116 research outputs found

    Unconditionally Secure Key Distribution Based on Two Nonorthogonal States

    Full text link
    We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.Comment: 5 pages, 1 figur

    Medical information management

    Get PDF
    With progress in information and communication technology, medical information has been converted to digital formats and stored and managed using computer systems. The construction, management, and operation of medical information systems and regional medical liaison systems are the main components of the clinical tasks of medical informatics departments. Research using medical information accumulated in these systems is also a task for medical informatics department. Recently, medical real-world data (RWD) accumulated in medical information systems has become a focus not only for primary use but also for secondary uses of medical information. However, there are many problems, such as standardization, collection, cleaning, and analysis of them. The internet of things and artificial intelligence are also being applied in the collection and analysis of RWD and in resolving the above problems. Using these new technologies, progress in medical care and clinical research is about to enter a new era

    Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse

    Full text link
    We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.Comment: More detailed presentation and a bit modified security proo

    Quantitative Estimate of CO2 Emission Reduction from Reuse of Automobile Parts in Japan

    Get PDF
    In general, reusing automobile parts reduces not only the cost of replacing the failed parts but also the environmental load of manufacturing new parts. However, these effects have not yet been quantified. The present study focuses on determining the emitted CO2 during production and quantitatively evaluating its reduction by the reuse of automobile parts. First, CO2 emissions are calculated during the reused parts production process at the factory site. Thirty-nine automobiles from 27 models prepared in Japan are examined to measure the amount of CO2 emitted in the production of new parts. Furthermore, the CO2 emission reduction effect for different automobile models is estimated through multiple regression analysis. The CO2 emissions are assumed to be the objective variable, whereas the explanatory variables are derived from the data provided in the automobile inspection certificates. The presented quantitative estimate of CO2 emission reduction owing to the exploitation of reused parts is expected to promote policies for further reducing CO2 emissions and arouse public awareness regarding the benefits of recycling automobile parts
    • …
    corecore