379 research outputs found

    Acute and chronic respiratory effects of sodium borate particulate exposures.

    Get PDF
    This study examined work-related chronic abnormality in pulmonary function and work-related acute irritant symptoms associated with exposure to borate dust in mining and processing operations. Chronic effects were examined by pulmonary function at the beginning and end of a 7-year interval. Time-specific estimates of sodium borate particulate exposures were used to estimate cumulative exposure during the study interval. Change in pulmonary function over the 7 years was found unrelated to the estimate of cumulative exposure during that interval. Exposure-response associations also were examined with respect to short-term peak exposures and incidence of five symptoms of acute respiratory irritation. Hourly measures of health outcome and continuous measures of particulate exposure were made on each subject throughout the day. Whenever a subject reported one of the irritant symptoms, a symptom intensity score was also recorded along with the approximate time of onset. The findings indicated that exposure-response relationships were present for each of the specific symptoms at several symptom intensity levels. The associations were present when exposure was estimated by both day-long and short-term (15-min) time-weighted average exposures. Associations persisted after taking account of smoking, age, and the presence of a common cold. No significant difference in response rate was found between workers exposed to different types of sodium borate dusts

    QKD in Standard Optical Telecommunications Networks

    Get PDF
    To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be highly desirable. Trying to use single photon signals with others that carry an average power many orders of magnitude bigger while sharing as much infrastructure with a conventional network as possible brings obvious problems. The purpose of the present paper is to report our efforts in researching the limits of the integration of QKD in modern optical networks scenarios. We have built a full metropolitan area network testbed comprising a backbone and an access network. The emphasis is put in using as much as possible the same industrial grade technology that is actually used in already installed networks, in order to understand the throughput, limits and cost of deploying QKD in a real network

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    Quantum encryption with certified deletion

    Get PDF
    Given a ciphertext, is it possible to prove the deletion of the underlying plaintext? Since classical ciphertexts can be copied, clearly such a feat is impossible using classical information alone. In stark contrast to this, we show that quantum encodings enable certified deletion. More precisely, we show that it is possible to encrypt classical data into a quantum ciphertext such that the recipient of the ciphertext can produce a classical string which proves to the originator that the recipient has relinquished any chance of recovering the plaintext should the decryption key be revealed. Our scheme is feasible with current quantum technology: the honest parties only require quantum devices for single-qubit preparation and measurements; the scheme is also robust against noise in these devices. Furthermore, we provide an analysis that is suitable in the finite-key regime.Comment: 28 pages, 1 figure. Some technical details modifie
    corecore