52 research outputs found

    Security against individual attacks for realistic quantum key distribution

    Get PDF
    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup which can be used to optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure

    Micro-manufacturing : research, technology outcomes and development issues

    Get PDF
    Besides continuing effort in developing MEMS-based manufacturing techniques, latest effort in Micro-manufacturing is also in Non-MEMS-based manufacturing. Research and technological development (RTD) in this field is encouraged by the increased demand on micro-components as well as promised development in the scaling down of the traditional macro-manufacturing processes for micro-length-scale manufacturing. This paper highlights some EU funded research activities in micro/nano-manufacturing, and gives examples of the latest development in micro-manufacturing methods/techniques, process chains, hybrid-processes, manufacturing equipment and supporting technologies/device, etc., which is followed by a summary of the achievements of the EU MASMICRO project. Finally, concluding remarks are given, which raise several issues concerning further development in micro-manufacturing

    What makes a bully a cyberbully? Unravelling the characteristics of cyberbullies across twenty-five European countries

    Get PDF
    The characteristics of bullies who act face-to-face and those who do so in cyberspace were compared directly in one sample across twenty-five countries. The role of cross-country differences in technological infrastructure was also explored. Cyberbullies compared to face-to-face bullies were more likely to engage in risky online activities, spend more time online, and found it easier to be themselves online. Private access to the internet did not make a difference. Gender differences showed girls more likely to be cyber- than face-to-face bullies if they have a profile on a social networking site. Age and internet ability beliefs were also positively but not independently associated with cyberbullying. Cross-country differences were small and patterns remained mostly stable across countries, suggesting that individual and not country-level characteristics are pivotal in explaining cyberbullying

    Low-coherence deformation sensors for the monitoring of civil-engineering structures

    No full text
    An optical-fiber deformation sensor with a resolution of 10 ÎŒm and an operational range of 60 mm has been realized. The system is based on low-coherence interferometry in standard single-mode telecommunication fibers. It allows the monitoring of large structures over several months without noticeable drift. No continuous measurement is needed and the system is insensitive to variations of the fiber losses. This technique has been applied to the monitoring of a 20 m × 5 m × 0.5 m, 120 ton concrete slab over six months. It is possible to measure the shrinkage of concrete and its elastic coefficient during pre-straining, giving reproducible results in good agreement with theoretical calculations and measurements performed on small concrete samples. This paper describes the optical arrangement and the procedures used to install optical fibers in concrete
    • 

    corecore