155 research outputs found
Vestibular effects of diving
Over the last 45 years, recreational self-contained underwater breathing apparatus (SCUBA) diving as a leisure activity has increased in popularity. According to the Professional Association of Diving Instructors (PADI), more than 23 million diver certificates have been issued across the globe. Given the popularity of scuba diving, it is incumbent on every physician to know and understand the specific medical hazards and conditions associated with scuba diving. Although diving has become more accessible and the equipment is much safer now, diving still has its inherent dangers. Each year incidents occur, ranging from seasickness and sinus problems to heart conditions and mortality. More than 80% of all diving complications occur in the head and neck region. A number of studies have found that diving can lead to the development of vestibular disorders such as: Barotrauma, Decompression sickness, Otitis externa, Bilateral exostoses, Chronic sinusitis (barosinusitis), Serous tubotympanic catarrh, Tinnitus, Dizziness, Vertigo.The aim of this paper was to share our experience in the field of treating patients with different types of ENT disorders after or before a diving session. We briefly summarized the most important information for some of the disorders.We included in our study for a period of 12 years: a total of 24 patients (four females and 20 males), who dive. They were between 25 and 55 years of age. Some presented in clinics with an ENT disorder. 19 were professional, qualified divers, five (three males and two females) dove for the first time. On all 24 patients we performed: audiometry tests, Tympanometry tests, OAE, Static and dynamic vestibular tests, vHIT – in the last five years, otoscopy examination, dental check-ups.All divers – no matter professionalists or not – should follow these recommendations: a thorough prophylactic ENT check-up should be performed before an active diving session. Chronic ENT inflammations should be addressed in a timely manner. Divers should follow all instructions from the certified Diving Associations
Outline of the SECOQC Quantum-Key-Distribution Network in Vienna
A Quantum Key Distribution (QKD) network is currently implemented in Vienna
by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS
Austria. We give an architectural overview of the network and present the
enabling QKD-technologies, as well as the novel QKD network protocols.Comment: 10 pages, 5 figure
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum
mechanical systems. We argue that QKD will be an important part of future
cryptographic infrastructures. It can provide long-term confidentiality for
encrypted information without reliance on computational assumptions. Although
QKD still requires authentication to prevent man-in-the-middle attacks, it can
make use of either information-theoretically secure symmetric key
authentication or computationally secure public key authentication: even when
using public key authentication, we argue that QKD still offers stronger
security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security; version 2 minor
content revision
Artificial intelligence – the new suggestion for biomedicine, dentistry and healthcare
The development of technologies based on Artificial Intelligence (AI) and their application in medicine is growing rapidly. Innovations in digital technology, telemedicine, 5G technology and artificial intelligence (AI) create new opportunities for the development of the healthcare system. The aim of the present study is to explore the possibilities for the application of artificial intelligence in biomedicine, dentistry, healthcare and healthcare. In recent years there have been many major innovations, including the introduction of many new information and communication technologies. Digital innovations, including the further inclusion of telemedicine, the development of 5th generation wireless networks (5G) and artificial intelligence (AI) approaches, create an exceptional ecosystem for new health opportunities. The digital health sector creates a favorable environment for the provision of health services at a very high level
High rate, long-distance quantum key distribution over 250km of ultra low loss fibres
We present a fully automated quantum key distribution prototype running at
625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise
superconducting detectors, we can distribute 6,000 secret bits per second over
100 km and 15 bits per second over 250km
Feasibility of free space quantum key distribution with coherent polarization states
We demonstrate for the first time the feasibility of free space quantum key
distribution with continuous variables under real atmospheric conditions. More
specifically, we transmit coherent polarization states over a 100m free space
channel on the roof of our institute's building. In our scheme, signal and
local oscillator are combined in a single spatial mode which auto-compensates
atmospheric fluctuations and results in an excellent interference. Furthermore,
the local oscillator acts as spatial and spectral filter thus allowing
unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This
is an author-created, un-copyedited version of an article accepted for
publication in New Journal of Physics (Special Issue on Quantum Cryptography:
Theory and Practice). IOP Publishing Ltd is not responsible for any errors or
omissions in this version of the manuscript or any version derived from i
Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors
The security of quantum key distribution (QKD) can easily be obscured if the
eavesdropper can utilize technical imperfections of the actual implementation.
Here we describe and experimentally demonstrate a very simple but highly
effective attack which even does not need to intercept the quantum channel at
all. Only by exploiting the dead time effect of single photon detectors the
eavesdropper is able to gain (asymptotically) full information about the
generated keys without being detected by state-of-the-art QKD protocols. In our
experiment, the eavesdropper inferred up to 98.8% of the key correctly, without
increasing the bit error rate between Alice and Bob significantly. Yet, we find
an evenly simple and effective countermeasure to inhibit this and similar
attacks
Triplet-like correlation symmetry of continuous variable entangled states
We report on a continuous variable analogue of the triplet two-qubit Bell
states. We theoretically and experimentally demonstrate a remarkable similarity
of two-mode continuous variable entangled states with triplet Bell states with
respect to their correlation patterns. Borrowing from the two qubit language,
we call these correlations triplet-like.Comment: 7 pages, 5 figures. Comments are welcom
Quantum-Aware Software Defined Networks
Software Defined Networks (SDN) represent a major paradigm change in communications networks. It provides a level of abstraction and independence from the traditional networking practice that allows for a fast path of innovation and, specifically, opens new opportunities for Quantum Key Distribution (QKD) networks. In this contribution we explore the implications of this paradigm for the deployment of QKD in practice from the point of view of telecommunications? providers, network equipment manufacturers and applied research and development. We propose a generic quantum-aware SDN architecture and two applications, a generic end to end encryption one and other for the network infrastructure itself
Composability in quantum cryptography
In this article, we review several aspects of composability in the context of
quantum cryptography. The first part is devoted to key distribution. We discuss
the security criteria that a quantum key distribution protocol must fulfill to
allow its safe use within a larger security application (e.g., for secure
message transmission). To illustrate the practical use of composability, we
show how to generate a continuous key stream by sequentially composing rounds
of a quantum key distribution protocol. In a second part, we take a more
general point of view, which is necessary for the study of cryptographic
situations involving, for example, mutually distrustful parties. We explain the
universal composability framework and state the composition theorem which
guarantees that secure protocols can securely be composed to larger
applicationsComment: 18 pages, 2 figure
- …