52 research outputs found
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks
for realistic signals sources, including weak coherent pulses and
downconversion sources. The proof applies to the BB84 protocol with the
standard detection scheme (no strong reference pulse). I obtain a formula for
the secure bit rate per time slot of an experimental setup which can be used to
optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
Micro-manufacturing : research, technology outcomes and development issues
Besides continuing effort in developing MEMS-based manufacturing techniques, latest effort in Micro-manufacturing is also in Non-MEMS-based manufacturing. Research and technological development (RTD) in this field is encouraged by the increased demand on micro-components as well as promised development in the scaling down of the traditional macro-manufacturing processes for micro-length-scale manufacturing. This paper highlights some EU funded research activities in micro/nano-manufacturing, and gives examples of the latest development in micro-manufacturing methods/techniques, process chains, hybrid-processes, manufacturing equipment and supporting technologies/device, etc., which is followed by a summary of the achievements of the EU MASMICRO project. Finally, concluding remarks are given, which raise several issues concerning further development in micro-manufacturing
Aerostructural design optimization of a 100-passenger regional jet with surrogate-based mission analysis
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/106481/1/AIAA2013-4372.pd
Surrogate Models and Mixtures of Experts in Aerodynamic Performance Prediction for Mission Analysis
Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/140436/1/6.2014-2301.pd
What makes a bully a cyberbully? Unravelling the characteristics of cyberbullies across twenty-five European countries
The characteristics of bullies who act face-to-face and those who do so in cyberspace were compared directly in one sample across twenty-five countries. The role of cross-country differences in technological infrastructure was also explored. Cyberbullies compared to face-to-face bullies were more likely to engage in risky online activities, spend more time online, and found it easier to be themselves online. Private access to the internet did not make a difference. Gender differences showed girls more likely to be cyber- than face-to-face bullies if they have a profile on a social networking site. Age and internet ability beliefs were also positively but not independently associated with cyberbullying. Cross-country differences were small and patterns remained mostly stable across countries, suggesting that individual and not country-level characteristics are pivotal in explaining cyberbullying
Low-coherence deformation sensors for the monitoring of civil-engineering structures
An optical-fiber deformation sensor with a resolution of 10 ÎŒm and an operational range of 60 mm has been realized. The system is based on low-coherence interferometry in standard single-mode telecommunication fibers. It allows the monitoring of large structures over several months without noticeable drift. No continuous measurement is needed and the system is insensitive to variations of the fiber losses. This technique has been applied to the monitoring of a 20 m Ă 5 m Ă 0.5 m, 120 ton concrete slab over six months. It is possible to measure the shrinkage of concrete and its elastic coefficient during pre-straining, giving reproducible results in good agreement with theoretical calculations and measurements performed on small concrete samples. This paper describes the optical arrangement and the procedures used to install optical fibers in concrete
- âŠ