4,481 research outputs found

    Counterfactual quantum certificate authorization

    Full text link
    We present a multi-partite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.Comment: 6 pages, 2 figures, close to the published versio

    A Cross-National Comparison of Consumers\u27 Attitudes Toward Direct Marketing and Purchase Intention

    Get PDF
    Existing research indicates that attitudes toward the three elements of direct marketing (the source, mode, and response channel) influence consumers\u27 intentions to purchase directly marketed products. While research investigating attitudes and consumers\u27 response has been conducted in the U.S., there has been no research to date which examines attitude structures and purchase intentions towards direct marketing in a multi-country setting, in spite of the standardized global efforts of direct marketeers. This study presents findings on attitude structures regarding direct marketing for three affluent open markets, the U.S., Singapore, and the Netherlands and empirically investigates the relationships between these consumers\u27 attitudes toward the three elements of direct marketing and purchase intentions

    Intrusion Detection Systems Using Adaptive Regression Splines

    Full text link
    Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a performance analysis between Multivariate Adaptive Regression Splines (MARS), neural networks and support vector machines. The MARS procedure builds flexible regression models by fitting separate splines to distinct intervals of the predictor variables. A brief comparison of different neural network learning algorithms is also given

    Engineering Quantum Jump Superoperators for Single Photon Detectors

    Full text link
    We study the back-action of a single photon detector on the electromagnetic field upon a photodetection by considering a microscopic model in which the detector is constituted of a sensor and an amplification mechanism. Using the quantum trajectories approach we determine the Quantum Jump Superoperator (QJS) that describes the action of the detector on the field state immediately after the photocount. The resulting QJS consists of two parts: the bright counts term, representing the real photoabsorptions, and the dark counts term, representing the amplification of intrinsic excitations inside the detector. First we compare our results for the counting rates to experimental data, showing a good agreement. Then we point out that by modifying the field frequency one can engineer the form of QJS, obtaining the QJS's proposed previously in an ad hoc manner

    Analysis of risk factors of hypertension: a cross-sectional study in a rural area

    Get PDF
    Background: Hypertension (high blood pressure) is when the pressure in your blood vessels is too high (140/90 mmHg or higher). It is common but can be serious if not treated. Methods: The present study was conducted at medicine department of Adichunchanagiri Institute of Medical Sciences, Mandya from February to July 2023. Total 100 study subjects in the age group of 30–60 years were included by simple random sampling technique in the present study. Pre-designed, pre-tested proforma was used to collect data regarding demographic characteristics and different risk factors i.e. smoking and alcoholism through house-to-house visits. Results: In the present study the overall prevalence of hypertension was found to be 18%. Similar findings have also been reported in other studies. Comparable prevalence (15%) was found in the study conducted at squatter settlement of Karachi (Pakistan). Similar prevalence of hypertension (16.9%) has also been reported in the study conducted among labour population of Gujarat. Conclusions: Cardiovascular risk factors and lifestyle behaviors are amenable to modification and may therefore be relevant targets in the prevention of hypertension. For some modifiable risk factors, it is unclear whether they are causally related to hypertension. This study found that, BMI, alcohol dependence, insomnia, and educational level are causal risk factors of hypertension. This improved understanding of the pathophysiology of hypertension can be used to identify additional targets for the prevention of hypertension and its association diseases.
    corecore