134,904 research outputs found

    From Quantum Cheating to Quantum Security

    Get PDF
    For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures. Originally appeared in Physics Today: . This article may be downloaded for personal use only. Any other use requires prior permission of both the author and the American Institute of Physic

    Analytical assessment of mine water rebound. Case study Ruhr coal basin

    Get PDF
    This study aims to assess key factors that influence mine water rebound on the example of a large amount of hard coal mines flooded or being flooded in Europe. Three German mines have been selected for a detailed study. A mathematical model based on analytical formulae of seepage theory has been employed to calculate time-dependent radial inflow to the shaft simulated as a big well in vertically heterogeneous rocks. The results of modelling showed good conformity with measurements for all studied mines. Besides, we evaluated the sensitivity of the model output to parameter variations for mine water level and initial inflow to the mine
    • …
    corecore