10,454 research outputs found
Nickel electrode plate thickening study
The rate of thickening of the nickel electrode with cycling, under geochronous conditions, was investigated. The experimental procedures used to study the effects of various operational parameters on the rate of the thickness growth are outlined. The parameters included temperature, electrolyte composition, manufacturing lot, cycle parameters, and reconditioning methods
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission
We consider the scenario where Alice wants to send a secret (classical)
-bit message to Bob using a classical key, and where only one-way
transmission from Alice to Bob is possible. In this case, quantum communication
cannot help to obtain perfect secrecy with key length smaller then . We
study the question of whether there might still be fundamental differences
between the case where quantum as opposed to classical communication is used.
In this direction, we show that there exist ciphers with perfect security
producing quantum ciphertext where, even if an adversary knows the plaintext
and applies an optimal measurement on the ciphertext, his Shannon uncertainty
about the key used is almost maximal. This is in contrast to the classical case
where the adversary always learns bits of information on the key in a known
plaintext attack. We also show that there is a limit to how different the
classical and quantum cases can be: the most probable key, given matching
plain- and ciphertexts, has the same probability in both the quantum and the
classical cases. We suggest an application of our results in the case where
only a short secret key is available and the message is much longer.Comment: 19 pages, 2 figures. This is a revised version of an earlier version
that appeared in the proc. of Eucrocrypt'04:LNCS3027, 200
Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications
The quantum key distribution protocol without public announcement of bases is
equipped with a two-way classical communication symmetric entanglement
purification protocol. This modified key distribution protocol is
unconditionally secure and has a higher tolerable error rate of 20%, which is
higher than previous scheme without public announcement of bases.Comment: 5 pages. To appear in Physical Review
Optical determination and identification of organic shells around nanoparticles: application to silver nanoparticles
We present a simple method to prove the presence of an organic shell around
silver nanoparticles. This method is based on the comparison between optical
extinction measurements of isolated nanoparticles and Mie calculations
predicting the expected wavelength of the Localized Surface Plasmon Resonance
of the nanoparticles with and without the presence of an organic layer. This
method was applied to silver nanoparticles which seemed to be well protected
from oxidation. Further experimental characterization via Surface Enhanced
Raman Spectroscopy (SERS) measurements allowed to identify this protective
shell as ethylene glycol. Combining LSPR and SERS measurements could thus give
proof of both presence and identification for other plasmonic nanoparticles
surrounded by organic shells
Linking Classical and Quantum Key Agreement: Is There "Bound Information"?
After carrying out a protocol for quantum key agreement over a noisy quantum
channel, the parties Alice and Bob must process the raw key in order to end up
with identical keys about which the adversary has virtually no information. In
principle, both classical and quantum protocols can be used for this
processing. It is a natural question which type of protocols is more powerful.
We prove for general states but under the assumption of incoherent
eavesdropping that Alice and Bob share some so-called intrinsic information in
their classical random variables, resulting from optimal measurements, if and
only if the parties' quantum systems are entangled. In addition, we provide
evidence that the potentials of classical and of quantum protocols are equal in
every situation. Consequently, many techniques and results from quantum
information theory directly apply to problems in classical information theory,
and vice versa. For instance, it was previously believed that two parties can
carry out unconditionally secure key agreement as long as they share some
intrinsic information in the adversary's view. The analysis of this purely
classical problem from the quantum information-theoretic viewpoint shows that
this is true in the binary case, but false in general. More explicitly, bound
entanglement, i.e., entanglement that cannot be purified by any quantum
protocol, has a classical counterpart. This "bound intrinsic information"
cannot be distilled to a secret key by any classical protocol. As another
application we propose a measure for entanglement based on classical
information-theoretic quantities.Comment: Accepted for Crypto 2000. 17 page
NASA follow-on to the Bangladesh Agro-Climatic Environmental Monitoring Project
The NASA responsibility and activities for the follow-on to the original Agro-Climatic Environmental Monitoring Project (ACEMP) which was completed during 1987 is described. Five training sessions which comprise the NASA ACEMP follow-on are: Agrometeorology, Meteorology of Severe Storms Using GEMPAK, Satellite Oceanography, Hydrology, and Meteorology with TOVS. The objective of the follow-on is to train Bangladesh Government staff in the use of satellite data for remote sensing applications. This activity also encourages the scientific connection between NASA/Goddard Space Flight Center and The Bangladesh Space and Remote Sensing Organization (SPARRSO)
A Comparative Study of Public Beliefs about Five Energy Systems
Public perceptions (n=244) of five alternative energy sources (nuclear, coal, oil, hydro, and solar) were examined using an attitude model based upon the underlying beliefs held about the attitude object (e.g., each energy system); the focus was on the differing perceptions of sub-groups (n=50) most PRO and CON the use of nuclear energy.
Both PRO and CON groups preferred hydro and solar energy to the other energy sources; but the PRO Nuclear Group preferred nuclear energy to the fossil fuels while, for the CON Nuclear Group, nuclear energy was the least preferred system. Of the theoretically possible significant contributors to near-term Austrian electricity supply which were considered in this study (i.e., nuclear, coal, oil), the PRO Nuclear Group saw oil as the alternative to nuclear energy while the CON Nuclear Group preferred coal to oil as the non-nuclear alternative.
Factor analysis found that five, relatively independent belief dimensions characterize public thinking about energy systems: beliefs about future-oriented and political risks; economic benefits; environmental risks; psychological/physical risks; and future technology development. Analysis of the belief systems suggested that both PRO and CON Nuclear Groups preferred hydro and solar energy because these systems were perceived as being the least threatening on all risk-related dimensions. The PRO group saw nuclear energy as the system most likely to lead to economic benefits and future technological developments; their low ratings of fossil fuels were primarily due to beliefs that the fossil fuels could provide only marginal economic benefits while leading to appreciable environmental risks. In contrast, the CON group viewed nuclear energy as only marginally more likely to provide economic and technological benefits than the fossil fuels, but as an appreciably greater threat on the risk-related dimensions
- …