SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Larsson Jan Åke) srt2:(2005-2009)"

Sökning: WFRF:(Larsson Jan Åke) > (2005-2009)

  • Resultat 1-10 av 24
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Lindehammer, Sabina, et al. (författare)
  • Temporal trends of HLA genotype frequencies of type 1 diabetes patients in Sweden from 1986 to 2005 suggest altered risk
  • 2008
  • Ingår i: Acta Diabetologica. - : Springer Science and Business Media LLC. - 0940-5429 .- 1432-5233. ; 45:4, s. 231-5
  • Tidskriftsartikel (refereegranskat)abstract
    • The aim of this study was to compare the frequency of human leukocyte antigen (HLA) genotypes in 1-18-year-old patients with type 1 diabetes newly diagnosed in 1986-1987 (n = 430), 1996-2000 (n = 342) and in 2003-2005 (n = 171). We tested the hypothesis that the HLA DQ genotype distribution changes over time. Swedish type 1 diabetes patients and controls were typed for HLA using polymerase chain reaction amplification and allele specific probes for DQ A1* and B1* alleles. The most common type 1 diabetes HLA DQA1*-B1*genotype 0501-0201/0301-0302 was 36% (153/430) in 1986-1987 and 37% (127/342) in 1996-2000, but decreased to 19% (33/171) in 2003-2005 (P \ 0.0001). The 0501-0201/0501-0201 genotype increased from 1% in 1986-1987 to 7% in 1996-2000 (P = 0.0047) and to 5% in 2003-2005 (P > 0.05). This study in 1-18-year-old Swedish type 1 diabetes patients supports the notion that there is a temporal change in HLA risk.
  •  
2.
  • Axell, Erik, et al. (författare)
  • On the Optimal K-term Approximation of a Sparse Parameter Vector MMSE Estimate
  • 2009
  • Ingår i: Proceedings of the 2009 IEEE Workshop on Statistical Signal Processing (SSP'09). - : IEEE. - 9781424427093 ; , s. 245-248
  • Konferensbidrag (refereegranskat)abstract
    • This paper considers approximations of marginalization sums thatarise in Bayesian inference problems. Optimal approximations ofsuch marginalization sums, using a fixed number of terms, are analyzedfor a simple model. The model under study is motivated byrecent studies of linear regression problems with sparse parametervectors, and of the problem of discriminating signal-plus-noise samplesfrom noise-only samples. It is shown that for the model understudy, if only one term is retained in the marginalization sum, thenthis term should be the one with the largest a posteriori probability.By contrast, if more than one (but not all) terms are to be retained,then these should generally not be the ones corresponding tothe components with largest a posteriori probabilities.
  •  
3.
  • Larsson, Niklas, et al. (författare)
  • Continuous flow hollow fiber liquid-phase microextraction and monitoring of NSAID pharmaceuticals in a sewage treatment plant effluent
  • 2009
  • Ingår i: Analytical Methods. - : Royal Society of Chemistry (RSC). - 1759-9660 .- 1759-9679. ; 1:1, s. 59-67
  • Tidskriftsartikel (refereegranskat)abstract
    • A method for simultaneous extraction and quantification Of four non-steroidal anti-inflammatory drugs (NSAIDs) based on continuous flow hollow fiber liquid-phase microextraction (CFHF-LPME) was developed. The effect of sample flow rate, acceptor flow rate, type of acceptor flow (continuous, semi-continuous or forward-backward), type of supported liquid membrane and sample volume was studied. The extraction of the final method was linear over an environmentally relevant concentration range and yielded high enrichment factors (720-940 times) in reagent water and (270-800 times) in sewage water for all analytes within 45 min. Repeatability was best (RSD 6-15%) during the first 30 min of extraction. The optimised method was used to monitor the occurrence and fate of the four NSAIDs in a Swedish sewage treatment plant (STP) effluent, which is discharged into a system of ponds before release into a river, during the period May-September 2008. All four analytes were detected at concentrations up to 0.92 mu g L-1 ketoprofen, 0.08 mu g L-1 naproxen, 0.43 mu g L-1 diclofenac and 0.25 mu g L-1 ibuprofen. A concentration drop during the summer was observed. For diclofenac and ketoprofen significant removal in the primary recipient pond system was observed. The presence of the studied pharmaceuticals in STP effluent together with concern about their environmental effects makes monitoring of their occurrence and knowledge of their environmental fate important. The proposed method provides a basis for automation of extraction towards on-site extraction using CFHF-LPME.
  •  
4.
  • Abidin, Aysajan, et al. (författare)
  • Special Properties of Strongly Universal2 Hash Functions Important in Quantum Cryptography
  • 2009
  • Ingår i: AIP Conference Proceedings, ISSN 0094-243X, Foundations of Probability and Physics—5, Växjö, augusti 2008. - New York : American Institute of Physics. ; , s. 289-293
  • Konferensbidrag (refereegranskat)abstract
    • Secure message authentication is an important part of Quantum Key Distribution. In this paper we analyze special properties of a Strongly Universal2 hash function family, an understanding of which is important in the security analysis of the authentication used in Quantum Cryptography. We answer the following question: How much of Alices message does Eve need to influence so that the message along with its tag will give her enough information to create the correct tag for her message?
  •  
5.
  • Abidin, Aysajan, et al. (författare)
  • Vulnerability of "A Novel Protocol-Authentication Algorithm Ruling out a Man-in-the-Middle Attack in Quantum Cryptography"
  • 2009
  • Ingår i: International Journal of Quantum Information. - 0219-7499. ; 7:5, s. 1047-1052
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography" [M. Peev et al., Int. J. Quant. Inf. 3 (2005) 225]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.
  •  
6.
  • Bengtsson, Ingemar, et al. (författare)
  • Mutually unbiased bases and Hadamard matrices of order six
  • 2007
  • Ingår i: Journal of Mathematical Physics. - : American Institute of Physics (AIP). - 0022-2488 .- 1089-7658. ; 48:5, s. 052106-1-052106-21
  • Tidskriftsartikel (refereegranskat)abstract
    • We report on a search for mutually unbiased bases (MUBs) in six dimensions. We find only triplets of MUBs, and thus do not come close to the theoretical upper bound 7. However, we point out that the natural habitat for sets of MUBs is the set of all complex Hadamard matrices of the given order, and we introduce a natural notion of distance between bases in Hilbert space. This allows us to draw a detailed map of where in the landscape the MUB triplets are situated. We use available tools, such as the theory of the discrete Fourier transform, to organize our results. Finally, we present some evidence for the conjecture that there exists a four dimensional family of complex Hadamard matrices of order 6. If this conjecture is true the landscape in which one may search for MUBs is much larger than previously thought.
  •  
7.
  •  
8.
  • Cabello, Adan, et al. (författare)
  • Minimum Detection Efficiency for a Loophole-Free Atom-Photon Bell Experiment
  • 2007
  • Ingår i: Physical Review Letters. - : American Physical Society. - 0031-9007 .- 1079-7114. ; 98, s. 220402-1-220402-4
  • Tidskriftsartikel (refereegranskat)abstract
    • In Bell experiments, one problem is to achieve high enough photodetection to ensure that there is no possibility of describing the results via a local hidden-variable model. Using the Clauser-Horne inequality and a two-photon nonmaximally entangled state, a photodetection efficiency higher than 0.67 is necessary. Here we discuss atom-photon Bell experiments. We show that, assuming perfect detection efficiency of the atom, it is possible to perform a loophole-free atom-photon Bell experiment whenever the photodetection efficiency exceeds 0.50.
  •  
9.
  • Cabello, Adan, et al. (författare)
  • Minimum detection efficiency required for a loophole-free violation of the Braunstein-Caves chained Bell inequalities
  • 2009
  • Ingår i: Physical Review A. Atomic, Molecular, and Optical Physics. - : American Physical Society. - 1050-2947 .- 1094-1622. ; 79:6, s. 062109-1-062109-7
  • Tidskriftsartikel (refereegranskat)abstract
    • The chained Bell inequalities of Braunstein and Caves involving N settings per observer have some interesting applications. Here we obtain the minimum detection efficiency required for a loophole-free violation of the Braunstein-Caves inequalities for any N greater than= 2. We discuss both the case in which both particles are detected with the same efficiency and the case in which the particles are detected with different efficiencies.
  •  
10.
  • Cederlöf, Jörgen, et al. (författare)
  • Security aspects of the Authentication used in Quantum Cryptography
  • 2008
  • Ingår i: IEEE Transactions on Information Theory. - : Institute of Electrical and Electronics Engineers (IEEE). - 0018-9448 .- 1557-9654. ; 54:4, s. 1735-1741
  • Tidskriftsartikel (refereegranskat)abstract
    • Unconditionally secure message authentication is an important part of Quantum Cryptography (QC). We analyze security effects of using a key obtained from QC for authentication purposes in later rounds of QC. In particular, the eavesdropper gains partial knowledge on the key in QC that may have an effect on the security of the authentication in the later round. Our initial analysis indicates that this partial knowledge has little effect on the authentication part of the system, in agreement with previous results on the issue. However, when taking the full QC protocol into account, the picture is different. By accessing the quantum channel used in QC, the attacker can change the message to be authenticated. This together with partial knowledge of the key does incur a security weakness of the authentication. The underlying reason for this is that the authentication used, which is insensitive to such message changes when the key is unknown, becomes sensitive when used with a partially known key. We suggest a simple solution to this problem, and stress usage of this or an equivalent extra security measure in QC.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 24
Typ av publikation
tidskriftsartikel (14)
konferensbidrag (9)
recension (1)
Typ av innehåll
refereegranskat (17)
övrigt vetenskapligt/konstnärligt (5)
populärvet., debatt m.m. (2)
Författare/redaktör
Larsson, Jan-Åke, 19 ... (9)
Larsson, Jan-Åke (7)
Larsson, Niklas (6)
Jönsson, Jan Åke (6)
Mayer, Philipp (3)
Cabello, Adan (3)
visa fler...
Abidin, Aysajan (2)
Lernmark, Åke (2)
Larsson, Karin (2)
Carlsson, Annelie (2)
Neiderud, Jan (2)
Romero, Roberto (2)
Liu, Jing-fu (2)
Rodriguez, David (2)
Cederlöf, Jörgen (2)
Johansson, C. (1)
Larsson, Erik G (1)
Sjöblad, Sture (1)
Lindblad, Bengt (1)
Kockum, K (1)
Holmberg, E. (1)
Cilio, Corrado (1)
Lynch, Kristian (1)
Hanås, R (1)
Ivarsson, Sten (1)
Ludvigsson, Jonas F. ... (1)
Jonsson, Björn (1)
Tuvemo, Torsten (1)
Ivarsson, Sten A. (1)
Westphal, Otto, 1935 (1)
Åman, Jan, 1948- (1)
Nilsson, Anna (1)
Carlsson, E. (1)
Larsson, Helena (1)
Forsander, Gun, 1951 (1)
Neiderud, J (1)
Bengtsson, Ingemar (1)
Ericsson, Åsa (1)
Gill, Richard D. (1)
Gustafsson, Per (1)
Lindblad, Birgitta E ... (1)
Zyczkowski, Karol (1)
Axell, Erik (1)
Barri, Thaer (1)
Tadej, Wojciech (1)
Bruzda, Wojciech (1)
Thalme, B (1)
Lindehammer, Sabina (1)
Jönsson, B.A. (1)
Larsson, Estelle (1)
visa färre...
Lärosäte
Linköpings universitet (17)
Lunds universitet (8)
Uppsala universitet (2)
Göteborgs universitet (1)
Stockholms universitet (1)
Örebro universitet (1)
visa fler...
Karolinska Institutet (1)
visa färre...
Språk
Engelska (22)
Svenska (1)
Danska (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (20)
Medicin och hälsovetenskap (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy