334 research outputs found

    Quantized Detector Networks: A review of recent developments

    Full text link
    QDN (quantized detector networks) is a description of quantum processes in which the principal focus is on observers and their apparatus, rather than on states of SUOs (systems under observation). It is a realization of Heisenberg's original instrumentalist approach to quantum physics and can deal with time dependent apparatus, multiple observers and inter-frame physics. QDN is most naturally expressed in the mathematical language of quantum computation, a language ideally suited to describe quantum experiments as processes of information exchange between observers and their apparatus. Examples in quantum optics are given, showing how the formalism deals with quantum interference, non-locality and entanglement. Particle decays, relativity and non-linearity in quantum mechanics are discussed.Comment: 59 pages, 14 figures, to be published in Int. J. Mod. Phys.

    Crisis on Impact: Responding to Cyber Attacks on Critical Information Infrastructures, 30 J. Marshall J. Info. Tech. & Privacy L. 31 (2013)

    Get PDF
    In the developing digital economy, the notion of traditional attack on enterprises of national significance or interest has transcended into different modes of electronic attack, surpassing accepted traditional forms of physical attack upon a target. The terrorist attacks that took place in the United States on September 11, 2001 demonstrated the physical devastation that could occur if any nation were the target of a large-scale terrorist attack. Therefore, there is a need to protect critical national infrastructure and critical information infrastructure. In particular, this protection is crucial for the proper functioning of a modern society and for a government to fulfill one of its most important prerogatives – namely, the protection of its people. Computer networks have many benefits that governments, corporations, and individuals alike take advantage of in order to promote and perform their duties and roles. Today, there is almost complete dependence on private sector telecommunication infrastructures and the associated computer hardware and software systems. These infrastructures and systems even support government and defense activity. This Article discusses possible at-tacks on critical information infrastructures and the government reactions to these attacks

    Liberty versus civility: a critical review of efficient policing in Hong Kong.

    Get PDF
    Chiu Sau-Mee.Thesis (M.Phil.)--Chinese University of Hong Kong, 1996.Includes bibliographical references (leaves 90-101).Chapter Chapter One: --- Introduction --- p.1Chapter Chapter Two: --- Origin of Modern Policing --- p.22Chapter Chapter Three: --- Historical Evolution of Hong Kong Policing --- p.39Chapter Chapter Four: --- Controlling Mechanism on Contemporary Policing in Hong Kong --- p.63Chapter Chapter Five: --- Conclusion --- p.87Bibliography --- p.9
    • …
    corecore