5,174 research outputs found

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit

    Spider diversity (Arachnida: Araneae) in Atlantic Forest areas at Pedra Branca State Park, Rio de Janeiro, Brazil

    Get PDF
    BACKGROUND: There has never been any published work about the diversity of spiders in the city of Rio de Janeiro using analytical tools to measure diversity. The only available records for spider communities in nearby areas indicate 308 species in the National Park of Tijuca and 159 species in Marapendi Municipal Park. These numbers are based on a rapid survey and on an one-year survey respectively. NEW INFORMATION: This study provides a more thorough understanding of how the spider species are distributed at Pedra Branca State Park. We report a total of 14,626 spider specimens recorded from this park, representing 49 families and 373 species or morphospecies, including at least 73 undescribed species. Also, the distribution range of 45 species was expanded, and species accumulation curves estimate that there is a minimum of 388 (Bootstrap) and a maximum of 468 species (Jackknife2) for the sampled areas. These estimates indicates that the spider diversity may be higher than observed.Fil: Castanheira, Pedro. Universidade Federal do Rio de Janeiro; BrasilFil: Pérez González, Abel. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Parque Centenario. Museo Argentino de Ciencias Naturales "Bernardino Rivadavia"; ArgentinaFil: Baptista, Renner L. C.. Universidade Federal do Rio de Janeiro; Brasi

    Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing

    Full text link
    We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols like Bennett-Brassard 1984 and six-states. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N\sim 10^5 signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates

    Analyzing Horizontal Distances Between WSR-88D Thunderstorm Centroids and Cloud-to-Ground Lightning Strikes

    Get PDF
    On April 29, 1996, lightning struck the airfield at Hurlburt Field, FL, killing one Airmen and injuring ten others. This cloud to ground lightning strike hit eight minutes after a lightning advisory was canceled. At the time of the strike, thunderstorms were observed 7 to 10 miles north and south of the airfield. The incident raised questions about Air Force Weather Agency\u27s lightning criteria. Soon after the incident, a Lightning Safety Review Panel was assembled to determine the adequacy of lightning advisories. One of the questions posed to the panel was could an incident like Hurlburt happen again? The review panel could not answer that question due to the lack of documented research on how far lightning can travel horizontally before striking the ground. This thesis used the WSR-88D Algorithm Testing and Display System (WATADS) and the default parameters of the WATADS\u27s Storm Cell Identification and Tracking (SCIT) Algorithm to identify thunderstorm centroids. Lightning strike data containing nearly 50,000 cloud to ground strikes was obtained through the National Climatic Data Center (NCDC). Horizontal distances were then computed between these storm centroids and cloud to ground lightning strikes. This research discovered that average distances between thunderstorm centroids and lightning strikes vary with season and location. In addition, nearly 75% of all lightning strikes occurred within 10 nautical miles of thunderstorm centroids

    Parole Revocation--Right to Hearing

    Get PDF

    Generalized Entropies

    Full text link
    We study an entropy measure for quantum systems that generalizes the von Neumann entropy as well as its classical counterpart, the Gibbs or Shannon entropy. The entropy measure is based on hypothesis testing and has an elegant formulation as a semidefinite program, a type of convex optimization. After establishing a few basic properties, we prove upper and lower bounds in terms of the smooth entropies, a family of entropy measures that is used to characterize a wide range of operational quantities. From the formulation as a semidefinite program, we also prove a result on decomposition of hypothesis tests, which leads to a chain rule for the entropy.Comment: 21 page

    Parole Revocation--Right to Hearing

    Get PDF

    Civil Rights--The Test of Democratic Fiber

    Get PDF

    Representations of reductive normal algebraic monoids

    Full text link
    The rational representation theory of a reductive normal algebraic monoid (with one-dimensional center) forms a highest weight category, in the sense of Cline, Parshall, and Scott. This is a fundamental fact about the representation theory of reductive normal algebraic monoids. We survey how this result was obtained, and treat some natural examples coming from classical groups.Comment: 10 pages. To appear in a volume of the Fields Communications Series: "Algebraic Monoids, Group Embeddings, and Algebraic Combinatorics," edited by Mahir Can, Zhenheng Li, Benjamin Steinberg, and Qiang Wan
    corecore