415 research outputs found

    A simulation model for football championships

    Get PDF
    In this paper we discuss a simulation/probability model that identifies the team that is most likely to win a tournament. The model can also be used to answer other questions like ‘which team had a lucky draw?’ or ‘what is the probability that two teams meet at some moment in the tournament?’. Input to the simulation/probability model are scoring intensities, that are estimated as a weighted average of goals scored. The model has been used in practice to write articles for the popular press, and seems to perform well.

    Farmers’ reaction upon receiving economic information in controlling somatic cell count

    Get PDF
    Adoption and implementation of efficient somatic cell count (SCC) control practices is an action of behavioral change, which is notoriously difficult to achieve and sustain, even when substantial production and economic gains are to be expected. In the current study, it was tested whether farmers are aware of these potential gains and whether providing farmers additional information on projected economic losses on a regular basis may motivate them to implement enhanced control practices. In-depth interviews revealed that the majority of the dairy farmers perceived cow-specific and herd-specific projected losses, due to elevated SCC levels, as not very relevant to them. Farmers posed that SCC was already monitored regularly at cow-level and provided them adequate information to support decision making. Actions were rationalized in a specific context comprising the intertwined notions of intentions and efficacy believes. Understanding of these notions is essential when advising farmers, being either veterinarians or others providing agricultural extension, to support farmers implementing enhanced management decisions

    Spherical Code Key Distribution Protocols for Qubits

    Full text link
    Recently spherical codes were introduced as potentially more capable ensembles for quantum key distribution. Here we develop specific key creation protocols for the two qubit-based spherical codes, the trine and tetrahedron, and analyze them in the context of a suitably-tailored intercept/resend attack, both in standard form, and a ``gentler'' version whose back-action on the quantum state is weaker. When compared to the standard unbiased basis protocols, BB84 and six-state, two distinct advantages are found. First, they offer improved tolerance of eavesdropping, the trine besting its counterpart BB84 and the tetrahedron the six-state protocol. Second, the key error rate may be computed from the sift rate of the protocol itself, removing the need to sacrifice key bits for this purpose. This simplifies the protocol and improves the overall key rate.Comment: 4 pages revtex, 2 figures; clarified security analysis. Final version for publicatio

    Прогнозирование геологической среды земной коры по материалам ГСЗ и петрофизического термобарического исследования минерального вещества

    Get PDF
    Some features of methodical means of petrovelocity thermobaric modeling have been considered. An example of the construction of a deep petrovelocity model of a crust part of the Ukrainian Shield is given and analysed

    Історія Гамаліївського Харлампієва монастиря

    Get PDF
    Стаття присвячена історії Гамаліївського Харлампієвого монастиря та ансамблю його пам’яток.Статья посвящена истории Гамалеевского Харлампиева монастыря и ансамблю его памятников.I his article deals with a short history of Gamaliivskyi Kharlampievyi monastery and a band of its sights since its foundation up to hour

    Noisy Preprocessing and the Distillation of Private States

    Get PDF
    We provide a simple security proof for prepare & measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally-entangled states, a more general {\em private state} is distilled. Besides a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane (CSS)-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.Comment: 4 pages, to appear in Physical Review Letters. Extensively rewritten, with a more detailed discussion of coherent --> iid reductio
    corecore