scispace - formally typeset
Search or ask a question
Institution

Tokyo Institute of Technology

EducationTokyo, Tôkyô, Japan
About: Tokyo Institute of Technology is a education organization based out in Tokyo, Tôkyô, Japan. It is known for research contribution in the topics: Thin film & Catalysis. The organization has 46775 authors who have published 101656 publications receiving 2357893 citations. The organization is also known as: Tokyo Tech & Tokodai.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the neutrino oscillation parameters Δm^2_(21), θ-, 12, and θ_(13) from a three-flavor analysis of solar and KamLAND data are presented.
Abstract: We present new constraints on the neutrino oscillation parameters Δm^2_(21), θ_(12), and θ_(13) from a three flavor analysis of solar and KamLAND data. The KamLAND data set includes data acquired following a radiopurity upgrade and amounts to a total exposure of 3.49 x 10^(32) target-proton-year. Under the assumption of CPT invariance, a two-flavor analysis (θ_(13) = 0) of the KamLAND and solar data yields the best-fit values tan^2θ_(12) = 0.444^(+0.036)_(-0.030) and Δm^2_(21) = 7.50^(+0.19)_(-0.20) x 10^(-5) eV^2; a three-flavor analysis with θ13 as a free parameter yields the best-fit values tan^2θ_(12) = 0.452^(+0.035)_(-0.033), Δm^2_(21) = 7.50^(+0.19)_(-0.20) x 10^(-5) eV^2, and sin^2θ_(13) = 0.020^(+0.016)_(-0.016). This θ_(13) interval is consistent with other recent work combining the CHOOZ, atmospheric and long-baseline accelerator experiments. We also present a new global θ_(13) analysis, incorporating the CHOOZ, atmospheric, and accelerator data, which indicates sin^2θ_(13) = 0.009^(+0.013)-_(0.007). A nonzero value is suggested, but only at the 79% C.L.

318 citations

Journal ArticleDOI
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Abstract: Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

317 citations

Journal ArticleDOI
TL;DR: In this paper, the effect of curvature on flow resistance and heat transfer in a laminar flow in a curved pipe has been investigated under the condition of uniform heat flux at large Dean numbers and Prandtl numbers.

317 citations

Journal ArticleDOI
Georges Aad1, Brad Abbott2, Jalal Abdallah3, Ovsat Abdinov4  +2862 moreInstitutions (191)
TL;DR: The methods employed in the ATLAS experiment to correct for the impact of pile-up on jet energy and jet shapes, and for the presence of spurious additional jets, are described, with a primary focus on the large 20.3 kg-1 data sample.
Abstract: The large rate of multiple simultaneous protonproton interactions, or pile-up, generated by the Large Hadron Collider in Run 1 required the development of many new techniques to mitigate the advers ...

316 citations

Journal ArticleDOI
TL;DR: It is proposed that 'dynamic vents' form transient openings and closings at these leaky blood vessels that may explain the enhanced extravasation of nanoparticles from the tumour blood vessels, and offer insights into the underlying distribution patterns of an administered drug.
Abstract: Enhanced permeability in tumours is thought to result from malformed vascular walls with leaky cell-to-cell junctions. This assertion is backed by studies using electron microscopy and polymer casts that show incomplete pericyte coverage of tumour vessels and the presence of intercellular gaps. However, this gives the impression that tumour permeability is static amid a chaotic tumour environment. Using intravital confocal laser scanning microscopy we show that the permeability of tumour blood vessels includes a dynamic phenomenon characterized by vascular bursts followed by brief vigorous outward flow of fluid (named 'eruptions') into the tumour interstitial space. We propose that 'dynamic vents' form transient openings and closings at these leaky blood vessels. These stochastic eruptions may explain the enhanced extravasation of nanoparticles from the tumour blood vessels, and offer insights into the underlying distribution patterns of an administered drug.

316 citations


Authors

Showing all 46967 results

NameH-indexPapersCitations
Matthew Meyerson194553243726
Yury Gogotsi171956144520
Masayuki Yamamoto1711576123028
H. Eugene Stanley1541190122321
Takashi Taniguchi1522141110658
Shu-Hong Yu14479970853
Kazunori Kataoka13890870412
Osamu Jinnouchi13588586104
Hector F. DeLuca133130369395
Shlomo Havlin131101383347
Hiroyuki Iwasaki131100982739
Kazunari Domen13090877964
Hideo Hosono1281549100279
Hideyuki Okano128116967148
Andreas Strasser12850966903
Network Information
Related Institutions (5)
University of Tokyo
337.5K papers, 10.1M citations

95% related

Osaka University
185.6K papers, 5.1M citations

95% related

Kyoto University
217.2K papers, 6.5M citations

94% related

Nagoya University
128.2K papers, 3.2M citations

94% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202388
2022358
20213,457
20203,694
20193,783
20183,531