Getting many quantum states from one experimental setup

first_imgLinear optical setup for the experiment. Credit: Witlef Wieczorek. (PhysOrg.com) — “In the traditional approach to entanglement with linear optics, one designs a new setup for each single state that you want,” Witlef Wieczorek tells PhysOrg.com. “What we’ve done is to make a single setup that allows you to observe lots of different quantum states.” Wieczorek is a scientist at the Max Planck Institute for Quantum Optics in Garching and Ludwig-Maximilians-Universität Munich, Germany. He is part of a team that not only figured out how it might work to use one linear optics setup for several quantum states, but also demonstrated that such a setup works. His colleagues include Christian Schmid, Nikolai Kiesel, Reinhold Pohlner and Harald Weinfurter at the Max Planck Institute and Ludwig-Maximilians-Universität, as well as Otfried Gühne at the Institute for Quantum Optics and Quantum Information in Innsbruck, Austria. Their work is reported in Physical Review Letters: “Experimental Observation of an Entire Family of Four-Photon Entangled States.”“It is inefficient to have to keep changing the entire setup for each quantum state,” Wieczorek explains. “But now we’ve shown that you can have one setup, and if you change a parameter, you can get a different quantum state. You no longer have to design a different setup for each state.”Wieczorek and his peers call the states “families” because they are “related” through the experimental setup, and only require the changing of an experimental parameter to get a new state. “We have a group of states that are connected to this one setup.” One of the most exciting things, however, is that this particular family includes five quantum states that are known to have applications in the field of quantum information.“These quantum states are useful for different tasks,” Wieczorek says. “Our one setup produces states that can be used for decoherence-free communication, secret sharing of information, telecloning and getting different kinds of three qubit inequivalent entangled states.” Known states are nice, but Wieczorek and his colleagues also found states not discussed before. While the unknown quantum states in this particular family do not have any known practical application right now, they can contribute to the overall knowledge of entanglement. “We can characterize the family better by studying particular properties, as, for example, entanglement robustness or persistency, of the family of states in more detail. And, who knows? Maybe these unknown states will have applications in the future.”The current work is done with four photon entangled states, but Wieczorek hopes to expand the idea to six photon entangled states. “Next, we want to go for six photons,” he says. “And we have an idea of how we can apply it to the setup.”For the most part, Wieczorek and his peers confined themselves to looking at only a small fraction of states. However, it is possible that any number of states could be achieved. “In principle, you could see a different state for each parameter you change. You could see infinetely many states.” But for now, Wieczorek is happy with the results of what has been accomplished so far. “This makes it easier. We can say we want a state for a particular application, and we just set the parameter. When we’re ready to do something else, all we do is change the parameter.”Copyright 2008 PhysOrg.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of PhysOrg.com. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Citation: Getting many quantum states from one experimental setup (2008, July 15) retrieved 18 August 2019 from https://phys.org/news/2008-07-quantum-states-experimental-setup.htmllast_img read more

Read More »

HP HDX 18t Notebook Is Now Available

first_img The HDX 18t notebook has an ultra-wide 16:9 flush-glass display that supplies 55% better viewing than standard panels, making it easier to see at a distance or present to a group. The Full High Definition display (1920 x 1080) exhibits intense realism while watching HD movies and playing games. With HP’s MediaSmart software you can immerse yourself in high definition with home-theater audio/video quality. You can also watch, record, and view live, streamed, and mobile Internet TV in high definition. MediSmart software will also let you create, edit, and enjoy HD video, music, and photos.Your Home Entertainment will be greatly enhanced by Home-Theater-quality audio with premium 7.1-capable speakers, a triple bass reflex subwoofer, and Dolby-simulated surround sound. With the built-in Blu-ray drive you will experience stunning movies that´s no comparison to the standard DVD player.HDX 18t features: 18.4-inch Full HD 1920X1080p Ultra Brightview Infinity LCD displayFull QWERTY keyboard with number padBlu-ray ROM with DVD SuperMulti DL burnerWiFi 802.11nAltec Lansing speakers and subwooferFingerprint scannerWebcam5-in-1 digital media card readerHDMI 1.3 outputeSATA port4 USB 2.0 portsFirewireYou can choose from the following CPU’s for the HP HDX 18t notebook:Intel(R) Core(TM)2 Duo Processor P8400 (2.26 GHz) Intel(R) Core(TM)2 Duo Processor P8600 (2.4 GHz) Intel(R) Core(TM)2 Duo Processor T9400 (2.53 GHz) Intel(R) Core(TM)2 Duo Processor T9600 (2.80GHz) Intel(R) Core(TM)2 Quad Processor QX9300 (2.53Hz)The HP HDX 18t Premium series notebooks are available now with a starting price of $1549.99. HP has just recently announced their HDX 18t Premium Series laptop. HP’s HDX 18t is powered by Intel´s latest Core 2 Duo or Core 2 Quad processor. The HDX 18t is equipped with up to 8GB of RAM, NVIDIA GeForce 9600M GT 512MB video card and can accommodate Dual hard drives up to 320GB. Citation: HP HDX 18t Notebook Is Now Available (2008, October 2) retrieved 18 August 2019 from https://phys.org/news/2008-10-hp-hdx-18t-notebook.htmlcenter_img This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More »

Dell Introduces Studio Desktop and Studio Slim Models

first_img Citation: Dell Introduces Studio Desktop and Studio Slim Models (2008, September 23) retrieved 18 August 2019 from https://phys.org/news/2008-09-dell-studio-desktop-slim.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Sharp Aquos Crystal phone: Where’s the bezel? Explore further The Studio MT has two 5.25″ external drive bays, one external 3.5″ bay, and two internal 3.5″ drive bays. It also has one PCI-e x16 slot, two PCI-e x1 slots and one PCI slot. The Studio ST has the same expansion capability with the exception of having a single 5.25″ external bay. Both Studio desktops have the following specifications:Intel Core 2 Duo and Core 2 Quad processors up to 8 GB of DDR2 RAM 6 USB 2.0 (4 front, 2 back) ports1 FireWire (IEEE 1394) port (two on the Studio Desktop)S-PDIF output HDMI and VGA output Integrated 7.1 audio Gigabit Ethernet 16-in-1 media card reader (Studio Desktop) 19-in-1 media card reader (Studio Slim) 350W (Studio Desktop) or 250W (Studio Slim) power supplies Optional upgrades for both models include:Discrete ATI graphics Blu-Ray ROM optical drivesTV tuner802.11n wireless connectivity Wireless keyboards and mice 64-bit versions of Windows VistaThe starting price for both systems start at $549.00 and are available right now. Dell has just rounded out its Studio line with its new Studio Desktop (MT) and Studio Slim (ST) models. Dell offers each model with a choice of Core 2 Duo or Core 2 Quad processors, up to 8GB of RAM and integrated 7.1 audio. Dell Studio Slim Model (ST)last_img read more

Read More »

Caspian Tiger Extinct But Lives On In Siberian Tiger

first_img Citation: Caspian Tiger Extinct But Lives On In Siberian Tiger (2009, January 21) retrieved 18 August 2019 from https://phys.org/news/2009-01-caspian-tiger-extinct-siberian.html The Caspian Tiger,(Panthera tigris virgata) genetic roots span over a million years. A nearly cataclysmic event during the late Pleistocene Era, some 10,000 to 12,000 years ago nearly wiped out all tigers. Fortunately, a small remnant of tigers survived. In 2004 scientists revised the known classification to five tiger subspecies from eight previously identified. The Caspian Tiger and the Amur or Siberian Tiger began in China and spread westward along the Silk Road. Sometime later these magnificent tigers expanded their territory by moving northward and eastward into what is known as the former Soviet Union. Researchers believe that sometime in the early 1900s the Caspian and Siberian tigers intermingled, but were subsequently isolated by hunters. The two majestic Russian cats, the Siberian and Caspian Tigers preferred slightly different terrain. The Siberian Tiger prowled the rich mix forest in the southern Russian Far East region on the Sea of Japan. While the Caspian Tiger inhabited the inland drainage basins of Western and Eastern Asia among the reeds and waterways hunting their prey hidden by lush vegetation. The Caspian Tiger was an exquisite specimen in appearance and size, weighing in a range of 375-530 pounds with an average body length of nearly 10-feet. During the Winter the Caspian Tiger had a lush, thick reddish coat with black or brown stripes set in a close pattern with a silky haired white belly and a beard. The word that best describes the Caspian Tiger, is formidable. Unfortunately, the riverside vegetation was cleared for cultivation and in-habitation, thus the Caspian Tiger was deprived of its habitat and its prey in the 1930s. Cotton fields were planted and the rivers were used for irrigation. Soon, the Caspian Tiger became an alien in its own territory and was targeted and hunted down as a menace to human settlements and a threat to livestock. The Caspian Tiger pelt was prized for its beauty and fetched a hefty price. A further environmental insult occurred when the river vegetation and reeds were cleared to eradicate malaria on the Southern shores of the Caspian Sea in the 1950s and 1960s. The last reported Caspian Tiger sighting happened in the 1960s and 1970s. Russian and international conservation groups banned tiger hunting in 1947, but it was too late for the Caspian Tiger to make a recovery. Poaching and contributing factors wiped out the majestic cat. Conservation efforts did help to protect and stabilize the Siberian Tiger. Fortunately, the subspecies commingling in the distant past will allow the Caspian Tiger to once again take its rightful place in the family tree of tigers.© 2009 PhysOrg.com This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Explore further Caspian Tiger. Credit: Berlin Zoo 1899 (PhysOrg.com) — The extraordinary Caspian Tiger became extinct over 40-years ago. Through modern genetic analysis it has been discovered the Caspian Tiger and the Siberian or Amur Tiger still in existence are separated by only one letter of genetic code. The Caspian Tiger can be reestablished by using their relative, the Siberian Tiger. According to John Seidensticker, a tiger conservationist this means the loss of only a part of a subspecies as opposed to the loss of a whole subspecies. In practice, the zoo breeding programs for the Siberian Tiger are largely successful. The benefits of being differentlast_img read more

Read More »

Software Thats Resilient Against Hacker Attack

first_img(PhysOrg.com) — A team of researchers headed by Martin Rinard, a professor of computer science at MIT, have developed new software that automatically patches errors in deployed software in a matter of minutes. Image Credit: Technology Review New trojan detected for Microsoft Word PausePlay% buffered00:0000:00UnmuteMuteDisable captionsEnable captionsSettingsCaptionsDisabledQuality0SpeedNormalCaptionsGo back to previous menuQualityGo back to previous menuSpeedGo back to previous menu0.5×0.75×Normal1.25×1.5×1.75×2×Exit fullscreenEnter fullscreen Play Automatically Patching Errors in Deployed Software, Conference Audio. Via: Technology Review© 2009 PhysOrg.com Explore further The software is called ClearView and is designed to apply patches whenever it detects that something has gone wrong with the program. ClearView operates by monitoring a program’s normal behavior and establishing a set of rules. ClearView looks for certain types of errors that are mostly caused by an attacker introducing malicious code into the operating program. When ClearView detects a software intrusion, it identifies the rule that has been compromised and generates a set of repair patches designed to force the software to follow the compromised rules. ClearView then studies all possibilities to determine which selected rule is the most successful patch. ClearView can be very successful when it is installed on multiple computers running the same software. By ClearView analyzing the malicious code and applying the most effective rule on one machine, it can then apply the patch to all other machines. ClearView applies the patch to the binary code, bypassing the source code which enables it to fix programs without human intervention. ClearView was tested on a group of computers running Firefox and an independent team to launch an attack on the Web browser. The attack team used 10 different attacks to inject malicious code into Firefox. ClearView was successful in all 10 attacks by blocking the malicious code and shutting down the program before its intended attack took effect.ClearView created patches that corrected the errors introduced by the malicious code and discarded any corrections that had a negative effect. ClearView, on average, came up with a working patch within five minutes of its first attack.In a TR interview, Rinard stated: “What this research is leading us to believe is that software isn’t in itself inherently fragile and brittle because of errors. It’s fragile and brittle because people are afraid to let the software continue if they think there’s something wrong with it.” Some software engineering approaches, such as “failure-oblivious computing” or “acceptable computing,” share this philosophy.More information: Automatically Patching Errors in Deployed Software, 22nd ACM Symposium on Operating Systems Principles. [Paper] [Slides] This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. Citation: Software That’s Resilient Against Hacker Attack (2009, October 29) retrieved 18 August 2019 from https://phys.org/news/2009-10-software-resilient-hacker.htmllast_img read more

Read More »

Huge solar powered plane takes to the air w Video

first_img More information: Solar Impulse: www.solarimpulse.com (PhysOrg.com) — A huge airplane using solar cells as its only power source is being tested in Switzerland. In its first successful test flight last December, the plane flew only 350 meters at a height of just one meter above the ground, but by mid 2010 it is expected to make a non-stop test flight of 36 hours, and to make the first ever night flights by a plane powered only by solar panels. Test pilot Markus Scherdel will carry out the first test flights to confirm the plane can be controlled, and to test its behavior in the air. Risks are being minimized by a team of air controllers, meteorologists and other specialists, but the tests are unavoidably difficult and risky because the behavior in the air of such a lightweight but large plane is completely unknown. After these tests two of the promoters, André Borschberg and Bertrand Piccard, will also fly the plane to familiarize themselves with the aircraft. Bertrand Piccard was the first to circle the globe non-stop in a balloon, beating Virgin founder Sir Richard Branson in the quest.A larger plane, the HB-SIB, with a wingspan of 80 meters, is planned for either 2011 or 2012, and will aim to circumnavigate the globe in 2013 using only solar power. The trip is expected to take up to 25 days and include five stops. Citation: Huge solar powered plane takes to the air (w/ Video) (2010, April 1) retrieved 18 August 2019 from https://phys.org/news/2010-04-huge-solar-powered-plane-air.html The single-seater plane, the HB-SIA, was built by Solar Impulse SA of Switzerland after a successful prototype was launched by adventurer Betrand Piccard in 2003. The wingspan of the HB-SIA (63.4 m) is almost as wide as a Boeing 747 or Airbus A340 wingspan, and it is 21.85 meters long and 6.4 meters high. Unlike a Boeing 747, which has a maximum takeoff weight of over 333 tonne, the HB-SIA tips the scales at only 1.6 tonne. The construction includes a customized honeycomb sandwich structure made of carbon fiber to keep the weight as low as possible. Pioneering solar-powered plane makes airborne hop This is a December 2009 test. The plane is powered by four electric engines, with electricity provided by 11,628 SunPower Corporation photovoltaic (PV) cells mounted on the wings and horizontal tail area, giving a coverage of 200 square meters. The cells are 150 micrometers thick and have a conversion efficiency of 22%. The average output of the engines is 6 kW (maximum 7.5 kW, or 10 hp), which is around the same as the power used by the Wright Flyer flown by Wilbur and Orville Wright in 1903. The average flight speed of the HB-SIA is only 70 kilometers per hour.To enable the plane to fly at night, the electricity generated by the PV cells is stored in a series of lithium polymer rechargeable batteries, weighing a total of 0.4 tonne. The energy density of the batteries is around 220 Wh/kg. Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. HB-SIA / Solar Impulse © 2010 PhysOrg.comlast_img read more

Read More »

HP slams sensational reports about LaserJet printer hack vulnerability

first_img Citation: HP slams ‘sensational’ reports about LaserJet printer hack vulnerability (2011, November 30) retrieved 18 August 2019 from https://phys.org/news/2011-11-hp-slams-sensational-laserjet-printers.html Explore further As some observers explain the situation, we are in a computer equipment stage of embedded systems in printers, packed with Internet-connecting functions that make them operate more like computers.Rewriting the printer’s firmware takes only about 30 seconds, according to researcher Ang Cui, and a virus would be virtually impossible to detect once installed. Only pulling the computer chips out of the printer to test them would confirm an attack, Cui said. Every time a vulnerable printer accepts a print job, it scans that job to see if it includes a firmware update. Older printers do not discriminate the source of the update; hackers can in turn intercept requests and plant their own updates. As one blogger described the potential mischief, the printer can be told to erase its software and hackers can install a “booby trapped” version.The Columbia team sent standard print commands from a Mac and a PC running Linux and succeeded in tricking an HP printer into reprogramming itself.The researchers have been working on the printer security project under grants from government and industry, according to reports, and they described the flaw in a private briefing for federal agencies. They also reported their findings to Hewlett-Packard.Columbia professor Salvatore Stolfo, who directed the research in the Computer Science Department of Columbia University’s School of Engineering and Applied Science, said that these devices are completely open and available to be exploited. He and his team have been forceful in describing this as a serious matter for attention, involving a vulnerability that could impact millions of printers and other hardware.In contrast, HP initially took a cautious view in response. Keith Moore, chief technologist for HP’s printer division, had said HP takes the Columbia findings seriously but initial research suggested vulnerability was low. He pointed out that the models tested were older models, and he would generally disagree that the threat is widespread. He said the company was reviewing the issue. But in a hard-hitting statement issued Tuesday, HP said, “Today there has been sensational and inaccurate reporting regarding a potential security vulnerability with some HP LaserJet printers. No customer has reported unauthorized access. Speculation regarding potential for devices to catch fire due to a firmware change is false.” This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. (PhysOrg.com) — Columbia University researchers have demonstrated how hackers can use printers not only to infect computer systems and steal information but to set printers on fire. Their claims were made this week in a demo at Columbia University’s Intrusion Detection Systems Laboratory for msnbc. They report a security flaw in Hewlett-Packard (HP) printers open for exploit. While their experiments were only on HP printers, they said that they are just starting to sample other manufacturers’ printers too. center_img © 2011 PhysOrg.com More information: msnbcmedia.msn.com/i/msnbc/sec … _printersecurity.pdf HP to Launch Printer Management Tool Designed for SMBslast_img read more

Read More »

Moltenair batterys storage capacity among the highest of any battery type

first_img The researchers, Stuart Licht, Baochen Cui, Jessica Stuart, Baohui Wang, and Jason Lau, at George Washington University, have published a paper on the new molten-air battery in a recent issue of Energy & Environmental Science.”This is the first time that a rechargeable molten-air battery has been demonstrated,” Licht told Phys.org. “There have been rechargeable batteries that use molten electrolytes, but not air. For example, molten-sulfur batteries have been widely studied for electric car and grid applications. However, sulfur is twice as massive as oxygen (per electron stored) and its mass needs to be carried as part of the battery (whereas air is freely available). The molten-air batteries are the first rechargeable batteries to use a molten salt to store energy using ‘free’ oxygen from the air and multi-electron storage molecules.”This ability to store multiple electrons in a single molecule is one of the biggest advantages of the molten-air battery. By their nature, multiple-electron-per-molecule batteries usually have higher storage capacities compared to single-electron-per-molecule batteries, such as Li-ion batteries. The battery with the highest energy capacity to date, the vanadium boride (VB2)-air battery, can store 11 electrons per molecule. However, the VB2-air battery and many other high-capacity batteries have a serious drawback: they are not rechargeable.Here, the researchers demonstrated that molten-air batteries offer a combination of high storage capacity and reversibility. The molten-air battery uses oxygen from the air as the cathode material, giving it the benefit of not having to carry this weight. It also has the advantage of not using any exotic catalysts or membranes. Different versions of the battery use different electrolytes, but they are all molten, i.e., melted to a liquid by a high temperature, in this case around 700-800 °C. The researchers experimented with using iron, carbon, and VB2 as the molten electrolyte, demonstrating very high capacities of 10,000, 19,000, and 27,000 Wh/l, respectively. The capacities are influenced by the number of electrons that each type of molecule can store: 3 electrons for iron, 4 electrons for carbon, and 11 electrons for VB2. In comparison, the Li-air battery has an energy capacity of 6,200 Wh/l, due to its single-electron-per-molecule transfer and lower density than the other compositions. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. © 2013 Phys.org. All rights reserved. Explore further Citation: Molten-air battery’s storage capacity among the highest of any battery type (2013, September 19) retrieved 18 August 2019 from https://phys.org/news/2013-09-molten-air-battery-storage-capacity-highest.html More information: Stuart Licht, et al. “Molten Air – A new, highest energy class of rechargeable batteries.” Energy & Environmental Science. DOI: 10.1039/C3EE42654HAlso at arXiv:1307.1305 [physics.chem-ph] http://arxiv.org/abs/1307.1305 Journal information: Energy & Environmental Science High-efficiency zinc-air battery developed The researchers explain that they were able to make the battery reversible by using an unusual electrolytic splitting process to function as battery “charging.” For example, when the iron molten-air battery is discharged, the iron mixes with the oxygen to produce iron oxide. To charge the battery, the iron oxide is converted back into iron metal, and O2 is released into the air. The carbon and VB2 molten-air batteries recharge in a similar way, although the electrochemical properties of VB2 are not as well understood as the others. As Licht explained, the molten electrolyte is a key to making the battery rechargeable. “In the case of molten-air batteries, the molten electrolyte opens a pathway to recharge a wide variety of high-capacity multi-electron storage materials,” he said. “These materials, while highest in capacity, are a challenge to recharge (how do you reinsert 11 electrons back into each molecule of vanadium boride?). The molten electrolyte provides an effective media that is compatible with both recharging these materials and ‘free’ oxygen from the air for storage. The high activity of molten electrolytes allows this charging to occur.”While the molten-air battery’s high capacity and reversibility make it an attractive candidate for future energy storage applications, the researchers are continuing to improve other areas of the battery. For example, they plan to investigate other types of molten electrolytes with lower melting temperatures, increasing the voltage (a major contributor to power density and, for electric vehicles, maximum speed), and improving the energy efficiency. “High temperature for a battery is unusual,” Licht said. “However, it is not an impediment. Lower capacity, high-temperature molten electrolyte sulfur batteries have already been tested without incident in electric vehicles. No weak spot has yet appeared. The discharge current of the molten-air electrode is sufficient to yield high battery voltages, but as described in the study could be even greater when a higher surface area between the cycled air and the molten salt will be achieved.” This chart compares the characteristics of molten-air batteries that use three different types of materials. Credit: Licht, et al. ©2013 The Royal Society of Chemistry (Phys.org) —Researchers have demonstrated a new class of high-energy battery, called a “molten-air battery,” that has one of the highest storage capacities of any battery type to date. Unlike some other high-energy batteries, the molten-air battery has the advantage of being rechargeable. Although the molten electrolyte currently requires high-temperature operation, the battery is so new that the researchers hope that experimenting with different molten compositions and other characteristics will make molten-air batteries strong competitors in electric vehicles and for storing energy for the electric grid.last_img read more

Read More »

Researchers isolate compounds and esters given off by dying humans

first_img © 2015 Phys.org Most people have heard of what is commonly known as “the smell of death” though the phrase is also used to describe people near to dying. Still, human beings undoubtedly give off a unique chemical cocktail after they die—one that dogs can identify using only their noses. Scientists have wondered for many years about the nature of that cocktail and have more recently begun to conduct studies to determine if its exact makeup could be found. In this new effort, the team in Belgium believes it has done just that.To separate the chemicals emitted from humans during decomposition, from other animals, the team gathered animal (frog, pig, mouse, rabbit, mole, turtle, fish and bird remains) and human parts and put them in separate chambers where they could be studied with a gas chromatograph over a period of six months. That led to the identification of 452 unique compounds— principle component analysis showed that just eight of those compounds were distinct to humans and pigs (a close physiological sample). Closer examination of just the pig and human remains revealed five esters (organic compounds typically found in fats and oils, some of which are what humans smell when fruit is rotting) that were unique to just humans. The researchers suggest that their results might be used to assist in training search dogs, or even perhaps in building a machine able to detect the smell of decaying human bodies, which could then be put into search robots. They acknowledge that more work still needs to be done because their study included only body parts—some tissue and organs—it is possible that a whole human body emits more compounds than just those parts studied, particularly parts associated with the gut. (Phys.org)—A team of researchers at the University of Leuven in Belgium has succeeded in identifying the unique group of compounds and esters that are given off by the human body as it decomposes. In their paper posted in the journal PLoS ONE, the team describes the study they carried out using actual human remains, what they found and their hopes that their findings can be used in future forensic and search efforts. Credit: Cristie Guevara/public domain Research shows value of cadaver dogs locating underwater corpses More information: Rosier E, Loix S, Develter W, Van de Voorde W, Tytgat J, Cuypers E (2015) The Search for a Volatile Human Specific Marker in the Decomposition Process. PLoS ONE 10(9): e0137341. DOI: 10.1371/journal.pone.0137341AbstractIn this study, a validated method using a thermal desorber combined with a gas chromatograph coupled to mass spectrometry was used to identify the volatile organic compounds released during decomposition of 6 human and 26 animal remains in a laboratory environment during a period of 6 months. 452 compounds were identified. Among them a human specific marker was sought using principle component analysis. We found a combination of 8 compounds (ethyl propionate, propyl propionate, propyl butyrate, ethyl pentanoate, pyridine, diethyl disulfide, methyl(methylthio)ethyl disulfide and 3-methylthio-1-propanol) that led to the distinction of human and pig remains from other animal remains. Furthermore, it was possible to separate the pig remains from human remains based on 5 esters (3-methylbutyl pentanoate, 3-methylbutyl 3-methylbutyrate, 3-methylbutyl 2-methylbutyrate, butyl pentanoate and propyl hexanoate). Further research in the field with full bodies has to corroborate these results and search for one or more human specific markers. These markers would allow a more efficiently training of cadaver dogs or portable detection devices could be developed.center_img Explore further Journal information: PLoS ONE Citation: Researchers isolate compounds and esters given off by dying humans (2015, September 24) retrieved 18 August 2019 from https://phys.org/news/2015-09-isolate-compounds-esters-dying-humans.html This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read More »

Alienated society finds space on canvas

first_imgSelected works of eminent artists like K Laxma Goud, Ganesh Pyne, Jogen Chowdhury, Ram Kumar and Satish Gujral are exhibited in the capital which have drawn inspiration from ‘alienated’ or marginalised section of the society.Curated by Kolkata-based art expert and historian Arun Ghose, the art pieces showcased at the exhibition, focus on re-definition of modernity in this era of globalisation and address crucial issues such as cultural translations and time-space crossings. Also Read – ‘Playing Jojo was emotionally exhausting’Situationism, the title is derived from Karl Marx’s ‘theory of alienation’ which describes the separation of things that naturally belong together but are alienated.For Kolkata-based curator Arun Ghose, the term ‘alienation’ was apt to reflect what is still prevalent in our society – discrimination and indifference towards a certain section of the society. ‘Art is a reflection of the society and what these works define is an outlook these artists have towards the society. They were associated and connected with it, and taking inspiration from what was happening and drawing it on canvas,’ Ghose said in an interview. Also Read – Leslie doing new comedy special with Netflix‘But it seems the younger generation is alienated towards this section, which needs attention. I tried to compile something that will give a faint idea of how art and society co-exist together,’ he added.This is why melancholy is a metaphor in all the works on display, drawn on canvas using medium of oil, sketches or paint. The grim lines or the faces of people in these painting bear the sign of indifference, or perhaps unfulfillment.Even Goud’s colourful sketches of folk and tribal people and Chowdhury’s close-up sketches of women give out sadness and pain.Ghose feels this exhibition is psycho-analysis of society. ‘I have tried to portray two extreme spectrums, and each artist’s paintings come together on the storyboard forming a narration. It can be interpreted in many ways,’ he said.last_img read more

Read More »