379 research outputs found
Acute and chronic respiratory effects of sodium borate particulate exposures.
This study examined work-related chronic abnormality in pulmonary function and work-related acute irritant symptoms associated with exposure to borate dust in mining and processing operations. Chronic effects were examined by pulmonary function at the beginning and end of a 7-year interval. Time-specific estimates of sodium borate particulate exposures were used to estimate cumulative exposure during the study interval. Change in pulmonary function over the 7 years was found unrelated to the estimate of cumulative exposure during that interval. Exposure-response associations also were examined with respect to short-term peak exposures and incidence of five symptoms of acute respiratory irritation. Hourly measures of health outcome and continuous measures of particulate exposure were made on each subject throughout the day. Whenever a subject reported one of the irritant symptoms, a symptom intensity score was also recorded along with the approximate time of onset. The findings indicated that exposure-response relationships were present for each of the specific symptoms at several symptom intensity levels. The associations were present when exposure was estimated by both day-long and short-term (15-min) time-weighted average exposures. Associations persisted after taking account of smoking, age, and the presence of a common cold. No significant difference in response rate was found between workers exposed to different types of sodium borate dusts
QKD in Standard Optical Telecommunications Networks
To perform Quantum Key Distribution, the mastering of the extremely weak
signals carried by the quantum channel is required. Transporting these signals
without disturbance is customarily done by isolating the quantum channel from
any noise sources using a dedicated physical channel. However, to really profit
from this technology, a full integration with conventional network technologies
would be highly desirable. Trying to use single photon signals with others that
carry an average power many orders of magnitude bigger while sharing as much
infrastructure with a conventional network as possible brings obvious problems.
The purpose of the present paper is to report our efforts in researching the
limits of the integration of QKD in modern optical networks scenarios. We have
built a full metropolitan area network testbed comprising a backbone and an
access network. The emphasis is put in using as much as possible the same
industrial grade technology that is actually used in already installed
networks, in order to understand the throughput, limits and cost of deploying
QKD in a real network
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Daylight quantum key distribution over 1.6 km
Quantum key distribution (QKD) has been demonstrated over a point-to-point
-km atmospheric optical path in full daylight. This record
transmission distance brings QKD a step closer to surface-to-satellite and
other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for
publication consideratio
Quantum encryption with certified deletion
Given a ciphertext, is it possible to prove the deletion of the underlying
plaintext? Since classical ciphertexts can be copied, clearly such a feat is
impossible using classical information alone. In stark contrast to this, we
show that quantum encodings enable certified deletion. More precisely, we show
that it is possible to encrypt classical data into a quantum ciphertext such
that the recipient of the ciphertext can produce a classical string which
proves to the originator that the recipient has relinquished any chance of
recovering the plaintext should the decryption key be revealed. Our scheme is
feasible with current quantum technology: the honest parties only require
quantum devices for single-qubit preparation and measurements; the scheme is
also robust against noise in these devices. Furthermore, we provide an analysis
that is suitable in the finite-key regime.Comment: 28 pages, 1 figure. Some technical details modifie
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
- …