    2016-01-01

    Death receptors of the TNF family are found on the surface of most cancer cells and their activation typically kills cancer cells through the stimulation of the extrinsic apoptotic pathway. The endogenous ligand for death receptors 4 and 5 (DR4 and DR5) is TNF-related apoptosis-inducing ligand, TRAIL (Apo2L). As most untransformed cells are not susceptible to TRAIL-induced apoptosis, death receptor activators have emerged as promising cancer therapeutic agents. One strategy to stimulate death receptors in cancer patients is to use soluble human recombinant TRAIL protein, but this agent has limitations of a short half-life and decoy receptor sequestration. Another strategy that attempted to evade decoy receptor sequestration and to provide improved pharmacokinetic properties was to generate DR4 or DR5 agonist antibodies. The resulting monoclonal agonist antibodies overcame the limitations of short half-life and avoided decoy receptor sequestration, but are limited by activating only one of the two death receptors. Here, we describe a DR4 and DR5 dual agonist produced using Surrobody technology that activates both DR4 and DR5 to induce apoptotic death of cancer cells in vitro and in vivo and also avoids decoy receptor sequestration. This fully human anti-DR4/DR5 Surrobody displays superior potency to DR4- and DR5-specific antibodies, even when combined with TRAIL-sensitizing proapoptotic agents. Moreover, cancer cells were less likely to acquire resistance to Surrobody than either anti-DR4 or anti-DR5 monospecific antibodies. Taken together, Surrobody shows promising preclinical proapoptotic activity against cancer cells, meriting further exploration of its potential as a novel cancer therapeutic agent. ©2015 American Association for Cancer Research.

  9. Dual agonist Surrobody™ simultaneously activates death receptors DR4 and DR5 to induce cancer cell death

    PubMed Central

    Milutinovic, Snezana; Kashyap, Arun K.; Yanagi, Teruki; Wimer, Carina; Zhou, Sihong; O' Neil, Ryann; Kurtzman, Aaron L.; Faynboym, Alexsandr; Xu, Li; Hannum, Charles H.; Diaz, Paul W.; Matsuzawa, Shu-ichi; Horowitz, Michael; Horowitz, Lawrence; Bhatt, Ramesh R.; Reed, John C.

    2015-01-01

    Death receptors of the Tumor Necrosis Factor (TNF) family are found on surface of most cancer cells and their activation typically kills cancer cells through the stimulation of the extrinsic apoptotic pathway. The endogenous ligand for death receptors-4 and -5 (DR4 and DR5) is Tumor Necrosis Factor-Related Apoptosis-Inducing Ligand, TRAIL (Apo2L). Since most untransformed cells are not susceptible to TRAIL-induced apoptosis, death receptor activators have emerged as promising cancer therapeutic agents. One strategy to stimulate death receptors in cancer patients is to use soluble human recombinant TRAIL protein, but this agent has limitations of a short half-life and decoy receptor sequestration. Another strategy that attempted to evade decoy receptor sequestration and to provide improved pharmacokinetic properties was to generate DR4 or DR5 agonist antibodies. The resulting monoclonal agonist antibodies overcame the limitations of short half-life and avoided decoy receptor sequestration, but are limited by activating only one of the two death receptors. Here, we describe a DR4 and DR5 dual agonist produced using Surrobody™ technology that activates both DR4 and DR5 to induce apoptotic death of cancer cells in vitro and in vivo and also avoids decoy receptor sequestration. This fully human anti-DR4/DR5 Surrobody displays superior potency to DR4- and DR5-specific antibodies, even when combined with TRAIL-sensitizing pro-apoptotic agents. Moreover, cancer cells were less likely to acquire resistance to Surrobody than either anti-DR4 or anti-DR5 mono-specific antibodies. Taken together, Surrobody shows promising preclinical pro-apoptotic activity against cancer cells, meriting further exploration of its potential as a novel cancer therapeutic agent. PMID:26516157

  10. MicroRNA-433 Dampens Glucocorticoid Receptor Signaling, Impacting Circadian Rhythm and Osteoblastic Gene Expression*

    PubMed Central

    Smith, Spenser S.; Dole, Neha S.; Franceschetti, Tiziana; Hrdlicka, Henry C.; Delany, Anne M.

    2016-01-01

    Serum glucocorticoids play a critical role in synchronizing circadian rhythm in peripheral tissues, and multiple mechanisms regulate tissue sensitivity to glucocorticoids. In the skeleton, circadian rhythm helps coordinate bone formation and resorption. Circadian rhythm is regulated through transcriptional and post-transcriptional feedback loops that include microRNAs. How microRNAs regulate circadian rhythm in bone is unexplored. We show that in mouse calvaria, miR-433 displays robust circadian rhythm, peaking just after dark. In C3H/10T1/2 cells synchronized with a pulse of dexamethasone, inhibition of miR-433 using a tough decoy altered the period and amplitude of Per2 gene expression, suggesting that miR-433 regulates rhythm. Although miR-433 does not directly target the Per2 3′-UTR, it does target two rhythmically expressed genes in calvaria, Igf1 and Hif1α. miR-433 can target the glucocorticoid receptor; however, glucocorticoid receptor protein abundance was unaffected in miR-433 decoy cells. Rather, miR-433 inhibition dramatically enhanced glucocorticoid signaling due to increased nuclear receptor translocation, activating glucocorticoid receptor transcriptional targets. Last, in calvaria of transgenic mice expressing a miR-433 decoy in osteoblastic cells (Col3.6 promoter), the amplitude of Per2 and Bmal1 mRNA rhythm was increased, confirming that miR-433 regulates circadian rhythm. miR-433 was previously shown to target Runx2, and mRNA for Runx2 and its downstream target, osteocalcin, were also increased in miR-433 decoy mouse calvaria. We hypothesize that miR-433 helps maintain circadian rhythm in osteoblasts by regulating sensitivity to glucocorticoid receptor signaling. PMID:27551048

  11. Realization of reliable solid-state quantum memory for photonic polarization qubit.

    PubMed

    Zhou, Zong-Quan; Lin, Wei-Bin; Yang, Ming; Li, Chuan-Feng; Guo, Guang-Can

    2012-05-11

    Faithfully storing an unknown quantum light state is essential to advanced quantum communication and distributed quantum computation applications. The required quantum memory must have high fidelity to improve the performance of a quantum network. Here we report the reversible transfer of photonic polarization states into collective atomic excitation in a compact solid-state device. The quantum memory is based on an atomic frequency comb (AFC) in rare-earth ion-doped crystals. We obtain up to 0.999 process fidelity for the storage and retrieval process of single-photon-level coherent pulse. This reliable quantum memory is a crucial step toward quantum networks based on solid-state devices.

  12. Engineering two-photon high-dimensional states through quantum interference

    PubMed Central

    Zhang, Yingwen; Roux, Filippus S.; Konrad, Thomas; Agnew, Megan; Leach, Jonathan; Forbes, Andrew

    2016-01-01

    Many protocols in quantum science, for example, linear optical quantum computing, require access to large-scale entangled quantum states. Such systems can be realized through many-particle qubits, but this approach often suffers from scalability problems. An alternative strategy is to consider a lesser number of particles that exist in high-dimensional states. The spatial modes of light are one such candidate that provides access to high-dimensional quantum states, and thus they increase the storage and processing potential of quantum information systems. We demonstrate the controlled engineering of two-photon high-dimensional states entangled in their orbital angular momentum through Hong-Ou-Mandel interference. We prepare a large range of high-dimensional entangled states and implement precise quantum state filtering. We characterize the full quantum state before and after the filter, and are thus able to determine that only the antisymmetric component of the initial state remains. This work paves the way for high-dimensional processing and communication of multiphoton quantum states, for example, in teleportation beyond qubits. PMID:26933685

  13. Quantum machine learning for quantum anomaly detection

    NASA Astrophysics Data System (ADS)

    Liu, Nana; Rebentrost, Patrick

    2018-04-01

    Anomaly detection is used for identifying data that deviate from "normal" data patterns. Its usage on classical data finds diverse applications in many important areas such as finance, fraud detection, medical diagnoses, data cleaning, and surveillance. With the advent of quantum technologies, anomaly detection of quantum data, in the form of quantum states, may become an important component of quantum applications. Machine-learning algorithms are playing pivotal roles in anomaly detection using classical data. Two widely used algorithms are the kernel principal component analysis and the one-class support vector machine. We find corresponding quantum algorithms to detect anomalies in quantum states. We show that these two quantum algorithms can be performed using resources that are logarithmic in the dimensionality of quantum states. For pure quantum states, these resources can also be logarithmic in the number of quantum states used for training the machine-learning algorithm. This makes these algorithms potentially applicable to big quantum data applications.

  14. Generalized teleportation by quantum walks

    NASA Astrophysics Data System (ADS)

    Wang, Yu; Shang, Yun; Xue, Peng

    2017-09-01

    We develop a generalized teleportation scheme based on quantum walks with two coins. For an unknown qubit state, we use two-step quantum walks on the line and quantum walks on the cycle with four vertices for teleportation. For any d-dimensional states, quantum walks on complete graphs and quantum walks on d-regular graphs can be used for implementing teleportation. Compared with existing d-dimensional states teleportation, prior entangled state is not required and the necessary maximal entanglement resource is generated by the first step of quantum walk. Moreover, two projective measurements with d elements are needed by quantum walks on the complete graph, rather than one joint measurement with d^2 basis states. Quantum walks have many applications in quantum computation and quantum simulations. This is the first scheme of realizing communicating protocol with quantum walks, thus opening wider applications.

  15. Analysis of Optimal Sequential State Discrimination for Linearly Independent Pure Quantum States.

    PubMed

    Namkung, Min; Kwon, Younghun

    2018-04-25

    Recently, J. A. Bergou et al. proposed sequential state discrimination as a new quantum state discrimination scheme. In the scheme, by the successful sequential discrimination of a qubit state, receivers Bob and Charlie can share the information of the qubit prepared by a sender Alice. A merit of the scheme is that a quantum channel is established between Bob and Charlie, but a classical communication is not allowed. In this report, we present a method for extending the original sequential state discrimination of two qubit states to a scheme of N linearly independent pure quantum states. Specifically, we obtain the conditions for the sequential state discrimination of N = 3 pure quantum states. We can analytically provide conditions when there is a special symmetry among N = 3 linearly independent pure quantum states. Additionally, we show that the scenario proposed in this study can be applied to quantum key distribution. Furthermore, we show that the sequential state discrimination of three qutrit states performs better than the strategy of probabilistic quantum cloning.

  16. Control aspects of quantum computing using pure and mixed states.

    PubMed

    Schulte-Herbrüggen, Thomas; Marx, Raimund; Fahmy, Amr; Kauffman, Louis; Lomonaco, Samuel; Khaneja, Navin; Glaser, Steffen J

    2012-10-13

    Steering quantum dynamics such that the target states solve classically hard problems is paramount to quantum simulation and computation. And beyond, quantum control is also essential to pave the way to quantum technologies. Here, important control techniques are reviewed and presented in a unified frame covering quantum computational gate synthesis and spectroscopic state transfer alike. We emphasize that it does not matter whether the quantum states of interest are pure or not. While pure states underly the design of quantum circuits, ensemble mixtures of quantum states can be exploited in a more recent class of algorithms: it is illustrated by characterizing the Jones polynomial in order to distinguish between different (classes of) knots. Further applications include Josephson elements, cavity grids, ion traps and nitrogen vacancy centres in scenarios of closed as well as open quantum systems.

  17. Control aspects of quantum computing using pure and mixed states

    PubMed Central

    Schulte-Herbrüggen, Thomas; Marx, Raimund; Fahmy, Amr; Kauffman, Louis; Lomonaco, Samuel; Khaneja, Navin; Glaser, Steffen J.

    2012-01-01

    Steering quantum dynamics such that the target states solve classically hard problems is paramount to quantum simulation and computation. And beyond, quantum control is also essential to pave the way to quantum technologies. Here, important control techniques are reviewed and presented in a unified frame covering quantum computational gate synthesis and spectroscopic state transfer alike. We emphasize that it does not matter whether the quantum states of interest are pure or not. While pure states underly the design of quantum circuits, ensemble mixtures of quantum states can be exploited in a more recent class of algorithms: it is illustrated by characterizing the Jones polynomial in order to distinguish between different (classes of) knots. Further applications include Josephson elements, cavity grids, ion traps and nitrogen vacancy centres in scenarios of closed as well as open quantum systems. PMID:22946034

  18. Threshold quantum state sharing based on entanglement swapping

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Tso, Raylin

    2018-06-01

    A threshold quantum state sharing scheme is proposed. The dealer uses the quantum-controlled-not operations to expand the d-dimensional quantum state and then uses the entanglement swapping to distribute the state to a random subset of participants. The participants use the single-particle measurements and unitary operations to recover the initial quantum state. In our scheme, the dealer can share different quantum states among different subsets of participants simultaneously. So the scheme will be very flexible in practice.

  19. Non-unitary probabilistic quantum computing circuit and method

    NASA Technical Reports Server (NTRS)

    Williams, Colin P. (Inventor); Gingrich, Robert M. (Inventor)

    2009-01-01

    A quantum circuit performing quantum computation in a quantum computer. A chosen transformation of an initial n-qubit state is probabilistically obtained. The circuit comprises a unitary quantum operator obtained from a non-unitary quantum operator, operating on an n-qubit state and an ancilla state. When operation on the ancilla state provides a success condition, computation is stopped. When operation on the ancilla state provides a failure condition, computation is performed again on the ancilla state and the n-qubit state obtained in the previous computation, until a success condition is obtained.

  20. Entangled states in quantum mechanics

    NASA Astrophysics Data System (ADS)

    Ruža, Jānis

    2010-01-01

    In some circles of quantum physicists, a view is maintained that the nonseparability of quantum systems-i.e., the entanglement-is a characteristic feature of quantum mechanics. According to this view, the entanglement plays a crucial role in the solution of quantum measurement problem, the origin of the “classicality” from the quantum physics, the explanation of the EPR paradox by a nonlocal character of the quantum world. Besides, the entanglement is regarded as a cornerstone of such modern disciplines as quantum computation, quantum cryptography, quantum information, etc. At the same time, entangled states are well known and widely used in various physics areas. In particular, this notion is widely used in nuclear, atomic, molecular, solid state physics, in scattering and decay theories as well as in other disciplines, where one has to deal with many-body quantum systems. One of the methods, how to construct the basis states of a composite many-body quantum system, is the so-called genealogical decomposition method. Genealogical decomposition allows one to construct recurrently by particle number the basis states of a composite quantum system from the basis states of its forming subsystems. These coupled states have a structure typical for entangled states. If a composite system is stable, the internal structure of its forming basis states does not manifest itself in measurements. However, if a composite system is unstable and decays onto its forming subsystems, then the measurables are the quantum numbers, associated with these subsystems. In such a case, the entangled state has a dynamical origin, determined by the Hamiltonian of the corresponding decay process. Possible correlations between the quantum numbers of resulting subsystems are determined by the symmetries-conservation laws of corresponding dynamical variables, and not by the quantum entanglement feature.

  1. High-dimensional quantum cloning and applications to quantum hacking

    PubMed Central

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W.; Karimi, Ebrahim

    2017-01-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. PMID:28168219

  2. High-dimensional quantum cloning and applications to quantum hacking.

    PubMed

    Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim

    2017-02-01

    Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.

  3. Neural-Network Quantum States, String-Bond States, and Chiral Topological States

    NASA Astrophysics Data System (ADS)

    Glasser, Ivan; Pancotti, Nicola; August, Moritz; Rodriguez, Ivan D.; Cirac, J. Ignacio

    2018-01-01

    Neural-network quantum states have recently been introduced as an Ansatz for describing the wave function of quantum many-body systems. We show that there are strong connections between neural-network quantum states in the form of restricted Boltzmann machines and some classes of tensor-network states in arbitrary dimensions. In particular, we demonstrate that short-range restricted Boltzmann machines are entangled plaquette states, while fully connected restricted Boltzmann machines are string-bond states with a nonlocal geometry and low bond dimension. These results shed light on the underlying architecture of restricted Boltzmann machines and their efficiency at representing many-body quantum states. String-bond states also provide a generic way of enhancing the power of neural-network quantum states and a natural generalization to systems with larger local Hilbert space. We compare the advantages and drawbacks of these different classes of states and present a method to combine them together. This allows us to benefit from both the entanglement structure of tensor networks and the efficiency of neural-network quantum states into a single Ansatz capable of targeting the wave function of strongly correlated systems. While it remains a challenge to describe states with chiral topological order using traditional tensor networks, we show that, because of their nonlocal geometry, neural-network quantum states and their string-bond-state extension can describe a lattice fractional quantum Hall state exactly. In addition, we provide numerical evidence that neural-network quantum states can approximate a chiral spin liquid with better accuracy than entangled plaquette states and local string-bond states. Our results demonstrate the efficiency of neural networks to describe complex quantum wave functions and pave the way towards the use of string-bond states as a tool in more traditional machine-learning applications.

  4. Macroscopic quantum states: Measures, fragility, and implementations

    NASA Astrophysics Data System (ADS)

    Fröwis, Florian; Sekatski, Pavel; Dür, Wolfgang; Gisin, Nicolas; Sangouard, Nicolas

    2018-04-01

    Large-scale quantum effects have always played an important role in the foundations of quantum theory. With recent experimental progress and the aspiration for quantum enhanced applications, the interest in macroscopic quantum effects has been reinforced. In this review, measures aiming to quantify various aspects of macroscopic quantumness are critically analyzed and discussed. Recent results on the difficulties and prospects to create, maintain, and detect macroscopic quantum states are surveyed. The role of macroscopic quantum states in foundational questions as well as practical applications is outlined. Finally, past and ongoing experimental advances aiming to generate and observe macroscopic quantum states are presented.

  5. TRAM-Derived Decoy Peptides inhibits the inflammatory response in mouse mammary epithelial cells and a mastitis model in mice.

    PubMed

    Hu, Xiaoyu; Tian, Yuan; Wang, Tiancheng; Zhang, Wenlong; Wang, Wei; Gao, Xuejiao; Qu, Shihui; Cao, Yongguo; Zhang, Naisheng

    2015-10-05

    It has been proved that TRAM-Derived Decoy peptides have anti-inflammatory properties. In this study, we synthesized a TRAM-Derived decoy peptide (TM6), belongs to TRAM TIR domain, of which sequence is "N"-RQIKIWFQNRRMKWK, KENFLRDTWCNFQFY-"C" and evaluated the effects of TM6 on lipopolysaccharide-induced mastitis in mice. In vivo, LPS-induced mice mastitis model was established by injection of LPS through the duct of mammary gland. TM6 was injected 1h before or after LPS treatment. In vitro, primary mouse mammary epithelial cells were used to investigate the effects of TM6 on LPS-induced inflammatory responses. The results showed that TM6 inhibited LPS-induced mammary gland histopathologic changes, MPO activity, and TNF-α, IL-1β and IL-6 production in mice. In vitro, TM6 significantly inhibited LPS-induced TNF-α and IL-6 production, as well as NF-κB and MAPKs activation. In conclusion, this study demonstrated that TM6 had protective effects on LPS-mastitis and may be a promising therapeutic reagent for mastitis treatment. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Identify High-Quality Protein Structural Models by Enhanced K-Means.

    PubMed

    Wu, Hongjie; Li, Haiou; Jiang, Min; Chen, Cheng; Lv, Qiang; Wu, Chuang

    2017-01-01

    Background. One critical issue in protein three-dimensional structure prediction using either ab initio or comparative modeling involves identification of high-quality protein structural models from generated decoys. Currently, clustering algorithms are widely used to identify near-native models; however, their performance is dependent upon different conformational decoys, and, for some algorithms, the accuracy declines when the decoy population increases. Results. Here, we proposed two enhanced K -means clustering algorithms capable of robustly identifying high-quality protein structural models. The first one employs the clustering algorithm SPICKER to determine the initial centroids for basic K -means clustering ( SK -means), whereas the other employs squared distance to optimize the initial centroids ( K -means++). Our results showed that SK -means and K -means++ were more robust as compared with SPICKER alone, detecting 33 (59%) and 42 (75%) of 56 targets, respectively, with template modeling scores better than or equal to those of SPICKER. Conclusions. We observed that the classic K -means algorithm showed a similar performance to that of SPICKER, which is a widely used algorithm for protein-structure identification. Both SK -means and K -means++ demonstrated substantial improvements relative to results from SPICKER and classical K -means.

  7. Identify High-Quality Protein Structural Models by Enhanced K-Means

    PubMed Central

    Li, Haiou; Chen, Cheng; Lv, Qiang; Wu, Chuang

    2017-01-01

    Background. One critical issue in protein three-dimensional structure prediction using either ab initio or comparative modeling involves identification of high-quality protein structural models from generated decoys. Currently, clustering algorithms are widely used to identify near-native models; however, their performance is dependent upon different conformational decoys, and, for some algorithms, the accuracy declines when the decoy population increases. Results. Here, we proposed two enhanced K-means clustering algorithms capable of robustly identifying high-quality protein structural models. The first one employs the clustering algorithm SPICKER to determine the initial centroids for basic K-means clustering (SK-means), whereas the other employs squared distance to optimize the initial centroids (K-means++). Our results showed that SK-means and K-means++ were more robust as compared with SPICKER alone, detecting 33 (59%) and 42 (75%) of 56 targets, respectively, with template modeling scores better than or equal to those of SPICKER. Conclusions. We observed that the classic K-means algorithm showed a similar performance to that of SPICKER, which is a widely used algorithm for protein-structure identification. Both SK-means and K-means++ demonstrated substantial improvements relative to results from SPICKER and classical K-means. PMID:28421198

  8. Experimental demonstration of graph-state quantum secret sharing.

    PubMed

    Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S

    2014-11-21

    Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.

  9. Partially entangled states bridge in quantum teleportation

    NASA Astrophysics Data System (ADS)

    Cai, Xiao-Fei; Yu, Xu-Tao; Shi, Li-Hui; Zhang, Zai-Chen

    2014-10-01

    The traditional method for information transfer in a quantum communication system using partially entangled state resource is quantum distillation or direct teleportation. In order to reduce the waiting time cost in hop-by-hop transmission and execute independently in each node, we propose a quantum bridging method with partially entangled states to teleport quantum states from source node to destination node. We also prove that the designed specific quantum bridging circuit is feasible for partially entangled states teleportation across multiple intermediate nodes. Compared to two traditional ways, our partially entanglement quantum bridging method uses simpler logic gates, has better security, and can be used in less quantum resource situation.

  10. Unbound states in quantum heterostructures

    PubMed Central

    Bastard, G

    2006-01-01

    We report in this review on the electronic continuum states of semiconductor Quantum Wells and Quantum Dots and highlight the decisive part played by the virtual bound states in the optical properties of these structures. The two particles continuum states of Quantum Dots control the decoherence of the excited electron – hole states. The part played by Auger scattering in Quantum Dots is also discussed.

  11. Uncertainty relations with quantum memory for the Wehrl entropy

    NASA Astrophysics Data System (ADS)

    De Palma, Giacomo

    2018-03-01

    We prove two new fundamental uncertainty relations with quantum memory for the Wehrl entropy. The first relation applies to the bipartite memory scenario. It determines the minimum conditional Wehrl entropy among all the quantum states with a given conditional von Neumann entropy and proves that this minimum is asymptotically achieved by a suitable sequence of quantum Gaussian states. The second relation applies to the tripartite memory scenario. It determines the minimum of the sum of the Wehrl entropy of a quantum state conditioned on the first memory quantum system with the Wehrl entropy of the same state conditioned on the second memory quantum system and proves that also this minimum is asymptotically achieved by a suitable sequence of quantum Gaussian states. The Wehrl entropy of a quantum state is the Shannon differential entropy of the outcome of a heterodyne measurement performed on the state. The heterodyne measurement is one of the main measurements in quantum optics and lies at the basis of one of the most promising protocols for quantum key distribution. These fundamental entropic uncertainty relations will be a valuable tool in quantum information and will, for example, find application in security proofs of quantum key distribution protocols in the asymptotic regime and in entanglement witnessing in quantum optics.

  12. Quantum State Tomography via Reduced Density Matrices.

    PubMed

    Xin, Tao; Lu, Dawei; Klassen, Joel; Yu, Nengkun; Ji, Zhengfeng; Chen, Jianxin; Ma, Xian; Long, Guilu; Zeng, Bei; Laflamme, Raymond

    2017-01-13

    Quantum state tomography via local measurements is an efficient tool for characterizing quantum states. However, it requires that the original global state be uniquely determined (UD) by its local reduced density matrices (RDMs). In this work, we demonstrate for the first time a class of states that are UD by their RDMs under the assumption that the global state is pure, but fail to be UD in the absence of that assumption. This discovery allows us to classify quantum states according to their UD properties, with the requirement that each class be treated distinctly in the practice of simplifying quantum state tomography. Additionally, we experimentally test the feasibility and stability of performing quantum state tomography via the measurement of local RDMs for each class. These theoretical and experimental results demonstrate the advantages and possible pitfalls of quantum state tomography with local measurements.

  13. Quantum State Diffusion

    NASA Astrophysics Data System (ADS)

    Percival, Ian

    2005-10-01

    1. Introduction; 2. Brownian motion and Itô calculus; 3. Open quantum systems; 4. Quantum state diffusion; 5. Localisation; 6. Numerical methods and examples; 7. Quantum foundations; 8. Primary state diffusion; 9. Classical dynamics of quantum localisation; 10. Semiclassical theory and linear dynamics.

  14. Design and experimental realization of an optimal scheme for teleportation of an n-qubit quantum state

    NASA Astrophysics Data System (ADS)

    Sisodia, Mitali; Shukla, Abhishek; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    An explicit scheme (quantum circuit) is designed for the teleportation of an n-qubit quantum state. It is established that the proposed scheme requires an optimal amount of quantum resources, whereas larger amount of quantum resources have been used in a large number of recently reported teleportation schemes for the quantum states which can be viewed as special cases of the general n-qubit state considered here. A trade-off between our knowledge about the quantum state to be teleported and the amount of quantum resources required for the same is observed. A proof-of-principle experimental realization of the proposed scheme (for a 2-qubit state) is also performed using 5-qubit superconductivity-based IBM quantum computer. The experimental results show that the state has been teleported with high fidelity. Relevance of the proposed teleportation scheme has also been discussed in the context of controlled, bidirectional, and bidirectional controlled state teleportation.

  15. Faithful conditional quantum state transfer between weakly coupled qubits

    NASA Astrophysics Data System (ADS)

    Miková, M.; Straka, I.; Mičuda, M.; Krčmarský, V.; Dušek, M.; Ježek, M.; Fiurášek, J.; Filip, R.

    2016-08-01

    One of the strengths of quantum information theory is that it can treat quantum states without referring to their particular physical representation. In principle, quantum states can be therefore fully swapped between various quantum systems by their mutual interaction and this quantum state transfer is crucial for many quantum communication and information processing tasks. In practice, however, the achievable interaction time and strength are often limited by decoherence. Here we propose and experimentally demonstrate a procedure for faithful quantum state transfer between two weakly interacting qubits. Our scheme enables a probabilistic yet perfect unidirectional transfer of an arbitrary unknown state of a source qubit onto a target qubit prepared initially in a known state. The transfer is achieved by a combination of a suitable measurement of the source qubit and quantum filtering on the target qubit depending on the outcome of measurement on the source qubit. We experimentally verify feasibility and robustness of the transfer using a linear optical setup with qubits encoded into polarization states of single photons.

  16. Efficient tomography of a quantum many-body system

    NASA Astrophysics Data System (ADS)

    Lanyon, B. P.; Maier, C.; Holzäpfel, M.; Baumgratz, T.; Hempel, C.; Jurcevic, P.; Dhand, I.; Buyskikh, A. S.; Daley, A. J.; Cramer, M.; Plenio, M. B.; Blatt, R.; Roos, C. F.

    2017-12-01

    Quantum state tomography is the standard technique for estimating the quantum state of small systems. But its application to larger systems soon becomes impractical as the required resources scale exponentially with the size. Therefore, considerable effort is dedicated to the development of new characterization tools for quantum many-body states. Here we demonstrate matrix product state tomography, which is theoretically proven to allow for the efficient and accurate estimation of a broad class of quantum states. We use this technique to reconstruct the dynamical state of a trapped-ion quantum simulator comprising up to 14 entangled and individually controlled spins: a size far beyond the practical limits of quantum state tomography. Our results reveal the dynamical growth of entanglement and describe its complexity as correlations spread out during a quench: a necessary condition for future demonstrations of better-than-classical performance. Matrix product state tomography should therefore find widespread use in the study of large quantum many-body systems and the benchmarking and verification of quantum simulators and computers.

  17. Nonlocal interferometry with macroscopic coherent states and its application to quantum communications

    NASA Astrophysics Data System (ADS)

    Kirby, Brian

    Macroscopic quantum effects are of fundamental interest because they help us to understand the quantum-classical boundary, and may also have important practical applications in long-range quantum communications. Specifically we analyze a macroscopic generalization of the Franson interferometer, where violations of Bell's inequality can be observed using phase entangled coherent states created using weak nonlinearities. Furthermore we want to understand how these states, and other macroscopic quantum states, can be applied to secure quantum communications. We find that Bell's inequality can be violated at ranges of roughly 400 km in optical fiber when various unambiguous state discrimination techniques are applied. In addition Monte Carlo simulations suggest that quantum communications schemes based on macroscopic quantum states and random unitary transformations can be potentially secure at long distances. Lastly, we calculate the feasibility of creating the weak nonlinearity needed for the experimental realization of these proposals using metastable xenon in a high finesse cavity. This research suggests that quantum states created using macroscopic coherent states and weak nonlinearities may be a realistic path towards the realization of secure long-range quantum communications.

  18. Optical communication with two-photon coherent stages. I - Quantum-state propagation and quantum-noise reduction

    NASA Technical Reports Server (NTRS)

    Yuen, H. P.; Shapiro, J. H.

    1978-01-01

    To determine the ultimate performance limitations imposed by quantum effects, it is also essential to consider optimum quantum-state generation. Certain 'generalized' coherent states of the radiation field possess novel quantum noise characteristics that offer the potential for greatly improved optical communications. These states have been called two-photon coherent states because they can be generated, in principle, by stimulated two-photon processes. The use of two-photon coherent state (TCS) radiation in free-space optical communications is considered. A simple theory of quantum state propagation is developed. The theory provides the basis for representing the free-space channel in a quantum-mechanical form convenient for communication analysis. The new theory is applied to TCS radiation.

  19. On-chip generation of high-dimensional entangled quantum states and their coherent control

    NASA Astrophysics Data System (ADS)

    Kues, Michael; Reimer, Christian; Roztocki, Piotr; Cortés, Luis Romero; Sciara, Stefania; Wetzel, Benjamin; Zhang, Yanbing; Cino, Alfonso; Chu, Sai T.; Little, Brent E.; Moss, David J.; Caspani, Lucia; Azaña, José; Morandotti, Roberto

    2017-06-01

    Optical quantum states based on entangled photons are essential for solving questions in fundamental physics and are at the heart of quantum information science. Specifically, the realization of high-dimensional states (D-level quantum systems, that is, qudits, with D > 2) and their control are necessary for fundamental investigations of quantum mechanics, for increasing the sensitivity of quantum imaging schemes, for improving the robustness and key rate of quantum communication protocols, for enabling a richer variety of quantum simulations, and for achieving more efficient and error-tolerant quantum computation. Integrated photonics has recently become a leading platform for the compact, cost-efficient, and stable generation and processing of non-classical optical states. However, so far, integrated entangled quantum sources have been limited to qubits (D = 2). Here we demonstrate on-chip generation of entangled qudit states, where the photons are created in a coherent superposition of multiple high-purity frequency modes. In particular, we confirm the realization of a quantum system with at least one hundred dimensions, formed by two entangled qudits with D = 10. Furthermore, using state-of-the-art, yet off-the-shelf telecommunications components, we introduce a coherent manipulation platform with which to control frequency-entangled states, capable of performing deterministic high-dimensional gate operations. We validate this platform by measuring Bell inequality violations and performing quantum state tomography. Our work enables the generation and processing of high-dimensional quantum states in a single spatial mode.

  20. On-chip generation of high-dimensional entangled quantum states and their coherent control.

    PubMed

    Kues, Michael; Reimer, Christian; Roztocki, Piotr; Cortés, Luis Romero; Sciara, Stefania; Wetzel, Benjamin; Zhang, Yanbing; Cino, Alfonso; Chu, Sai T; Little, Brent E; Moss, David J; Caspani, Lucia; Azaña, José; Morandotti, Roberto

    2017-06-28

    Optical quantum states based on entangled photons are essential for solving questions in fundamental physics and are at the heart of quantum information science. Specifically, the realization of high-dimensional states (D-level quantum systems, that is, qudits, with D > 2) and their control are necessary for fundamental investigations of quantum mechanics, for increasing the sensitivity of quantum imaging schemes, for improving the robustness and key rate of quantum communication protocols, for enabling a richer variety of quantum simulations, and for achieving more efficient and error-tolerant quantum computation. Integrated photonics has recently become a leading platform for the compact, cost-efficient, and stable generation and processing of non-classical optical states. However, so far, integrated entangled quantum sources have been limited to qubits (D = 2). Here we demonstrate on-chip generation of entangled qudit states, where the photons are created in a coherent superposition of multiple high-purity frequency modes. In particular, we confirm the realization of a quantum system with at least one hundred dimensions, formed by two entangled qudits with D = 10. Furthermore, using state-of-the-art, yet off-the-shelf telecommunications components, we introduce a coherent manipulation platform with which to control frequency-entangled states, capable of performing deterministic high-dimensional gate operations. We validate this platform by measuring Bell inequality violations and performing quantum state tomography. Our work enables the generation and processing of high-dimensional quantum states in a single spatial mode.

  1. Quantum state engineering in hybrid open quantum systems

    NASA Astrophysics Data System (ADS)

    Joshi, Chaitanya; Larson, Jonas; Spiller, Timothy P.

    2016-04-01

    We investigate a possibility to generate nonclassical states in light-matter coupled noisy quantum systems, namely, the anisotropic Rabi and Dicke models. In these hybrid quantum systems, a competing influence of coherent internal dynamics and environment-induced dissipation drives the system into nonequilibrium steady states (NESSs). Explicitly, for the anisotropic Rabi model, the steady state is given by an incoherent mixture of two states of opposite parities, but as each parity state displays light-matter entanglement, we also find that the full state is entangled. Furthermore, as a natural extension of the anisotropic Rabi model to an infinite spin subsystem, we next explored the NESS of the anisotropic Dicke model. The NESS of this linearized Dicke model is also an inseparable state of light and matter. With an aim to enrich the dynamics beyond the sustainable entanglement found for the NESS of these hybrid quantum systems, we also propose to combine an all-optical feedback strategy for quantum state protection and for establishing quantum control in these systems. Our present work further elucidates the relevance of such hybrid open quantum systems for potential applications in quantum architectures.

  2. Quantum amplification and quantum optical tapping with squeezed states and correlated quantum states

    NASA Technical Reports Server (NTRS)

    Ou, Z. Y.; Pereira, S. F.; Kimble, H. J.

    1994-01-01

    Quantum fluctuations in a nondegenerate optical parametric amplifier (NOPA) are investigated experimentally with a squeezed state coupled into the internal idler mode of the NOPA. Reductions of the inherent quantum noise of the amplifier are observed with a minimum noise level 0.7 dB below the usual noise level of the amplifier with its idler mode in a vacuum state. With two correlated quantum fields as the amplifier's inputs and proper adjustment of the gain of the amplifier, it is shown that the amplifier's intrinsic quantum noise can be completely suppressed so that noise-free amplification is achieved. It is also shown that the NOPA, when coupled to either a squeezed state or a nonclassically correlated state, can realize quantum tapping of optical information.

  3. Theoretical study of dynamic electron-spin-polarization via the doublet-quartet quantum-mixed state and time-resolved ESR spectra of the quartet high-spin state.

    PubMed

    Teki, Yoshio; Matsumoto, Takafumi

    2011-04-07

    The mechanism of the unique dynamic electron polarization of the quartet (S = 3/2) high-spin state via a doublet-quartet quantum-mixed state and detail theoretical calculations of the population transfer are reported. By the photo-induced electron transfer, the quantum-mixed charge-separate state is generated in acceptor-donor-radical triad (A-D-R). This mechanism explains well the unique dynamic electron polarization of the quartet state of A-D-R. The generation of the selectively populated quantum-mixed state and its transfer to the strongly coupled pure quartet and doublet states have been treated both by a perturbation approach and by exact numerical calculations. The analytical solutions show that generation of the quantum-mixed states with the selective populations after de-coherence and/or accompanying the (complete) dephasing during the charge-recombination are essential for the unique dynamic electron polarization. Thus, the elimination of the quantum coherence (loss of the quantum information) is the key process for the population transfer from the quantum-mixed state to the quartet state. The generation of high-field polarization on the strongly coupled quartet state by the charge-recombination process can be explained by a polarization transfer from the quantum-mixed charge-separate state. Typical time-resolved ESR patterns of the quantum-mixed state and of the strongly coupled quartet state are simulated based on the generation mechanism of the dynamic electron polarization. The dependence of the spectral pattern of the quartet high-spin state has been clarified for the fine-structure tensor and the exchange interaction of the quantum-mixed state. The spectral pattern of the quartet state is not sensitive towards the fine-structure tensor of the quantum-mixed state, because this tensor contributes only as a perturbation in the population transfer to the spin-sublevels of the quartet state. Based on the stochastic Liouville equation, it is also discussed why the selective population in the quantum-mixed state is generated for the "finite field" spin-sublevels. The numerical calculations of the elimination of the quantum coherence (de-coherence and/or dephasing) are demonstrated. A new possibility of the enhanced intersystem crossing pathway in solution is also proposed.

  4. Decoy peptide targeted to Toll-IL-1R domain inhibits LPS and TLR4-active metabolite morphine-3 glucuronide sensitization of sensory neurons.

    PubMed

    Allette, Yohance M; Kim, Youngsook; Randolph, Aaron L; Smith, Jared A; Ripsch, Matthew S; White, Fletcher A

    2017-06-16

    Accumulating evidence indicates that Toll-like receptor (TLR) signaling adapter protein interactions with Toll/Interleukin-1 Receptor (TIR) domains present in sensory neurons may modulate neuropathic pain states. Following ligand interaction with TLRs, TIR serves to both initiate intracellular signaling and facilitate recruitment of signaling adapter proteins to the intracytoplasmic domain. Although TLR TIR is central to a number of TLR signaling cascades, its role in sensory neurons is poorly understood. In this study we investigated the degree to which TLR TIR decoy peptide modified to include a TAT sequence (Trans-Activator of Transcription gene in HIV; TAT-4BB) affected LPS-induced intracellular calcium flux and excitation in sensory neurons, and behavioral changes due to TLR4 active metabolite, morphine-3-glucuronide (M3G) exposure in vivo. TAT-4BB inhibited LPS-induced calcium changes in a majority of sensory neurons and decreased LPS-dependent neuronal excitability in small diameter neurons. Acute systemic administration of the TAT-4BB reversed M3G-induced tactile allodynia in a dose-dependent manner but did not affect motor activity, anxiety or responses to noxious thermal stimulus. These data suggest that targeting TLR TIR domains may provide novel pharmacological targets to reduce or reverse TLR4-dependent pain behavior in the rodent.

  5. Memory-built-in quantum cloning in a hybrid solid-state spin register

    NASA Astrophysics Data System (ADS)

    Wang, Weibin; Zu, Chong; He, Li; Zhang, Wengang; Duan, Luming

    2015-05-01

    As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provides an important strategy for eavesdropping in quantum cryptography. We report an experiment that realizes cloning of quantum states from an electron spin to a nuclear spin in a hybrid solid-state spin register with near-optimal fidelity. The nuclear spin provides an ideal memory qubit at room temperature, which stores the cloned quantum states for a millisecond under ambient conditions, exceeding the lifetime of the original quantum state carried by the electron spin by orders of magnitude, and making it an ideal memory qubit. Our experiment is based on control of an individual nitrogen vacancy (NV) center in the diamond, which is a diamond defect that attracts strong interest in recent years with great potential for implementation of quantum information protocols.

  6. Heat control in opto-mechanical system using quantum non-classicality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sharma, Sushamana, E-mail: sushmana.sharma@jietjodhpur.ac.in; Senwar, Subash, E-mail: subashsenwar30@gmail.com

    2016-05-06

    Cooling of matter to the quantum ground state is a primary directive of quantum control. In other words, to extract entropy from a quantum system, efficient indirect quantum measurements may be implemented. The main objective is the cooling of the oscillator either to its motional ground state or to non-classical states, such as low-number Fock states, squeezed states or entangled states. It is shown that the use of quantum control procedure is better choice for even experimental realizations because it leads to a squeezed steady state with less than one phonon on average. The steady state of system corresponds tomore » cooling of the system.« less

  7. Quantum engineering. Confining the state of light to a quantum manifold by engineered two-photon loss.

    PubMed

    Leghtas, Z; Touzard, S; Pop, I M; Kou, A; Vlastakis, B; Petrenko, A; Sliwa, K M; Narla, A; Shankar, S; Hatridge, M J; Reagor, M; Frunzio, L; Schoelkopf, R J; Mirrahimi, M; Devoret, M H

    2015-02-20

    Physical systems usually exhibit quantum behavior, such as superpositions and entanglement, only when they are sufficiently decoupled from a lossy environment. Paradoxically, a specially engineered interaction with the environment can become a resource for the generation and protection of quantum states. This notion can be generalized to the confinement of a system into a manifold of quantum states, consisting of all coherent superpositions of multiple stable steady states. We have confined the state of a superconducting resonator to the quantum manifold spanned by two coherent states of opposite phases and have observed a Schrödinger cat state spontaneously squeeze out of vacuum before decaying into a classical mixture. This experiment points toward robustly encoding quantum information in multidimensional steady-state manifolds. Copyright © 2015, American Association for the Advancement of Science.

  8. Geometric measure of pairwise quantum discord for superpositions of multipartite generalized coherent states

    NASA Astrophysics Data System (ADS)

    Daoud, M.; Ahl Laamara, R.

    2012-07-01

    We give the explicit expressions of the pairwise quantum correlations present in superpositions of multipartite coherent states. A special attention is devoted to the evaluation of the geometric quantum discord. The dynamics of quantum correlations under a dephasing channel is analyzed. A comparison of geometric measure of quantum discord with that of concurrence shows that quantum discord in multipartite coherent states is more resilient to dissipative environments than is quantum entanglement. To illustrate our results, we consider some special superpositions of Weyl-Heisenberg, SU(2) and SU(1,1) coherent states which interpolate between Werner and Greenberger-Horne-Zeilinger states.

  9. Pulsed quantum optomechanics

    PubMed Central

    Vanner, M. R.; Pikovski, I.; Cole, G. D.; Kim, M. S.; Brukner, Č.; Hammerer, K.; Milburn, G. J.; Aspelmeyer, M.

    2011-01-01

    Studying mechanical resonators via radiation pressure offers a rich avenue for the exploration of quantum mechanical behavior in a macroscopic regime. However, quantum state preparation and especially quantum state reconstruction of mechanical oscillators remains a significant challenge. Here we propose a scheme to realize quantum state tomography, squeezing, and state purification of a mechanical resonator using short optical pulses. The scheme presented allows observation of mechanical quantum features despite preparation from a thermal state and is shown to be experimentally feasible using optical microcavities. Our framework thus provides a promising means to explore the quantum nature of massive mechanical oscillators and can be applied to other systems such as trapped ions. PMID:21900608

  10. Large quantum rings in the ν > 1 quantum Hall regime.

    PubMed

    Räsänen, E; Aichinger, M

    2009-01-14

    We study computationally the ground-state properties of large quantum rings in the filling-factor ν>1 quantum Hall regime. We show that the arrangement of electrons into different Landau levels leads to clear signatures in the total energies as a function of the magnetic field. In this context, we discuss possible approximations for the filling factor ν in the system. We are able to characterize integer-ν states in quantum rings in an analogy with conventional quantum Hall droplets. We also find a partially spin-polarized state between ν = 2 and 3. Despite the specific topology of a quantum ring, this state is strikingly reminiscent of the recently found ν = 5/2 state in a quantum dot.

  11. Quantum state detection and state preparation based on cavity-enhanced nonlinear interaction of atoms with single photon

    NASA Astrophysics Data System (ADS)

    Hosseini, Mahdi

    Our ability to engineer quantum states of light and matter has significantly advanced over the past two decades, resulting in the production of both Gaussian and non-Gaussian optical states. The resulting tailored quantum states enable quantum technologies such as quantum optical communication, quantum sensing as well as quantum photonic computation. The strong nonlinear light-atom interaction is the key to deterministic quantum state preparation and quantum photonic processing. One route to enhancing the usually weak nonlinear light-atom interactions is to approach the regime of cavity quantum electrodynamics (cQED) interaction by means of high finesse optical resonators. I present results from the MIT experiment of large conditional cross-phase modulation between a signal photon, stored inside an atomic quantum memory, and a control photon that traverses a high-finesse optical cavity containing the atomic memory. I also present a scheme to probabilistically change the amplitude and phase of a signal photon qubit to, in principle, arbitrary values by postselection on a control photon that has interacted with that state. Notably, small changes of the control photon polarization measurement basis by few degrees can substantially change the amplitude and phase of the signal state. Finally, I present our ongoing effort at Purdue to realize similar peculiar quantum phenomena at the single photon level on chip scale photonic systems.

  12. Masking Quantum Information is Impossible

    NASA Astrophysics Data System (ADS)

    Modi, Kavan; Pati, Arun Kumar; SenDe, Aditi; Sen, Ujjwal

    2018-06-01

    Classical information encoded in composite quantum states can be completely hidden from the reduced subsystems and may be found only in the correlations. Can the same be true for quantum information? If quantum information is hidden from subsystems and spread over quantum correlation, we call it masking of quantum information. We show that while this may still be true for some restricted sets of nonorthogonal quantum states, it is not possible for arbitrary quantum states. This result suggests that quantum qubit commitment—a stronger version of the quantum bit commitment—is not possible in general. Our findings may have potential applications in secret sharing and future quantum communication protocols.

  13. Metric on the space of quantum states from relative entropy. Tomographic reconstruction

    NASA Astrophysics Data System (ADS)

    Man'ko, Vladimir I.; Marmo, Giuseppe; Ventriglia, Franco; Vitale, Patrizia

    2017-08-01

    In the framework of quantum information geometry, we derive, from quantum relative Tsallis entropy, a family of quantum metrics on the space of full rank, N level quantum states, by means of a suitably defined coordinate free differential calculus. The cases N=2, N=3 are discussed in detail and notable limits are analyzed. The radial limit procedure has been used to recover quantum metrics for lower rank states, such as pure states. By using the tomographic picture of quantum mechanics we have obtained the Fisher-Rao metric for the space of quantum tomograms and derived a reconstruction formula of the quantum metric of density states out of the tomographic one. A new inequality obtained for probabilities of three spin-1/2 projections in three perpendicular directions is proposed to be checked in experiments with superconducting circuits.

  14. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  15. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  16. Quantum correlations for bipartite continuous-variable systems

    NASA Astrophysics Data System (ADS)

    Ma, Ruifen; Hou, Jinchuan; Qi, Xiaofei; Wang, Yangyang

    2018-04-01

    Two quantum correlations Q and Q_P for (m+n)-mode continuous-variable systems are introduced in terms of average distance between the reduced states under the local Gaussian positive operator-valued measurements, and analytical formulas of these quantum correlations for bipartite Gaussian states are provided. It is shown that the product states do not contain these quantum correlations, and conversely, all (m+n)-mode Gaussian states with zero quantum correlations are product states. Generally, Q≥ Q_{P}, but for the symmetric two-mode squeezed thermal states, these quantum correlations are the same and a computable formula is given. In addition, Q is compared with Gaussian geometric discord for symmetric squeezed thermal states.

  17. Faithful nonclassicality indicators and extremal quantum correlations in two-qubit states

    NASA Astrophysics Data System (ADS)

    Girolami, Davide; Paternostro, Mauro; Adesso, Gerardo

    2011-09-01

    The state disturbance induced by locally measuring a quantum system yields a signature of nonclassical correlations beyond entanglement. Here, we present a detailed study of such correlations for two-qubit mixed states. To overcome the asymmetry of quantum discord and the unfaithfulness of measurement-induced disturbance (severely overestimating quantum correlations), we propose an ameliorated measurement-induced disturbance as nonclassicality indicator, optimized over joint local measurements, and we derive its closed expression for relevant two-qubit states. We study its analytical relation with discord, and characterize the maximally quantum-correlated mixed states, that simultaneously extremize both quantifiers at given von Neumann entropy: among all two-qubit states, these states possess the most robust quantum correlations against noise.

  18. Fast reconstruction of high-qubit-number quantum states via low-rate measurements

    NASA Astrophysics Data System (ADS)

    Li, K.; Zhang, J.; Cong, S.

    2017-07-01

    Due to the exponential complexity of the resources required by quantum state tomography (QST), people are interested in approaches towards identifying quantum states which require less effort and time. In this paper, we provide a tailored and efficient method for reconstructing mixed quantum states up to 12 (or even more) qubits from an incomplete set of observables subject to noises. Our method is applicable to any pure or nearly pure state ρ and can be extended to many states of interest in quantum information processing, such as a multiparticle entangled W state, Greenberger-Horne-Zeilinger states, and cluster states that are matrix product operators of low dimensions. The method applies the quantum density matrix constraints to a quantum compressive sensing optimization problem and exploits a modified quantum alternating direction multiplier method (quantum-ADMM) to accelerate the convergence. Our algorithm takes 8 ,35 , and 226 seconds, respectively, to reconstruct superposition state density matrices of 10 ,11 ,and12 qubits with acceptable fidelity using less than 1 % of measurements of expectation. To our knowledge it is the fastest realization that people can achieve using a normal desktop. We further discuss applications of this method using experimental data of mixed states obtained in an ion trap experiment of up to 8 qubits.

  19. Approach jamming effectiveness evaluation for surface-type infrared decoy in network centric warship formation

    NASA Astrophysics Data System (ADS)

    Lv, Mingshan

    2015-10-01

    The passive and photoelectrical jamming to anti-ship missile in the condition of network centric warship formation is an important research issue of fleet EW operation. An approach jamming method of shipborne surface-type infrared decoy countering the infrared image guided anti-ship missile is put forward. By analyzing the countering process the jamming effectiveness evaluation model is constructed. By simulation the method is proved t reasonable and effective. This method breaks through the traditional restrict that the passive and photoelectricity jamming measure can only be used in the end self-defence and provides a new method for network centric worship formation to support each other.

  20. Advantages of Unfair Quantum Ground-State Sampling.

    PubMed

    Zhang, Brian Hu; Wagenbreth, Gene; Martin-Mayor, Victor; Hen, Itay

    2017-04-21

    The debate around the potential superiority of quantum annealers over their classical counterparts has been ongoing since the inception of the field. Recent technological breakthroughs, which have led to the manufacture of experimental prototypes of quantum annealing optimizers with sizes approaching the practical regime, have reignited this discussion. However, the demonstration of quantum annealing speedups remains to this day an elusive albeit coveted goal. We examine the power of quantum annealers to provide a different type of quantum enhancement of practical relevance, namely, their ability to serve as useful samplers from the ground-state manifolds of combinatorial optimization problems. We study, both numerically by simulating stoquastic and non-stoquastic quantum annealing processes, and experimentally, using a prototypical quantum annealing processor, the ability of quantum annealers to sample the ground-states of spin glasses differently than thermal samplers. We demonstrate that (i) quantum annealers sample the ground-state manifolds of spin glasses very differently than thermal optimizers (ii) the nature of the quantum fluctuations driving the annealing process has a decisive effect on the final distribution, and (iii) the experimental quantum annealer samples ground-state manifolds significantly differently than thermal and ideal quantum annealers. We illustrate how quantum annealers may serve as powerful tools when complementing standard sampling algorithms.

  1. Quantum information. Unconditional quantum teleportation between distant solid-state quantum bits.

    PubMed

    Pfaff, W; Hensen, B J; Bernien, H; van Dam, S B; Blok, M S; Taminiau, T H; Tiggelman, M J; Schouten, R N; Markham, M; Twitchen, D J; Hanson, R

    2014-08-01

    Realizing robust quantum information transfer between long-lived qubit registers is a key challenge for quantum information science and technology. Here we demonstrate unconditional teleportation of arbitrary quantum states between diamond spin qubits separated by 3 meters. We prepare the teleporter through photon-mediated heralded entanglement between two distant electron spins and subsequently encode the source qubit in a single nuclear spin. By realizing a fully deterministic Bell-state measurement combined with real-time feed-forward, quantum teleportation is achieved upon each attempt with an average state fidelity exceeding the classical limit. These results establish diamond spin qubits as a prime candidate for the realization of quantum networks for quantum communication and network-based quantum computing. Copyright © 2014, American Association for the Advancement of Science.

  2. A solid state source of photon triplets based on quantum dot molecules

    PubMed Central

    Khoshnegar, Milad; Huber, Tobias; Predojević, Ana; Dalacu, Dan; Prilmüller, Maximilian; Lapointe, Jean; Wu, Xiaohua; Tamarat, Philippe; Lounis, Brahim; Poole, Philip; Weihs, Gregor; Majedi, Hamed

    2017-01-01

    Producing advanced quantum states of light is a priority in quantum information technologies. In this context, experimental realizations of multipartite photon states would enable improved tests of the foundations of quantum mechanics as well as implementations of complex quantum optical networks and protocols. It is favourable to directly generate these states using solid state systems, for simpler handling and the promise of reversible transfer of quantum information between stationary and flying qubits. Here we use the ground states of two optically active coupled quantum dots to directly produce photon triplets. The formation of a triexciton in these ground states leads to a triple cascade recombination and sequential emission of three photons with strong correlations. We record 65.62 photon triplets per minute under continuous-wave pumping, surpassing rates of earlier reported sources. Our structure and data pave the way towards implementing multipartite photon entanglement and multi-qubit readout schemes in solid state devices. PMID:28604705

  3. The operations of quantum logic gates with pure and mixed initial states.

    PubMed

    Chen, Jun-Liang; Li, Che-Ming; Hwang, Chi-Chuan; Ho, Yi-Hui

    2011-04-07

    The implementations of quantum logic gates realized by the rovibrational states of a C(12)O(16) molecule in the X((1)Σ(+)) electronic ground state are investigated. Optimal laser fields are obtained by using the modified multitarget optimal theory (MTOCT) which combines the maxima of the cost functional and the fidelity for state and quantum process. The projection operator technique together with modified MTOCT is used to get optimal laser fields. If initial states of the quantum gate are pure states, states at target time approach well to ideal target states. However, if the initial states are mixed states, the target states do not approach well to ideal ones. The process fidelity is introduced to investigate the reliability of the quantum gate operation driven by the optimal laser field. We found that the quantum gates operate reliably whether the initial states are pure or mixed.

  4. ψ-Epistemic Models are Exponentially Bad at Explaining the Distinguishability of Quantum States

    NASA Astrophysics Data System (ADS)

    Leifer, M. S.

    2014-04-01

    The status of the quantum state is perhaps the most controversial issue in the foundations of quantum theory. Is it an epistemic state (state of knowledge) or an ontic state (state of reality)? In realist models of quantum theory, the epistemic view asserts that nonorthogonal quantum states correspond to overlapping probability measures over the true ontic states. This naturally accounts for a large number of otherwise puzzling quantum phenomena. For example, the indistinguishability of nonorthogonal states is explained by the fact that the ontic state sometimes lies in the overlap region, in which case there is nothing in reality that could distinguish the two states. For this to work, the amount of overlap of the probability measures should be comparable to the indistinguishability of the quantum states. In this Letter, I exhibit a family of states for which the ratio of these two quantities must be ≤2de-cd in Hilbert spaces of dimension d that are divisible by 4. This implies that, for large Hilbert space dimension, the epistemic explanation of indistinguishability becomes implausible at an exponential rate as the Hilbert space dimension increases.

  5. Comment on "Quantum Teleportation of Eight-Qubit State via Six-Qubit Cluster State"

    NASA Astrophysics Data System (ADS)

    Sisodia, Mitali; Pathak, Anirban

    2018-04-01

    Recently, Zhao et al. (Int. J. Theor. Phys. 57, 516-522 2018) have proposed a scheme for quantum teleportation of an eight-qubit quantum state using a six qubit cluster state. In this comment, it's shown that the quantum resource (multi-partite entangled state used as the quantum channel) used by Zhao et al., is excessively high and the task can be performed using any two Bell states as the task can be reduced to the teleportation of an arbitrary two qubit state. Further, a trivial conceptual mistake made by Zhao et al., in the description of the quantum channel has been pointed out. It's also mentioned that recently a trend of proposing teleportation schemes with excessively high quantum resources has been observed and the essence of this comment is applicable to all such proposals.

  6. Role of Weak Measurements on States Ordering and Monogamy of Quantum Correlation

    NASA Astrophysics Data System (ADS)

    Hu, Ming-Liang; Fan, Heng; Tian, Dong-Ping

    2015-01-01

    The information-theoretic definition of quantum correlation, e.g., quantum discord, is measurement dependent. By considering the more general quantum measurements, weak measurements, which include the projective measurement as a limiting case, we show that while weak measurements can enable one to capture more quantumness of correlation in a state, it can also induce other counterintuitive quantum effects. Specifically, we show that the general measurements with different strengths can impose different orderings for quantum correlations of some states. It can also modify the monogamous character for certain classes of states as well which may diminish the usefulness of quantum correlation as a resource in some protocols. In this sense, we say that the weak measurements play a dual role in defining quantum correlation.

  7. Measuring complete quantum states with a single observable

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peng Xinhua; Suter, Dieter; Du Jiangfeng

    2007-10-15

    Experimental determination of an unknown quantum state usually requires several incompatible measurements. However, it is also possible to determine the full quantum state from a single, repeated measurement. For this purpose, the quantum system whose state is to be determined is first coupled to a second quantum system (the 'assistant') in such a way that part of the information in the quantum state is transferred to the assistant. The actual measurement is then performed on the enlarged system including the original system and the assistant. We discuss in detail the requirements of this procedure and experimentally implement it on amore » simple quantum system consisting of nuclear spins.« less

  8. Observing single quantum trajectories of a superconducting quantum bit

    NASA Astrophysics Data System (ADS)

    Murch, K. W.; Weber, S. J.; Macklin, C.; Siddiqi, I.

    2013-10-01

    The length of time that a quantum system can exist in a superposition state is determined by how strongly it interacts with its environment. This interaction entangles the quantum state with the inherent fluctuations of the environment. If these fluctuations are not measured, the environment can be viewed as a source of noise, causing random evolution of the quantum system from an initially pure state into a statistical mixture--a process known as decoherence. However, by accurately measuring the environment in real time, the quantum system can be maintained in a pure state and its time evolution described by a `quantum trajectory' determined by the measurement outcome. Here we use weak measurements to monitor a microwave cavity containing a superconducting quantum bit (qubit), and track the individual quantum trajectories of the system. In this set-up, the environment is dominated by the fluctuations of a single electromagnetic mode of the cavity. Using a near-quantum-limited parametric amplifier, we selectively measure either the phase or the amplitude of the cavity field, and thereby confine trajectories to either the equator or a meridian of the Bloch sphere. We perform quantum state tomography at discrete times along the trajectory to verify that we have faithfully tracked the state of the quantum system as it diffuses on the surface of the Bloch sphere. Our results demonstrate that decoherence can be mitigated by environmental monitoring, and validate the foundation of quantum feedback approaches based on Bayesian statistics. Moreover, our experiments suggest a new means of implementing `quantum steering'--the harnessing of action at a distance to manipulate quantum states through measurement.

  9. Observing single quantum trajectories of a superconducting quantum bit.

    PubMed

    Murch, K W; Weber, S J; Macklin, C; Siddiqi, I

    2013-10-10

    The length of time that a quantum system can exist in a superposition state is determined by how strongly it interacts with its environment. This interaction entangles the quantum state with the inherent fluctuations of the environment. If these fluctuations are not measured, the environment can be viewed as a source of noise, causing random evolution of the quantum system from an initially pure state into a statistical mixture--a process known as decoherence. However, by accurately measuring the environment in real time, the quantum system can be maintained in a pure state and its time evolution described by a 'quantum trajectory' determined by the measurement outcome. Here we use weak measurements to monitor a microwave cavity containing a superconducting quantum bit (qubit), and track the individual quantum trajectories of the system. In this set-up, the environment is dominated by the fluctuations of a single electromagnetic mode of the cavity. Using a near-quantum-limited parametric amplifier, we selectively measure either the phase or the amplitude of the cavity field, and thereby confine trajectories to either the equator or a meridian of the Bloch sphere. We perform quantum state tomography at discrete times along the trajectory to verify that we have faithfully tracked the state of the quantum system as it diffuses on the surface of the Bloch sphere. Our results demonstrate that decoherence can be mitigated by environmental monitoring, and validate the foundation of quantum feedback approaches based on Bayesian statistics. Moreover, our experiments suggest a new means of implementing 'quantum steering'--the harnessing of action at a distance to manipulate quantum states through measurement.

  10. Roughness as classicality indicator of a quantum state

    NASA Astrophysics Data System (ADS)

    Lemos, Humberto C. F.; Almeida, Alexandre C. L.; Amaral, Barbara; Oliveira, Adélcio C.

    2018-03-01

    We define a new quantifier of classicality for a quantum state, the Roughness, which is given by the L2 (R2) distance between Wigner and Husimi functions. We show that the Roughness is bounded and therefore it is a useful tool for comparison between different quantum states for single bosonic systems. The state classification via the Roughness is not binary, but rather it is continuous in the interval [ 0 , 1 ], being the state more classic as the Roughness approaches to zero, and more quantum when it is closer to the unity. The Roughness is maximum for Fock states when its number of photons is arbitrarily large, and also for squeezed states at the maximum compression limit. On the other hand, the Roughness approaches its minimum value for thermal states at infinite temperature and, more generally, for infinite entropy states. The Roughness of a coherent state is slightly below one half, so we may say that it is more a classical state than a quantum one. Another important result is that the Roughness performs well for discriminating both pure and mixed states. Since the Roughness measures the inherent quantumness of a state, we propose another function, the Dynamic Distance Measure (DDM), which is suitable for measure how much quantum is a dynamics. Using DDM, we studied the quartic oscillator, and we observed that there is a certain complementarity between dynamics and state, i.e. when dynamics becomes more quantum, the Roughness of the state decreases, while the Roughness grows as the dynamics becomes less quantum.

  11. New Quantum Key Distribution Scheme Based on Random Hybrid Quantum Channel with EPR Pairs and GHZ States

    NASA Astrophysics Data System (ADS)

    Yan, Xing-Yu; Gong, Li-Hua; Chen, Hua-Ying; Zhou, Nan-Run

    2018-05-01

    A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.

  12. Quantum Darwinism

    NASA Astrophysics Data System (ADS)

    Zurek, Wojciech Hubert

    2009-03-01

    Quantum Darwinism describes the proliferation, in the environment, of multiple records of selected states of a quantum system. It explains how the quantum fragility of a state of a single quantum system can lead to the classical robustness of states in their correlated multitude; shows how effective `wave-packet collapse' arises as a result of the proliferation throughout the environment of imprints of the state of the system; and provides a framework for the derivation of Born's rule, which relates the probabilities of detecting states to their amplitudes. Taken together, these three advances mark considerable progress towards settling the quantum measurement problem.

  13. Experimental magic state distillation for fault-tolerant quantum computing.

    PubMed

    Souza, Alexandre M; Zhang, Jingfu; Ryan, Colm A; Laflamme, Raymond

    2011-01-25

    Any physical quantum device for quantum information processing (QIP) is subject to errors in implementation. In order to be reliable and efficient, quantum computers will need error-correcting or error-avoiding methods. Fault-tolerance achieved through quantum error correction will be an integral part of quantum computers. Of the many methods that have been discovered to implement it, a highly successful approach has been to use transversal gates and specific initial states. A critical element for its implementation is the availability of high-fidelity initial states, such as |0〉 and the 'magic state'. Here, we report an experiment, performed in a nuclear magnetic resonance (NMR) quantum processor, showing sufficient quantum control to improve the fidelity of imperfect initial magic states by distilling five of them into one with higher fidelity.

  14. Nonlocal memory effects allow perfect teleportation with mixed states

    PubMed Central

    Laine, Elsi-Mari; Breuer, Heinz-Peter; Piilo, Jyrki

    2014-01-01

    One of the most striking consequences of quantum physics is quantum teleportation – the possibility to transfer quantum states over arbitrary distances. Since its theoretical introduction, teleportation has been demonstrated experimentally up to the distance of 143 km. In the original proposal two parties share a maximally entangled quantum state acting as a resource for the teleportation task. If, however, the state is influenced by decoherence, perfect teleportation can no longer be accomplished. Therefore, one of the current major challenges in accomplishing teleportation over long distances is to overcome the limitations imposed by decoherence and the subsequent mixedness of the resource state. Here we show that, in the presence of nonlocal memory effects, perfect quantum teleportation can be achieved even with mixed photon polarisation states. Our results imply that memory effects can be exploited in harnessing noisy quantum systems for quantum communication and that non-Markovianity is a resource for quantum information tasks. PMID:24714695

  15. Experimental Adiabatic Quantum Factorization under Ambient Conditions Based on a Solid-State Single Spin System.

    PubMed

    Xu, Kebiao; Xie, Tianyu; Li, Zhaokai; Xu, Xiangkun; Wang, Mengqi; Ye, Xiangyu; Kong, Fei; Geng, Jianpei; Duan, Changkui; Shi, Fazhan; Du, Jiangfeng

    2017-03-31

    The adiabatic quantum computation is a universal and robust method of quantum computing. In this architecture, the problem can be solved by adiabatically evolving the quantum processor from the ground state of a simple initial Hamiltonian to that of a final one, which encodes the solution of the problem. Adiabatic quantum computation has been proved to be a compatible candidate for scalable quantum computation. In this Letter, we report on the experimental realization of an adiabatic quantum algorithm on a single solid spin system under ambient conditions. All elements of adiabatic quantum computation, including initial state preparation, adiabatic evolution (simulated by optimal control), and final state read-out, are realized experimentally. As an example, we found the ground state of the problem Hamiltonian S_{z}I_{z} on our adiabatic quantum processor, which can be mapped to the factorization of 35 into its prime factors 5 and 7.

  16. Experimental Adiabatic Quantum Factorization under Ambient Conditions Based on a Solid-State Single Spin System

    NASA Astrophysics Data System (ADS)

    Xu, Kebiao; Xie, Tianyu; Li, Zhaokai; Xu, Xiangkun; Wang, Mengqi; Ye, Xiangyu; Kong, Fei; Geng, Jianpei; Duan, Changkui; Shi, Fazhan; Du, Jiangfeng

    2017-03-01

    The adiabatic quantum computation is a universal and robust method of quantum computing. In this architecture, the problem can be solved by adiabatically evolving the quantum processor from the ground state of a simple initial Hamiltonian to that of a final one, which encodes the solution of the problem. Adiabatic quantum computation has been proved to be a compatible candidate for scalable quantum computation. In this Letter, we report on the experimental realization of an adiabatic quantum algorithm on a single solid spin system under ambient conditions. All elements of adiabatic quantum computation, including initial state preparation, adiabatic evolution (simulated by optimal control), and final state read-out, are realized experimentally. As an example, we found the ground state of the problem Hamiltonian SzIz on our adiabatic quantum processor, which can be mapped to the factorization of 35 into its prime factors 5 and 7.

  17. Quantum entanglement between an optical photon and a solid-state spin qubit.

    PubMed

    Togan, E; Chu, Y; Trifonov, A S; Jiang, L; Maze, J; Childress, L; Dutt, M V G; Sørensen, A S; Hemmer, P R; Zibrov, A S; Lukin, M D

    2010-08-05

    Quantum entanglement is among the most fascinating aspects of quantum theory. Entangled optical photons are now widely used for fundamental tests of quantum mechanics and applications such as quantum cryptography. Several recent experiments demonstrated entanglement of optical photons with trapped ions, atoms and atomic ensembles, which are then used to connect remote long-term memory nodes in distributed quantum networks. Here we realize quantum entanglement between the polarization of a single optical photon and a solid-state qubit associated with the single electronic spin of a nitrogen vacancy centre in diamond. Our experimental entanglement verification uses the quantum eraser technique, and demonstrates that a high degree of control over interactions between a solid-state qubit and the quantum light field can be achieved. The reported entanglement source can be used in studies of fundamental quantum phenomena and provides a key building block for the solid-state realization of quantum optical networks.

  18. Quantum communication for satellite-to-ground networks with partially entangled states

    NASA Astrophysics Data System (ADS)

    Chen, Na; Quan, Dong-Xiao; Pei, Chang-Xing; Yang-Hong

    2015-02-01

    To realize practical wide-area quantum communication, a satellite-to-ground network with partially entangled states is developed in this paper. For efficiency and security reasons, the existing method of quantum communication in distributed wireless quantum networks with partially entangled states cannot be applied directly to the proposed quantum network. Based on this point, an efficient and secure quantum communication scheme with partially entangled states is presented. In our scheme, the source node performs teleportation only after an end-to-end entangled state has been established by entanglement swapping with partially entangled states. Thus, the security of quantum communication is guaranteed. The destination node recovers the transmitted quantum bit with the help of an auxiliary quantum bit and specially defined unitary matrices. Detailed calculations and simulation analyses show that the probability of successfully transferring a quantum bit in the presented scheme is high. In addition, the auxiliary quantum bit provides a heralded mechanism for successful communication. Based on the critical components that are presented in this article an efficient, secure, and practical wide-area quantum communication can be achieved. Project supported by the National Natural Science Foundation of China (Grant Nos. 61072067 and 61372076), the 111 Project (Grant No. B08038), the Fund from the State Key Laboratory of Integrated Services Networks (Grant No. ISN 1001004), and the Fundamental Research Funds for the Central Universities (Grant Nos. K5051301059 and K5051201021).

  19. A tissue microarray study of toll-like receptor 4, decoy receptor 3, and external signal regulated kinase 1/2 expressions in astrocytoma.

    PubMed

    Lin, Chih-Kung; Ting, Chun-Chieh; Tsai, Wen-Chiuan; Chen, Yuan-Wu; Hueng, Dueng-Yuan

    2016-01-01

    Decoy receptor 3 (DcR3) functions as a death decoy inhibiting apoptosis mediated by the tumor necrosis factor receptor family. It is highly expressed in many tumors and its expression can be regulated by the MAPK/ERK signaling pathway and ERK is a vital member of this pathway. Toll-like receptor 4 (TLR4) is expressed on immune cells. Increased TLR4 expression has been associated with various types of cancers. The study was conducted to investigate the expression of DcR3, ERK1/2, and TLR4 in astrocytomas and evaluate if they are validating markers for discriminating glioblastoma from anaplastic astrocytoma in limited surgical specimen. Expression of DcR3, ERK1/2, and TLR4 was determined by immunohistochemical staining of tissue microarray from 48 paraffin-embedded tissues. A binary logistic regression method was used to generate functions that discriminate between anaplastic astrocytomas and glioblastomas. The expression of TLR4 and DcR3 was significantly higher in glioblastomas than in anaplastic astrocytomas. DcR3 could discriminate anaplastic astrocytomas from glioblastomas with high sensitivity (93.8%), specificity (90%), and accuracy (92.3%). Our results suggest that DcR3 may be a useful marker for discriminating anaplastic astrocytomas from glioblastomas.

  20. Role of the chemokine decoy receptor D6 in balancing inflammation, immune activation, and antimicrobial resistance in Mycobacterium tuberculosis infection

    PubMed Central

    Di Liberto, Diana; Locati, Massimo; Caccamo, Nadia; Vecchi, Annunciata; Meraviglia, Serena; Salerno, Alfredo; Sireci, Guido; Nebuloni, Manuela; Caceres, Neus; Cardona, Pere-Joan; Dieli, Francesco; Mantovani, Alberto

    2008-01-01

    D6 is a decoy and scavenger receptor for inflammatory CC chemokines. D6-deficient mice were rapidly killed by intranasal administration of low doses of Mycobacterium tuberculosis. The death of D6−/− mice was associated with a dramatic local and systemic inflammatory response with levels of M. tuberculosis colony-forming units similar to control D6-proficient mice. D6-deficient mice showed an increased numbers of mononuclear cells (macrophages, dendritic cells, and CD4 and CD8 T lymphocytes) infiltrating inflamed tissues and lymph nodes, as well as abnormal increased concentrations of CC chemokines (CCL2, CCL3, CCL4, and CCL5) and proinflammatory cytokines (tumor necrosis factor α, interleukin 1β, and interferon γ) in bronchoalveolar lavage and serum. High levels of inflammatory cytokines in D6−/− infected mice were associated with liver and kidney damage, resulting in both liver and renal failure. Blocking inflammatory CC chemokines with a cocktail of antibodies reversed the inflammatory phenotype of D6−/− mice but led to less controlled growth of M. tuberculosis. Thus, the D6 decoy receptor plays a key role in setting the balance between antimicrobial resistance, immune activation, and inflammation in M. tuberculosis infection. PMID:18695004

  1. DECOY: Documenting Experiences with Cigarettes and Other Tobacco in Young Adults

    PubMed Central

    Berg, Carla J.; Haardörfer, Regine; Lewis, Michael; Getachew, Betelihem; Lloyd, Steven A.; Thomas, Sarah Fretti; Lanier, Angela; Trepanier, Kelleigh; Johnston, Teresa; Grimsley, Linda; Foster, Bruce; Benson, Stephanie; Smith, Alicia; Barr, Dana Boyd; Windle, Michael

    2016-01-01

    Objectives We examined psychographic characteristics associated with tobacco use among Project DECOY participants. Methods Project DECOY is a 2-year longitudinal mixed-methods study examining risk for tobacco use among 3418 young adults across 7 Georgia colleges/universities. Baseline measures included sociodemographics, tobacco use, and psychographics using the Values, Attitudes, and Lifestyle Scale. Bivariate and multivariable analyses were conducted to identify correlates of tobacco use. Results Past 30-day use prevalence was: 13.3% cigarettes; 11.3% little cigars/cigarillos (LCCs); 3.6% smokeless tobacco; 10.9% e-cigarettes; and 12.2% hookah. Controlling for sociodemographics, correlates of cigarette use included greater novelty seeking (p < .001) and intellectual curiosity (p = .010) and less interest in tangible creation (p = .002) and social conservatism (p < .001). Correlates of LCC use included greater novelty seeking (p < .001) and greater fashion orientation (p = .007). Correlates of smokeless tobacco use included greater novelty seeking (p = .006) and less intellectual curiosity (p < .001). Correlates of e-cigarette use included greater novelty seeking (p < .001) and less social conservatism (p = .002). Correlates of hookah use included greater novelty seeking (p < .001), fashion orientation (p = .044), and self-focused thinking (p = .002), and less social conservatism (p < .001). Conclusions Psychographic characteristics distinguish users of different tobacco products. PMID:27103410

  2. [Regression analysis to select native-like structures from decoys of antigen-antibody docking].

    PubMed

    Chen, Zhengshan; Chi, Xiangyang; Fan, Pengfei; Zhang, Guanying; Wang, Meirong; Yu, Changming; Chen, Wei

    2018-06-25

    Given the increasing exploitation of antibodies in different contexts such as molecular diagnostics and therapeutics, it would be beneficial to unravel properties of antigen-antibody interaction with modeling of computational protein-protein docking, especially, in the absence of a cocrystal structure. However, obtaining a native-like antigen-antibody structure remains challenging due in part to failing to reliably discriminate accurate from inaccurate structures among tens of thousands of decoys after computational docking with existing scoring function. We hypothesized that some important physicochemical and energetic features could be used to describe antigen-antibody interfaces and identify native-like antigen-antibody structure. We prepared a dataset, a subset of Protein-Protein Docking Benchmark Version 4.0, comprising 37 nonredundant 3D structures of antigen-antibody complexes, and used it to train and test multivariate logistic regression equation which took several important physicochemical and energetic features of decoys as dependent variables. Our results indicate that the ability to identify native-like structures of our method is superior to ZRANK and ZDOCK score for the subset of antigen-antibody complexes. And then, we use our method in workflow of predicting epitope of anti-Ebola glycoprotein monoclonal antibody-4G7 and identify three accurate residues in its epitope.

  3. Five-wave-packet quantum error correction based on continuous-variable cluster entanglement

    PubMed Central

    Hao, Shuhong; Su, Xiaolong; Tian, Caixing; Xie, Changde; Peng, Kunchi

    2015-01-01

    Quantum error correction protects the quantum state against noise and decoherence in quantum communication and quantum computation, which enables one to perform fault-torrent quantum information processing. We experimentally demonstrate a quantum error correction scheme with a five-wave-packet code against a single stochastic error, the original theoretical model of which was firstly proposed by S. L. Braunstein and T. A. Walker. Five submodes of a continuous variable cluster entangled state of light are used for five encoding channels. Especially, in our encoding scheme the information of the input state is only distributed on three of the five channels and thus any error appearing in the remained two channels never affects the output state, i.e. the output quantum state is immune from the error in the two channels. The stochastic error on a single channel is corrected for both vacuum and squeezed input states and the achieved fidelities of the output states are beyond the corresponding classical limit. PMID:26498395

  4. Experimental protocol for high-fidelity heralded photon-to-atom quantum state transfer.

    PubMed

    Kurz, Christoph; Schug, Michael; Eich, Pascal; Huwer, Jan; Müller, Philipp; Eschner, Jürgen

    2014-11-21

    A quantum network combines the benefits of quantum systems regarding secure information transmission and calculational speed-up by employing quantum coherence and entanglement to store, transmit and process information. A promising platform for implementing such a network are atom-based quantum memories and processors, interconnected by photonic quantum channels. A crucial building block in this scenario is the conversion of quantum states between single photons and single atoms through controlled emission and absorption. Here we present an experimental protocol for photon-to-atom quantum state conversion, whereby the polarization state of an absorbed photon is mapped onto the spin state of a single absorbing atom with >95% fidelity, while successful conversion is heralded by a single emitted photon. Heralded high-fidelity conversion without affecting the converted state is a main experimental challenge, in order to make the transferred information reliably available for further operations. We record >80 s(-1) successful state transfer events out of 18,000 s(-1) repetitions.

  5. Can different quantum state vectors correspond to the same physical state? An experimental test

    NASA Astrophysics Data System (ADS)

    Nigg, Daniel; Monz, Thomas; Schindler, Philipp; Martinez, Esteban A.; Hennrich, Markus; Blatt, Rainer; Pusey, Matthew F.; Rudolph, Terry; Barrett, Jonathan

    2016-01-01

    A century after the development of quantum theory, the interpretation of a quantum state is still discussed. If a physicist claims to have produced a system with a particular quantum state vector, does this represent directly a physical property of the system, or is the state vector merely a summary of the physicist’s information about the system? Assume that a state vector corresponds to a probability distribution over possible values of an unknown physical or ‘ontic’ state. Then, a recent no-go theorem shows that distinct state vectors with overlapping distributions lead to predictions different from quantum theory. We report an experimental test of these predictions using trapped ions. Within experimental error, the results confirm quantum theory. We analyse which kinds of models are ruled out.

  6. Confining the state of light to a quantum manifold by engineered two-photon loss

    NASA Astrophysics Data System (ADS)

    Leghtas, Z.; Touzard, S.; Pop, I. M.; Kou, A.; Vlastakis, B.; Petrenko, A.; Sliwa, K. M.; Narla, A.; Shankar, S.; Hatridge, M. J.; Reagor, M.; Frunzio, L.; Schoelkopf, R. J.; Mirrahimi, M.; Devoret, M. H.

    2015-02-01

    Physical systems usually exhibit quantum behavior, such as superpositions and entanglement, only when they are sufficiently decoupled from a lossy environment. Paradoxically, a specially engineered interaction with the environment can become a resource for the generation and protection of quantum states. This notion can be generalized to the confinement of a system into a manifold of quantum states, consisting of all coherent superpositions of multiple stable steady states. We have confined the state of a superconducting resonator to the quantum manifold spanned by two coherent states of opposite phases and have observed a Schrödinger cat state spontaneously squeeze out of vacuum before decaying into a classical mixture. This experiment points toward robustly encoding quantum information in multidimensional steady-state manifolds.

  7. Quantum discord with weak measurement operators of quasi-Werner states based on bipartite entangled coherent states

    NASA Astrophysics Data System (ADS)

    Castro, E.; Gómez, R.; Ladera, C. L.; Zambrano, A.

    2013-11-01

    Among many applications quantum weak measurements have been shown to be important in exploring fundamental physics issues, such as the experimental violation of the Heisenberg uncertainty relation and the Hardy paradox, and have also technological implications in quantum optics, quantum metrology and quantum communications, where the precision of the measurement is as important as the precision of quantum state preparation. The theory of weak measurement can be formulated using the pre-and post-selected quantum systems, as well as using the weak measurement operator formalism. In this work, we study the quantum discord (QD) of quasi-Werner mixed states based on bipartite entangled coherent states using the weak measurements operator, instead of the projective measurement operators. We then compare the quantum discord for both kinds of measurement operators, in terms of the entanglement quality, the latter being measured using the concept of concurrence. It's found greater quantum correlations using the weak measurement operators.

  8. Two-photon interference of weak coherent laser pulses recalled from separate solid-state quantum memories

    NASA Astrophysics Data System (ADS)

    Jin, Jeongwan; Slater, Joshua A.; Saglamyurek, Erhan; Sinclair, Neil; George, Mathew; Ricken, Raimund; Oblak, Daniel; Sohler, Wolfgang; Tittel, Wolfgang

    2013-08-01

    Quantum memories allowing reversible transfer of quantum states between light and matter are central to quantum repeaters, quantum networks and linear optics quantum computing. Significant progress regarding the faithful transfer of quantum information has been reported in recent years. However, none of these demonstrations confirm that the re-emitted photons remain suitable for two-photon interference measurements, such as C-NOT gates and Bell-state measurements, which constitute another key ingredient for all aforementioned applications. Here, using pairs of laser pulses at the single-photon level, we demonstrate two-photon interference and Bell-state measurements after either none, one or both pulses have been reversibly mapped to separate thulium-doped lithium niobate waveguides. As the interference is always near the theoretical maximum, we conclude that our solid-state quantum memories, in addition to faithfully mapping quantum information, also preserve the entire photonic wavefunction. Hence, our memories are generally suitable for future applications of quantum information processing that require two-photon interference.

  9. Two-photon interference of weak coherent laser pulses recalled from separate solid-state quantum memories.

    PubMed

    Jin, Jeongwan; Slater, Joshua A; Saglamyurek, Erhan; Sinclair, Neil; George, Mathew; Ricken, Raimund; Oblak, Daniel; Sohler, Wolfgang; Tittel, Wolfgang

    2013-01-01

    Quantum memories allowing reversible transfer of quantum states between light and matter are central to quantum repeaters, quantum networks and linear optics quantum computing. Significant progress regarding the faithful transfer of quantum information has been reported in recent years. However, none of these demonstrations confirm that the re-emitted photons remain suitable for two-photon interference measurements, such as C-NOT gates and Bell-state measurements, which constitute another key ingredient for all aforementioned applications. Here, using pairs of laser pulses at the single-photon level, we demonstrate two-photon interference and Bell-state measurements after either none, one or both pulses have been reversibly mapped to separate thulium-doped lithium niobate waveguides. As the interference is always near the theoretical maximum, we conclude that our solid-state quantum memories, in addition to faithfully mapping quantum information, also preserve the entire photonic wavefunction. Hence, our memories are generally suitable for future applications of quantum information processing that require two-photon interference.

  10. Quantum steerability: Characterization, quantification, superactivation, and unbounded amplification

    NASA Astrophysics Data System (ADS)

    Hsieh, Chung-Yun; Liang, Yeong-Cherng; Lee, Ray-Kuang

    2016-12-01

    Quantum steering, also called Einstein-Podolsky-Rosen steering, is the intriguing phenomenon associated with the ability of spatially separated observers to steer—by means of local measurements—the set of conditional quantum states accessible by a distant party. In the light of quantum information, all steerable quantum states are known to be resources for quantum information processing tasks. Here, via a quantity dubbed steering fraction, we derive a simple, but general criterion that allows one to identify quantum states that can exhibit quantum steering (without having to optimize over the measurements performed by each party), thus making an important step towards the characterization of steerable quantum states. The criterion, in turn, also provides upper bounds on the largest steering-inequality violation achievable by arbitrary finite-dimensional maximally entangled states. For the quantification of steerability, we prove that a strengthened version of the steering fraction is a convex steering monotone and demonstrate how it is related to two other steering monotones, namely, steerable weight and steering robustness. Using these tools, we further demonstrate the superactivation of steerability for a well-known family of entangled quantum states, i.e., we show how the steerability of certain entangled, but unsteerable quantum states can be recovered by allowing joint measurements on multiple copies of the same state. In particular, our approach allows one to explicitly construct a steering inequality to manifest this phenomenon. Finally, we prove that there exist examples of quantum states (including some which are unsteerable under projective measurements) whose steering-inequality violation can be arbitrarily amplified by allowing joint measurements on as little as three copies of the same state. For completeness, we also demonstrate how the largest steering-inequality violation can be used to bound the largest Bell-inequality violation and derive, analogously, a simple sufficient condition for Bell nonlocality from the latter.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spagnolo, Nicolo; Consorzio Interuniversitario per le Scienze Fisiche della Materia, piazzale Aldo Moro 5, I-00185 Roma; Sciarrino, Fabio

    We show that the quantum states generated by universal optimal quantum cloning of a single photon represent a universal set of quantum superpositions resilient to decoherence. We adopt the Bures distance as a tool to investigate the persistence of quantum coherence of these quantum states. According to this analysis, the process of universal cloning realizes a class of quantum superpositions that exhibits a covariance property in lossy configuration over the complete set of polarization states in the Bloch sphere.

  12. Dissipative production of a maximally entangled steady state of two quantum bits.

    PubMed

    Lin, Y; Gaebler, J P; Reiter, F; Tan, T R; Bowler, R; Sørensen, A S; Leibfried, D; Wineland, D J

    2013-12-19

    Entangled states are a key resource in fundamental quantum physics, quantum cryptography and quantum computation. Introduction of controlled unitary processes--quantum gates--to a quantum system has so far been the most widely used method to create entanglement deterministically. These processes require high-fidelity state preparation and minimization of the decoherence that inevitably arises from coupling between the system and the environment, and imperfect control of the system parameters. Here we combine unitary processes with engineered dissipation to deterministically produce and stabilize an approximate Bell state of two trapped-ion quantum bits (qubits), independent of their initial states. Compared with previous studies that involved dissipative entanglement of atomic ensembles or the application of sequences of multiple time-dependent gates to trapped ions, we implement our combined process using trapped-ion qubits in a continuous time-independent fashion (analogous to optical pumping of atomic states). By continuously driving the system towards the steady state, entanglement is stabilized even in the presence of experimental noise and decoherence. Our demonstration of an entangled steady state of two qubits represents a step towards dissipative state engineering, dissipative quantum computation and dissipative phase transitions. Following this approach, engineered coupling to the environment may be applied to a broad range of experimental systems to achieve desired quantum dynamics or steady states. Indeed, concurrently with this work, an entangled steady state of two superconducting qubits was demonstrated using dissipation.

  13. Bounds on negativity for the success of quantum teleportation of qutrit-qubit system

    NASA Astrophysics Data System (ADS)

    K G, Paulson; Satyanarayana, S. V. M.

    In the original protocol Bennet et.al., used maximally entangled pure states as quantum channel to teleport unknown states between distant observers with maximum fidelity. Noisy quantum channel can be used for imperfect teleportation. Both degree of entanglement and mixedness decide the success of teleportation in the case of mixed entangled quantum channel. . In one of our previous works, we discussed the existence of lower bound below which ,state is useless for quantum teleportation in the measure of entanglement for a fixed value of fidelity, and this lower bound decreases as rank increases for two-qubit system. We use negativity as the measure of entanglement. . In this work, we consider a qutrit-qubit system as quantum channel for teleportation, and study how the negativity and rank affect the teleportation fidelity for a class of states. We construct a new class of mixed entangled qutrit-qubit states as quantum channel, which is a convex sum of orthonormal maximally entangled and separable pure states. The classical limit of fidelity below which state is useless for quantum teleportation is fixed as 2/3. We numerically generate 30000 states and estimate the value of negativity below which each rank mixed state is useless for quantum teleportation. We also construct rank dependant boundary states by choosing appropriate eigen values, which act as upper bound for respective rank states.

  14. Aberrant expression and function of death receptor-3 and death decoy receptor-3 in human cancer.

    PubMed

    Ge, Zhicheng; Sanders, Andrew J; Ye, Lin; Jiang, Wen G

    2011-03-01

    Death receptor-3 (DR3) and death decoy receptor-3 (DcR3) are both members of the tumour necrosis factor receptor (TNFR) superfamily. The TNFR superfamily contains eight death domain-containing receptors, including TNFR1 (also called DR1), Fas (also called DR2), DR3, DR4, DR5, DR6, NGFR and EDAR. Upon the binding of these receptors with their corresponding ligands, the death domain recruits various proteins that mediate both the death and proliferation of cells. Receptor function is negatively regulated by decoy receptors (DcR1, DcR2, DcR3 and OPG). DR3/DcR3 are a pair of positive and negative players with which vascular endothelial growth inhibitor (VEGI) interacts. VEGI has been suggested to be a potential tumour suppressor. The inhibitory effects of VEGI on cancer are manifested in three main areas: a direct effect on cancer cells, an anti-angiogenic effect on endothelial cells, and the stimulation of dendritic cell maturation. A recent study indicated that DR3 may be a new receptor for E-selectin, which has been reported to be associated with cancer metastasis. DcR3 is a soluble receptor, highly expressed in various tumours, which lacks an apparent transmembrane segment, prevents cytokine response through ligand binding and neutralization, and is an inhibitor of apoptosis. DcR3 serves as a decoy receptor for FasL, LIGHT and VEGI. The cytokine LIGHT activates various anti-tumour functions and is expected to be a promising candidate for cancer therapy. Certain tumours may escape FasL-dependent immune-cytotoxic attack by expressing DcR3, which blocks FasL function. DR3/DcR3 play profound roles in regulating cell death and proliferation in cancer. The present review briefly discusses DR3/DcR3 and attempts to elucidate the role of these negative and positive players in cancer.

  15. Efficient quantum transmission in multiple-source networks.

    PubMed

    Luo, Ming-Xing; Xu, Gang; Chen, Xiu-Bo; Yang, Yi-Xian; Wang, Xiaojun

    2014-04-02

    A difficult problem in quantum network communications is how to efficiently transmit quantum information over large-scale networks with common channels. We propose a solution by developing a quantum encoding approach. Different quantum states are encoded into a coherent superposition state using quantum linear optics. The transmission congestion in the common channel may be avoided by transmitting the superposition state. For further decoding and continued transmission, special phase transformations are applied to incoming quantum states using phase shifters such that decoders can distinguish outgoing quantum states. These phase shifters may be precisely controlled using classical chaos synchronization via additional classical channels. Based on this design and the reduction of multiple-source network under the assumption of restricted maximum-flow, the optimal scheme is proposed for specially quantized multiple-source network. In comparison with previous schemes, our scheme can greatly increase the transmission efficiency.

  16. Deterministic generation of multiparticle entanglement by quantum Zeno dynamics.

    PubMed

    Barontini, Giovanni; Hohmann, Leander; Haas, Florian; Estève, Jérôme; Reichel, Jakob

    2015-09-18

    Multiparticle entangled quantum states, a key resource in quantum-enhanced metrology and computing, are usually generated by coherent operations exclusively. However, unusual forms of quantum dynamics can be obtained when environment coupling is used as part of the state generation. In this work, we used quantum Zeno dynamics (QZD), based on nondestructive measurement with an optical microcavity, to deterministically generate different multiparticle entangled states in an ensemble of 36 qubit atoms in less than 5 microseconds. We characterized the resulting states by performing quantum tomography, yielding a time-resolved account of the entanglement generation. In addition, we studied the dependence of quantum states on measurement strength and quantified the depth of entanglement. Our results show that QZD is a versatile tool for fast and deterministic entanglement generation in quantum engineering applications. Copyright © 2015, American Association for the Advancement of Science.

  17. Secret Sharing of a Quantum State.

    PubMed

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  18. Quantum teleportation between remote atomic-ensemble quantum memories.

    PubMed

    Bao, Xiao-Hui; Xu, Xiao-Fan; Li, Che-Ming; Yuan, Zhen-Sheng; Lu, Chao-Yang; Pan, Jian-Wei

    2012-12-11

    Quantum teleportation and quantum memory are two crucial elements for large-scale quantum networks. With the help of prior distributed entanglement as a "quantum channel," quantum teleportation provides an intriguing means to faithfully transfer quantum states among distant locations without actual transmission of the physical carriers [Bennett CH, et al. (1993) Phys Rev Lett 70(13):1895-1899]. Quantum memory enables controlled storage and retrieval of fast-flying photonic quantum bits with stationary matter systems, which is essential to achieve the scalability required for large-scale quantum networks. Combining these two capabilities, here we realize quantum teleportation between two remote atomic-ensemble quantum memory nodes, each composed of ∼10(8) rubidium atoms and connected by a 150-m optical fiber. The spin wave state of one atomic ensemble is mapped to a propagating photon and subjected to Bell state measurements with another single photon that is entangled with the spin wave state of the other ensemble. Two-photon detection events herald the success of teleportation with an average fidelity of 88(7)%. Besides its fundamental interest as a teleportation between two remote macroscopic objects, our technique may be useful for quantum information transfer between different nodes in quantum networks and distributed quantum computing.

  19. Capacity of a quantum memory channel correlated by matrix product states

    NASA Astrophysics Data System (ADS)

    Mulherkar, Jaideep; Sunitha, V.

    2018-04-01

    We study the capacity of a quantum channel where channel acts like controlled phase gate with the control being provided by a one-dimensional quantum spin chain environment. Due to the correlations in the spin chain, we get a quantum channel with memory. We derive formulas for the quantum capacity of this channel when the spin state is a matrix product state. Particularly, we derive exact formulas for the capacity of the quantum memory channel when the environment state is the ground state of the AKLT model and the Majumdar-Ghosh model. We find that the behavior of the capacity for the range of the parameters is analytic.

  20. Generalized Bell states map physical systems’ quantum evolution into a grammar for quantum information processing

    NASA Astrophysics Data System (ADS)

    Delgado, Francisco

    2017-12-01

    Quantum information processing should be generated through control of quantum evolution for physical systems being used as resources, such as superconducting circuits, spinspin couplings in ions and artificial anyons in electronic gases. They have a quantum dynamics which should be translated into more natural languages for quantum information processing. On this terrain, this language should let to establish manipulation operations on the associated quantum information states as classical information processing does. This work shows how a kind of processing operations can be settled and implemented for quantum states design and quantum processing for systems fulfilling a SU(2) reduction in their dynamics.

  1. Hybrid quantum processors: molecular ensembles as quantum memory for solid state circuits.

    PubMed

    Rabl, P; DeMille, D; Doyle, J M; Lukin, M D; Schoelkopf, R J; Zoller, P

    2006-07-21

    We investigate a hybrid quantum circuit where ensembles of cold polar molecules serve as long-lived quantum memories and optical interfaces for solid state quantum processors. The quantum memory realized by collective spin states (ensemble qubit) is coupled to a high-Q stripline cavity via microwave Raman processes. We show that, for convenient trap-surface distances of a few microm, strong coupling between the cavity and ensemble qubit can be achieved. We discuss basic quantum information protocols, including a swap from the cavity photon bus to the molecular quantum memory, and a deterministic two qubit gate. Finally, we investigate coherence properties of molecular ensemble quantum bits.

  2. An impurity-induced gap system as a quantum data bus for quantum state transfer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, Bing, E-mail: chenbingphys@gmail.com; Li, Yong; Song, Z.

    2014-09-15

    We introduce a tight-binding chain with a single impurity to act as a quantum data bus for perfect quantum state transfer. Our proposal is based on the weak coupling limit of the two outermost quantum dots to the data bus, which is a gapped system induced by the impurity. By connecting two quantum dots to two sites of the data bus, the system can accomplish a high-fidelity and long-distance quantum state transfer. Numerical simulations for finite system show that the numerical and analytical results of the effective coupling strength agree well with each other. Moreover, we study the robustness ofmore » this quantum communication protocol in the presence of disorder in the couplings between the nearest-neighbor quantum dots. We find that the gap of the system plays an important role in robust quantum state transfer.« less

  3. Joining the quantum state of two photons into one

    NASA Astrophysics Data System (ADS)

    Vitelli, Chiara; Spagnolo, Nicolò; Aparo, Lorenzo; Sciarrino, Fabio; Santamato, Enrico; Marrucci, Lorenzo

    2013-07-01

    Photons are the ideal carriers of quantum information for communication. Each photon can have a single or multiple qubits encoded in its internal quantum state, as defined by optical degrees of freedom such as polarization, wavelength, transverse modes and so on. However, as photons do not interact, multiplexing and demultiplexing the quantum information across photons has not been possible hitherto. Here, we introduce and demonstrate experimentally a physical process, named `quantum joining', in which the two-dimensional quantum states (qubits) of two input photons are combined into a single output photon, within a four-dimensional Hilbert space. The inverse process is also proposed, in which the four-dimensional quantum state of a single photon is split into two photons, each carrying a qubit. Both processes can be iterated, and hence provide a flexible quantum interconnect to bridge multiparticle protocols of quantum information with multidegree-of-freedom ones, with possible applications in future quantum networking.

  4. The relation between the quantum discord and quantum teleportation: The physical interpretation of the transition point between different quantum discord decay regimes

    NASA Astrophysics Data System (ADS)

    Roszak, K.; Cywiński, Ł.

    2015-10-01

    We study quantum teleportation via Bell-diagonal mixed states of two qubits in the context of the intrinsic properties of the quantum discord. We show that when the quantum-correlated state of the two qubits is used for quantum teleportation, the character of the teleportation efficiency changes substantially depending on the Bell-diagonal-state parameters, which can be seen when the worst-case-scenario or best-case-scenario fidelity is studied. Depending on the parameter range, one of two types of single-qubit states is hardest/easiest to teleport. The transition between these two parameter ranges coincides exactly with the transition between the range of classical correlation decay and quantum correlation decay characteristic for the evolution of the quantum discord. The correspondence provides a physical interpretation for the prominent feature of the decay of the quantum discord.

  5. Distribution of squeezed states through an atmospheric channel.

    PubMed

    Peuntinger, Christian; Heim, Bettina; Müller, Christian R; Gabriel, Christian; Marquardt, Christoph; Leuchs, Gerd

    2014-08-08

    Continuous variable quantum states of light are used in quantum information protocols and quantum metrology and known to degrade with loss and added noise. We were able to show the distribution of bright polarization squeezed quantum states of light through an urban free-space channel of 1.6 km length. To measure the squeezed states in this extreme environment, we utilize polarization encoding and a postselection protocol that is taking into account classical side information stemming from the distribution of transmission values. The successful distribution of continuous variable squeezed states is accentuated by a quantum state tomography, allowing for determining the purity of the state.

  6. Quantum state and mode profile tomography by the overlap

    NASA Astrophysics Data System (ADS)

    Tiedau, J.; Shchesnovich, V. S.; Mogilevtsev, D.; Ansari, V.; Harder, G.; Bartley, T. J.; Korolkova, N.; Silberhorn, Ch

    2018-03-01

    Any measurement scheme involving interference of quantum states of the electromagnetic field necessarily mixes information about the spatiotemporal structure of these fields and quantum states in the recorded data. We show that in this case, a trade-off is possible between extracting information about the quantum states and the structure of the underlying fields, with the modal overlap being either a goal or a convenient tool of the reconstruction. We show that varying quantum states in a controlled way allows one to infer temporal profiles of modes. Vice versa, for the known quantum state of the probe and controlled variable overlap, one can infer the quantum state of the signal. We demonstrate this trade-off by performing an experiment using the simplest on-off detection in an unbalanced weak homodyning scheme. For the single-mode case, we demonstrate experimentally inference of the overlap and a few-photon signal state. Moreover, we show theoretically that the same single-detector scheme is sufficient even for arbitrary multi-mode fields.

  7. Are Cloned Quantum States Macroscopic?

    NASA Astrophysics Data System (ADS)

    Fröwis, F.; Dür, W.

    2012-10-01

    We study quantum states produced by optimal phase covariant quantum cloners. We argue that cloned quantum superpositions are not macroscopic superpositions in the spirit of Schrödinger’s cat, despite their large particle number. This is indicated by calculating several measures for macroscopic superpositions from the literature, as well as by investigating the distinguishability of the two superposed cloned states. The latter rapidly diminishes when considering imperfect detectors or noisy states and does not increase with the system size. In contrast, we find that cloned quantum states themselves are macroscopic, in the sense of both proposed measures and their usefulness in quantum metrology with an optimal scaling in system size. We investigate the applicability of cloned states for parameter estimation in the presence of different kinds of noise.

  8. Superposing pure quantum states with partial prior information

    NASA Astrophysics Data System (ADS)

    Dogra, Shruti; Thomas, George; Ghosh, Sibasish; Suter, Dieter

    2018-05-01

    The principle of superposition is an intriguing feature of quantum mechanics, which is regularly exploited in many different circumstances. A recent work [M. Oszmaniec et al., Phys. Rev. Lett. 116, 110403 (2016), 10.1103/PhysRevLett.116.110403] shows that the fundamentals of quantum mechanics restrict the process of superimposing two unknown pure states, even though it is possible to superimpose two quantum states with partial prior knowledge. The prior knowledge imposes geometrical constraints on the choice of input states. We discuss an experimentally feasible protocol to superimpose multiple pure states of a d -dimensional quantum system and carry out an explicit experimental realization for two single-qubit pure states with partial prior information on a two-qubit NMR quantum information processor.

  9. Joint Remote State Preparation Schemes for Two Different Quantum States Selectively

    NASA Astrophysics Data System (ADS)

    Shi, Jin

    2018-05-01

    The scheme for joint remote state preparation of two different one-qubit states according to requirement is proposed by using one four-dimensional spatial-mode-entangled KLM state as quantum channel. The scheme for joint remote state preparation of two different two-qubit states according to requirement is also proposed by using one four-dimensional spatial-mode-entangled KLM state and one three-dimensional spatial-mode-entangled GHZ state as quantum channels. Quantum non-demolition measurement, Hadamard gate operation, projective measurement and unitary transformation are included in the schemes.

  10. RAPID COMMUNICATIONS: Long-distance quantum teleportation assisted with free-space entanglement distribution

    NASA Astrophysics Data System (ADS)

    Ren, Ji-Gang; Yang, Bin; Yi, Zhen-Huan; Zhou, Fei; Chen, Kai; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-08-01

    Faithful long-distance quantum teleportation necessitates prior entanglement distribution between two communicated locations. The particle carrying on the unknown quantum information is then combined with one particle of the entangled states for Bell-state measurements, which leads to a transfer of the original quantum information onto the other particle of the entangled states. However in most of the implemented teleportation experiments nowadays, the Bell-state measurements are performed even before successful distribution of entanglement. This leads to an instant collapse of the quantum state for the transmitted particle, which is actually a single-particle transmission thereafter. Thus the true distance for quantum teleportation is, in fact, only in a level of meters. In the present experiment we design a novel scheme which has overcome this limit by utilizing fiber as quantum memory. A complete quantum teleportation is achieved upon successful entanglement distribution over 967 meters in public free space. Active feed-forward control techniques are developed for real-time transfer of quantum information. The overall experimental fidelities for teleported states are better than 89.6%, which signify high-quality teleportation.

  11. Quantum State Transfer from a Single Photon to a Distant Quantum-Dot Electron Spin

    NASA Astrophysics Data System (ADS)

    He, Yu; He, Yu-Ming; Wei, Yu-Jia; Jiang, Xiao; Chen, Kai; Lu, Chao-Yang; Pan, Jian-Wei; Schneider, Christian; Kamp, Martin; Höfling, Sven

    2017-08-01

    Quantum state transfer from flying photons to stationary matter qubits is an important element in the realization of quantum networks. Self-assembled semiconductor quantum dots provide a promising solid-state platform hosting both single photon and spin, with an inherent light-matter interface. Here, we develop a method to coherently and actively control the single-photon frequency bins in superposition using electro-optic modulators, and measure the spin-photon entanglement with a fidelity of 0.796 ±0.020 . Further, by Greenberger-Horne-Zeilinger-type state projection on the frequency, path, and polarization degrees of freedom of a single photon, we demonstrate quantum state transfer from a single photon to a single electron spin confined in an InGaAs quantum dot, separated by 5 m. The quantum state mapping from the photon's polarization to the electron's spin is demonstrated along three different axes on the Bloch sphere, with an average fidelity of 78.5%.

  12. Quantum Entanglement and the Topological Order of Fractional Hall States

    NASA Astrophysics Data System (ADS)

    Rezayi, Edward

    2015-03-01

    Fractional quantum Hall states or, more generally, topological phases of matter defy Landau classification based on order parameter and broken symmetry. Instead they have been characterized by their topological order. Quantum information concepts, such as quantum entanglement, appear to provide the most efficient method of detecting topological order solely from the knowledge of the ground state wave function. This talk will focus on real-space bi-partitioning of quantum Hall states and will present both exact diagonalization and quantum Monte Carlo studies of topological entanglement entropy in various geometries. Results on the torus for non-contractible cuts are quite rich and, through the use of minimum entropy states, yield the modular S-matrix and hence uniquely determine the topological order, as shown in recent literature. Concrete examples of minimum entropy states from known quantum Hall wave functions and their corresponding quantum numbers, used in exact diagonalizations, will be given. In collaboration with Clare Abreu and Raul Herrera. Supported by DOE Grant DE-SC0002140.

  13. Andreev molecules in semiconductor nanowire double quantum dots.

    PubMed

    Su, Zhaoen; Tacla, Alexandre B; Hocevar, Moïra; Car, Diana; Plissard, Sébastien R; Bakkers, Erik P A M; Daley, Andrew J; Pekker, David; Frolov, Sergey M

    2017-09-19

    Chains of quantum dots coupled to superconductors are promising for the realization of the Kitaev model of a topological superconductor. While individual superconducting quantum dots have been explored, control of longer chains requires understanding of interdot coupling. Here, double quantum dots are defined by gate voltages in indium antimonide nanowires. High transparency superconducting niobium titanium nitride contacts are made to each of the dots in order to induce superconductivity, as well as probe electron transport. Andreev bound states induced on each of dots hybridize to define Andreev molecular states. The evolution of these states is studied as a function of charge parity on the dots, and in magnetic field. The experiments are found in agreement with a numerical model.Quantum dots in a nanowire are one possible approach to creating a solid-state quantum simulator. Here, the authors demonstrate the coupling of electronic states in a double quantum dot to form Andreev molecule states; a potential building block for longer chains suitable for quantum simulation.

  14. Measurement-induced entanglement for excitation stored in remote atomic ensembles.

    PubMed

    Chou, C W; de Riedmatten, H; Felinto, D; Polyakov, S V; van Enk, S J; Kimble, H J

    2005-12-08

    A critical requirement for diverse applications in quantum information science is the capability to disseminate quantum resources over complex quantum networks. For example, the coherent distribution of entangled quantum states together with quantum memory (for storing the states) can enable scalable architectures for quantum computation, communication and metrology. Here we report observations of entanglement between two atomic ensembles located in distinct, spatially separated set-ups. Quantum interference in the detection of a photon emitted by one of the samples projects the otherwise independent ensembles into an entangled state with one joint excitation stored remotely in 10(5) atoms at each site. After a programmable delay, we confirm entanglement by mapping the state of the atoms to optical fields and measuring mutual coherences and photon statistics for these fields. We thereby determine a quantitative lower bound for the entanglement of the joint state of the ensembles. Our observations represent significant progress in the ability to distribute and store entangled quantum states.

  15. A scheme of quantum state discrimination over specified states via weak-value measurement

    NASA Astrophysics Data System (ADS)

    Chen, Xi; Dai, Hong-Yi; Liu, Bo-Yang; Zhang, Ming

    2018-04-01

    The commonly adopted projective measurements are invalid in the specified task of quantum state discrimination when the discriminated states are superposition of planar-position basis states whose complex-number probability amplitudes have the same magnitude but different phases. Therefore we propose a corresponding scheme via weak-value measurement and examine the feasibility of this scheme. Furthermore, the role of the weak-value measurement in quantum state discrimination is analyzed and compared with one in quantum state tomography in this Letter.

  16. Efficient Quantum Transmission in Multiple-Source Networks

    PubMed Central

    Luo, Ming-Xing; Xu, Gang; Chen, Xiu-Bo; Yang, Yi-Xian; Wang, Xiaojun

    2014-01-01

    A difficult problem in quantum network communications is how to efficiently transmit quantum information over large-scale networks with common channels. We propose a solution by developing a quantum encoding approach. Different quantum states are encoded into a coherent superposition state using quantum linear optics. The transmission congestion in the common channel may be avoided by transmitting the superposition state. For further decoding and continued transmission, special phase transformations are applied to incoming quantum states using phase shifters such that decoders can distinguish outgoing quantum states. These phase shifters may be precisely controlled using classical chaos synchronization via additional classical channels. Based on this design and the reduction of multiple-source network under the assumption of restricted maximum-flow, the optimal scheme is proposed for specially quantized multiple-source network. In comparison with previous schemes, our scheme can greatly increase the transmission efficiency. PMID:24691590

  17. Quantum and classical dynamics in adiabatic computation

    NASA Astrophysics Data System (ADS)

    Crowley, P. J. D.; Äńurić, T.; Vinci, W.; Warburton, P. A.; Green, A. G.

    2014-10-01

    Adiabatic transport provides a powerful way to manipulate quantum states. By preparing a system in a readily initialized state and then slowly changing its Hamiltonian, one may achieve quantum states that would otherwise be inaccessible. Moreover, a judicious choice of final Hamiltonian whose ground state encodes the solution to a problem allows adiabatic transport to be used for universal quantum computation. However, the dephasing effects of the environment limit the quantum correlations that an open system can support and degrade the power of such adiabatic computation. We quantify this effect by allowing the system to evolve over a restricted set of quantum states, providing a link between physically inspired classical optimization algorithms and quantum adiabatic optimization. This perspective allows us to develop benchmarks to bound the quantum correlations harnessed by an adiabatic computation. We apply these to the D-Wave Vesuvius machine with revealing—though inconclusive—results.

  18. Optimal and robust control of quantum state transfer by shaping the spectral phase of ultrafast laser pulses.

    PubMed

    Guo, Yu; Dong, Daoyi; Shu, Chuan-Cun

    2018-04-04

    Achieving fast and efficient quantum state transfer is a fundamental task in physics, chemistry and quantum information science. However, the successful implementation of the perfect quantum state transfer also requires robustness under practically inevitable perturbative defects. Here, we demonstrate how an optimal and robust quantum state transfer can be achieved by shaping the spectral phase of an ultrafast laser pulse in the framework of frequency domain quantum optimal control theory. Our numerical simulations of the single dibenzoterrylene molecule as well as in atomic rubidium show that optimal and robust quantum state transfer via spectral phase modulated laser pulses can be achieved by incorporating a filtering function of the frequency into the optimization algorithm, which in turn has potential applications for ultrafast robust control of photochemical reactions.

  19. Multi-dimensional photonic states from a quantum dot

    NASA Astrophysics Data System (ADS)

    Lee, J. P.; Bennett, A. J.; Stevenson, R. M.; Ellis, D. J. P.; Farrer, I.; Ritchie, D. A.; Shields, A. J.

    2018-04-01

    Quantum states superposed across multiple particles or degrees of freedom offer an advantage in the development of quantum technologies. Creating these states deterministically and with high efficiency is an ongoing challenge. A promising approach is the repeated excitation of multi-level quantum emitters, which have been shown to naturally generate light with quantum statistics. Here we describe how to create one class of higher dimensional quantum state, a so called W-state, which is superposed across multiple time bins. We do this by repeated Raman scattering of photons from a charged quantum dot in a pillar microcavity. We show this method can be scaled to larger dimensions with no reduction in coherence or single-photon character. We explain how to extend this work to enable the deterministic creation of arbitrary time-bin encoded qudits.

  20. Quantum strain sensor with a topological insulator HgTe quantum dot

    PubMed Central

    Korkusinski, Marek; Hawrylak, Pawel

    2014-01-01

    We present a theory of electronic properties of HgTe quantum dot and propose a strain sensor based on a strain-driven transition from a HgTe quantum dot with inverted bandstructure and robust topologically protected quantum edge states to a normal state without edge states in the energy gap. The presence or absence of edge states leads to large on/off ratio of conductivity across the quantum dot, tunable by adjusting the number of conduction channels in the source-drain voltage window. The electronic properties of a HgTe quantum dot as a function of size and applied strain are described using eight-band Luttinger and Bir-Pikus Hamiltonians, with surface states identified with chirality of Luttinger spinors and obtained through extensive numerical diagonalization of the Hamiltonian. PMID:24811674

  1. Quantum information theory of the Bell-state quantum eraser

    NASA Astrophysics Data System (ADS)

    Glick, Jennifer R.; Adami, Christoph

    2017-01-01

    Quantum systems can display particle- or wavelike properties, depending on the type of measurement that is performed on them. The Bell-state quantum eraser is an experiment that brings the duality to the forefront, as a single measurement can retroactively be made to measure particlelike or wavelike properties (or anything in between). Here we develop a unitary information-theoretic description of this and several related quantum measurement situations that sheds light on the trade-off between the quantum and classical features of the measurement. In particular, we show that both the coherence of the quantum state and the classical information obtained from it can be described using only quantum-information-theoretic tools and that those two measures satisfy an equality on account of the chain rule for entropies. The coherence information and the which-path information have simple interpretations in terms of state preparation and state determination and suggest ways to account for the relationship between the classical and the quantum world.

  2. Computing quantum discord is NP-complete

    NASA Astrophysics Data System (ADS)

    Huang, Yichen

    2014-03-01

    We study the computational complexity of quantum discord (a measure of quantum correlation beyond entanglement), and prove that computing quantum discord is NP-complete. Therefore, quantum discord is computationally intractable: the running time of any algorithm for computing quantum discord is believed to grow exponentially with the dimension of the Hilbert space so that computing quantum discord in a quantum system of moderate size is not possible in practice. As by-products, some entanglement measures (namely entanglement cost, entanglement of formation, relative entropy of entanglement, squashed entanglement, classical squashed entanglement, conditional entanglement of mutual information, and broadcast regularization of mutual information) and constrained Holevo capacity are NP-hard/NP-complete to compute. These complexity-theoretic results are directly applicable in common randomness distillation, quantum state merging, entanglement distillation, superdense coding, and quantum teleportation; they may offer significant insights into quantum information processing. Moreover, we prove the NP-completeness of two typical problems: linear optimization over classical states and detecting classical states in a convex set, providing evidence that working with classical states is generically computationally intractable.

  3. Magnetically Defined Qubits on 3D Topological Insulators

    NASA Astrophysics Data System (ADS)

    Ferreira, Gerson J.; Loss, Daniel

    2014-03-01

    We explore potentials that break time-reversal symmetry to confine the surface states of 3D topological insulators into quantum wires and quantum dots. A magnetic domain wall on a ferromagnet insulator cap layer provides interfacial states predicted to show the quantum anomalous Hall effect. Here, we show that confinement can also occur at magnetic domain heterostructures, with states extended in the inner domain, as well as interfacial QAHE states at the surrounding domain walls. The proposed geometry allows the isolation of the wire and dot from spurious circumventing surface states. For the quantum dots, we find that highly spin-polarized quantized QAHE states at the dot edge constitute a promising candidate for quantum computing qubits. See [Ferreira and Loss, Phys. Rev. Lett. 111, 106802 (2013)]. We explore potentials that break time-reversal symmetry to confine the surface states of 3D topological insulators into quantum wires and quantum dots. A magnetic domain wall on a ferromagnet insulator cap layer provides interfacial states predicted to show the quantum anomalous Hall effect. Here, we show that confinement can also occur at magnetic domain heterostructures, with states extended in the inner domain, as well as interfacial QAHE states at the surrounding domain walls. The proposed geometry allows the isolation of the wire and dot from spurious circumventing surface states. For the quantum dots, we find that highly spin-polarized quantized QAHE states at the dot edge constitute a promising candidate for quantum computing qubits. See [Ferreira and Loss, Phys. Rev. Lett. 111, 106802 (2013)]. We acknowledge support from the Swiss NSF, NCCR Nanoscience, NCCR QSIT, and the Brazillian Research Support Center Initiative (NAP Q-NANO) from Pró-Reitoria de Pesquisa (PRP/USP).

  4. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    NASA Astrophysics Data System (ADS)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  5. Isolation of epidermal cells and cDNA cloning of TNF decoy receptor 3 of conger eel, Conger myriaster.

    PubMed

    Tsutsui, Shigeyuki; Yoshino, Yuko; Matsui, Saho; Nakamura, Osamu; Muramoto, Koji; Watanabe, Tasuku

    2008-03-01

    By using EDTA and a trypsin solution, we established a method for isolating the epidermal cells of the conger eel, Conger myriaster. We then identified TNF decoy receptor (DcR) cDNA in the species from a suppression subtractive hybridization library prepared from the epidermal cells stimulated with LPS. The full-length cDNA of conger TNF DcR (conDcR) consisted of 1479 base pairs, and the protein comprised 286 amino acid residues. Phylogenetic analysis indicated that conDcR was clustered into a DcR3 branch. ConDcR is likely to act as an important immune-regulating factor in inhibiting the apoptosis-inducing effect of TNF in the skin of conger eel.

  6. Quantum correlations of helicity entangled states in non-inertial frames beyond single mode approximation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harsij, Zeynab, E-mail: z.harsij@ph.iut.ac.ir; Mirza, Behrouz, E-mail: b.mirza@cc.iut.ac.ir

    A helicity entangled tripartite state is considered in which the degree of entanglement is preserved in non-inertial frames. It is shown that Quantum Entanglement remains observer independent. As another measure of quantum correlation, Quantum Discord has been investigated. It is explicitly shown that acceleration has no effect on the degree of quantum correlation for the bipartite and tripartite helicity entangled states. Geometric Quantum Discord as a Hilbert–Schmidt distance is computed for helicity entangled states. It is shown that living in non-inertial frames does not make any influence on this distance, either. In addition, the analysis has been extended beyond singlemore » mode approximation to show that acceleration does not have any impact on the quantum features in the limit beyond the single mode. As an interesting result, while the density matrix depends on the right and left Unruh modes, the Negativity as a measure of Quantum Entanglement remains constant. Also, Quantum Discord does not change beyond single mode approximation. - Highlights: • The helicity entangled states here are observer independent in non-inertial frames. • It is explicitly shown that Quantum Discord for these states is observer independent. • Geometric Quantum Discord is also not affected by acceleration increase. • Extending to beyond single mode does not change the degree of entanglement. • Beyond single mode approximation the degree of Quantum Discord is also preserved.« less

  7. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-06-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  8. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-02-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  9. One-way quantum computing in superconducting circuits

    NASA Astrophysics Data System (ADS)

    Albarrán-Arriagada, F.; Alvarado Barrios, G.; Sanz, M.; Romero, G.; Lamata, L.; Retamal, J. C.; Solano, E.

    2018-03-01

    We propose a method for the implementation of one-way quantum computing in superconducting circuits. Measurement-based quantum computing is a universal quantum computation paradigm in which an initial cluster state provides the quantum resource, while the iteration of sequential measurements and local rotations encodes the quantum algorithm. Up to now, technical constraints have limited a scalable approach to this quantum computing alternative. The initial cluster state can be generated with available controlled-phase gates, while the quantum algorithm makes use of high-fidelity readout and coherent feedforward. With current technology, we estimate that quantum algorithms with above 20 qubits may be implemented in the path toward quantum supremacy. Moreover, we propose an alternative initial state with properties of maximal persistence and maximal connectedness, reducing the required resources of one-way quantum computing protocols.

  10. Introduction

    NASA Astrophysics Data System (ADS)

    Bub, Jeffrey; Fuchs, Christopher A.

    The great debate between Einstein and Bohr on the interpretation of quantum mechanics culminated with the Einstein-Podolsky-Rosen (EPR) paper in 1935, "Can quantum-mechanical description of physical reality be considered complete?" (Einstein, Podolsky, & Rosen, 1935, and Bohr's reply, 1935). EPR showed that composite quantum systems, consisting of widely separated subsystems, could exist in certain quantum states that they thought spelled trouble for the Copenhagen interpretation. Specifically, they argued that for such states, the correlations between the outcomes of measurements on the subsystems were incompatible with the assumption that the quantum state was a complete description of the system. They concluded that quantum mechanics was an incomplete theory-that the quantum state could not be the whole story about a system.

  11. Experimental preparation and characterization of four-dimensional quantum states using polarization and time-bin modes of a single photon

    NASA Astrophysics Data System (ADS)

    Yoo, Jinwon; Choi, Yujun; Cho, Young-Wook; Han, Sang-Wook; Lee, Sang-Yun; Moon, Sung; Oh, Kyunghwan; Kim, Yong-Su

    2018-07-01

    We present a detailed method to prepare and characterize four-dimensional pure quantum states or ququarts using polarization and time-bin modes of a single-photon. In particular, we provide a simple method to generate an arbitrary pure ququart and fully characterize the state with quantum state tomography. We also verify the reliability of the recipe by showing experimental preparation and characterization of 20 ququart states in mutually unbiased bases. As qudits provide superior properties over qubits in many fundamental tests of quantum physics and applications in quantum information processing, the presented method will be useful for photonic quantum information science.

  12. Realization of Quantum Digital Signatures without the Requirement of Quantum Memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldson, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-07-01

    Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.

  13. Realization of quantum digital signatures without the requirement of quantum memory.

    PubMed

    Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S

    2014-07-25

    Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.

  14. Compact quantum gates on electron-spin qubits assisted by diamond nitrogen-vacancy centers inside cavities

    NASA Astrophysics Data System (ADS)

    Wei, Hai-Rui; Deng, Fu-Guo

    2013-10-01

    Constructing compact quantum circuits for universal quantum gates on solid-state systems is crucial for quantum computing. We present some compact quantum circuits for a deterministic solid-state quantum computing, including the cnot, Toffoli, and Fredkin gates on the diamond NV centers confined inside cavities, achieved by some input-output processes of a single photon. Our quantum circuits for these universal quantum gates are simple and economic. Moreover, additional electron qubits are not employed, but only a single-photon medium. These gates have a long coherent time. We discuss the feasibility of these universal solid-state quantum gates, concluding that they are feasible with current technology.

  15. Exponential Sensitivity and its Cost in Quantum Physics

    PubMed Central

    Gilyén, András; Kiss, Tamás; Jex, Igor

    2016-01-01

    State selective protocols, like entanglement purification, lead to an essentially non-linear quantum evolution, unusual in naturally occurring quantum processes. Sensitivity to initial states in quantum systems, stemming from such non-linear dynamics, is a promising perspective for applications. Here we demonstrate that chaotic behaviour is a rather generic feature in state selective protocols: exponential sensitivity can exist for all initial states in an experimentally realisable optical scheme. Moreover, any complex rational polynomial map, including the example of the Mandelbrot set, can be directly realised. In state selective protocols, one needs an ensemble of initial states, the size of which decreases with each iteration. We prove that exponential sensitivity to initial states in any quantum system has to be related to downsizing the initial ensemble also exponentially. Our results show that magnifying initial differences of quantum states (a Schrödinger microscope) is possible; however, there is a strict bound on the number of copies needed. PMID:26861076

  16. Quantum Entanglement Swapping between Two Multipartite Entangled States

    NASA Astrophysics Data System (ADS)

    Su, Xiaolong; Tian, Caixing; Deng, Xiaowei; Li, Qiang; Xie, Changde; Peng, Kunchi

    2016-12-01

    Quantum entanglement swapping is one of the most promising ways to realize the quantum connection among local quantum nodes. In this Letter, we present an experimental demonstration of the entanglement swapping between two independent multipartite entangled states, each of which involves a tripartite Greenberger-Horne-Zeilinger (GHZ) entangled state of an optical field. The entanglement swapping is implemented deterministically by means of a joint measurement on two optical modes coming from the two multipartite entangled states respectively and the classical feedforward of the measurement results. After entanglement swapping the two independent multipartite entangled states are merged into a large entangled state in which all unmeasured quantum modes are entangled. The entanglement swapping between a tripartite GHZ state and an Einstein-Podolsky-Rosen entangled state is also demonstrated and the dependence of the resultant entanglement on transmission loss is investigated. The presented experiment provides a feasible technical reference for constructing more complicated quantum networks.

  17. Quantum Entanglement Swapping between Two Multipartite Entangled States.

    PubMed

    Su, Xiaolong; Tian, Caixing; Deng, Xiaowei; Li, Qiang; Xie, Changde; Peng, Kunchi

    2016-12-09

    Quantum entanglement swapping is one of the most promising ways to realize the quantum connection among local quantum nodes. In this Letter, we present an experimental demonstration of the entanglement swapping between two independent multipartite entangled states, each of which involves a tripartite Greenberger-Horne-Zeilinger (GHZ) entangled state of an optical field. The entanglement swapping is implemented deterministically by means of a joint measurement on two optical modes coming from the two multipartite entangled states respectively and the classical feedforward of the measurement results. After entanglement swapping the two independent multipartite entangled states are merged into a large entangled state in which all unmeasured quantum modes are entangled. The entanglement swapping between a tripartite GHZ state and an Einstein-Podolsky-Rosen entangled state is also demonstrated and the dependence of the resultant entanglement on transmission loss is investigated. The presented experiment provides a feasible technical reference for constructing more complicated quantum networks.

  18. Exponential Sensitivity and its Cost in Quantum Physics.

    PubMed

    Gilyén, András; Kiss, Tamás; Jex, Igor

    2016-02-10

    State selective protocols, like entanglement purification, lead to an essentially non-linear quantum evolution, unusual in naturally occurring quantum processes. Sensitivity to initial states in quantum systems, stemming from such non-linear dynamics, is a promising perspective for applications. Here we demonstrate that chaotic behaviour is a rather generic feature in state selective protocols: exponential sensitivity can exist for all initial states in an experimentally realisable optical scheme. Moreover, any complex rational polynomial map, including the example of the Mandelbrot set, can be directly realised. In state selective protocols, one needs an ensemble of initial states, the size of which decreases with each iteration. We prove that exponential sensitivity to initial states in any quantum system has to be related to downsizing the initial ensemble also exponentially. Our results show that magnifying initial differences of quantum states (a Schrödinger microscope) is possible; however, there is a strict bound on the number of copies needed.

  19. Relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: molotkov@issp.ac.ru

    2011-03-15

    A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.

  20. Relating quantum discord with the quantum dense coding capacity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Xin; Qiu, Liang, E-mail: lqiu@cumt.edu.cn; Li, Song

    2015-01-15

    We establish the relations between quantum discord and the quantum dense coding capacity in (n + 1)-particle quantum states. A necessary condition for the vanishing discord monogamy score is given. We also find that the loss of quantum dense coding capacity due to decoherence is bounded below by the sum of quantum discord. When these results are restricted to three-particle quantum states, some complementarity relations are obtained.

  1. Quantum teleportation between remote atomic-ensemble quantum memories

    PubMed Central

    Bao, Xiao-Hui; Xu, Xiao-Fan; Li, Che-Ming; Yuan, Zhen-Sheng; Lu, Chao-Yang; Pan, Jian-Wei

    2012-01-01

    Quantum teleportation and quantum memory are two crucial elements for large-scale quantum networks. With the help of prior distributed entanglement as a “quantum channel,” quantum teleportation provides an intriguing means to faithfully transfer quantum states among distant locations without actual transmission of the physical carriers [Bennett CH, et al. (1993) Phys Rev Lett 70(13):1895–1899]. Quantum memory enables controlled storage and retrieval of fast-flying photonic quantum bits with stationary matter systems, which is essential to achieve the scalability required for large-scale quantum networks. Combining these two capabilities, here we realize quantum teleportation between two remote atomic-ensemble quantum memory nodes, each composed of ∼108 rubidium atoms and connected by a 150-m optical fiber. The spin wave state of one atomic ensemble is mapped to a propagating photon and subjected to Bell state measurements with another single photon that is entangled with the spin wave state of the other ensemble. Two-photon detection events herald the success of teleportation with an average fidelity of 88(7)%. Besides its fundamental interest as a teleportation between two remote macroscopic objects, our technique may be useful for quantum information transfer between different nodes in quantum networks and distributed quantum computing. PMID:23144222

  2. Deterministic quantum teleportation with atoms.

    PubMed

    Riebe, M; Häffner, H; Roos, C F; Hänsel, W; Benhelm, J; Lancaster, G P T; Körber, T W; Becher, C; Schmidt-Kaler, F; James, D F V; Blatt, R

    2004-06-17

    Teleportation of a quantum state encompasses the complete transfer of information from one particle to another. The complete specification of the quantum state of a system generally requires an infinite amount of information, even for simple two-level systems (qubits). Moreover, the principles of quantum mechanics dictate that any measurement on a system immediately alters its state, while yielding at most one bit of information. The transfer of a state from one system to another (by performing measurements on the first and operations on the second) might therefore appear impossible. However, it has been shown that the entangling properties of quantum mechanics, in combination with classical communication, allow quantum-state teleportation to be performed. Teleportation using pairs of entangled photons has been demonstrated, but such techniques are probabilistic, requiring post-selection of measured photons. Here, we report deterministic quantum-state teleportation between a pair of trapped calcium ions. Following closely the original proposal, we create a highly entangled pair of ions and perform a complete Bell-state measurement involving one ion from this pair and a third source ion. State reconstruction conditioned on this measurement is then performed on the other half of the entangled pair. The measured fidelity is 75%, demonstrating unequivocally the quantum nature of the process.

  3. Quantum mechanics and reality: An interpretation of Everett's theory

    NASA Astrophysics Data System (ADS)

    Lehner, Christoph Albert

    The central part of Everett's formulation of quantum mechanics is a quantum mechanical model of memory and of observation as the recording of information in a memory. To use this model as an answer to the measurement problem, Everett has to assume that a conscious observer can be in a superposition of such memory states and be unaware of it. This assumption has puzzled generations of readers. The fundamental aim of this dissertation is to find a set of simpler assumptions which are sufficient to show that Everett's model is empirically adequate. I argue that Everett's model needs three assumptions to account for the process of observation: an assumption of decoherence of observers as quantum mechanical systems; an assumption of supervenience of mental states (qualities) over quantum mechanical properties; and an assumption about the interpretation of quantum mechanical states in general: quantum mechanical states describe ensembles of states of affairs coexisting in the same system. I argue that the only plausible understanding of such ensembles is as ensembles of possibilities, and that all standard no-collapse interpretations agree in this reading of quantum mechanical states. Their differences can be understood as different theories about what marks the real state within this ensemble, and Everett's theory as the claim that no additional 'mark of reality' is necessary. Using the three assumptions, I argue that introspection cannot determine the objective quantum mechanical state of an observer. Rather, the introspective qualities of a quantum mechanical state can be represented by a (classical) statistical ensemble of subjective states. An analysis of these subjective states and their dynamics leads to the conclusion that they suffice to give empirically correct predictions. The argument for the empirical adequacy of the subjective state entails that knowledge of the objective quantum mechanical state is impossible in principle. Empirical reality for a conscious observer is not described by the objective state, but by a Everettian relative state conditional on the subjective state, and no theoretical 'mark of reality' is necessary for this concept of reality. I compare the resulting concept of reality to Kant's distinction between empirical and transcendental reality.

  4. Benchmarking a quantum teleportation protocol in superconducting circuits using tomography and an entanglement witness.

    PubMed

    Baur, M; Fedorov, A; Steffen, L; Filipp, S; da Silva, M P; Wallraff, A

    2012-01-27

    Teleportation of a quantum state may be used for distributing entanglement between distant qubits in quantum communication and for quantum computation. Here we demonstrate the implementation of a teleportation protocol, up to the single-shot measurement step, with superconducting qubits coupled to a microwave resonator. Using full quantum state tomography and evaluating an entanglement witness, we show that the protocol generates a genuine tripartite entangled state of all three qubits. Calculating the projection of the measured density matrix onto the basis states of two qubits allows us to reconstruct the teleported state. Repeating this procedure for a complete set of input states we find an average output state fidelity of 86%.

  5. Open quantum dots—probing the quantum to classical transition

    NASA Astrophysics Data System (ADS)

    Ferry, D. K.; Burke, A. M.; Akis, R.; Brunner, R.; Day, T. E.; Meisels, R.; Kuchar, F.; Bird, J. P.; Bennett, B. R.

    2011-04-01

    Quantum dots provide a natural system in which to study both quantum and classical features of transport. As a closed testbed, they provide a natural system with a very rich set of eigenstates. When coupled to the environment through a pair of quantum point contacts, each of which passes several modes, the original quantum environment evolves into a set of decoherent and coherent states, which classically would compose a mixed phase space. The manner of this breakup is governed strongly by Zurek's decoherence theory, and the remaining coherent states possess all the properties of his pointer states. These states are naturally studied via traditional magnetotransport at low temperatures. More recently, we have used scanning gate (conductance) microscopy to probe the nature of the coherent states, and have shown that families of states exist through the spectrum in a manner consistent with quantum Darwinism. In this review, we discuss the nature of the various states, how they are formed, and the signatures that appear in magnetotransport and general conductance studies.

  6. Temporal shaping of quantum states released from a superconducting cavity memory

    NASA Astrophysics Data System (ADS)

    Burkhart, L.; Axline, C.; Pfaff, W.; Zou, C.; Zhang, M.; Narla, A.; Frunzio, L.; Devoret, M. H.; Jiang, L.; Schoelkopf, R. J.

    State transfer and entanglement distribution are essential primitives in network-based quantum information processing. We have previously demonstrated an interface between a quantum memory and propagating light fields in the microwave domain: by parametric conversion in a single Josephson junction, we have coherently released quantum states from a superconducting cavity resonator into a transmission line. Protocols for state transfer mediated by propagating fields typically rely on temporal mode-matching of couplings at both sender and receiver. However, parametric driving on a single junction results in dynamic frequency shifts, raising the question of whether the pumps alone provide enough control for achieving this mode-matching. We show, in theory and experiment, that phase and amplitude shaping of the parametric drives allows arbitrary control over the propagating field, limited only by the drives bandwidth and amplitude constraints. This temporal mode shaping technique allows for release and capture of quantum states, providing a credible route towards state transfer and entanglement generation in quantum networks in which quantum states are stored and processed in cavities.

  7. Quantum teleportation of multiple degrees of freedom of a single photon

    NASA Astrophysics Data System (ADS)

    Wang, Xi-Lin; Cai, Xin-Dong; Su, Zu-En; Chen, Ming-Cheng; Wu, Dian; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2015-02-01

    Quantum teleportation provides a `disembodied' way to transfer quantum states from one object to another at a distant location, assisted by previously shared entangled states and a classical communication channel. As well as being of fundamental interest, teleportation has been recognized as an important element in long-distance quantum communication, distributed quantum networks and measurement-based quantum computation. There have been numerous demonstrations of teleportation in different physical systems such as photons, atoms, ions, electrons and superconducting circuits. All the previous experiments were limited to the teleportation of one degree of freedom only. However, a single quantum particle can naturally possess various degrees of freedom--internal and external--and with coherent coupling among them. A fundamental open challenge is to teleport multiple degrees of freedom simultaneously, which is necessary to describe a quantum particle fully and, therefore, to teleport it intact. Here we demonstrate quantum teleportation of the composite quantum states of a single photon encoded in both spin and orbital angular momentum. We use photon pairs entangled in both degrees of freedom (that is, hyper-entangled) as the quantum channel for teleportation, and develop a method to project and discriminate hyper-entangled Bell states by exploiting probabilistic quantum non-demolition measurement, which can be extended to more degrees of freedom. We verify the teleportation for both spin-orbit product states and hybrid entangled states, and achieve a teleportation fidelity ranging from 0.57 to 0.68, above the classical limit. Our work is a step towards the teleportation of more complex quantum systems, and demonstrates an increase in our technical control of scalable quantum technologies.

  8. Quantum teleportation of multiple degrees of freedom of a single photon.

    PubMed

    Wang, Xi-Lin; Cai, Xin-Dong; Su, Zu-En; Chen, Ming-Cheng; Wu, Dian; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2015-02-26

    Quantum teleportation provides a 'disembodied' way to transfer quantum states from one object to another at a distant location, assisted by previously shared entangled states and a classical communication channel. As well as being of fundamental interest, teleportation has been recognized as an important element in long-distance quantum communication, distributed quantum networks and measurement-based quantum computation. There have been numerous demonstrations of teleportation in different physical systems such as photons, atoms, ions, electrons and superconducting circuits. All the previous experiments were limited to the teleportation of one degree of freedom only. However, a single quantum particle can naturally possess various degrees of freedom--internal and external--and with coherent coupling among them. A fundamental open challenge is to teleport multiple degrees of freedom simultaneously, which is necessary to describe a quantum particle fully and, therefore, to teleport it intact. Here we demonstrate quantum teleportation of the composite quantum states of a single photon encoded in both spin and orbital angular momentum. We use photon pairs entangled in both degrees of freedom (that is, hyper-entangled) as the quantum channel for teleportation, and develop a method to project and discriminate hyper-entangled Bell states by exploiting probabilistic quantum non-demolition measurement, which can be extended to more degrees of freedom. We verify the teleportation for both spin-orbit product states and hybrid entangled states, and achieve a teleportation fidelity ranging from 0.57 to 0.68, above the classical limit. Our work is a step towards the teleportation of more complex quantum systems, and demonstrates an increase in our technical control of scalable quantum technologies.

  9. Contextuality as a Resource for Models of Quantum Computation with Qubits

    NASA Astrophysics Data System (ADS)

    Bermejo-Vega, Juan; Delfosse, Nicolas; Browne, Dan E.; Okay, Cihan; Raussendorf, Robert

    2017-09-01

    A central question in quantum computation is to identify the resources that are responsible for quantum speed-up. Quantum contextuality has been recently shown to be a resource for quantum computation with magic states for odd-prime dimensional qudits and two-dimensional systems with real wave functions. The phenomenon of state-independent contextuality poses a priori an obstruction to characterizing the case of regular qubits, the fundamental building block of quantum computation. Here, we establish contextuality of magic states as a necessary resource for a large class of quantum computation schemes on qubits. We illustrate our result with a concrete scheme related to measurement-based quantum computation.

  10. Fidelity between Gaussian mixed states with quantum state quadrature variances

    NASA Astrophysics Data System (ADS)

    Hai-Long, Zhang; Chun, Zhou; Jian-Hong, Shi; Wan-Su, Bao

    2016-04-01

    In this paper, from the original definition of fidelity in a pure state, we first give a well-defined expansion fidelity between two Gaussian mixed states. It is related to the variances of output and input states in quantum information processing. It is convenient to quantify the quantum teleportation (quantum clone) experiment since the variances of the input (output) state are measurable. Furthermore, we also give a conclusion that the fidelity of a pure input state is smaller than the fidelity of a mixed input state in the same quantum information processing. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-14-001).

  11. Experimental Implementation of a Quantum Optical State Comparison Amplifier

    NASA Astrophysics Data System (ADS)

    Donaldson, Ross J.; Collins, Robert J.; Eleftheriadou, Electra; Barnett, Stephen M.; Jeffers, John; Buller, Gerald S.

    2015-03-01

    We present an experimental demonstration of a practical nondeterministic quantum optical amplification scheme that employs two mature technologies, state comparison and photon subtraction, to achieve amplification of known sets of coherent states with high fidelity. The amplifier uses coherent states as a resource rather than single photons, which allows for a relatively simple light source, such as a diode laser, providing an increased rate of amplification. The amplifier is not restricted to low amplitude states. With respect to the two key parameters, fidelity and the amplified state production rate, we demonstrate significant improvements over previous experimental implementations, without the requirement of complex photonic components. Such a system may form the basis of trusted quantum repeaters in nonentanglement-based quantum communications systems with known phase alphabets, such as quantum key distribution or quantum digital signatures.

  12. Quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation.

    PubMed

    D'Ariano, G M; Lo Presti, P

    2001-05-07

    Quantum operations describe any state change allowed in quantum mechanics, including the evolution of an open system or the state change due to a measurement. We present a general method based on quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation. As input the method needs only a single entangled state. The feasibility of the technique for the electromagnetic field is shown, and the experimental setup is illustrated based on homodyne tomography of a twin beam.

  13. Quantum entanglement properties of geometrical and topological quantum gates

    NASA Astrophysics Data System (ADS)

    Sezer, Hasan Cavit; Duy, Hoang Ngoc; Heydari, Hoshang

    2011-03-01

    In this paper we will investigate the action of holonomic and topological quantum gates on different classes of four qubit states. In particular, we review the construction of holonomic quantum gate based on geometric phase and topological quantum gate based on braid group. Then, we investigate the entanglement properties of three different classes of four-qubit states based on geometric invariants. The result shows that entanglement properties of the two most generic classes of four-qubit states can be controlled by holonomic and topological quantum gate..

  14. Quantum Correlations in Nonlocal Boson Sampling.

    PubMed

    Shahandeh, Farid; Lund, Austin P; Ralph, Timothy C

    2017-09-22

    Determination of the quantum nature of correlations between two spatially separated systems plays a crucial role in quantum information science. Of particular interest is the questions of if and how these correlations enable quantum information protocols to be more powerful. Here, we report on a distributed quantum computation protocol in which the input and output quantum states are considered to be classically correlated in quantum informatics. Nevertheless, we show that the correlations between the outcomes of the measurements on the output state cannot be efficiently simulated using classical algorithms. Crucially, at the same time, local measurement outcomes can be efficiently simulated on classical computers. We show that the only known classicality criterion violated by the input and output states in our protocol is the one used in quantum optics, namely, phase-space nonclassicality. As a result, we argue that the global phase-space nonclassicality inherent within the output state of our protocol represents true quantum correlations.

  15. Effects of an electric field on white sharks: in situ testing of an electric deterrent.

    PubMed

    Huveneers, Charlie; Rogers, Paul J; Semmens, Jayson M; Beckmann, Crystal; Kock, Alison A; Page, Brad; Goldsworthy, Simon D

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nV cm(-1), using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks.

  16. Effects of an Electric Field on White Sharks: In Situ Testing of an Electric Deterrent

    PubMed Central

    Huveneers, Charlie; Rogers, Paul J.; Semmens, Jayson M.; Beckmann, Crystal; Kock, Alison A.; Page, Brad; Goldsworthy, Simon D.

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nVcm–1, using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks. PMID:23658766

  17. Efficient quantum state transfer in an engineered chain of quantum bits

    NASA Astrophysics Data System (ADS)

    Sandberg, Martin; Knill, Emanuel; Kapit, Eliot; Vissers, Michael R.; Pappas, David P.

    2016-03-01

    We present a method of performing quantum state transfer in a chain of superconducting quantum bits. Our protocol is based on engineering the energy levels of the qubits in the chain and tuning them all simultaneously with an external flux bias. The system is designed to allow sequential adiabatic state transfers, resulting in on-demand quantum state transfer from one end of the chain to the other. Numerical simulations of the master equation using realistic parameters for capacitive nearest-neighbor coupling, energy relaxation, and dephasing show that fast, high-fidelity state transfer should be feasible using this method.

  18. Development of a new physics-based internal coordinate mechanics force field and its application to protein loop modeling.

    PubMed

    Arnautova, Yelena A; Abagyan, Ruben A; Totrov, Maxim

    2011-02-01

    We report the development of internal coordinate mechanics force field (ICMFF), new force field parameterized using a combination of experimental data for crystals of small molecules and quantum mechanics calculations. The main features of ICMFF include: (a) parameterization for the dielectric constant relevant to the condensed state (ε = 2) instead of vacuum, (b) an improved description of hydrogen-bond interactions using duplicate sets of van der Waals parameters for heavy atom-hydrogen interactions, and (c) improved backbone covalent geometry and energetics achieved using novel backbone torsional potentials and inclusion of the bond angles at the C(α) atoms into the internal variable set. The performance of ICMFF was evaluated through loop modeling simulations for 4-13 residue loops. ICMFF was combined with a solvent-accessible surface area solvation model optimized using a large set of loop decoys. Conformational sampling was carried out using the biased probability Monte Carlo method. Average/median backbone root-mean-square deviations of the lowest energy conformations from the native structures were 0.25/0.21 Å for four residues loops, 0.84/0.46 Å for eight residue loops, and 1.16/0.73 Å for 12 residue loops. To our knowledge, these results are significantly better than or comparable with those reported to date for any loop modeling method that does not take crystal packing into account. Moreover, the accuracy of our method is on par with the best previously reported results obtained considering the crystal environment. We attribute this success to the high accuracy of the new ICM force field achieved by meticulous parameterization, to the optimized solvent model, and the efficiency of the search method. © 2010 Wiley-Liss, Inc.

  19. Quantum state engineering using one-dimensional discrete-time quantum walks

    NASA Astrophysics Data System (ADS)

    Innocenti, Luca; Majury, Helena; Giordani, Taira; Spagnolo, Nicolò; Sciarrino, Fabio; Paternostro, Mauro; Ferraro, Alessandro

    2017-12-01

    Quantum state preparation in high-dimensional systems is an essential requirement for many quantum-technology applications. The engineering of an arbitrary quantum state is, however, typically strongly dependent on the experimental platform chosen for implementation, and a general framework is still missing. Here we show that coined quantum walks on a line, which represent a framework general enough to encompass a variety of different platforms, can be used for quantum state engineering of arbitrary superpositions of the walker's sites. We achieve this goal by identifying a set of conditions that fully characterize the reachable states in the space comprising walker and coin and providing a method to efficiently compute the corresponding set of coin parameters. We assess the feasibility of our proposal by identifying a linear optics experiment based on photonic orbital angular momentum technology.

  20. Transient Evolutional Dynamics of Quantum-Dot Molecular Phase Coherence for Sensitive Optical Switching

    NASA Astrophysics Data System (ADS)

    Shen, Jian Qi; Gu, Jing

    2018-04-01

    Atomic phase coherence (quantum interference) in a multilevel atomic gas exhibits a number of interesting phenomena. Such an atomic quantum coherence effect can be generalized to a quantum-dot molecular dielectric. Two quantum dots form a quantum-dot molecule, which can be described by a three-level Λ-configuration model { |0> ,|1> ,|2> } , i.e., the ground state of the molecule is the lower level |0> and the highly degenerate electronic states in the two quantum dots are the two upper levels |1> ,|2> . The electromagnetic characteristics due to the |0>-|1> transition can be controllably manipulated by a tunable gate voltage (control field) that drives the |2>-|1> transition. When the gate voltage is switched on, the quantum-dot molecular state can evolve from one steady state (i.e., |0>-|1> two-level dressed state) to another steady state (i.e., three-level coherent-population-trapping state). In this process, the electromagnetic characteristics of a quantum-dot molecular dielectric, which is modified by the gate voltage, will also evolve. In this study, the transient evolutional behavior of the susceptibility of a quantum-dot molecular thin film and its reflection spectrum are treated by using the density matrix formulation of the multilevel systems. The present field-tunable and frequency-sensitive electromagnetic characteristics of a quantum-dot molecular thin film, which are sensitive to the applied gate voltage, can be utilized to design optical switching devices.

  1. Photonic Programmable Tele-Cloning Network.

    PubMed

    Li, Wei; Chen, Ming-Cheng

    2016-06-29

    The concept of quantum teleportation allows an unknown quantum states to be broadcasted and processed in a distributed quantum network. The quantum information injected into the network can be diluted to distant multi-copies by quantum cloning and processed by arbitrary quantum logic gates which were programed in advance in the network quantum state. A quantum network combines simultaneously these fundamental quantum functions could lead to new intriguing applications. Here we propose a photonic programmable telecloning network based on a four-photon interferometer. The photonic network serves as quantum gate, quantum cloning and quantum teleportation and features experimental advantage of high brightness by photon recycling.

  2. Deterministic entanglement of superconducting qubits by parity measurement and feedback.

    PubMed

    Ristè, D; Dukalski, M; Watson, C A; de Lange, G; Tiggelman, M J; Blanter, Ya M; Lehnert, K W; Schouten, R N; DiCarlo, L

    2013-10-17

    The stochastic evolution of quantum systems during measurement is arguably the most enigmatic feature of quantum mechanics. Measuring a quantum system typically steers it towards a classical state, destroying the coherence of an initial quantum superposition and the entanglement with other quantum systems. Remarkably, the measurement of a shared property between non-interacting quantum systems can generate entanglement, starting from an uncorrelated state. Of special interest in quantum computing is the parity measurement, which projects the state of multiple qubits (quantum bits) to a state with an even or odd number of excited qubits. A parity meter must discern the two qubit-excitation parities with high fidelity while preserving coherence between same-parity states. Despite numerous proposals for atomic, semiconducting and superconducting qubits, realizing a parity meter that creates entanglement for both even and odd measurement results has remained an outstanding challenge. Here we perform a time-resolved, continuous parity measurement of two superconducting qubits using the cavity in a three-dimensional circuit quantum electrodynamics architecture and phase-sensitive parametric amplification. Using postselection, we produce entanglement by parity measurement reaching 88 per cent fidelity to the closest Bell state. Incorporating the parity meter in a feedback-control loop, we transform the entanglement generation from probabilistic to fully deterministic, achieving 66 per cent fidelity to a target Bell state on demand. These realizations of a parity meter and a feedback-enabled deterministic measurement protocol provide key ingredients for active quantum error correction in the solid state.

  3. Resource cost results for one-way entanglement distillation and state merging of compound and arbitrarily varying quantum sources

    NASA Astrophysics Data System (ADS)

    Boche, H.; Janßen, G.

    2014-08-01

    We consider one-way quantum state merging and entanglement distillation under compound and arbitrarily varying source models. Regarding quantum compound sources, where the source is memoryless, but the source state an unknown member of a certain set of density matrices, we continue investigations begun in the work of Bjelaković et al. ["Universal quantum state merging," J. Math. Phys. 54, 032204 (2013)] and determine the classical as well as entanglement cost of state merging. We further investigate quantum state merging and entanglement distillation protocols for arbitrarily varying quantum sources (AVQS). In the AVQS model, the source state is assumed to vary in an arbitrary manner for each source output due to environmental fluctuations or adversarial manipulation. We determine the one-way entanglement distillation capacity for AVQS, where we invoke the famous robustification and elimination techniques introduced by Ahlswede. Regarding quantum state merging for AVQS we show by example that the robustification and elimination based approach generally leads to suboptimal entanglement as well as classical communication rates.

  4. Quantum demultiplexer of quantum parameter-estimation information in quantum networks

    NASA Astrophysics Data System (ADS)

    Xie, Yanqing; Huang, Yumeng; Wu, Yinzhong; Hao, Xiang

    2018-05-01

    The quantum demultiplexer is constructed by a series of unitary operators and multipartite entangled states. It is used to realize information broadcasting from an input node to multiple output nodes in quantum networks. The scheme of quantum network communication with respect to phase estimation is put forward through the demultiplexer subjected to amplitude damping noises. The generalized partial measurements can be applied to protect the transferring efficiency from environmental noises in the protocol. It is found out that there are some optimal coherent states which can be prepared to enhance the transmission of phase estimation. The dynamics of state fidelity and quantum Fisher information are investigated to evaluate the feasibility of the network communication. While the state fidelity deteriorates rapidly, the quantum Fisher information can be enhanced to a maximum value and then decreases slowly. The memory effect of the environment induces the oscillations of fidelity and quantum Fisher information. The adjustment of the strength of partial measurements is helpful to increase quantum Fisher information.

  5. Quantum probability assignment limited by relativistic causality.

    PubMed

    Han, Yeong Deok; Choi, Taeseung

    2016-03-14

    Quantum theory has nonlocal correlations, which bothered Einstein, but found to satisfy relativistic causality. Correlation for a shared quantum state manifests itself, in the standard quantum framework, by joint probability distributions that can be obtained by applying state reduction and probability assignment that is called Born rule. Quantum correlations, which show nonlocality when the shared state has an entanglement, can be changed if we apply different probability assignment rule. As a result, the amount of nonlocality in quantum correlation will be changed. The issue is whether the change of the rule of quantum probability assignment breaks relativistic causality. We have shown that Born rule on quantum measurement is derived by requiring relativistic causality condition. This shows how the relativistic causality limits the upper bound of quantum nonlocality through quantum probability assignment.

  6. Quantum Discord in Photon-Added Glauber Coherent States of GHZ-Type

    NASA Astrophysics Data System (ADS)

    Daoud, M.; Kaydi, W.; El Hadfi, H.

    2015-11-01

    We investigate the influence of photon excitations on quantum correlations in tripartite Glauber coherent states of Greenberger-Horne-Zeilinger type (GHZ-type). The pairwise correlations are measured by means of the entropy-based quantum discord. We also analyze the monogamy property of quantum discord in this class of tripartite states in terms of the strength of Glauber coherent states and the photon excitation order.

  7. Linear Quantum Systems: Non-Classical States and Robust Stability

    DTIC Science & Technology

    2016-06-29

    quantum linear systems subject to non-classical quantum fields. The major outcomes of this project are (i) derivation of quantum filtering equations for...derivation of quantum filtering equations for systems non-classical input states including single photon states, (ii) determination of how linear...history going back some 50 years, to the birth of modern control theory with Kalman’s foundational work on filtering and LQG optimal control

  8. Optimal subsystem approach to multi-qubit quantum state discrimination and experimental investigation

    NASA Astrophysics Data System (ADS)

    Xue, ShiChuan; Wu, JunJie; Xu, Ping; Yang, XueJun

    2018-02-01

    Quantum computing is a significant computing capability which is superior to classical computing because of its superposition feature. Distinguishing several quantum states from quantum algorithm outputs is often a vital computational task. In most cases, the quantum states tend to be non-orthogonal due to superposition; quantum mechanics has proved that perfect outcomes could not be achieved by measurements, forcing repetitive measurement. Hence, it is important to determine the optimum measuring method which requires fewer repetitions and a lower error rate. However, extending current measurement approaches mainly aiming at quantum cryptography to multi-qubit situations for quantum computing confronts challenges, such as conducting global operations which has considerable costs in the experimental realm. Therefore, in this study, we have proposed an optimum subsystem method to avoid these difficulties. We have provided an analysis of the comparison between the reduced subsystem method and the global minimum error method for two-qubit problems; the conclusions have been verified experimentally. The results showed that the subsystem method could effectively discriminate non-orthogonal two-qubit states, such as separable states, entangled pure states, and mixed states; the cost of the experimental process had been significantly reduced, in most circumstances, with acceptable error rate. We believe the optimal subsystem method is the most valuable and promising approach for multi-qubit quantum computing applications.

  9. Quantum reinforcement learning.

    PubMed

    Dong, Daoyi; Chen, Chunlin; Li, Hanxiong; Tarn, Tzyh-Jong

    2008-10-01

    The key approaches for machine learning, particularly learning in unknown probabilistic environments, are new representations and computation mechanisms. In this paper, a novel quantum reinforcement learning (QRL) method is proposed by combining quantum theory and reinforcement learning (RL). Inspired by the state superposition principle and quantum parallelism, a framework of a value-updating algorithm is introduced. The state (action) in traditional RL is identified as the eigen state (eigen action) in QRL. The state (action) set can be represented with a quantum superposition state, and the eigen state (eigen action) can be obtained by randomly observing the simulated quantum state according to the collapse postulate of quantum measurement. The probability of the eigen action is determined by the probability amplitude, which is updated in parallel according to rewards. Some related characteristics of QRL such as convergence, optimality, and balancing between exploration and exploitation are also analyzed, which shows that this approach makes a good tradeoff between exploration and exploitation using the probability amplitude and can speedup learning through the quantum parallelism. To evaluate the performance and practicability of QRL, several simulated experiments are given, and the results demonstrate the effectiveness and superiority of the QRL algorithm for some complex problems. This paper is also an effective exploration on the application of quantum computation to artificial intelligence.

  10. Quantum Computational Universality of the 2D Cai-Miyake-D"ur-Briegel Quantum State

    NASA Astrophysics Data System (ADS)

    Wei, Tzu-Chieh; Raussendorf, Robert; Kwek, Leong Chuan

    2012-02-01

    Universal quantum computation can be achieved by simply performing single-qubit measurements on a highly entangled resource state, such as cluster states. Cai, Miyake, D"ur, and Briegel recently constructed a ground state of a two-dimensional quantum magnet by combining multiple Affleck-Kennedy-Lieb-Tasaki quasichains of mixed spin-3/2 and spin-1/2 entities and by mapping pairs of neighboring spin-1/2 particles to individual spin-3/2 particles [Phys. Rev. A 82, 052309 (2010)]. They showed that this state enables universal quantum computation by constructing single- and two-qubit universal gates. Here, we give an alternative understanding of how this state gives rise to universal measurement-based quantum computation: by local operations, each quasichain can be converted to a one-dimensional cluster state and entangling gates between two neighboring logical qubits can be implemented by single-spin measurements. Furthermore, a two-dimensional cluster state can be distilled from the Cai-Miyake-D"ur-Briegel state.

  11. Quantum computational universality of the Cai-Miyake-Duer-Briegel two-dimensional quantum state from Affleck-Kennedy-Lieb-Tasaki quasichains

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Tzu-Chieh; C. N. Yang Institute for Theoretical Physics, State University of New York at Stony Brook, Stony Brook, New York 11794-3840; Raussendorf, Robert

    2011-10-15

    Universal quantum computation can be achieved by simply performing single-qubit measurements on a highly entangled resource state, such as cluster states. Cai, Miyake, Duer, and Briegel recently constructed a ground state of a two-dimensional quantum magnet by combining multiple Affleck-Kennedy-Lieb-Tasaki quasichains of mixed spin-3/2 and spin-1/2 entities and by mapping pairs of neighboring spin-1/2 particles to individual spin-3/2 particles [Phys. Rev. A 82, 052309 (2010)]. They showed that this state enables universal quantum computation by single-spin measurements. Here, we give an alternative understanding of how this state gives rise to universal measurement-based quantum computation: by local operations, each quasichain canmore » be converted to a one-dimensional cluster state and entangling gates between two neighboring logical qubits can be implemented by single-spin measurements. We further argue that a two-dimensional cluster state can be distilled from the Cai-Miyake-Duer-Briegel state.« less

  12. Plasmonic interferences of two-particle N00N states

    NASA Astrophysics Data System (ADS)

    Vest, Benjamin; Shlesinger, Ilan; Dheur, Marie-Christine; Devaux, Éloïse; Greffet, Jean-Jacques; Messin, Gaétan; Marquier, François

    2018-05-01

    Quantum plasmonics lies at the intersection between nanophotonics and quantum optics. Genuine quantum effects can be observed with non-classical states such as Fock states and with entangled states. A N00N state combines both aspects: it is a quantum superposition state of a Fock state with N excitations in two spatial modes. Here we report the first observation of two-plasmon (N = 2) N00N state interferences using a plasmonic beamsplitter etched on a planar interface between gold and air. We analyze in detail the role of losses at the beamsplitter and during the propagation along the metal/air interface. While the intrinsic losses of the beamsplitter are responsible for the emergence of quantum nonlinear absorption, we note that N00N states decay N times faster than classical states due to propagation losses.

  13. Black holes are almost optimal quantum cloners

    NASA Astrophysics Data System (ADS)

    Adami, Christoph; Ver Steeg, Greg

    2015-06-01

    If black holes were able to clone quantum states, a number of paradoxes in black hole physics would disappear. However, the linearity of quantum mechanics forbids exact cloning of quantum states. Here we show that black holes indeed clone incoming quantum states with a fidelity that depends on the black hole’s absorption coefficient, without violating the no-cloning theorem because the clones are only approximate. Perfectly reflecting black holes are optimal universal ‘quantum cloning machines’ and operate on the principle of stimulated emission, exactly as their quantum optical counterparts. In the limit of perfect absorption, the fidelity of clones is only equal to what can be obtained via quantum state estimation methods. But for any absorption probability less than one, the cloning fidelity is nearly optimal as long as ω /T≥slant 10, a common parameter for modest-sized black holes.

  14. Unconditional room-temperature quantum memory

    NASA Astrophysics Data System (ADS)

    Hosseini, M.; Campbell, G.; Sparkes, B. M.; Lam, P. K.; Buchler, B. C.

    2011-10-01

    Just as classical information systems require buffers and memory, the same is true for quantum information systems. The potential that optical quantum information processing holds for revolutionizing computation and communication is therefore driving significant research into developing optical quantum memory. A practical optical quantum memory must be able to store and recall quantum states on demand with high efficiency and low noise. Ideally, the platform for the memory would also be simple and inexpensive. Here, we present a complete tomographic reconstruction of quantum states that have been stored in the ground states of rubidium in a vapour cell operating at around 80°C. Without conditional measurements, we show recall fidelity up to 98% for coherent pulses containing around one photon. To unambiguously verify that our memory beats the quantum no-cloning limit we employ state-independent verification using conditional variance and signal-transfer coefficients.

  15. Open Quantum Walks and Dissipative Quantum Computing

    NASA Astrophysics Data System (ADS)

    Petruccione, Francesco

    2012-02-01

    Open Quantum Walks (OQWs) have been recently introduced as quantum Markov chains on graphs [S. Attal, F. Petruccione, C. Sabot, and I. Sinayskiy, E-print: http://hal.archives-ouvertes.fr/hal-00581553/fr/]. The formulation of the OQWs is exclusively based upon the non-unitary dynamics induced by the environment. It will be shown that OQWs are a very useful tool for the formulation of dissipative quantum computing and quantum state preparation. In particular, it will be shown how to implement single qubit gates and the CNOT gate as OQWs on fully connected graphs. Also, OQWS make possible the dissipative quantum state preparation of arbitrary single qubit states and of all two-qubit Bell states. Finally, it will be shown how to reformulate efficiently a discrete time version of dissipative quantum computing in the language of OQWs.

  16. A potential application in quantum networks—Deterministic quantum operation sharing schemes with Bell states

    NASA Astrophysics Data System (ADS)

    Zhang, KeJia; Zhang, Long; Song, TingTing; Yang, YingHui

    2016-06-01

    In this paper, we propose certain different design ideas on a novel topic in quantum cryptography — quantum operation sharing (QOS). Following these unique ideas, three QOS schemes, the "HIEC" (The scheme whose messages are hidden in the entanglement correlation), "HIAO" (The scheme whose messages are hidden with the assistant operations) and "HIMB" (The scheme whose messages are hidden in the selected measurement basis), have been presented to share the single-qubit operations determinately on target states in a remote node. These schemes only require Bell states as quantum resources. Therefore, they can be directly applied in quantum networks, since Bell states are considered the basic quantum channels in quantum networks. Furthermore, after analyse on the security and resource consumptions, the task of QOS can be achieved securely and effectively in these schemes.

  17. Dynamics and protection of tripartite quantum correlations in a thermal bath

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guo, Jin-Liang, E-mail: guojinliang80@163.com; Wei, Jin-Long

    2015-03-15

    We study the dynamics and protection of tripartite quantum correlations in terms of genuinely tripartite concurrence, lower bound of concurrence and tripartite geometric quantum discord in a three-qubit system interacting with independent thermal bath. By comparing the dynamics of entanglement with that of quantum discord for initial GHZ state and W state, we find that W state is more robust than GHZ state, and quantum discord performs better than entanglement against the decoherence induced by the thermal bath. When the bath temperature is low, for the initial GHZ state, combining weak measurement and measurement reversal is necessary for a successfulmore » protection of quantum correlations. But for the initial W state, the protection depends solely upon the measurement reversal. In addition, the protection cannot usually be realized irrespective of the initial states as the bath temperature increases.« less

  18. Entanglement and quantum superposition induced by a single photon

    NASA Astrophysics Data System (ADS)

    Lü, Xin-You; Zhu, Gui-Lei; Zheng, Li-Li; Wu, Ying

    2018-03-01

    We predict the occurrence of single-photon-induced entanglement and quantum superposition in a hybrid quantum model, introducing an optomechanical coupling into the Rabi model. Originally, it comes from the photon-dependent quantum property of the ground state featured by the proposed hybrid model. It is associated with a single-photon-induced quantum phase transition, and is immune to the A2 term of the spin-field interaction. Moreover, the obtained quantum superposition state is actually a squeezed cat state, which can significantly enhance precision in quantum metrology. This work offers an approach to manipulate entanglement and quantum superposition with a single photon, which might have potential applications in the engineering of new single-photon quantum devices, and also fundamentally broaden the regime of cavity QED.

  19. Entanglement and Coherence in Quantum State Merging.

    PubMed

    Streltsov, A; Chitambar, E; Rana, S; Bera, M N; Winter, A; Lewenstein, M

    2016-06-17

    Understanding the resource consumption in distributed scenarios is one of the main goals of quantum information theory. A prominent example for such a scenario is the task of quantum state merging, where two parties aim to merge their tripartite quantum state parts. In standard quantum state merging, entanglement is considered to be an expensive resource, while local quantum operations can be performed at no additional cost. However, recent developments show that some local operations could be more expensive than others: it is reasonable to distinguish between local incoherent operations and local operations which can create coherence. This idea leads us to the task of incoherent quantum state merging, where one of the parties has free access to local incoherent operations only. In this case the resources of the process are quantified by pairs of entanglement and coherence. Here, we develop tools for studying this process and apply them to several relevant scenarios. While quantum state merging can lead to a gain of entanglement, our results imply that no merging procedure can gain entanglement and coherence at the same time. We also provide a general lower bound on the entanglement-coherence sum and show that the bound is tight for all pure states. Our results also lead to an incoherent version of Schumacher compression: in this case the compression rate is equal to the von Neumann entropy of the diagonal elements of the corresponding quantum state.

  20. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.

    PubMed

    Renner, R; Cirac, J I

    2009-03-20

    We show that the quantum de Finetti theorem holds for states on infinite-dimensional systems, provided they satisfy certain experimentally verifiable conditions. This result can be applied to prove the security of quantum key distribution based on weak coherent states or other continuous variable states against general attacks.

  1. Entropy for quantum pure states and quantum H theorem

    NASA Astrophysics Data System (ADS)

    Han, Xizhi; Wu, Biao

    2015-06-01

    We construct a complete set of Wannier functions that are localized at both given positions and momenta. This allows us to introduce the quantum phase space, onto which a quantum pure state can be mapped unitarily. Using its probability distribution in quantum phase space, we define an entropy for a quantum pure state. We prove an inequality regarding the long-time behavior of our entropy's fluctuation. For a typical initial state, this inequality indicates that our entropy can relax dynamically to a maximized value and stay there most of time with small fluctuations. This result echoes the quantum H theorem proved by von Neumann [Zeitschrift für Physik 57, 30 (1929), 10.1007/BF01339852]. Our entropy is different from the standard von Neumann entropy, which is always zero for quantum pure states. According to our definition, a system always has bigger entropy than its subsystem even when the system is described by a pure state. As the construction of the Wannier basis can be implemented numerically, the dynamical evolution of our entropy is illustrated with an example.

  2. Entanglement in a solid-state spin ensemble.

    PubMed

    Simmons, Stephanie; Brown, Richard M; Riemann, Helge; Abrosimov, Nikolai V; Becker, Peter; Pohl, Hans-Joachim; Thewalt, Mike L W; Itoh, Kohei M; Morton, John J L

    2011-02-03

    Entanglement is the quintessential quantum phenomenon. It is a necessary ingredient in most emerging quantum technologies, including quantum repeaters, quantum information processing and the strongest forms of quantum cryptography. Spin ensembles, such as those used in liquid-state nuclear magnetic resonance, have been important for the development of quantum control methods. However, these demonstrations contain no entanglement and ultimately constitute classical simulations of quantum algorithms. Here we report the on-demand generation of entanglement between an ensemble of electron and nuclear spins in isotopically engineered, phosphorus-doped silicon. We combined high-field (3.4 T), low-temperature (2.9 K) electron spin resonance with hyperpolarization of the (31)P nuclear spin to obtain an initial state of sufficient purity to create a non-classical, inseparable state. The state was verified using density matrix tomography based on geometric phase gates, and had a fidelity of 98% relative to the ideal state at this field and temperature. The entanglement operation was performed simultaneously, with high fidelity, on 10(10) spin pairs; this fulfils one of the essential requirements for a silicon-based quantum information processor.

  3. Coupling-Induced Bipartite Pointer States in Arrays of Electron Billiards: Quantum Darwinism in Action?

    NASA Astrophysics Data System (ADS)

    Brunner, R.; Akis, R.; Ferry, D. K.; Kuchar, F.; Meisels, R.

    2008-07-01

    We discuss a quantum system coupled to the environment, composed of an open array of billiards (dots) in series. Beside pointer states occurring in individual dots, we observe sets of robust states which arise only in the array. We define these new states as bipartite pointer states, since they cannot be described in terms of simple linear combinations of robust single-dot states. The classical existence of bipartite pointer states is confirmed by comparing the quantum-mechanical and classical results. The ability of the robust states to create “offspring” indicates that quantum Darwinism is in action.

  4. Coupling-induced bipartite pointer states in arrays of electron billiards: quantum Darwinism in action?

    PubMed

    Brunner, R; Akis, R; Ferry, D K; Kuchar, F; Meisels, R

    2008-07-11

    We discuss a quantum system coupled to the environment, composed of an open array of billiards (dots) in series. Beside pointer states occurring in individual dots, we observe sets of robust states which arise only in the array. We define these new states as bipartite pointer states, since they cannot be described in terms of simple linear combinations of robust single-dot states. The classical existence of bipartite pointer states is confirmed by comparing the quantum-mechanical and classical results. The ability of the robust states to create "offspring" indicates that quantum Darwinism is in action.

  5. Quantum State Tomography via Linear Regression Estimation

    PubMed Central

    Qi, Bo; Hou, Zhibo; Li, Li; Dong, Daoyi; Xiang, Guoyong; Guo, Guangcan

    2013-01-01

    A simple yet efficient state reconstruction algorithm of linear regression estimation (LRE) is presented for quantum state tomography. In this method, quantum state reconstruction is converted into a parameter estimation problem of a linear regression model and the least-squares method is employed to estimate the unknown parameters. An asymptotic mean squared error (MSE) upper bound for all possible states to be estimated is given analytically, which depends explicitly upon the involved measurement bases. This analytical MSE upper bound can guide one to choose optimal measurement sets. The computational complexity of LRE is O(d4) where d is the dimension of the quantum state. Numerical examples show that LRE is much faster than maximum-likelihood estimation for quantum state tomography. PMID:24336519

  6. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  7. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  8. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  9. Handler beliefs affect scent detection dog outcomes.

    PubMed

    Lit, Lisa; Schweitzer, Julie B; Oberbauer, Anita M

    2011-05-01

    Our aim was to evaluate how human beliefs affect working dog outcomes in an applied environment. We asked whether beliefs of scent detection dog handlers affect team performance and evaluated relative importance of human versus dog influences on handlers' beliefs. Eighteen drug and/or explosive detection dog/handler teams each completed two sets of four brief search scenarios (conditions). Handlers were falsely told that two conditions contained a paper marking scent location (human influence). Two conditions contained decoy scents (food/toy) to encourage dog interest in a false location (dog influence). Conditions were (1) control; (2) paper marker; (3) decoy scent; and (4) paper marker at decoy scent. No conditions contained drug or explosive scent; any alerting response was incorrect. A repeated measures analysis of variance was used with search condition as the independent variable and number of alerts as the dependent variable. Additional nonparametric tests compared human and dog influence. There were 225 incorrect responses, with no differences in mean responses across conditions. Response patterns differed by condition. There were more correct (no alert responses) searches in conditions without markers. Within marked conditions, handlers reported that dogs alerted more at marked locations than other locations. Handlers' beliefs that scent was present potentiated handler identification of detection dog alerts. Human more than dog influences affected alert locations. This confirms that handler beliefs affect outcomes of scent detection dog deployments.

  10. Extent of tooth decay in the mouth and increased need for replacement of dental restorations: the New England Children's Amalgam Trial.

    PubMed

    Trachtenberg, Felicia; Maserejian, Nancy Nairi; Tavares, Mary; Soncini, Jennifer Ann; Hayes, Catherine

    2008-01-01

    The purpose of this study was to assess the relationship between baseline caries experience and the restoration replacement rate in children. The 5-year New England Children's Amalgam Trial recruited 534 6- to 10-year-old children with 2 or more carious posterior teeth. The association between decoy and longevity of restorations was assessed. Restorations with no follow-up (N = 391) were excluded from analysis. The average follow-up was 3.0 +/- 1.6 years in 489 children. Restorations with follow-up (N = 3,604) were placed in mouths with a median of 15 dfs/DFS and 8 dft/DFT. The need for replacement increased significantly (P < or = .001) with increasing numbers of dfs/DFS and dft/DFT. After 5 years of follow-up, at least 15% of restorations in a mouth with > or = 14 dfs/DFS needed replacement, compared to 9% for 2 to 5 dfs/DFS. Comparing dft/DFT after 5 years of follow-up, there was a 23% replacement rate for > or = 12 dft/DFT compared to 10% for 2 to 3 dft/DFT. Decoy in the mouth had a greater association with the need for replacement due to new caries compared to replacement due to recurrent caries. Children with more decoy at the time of restoration placement were at higher risk for replacement of restorations.

  11. Can a pairwise contact potential stabilize native protein folds against decoys obtained by threading?

    PubMed

    Vendruscolo, M; Najmanovich, R; Domany, E

    2000-02-01

    We present a method to derive contact energy parameters from large sets of proteins. The basic requirement on which our method is based is that for each protein in the database the native contact map has lower energy than all its decoy conformations that are obtained by threading. Only when this condition is satisfied one can use the proposed energy function for fold identification. Such a set of parameters can be found (by perceptron learning) if Mp, the number of proteins in the database, is not too large. Other aspects that influence the existence of such a solution are the exact definition of contact and the value of the critical distance Rc, below which two residues are considered to be in contact. Another important novel feature of our approach is its ability to determine whether an energy function of some suitable proposed form can or cannot be parameterized in a way that satisfies our basic requirement. As a demonstration of this, we determine the region in the (Rc, Mp) plane in which the problem is solvable, i.e., we can find a set of contact parameters that stabilize simultaneously all the native conformations. We show that for large enough databases the contact approximation to the energy cannot stabilize all the native folds even against the decoys obtained by gapless threading.

  12. The relationship of plasma decoy receptor 3 and coronary collateral circulation in patients with coronary artery disease.

    PubMed

    Yan, Youyou; Song, Dandan; Liu, Lulu; Meng, Xiuping; Qi, Chao; Wang, Junnan

    2017-11-15

    Previously, decoy receptor 3 (DcR3) was found to be a potential angiogenetic factor, while the relationship of DcR3 with coronary collateral circulation formation has not been investigated. In this study, we aimed to investigate whether plasma decoy receptor 3 levels was associated with CCC formation and evaluate its predictive power for CCC status in patients with coronary artery disease. Among patients who underwent coronary angiography with coronary artery disease and had a stenosis of ≥90% were included in our study. Collateral degree was graded according to Rentrope Cohen classification. Patients with grade 2 or 3 collateral degree were enrolled in good CCC group and patients with grade 0 or 1 collateral degree were enrolled in poor CCC group. Plasma DcR3 level was significantly higher in good CCC group (328.00±230.82 vs 194.84±130.63ng/l, p<0.01) and positively correlated with Rentrope grade (p<0.01). In addition, plasma DcR3 was also positively correlated with VEGF-A. Both ROC (receiver operating characteristic curve) and multinomial logistical regression analysis showed that plasma DcR3 displayed potent predictive power for CCC status. Higher plasma DcR3 level was related to better CCC formation and displayed potent predictive power for CCC status. Copyright © 2017. Published by Elsevier Inc.

  13. All optical quantum control of a spin-quantum state and ultrafast transduction into an electric current.

    PubMed

    Müller, K; Kaldewey, T; Ripszam, R; Wildmann, J S; Bechtold, A; Bichler, M; Koblmüller, G; Abstreiter, G; Finley, J J

    2013-01-01

    The ability to control and exploit quantum coherence and entanglement drives research across many fields ranging from ultra-cold quantum gases to spin systems in condensed matter. Transcending different physical systems, optical approaches have proven themselves to be particularly powerful, since they profit from the established toolbox of quantum optical techniques, are state-selective, contact-less and can be extremely fast. Here, we demonstrate how a precisely timed sequence of monochromatic ultrafast (~ 2-5 ps) optical pulses, with a well defined polarisation can be used to prepare arbitrary superpositions of exciton spin states in a semiconductor quantum dot, achieve ultrafast control of the spin-wavefunction without an applied magnetic field and make high fidelity read-out the quantum state in an arbitrary basis simply by detecting a strong (~ 2-10 pA) electric current flowing in an external circuit. The results obtained show that the combined quantum state preparation, control and read-out can be performed with a near-unity (≥97%) fidelity.

  14. Tomograms for open quantum systems: In(finite) dimensional optical and spin systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thapliyal, Kishore, E-mail: tkishore36@yahoo.com; Banerjee, Subhashish, E-mail: subhashish@iitj.ac.in; Pathak, Anirban, E-mail: anirban.pathak@gmail.com

    Tomograms are obtained as probability distributions and are used to reconstruct a quantum state from experimentally measured values. We study the evolution of tomograms for different quantum systems, both finite and infinite dimensional. In realistic experimental conditions, quantum states are exposed to the ambient environment and hence subject to effects like decoherence and dissipation, which are dealt with here, consistently, using the formalism of open quantum systems. This is extremely relevant from the perspective of experimental implementation and issues related to state reconstruction in quantum computation and communication. These considerations are also expected to affect the quasiprobability distribution obtained frommore » experimentally generated tomograms and nonclassicality observed from them. -- Highlights: •Tomograms are constructed for open quantum systems. •Finite and infinite dimensional quantum systems are studied. •Finite dimensional systems (phase states, single & two qubit spin states) are studied. •A dissipative harmonic oscillator is considered as an infinite dimensional system. •Both pure dephasing as well as dissipation effects are studied.« less

  15. Tuning Single Quantum Dot Emission with a Micromirror.

    PubMed

    Yuan, Gangcheng; Gómez, Daniel; Kirkwood, Nicholas; Mulvaney, Paul

    2018-02-14

    The photoluminescence of single quantum dots fluctuates between bright (on) and dark (off) states, also termed fluorescence intermittency or blinking. This blinking limits the performance of quantum dot-based devices such as light-emitting diodes and solar cells. However, the origins of the blinking remain unresolved. Here, we use a movable gold micromirror to determine both the quantum yield of the bright state and the orientation of the excited state dipole of single quantum dots. We observe that the quantum yield of the bright state is close to unity for these single QDs. Furthermore, we also study the effect of a micromirror on blinking, and then evaluate excitation efficiency, biexciton quantum yield, and detection efficiency. The mirror does not modify the off-time statistics, but it does change the density of optical states available to the quantum dot and hence the on times. The duration of the on times can be lengthened due to an increase in the radiative recombination rate.

  16. Quantum-Dot Single-Photon Sources for Entanglement Enhanced Interferometry.

    PubMed

    Müller, M; Vural, H; Schneider, C; Rastelli, A; Schmidt, O G; Höfling, S; Michler, P

    2017-06-23

    Multiphoton entangled states such as "N00N states" have attracted a lot of attention because of their possible application in high-precision, quantum enhanced phase determination. So far, N00N states have been generated in spontaneous parametric down-conversion processes and by mixing quantum and classical light on a beam splitter. Here, in contrast, we demonstrate superresolving phase measurements based on two-photon N00N states generated by quantum dot single-photon sources making use of the Hong-Ou-Mandel effect on a beam splitter. By means of pulsed resonance fluorescence of a charged exciton state, we achieve, in postselection, a quantum enhanced improvement of the precision in phase uncertainty, higher than prescribed by the standard quantum limit. An analytical description of the measurement scheme is provided, reflecting requirements, capability, and restraints of single-photon emitters in optical quantum metrology. Our results point toward the realization of a real-world quantum sensor in the near future.

  17. Semiconductor quantum dots as an ideal source of polarization-entangled photon pairs on-demand: a review

    NASA Astrophysics Data System (ADS)

    Huber, Daniel; Reindl, Marcus; Aberl, Johannes; Rastelli, Armando; Trotta, Rinaldo

    2018-07-01

    More than 80 years have passed since the first publication on entangled quantum states. Over this period, the concept of spookily interacting quantum states became an emerging field of science. After various experiments proving the existence of such non-classical states, visionary ideas were put forward to exploit entanglement in quantum information science and technology. These novel concepts have not yet come out of the experimental stage, mostly because of the lack of suitable, deterministic sources of entangled quantum states. Among many systems under investigation, semiconductor quantum dots are particularly appealing emitters of on-demand, single polarization-entangled photon pairs. While it was originally believed that quantum dots must exhibit a limited degree of entanglement related to decoherence effects typical of the solid-state, recent studies have invalidated this preconception. We review the relevant experiments which have led to these important discoveries and discuss the remaining challenges for the anticipated quantum technologies.

  18. Polarization effects on quantum levels in InN/GaN quantum wells.

    PubMed

    Lin, Wei; Li, Shuping; Kang, Junyong

    2009-12-02

    Polarization effects on quantum states in InN/GaN quantum wells have been investigated by means of ab initio calculation and spectroscopic ellipsometry. Through the position-dependent partial densities of states, our results show that the polarization modified by the strain with different well thickness leads to an asymmetry band bending of the quantum well. The quantum levels are identified via the band structures and their square wave function distributions are analyzed by the partial charge densities. Further theoretical and experimental comparison of the imaginary part of the dielectric function show that the overall transition probability increases under larger polarization fields, which can be attributable to the fact that the excited quantum states of 2h have a greater overlap with 1e states and enhance other hole quantum states in the well by a hybridization. These results would provide a new approach to improve the transition probability and light emission by enhancing the polarization fields in a proper way.

  19. Multi-bit dark state memory: Double quantum dot as an electronic quantum memory

    NASA Astrophysics Data System (ADS)

    Aharon, Eran; Pozner, Roni; Lifshitz, Efrat; Peskin, Uri

    2016-12-01

    Quantum dot clusters enable the creation of dark states which preserve electrons or holes in a coherent superposition of dot states for a long time. Various quantum logic devices can be envisioned to arise from the possibility of storing such trapped particles for future release on demand. In this work, we consider a double quantum dot memory device, which enables the preservation of a coherent state to be released as multiple classical bits. Our unique device architecture uses an external gating for storing (writing) the coherent state and for retrieving (reading) the classical bits, in addition to exploiting an internal gating effect for the preservation of the coherent state.

  20. Generalized Steering Robustness of Bipartite Quantum States

    NASA Astrophysics Data System (ADS)

    Zheng, Chunming; Guo, Zhihua; Cao, Huaixin

    2018-06-01

    EPR steering is a kind of quantum correlation that is intermediate between entanglement and Bell nonlocality. In this paper, by recalling the definitions of unsteerability and steerability, some properties of them are given, e.g, it is proved that a local quantum channel transforms every unsteerable state into an unsteerable state. Second, a way of quantifying quantum steering, which we called the generalized steering robustness (GSR), is introduced and some interesting properties are established, including: (1) GSR of a state vanishes if and only if the state is unsteerable; (2) a local quantum channel does not increase GSR of any state; (3) GSR is invariant under each local unitary operation; (4) as a function on the state space, GSR is convex and lower-semi continuous. Lastly, by using the majorization between the reduced states of two pure states, GSR of the two pure states are compared, and it is proved that every maximally entangled state has the maximal GSR.

  1. Λ-Nonlocality of Multipartite States and the Related Nonlocality Inequalities

    NASA Astrophysics Data System (ADS)

    Yang, Ying; Cao, Huai-xin; Chen, Liang; Huang, Yongfeng

    2018-02-01

    Correlations between subsystems of a composite quantum system include Bell nonlocality, steerability, entanglement and quantum discord. Bell nonlocality of a bipartite state is one of important quantum correlations demonstrated by some local quantum measurements. In this paper, we discuss nonlocality of a multipartite quantum system. The Λ-locality and Λ-nonlocality of multipartite states are firstly introduced, some related properties are discussed. Some related nonlocality inequalities are established for {1,2;3}-local, {1;2,3}-local, and Λ-local states, respectively. The violation of one of these inequalities gives a sufficient condition for Λ-nonlocal states. As application, genuinely nonlocality of a tripartite state is checked. Finally, a class of 2-separable nonlocal states are given, which shows that a 2-separable tripartite state is not necessarily local.

  2. Transfer of non-Gaussian quantum states of mechanical oscillator to light

    NASA Astrophysics Data System (ADS)

    Filip, Radim; Rakhubovsky, Andrey A.

    2015-11-01

    Non-Gaussian quantum states are key resources for quantum optics with continuous-variable oscillators. The non-Gaussian states can be deterministically prepared by a continuous evolution of the mechanical oscillator isolated in a nonlinear potential. We propose feasible and deterministic transfer of non-Gaussian quantum states of mechanical oscillators to a traveling light beam, using purely all-optical methods. The method relies on only basic feasible and high-quality elements of quantum optics: squeezed states of light, linear optics, homodyne detection, and electro-optical feedforward control of light. By this method, a wide range of novel non-Gaussian states of light can be produced in the future from the mechanical states of levitating particles in optical tweezers, including states necessary for the implementation of an important cubic phase gate.

  3. Characterizing quantum phase transition by teleportation

    NASA Astrophysics Data System (ADS)

    Wu, Meng-He; Ling, Yi; Shu, Fu-Wen; Gan, Wen-Cong

    2018-04-01

    In this paper we provide a novel way to explore the relation between quantum teleportation and quantum phase transition. We construct a quantum channel with a mixed state which is made from one dimensional quantum Ising chain with infinite length, and then consider the teleportation with the use of entangled Werner states as input qubits. The fidelity as a figure of merit to measure how well the quantum state is transferred is studied numerically. Remarkably we find the first-order derivative of the fidelity with respect to the parameter in quantum Ising chain exhibits a logarithmic divergence at the quantum critical point. The implications of this phenomenon and possible applications are also briefly discussed.

  4. Quantum mechanics on the h-deformed quantum plane

    NASA Astrophysics Data System (ADS)

    Cho, Sunggoo

    1999-03-01

    We find the covariant deformed Heisenberg algebra and the Laplace-Beltrami operator on the extended h-deformed quantum plane and solve the Schrödinger equations explicitly for some physical systems on the quantum plane. In the commutative limit the behaviour of a quantum particle on the quantum plane becomes that of the quantum particle on the Poincaré half-plane, a surface of constant negative Gaussian curvature. We show that the bound state energy spectra for particles under specific potentials depend explicitly on the deformation parameter h. Moreover, it is shown that bound states can survive on the quantum plane in a limiting case where bound states on the Poincaré half-plane disappear.

  5. Evidence for a spinon Fermi surface in a triangular-lattice quantum-spin-liquid candidate

    DOE PAGES

    Shen, Yao; Li, Yao-Dong; Wo, Hongliang; ...

    2016-12-05

    A quantum spin liquid is an exotic quantum state of matter in which spins are highly entangled and remain disordered down to zero temperature. Such a state of matter is potentially relevant to high-temperature superconductivity and quantum-information applications, and experimental identification of a quantum spin liquid state is of fundamental importance for our understanding of quantum matter. Theoretical studies have proposed various quantum-spin-liquid ground states, most of which are characterized by exotic spin excitations with fractional quantum numbers (termed ‘spinons’). In this paper, we report neutron scattering measurements of the triangular-lattice antiferromagnet YbMgGaO 4 that reveal broad spin excitations coveringmore » a wide region of the Brillouin zone. The observed diffusive spin excitation persists at the lowest measured energy and shows a clear upper excitation edge, consistent with the particle–hole excitation of a spinon Fermi surface. Finally, our results therefore point to the existence of a quantum spin liquid state with a spinon Fermi surface in YbMgGaO 4, which has a perfect spin-1/2 triangular lattice as in the original proposal of quantum spin liquids.« less

  6. Quantum Phase Transitions in Conventional Matrix Product Systems

    NASA Astrophysics Data System (ADS)

    Zhu, Jing-Min; Huang, Fei; Chang, Yan

    2017-02-01

    For matrix product states(MPSs) of one-dimensional spin-1/2 chains, we investigate a new kind of conventional quantum phase transition(QPT). We find that the system has two different ferromagnetic phases; on the line of the two ferromagnetic phases coexisting equally, the system in the thermodynamic limit is in an isolated mediate-coupling state described by a paramagnetic state and is in the same state as the renormalization group fixed point state, the expectation values of the physical quantities are discontinuous, and any two spin blocks of the system have the same geometry quantum discord(GQD) within the range of open interval (0,0.25) and the same classical correlation(CC) within the range of open interval (0,0.75) compared to any phase having no any kind of correlation. We not only realize the control of QPTs but also realize the control of quantum correlation of quantum many-body systems on the critical line by adjusting the environment parameters, which may have potential application in quantum information fields and is helpful to comprehensively and deeply understand the quantum correlation, and the organization and structure of quantum correlation especially for long-range quantum correlation of quantum many-body systems.

  7. Integrated generation of complex optical quantum states and their coherent control

    NASA Astrophysics Data System (ADS)

    Roztocki, Piotr; Kues, Michael; Reimer, Christian; Romero Cortés, Luis; Sciara, Stefania; Wetzel, Benjamin; Zhang, Yanbing; Cino, Alfonso; Chu, Sai T.; Little, Brent E.; Moss, David J.; Caspani, Lucia; Azaña, José; Morandotti, Roberto

    2018-01-01

    Complex optical quantum states based on entangled photons are essential for investigations of fundamental physics and are the heart of applications in quantum information science. Recently, integrated photonics has become a leading platform for the compact, cost-efficient, and stable generation and processing of optical quantum states. However, onchip sources are currently limited to basic two-dimensional (qubit) two-photon states, whereas scaling the state complexity requires access to states composed of several (<2) photons and/or exhibiting high photon dimensionality. Here we show that the use of integrated frequency combs (on-chip light sources with a broad spectrum of evenly-spaced frequency modes) based on high-Q nonlinear microring resonators can provide solutions for such scalable complex quantum state sources. In particular, by using spontaneous four-wave mixing within the resonators, we demonstrate the generation of bi- and multi-photon entangled qubit states over a broad comb of channels spanning the S, C, and L telecommunications bands, and control these states coherently to perform quantum interference measurements and state tomography. Furthermore, we demonstrate the on-chip generation of entangled high-dimensional (quDit) states, where the photons are created in a coherent superposition of multiple pure frequency modes. Specifically, we confirm the realization of a quantum system with at least one hundred dimensions. Moreover, using off-the-shelf telecommunications components, we introduce a platform for the coherent manipulation and control of frequencyentangled quDit states. Our results suggest that microcavity-based entangled photon state generation and the coherent control of states using accessible telecommunications infrastructure introduce a powerful and scalable platform for quantum information science.

  8. Second-order asymptotics for quantum hypothesis testing in settings beyond i.i.d. - quantum lattice systems and more

    NASA Astrophysics Data System (ADS)

    Datta, Nilanjana; Pautrat, Yan; Rouzé, Cambyse

    2016-06-01

    Quantum Stein's lemma is a cornerstone of quantum statistics and concerns the problem of correctly identifying a quantum state, given the knowledge that it is one of two specific states (ρ or σ). It was originally derived in the asymptotic i.i.d. setting, in which arbitrarily many (say, n) identical copies of the state (ρ⊗n or σ⊗n) are considered to be available. In this setting, the lemma states that, for any given upper bound on the probability αn of erroneously inferring the state to be σ, the probability βn of erroneously inferring the state to be ρ decays exponentially in n, with the rate of decay converging to the relative entropy of the two states. The second order asymptotics for quantum hypothesis testing, which establishes the speed of convergence of this rate of decay to its limiting value, was derived in the i.i.d. setting independently by Tomamichel and Hayashi, and Li. We extend this result to settings beyond i.i.d. Examples of these include Gibbs states of quantum spin systems (with finite-range, translation-invariant interactions) at high temperatures, and quasi-free states of fermionic lattice gases.

  9. Realization of Quantum Maxwell’s Demon with Solid-State Spins*

    NASA Astrophysics Data System (ADS)

    Wang, W.-B.; Chang, X.-Y.; Wang, F.; Hou, P.-Y.; Huang, Y.-Y.; Zhang, W.-G.; Ouyang, X.-L.; Huang, X.-Z.; Zhang, Z.-Y.; Wang, H.-Y.; He, L.; Duan, L.-M.

    2018-04-01

    Resolution of the century-long paradox on Maxwell's demon reveals a deep connection between information theory and thermodynamics. Although initially introduced as a thought experiment, Maxwell's demon can now be implemented in several physical systems, leading to intriguing test of information-thermodynamic relations. Here, we report experimental realization of a quantum version of Maxwell's demon using solid state spins where the information acquiring and feedback operations by the demon are achieved through conditional quantum gates. A unique feature of this implementation is that the demon can start in a quantum superposition state or in an entangled state with an ancilla observer. Through quantum state tomography, we measure the entropy in the system, demon, and the ancilla, showing the influence of coherence and entanglement on the result. A quantum implementation of Maxwell's demon adds more controllability to this paradoxical thermal machine and may find applications in quantum thermodynamics involving microscopic systems.

  10. Noninformative prior in the quantum statistical model of pure states

    NASA Astrophysics Data System (ADS)

    Tanaka, Fuyuhiko

    2012-06-01

    In the present paper, we consider a suitable definition of a noninformative prior on the quantum statistical model of pure states. While the full pure-states model is invariant under unitary rotation and admits the Haar measure, restricted models, which we often see in quantum channel estimation and quantum process tomography, have less symmetry and no compelling rationale for any choice. We adopt a game-theoretic approach that is applicable to classical Bayesian statistics and yields a noninformative prior for a general class of probability distributions. We define the quantum detection game and show that there exist noninformative priors for a general class of a pure-states model. Theoretically, it gives one of the ways that we represent ignorance on the given quantum system with partial information. Practically, our method proposes a default distribution on the model in order to use the Bayesian technique in the quantum-state tomography with a small sample.

  11. Experimental realization of narrowband four-photon Greenberger-Horne-Zeilinger state in a single cold atomic ensemble.

    PubMed

    Dong, Ming-Xin; Zhang, Wei; Hou, Zhi-Bo; Yu, Yi-Chen; Shi, Shuai; Ding, Dong-Sheng; Shi, Bao-Sen

    2017-11-15

    Multi-photon entangled states not only play a crucial role in research on quantum physics but also have many applications in quantum information fields such as quantum computation, quantum communication, and quantum metrology. To fully exploit the multi-photon entangled states, it is important to establish the interaction between entangled photons and matter, which requires that photons have narrow bandwidth. Here, we report on the experimental generation of a narrowband four-photon Greenberger-Horne-Zeilinger state with a fidelity of 64.9% through multiplexing two spontaneous four-wave mixings in a cold Rb85 atomic ensemble. The full bandwidth of the generated GHZ state is about 19.5 MHz. Thus, the generated photons can effectively match the atoms, which are very suitable for building a quantum computation and quantum communication network based on atomic ensembles.

  12. All Entangled States can Demonstrate Nonclassical Teleportation.

    PubMed

    Cavalcanti, Daniel; Skrzypczyk, Paul; Šupić, Ivan

    2017-09-15

    Quantum teleportation, the process by which Alice can transfer an unknown quantum state to Bob by using preshared entanglement and classical communication, is one of the cornerstones of quantum information. The standard benchmark for certifying quantum teleportation consists in surpassing the maximum average fidelity between the teleported and the target states that can be achieved classically. According to this figure of merit, not all entangled states are useful for teleportation. Here we propose a new benchmark that uses the full information available in a teleportation experiment and prove that all entangled states can implement a quantum channel which cannot be reproduced classically. We introduce the idea of nonclassical teleportation witness to certify if a teleportation experiment is genuinely quantum and discuss how to quantify this phenomenon. Our work provides new techniques for studying teleportation that can be immediately applied to certify the quality of quantum technologies.

  13. Quantum beats from the coherent interaction of hole states with surface state in near-surface quantum well

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, Salahuddin; Jayabalan, J., E-mail: jjaya@rrcat.gov.in; Chari, Rama

    2014-08-18

    We report tunneling assisted beating of carriers in a near-surface single GaAsP/AlGaAs quantum well using transient reflectivity measurement. The observed damped oscillating signal has a period of 120 ± 6 fs which corresponds to the energy difference between lh1 and hh2 hole states in the quantum well. Comparing the transient reflectivity signal at different photon energies and with a buried quantum well sample, we show that the beating is caused by the coherent coupling between surface state and the hole states (lh1 and hh2) in the near-surface quantum well. The dependence of decay of coherence of these tunneling carriers on the excitationmore » fluence is also reported. This observation on the coherent tunneling of carrier is important for future quantum device applications.« less

  14. Unambiguous quantum-state filtering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Takeoka, Masahiro; Sasaki, Masahide; CREST, Japan Science and Technology Corporation, Tokyo,

    2003-07-01

    In this paper, we consider a generalized measurement where one particular quantum signal is unambiguously extracted from a set of noncommutative quantum signals and the other signals are filtered out. Simple expressions for the maximum detection probability and its positive operator valued measure are derived. We apply such unambiguous quantum state filtering to evaluation of the sensing of decoherence channels. The bounds of the precision limit for a given quantum state of probes and possible device implementations are discussed.

  15. General Method for Constructing Local Hidden Variable Models for Entangled Quantum States

    NASA Astrophysics Data System (ADS)

    Cavalcanti, D.; Guerini, L.; Rabelo, R.; Skrzypczyk, P.

    2016-11-01

    Entanglement allows for the nonlocality of quantum theory, which is the resource behind device-independent quantum information protocols. However, not all entangled quantum states display nonlocality. A central question is to determine the precise relation between entanglement and nonlocality. Here we present the first general test to decide whether a quantum state is local, and show that the test can be implemented by semidefinite programing. This method can be applied to any given state and for the construction of new examples of states with local hidden variable models for both projective and general measurements. As applications, we provide a lower-bound estimate of the fraction of two-qubit local entangled states and present new explicit examples of such states, including those that arise from physical noise models, Bell-diagonal states, and noisy Greenberger-Horne-Zeilinger and W states.

  16. Remote preparation of an atomic quantum memory.

    PubMed

    Rosenfeld, Wenjamin; Berner, Stefan; Volz, Jürgen; Weber, Markus; Weinfurter, Harald

    2007-02-02

    Storage and distribution of quantum information are key elements of quantum information processing and future quantum communication networks. Here, using atom-photon entanglement as the main physical resource, we experimentally demonstrate the preparation of a distant atomic quantum memory. Applying a quantum teleportation protocol on a locally prepared state of a photonic qubit, we realized this so-called remote state preparation on a single, optically trapped 87Rb atom. We evaluated the performance of this scheme by the full tomography of the prepared atomic state, reaching an average fidelity of 82%.

  17. A quantum proxy group signature scheme based on an entangled five-qubit state

    NASA Astrophysics Data System (ADS)

    Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru

    2015-09-01

    A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.

  18. Photonic Programmable Tele-Cloning Network

    PubMed Central

    Li, Wei; Chen, Ming-Cheng

    2016-01-01

    The concept of quantum teleportation allows an unknown quantum states to be broadcasted and processed in a distributed quantum network. The quantum information injected into the network can be diluted to distant multi-copies by quantum cloning and processed by arbitrary quantum logic gates which were programed in advance in the network quantum state. A quantum network combines simultaneously these fundamental quantum functions could lead to new intriguing applications. Here we propose a photonic programmable telecloning network based on a four-photon interferometer. The photonic network serves as quantum gate, quantum cloning and quantum teleportation and features experimental advantage of high brightness by photon recycling. PMID:27353838

  19. Quantum Fisher information of the Greenberg-Horne-Zeilinger state in decoherence channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Jian; Huang Yixiao; Wang Xiaoguang

    2011-08-15

    Quantum Fisher information of a parameter characterizes the sensitivity of the state with respect to changes of the parameter. In this article, we study the quantum Fisher information of a state with respect to SU(2) rotations under three decoherence channels: the amplitude-damping, phase-damping, and depolarizing channels. The initial state is chosen to be a Greenberg-Horne-Zeilinger state of which the phase sensitivity can achieve the Heisenberg limit. By using the Kraus operator representation, the quantum Fisher information is obtained analytically. We observe the decay and sudden change of the quantum Fisher information in all three channels.

  20. Quantum gambling using two nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Hwang, Won Young; Ahn, Doyeol; Hwang, Sung Woo

    2001-12-01

    We give a (remote) quantum-gambling scheme that makes use of the fact that quantum nonorthogonal states cannot be distinguished with certainty. In the proposed scheme, two participants Alice and Bob can be regarded as playing a game of making guesses on identities of quantum states that are in one of two given nonorthogonal states: if Bob makes a correct (an incorrect) guess on the identity of a quantum state that Alice has sent, he wins (loses). It is shown that the proposed scheme is secure against the nonentanglement attack. It can also be shown heuristically that the scheme is secure in the case of the entanglement attack.

Top