13,885 research outputs found
A parallel Jacobson-Oksman optimization algorithm
A gradient-dependent optimization technique which exploits the vector-streaming or parallel-computing capabilities of some modern computers is presented. The algorithm, derived by assuming that the function to be minimized is homogeneous, is a modification of the Jacobson-Oksman serial minimization method. In addition to describing the algorithm, conditions insuring the convergence of the iterates of the algorithm and the results of numerical experiments on a group of sample test functions are presented. The results of these experiments indicate that this algorithm will solve optimization problems in less computing time than conventional serial methods on machines having vector-streaming or parallel-computing capabilities
Controlled quantum teleportation and secure direct communication
We present a controlled quantum teleportation protocol. In the protocol,
quantum information of an unknown state of a 2-level particle is faithfully
transmitted from a sender (Alice) to a remote receiver (Bob) via an initially
shared triplet of entangled particles under the control of the supervisor
Charlie. The distributed entangled particles shared by Alice, Bob and Charlie
function as a quantum information channel for faithful transmission. We also
propose a controlled and secure direct communication scheme by means of this
teleportation. After insuring the security of the quantum channel, Alice
encodes the secret message directly on a sequence of particle states and
transmits them to Bob supervised by Charlie using this controlled quantum
teleportation. Bob can read out the encoded message directly by the measurement
on his qubit. In this scheme, the controlled quantum teleportation transmits
Alice's message without revealing any information to a potential eavesdropper.
Because there is not a transmission of the qubit carrying the secret message
between Alice and Bob in the public channel, it is completely secure for
controlled and direct secret communication if perfect quantum channel is used.
The feature of this scheme is that the communication between two sides depends
on the agreement of the third side.Comment: 4 page
Secure direct communication using Einstein-Podolsky-Rosen pairs and teleportation
A novel scheme for secure direct communication between Alice and Bob is
proposed, where there is no need for establishing a shared secret key. The
communication is based on Einstein-Podolsky-Rosen pairs and teleportation
between Alice and Bob. After insuring the security of the quantum channel (EPR
pairs), Bob encodes the secret message directly on a sequence of particle
states and transmits them to Alice by teleportation. In this scheme
teleportation transmits Bob's message without revealing any information to a
potential eavesdropper. Alice can read out the encoded messages directly by the
measurement on her qubits. Because there is not a transmission of the qubit
which carry the secret message between Alice and Bob, it is completely secure
for direct secret communication if perfect quantum channel is used
Controlled and secure direct communication using GHZ state and teleportation
A theoretical scheme for controlled and secure direct communication is
proposed. The communication is based on GHZ state and controlled quantum
teleportation. After insuring the security of the quantum channel (a set of
qubits in the GHZ state), Alice encodes the secret message directly on a
sequence of particle states and transmits them to Bob supervised by Charlie
using controlled quantum teleportation. Bob can read out the encoded messages
directly by the measurement on his qubits. In this scheme, the controlled
quantum teleportation transmits Alice's message without revealing any
information to a potential eavesdropper. Because there is not a transmission of
the qubit carrying the secret messages between Alice and Bob in the public
channel, it is completely secure for controlled and direct secret communication
if perfect quantum channel is used. The feature of this scheme is that the
communication between two sides depends on the agreement of the third side.Comment: 4 pages, no figur
VULNERABILITY AND E-CRIMINALITY OF IT
The development of an informational society requires consolidating trust in information and communication technology (ICT), the protection of personal data and of the right to a private life, but also promoting a world and national unification of the infoinformational society, information and communication technology, informatic safety, vulnerable to e-criminality, knowledge
Some implications of deposit deregulation
Bank deposits ; Deposit insurance ; Interest rates
Effects of operational factors on organizational performance in Kenyan insurance industry
Performance of insurance firms has largely been influenced by operational factors. Insurance firms have
continually performed poorly in the Kenyan market since 1985. So far, there is still limited information as regards
this trend. The objective of the study was to establish the extent to which operational factors affect the
performance of insurance firms. The study adopted a descriptive census survey design. The study location was in
Nairobi and the population consisted of 40 registered insurance companies as at August 2010. Reliability of the
results was determined by the test-retest approach. Validity of the research instrument was established by using
two firms outside the target population. Data was analyzed using descriptive statistics and inferential statistics.
The hypothesis was tested using simple regression coefficient at 95% confidence level. The study revealed that
operational factors have no relationship with organizational performance
- …