13,885 research outputs found

    A parallel Jacobson-Oksman optimization algorithm

    Get PDF
    A gradient-dependent optimization technique which exploits the vector-streaming or parallel-computing capabilities of some modern computers is presented. The algorithm, derived by assuming that the function to be minimized is homogeneous, is a modification of the Jacobson-Oksman serial minimization method. In addition to describing the algorithm, conditions insuring the convergence of the iterates of the algorithm and the results of numerical experiments on a group of sample test functions are presented. The results of these experiments indicate that this algorithm will solve optimization problems in less computing time than conventional serial methods on machines having vector-streaming or parallel-computing capabilities

    Controlled quantum teleportation and secure direct communication

    Full text link
    We present a controlled quantum teleportation protocol. In the protocol, quantum information of an unknown state of a 2-level particle is faithfully transmitted from a sender (Alice) to a remote receiver (Bob) via an initially shared triplet of entangled particles under the control of the supervisor Charlie. The distributed entangled particles shared by Alice, Bob and Charlie function as a quantum information channel for faithful transmission. We also propose a controlled and secure direct communication scheme by means of this teleportation. After insuring the security of the quantum channel, Alice encodes the secret message directly on a sequence of particle states and transmits them to Bob supervised by Charlie using this controlled quantum teleportation. Bob can read out the encoded message directly by the measurement on his qubit. In this scheme, the controlled quantum teleportation transmits Alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret message between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of the third side.Comment: 4 page

    Secure direct communication using Einstein-Podolsky-Rosen pairs and teleportation

    Full text link
    A novel scheme for secure direct communication between Alice and Bob is proposed, where there is no need for establishing a shared secret key. The communication is based on Einstein-Podolsky-Rosen pairs and teleportation between Alice and Bob. After insuring the security of the quantum channel (EPR pairs), Bob encodes the secret message directly on a sequence of particle states and transmits them to Alice by teleportation. In this scheme teleportation transmits Bob's message without revealing any information to a potential eavesdropper. Alice can read out the encoded messages directly by the measurement on her qubits. Because there is not a transmission of the qubit which carry the secret message between Alice and Bob, it is completely secure for direct secret communication if perfect quantum channel is used

    Controlled and secure direct communication using GHZ state and teleportation

    Full text link
    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), Alice encodes the secret message directly on a sequence of particle states and transmits them to Bob supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits Alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of the third side.Comment: 4 pages, no figur

    VULNERABILITY AND E-CRIMINALITY OF IT

    Get PDF
    The development of an informational society requires consolidating trust in information and communication technology (ICT), the protection of personal data and of the right to a private life, but also promoting a world and national unification of the infoinformational society, information and communication technology, informatic safety, vulnerable to e-criminality, knowledge

    Some implications of deposit deregulation

    Get PDF
    Bank deposits ; Deposit insurance ; Interest rates

    Effects of operational factors on organizational performance in Kenyan insurance industry

    Get PDF
    Performance of insurance firms has largely been influenced by operational factors. Insurance firms have continually performed poorly in the Kenyan market since 1985. So far, there is still limited information as regards this trend. The objective of the study was to establish the extent to which operational factors affect the performance of insurance firms. The study adopted a descriptive census survey design. The study location was in Nairobi and the population consisted of 40 registered insurance companies as at August 2010. Reliability of the results was determined by the test-retest approach. Validity of the research instrument was established by using two firms outside the target population. Data was analyzed using descriptive statistics and inferential statistics. The hypothesis was tested using simple regression coefficient at 95% confidence level. The study revealed that operational factors have no relationship with organizational performance

    The insurance industry and the conservation of biological diversity: an analysis of the prospects for market creation

    Get PDF
    corecore