153 research outputs found

    Vestibular effects of diving

    Get PDF
    Over the last 45 years, recreational self-contained underwater breathing apparatus (SCUBA) diving as a leisure activity has increased in popularity. According to the Professional Association of Diving Instructors (PADI), more than 23 million diver certificates have been issued across the globe. Given the popularity of scuba diving, it is incumbent on every physician to know and understand the specific medical hazards and conditions associated with scuba diving. Although diving has become more accessible and the equipment is much safer now, diving still has its inherent dangers. Each year incidents occur, ranging from seasickness and sinus problems to heart conditions and mortality. More than 80% of all diving complications occur in the head and neck region. A number of studies have found that diving can lead to the development of vestibular disorders such as: Barotrauma, Decompression sickness, Otitis externa, Bilateral exostoses, Chronic sinusitis (barosinusitis), Serous tubotympanic catarrh, Tinnitus, Dizziness, Vertigo.The aim of this paper was to share our experience in the field of treating patients with different types of ENT disorders after or before a diving session. We briefly summarized the most important information for some of the disorders.We included in our study for a period of 12 years: a total of 24 patients (four females and 20 males), who dive. They were between 25 and 55 years of age. Some presented in clinics with an ENT disorder. 19 were professional, qualified divers, five (three males and two females) dove for the first time. On all 24 patients we performed: audiometry tests, Tympanometry tests, OAE, Static and dynamic vestibular tests, vHIT – in the last five years, otoscopy examination, dental check-ups.All divers – no matter professionalists or not – should follow these recommendations: a thorough prophylactic ENT check-up should be performed before an active diving session. Chronic ENT inflammations should be addressed in a timely manner. Divers should follow all instructions from the certified Diving Associations

    Outline of the SECOQC Quantum-Key-Distribution Network in Vienna

    Full text link
    A Quantum Key Distribution (QKD) network is currently implemented in Vienna by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. We give an architectural overview of the network and present the enabling QKD-technologies, as well as the novel QKD network protocols.Comment: 10 pages, 5 figure

    The Case for Quantum Key Distribution

    Get PDF
    Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009 Workshop on Quantum and Classical Information Security; version 2 minor content revision

    Artificial intelligence – the new suggestion for biomedicine, dentistry and healthcare

    Get PDF
    The development of technologies based on Artificial Intelligence (AI) and their application in medicine is growing rapidly. Innovations in digital technology, telemedicine, 5G technology and artificial intelligence (AI) create new opportunities for the development of the healthcare system. The aim of the present study is to explore the possibilities for the application of artificial intelligence in biomedicine, dentistry, healthcare and healthcare. In recent years there have been many major innovations, including the introduction of many new information and communication technologies. Digital innovations, including the further inclusion of telemedicine, the development of 5th generation wireless networks (5G) and artificial intelligence (AI) approaches, create an exceptional ecosystem for new health opportunities. The digital health sector creates a favorable environment for the provision of health services at a very high level

    High rate, long-distance quantum key distribution over 250km of ultra low loss fibres

    Full text link
    We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per second over 250km

    Feasibility of free space quantum key distribution with coherent polarization states

    Full text link
    We demonstrate for the first time the feasibility of free space quantum key distribution with continuous variables under real atmospheric conditions. More specifically, we transmit coherent polarization states over a 100m free space channel on the roof of our institute's building. In our scheme, signal and local oscillator are combined in a single spatial mode which auto-compensates atmospheric fluctuations and results in an excellent interference. Furthermore, the local oscillator acts as spatial and spectral filter thus allowing unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This is an author-created, un-copyedited version of an article accepted for publication in New Journal of Physics (Special Issue on Quantum Cryptography: Theory and Practice). IOP Publishing Ltd is not responsible for any errors or omissions in this version of the manuscript or any version derived from i

    Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors

    Full text link
    The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections of the actual implementation. Here we describe and experimentally demonstrate a very simple but highly effective attack which even does not need to intercept the quantum channel at all. Only by exploiting the dead time effect of single photon detectors the eavesdropper is able to gain (asymptotically) full information about the generated keys without being detected by state-of-the-art QKD protocols. In our experiment, the eavesdropper inferred up to 98.8% of the key correctly, without increasing the bit error rate between Alice and Bob significantly. Yet, we find an evenly simple and effective countermeasure to inhibit this and similar attacks

    Triplet-like correlation symmetry of continuous variable entangled states

    Full text link
    We report on a continuous variable analogue of the triplet two-qubit Bell states. We theoretically and experimentally demonstrate a remarkable similarity of two-mode continuous variable entangled states with triplet Bell states with respect to their correlation patterns. Borrowing from the two qubit language, we call these correlations triplet-like.Comment: 7 pages, 5 figures. Comments are welcom

    Quantum-Aware Software Defined Networks

    Get PDF
    Software Defined Networks (SDN) represent a major paradigm change in communications networks. It provides a level of abstraction and independence from the traditional networking practice that allows for a fast path of innovation and, specifically, opens new opportunities for Quantum Key Distribution (QKD) networks. In this contribution we explore the implications of this paradigm for the deployment of QKD in practice from the point of view of telecommunications? providers, network equipment manufacturers and applied research and development. We propose a generic quantum-aware SDN architecture and two applications, a generic end to end encryption one and other for the network infrastructure itself

    Composability in quantum cryptography

    Full text link
    In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol. In a second part, we take a more general point of view, which is necessary for the study of cryptographic situations involving, for example, mutually distrustful parties. We explain the universal composability framework and state the composition theorem which guarantees that secure protocols can securely be composed to larger applicationsComment: 18 pages, 2 figure
    corecore