10,454 research outputs found

    Nickel electrode plate thickening study

    Get PDF
    The rate of thickening of the nickel electrode with cycling, under geochronous conditions, was investigated. The experimental procedures used to study the effects of various operational parameters on the rate of the thickness growth are outlined. The parameters included temperature, electrolyte composition, manufacturing lot, cycle parameters, and reconditioning methods

    On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission

    Get PDF
    We consider the scenario where Alice wants to send a secret (classical) nn-bit message to Bob using a classical key, and where only one-way transmission from Alice to Bob is possible. In this case, quantum communication cannot help to obtain perfect secrecy with key length smaller then nn. We study the question of whether there might still be fundamental differences between the case where quantum as opposed to classical communication is used. In this direction, we show that there exist ciphers with perfect security producing quantum ciphertext where, even if an adversary knows the plaintext and applies an optimal measurement on the ciphertext, his Shannon uncertainty about the key used is almost maximal. This is in contrast to the classical case where the adversary always learns nn bits of information on the key in a known plaintext attack. We also show that there is a limit to how different the classical and quantum cases can be: the most probable key, given matching plain- and ciphertexts, has the same probability in both the quantum and the classical cases. We suggest an application of our results in the case where only a short secret key is available and the message is much longer.Comment: 19 pages, 2 figures. This is a revised version of an earlier version that appeared in the proc. of Eucrocrypt'04:LNCS3027, 200

    Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    Full text link
    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.Comment: 5 pages. To appear in Physical Review

    Optical determination and identification of organic shells around nanoparticles: application to silver nanoparticles

    Full text link
    We present a simple method to prove the presence of an organic shell around silver nanoparticles. This method is based on the comparison between optical extinction measurements of isolated nanoparticles and Mie calculations predicting the expected wavelength of the Localized Surface Plasmon Resonance of the nanoparticles with and without the presence of an organic layer. This method was applied to silver nanoparticles which seemed to be well protected from oxidation. Further experimental characterization via Surface Enhanced Raman Spectroscopy (SERS) measurements allowed to identify this protective shell as ethylene glycol. Combining LSPR and SERS measurements could thus give proof of both presence and identification for other plasmonic nanoparticles surrounded by organic shells

    Linking Classical and Quantum Key Agreement: Is There "Bound Information"?

    Get PDF
    After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information. In principle, both classical and quantum protocols can be used for this processing. It is a natural question which type of protocols is more powerful. We prove for general states but under the assumption of incoherent eavesdropping that Alice and Bob share some so-called intrinsic information in their classical random variables, resulting from optimal measurements, if and only if the parties' quantum systems are entangled. In addition, we provide evidence that the potentials of classical and of quantum protocols are equal in every situation. Consequently, many techniques and results from quantum information theory directly apply to problems in classical information theory, and vice versa. For instance, it was previously believed that two parties can carry out unconditionally secure key agreement as long as they share some intrinsic information in the adversary's view. The analysis of this purely classical problem from the quantum information-theoretic viewpoint shows that this is true in the binary case, but false in general. More explicitly, bound entanglement, i.e., entanglement that cannot be purified by any quantum protocol, has a classical counterpart. This "bound intrinsic information" cannot be distilled to a secret key by any classical protocol. As another application we propose a measure for entanglement based on classical information-theoretic quantities.Comment: Accepted for Crypto 2000. 17 page

    NASA follow-on to the Bangladesh Agro-Climatic Environmental Monitoring Project

    Get PDF
    The NASA responsibility and activities for the follow-on to the original Agro-Climatic Environmental Monitoring Project (ACEMP) which was completed during 1987 is described. Five training sessions which comprise the NASA ACEMP follow-on are: Agrometeorology, Meteorology of Severe Storms Using GEMPAK, Satellite Oceanography, Hydrology, and Meteorology with TOVS. The objective of the follow-on is to train Bangladesh Government staff in the use of satellite data for remote sensing applications. This activity also encourages the scientific connection between NASA/Goddard Space Flight Center and The Bangladesh Space and Remote Sensing Organization (SPARRSO)

    A Comparative Study of Public Beliefs about Five Energy Systems

    Get PDF
    Public perceptions (n=244) of five alternative energy sources (nuclear, coal, oil, hydro, and solar) were examined using an attitude model based upon the underlying beliefs held about the attitude object (e.g., each energy system); the focus was on the differing perceptions of sub-groups (n=50) most PRO and CON the use of nuclear energy. Both PRO and CON groups preferred hydro and solar energy to the other energy sources; but the PRO Nuclear Group preferred nuclear energy to the fossil fuels while, for the CON Nuclear Group, nuclear energy was the least preferred system. Of the theoretically possible significant contributors to near-term Austrian electricity supply which were considered in this study (i.e., nuclear, coal, oil), the PRO Nuclear Group saw oil as the alternative to nuclear energy while the CON Nuclear Group preferred coal to oil as the non-nuclear alternative. Factor analysis found that five, relatively independent belief dimensions characterize public thinking about energy systems: beliefs about future-oriented and political risks; economic benefits; environmental risks; psychological/physical risks; and future technology development. Analysis of the belief systems suggested that both PRO and CON Nuclear Groups preferred hydro and solar energy because these systems were perceived as being the least threatening on all risk-related dimensions. The PRO group saw nuclear energy as the system most likely to lead to economic benefits and future technological developments; their low ratings of fossil fuels were primarily due to beliefs that the fossil fuels could provide only marginal economic benefits while leading to appreciable environmental risks. In contrast, the CON group viewed nuclear energy as only marginally more likely to provide economic and technological benefits than the fossil fuels, but as an appreciably greater threat on the risk-related dimensions
    • …
    corecore