4,377 research outputs found

    Tomographic Quantum Cryptography Protocols are Reference Frame Independent

    Full text link
    We consider the class of reference frame independent protocols in d dimensions for quantum key distribution, in which Alice and Bob have one natural basis that is aligned and the rest of their frames are unaligned. We relate existing approaches to tomographically complete protocols. We comment on two different approaches to finite key bounds in this setting, one direct and one using the entropic uncertainty relation and suggest that the existing finite key bounds can still be improved.Comment: Published version. 8 pages, 1 figur

    Design ideation through improvised comedy processes

    Get PDF
    We argue that the processes of creating successful comedy are comparable to the processes of designing an innovative product. Our research explores how constructs of humour may be applied to the early phase of engineering design, when divergent thinking is assumed to be most valuable. During a series of exploratory workshops, the principles and processes of creating improvised comedy presented an opportunity to reinvigorate the design process, and overcome some of the common barriers to effective group brainstorming. This paper discusses the link between improvised comedy and design creativity, and the early development of a new improvisation-based approach to design ideation

    Finite-key security against coherent attacks in quantum key distribution

    Full text link
    The work by Christandl, K\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell out this bound from their general formalism. Then we apply it to the study of a recently proposed protocol [Laing et al., Phys. Rev. A 82, 012304 (2010)]. This protocol is meaningful when the alignment of Alice's and Bob's reference frames is not monitored and may vary with time. In this scenario, the notion of asymptotic key rate has hardly any operational meaning, because if one waits too long time, the average correlations are smeared out and no security can be inferred. Therefore, finite-key analysis is necessary to find the maximal achievable secret key rate and the corresponding optimal number of signals.Comment: 9 pages, 4 figure

    In Vitro Hydrodynamic Assessment of a New Transcatheter Heart Valve Concept (the TRISKELE)

    Get PDF
    This study presents the in vitro hydrodynamic assessment of the TRISKELE, a new system suitable for transcatheter aortic valve implantation (TAVI), aiming to mitigate the procedural challenges experienced with current technologies. The TRISKELE valve comprises three polymeric leaflet and an adaptive sealing cuff, supported by a novel fully retrievable self-expanding nitinol wire frame. Valve prototypes were manufactured in three sizes of 23, 26, and 29 mm by automated dip-coating of a biostable polymer, and tested in a hydrodynamic bench setup in mock aortic roots of 21, 23, 25, and 27 mm annulus, and compared to two reference valves suitable for equivalent implantation ranges: Edwards SAPIEN XT and Medtronic CoreValve. The TRISKELE valves demonstrated a global hydrodynamic performance comparable or superior to the controls with significant reduction in paravalvular leakage. The TRISKELE valve exhibits enhanced anchoring and improved sealing. The valve is currently under preclinical investigation
    corecore