Sample records for private classical communication

  1. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  2. Integration of quantum key distribution and private classical communication through continuous variable

    NASA Astrophysics Data System (ADS)

    Wang, Tianyi; Gong, Feng; Lu, Anjiang; Zhang, Damin; Zhang, Zhengping

    2017-12-01

    In this paper, we propose a scheme that integrates quantum key distribution and private classical communication via continuous variables. The integrated scheme employs both quadratures of a weak coherent state, with encrypted bits encoded on the signs and Gaussian random numbers encoded on the values of the quadratures. The integration enables quantum and classical data to share the same physical and logical channel. Simulation results based on practical system parameters demonstrate that both classical communication and quantum communication can be implemented over distance of tens of kilometers, thus providing a potential solution for simultaneous transmission of quantum communication and classical communication.

  3. Position-based coding and convex splitting for private communication over quantum channels

    NASA Astrophysics Data System (ADS)

    Wilde, Mark M.

    2017-10-01

    The classical-input quantum-output (cq) wiretap channel is a communication model involving a classical sender X, a legitimate quantum receiver B, and a quantum eavesdropper E. The goal of a private communication protocol that uses such a channel is for the sender X to transmit a message in such a way that the legitimate receiver B can decode it reliably, while the eavesdropper E learns essentially nothing about which message was transmitted. The ɛ -one-shot private capacity of a cq wiretap channel is equal to the maximum number of bits that can be transmitted over the channel, such that the privacy error is no larger than ɛ \\in (0,1). The present paper provides a lower bound on the ɛ -one-shot private classical capacity, by exploiting the recently developed techniques of Anshu, Devabathini, Jain, and Warsi, called position-based coding and convex splitting. The lower bound is equal to a difference of the hypothesis testing mutual information between X and B and the "alternate" smooth max-information between X and E. The one-shot lower bound then leads to a non-trivial lower bound on the second-order coding rate for private classical communication over a memoryless cq wiretap channel.

  4. Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-06-01

    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.

  5. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  6. Secure quantum private information retrieval using phase-encoded queries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olejnik, Lukasz

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less

  7. Topics in quantum cryptography, quantum error correction, and channel simulation

    NASA Astrophysics Data System (ADS)

    Luo, Zhicheng

    In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.

  8. Maximal privacy without coherence.

    PubMed

    Leung, Debbie; Li, Ke; Smith, Graeme; Smolin, John A

    2014-07-18

    Privacy is a fundamental feature of quantum mechanics. A coherently transmitted quantum state is inherently private. Remarkably, coherent quantum communication is not a prerequisite for privacy: there are quantum channels that are too noisy to transmit any quantum information reliably that can nevertheless send private classical information. Here, we ask how much private classical information a channel can transmit if it has little quantum capacity. We present a class of channels N(d) with input dimension d(2), quantum capacity Q(N(d)) ≤ 1, and private capacity P(N(d)) = log d. These channels asymptotically saturate an interesting inequality P(N) ≤ (1/2)[log d(A) + Q(N)] for any channel N with input dimension d(A) and capture the essence of privacy stripped of the confounding influence of coherence.

  9. Quantum private query with perfect user privacy against a joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-12-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.

  10. An efficient quantum scheme for Private Set Intersection

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  11. Capacities of quantum amplifier channels

    NASA Astrophysics Data System (ADS)

    Qi, Haoyu; Wilde, Mark M.

    2017-01-01

    Quantum amplifier channels are at the core of several physical processes. Not only do they model the optical process of spontaneous parametric down-conversion, but the transformation corresponding to an amplifier channel also describes the physics of the dynamical Casimir effect in superconducting circuits, the Unruh effect, and Hawking radiation. Here we study the communication capabilities of quantum amplifier channels. Invoking a recently established minimum output-entropy theorem for single-mode phase-insensitive Gaussian channels, we determine capacities of quantum-limited amplifier channels in three different scenarios. First, we establish the capacities of quantum-limited amplifier channels for one of the most general communication tasks, characterized by the trade-off between classical communication, quantum communication, and entanglement generation or consumption. Second, we establish capacities of quantum-limited amplifier channels for the trade-off between public classical communication, private classical communication, and secret key generation. Third, we determine the capacity region for a broadcast channel induced by the quantum-limited amplifier channel, and we also show that a fully quantum strategy outperforms those achieved by classical coherent-detection strategies. In all three scenarios, we find that the capacities significantly outperform communication rates achieved with a naive time-sharing strategy.

  12. Quantum solution to a class of two-party private summation problems

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  13. Quantum Secure Conditional Direct Communication via EPR Pairs

    NASA Astrophysics Data System (ADS)

    Gao, Ting; Yan, Fengli; Wang, Zhixi

    Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.

  14. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  15. Information trade-offs for optical quantum communication.

    PubMed

    Wilde, Mark M; Hayden, Patrick; Guha, Saikat

    2012-04-06

    Recent work has precisely characterized the achievable trade-offs between three key information processing tasks-classical communication (generation or consumption), quantum communication (generation or consumption), and shared entanglement (distribution or consumption), measured in bits, qubits, and ebits per channel use, respectively. Slices and corner points of this three-dimensional region reduce to well-known protocols for quantum channels. A trade-off coding technique can attain any point in the region and can outperform time sharing between the best-known protocols for accomplishing each information processing task by itself. Previously, the benefits of trade-off coding that had been found were too small to be of practical value (viz., for the dephasing and the universal cloning machine channels). In this Letter, we demonstrate that the associated performance gains are in fact remarkably high for several physically relevant bosonic channels that model free-space or fiber-optic links, thermal-noise channels, and amplifiers. We show that significant performance gains from trade-off coding also apply when trading photon-number resources between transmitting public and private classical information simultaneously over secret-key-assisted bosonic channels. © 2012 American Physical Society

  16. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  17. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  18. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  19. Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-02-01

    In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.

  20. 47 CFR 90.483 - Permissible methods and requirements of interconnecting private and public systems of...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... interconnecting private and public systems of communications. 90.483 Section 90.483 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... private and public systems of communications. Interconnection may be accomplished by commercial mobile...

  1. 47 CFR 90.483 - Permissible methods and requirements of interconnecting private and public systems of...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... interconnecting private and public systems of communications. 90.483 Section 90.483 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... private and public systems of communications. Interconnection may be accomplished by commercial mobile...

  2. 47 CFR 90.483 - Permissible methods and requirements of interconnecting private and public systems of...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... interconnecting private and public systems of communications. 90.483 Section 90.483 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... private and public systems of communications. Interconnection may be accomplished by commercial mobile...

  3. 47 CFR 90.483 - Permissible methods and requirements of interconnecting private and public systems of...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... interconnecting private and public systems of communications. 90.483 Section 90.483 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... private and public systems of communications. Interconnection may be accomplished by commercial mobile...

  4. Simultaneous classical communication and quantum key distribution using continuous variables*

    NASA Astrophysics Data System (ADS)

    Qi, Bing

    2016-10-01

    Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10-9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.

  5. Simultaneous classical communication and quantum key distribution using continuous variables

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Bing

    Currently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters showmore » that both deterministic classical communication with a bit error rate of 10 –9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.« less

  6. Simultaneous classical communication and quantum key distribution using continuous variables

    DOE PAGES

    Qi, Bing

    2016-10-26

    Currently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters showmore » that both deterministic classical communication with a bit error rate of 10 –9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.« less

  7. 49 CFR 1103.14 - Private communications with the Board are prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Private communications with the Board are prohibited. 1103.14 Section 1103.14 Transportation Other Regulations Relating to Transportation (Continued... Ethics The Practitioner's Duties and Responsibilities Toward the Board § 1103.14 Private communications...

  8. Private Forests: Management and Policy in a Market Economy

    Treesearch

    Frederick W. Cubbage; Anthony G. Snider; Karen Lee Abt; Robert L. Moulton

    2003-01-01

    This chapter discusses privately owned forests and timber management in a market economy, including private property rights and tenure, landowner objectives and characteristics, markets, and government policies. Private forest land ownership and management-whether it be industrial or nonindustrial-is often assumed to represent the classic model of atomistic competition...

  9. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Communication directly with private... Communication directly with private organizations and individuals. (a) Questions from the public and requests... current date may be purchased from the National Archives. Details are available from: Audio-Visual Branch...

  10. Epistemic View of Quantum States and Communication Complexity of Quantum Channels

    NASA Astrophysics Data System (ADS)

    Montina, Alberto

    2012-09-01

    The communication complexity of a quantum channel is the minimal amount of classical communication required for classically simulating a process of state preparation, transmission through the channel and subsequent measurement. It establishes a limit on the power of quantum communication in terms of classical resources. We show that classical simulations employing a finite amount of communication can be derived from a special class of hidden variable theories where quantum states represent statistical knowledge about the classical state and not an element of reality. This special class has attracted strong interest very recently. The communication cost of each derived simulation is given by the mutual information between the quantum state and the classical state of the parent hidden variable theory. Finally, we find that the communication complexity for single qubits is smaller than 1.28 bits. The previous known upper bound was 1.85 bits.

  11. 47 CFR 80.373 - Private communications frequencies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... band for medical advisory communications. (1) Private coast stations may be authorized to use any... stations of radiotelephony frequencies in the 2000-27500 kHz band are subject to the following: (1) Private... stations serving lakes or rivers are not authorized on the 2000-2850 kHz band. (4) Private coast stations...

  12. 47 CFR 27.1308 - Organization and structure of the 700 MHz public/private partnership.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... public/private partnership. 27.1308 Section 27.1308 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1308 Organization and structure of the 700 MHz public/private partnership. (a) The Upper 700...

  13. 47 CFR 27.1308 - Organization and structure of the 700 MHz public/private partnership.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... public/private partnership. 27.1308 Section 27.1308 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1308 Organization and structure of the 700 MHz public/private partnership. (a) The Upper 700...

  14. 47 CFR 27.1308 - Organization and structure of the 700 MHz public/private partnership.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... public/private partnership. 27.1308 Section 27.1308 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1308 Organization and structure of the 700 MHz public/private partnership. (a) The Upper 700...

  15. Classical and quantum communication without a shared reference frame.

    PubMed

    Bartlett, Stephen D; Rudolph, Terry; Spekkens, Robert W

    2003-07-11

    We show that communication without a shared reference frame is possible using entangled states. Both classical and quantum information can be communicated with perfect fidelity without a shared reference frame at a rate that asymptotically approaches one classical bit or one encoded qubit per transmitted qubit. We present an optical scheme to communicate classical bits without a shared reference frame using entangled photon pairs and linear optical Bell state measurements.

  16. Just between us: Exclusive communications in online social networks.

    PubMed

    Carpenter, Jordan; Green, Melanie; Laflam, Jeff

    2018-01-01

    Social media websites such as Facebook are used for relationship development and maintenance often through self-disclosure and sharing of personal information. However, not all forms of social media communication may be equally suitable for this task. This paper explores users' norms about the appropriateness of using private vs. public Facebook messages to communicate different kinds of personal information, and the effectiveness of these types of communication in building relationships. Study 1, a survey, revealed that users endorse conflicting expectations about preferences for receiving information publicly or privately. Study 2, a field experiment testing the effects of private versus public Facebook communications on actual relationship development using participants' own Facebook pages, suggested that private messages lead to greater closeness.

  17. Benefits to Minnesotans of communications infrastructure public-private partnership

    DOT National Transportation Integrated Search

    1997-06-01

    This paper presents a summary of the benefits of a communications infrastructure public-private partnership between the Minnesota Department of Transportation and the team of International Communications Systems (ICS) and Stone & Webster.

  18. Crossing Public-Private and Personal-Professional Boundaries: How Changes in Technology May Affect CEOs' Communication

    ERIC Educational Resources Information Center

    Jameson, Daphne A.

    2014-01-01

    When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…

  19. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  20. The Public/Private Divide in Higher Education: A Global Revision

    ERIC Educational Resources Information Center

    Marginson, Simon

    2007-01-01

    Our common understandings of the public/private distinction in higher education are drawn from neo-classical economics and/or statist political philosophy. However, the development of competition and markets at the national level, and the new potentials for private and public goods created by globalisation in higher education, have exposed…

  1. Public/Private in Higher Education: A Synthesis of Economic and Political Approaches

    ERIC Educational Resources Information Center

    Marginson, Simon

    2018-01-01

    The public/private distinction is central to higher education but there is no consensus on "public." In neo-classical economic theory, Samuelson distinguishes non-market goods (public) that cannot be produced for profit, from market-based activity (private). This provides a basis for identifying the minimum necessary public expenditure,…

  2. 47 CFR 32.5040 - Private line revenue.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS... communications between specific locations (e.g., point-to-point communications. It includes revenue from subvoice grade, voice grade, audio and video program grade, digital transmission and local private network...

  3. Classical noise, quantum noise and secure communication

    NASA Astrophysics Data System (ADS)

    Tannous, C.; Langlois, J.

    2016-01-01

    Secure communication based on message encryption might be performed by combining the message with controlled noise (called pseudo-noise) as performed in spread-spectrum communication used presently in Wi-Fi and smartphone telecommunication systems. Quantum communication based on entanglement is another route for securing communications as demonstrated by several important experiments described in this work. The central role played by the photon in unifying the description of classical and quantum noise as major ingredients of secure communication systems is highlighted and described on the basis of the classical and quantum fluctuation dissipation theorems.

  4. Energy-constrained two-way assisted private and quantum capacities of quantum channels

    NASA Astrophysics Data System (ADS)

    Davis, Noah; Shirokov, Maksim E.; Wilde, Mark M.

    2018-06-01

    With the rapid growth of quantum technologies, knowing the fundamental characteristics of quantum systems and protocols is essential for their effective implementation. A particular communication setting that has received increased focus is related to quantum key distribution and distributed quantum computation. In this setting, a quantum channel connects a sender to a receiver, and their goal is to distill either a secret key or entanglement, along with the help of arbitrary local operations and classical communication (LOCC). In this work, we establish a general theory of energy-constrained, LOCC-assisted private and quantum capacities of quantum channels, which are the maximum rates at which an LOCC-assisted quantum channel can reliably establish a secret key or entanglement, respectively, subject to an energy constraint on the channel input states. We prove that the energy-constrained squashed entanglement of a channel is an upper bound on these capacities. We also explicitly prove that a thermal state maximizes a relaxation of the squashed entanglement of all phase-insensitive, single-mode input bosonic Gaussian channels, generalizing results from prior work. After doing so, we prove that a variation of the method introduced by Goodenough et al. [New J. Phys. 18, 063005 (2016), 10.1088/1367-2630/18/6/063005] leads to improved upper bounds on the energy-constrained secret-key-agreement capacity of a bosonic thermal channel. We then consider a multipartite setting and prove that two known multipartite generalizations of the squashed entanglement are in fact equal. We finally show that the energy-constrained, multipartite squashed entanglement plays a role in bounding the energy-constrained LOCC-assisted private and quantum capacity regions of quantum broadcast channels.

  5. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  6. Information security: from classical to quantum

    NASA Astrophysics Data System (ADS)

    Barnett, Stephen M.; Brougham, Thomas

    2012-09-01

    Quantum cryptography was designed to provide a new approach to the problem of distributing keys for private-key cryptography. The principal idea is that security can be ensured by exploiting the laws of quantum physics and, in particular, by the fact that any attempt to measure a quantum state will change it uncontrollably. This change can be detected by the legitimate users of the communication channel and so reveal to them the presence of an eavesdropper. In this paper I explain (briefly) how quantum key distribution works and some of the progress that has been made towards making this a viable technology. With the principles of quantum communication and quantum key distribution firmly established, it is perhaps time to consider how efficient it can be made. It is interesting to ask, in particular, how many bits of information might reasonably be encoded securely on each photon. The use of photons entangled in their time of arrival might make it possible to achieve data rates in excess of 10 bits per photon.

  7. 78 FR 70499 - Private Land Mobile Radio Stations Below 800 MHz

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-26

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 90 [WP Docket No. 07-100; FCC 13-52] Private Land..., 2013. FOR FURTHER INFORMATION CONTACT: Scot Stone, Federal Communications Commission, Wireless.... 154(i), 309(j) and 332 of the Communications Act of 1934, as amended. Total Annual Burden: 8,231 hours...

  8. Nearest private query based on quantum oblivious key distribution

    NASA Astrophysics Data System (ADS)

    Xu, Min; Shi, Run-hua; Luo, Zhen-yu; Peng, Zhen-wan

    2017-12-01

    Nearest private query is a special private query which involves two parties, a user and a data owner, where the user has a private input (e.g., an integer) and the data owner has a private data set, and the user wants to query which element in the owner's private data set is the nearest to his input without revealing their respective private information. In this paper, we first present a quantum protocol for nearest private query, which is based on quantum oblivious key distribution (QOKD). Compared to the classical related protocols, our protocol has the advantages of the higher security and the better feasibility, so it has a better prospect of applications.

  9. Dimensional discontinuity in quantum communication complexity at dimension seven

    NASA Astrophysics Data System (ADS)

    Tavakoli, Armin; Pawłowski, Marcin; Żukowski, Marek; Bourennane, Mohamed

    2017-02-01

    Entanglement-assisted classical communication and transmission of a quantum system are the two quantum resources for information processing. Many information tasks can be performed using either quantum resource. However, this equivalence is not always present since entanglement-assisted classical communication is sometimes known to be the better performing resource. Here, we show not only the opposite phenomenon, that there exist tasks for which transmission of a quantum system is a more powerful resource than entanglement-assisted classical communication, but also that such phenomena can have a surprisingly strong dependence on the dimension of Hilbert space. We introduce a family of communication complexity problems parametrized by the dimension of Hilbert space and study the performance of each quantum resource. Under an additional assumption of a linear strategy for the receiving party, we find that for low dimensions the two resources perform equally well, whereas for dimension seven and above the equivalence is suddenly broken and transmission of a quantum system becomes more powerful than entanglement-assisted classical communication. Moreover, we find that transmission of a quantum system may even outperform classical communication assisted by the stronger-than-quantum correlations obtained from the principle of macroscopic locality.

  10. Role of memory errors in quantum repeaters

    NASA Astrophysics Data System (ADS)

    Hartmann, L.; Kraus, B.; Briegel, H.-J.; Dür, W.

    2007-03-01

    We investigate the influence of memory errors in the quantum repeater scheme for long-range quantum communication. We show that the communication distance is limited in standard operation mode due to memory errors resulting from unavoidable waiting times for classical signals. We show how to overcome these limitations by (i) improving local memory and (ii) introducing two operational modes of the quantum repeater. In both operational modes, the repeater is run blindly, i.e., without waiting for classical signals to arrive. In the first scheme, entanglement purification protocols based on one-way classical communication are used allowing to communicate over arbitrary distances. However, the error thresholds for noise in local control operations are very stringent. The second scheme makes use of entanglement purification protocols with two-way classical communication and inherits the favorable error thresholds of the repeater run in standard mode. One can increase the possible communication distance by an order of magnitude with reasonable overhead in physical resources. We outline the architecture of a quantum repeater that can possibly ensure intercontinental quantum communication.

  11. Quantity and quality of information, education and communication during antenatal visit at private and public sector hospitals of Bahawalpur, Pakistan.

    PubMed

    Mahar, Benazeer; Kumar, Ramesh; Rizvi, Narjis; Bahalkani, Habib Akhtar; Haq, Mahboobul; Soomro, Jamila

    2012-01-01

    Information, education and communication (IEC) by health care provider to pregnant woman during the antenatal visit are very crucial for healthier outcome of pregnancy. This study analysed the quality and quantity of antenatal visit at a private and a public hospital of Bahawalpur, Pakistan. An exit interview was conducted from 216 pregnant women by using validated, reliable and pre-tested adapted questionnaire. First sample was selected by simple random sampling, for rest of the sample selection systematic random sampling was adapted by selecting every 7th women for interview. Ethical considerations were taken. Average communication time among pregnant woman and her healthcare provider was 3 minute in public and 8 minutes in private hospital. IEC mainly focused on diet and nutrition in private (86%) and (53%) public, advice for family planning after delivery was discussed with 13% versus 7% in public and private setting. None of the respondents in both facilities got advice or counselling on breastfeeding and neonatal care. Birth preparedness components were discussed, woman in public and private hospital respectively. In both settings antenatal clients were not received information and education communication according to World Health Organization guidelines. Quality and quantity of IEC during antenatal care was found very poor in both public and private sector hospitals of urban Pakistan.

  12. Public classical communication in quantum cryptography: Error correction, integrity, and authentication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timofeev, A. V.; Pomozov, D. I.; Makkaveev, A. P.

    2007-05-15

    Quantum cryptography systems combine two communication channels: a quantum and a classical one. (They can be physically implemented in the same fiber-optic link, which is employed as a quantum channel when one-photon states are transmitted and as a classical one when it carries classical data traffic.) Both channels are supposed to be insecure and accessible to an eavesdropper. Error correction in raw keys, interferometer balancing, and other procedures are performed by using the public classical channel. A discussion of the requirements to be met by the classical channel is presented.

  13. 77 FR 61535 - Private Land Mobile Radio Rules

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-10

    ... technology that we believe can provide valuable benefits to land mobile radio users. III. Summary of..., GPS equipment, pagers, cellular phones, mobile communications equipment, and radio and television...-114] Private Land Mobile Radio Rules AGENCY: Federal Communications Commission. ACTION: Final rule...

  14. 47 CFR 80.507 - Scope of service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... locations. Marine utility stations on ships are operated as ship stations. (d) Each private coast station is... of ships including the transmission of safety communication. (b) In areas where environmental... the ships with which they normally communicate. Private coast stations may provide environmental...

  15. 47 CFR 80.507 - Scope of service.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... locations. Marine utility stations on ships are operated as ship stations. (d) Each private coast station is... of ships including the transmission of safety communication. (b) In areas where environmental... the ships with which they normally communicate. Private coast stations may provide environmental...

  16. 47 CFR 80.507 - Scope of service.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... locations. Marine utility stations on ships are operated as ship stations. (d) Each private coast station is... of ships including the transmission of safety communication. (b) In areas where environmental... the ships with which they normally communicate. Private coast stations may provide environmental...

  17. 47 CFR 80.507 - Scope of service.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... locations. Marine utility stations on ships are operated as ship stations. (d) Each private coast station is... of ships including the transmission of safety communication. (b) In areas where environmental... the ships with which they normally communicate. Private coast stations may provide environmental...

  18. 47 CFR 80.507 - Scope of service.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... locations. Marine utility stations on ships are operated as ship stations. (d) Each private coast station is... of ships including the transmission of safety communication. (b) In areas where environmental... the ships with which they normally communicate. Private coast stations may provide environmental...

  19. 47 CFR 90.415 - Prohibited uses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND...) Render a communications common carrier service, except for stations in the Public Safety Pool providing..., private carrier paging, Industrial/Business Pool, or 220-222 MHz services. [43 FR 54791, Nov. 22, 1978, as...

  20. 47 CFR 90.415 - Prohibited uses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND...) Render a communications common carrier service, except for stations in the Public Safety Pool providing..., private carrier paging, Industrial/Business Pool, or 220-222 MHz services. [43 FR 54791, Nov. 22, 1978, as...

  1. 47 CFR 90.415 - Prohibited uses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND...) Render a communications common carrier service, except for stations in the Public Safety Pool providing..., private carrier paging, Industrial/Business Pool, or 220-222 MHz services. [43 FR 54791, Nov. 22, 1978, as...

  2. 47 CFR 90.415 - Prohibited uses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND...) Render a communications common carrier service, except for stations in the Public Safety Pool providing..., private carrier paging, Industrial/Business Pool, or 220-222 MHz services. [43 FR 54791, Nov. 22, 1978, as...

  3. 47 CFR 27.1301 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1301 Purpose and scope. The purpose of this... 700 MHz Public/Private Partnership entered between the winning bidder for the Upper 700 MHz D Block...

  4. 47 CFR 27.1307 - Spectrum use in the network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ....1307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1307 Spectrum use in the network. (a) Spectrum use. The shared wireless broadband network developed by the 700 MHz Public/Private...

  5. 47 CFR 27.1301 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1301 Purpose and scope. The purpose of this... 700 MHz Public/Private Partnership entered between the winning bidder for the Upper 700 MHz D Block...

  6. 47 CFR 101.1305 - Private internal service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... business purposes or public safety communications and not on a for-hire or for-profit basis. ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Private internal service. 101.1305 Section 101.1305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES...

  7. Exploring healthcare communication models in private physiotherapy practice.

    PubMed

    Hiller, Amy; Guillemin, Marilys; Delany, Clare

    2015-10-01

    This project explored whether models of healthcare communication are evident within patient-physiotherapist communication in the private practice setting. Using qualitative ethnographic methods, fifty-two patient-physiotherapist treatment sessions were observed and interviews with nine physiotherapists were undertaken. Data were analyzed using thematic analysis. In these clinical encounters physiotherapists led the communication. The communication was structured and focussed on physical aspects of the patient's presentation. These features were mediated via casual conversation and the use of touch to respond to the individual patient. Physiotherapists did not explicitly link their therapeutic communication style to established communication models. However, they described a purposeful approach to how they communicated within the treatment encounter. The communication occurring in the private practice physiotherapy treatment encounter is predominantly representative of a 'practitioner-centred' model. However, the subtle use of touch and casual conversation implicitly communicate competence and care, representative of a patient-centred model. Physiotherapists do not explicitly draw from theories of communication to inform their practice. Physiotherapists may benefit from further education to achieve patient-centred communication. Equally, the incorporation of casual conversation and the use of touch into theory of physiotherapy patient-centred communication would highlight these specific skills that physiotherapists already utilize in practice. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  8. Unified Communications: Simplifying DoD Communication Methods

    DTIC Science & Technology

    2013-04-18

    private key to encrypt the hash. The encrypted hash, together with some other information, such as the hashing algorithm , is known as a digital...virtual private network (VPN). The use of a VPN would allow users to access corporate data while encrypting traffic.35 Another layer of protection would...sign and encrypt emails as well as controlling access to restricted sites. PKI uses a combination of public and private keys for encryption and

  9. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, IV, Amos M.

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  10. Secure Communication via a Recycling of Attenuated Classical Signals

    DOE PAGES

    Smith, IV, Amos M.

    2017-01-12

    We describe a simple method of interleaving a classical and quantum signal in a secure communication system at a single wavelength. The system transmits data encrypted via a one-time pad on a classical signal and produces a single-photon reflection of the encrypted signal. This attenuated signal can be used to observe eavesdroppers and produce fresh secret bits. The system can be secured against eavesdroppers, detect simple tampering or classical bit errors, produces more secret bits than it consumes, and does not require any entanglement or complex wavelength division multiplexing, thus, making continuous secure two-way communication via one-time pads practical.

  11. Framework for near-field-communication-based geo-localization and personalization for Android-based smartphones--application in hospital environments.

    PubMed

    Meng, Philipp; Fehre, Karsten; Rappelsberger, Andrea; Adlassnig, Klaus-Peter

    2014-01-01

    Various applications using near field communication (NFC) have been developed for the medical sector. As a method of short-range wireless contact-driven data transfer, NFC is a useful tool in medicine. It can be used to transfer data such as blood pressure, control adherence to medication, or transmit in vivo data. The first proposed general framework uses NFC as a mechanism for indoor geo-localization in hospitals. NFC geo-localization is economical compared to classical concepts using indoor GPS or WLAN triangulation, and the granularity of location retrieval can be defined at a tag level. Using this framework, we facilitate the development of medical applications that require exact indoor geo-localization. Multi-user Android systems are addressed in the second framework. Using private NFC tags, users are able to carry on their personal settings for enabled applications. This eliminates the need for multiple user accounts on common Android devices, improves usability, and eases technical administration. Based on the prototypes presented here, we show a novel concept of using NFC-enabled Android devices in hospital environments.

  12. Experimental purification of two-atom entanglement.

    PubMed

    Reichle, R; Leibfried, D; Knill, E; Britton, J; Blakestad, R B; Jost, J D; Langer, C; Ozeri, R; Seidelin, S; Wineland, D J

    2006-10-19

    Entanglement is a necessary resource for quantum applications--entanglement established between quantum systems at different locations enables private communication and quantum teleportation, and facilitates quantum information processing. Distributed entanglement is established by preparing an entangled pair of quantum particles in one location, and transporting one member of the pair to another location. However, decoherence during transport reduces the quality (fidelity) of the entanglement. A protocol to achieve entanglement 'purification' has been proposed to improve the fidelity after transport. This protocol uses separate quantum operations at each location and classical communication to distil high-fidelity entangled pairs from lower-fidelity pairs. Proof-of-principle experiments distilling entangled photon pairs have been carried out. However, these experiments obtained distilled pairs with a low probability of success and required destruction of the entangled pairs, rendering them unavailable for further processing. Here we report efficient and non-destructive entanglement purification with atomic quantum bits. Two noisy entangled pairs were created and distilled into one higher-fidelity pair available for further use. Success probabilities were above 35 per cent. The many applications of entanglement purification make it one of the most important techniques in quantum information processing.

  13. 75 FR 41381 - Private Land Mobile Radio Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-16

    ...] Private Land Mobile Radio Services AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... to the January 1, 2011 interim deadlines associated with the narrowbanding of private land mobile... to the January 1, 2011 interim deadlines associated with the narrowbanding of private land mobile...

  14. Experimental multiplexing of quantum key distribution with classical optical communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Liu-Jun; Chen, Luo-Kan; Ju, Lei

    2015-02-23

    We demonstrate the realization of quantum key distribution (QKD) when combined with classical optical communication, and synchronous signals within a single optical fiber. In the experiment, the classical communication sources use Fabry-Pérot (FP) lasers, which are implemented extensively in optical access networks. To perform QKD, multistage band-stop filtering techniques are developed, and a wavelength-division multiplexing scheme is designed for the multi-longitudinal-mode FP lasers. We have managed to maintain sufficient isolation among the quantum channel, the synchronous channel and the classical channels to guarantee good QKD performance. Finally, the quantum bit error rate remains below a level of 2% across themore » entire practical application range. The proposed multiplexing scheme can ensure low classical light loss, and enables QKD over fiber lengths of up to 45 km simultaneously when the fibers are populated with bidirectional FP laser communications. Our demonstration paves the way for application of QKD to current optical access networks, where FP lasers are widely used by the end users.« less

  15. Open source system OpenVPN in a function of Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  16. 47 CFR 32.6341 - Large private branch exchange expense.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Large private branch exchange expense. 32.6341... Large private branch exchange expense. This account shall include expenses associated with large private branch exchanges. Expenses associated with company internal use communication equipment shall be recorded...

  17. Internet firewalls: questions and answers

    NASA Astrophysics Data System (ADS)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  18. Communication complexity and information complexity

    NASA Astrophysics Data System (ADS)

    Pankratov, Denis

    Information complexity enables the use of information-theoretic tools in communication complexity theory. Prior to the results presented in this thesis, information complexity was mainly used for proving lower bounds and direct-sum theorems in the setting of communication complexity. We present three results that demonstrate new connections between information complexity and communication complexity. In the first contribution we thoroughly study the information complexity of the smallest nontrivial two-party function: the AND function. While computing the communication complexity of AND is trivial, computing its exact information complexity presents a major technical challenge. In overcoming this challenge, we reveal that information complexity gives rise to rich geometrical structures. Our analysis of information complexity relies on new analytic techniques and new characterizations of communication protocols. We also uncover a connection of information complexity to the theory of elliptic partial differential equations. Once we compute the exact information complexity of AND, we can compute exact communication complexity of several related functions on n-bit inputs with some additional technical work. Previous combinatorial and algebraic techniques could only prove bounds of the form theta( n). Interestingly, this level of precision is typical in the area of information theory, so our result demonstrates that this meta-property of precise bounds carries over to information complexity and in certain cases even to communication complexity. Our result does not only strengthen the lower bound on communication complexity of disjointness by making it more exact, but it also shows that information complexity provides the exact upper bound on communication complexity. In fact, this result is more general and applies to a whole class of communication problems. In the second contribution, we use self-reduction methods to prove strong lower bounds on the information complexity of two of the most studied functions in the communication complexity literature: Gap Hamming Distance (GHD) and Inner Product mod 2 (IP). In our first result we affirm the conjecture that the information complexity of GHD is linear even under the uniform distribution. This strengthens the O(n) bound shown by Kerenidis et al. (2012) and answers an open problem by Chakrabarti et al. (2012). We also prove that the information complexity of IP is arbitrarily close to the trivial upper bound n as the permitted error tends to zero, again strengthening the O(n) lower bound proved by Braverman and Weinstein (2011). More importantly, our proofs demonstrate that self-reducibility makes the connection between information complexity and communication complexity lower bounds a two-way connection. Whereas numerous results in the past used information complexity techniques to derive new communication complexity lower bounds, we explore a generic way, in which communication complexity lower bounds imply information complexity lower bounds in a black-box manner. In the third contribution we consider the roles that private and public randomness play in the definition of information complexity. In communication complexity, private randomness can be trivially simulated by public randomness. Moreover, the communication cost of simulating public randomness with private randomness is well understood due to Newman's theorem (1991). In information complexity, the roles of public and private randomness are reversed: public randomness can be trivially simulated by private randomness. However, the information cost of simulating private randomness with public randomness is not understood. We show that protocols that use only public randomness admit a rather strong compression. In particular, efficient simulation of private randomness by public randomness would imply a version of a direct sum theorem in the setting of communication complexity. This establishes a yet another connection between the two areas. (Abstract shortened by UMI.).

  19. Using Classic Literature To Reduce Violence and Aggression in Emotionally Handicapped Adolescents.

    ERIC Educational Resources Information Center

    Reganick, Karol A.

    A 12-week program was developed and implemented with the purpose of utilizing classical literature to encourage prosocial skills in eight students, with aggressive and violent behaviors, residing in a private residential treatment center. The program was initiated in response to the increasingly high numbers of student attacks on mental health…

  20. 47 CFR 80.133 - Private coast stations using facsimile in Alaska.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Private coast stations using facsimile in Alaska. 80.133 Section 80.133 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND... Procedures-Private Coast Stations § 80.133 Private coast stations using facsimile in Alaska. Facsimile...

  1. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  2. Evaluating NASA Technology Programs in Terms of Private Sector Impacts

    NASA Technical Reports Server (NTRS)

    Greenberg, J. S.

    1984-01-01

    NASA is currently developing spacecraft technology for application to NASA scientific missions, military missions and commercial missions which are part of or form the basis of private sector business ventures. The justification of R&D programs that lead to spacecraft technology improvements encompasses the establishment of the benefits in terms of improved scientific knowledge that may result from new and/or improved NASA science missions, improved cost effectiveness of NASA and DOD missions and new or improved services that may be offered by the private sector (for example communications satellite services). It is with the latter of these areas that attention will be focused upon. In particular, it is of interest to establish the economic value of spacecraft technology improvements to private sector communications satellite business ventures. It is proposed to assess the value of spacecraft technology improvements in terms of the changes in cash flow and present value of cash flows, that may result from the use of new and/or improved spacecraft technology for specific types of private sector communications satellite missions (for example domestic point-to-point communication or direct broadcasting). To accomplish this it is necessary to place the new and/or improved technology within typical business scenarios and estimate the impacts of technical performance upon business and financial performance.

  3. Valuing (and Teaching) the Past

    ERIC Educational Resources Information Center

    Peart, Sandra J.; Levy, David M.

    2005-01-01

    There is a difference between the private and social cost of preserving the past. Although it may be privately rational to forget the past, the social cost is significant: We fail to see that classical political economy is analytically egalitarian. The past is a rich source of surprises and debates, and resources on the Web are uniquely suited to…

  4. The Process and Effects of Mass Communication. Revised Edition.

    ERIC Educational Resources Information Center

    Schramm, Wilbur, Ed.; Roberts, Donald F., Ed.

    Composed of a mixture of old classics, new classics, reports on state of the art in important areas, and speculations about the future, this second edition of the reader in communication research provides an introduction to questions about how communication works and what it does. Papers by prominent researchers and writers in the field comprise…

  5. Quantum money with classical verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gavinsky, Dmitry

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  6. Quantum money with classical verification

    NASA Astrophysics Data System (ADS)

    Gavinsky, Dmitry

    2014-12-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  7. Coherent-state constellations and polar codes for thermal Gaussian channels

    NASA Astrophysics Data System (ADS)

    Lacerda, Felipe; Renes, Joseph M.; Scholz, Volkher B.

    2017-06-01

    Optical communication channels are ultimately quantum mechanical in nature, and we must therefore look beyond classical information theory to determine their communication capacity as well as to find efficient encoding and decoding schemes of the highest rates. Thermal channels, which arise from linear coupling of the field to a thermal environment, are of particular practical relevance; their classical capacity has been recently established, but their quantum capacity remains unknown. While the capacity sets the ultimate limit on reliable communication rates, it does not promise that such rates are achievable by practical means. Here we construct efficiently encodable codes for thermal channels which achieve the classical capacity and the so-called Gaussian coherent information for transmission of classical and quantum information, respectively. Our codes are based on combining polar codes with a discretization of the channel input into a finite "constellation" of coherent states. Encoding of classical information can be done using linear optics.

  8. Communication, Relationships, and Religious Difference in the Northern Ireland Workplace: A Study of Private and Public Sector Organizations

    ERIC Educational Resources Information Center

    Dickson, David; Hargie, Owen; Wilson, Noel

    2008-01-01

    Four large organizations, two each from the private and public sectors of the Northern Ireland economy, were selected for this study which, first, explored the effects of religion-based workforce difference on intergroup relationships, second, investigated the contribution of organizational sector to communicative differences, and third, gauged…

  9. Willingness to Communicate in English among Saudi Female University Students

    ERIC Educational Resources Information Center

    Turjoman, Mona Obaid Alrahman Ashik

    2016-01-01

    Since the English Language teaching system differs from public schools to private ones, it is presumed that this would have a great impact of students' willingness to communicate in English in Saudi Arabia. The purpose of the current study is to investigate the effect of private and public school education on WTC in English among Saudi Female…

  10. Missing Data: Discovering the Private Logic of Adult-Wary Youth

    ERIC Educational Resources Information Center

    Seita, John

    2010-01-01

    In his classic book, "The Problem Child," Alfred Adler (1930) noted that if educators do not understand the "private logic" and goals of a young person, their interventions may do more harm than good. But it is not a natural process to empathize with persons who fight their well-intended efforts to help. Adults and young people are often pitted as…

  11. 47 CFR 101.1305 - Private internal service.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Private internal service. 101.1305 Section 101.1305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Multiple Address Systems General Provisions § 101.1305 Private internal service...

  12. 47 CFR 101.1305 - Private internal service.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Private internal service. 101.1305 Section 101.1305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Multiple Address Systems General Provisions § 101.1305 Private internal service...

  13. 47 CFR 101.1305 - Private internal service.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Private internal service. 101.1305 Section 101.1305 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Multiple Address Systems General Provisions § 101.1305 Private internal service...

  14. Two-Way Communication with a Single Quantum Particle.

    PubMed

    Del Santo, Flavio; Dakić, Borivoje

    2018-02-09

    In this Letter we show that communication when restricted to a single information carrier (i.e., single particle) and finite speed of propagation is fundamentally limited for classical systems. On the other hand, quantum systems can surpass this limitation. We show that communication bounded to the exchange of a single quantum particle (in superposition of different spatial locations) can result in "two-way signaling," which is impossible in classical physics. We quantify the discrepancy between classical and quantum scenarios by the probability of winning a game played by distant players. We generalize our result to an arbitrary number of parties and we show that the probability of success is asymptotically decreasing to zero as the number of parties grows, for all classical strategies. In contrast, quantum strategy allows players to win the game with certainty.

  15. Two-Way Communication with a Single Quantum Particle

    NASA Astrophysics Data System (ADS)

    Del Santo, Flavio; Dakić, Borivoje

    2018-02-01

    In this Letter we show that communication when restricted to a single information carrier (i.e., single particle) and finite speed of propagation is fundamentally limited for classical systems. On the other hand, quantum systems can surpass this limitation. We show that communication bounded to the exchange of a single quantum particle (in superposition of different spatial locations) can result in "two-way signaling," which is impossible in classical physics. We quantify the discrepancy between classical and quantum scenarios by the probability of winning a game played by distant players. We generalize our result to an arbitrary number of parties and we show that the probability of success is asymptotically decreasing to zero as the number of parties grows, for all classical strategies. In contrast, quantum strategy allows players to win the game with certainty.

  16. Quantum entanglement percolation

    NASA Astrophysics Data System (ADS)

    Siomau, Michael

    2016-09-01

    Quantum communication demands efficient distribution of quantum entanglement across a network of connected partners. The search for efficient strategies for the entanglement distribution may be based on percolation theory, which describes evolution of network connectivity with respect to some network parameters. In this framework, the probability to establish perfect entanglement between two remote partners decays exponentially with the distance between them before the percolation transition point, which unambiguously defines percolation properties of any classical network or lattice. Here we introduce quantum networks created with local operations and classical communication, which exhibit non-classical percolation transition points leading to striking communication advantages over those offered by the corresponding classical networks. We show, in particular, how to establish perfect entanglement between any two nodes in the simplest possible network—the 1D chain—using imperfectly entangled pairs of qubits.

  17. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  18. 47 CFR 32.5040 - Private line revenue.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Private line revenue. 32.5040 Section 32.5040 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5040 Private line revenue...

  19. 47 CFR 32.5040 - Private line revenue.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Private line revenue. 32.5040 Section 32.5040 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5040 Private line revenue...

  20. Implementation of Quantum Private Queries Using Nuclear Magnetic Resonance

    NASA Astrophysics Data System (ADS)

    Wang, Chuan; Hao, Liang; Zhao, Lian-Jie

    2011-08-01

    We present a modified protocol for the realization of a quantum private query process on a classical database. Using one-qubit query and CNOT operation, the query process can be realized in a two-mode database. In the query process, the data privacy is preserved as the sender would not reveal any information about the database besides her query information, and the database provider cannot retain any information about the query. We implement the quantum private query protocol in a nuclear magnetic resonance system. The density matrix of the memory registers are constructed.

  1. 47 CFR 101.137 - Interconnection of private operational fixed point-to-point microwave stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... point-to-point microwave stations. 101.137 Section 101.137 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Technical Standards § 101.137 Interconnection of private operational fixed point-to-point microwave stations. Private...

  2. 47 CFR 101.137 - Interconnection of private operational fixed point-to-point microwave stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... point-to-point microwave stations. 101.137 Section 101.137 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Technical Standards § 101.137 Interconnection of private operational fixed point-to-point microwave stations. Private...

  3. 47 CFR 101.137 - Interconnection of private operational fixed point-to-point microwave stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... point-to-point microwave stations. 101.137 Section 101.137 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Technical Standards § 101.137 Interconnection of private operational fixed point-to-point microwave stations. Private...

  4. 47 CFR 101.137 - Interconnection of private operational fixed point-to-point microwave stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... point-to-point microwave stations. 101.137 Section 101.137 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Technical Standards § 101.137 Interconnection of private operational fixed point-to-point microwave stations. Private...

  5. 47 CFR 101.137 - Interconnection of private operational fixed point-to-point microwave stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... point-to-point microwave stations. 101.137 Section 101.137 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Technical Standards § 101.137 Interconnection of private operational fixed point-to-point microwave stations. Private...

  6. A Preliminary Economic Evaluation of Marine Corps Acquisition Practices: UHF Satellite Communication Ground Terminal Acquisitions

    DTIC Science & Technology

    1989-03-01

    34 Replace outdated teletypewriter/printer technology with the four AN/ UGC - 74’s; " Upgrade communication security (COMSEC) equipment to retain...unbiased information. In fact, the private user recognizes that good marketing techniques are required to receive favorable consideration for a private...developed in accounting, finance, economics, marketing , political science, sociology, and organizational behavior literature. "[The principal-agent

  7. Quantum communication complexity advantage implies violation of a Bell inequality

    PubMed Central

    Buhrman, Harry; Czekaj, Łukasz; Grudka, Andrzej; Horodecki, Michał; Horodecki, Paweł; Markiewicz, Marcin; Speelman, Florian; Strelchuk, Sergii

    2016-01-01

    We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily large, the ratio of the quantum value to the classical value of the Bell quantity becomes unbounded with the increase in the number of inputs and outputs. PMID:26957600

  8. Communicating the AMFm message: exploring the effect of communication and training interventions on private for-profit provider awareness and knowledge related to a multi-country anti-malarial subsidy intervention

    PubMed Central

    2014-01-01

    Background The Affordable Medicines Facility - malaria (AMFm), implemented at national scale in eight African countries or territories, subsidized quality-assured artemisinin combination therapy (ACT) and included communication campaigns to support implementation and promote appropriate anti-malarial use. This paper reports private for-profit provider awareness of key features of the AMFm programme, and changes in provider knowledge of appropriate malaria treatment. Methods This study had a non-experimental design based on nationally representative surveys of outlets stocking anti-malarials before (2009/10) and after (2011) the AMFm roll-out. Results Based on data from over 19,500 outlets, results show that in four of eight settings, where communication campaigns were implemented for 5–9 months, 76%-94% awareness of the AMFm ‘green leaf’ logo, 57%-74% awareness of the ACT subsidy programme, and 52%-80% awareness of the correct recommended retail price (RRP) of subsidized ACT were recorded. However, in the remaining four settings where communication campaigns were implemented for three months or less, levels were substantially lower. In six of eight settings, increases of at least 10 percentage points in private for-profit providers’ knowledge of the correct first-line treatment for uncomplicated malaria were seen; and in three of these the levels of knowledge achieved at endline were over 80%. Conclusions The results support the interpretation that, in addition to the availability of subsidized ACT, the intensity of communication campaigns may have contributed to the reported levels of AMFm-related awareness and knowledge among private for-profit providers. Future subsidy programmes for anti-malarials or other treatments should similarly include communication activities. PMID:24495691

  9. Domestic Communications Satellites.

    ERIC Educational Resources Information Center

    Network Project Notebook, 1972

    1972-01-01

    The June, 1972 Federal Communications Commission's (FCC) decision allowed an "open skies" policy in regard to domestic communication satellites and raised Liberal opposition to a situation where exclusive and unchecked communications power is now in the hands of private entrepreneurs, primarily the big Defense Department oriented…

  10. The Signaller's Dilemma: A Cost–Benefit Analysis of Public and Private Communication

    PubMed Central

    Römer, Heiner; Lang, Alexander; Hartbauer, Manfred

    2010-01-01

    Background Understanding the diversity of animal signals requires knowledge of factors which may influence the different stages of communication, from the production of a signal by the sender up to the detection, identification and final decision-making in the receiver. Yet, many studies on signalling systems focus exclusively on the sender, and often ignore the receiver side and the ecological conditions under which signals evolve. Methodology/Principal Findings We study a neotropical katydid which uses airborne sound for long distance communication, but also an alternative form of private signalling through substrate vibration. We quantified the strength of predation by bats which eavesdrop on the airborne sound signal, by analysing insect remains at roosts of a bat family. Males do not arbitrarily use one or the other channel for communication, but spend more time with private signalling under full moon conditions, when the nocturnal rainforest favours predation by visually hunting predators. Measurements of metabolic CO2-production rate indicate that the energy necessary for signalling increases 3-fold in full moon nights when private signalling is favoured. The background noise level for the airborne sound channel can amount to 70 dB SPL, whereas it is low in the vibration channel in the low frequency range of the vibration signal. The active space of the airborne sound signal varies between 22 and 35 meters, contrasting with about 4 meters with the vibration signal transmitted on the insect's favourite roost plant. Signal perception was studied using neurophysiological methods under outdoor conditions, which is more reliable for the private mode of communication. Conclusions/Significance Our results demonstrate the complex effects of ecological conditions, such as predation, nocturnal ambient light levels, and masking noise levels on the performance of receivers in detecting mating signals, and that the net advantage or disadvantage of a mode of communication strongly depends on these conditions. PMID:20967210

  11. Childhood vaccine risk/benefit communication in private practice office settings: a national survey.

    PubMed

    Davis, T C; Fredrickson, D D; Arnold, C L; Cross, J T; Humiston, S G; Green, K W; Bocchini, J A

    2001-02-01

    Communication about childhood vaccine risks and benefits has been legally required in pediatric health care for over a decade. However, little is known about the actual practice of vaccine risk/benefit communication. This study was conducted to identify current practices of childhood vaccine risk/benefit communication in private physician office settings nationally. Specifically, we wanted to determine what written materials were given, by whom, and when; what information providers thought parents wanted/needed to know, the content of nurse and doctor discussion with parents, and the time spent on discussion. We also wanted to quantify barriers to vaccine risk/benefit discussion and to prioritize materials and dissemination methods preferred as solutions to these barriers. We conducted 32 focus groups in 6 cities, and then administered a 27-question cross-sectional mailed survey from March to September 1998, to a random national sample of physicians and their office nurses who immunize children in private practices. Eligible survey respondents were active fellows of the American Academy of Pediatrics or American Academy of Family Physicians in private practice who immunized children and a nurse from each physician's office. After 3 mailings, the response rate was 71%. Sixty-nine percent of pediatricians and 72% of family physicians self-reported their offices gave parents the Centers for Disease Control and Prevention Vaccine Information Statement, while 62% and 58%, respectively, gave it with every dose. In ~70% of immunization visits, physicians and nurses reported initiating discussion of the following: common side effects, when to call the clinic and the immunization schedule. However, physicians reported rarely initiating discussion regarding contraindications (<50%) and the National Vaccine Injury Compensation Program (<10%). Lack of time was considered the greatest barrier to vaccine risk/benefit communication. Nurses reported spending significantly more time discussing vaccines with parents than pediatricians or family physicians (mean: 3.89 vs 9.20 and 3.08 minutes, respectively). Both physicians and nurses indicated an additional 60 to 90 seconds was needed to optimally discuss immunization with parents under current conditions. Stratified analysis indicated nurses played a vital role in immunization delivery and risk/benefit communication. To improve vaccine risk/benefit communication, 80% of all providers recommended a preimmunization booklet for parents and approximately one half recommended a screening sheet for contraindications and poster for immunization reference. The learning method most highly endorsed by all providers was practical materials (80%). Other desirable learning methods varied significantly by provider type. There was a mismatch between the legal mandate for Vaccine Information Statement distribution and the actual practice in private office settings. The majority of providers reported discussing some aspect of vaccine communication but 40% indicated that they did not mention risks. Legal and professional guidelines for appropriate content and delivery of vaccine communication need to be clarified and to be made easily accessible for busy private practitioners. Efforts to improve risk/benefit communication in private practice should take into consideration the limited time available in an office well-infant visit and should be aimed at both the nurse and physician.

  12. Quality of private and public ambulatory health care in low and middle income countries: systematic review of comparative studies.

    PubMed

    Berendes, Sima; Heywood, Peter; Oliver, Sandy; Garner, Paul

    2011-04-01

    In developing countries, the private sector provides a substantial proportion of primary health care to low income groups for communicable and non-communicable diseases. These providers are therefore central to improving health outcomes. We need to know how their services compare to those of the public sector to inform policy options. We summarised reliable research comparing the quality of formal private versus public ambulatory health care in low and middle income countries. We selected studies against inclusion criteria following a comprehensive search, yielding 80 studies. We compared quality under standard categories, converted values to a linear 100% scale, calculated differences between providers within studies, and summarised median values of the differences across studies. As the results for for-profit and not-for-profit providers were similar, we combined them. Overall, median values indicated that many services, irrespective of whether public or private, scored low on infrastructure, clinical competence, and practice. Overall, the private sector performed better in relation to drug supply, responsiveness, and effort. No difference between provider groups was detected for patient satisfaction or competence. Synthesis of qualitative components indicates the private sector is more client centred. Although data are limited, quality in both provider groups seems poor, with the private sector performing better in drug availability and aspects of delivery of care, including responsiveness and effort, and possibly being more client orientated. Strategies seeking to influence quality in both groups are needed to improve care delivery and outcomes for the poor, including managing the increasing burden of non-communicable diseases.

  13. Towards communication-efficient quantum oblivious key distribution

    NASA Astrophysics Data System (ADS)

    Panduranga Rao, M. V.; Jakobi, M.

    2013-01-01

    Symmetrically private information retrieval, a fundamental problem in the field of secure multiparty computation, is defined as follows: A database D of N bits held by Bob is queried by a user Alice who is interested in the bit Db in such a way that (1) Alice learns Db and only Db and (2) Bob does not learn anything about Alice's choice b. While solutions to this problem in the classical domain rely largely on unproven computational complexity theoretic assumptions, it is also known that perfect solutions that guarantee both database and user privacy are impossible in the quantum domain. Jakobi [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.83.022301 83, 022301 (2011)] proposed a protocol for oblivious transfer using well-known quantum key device (QKD) techniques to establish an oblivious key to solve this problem. Their solution provided a good degree of database and user privacy (using physical principles like the impossibility of perfectly distinguishing nonorthogonal quantum states and the impossibility of superluminal communication) while being loss-resistant and implementable with commercial QKD devices (due to the use of the Scarani-Acin-Ribordy-Gisin 2004 protocol). However, their quantum oblivious key distribution (QOKD) protocol requires a communication complexity of O(NlogN). Since modern databases can be extremely large, it is important to reduce this communication as much as possible. In this paper, we first suggest a modification of their protocol wherein the number of qubits that need to be exchanged is reduced to O(N). A subsequent generalization reduces the quantum communication complexity even further in such a way that only a few hundred qubits are needed to be transferred even for very large databases.

  14. Disparities in collaborative patient-provider communication about human papillomavirus (HPV) vaccination.

    PubMed

    Moss, Jennifer L; Gilkey, Melissa B; Rimer, Barbara K; Brewer, Noel T

    2016-06-02

    Healthcare providers may vary their communications with different patients, which could give rise to differences in vaccination coverage. We examined demographic disparities in parental report of collaborative provider communication and implications for human papillomavirus (HPV) vaccination. Participants were 4,124 parents who completed the National Immunization Survey-Teen about daughters ages 13-17. We analyzed disparities in collaborative communication (mutual information exchange, deliberation, and decision) and whether they mediated the relationship between demographic characteristics and HPV vaccine initiation. Half of parents (53%) in the survey reported collaborative communication. Poor, less educated, Spanish-speaking, Southern, and rural parents, and parents of non-privately insured and Hispanic adolescents, were least likely to report collaborative communication (all p<.05). These disparities in communication accounted for geographic variation in HPV vaccination, specifically, the higher rates of uptake in the Northeast versus the South (mediation z=2.31, p<.01) and in urban/suburban vs. rural areas (mediation z=2.87, p<.01). These disparities were also associated with vaccination among subgroups with relatively high coverage, minimizing what could have been even higher uptake among Hispanic compared to non-Hispanic white adolescents (mediation z=-3.04, p<.01) and non-privately versus privately insured adolescents (mediation z=-3.67, p<.001). Controlling for provider recommendation attenuated some of these associations (but all p<.10). Collaborative communication showed widespread disparities, being least common among underserved groups. Collaborative communication helped account for differences-and lack of differences-in HPV vaccination among some subgroups of adolescent girls. Leveraging patient-provider communication, especially for underserved demographic groups, could improve HPV vaccination coverage.

  15. 47 CFR 90.1408 - Organization and structure of the 700 MHz public/private partnership.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Organization and structure of the 700 MHz public/private partnership. 90.1408 Section 90.1408 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Partnership § 90.1408 Organization and structure of the 700 MHz public/private partnership. (a) The Upper 700...

  16. 77 FR 24758 - Advisory Committee on International Communications and Information Policy; Notice of Committee...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... DEPARTMENT OF STATE [Public Notice 7813] Advisory Committee on International Communications and... Committee on International Communications and Information Policy (ACICIP) for a period of two years. The... affecting international communications and information policy. ACICIP members are private sector...

  17. Device-Independent Tests of Entropy

    NASA Astrophysics Data System (ADS)

    Chaves, Rafael; Brask, Jonatan Bohr; Brunner, Nicolas

    2015-09-01

    We show that the entropy of a message can be tested in a device-independent way. Specifically, we consider a prepare-and-measure scenario with classical or quantum communication, and develop two different methods for placing lower bounds on the communication entropy, given observable data. The first method is based on the framework of causal inference networks. The second technique, based on convex optimization, shows that quantum communication provides an advantage over classical communication, in the sense of requiring a lower entropy to reproduce given data. These ideas may serve as a basis for novel applications in device-independent quantum information processing.

  18. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  19. A Classical Delphi Study to Identify the Barriers of Pursuing Green Information and Communication Technologies

    ERIC Educational Resources Information Center

    Gotay, Jose Antonio

    2013-01-01

    This qualitative, classical Delphi study served to explore the apparent lack of corporate commitment to prioritized Green Information Communication Technologies (ICTs), which could delay the economic and social benefits for maximizing the use of natural energy resources in a weak economy. The purpose of this study was to examine the leadership…

  20. Communication cost of simulating Bell correlations.

    PubMed

    Toner, B F; Bacon, D

    2003-10-31

    What classical resources are required to simulate quantum correlations? For the simplest and most important case of local projective measurements on an entangled Bell pair state, we show that exact simulation is possible using local hidden variables augmented by just one bit of classical communication. Certain quantum teleportation experiments, which teleport a single qubit, therefore admit a local hidden variables model.

  1. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  2. Gossip algorithms in quantum networks

    NASA Astrophysics Data System (ADS)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up - in the best case exponentially - the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication.

  3. Organizational Communication: Theoretical Implications of Communication Technology Applications.

    ERIC Educational Resources Information Center

    Danowski, James A.

    Communication technology (CT), which involves the use of computers in private and group communication, has had a major impact on theory and research in organizational communication over the past 30 years. From the 1950s to the early 1970s, mainframe computers were seen as managerial tools in creating more centralized organizational structures.…

  4. Quality of Private and Public Ambulatory Health Care in Low and Middle Income Countries: Systematic Review of Comparative Studies

    PubMed Central

    Berendes, Sima; Heywood, Peter; Oliver, Sandy; Garner, Paul

    2011-01-01

    Background In developing countries, the private sector provides a substantial proportion of primary health care to low income groups for communicable and non-communicable diseases. These providers are therefore central to improving health outcomes. We need to know how their services compare to those of the public sector to inform policy options. Methods and Findings We summarised reliable research comparing the quality of formal private versus public ambulatory health care in low and middle income countries. We selected studies against inclusion criteria following a comprehensive search, yielding 80 studies. We compared quality under standard categories, converted values to a linear 100% scale, calculated differences between providers within studies, and summarised median values of the differences across studies. As the results for for-profit and not-for-profit providers were similar, we combined them. Overall, median values indicated that many services, irrespective of whether public or private, scored low on infrastructure, clinical competence, and practice. Overall, the private sector performed better in relation to drug supply, responsiveness, and effort. No difference between provider groups was detected for patient satisfaction or competence. Synthesis of qualitative components indicates the private sector is more client centred. Conclusions Although data are limited, quality in both provider groups seems poor, with the private sector performing better in drug availability and aspects of delivery of care, including responsiveness and effort, and possibly being more client orientated. Strategies seeking to influence quality in both groups are needed to improve care delivery and outcomes for the poor, including managing the increasing burden of non-communicable diseases. Please see later in the article for the Editors' Summary PMID:21532746

  5. 47 CFR 90.465 - Control of systems of communication.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control of systems of communication. 90.465 Section 90.465 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Transmitter Control § 90.465 Control of systems of communication. (a) Depending on design considerations...

  6. 28 CFR 50.17 - Ex parte communications in informal rulemaking proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... private, ex parte oral or written communications is undesirable, because it would deprive the Department... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Ex parte communications in informal...) STATEMENTS OF POLICY § 50.17 Ex parte communications in informal rulemaking proceedings. In rulemaking...

  7. Improvements of Quantum Private Comparison Protocol Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Zhou, Ming-Kuai

    2018-01-01

    Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.

  8. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  9. Satellite-based quantum communication terminal employing state-of-the-art technology

    NASA Astrophysics Data System (ADS)

    Pfennigbauer, Martin; Aspelmeyer, Markus; Leeb, Walter R.; Baister, Guy; Dreischer, Thomas; Jennewein, Thomas; Neckamm, Gregor; Perdigues, Josep M.; Weinfurter, Harald; Zeilinger, Anton

    2005-09-01

    Feature Issue on Optical Wireless Communications (OWC) We investigate the design and the accommodation of a quantum communication transceiver in an existing classical optical communication terminal on board a satellite. Operation from a low earth orbit (LEO) platform (e.g., the International Space Station) would allow transmission of single photons and pairs of entangled photons to ground stations and hence permit quantum communication applications such as quantum cryptography on a global scale. Integration of a source generating entangled photon pairs and single-photon detection into existing optical terminal designs is feasible. Even more, major subunits of the classical terminals such as those for pointing, acquisition, and tracking as well as those providing the required electronic, thermal, and structural backbone can be adapted so as to meet the quantum communication terminal needs.

  10. Private sector deployment of intelligent transportation systems : current status and trends

    DOT National Transportation Integrated Search

    2006-02-01

    This report summarizes the current state of deployment of Intelligent Transportation Systems and related technologies by the private sector in the United States. Coverage is focused primarily on in-vehicle entertainment, information and communication...

  11. 47 CFR 90.31 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... licensing of the radio communications of entities engaged in commercial activities, engaged in clergy... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO..., permissible communications and classes and number of stations, and any special requirements are set forth in...

  12. Non-Gaussian operations on bosonic modes of light: Photon-added Gaussian channels

    NASA Astrophysics Data System (ADS)

    Sabapathy, Krishna Kumar; Winter, Andreas

    2017-06-01

    We present a framework for studying bosonic non-Gaussian channels of continuous-variable systems. Our emphasis is on a class of channels that we call photon-added Gaussian channels, which are experimentally viable with current quantum-optical technologies. A strong motivation for considering these channels is the fact that it is compulsory to go beyond the Gaussian domain for numerous tasks in continuous-variable quantum information processing such as entanglement distillation from Gaussian states and universal quantum computation. The single-mode photon-added channels we consider are obtained by using two-mode beam splitters and squeezing operators with photon addition applied to the ancilla ports giving rise to families of non-Gaussian channels. For each such channel, we derive its operator-sum representation, indispensable in the present context. We observe that these channels are Fock preserving (coherence nongenerating). We then report two examples of activation using our scheme of photon addition, that of quantum-optical nonclassicality at outputs of channels that would otherwise output only classical states and of both the quantum and private communication capacities, hinting at far-reaching applications for quantum-optical communication. Further, we see that noisy Gaussian channels can be expressed as a convex mixture of these non-Gaussian channels. We also present other physical and information-theoretic properties of these channels.

  13. Necessary and sufficient optimality conditions for classical simulations of quantum communication processes

    NASA Astrophysics Data System (ADS)

    Montina, Alberto; Wolf, Stefan

    2014-07-01

    We consider the process consisting of preparation, transmission through a quantum channel, and subsequent measurement of quantum states. The communication complexity of the channel is the minimal amount of classical communication required for classically simulating it. Recently, we reduced the computation of this quantity to a convex minimization problem with linear constraints. Every solution of the constraints provides an upper bound on the communication complexity. In this paper, we derive the dual maximization problem of the original one. The feasible points of the dual constraints, which are inequalities, give lower bounds on the communication complexity, as illustrated with an example. The optimal values of the two problems turn out to be equal (zero duality gap). By this property, we provide necessary and sufficient conditions for optimality in terms of a set of equalities and inequalities. We use these conditions and two reasonable but unproven hypotheses to derive the lower bound n ×2n -1 for a noiseless quantum channel with capacity equal to n qubits. This lower bound can have interesting consequences in the context of the recent debate on the reality of the quantum state.

  14. 47 CFR 27.1333 - Geographic partitioning, spectrum disaggregation, license assignment, and transfer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1333 Geographic partitioning, spectrum disaggregation, license...

  15. 47 CFR 27.1333 - Geographic partitioning, spectrum disaggregation, license assignment, and transfer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1333 Geographic partitioning, spectrum disaggregation, license...

  16. 47 CFR 27.1333 - Geographic partitioning, spectrum disaggregation, license assignment, and transfer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1333 Geographic partitioning, spectrum disaggregation, license...

  17. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  18. The use of data mining by private health insurance companies and customers' privacy.

    PubMed

    Al-Saggaf, Yeslam

    2015-07-01

    This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical theories-utilitarianism, Mill's harm principle, Kant's deontological theory, and Helen Nissenbaum's contextual integrity framework. Both the argument and the ethical analysis find the use of data mining by private health insurance companies in Australia to be unethical. Although private health insurance companies in Australia cannot use data mining for risk rating to cherry-pick customers and cannot use customers' personal information for unintended purposes, this article nonetheless concludes that the secondary use of customers' personal information and the absence of customers' consent still suggest that the use of data mining by private health insurance companies is wrong.

  19. 47 CFR 22.1005 - Priority of service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES PUBLIC MOBILE SERVICES... central stations. However, they may also be used to render private leased line communication service, provided that such usage does not reduce or impair the extent or quality of communication service which...

  20. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  1. 47 CFR 90.625 - Other criteria to be applied in assigning channels for use in conventional systems of communication.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... channels for use in conventional systems of communication. 90.625 Section 90.625 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... applied in assigning channels for use in conventional systems of communication. (a) Where an applicant...

  2. 33 CFR 67.40-10 - Communication with owner.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Communication with owner. 67.40... Communication with owner. Communication with the owners of private aids to navigation by the District Commander shall be addressed to their usual or last known place of business, or to their local representative, if...

  3. All-optical virtual private network and ONUs communication in optical OFDM-based PON system.

    PubMed

    Zhang, Chongfu; Huang, Jian; Chen, Chen; Qiu, Kun

    2011-11-21

    We propose and demonstrate a novel scheme, which enables all-optical virtual private network (VPN) and all-optical optical network units (ONUs) inter-communications in optical orthogonal frequency-division multiplexing-based passive optical network (OFDM-PON) system using the subcarrier bands allocation for the first time (to our knowledge). We consider the intra-VPN and inter-VPN communications which correspond to two different cases: VPN communication among ONUs in one group and in different groups. The proposed scheme can provide the enhanced security and a more flexible configuration for VPN users compared to the VPN in WDM-PON or TDM-PON systems. The all-optical VPN and inter-ONU communications at 10-Gbit/s with 16 quadrature amplitude modulation (16 QAM) for the proposed optical OFDM-PON system are demonstrated. These results verify that the proposed scheme is feasible. © 2011 Optical Society of America

  4. Characterizing quantum channels with non-separable states of classical light

    NASA Astrophysics Data System (ADS)

    Ndagano, Bienvenu; Perez-Garcia, Benjamin; Roux, Filippus S.; McLaren, Melanie; Rosales-Guzman, Carmelo; Zhang, Yingwen; Mouane, Othmane; Hernandez-Aranda, Raul I.; Konrad, Thomas; Forbes, Andrew

    2017-04-01

    High-dimensional entanglement with spatial modes of light promises increased security and information capacity over quantum channels. Unfortunately, entanglement decays due to perturbations, corrupting quantum links that cannot be repaired without performing quantum tomography on the channel. Paradoxically, the channel tomography itself is not possible without a working link. Here we overcome this problem with a robust approach to characterize quantum channels by means of classical light. Using free-space communication in a turbulent atmosphere as an example, we show that the state evolution of classically entangled degrees of freedom is equivalent to that of quantum entangled photons, thus providing new physical insights into the notion of classical entanglement. The analysis of quantum channels by means of classical light in real time unravels stochastic dynamics in terms of pure state trajectories, and thus enables precise quantum error correction in short- and long-haul optical communication, in both free space and fibre.

  5. From Strategic Communication to Simply Communicate: Redefining SC in Military Communication

    DTIC Science & Technology

    2011-04-10

    departments and key publics. Contemporary government SC-practices were converted from private sector Integrated Marketing Communication (IMC) models... Integrated Marketing and Public Affairs for Recruiting. Position Paper for Commanding General, Marine Corps Recruiting Command, Quantico, VA: March 12...Corps. Strategic Communication Plan. Washington, DC: U.S. Marine Corps, July 2007. ,_ Devine, Christian. Integrated Marketing and Public Affairs for

  6. 47 CFR 80.369 - Distress, urgency, safety, call and reply frequencies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... assignable to maritime stations for distress, urgency, safety, call and reply radiotelephony communications... by Alaska private fixed stations for calling and listening, but only for establishing communication... public coast stations for call and reply communications. The paired ship frequencies are available for...

  7. Shared resources : sharing right-of-way for telecommunications : identificaiton, review and analysis of legal and institutional issues

    DOT National Transportation Integrated Search

    1996-04-01

    The advent of fiber-optic communications technology coupled with continued rapid growth in demand for communications capacity have led private communications companies to seek to build new, and extend existing, fiber-optics networks. There is increas...

  8. 47 CFR 90.1 - Basis and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND... promulgated under Title III of the Communications Act of 1934, as amended which vests authority in the Federal Communications Commission to regulate radio transmission and to issue licenses for radio stations. All rules in...

  9. 47 CFR 90.415 - Prohibited uses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND...) Render a communications common carrier service, except for stations in the Public Safety Pool providing communications standby facilities under § 90.20(a)(2)(xi) and stations licensed under this part in the SMR...

  10. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  11. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  12. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  13. 47 CFR 90.411 - Civil defense communications.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  14. 22 CFR 711.160 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Relations OVERSEAS PRIVATE INVESTMENT CORPORATION ADMINISTRATIVE PROVISIONS ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE OVERSEAS PRIVATE INVESTMENT... action that it can demonstrate would result in a fundamental alteration in the nature of a program or...

  15. Efficient quantum repeater with respect to both entanglement-concentration rate and complexity of local operations and classical communication

    NASA Astrophysics Data System (ADS)

    Su, Zhaofeng; Guan, Ji; Li, Lvzhou

    2018-01-01

    Quantum entanglement is an indispensable resource for many significant quantum information processing tasks. However, in practice, it is difficult to distribute quantum entanglement over a long distance, due to the absorption and noise in quantum channels. A solution to this challenge is a quantum repeater, which can extend the distance of entanglement distribution. In this scheme, the time consumption of classical communication and local operations takes an important place with respect to time efficiency. Motivated by this observation, we consider a basic quantum repeater scheme that focuses on not only the optimal rate of entanglement concentration but also the complexity of local operations and classical communication. First, we consider the case where two different two-qubit pure states are initially distributed in the scenario. We construct a protocol with the optimal entanglement-concentration rate and less consumption of local operations and classical communication. We also find a criterion for the projective measurements to achieve the optimal probability of creating a maximally entangled state between the two ends. Second, we consider the case in which two general pure states are prepared and general measurements are allowed. We get an upper bound on the probability for a successful measurement operation to produce a maximally entangled state without any further local operations.

  16. 47 CFR 32.2341 - Large private branch exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 32.2341 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES..., Intrabuilding Network Cable. (c) The cost of outside plant, whether or not on private property, used with intrabuilding, network cable shall be charged to the appropriate outside plant accounts. (d)-(e) [Reserved] (f...

  17. 47 CFR 101.107 - Frequency tolerance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE... to private operational fixed point-to-point microwave and stations providing MVDDS. 5 For private operational fixed point-to-point microwave systems, with a channel greater than or equal to 50 KHz bandwidth...

  18. A proposed approach to monitor private-sector policies and practices related to food environments, obesity and non-communicable disease prevention.

    PubMed

    Sacks, G; Swinburn, B; Kraak, V; Downs, S; Walker, C; Barquera, S; Friel, S; Hawkes, C; Kelly, B; Kumanyika, S; L'Abbé, M; Lee, A; Lobstein, T; Ma, J; Macmullan, J; Mohan, S; Monteiro, C; Neal, B; Rayner, M; Sanders, D; Snowdon, W; Vandevijvere, S

    2013-10-01

    Private-sector organizations play a critical role in shaping the food environments of individuals and populations. However, there is currently very limited independent monitoring of private-sector actions related to food environments. This paper reviews previous efforts to monitor the private sector in this area, and outlines a proposed approach to monitor private-sector policies and practices related to food environments, and their influence on obesity and non-communicable disease (NCD) prevention. A step-wise approach to data collection is recommended, in which the first ('minimal') step is the collation of publicly available food and nutrition-related policies of selected private-sector organizations. The second ('expanded') step assesses the nutritional composition of each organization's products, their promotions to children, their labelling practices, and the accessibility, availability and affordability of their products. The third ('optimal') step includes data on other commercial activities that may influence food environments, such as political lobbying and corporate philanthropy. The proposed approach will be further developed and piloted in countries of varying size and income levels. There is potential for this approach to enable national and international benchmarking of private-sector policies and practices, and to inform efforts to hold the private sector to account for their role in obesity and NCD prevention. © 2013 The Authors. Obesity Reviews published by John Wiley & Sons Ltd on behalf of the International Association for the Study of Obesity.

  19. Partial quantum information.

    PubMed

    Horodecki, Michał; Oppenheim, Jonathan; Winter, Andreas

    2005-08-04

    Information--be it classical or quantum--is measured by the amount of communication needed to convey it. In the classical case, if the receiver has some prior information about the messages being conveyed, less communication is needed. Here we explore the concept of prior quantum information: given an unknown quantum state distributed over two systems, we determine how much quantum communication is needed to transfer the full state to one system. This communication measures the partial information one system needs, conditioned on its prior information. We find that it is given by the conditional entropy--a quantity that was known previously, but lacked an operational meaning. In the classical case, partial information must always be positive, but we find that in the quantum world this physical quantity can be negative. If the partial information is positive, its sender needs to communicate this number of quantum bits to the receiver; if it is negative, then sender and receiver instead gain the corresponding potential for future quantum communication. We introduce a protocol that we term 'quantum state merging' which optimally transfers partial information. We show how it enables a systematic understanding of quantum network theory, and discuss several important applications including distributed compression, noiseless coding with side information, multiple access channels and assisted entanglement distillation.

  20. Locally indistinguishable subspaces spanned by three-qubit unextendible product bases

    NASA Astrophysics Data System (ADS)

    Duan, Runyao; Xin, Yu; Ying, Mingsheng

    2010-03-01

    We study the local distinguishability of general multiqubit states and show that local projective measurements and classical communication are as powerful as the most general local measurements and classical communication. Remarkably, this indicates that the local distinguishability of multiqubit states can be decided efficiently. Another useful consequence is that a set of orthogonal n-qubit states is locally distinguishable only if the summation of their orthogonal Schmidt numbers is less than the total dimension 2n. Employing these results, we show that any orthonormal basis of a subspace spanned by arbitrary three-qubit orthogonal unextendible product bases (UPB) cannot be exactly distinguishable by local operations and classical communication. This not only reveals another intrinsic property of three-qubit orthogonal UPB but also provides a class of locally indistinguishable subspaces with dimension 4. We also explicitly construct locally indistinguishable subspaces with dimensions 3 and 5, respectively. Similar to the bipartite case, these results on multipartite locally indistinguishable subspaces can be used to estimate the one-shot environment-assisted classical capacity of a class of quantum broadcast channels.

  1. Rising Health Expenditure Due to Non-Communicable Diseases in India: An Outlook.

    PubMed

    Barik, Debasis; Arokiasamy, Perianayagam

    2016-01-01

    With ongoing demographic transition, epidemiological transition has been emerged as a growing concern in India. The share of non-communicable disease in total disease burden has increased from 31% in 1990 to 45% in 2010. This paper seeks to explore the health scenario of India in the wake of the growing pace of non-communicable diseases such as diabetes and hypertension among Indian population using data from health and morbidity survey of the National Sample Survey Organisation (2004) and notifies about the resource needed to tackle this growing health risk. Given the share of private players (70%) in Indian health system, results indicate a higher private expenditure, mostly out-of-pocket expense, on account of non-communicable diseases. A timely look into the matter may tackle a more dreadful situation in near future.

  2. Rising Health Expenditure Due to Non-Communicable Diseases in India: An Outlook

    PubMed Central

    Barik, Debasis; Arokiasamy, Perianayagam

    2016-01-01

    With ongoing demographic transition, epidemiological transition has been emerged as a growing concern in India. The share of non-communicable disease in total disease burden has increased from 31% in 1990 to 45% in 2010. This paper seeks to explore the health scenario of India in the wake of the growing pace of non-communicable diseases such as diabetes and hypertension among Indian population using data from health and morbidity survey of the National Sample Survey Organisation (2004) and notifies about the resource needed to tackle this growing health risk. Given the share of private players (70%) in Indian health system, results indicate a higher private expenditure, mostly out-of-pocket expense, on account of non-communicable diseases. A timely look into the matter may tackle a more dreadful situation in near future. PMID:27965952

  3. Entanglement-Assisted Communication System for NASA's Deep-Space Missions

    NASA Technical Reports Server (NTRS)

    Kwiat, Paul; Bernstein, Herb; Javadi, Hamid

    2016-01-01

    For this project we have studied various forms of quantum communication, and quantum-enhanced classical communication. In particular, we have performed the first realization of a novel quantum protocol, superdense teleportation. We have also showed that in some cases, the advantages of superdense coding (which enhances classical channel capacity by up to a factor of two) can be realized without the use of entanglement. Finally, we considered some more advanced protocols, with the goal to realize 'superactivation' - two entangled channels have capabilities beyond the sum of the individual channels-and conclude that more study is needed in this area.

  4. 18 CFR 284.12 - Standards for pipeline business operations and communications.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Standards for pipeline business operations and communications. 284.12 Section 284.12 Conservation of Power and Water Resources..., private network connections using internet tools, internet directory services, and internet communication...

  5. Cable: Report to the President, 1974.

    ERIC Educational Resources Information Center

    Office of Telecommunications Policy, Washington, DC.

    A comprehensive, new national policy for cable communications is recommended by the Cabinet Committee on Cable Communications. The goal of the policy is to achieve the orderly integration of cable with other existing communications media so that information may flow freely, protected from both private and governmental barriers. The first two…

  6. 22 CFR 203.11 - Access to records and communications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Access to records and communications. 203.11 Section 203.11 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT REGISTRATION OF PRIVATE VOLUNTARY ORGANIZATIONS (PVOs) § 203.11 Access to records and communications. (a) All records, reports, and other...

  7. 78 FR 48626 - Private Land Mobile Radio Rules

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    ...-91] Private Land Mobile Radio Rules AGENCY: Federal Communications Commission. ACTION: Final rule... certification and use of Terrestrial Trunked Radio (TETRA) equipment in response to a petition for clarification... Part 90 of the Commission's Rules to permit the certification and use of Terrestrial Trunked Radio...

  8. The political economy of United States multiutilities: The United States electric power industry and communication services

    NASA Astrophysics Data System (ADS)

    Quail, Christine M.

    This study consists of a political economic analysis of the multiutility industry, the industry located at the confluence of electric utilities, telephone, cable, and Internet markets. The study uses a theoretical framework based in political economy and urban theory. Methodologies used include industrial analysis and instrumental analysis. A discussion of technological convergence establishes the technical means by which multiutilities developed. Refusing technological determinism, however, the study presents a critical analysis of the history, philosophy, and regulation of utilities. Distinctions are made between public and private ownership structures in the electric utility industry. Next, the study embarks on an industrial analysis of the multiutility industry. The industrial analysis includes a discussion of the industry's history, markets, ownership types, and legal struggles. Following the broad industrial overview, two case studies are presented: Hawarden Integrated Technology, Energy and Communications (HITEC), and Con Edison Communications, LLC. HITEC is a public multiutility in the City of Hawarden, Iowa. Con Edison Communications is a private multiutility, based in New York City. The case studies provide a vehicle by which theoretical and philosophical underpinnings, as well as general trends, in the multiutility industry are localized and concretized. Finally, the study draws conclusions about the nature, history, and future of public versus private control of multiutilities' converged communications infrastructures. Questions of democratic control of media infrastructures are raised.

  9. Locking classical correlations in quantum States.

    PubMed

    DiVincenzo, David P; Horodecki, Michał; Leung, Debbie W; Smolin, John A; Terhal, Barbara M

    2004-02-13

    We show that there exist bipartite quantum states which contain a large locked classical correlation that is unlocked by a disproportionately small amount of classical communication. In particular, there are (2n+1)-qubit states for which a one-bit message doubles the optimal classical mutual information between measurement results on the subsystems, from n/2 bits to n bits. This phenomenon is impossible classically. However, states exhibiting this behavior need not be entangled. We study the range of states exhibiting this phenomenon and bound its magnitude.

  10. Cooperative efforts by industry and government to develop geothermal resources

    NASA Technical Reports Server (NTRS)

    Butler, D. R.

    1974-01-01

    The Federal government's current plans for participation in the geothermal field appear to affect four major areas of interest: (1) resources exploration and assessment, (2) resources utilization projects, (3) advanced research and technology, and (4) environmental, legal, and institutional research. Private industry is also actively involved in these same areas of interest. Because of lack of coordination and communication between the private and public sector, it appears that there will be considerable duplication of effort, and, in some cases, serious conflict. It is also likely that this lack of coordination and communication may result in lack of effort in some key areas. Close coordination and communication between government and industry may resolve some of the major problems that are clearly evident.

  11. Information transmission in microbial and fungal communication: from classical to quantum.

    PubMed

    Majumdar, Sarangam; Pal, Sukla

    2018-06-01

    Microbes have their own communication systems. Secretion and reception of chemical signaling molecules and ion-channels mediated electrical signaling mechanism are yet observed two special ways of information transmission in microbial community. In this article, we address the aspects of various crucial machineries which set the backbone of microbial cell-to-cell communication process such as quorum sensing mechanism (bacterial and fungal), quorum sensing regulated biofilm formation, gene expression, virulence, swarming, quorum quenching, role of noise in quorum sensing, mathematical models (therapy model, evolutionary model, molecular mechanism model and many more), synthetic bacterial communication, bacterial ion-channels, bacterial nanowires and electrical communication. In particular, we highlight bacterial collective behavior with classical and quantum mechanical approaches (including quantum information). Moreover, we shed a new light to introduce the concept of quantum synthetic biology and possible cellular quantum Turing test.

  12. 76 FR 27296 - Private Land Mobile Radio Service Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-11

    ... copies for each additional docket or rulemaking number. Filings can be sent by hand or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail. All filings... 11-63] Private Land Mobile Radio Service Regulations AGENCY: Federal Communications Commission...

  13. Private Pilot Ground School Course. Instructor's Guide.

    ERIC Educational Resources Information Center

    Schlenker, Richard M.

    This manual consists of 10 lesson plans for use by instructors teaching a private pilot ground school course. Addressed in the individual lesson plans are the following topics: aerodynamics and principles of flight, flight instruments and systems, operational publications, regulations, airplane operations, engine operations, radio communications,…

  14. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  15. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  16. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  17. Economic benefits of commercial space activities

    NASA Technical Reports Server (NTRS)

    Stone, Barbara A.

    1988-01-01

    This paper discusses the current and potential impact on the economy of selected private sector space activities including materials processing in space and satellite communications. Spacehab, a commercially developed and manufactured pressurized metal cylinder which fits in the Shuttle payload bay and connects to the crew compartment is examined along with potential uses of the Shuttle external tank. Private sector upper stage development, the privatization of expendable launch vehicles, and the transfer of NASA technology are discussed.

  18. Benefits communication: its impact on employee benefits satisfaction under flexible programs.

    PubMed

    Rabin, B R

    1994-01-01

    Using field data from a private organization in upstate New York, a large statistically significant portion of benefits satisfaction was explained by benefits communication, employee benefits choice and change patterns, and demographics. Users of the organization's benefits communication materials and employees reporting fewer unmet benefits needs are more satisfied.

  19. Your Competitive Edge: The Art of Interpersonal Communication

    ERIC Educational Resources Information Center

    Montgomery, Judy K.

    2006-01-01

    In our professional lives in schools, hospitals, private practices, and universities, speech-language pathologists often pride ourselves on being communication experts--but are we? We may know how to diagnose and treat a wide range of communication disabilities, but can we effectively get our message across to our colleagues and families? Raymond…

  20. Communicating with Employees about Pension and Welfare Benefits.

    ERIC Educational Resources Information Center

    Srb, Jozetta H.

    The purpose of this report is to examine some of the problems of communication with employees about pension and welfare benefits. Issues discussed relate to (1) employees' attitudes toward benefits and benefit communication, (2) the structure of private benefit programs, (3) the case for fair labeling, and (4) the trend toward statutory criteria…

  1. A Narrative Inquiry Exploring How College Communication Professors Engage Students with Public Speaking Apprehension

    ERIC Educational Resources Information Center

    Riedel, Derek

    2012-01-01

    The purpose of this qualitative study was to discover how communication professors at four-year private universities help students who exhibit public speaking apprehension (PSA) learn to cope with their anxiety. The research was framed in the narrative inquiry paradigm, interviewing eight college communication professors about their experiences…

  2. Experimental realization of the analogy of quantum dense coding in classical optics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Zhenwei; Sun, Yifan; Li, Pengyun

    2016-06-15

    We report on the experimental realization of the analogy of quantum dense coding in classical optical communication using classical optical correlations. Compared to quantum dense coding that uses pairs of photons entangled in polarization, we find that the proposed design exhibits many advantages. Considering that it is convenient to realize in optical communication, the attainable channel capacity in the experiment for dense coding can reach 2 bits, which is higher than that of the usual quantum coding capacity (1.585 bits). This increased channel capacity has been proven experimentally by transmitting ASCII characters in 12 quaternary digitals instead of the usualmore » 24 bits.« less

  3. Single-shot secure quantum network coding on butterfly network with free public communication

    NASA Astrophysics Data System (ADS)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  4. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  5. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  6. Privacy and the Private Eye in Space.

    ERIC Educational Resources Information Center

    Smith, William E.

    Land remote-sensing satellites are developing as a commercial communications technology after years under a government monopoly. The shift to the private sector and improving quality of the pictures produced have given rise to increased concerns about the potential for violations of privacy rights. Although satellites can currently photograph only…

  7. Organizational Rhetoric in the Prospectuses of Elite Private Schools: Unpacking Strategies of Persuasion

    ERIC Educational Resources Information Center

    McDonald, Paula; Pini, Barbara; Mayes, Robyn

    2012-01-01

    The way in which private schools use rhetoric in their communications offers important insights into how these organizational sites persuade audiences and leverage marketplace advantage in the context of contemporary educational platforms. Through systemic analysis of rhetorical strategies employed in 65 "elite" school prospectuses in…

  8. Use of Synchronous Online Tools in Private English Language Teaching in Russia

    ERIC Educational Resources Information Center

    Kozar, Olga

    2012-01-01

    Like many other industries, private tutoring is now being transformed by the growth of information and communication technologies (ICT). An increasing number of educational entrepreneurs in different countries are incorporating Internet tools in their professional practice. While the popularity of online tutoring in countries with widespread…

  9. Misunderstandings and Ensuring Understanding in Private ELF Talk

    ERIC Educational Resources Information Center

    Pietikäinen, Kaisa S.

    2018-01-01

    Although misunderstandings as such have been extensively studied, the ways in which problems of understanding are avoided--especially in cross-cultural communication--have so far received limited attention. This article examines over 24 h of private conversation data from seven established, intercultural couples who use lingua franca English as…

  10. Research in space commercialization, technology transfer and communications, vol. 2

    NASA Technical Reports Server (NTRS)

    Dunn, D. A.; Agnew, C. E.

    1983-01-01

    Spectrum management, models for evaluating communications systems, and implications of communications regulations for NASA are considered as major parts of communications policy. Marketing LANDSAT products in developing countries, a political systems analysis of LANDSAT, and private financing and operation of the space operations center (space station) are discussed. Investment requirements, risks, government support, and other primary business and management considerations are examined.

  11. 47 CFR 1.1116 - General exemptions to charges.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Commission authorization in any other mass media radio service (except the international broadcast (HF) service) private radio service, or common carrier radio communications service otherwise requiring a fee....1116 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Schedule of...

  12. A Communication Perspective on Sexual Harassment: Affiliative Nonverbal Behaviors in Asynchronous Relationships.

    ERIC Educational Resources Information Center

    Hickson, Mark, III; And Others

    1991-01-01

    Develops a communication perspective on sexual harassment in asynchronous relationships. Presents a six-step process model to predict private harassing behavior among faculty members in higher education. Makes suggestions for prevention of sexual harassment. (SR)

  13. Consistency and Change: The (R)Evolution of the Basic Communication Course

    ERIC Educational Resources Information Center

    Valenzano, Joseph M., III; Wallace, Samuel P.; Morreale, Sherwyn P.

    2014-01-01

    The basic communication course, with its roots in classical Greece and Rome, is frequently a required course in general education. The course often serves as our "front porch," welcoming new students to the Communication discipline. This essay first outlines early traditions in oral communication instruction and their influence on future…

  14. The young Lipset on the iron law of oligarchy: a taste of things to come.

    PubMed

    McGovern, Patrick

    2010-01-01

    Lipset's 'Democracy in Private Government' was a remarkable publication for three reasons. It was his first attempt to challenge Michels' 'iron law of oligarchy' and would lead to a programme of research that that would culminate with the publication of the widely admired classic study Union Democracy. Second, the inspiration for this work came from Lipset's student days when he was a socialist activist trying to understand why leftist governments often failed to carry out substantial programmes of social reform. Third, although it was one of his earliest publications it bears all the hallmarks of the work that would subsequently make Lipset a giant of political sociology: the enthusiasm for classic sociological problems; the appreciation of history; and the ingenious use of the small n comparative approach. Finally, I would argue that Lipset's study of democracy within private government represents a missed opportunity for sociology though there are signs that this is being rectified in recent years.

  15. EPR Steering inequalities with Communication Assistance

    PubMed Central

    Nagy, Sándor; Vértesi, Tamás

    2016-01-01

    In this paper, we investigate the communication cost of reproducing Einstein-Podolsky-Rosen (EPR) steering correlations arising from bipartite quantum systems. We characterize the set of bipartite quantum states which admits a local hidden state model augmented with c bits of classical communication from an untrusted party (Alice) to a trusted party (Bob). In case of one bit of information (c = 1), we show that this set has a nontrivial intersection with the sets admitting a local hidden state and a local hidden variables model for projective measurements. On the other hand, we find that an infinite amount of classical communication is required from an untrusted Alice to a trusted Bob to simulate the EPR steering correlations produced by a two-qubit maximally entangled state. It is conjectured that a state-of-the-art quantum experiment would be able to falsify two bits of communication this way. PMID:26880376

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demkowicz-Dobrzanski, Rafal; Lewenstein, Maciej; Institut fuer Theoretische Physik, Universitaet Hannover, D-30167 Hannover

    We solve the problem of the optimal cloning of pure entangled two-qubit states with a fixed degree of entanglement using local operations and classical communication. We show that, amazingly, classical communication between the parties can improve the fidelity of local cloning if and only if the initial entanglement is higher than a certain critical value. It is completely useless for weakly entangled states. We also show that bound entangled states with positive partial transpose are not useful as a resource to improve the best local cloning fidelity.

  17. Asymmetric information capacities of reciprocal pairs of quantum channels

    NASA Astrophysics Data System (ADS)

    Rosati, Matteo; Giovannetti, Vittorio

    2018-05-01

    Reciprocal pairs of quantum channels are defined as completely positive transformations which admit a rigid, distance-preserving, yet not completely positive transformation that allows one to reproduce the outcome of one from the corresponding outcome of the other. From a classical perspective these transmission lines should exhibit the same communication efficiency. This is no longer the case in the quantum setting: explicit asymmetric behaviors are reported studying the classical communication capacities of reciprocal pairs of depolarizing and Weyl-covariant channels.

  18. Practical cryptographic strategies in the post-quantum era

    NASA Astrophysics Data System (ADS)

    Kabanov, I. S.; Yunusov, R. R.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-02-01

    Quantum key distribution technologies promise information-theoretic security and are currently being deployed in com-mercial applications. We review new frontiers in information security technologies in communications and distributed storage applications with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography. We analyze the cur-rent state-of-the-art, critical characteristics, development trends, and limitations of these techniques for application in enterprise information protection systems. An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is discussed.

  19. Direct and reverse secret-key capacities of a quantum channel.

    PubMed

    Pirandola, Stefano; García-Patrón, Raul; Braunstein, Samuel L; Lloyd, Seth

    2009-02-06

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication (direct reconciliation) or a single feedback classical communication (reverse reconciliation). In particular, the reverse secret-key capacity can be positive for antidegradable channels, where no forward strategy is known to be secure. This property is explicitly shown in the continuous variable framework by considering arbitrary one-mode Gaussian channels.

  20. Overcoming Communication Restrictions in Collectives

    NASA Technical Reports Server (NTRS)

    Tumer, Kagan; Agogino, Adrian K.

    2004-01-01

    Many large distributed system are characterized by having a large number of components (eg., agents, neurons) whose actions and interactions determine a %orld utility which rates the performance of the overall system. Such collectives are often subject to communication restrictions, making it difficult for components which try to optimize their own private utilities, to take actions that also help optimize the world utility. In this article we address that coordination problem and derive four utility functions which present different compromises between how aligned a component s private utility is with the world utility and how readily that component can determine the actions that optimize its utility. The results show that the utility functions specifically derived to operate under communication restrictions outperform both traditional methods and previous collective-based methods by up to 75%.

  1. College Students' Use of Technology to Communicate with Romantic Partners about Sexual Health Issues

    ERIC Educational Resources Information Center

    Tannebaum, Michael

    2018-01-01

    Objective: To examine college students' technology-assisted sexual communication perceptions and practices alongside their beliefs about the effectiveness of face-to-face (F-t-F) sexual communication. Participants: 144 college students at a private university in the Northeast, U.S., completed a survey in October 2016. Method: A cross-sectional…

  2. Limitation to Communication of Fermionic System in Accelerated Frame

    NASA Astrophysics Data System (ADS)

    Chang, Jinho; Kwon, Younghun

    2015-03-01

    In this article, we investigate communication between an inertial observer and an accelerated observer, sharing fermionic system, when they use classical and quantum communication using single rail or dual rail encoding. The purpose of this work is to understand the limit to the communication between an inertial observer and an accelerated observer, with single rail or dual rail encoding of fermionic system. We observe that at the infinite acceleration, the coherent information of single(or double) rail quantum channel vanishes, but those of classical ones may have finite values. In addition, we see that even when considering a method beyond the single-mode approximation, for the communication between Alice and Bob, the dual rail entangled state seems to provide better information transfer than the single rail entangled state, when we take a fixed choice of the Unruh mode. Moreover, we find that the single-mode approximation may not be sufficient to analyze communication of fermionic system in an accelerated frame.

  3. 47 CFR 90.403 - General operating requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... communications in progress and such other measures as may be necessary to minimize the potential for causing... 90.403 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.403 General operating requirements...

  4. 47 CFR 27.1340 - Reporting obligations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1340 Reporting obligations. (a) The Upper 700 MHz D Block licensee and the Public Safety Broadband Licensee shall jointly file quarterly reports with...

  5. 47 CFR 27.1327 - Construction requirements; criteria for renewal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Construction requirements; criteria for renewal. 27.1327 Section 27.1327 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  6. 47 CFR 27.1327 - Construction requirements; criteria for renewal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Construction requirements; criteria for renewal. 27.1327 Section 27.1327 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  7. 47 CFR 27.1340 - Reporting obligations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1340 Reporting obligations. (a) The Upper 700 MHz D Block licensee and the Public Safety Broadband Licensee shall jointly file quarterly reports with...

  8. 47 CFR 27.1340 - Reporting obligations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27.1340 Reporting obligations. (a) The Upper 700 MHz D Block licensee and the Public Safety Broadband Licensee shall jointly file quarterly reports with...

  9. 47 CFR 27.1327 - Construction requirements; criteria for renewal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Construction requirements; criteria for renewal. 27.1327 Section 27.1327 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  10. Population communication services: a global perspective.

    PubMed

    Piotrow, P T; Coleman, P L; Rimon, J G

    1987-06-01

    Communication support for health and family planning programs is receiving renewed attention. The johns Hopkins University (JHU) Population Communication Services (PCS) project was established in 1982 to respond to the increasing need for communication expertise, to provide a responsive source for advice, and to develop implement the new directions that are necessary to make family planning communication programs more effective. The project extends a range of services to government programs, private family planning associations, and to media that want to improve the content or coverage of family planning communication, JHU/PCS emphasizes the close links between good communication and good management and the need for managers at all levels, from the Minister of Health to the supervisor of grass-roots field workers, to understand the components of a communication program for the 1980s. Principles underlying the project's work include: communication as process rather than product, the audience as participant, linking mass media and interpersonal communication, coordination with and among agencies, training that is specific and relevant, IEC as institution building, use of the private sector, an attempt to recover some of the costs of IEC work, and ongoing evaluation of program activities. IEC activities can be strengthened considerably b a knowledgeable commitment at the top of the decision-making process; constant feedback from intended audiences; and interactions among service delivery personnel, influential community members, and the media. In turn, strong IEC activities can substantially strengthen existing family planning programs.

  11. Perceived outcomes of public health privatization: a national survey of local health department directors.

    PubMed

    Keane, C; Marx, J; Ricci, E

    2001-01-01

    Almost three quarters of the nation's local health departments (LHDs) have privatized some services. About half of LHD directors who privatized services reported cost savings and half reported that privatization had facilitated their performance of the core public health functions. Expanded access to services was the most commonly reported positive outcome. Of those privatizing, over two-fifths of LHDs reported a resulting increase in time devoted to management. Yet, one-third of directors reported difficulty monitoring and controlling services that have been contracted out. Communicable disease services was cited most often as a service that should not be privatized. There is a pervasive concern that by contracting out services, health departments can lose the capacity to respond to disease outbreaks and other crises.

  12. Perceived Outcomes of Public Health Privatization: A National Survey of Local Health Department Directors

    PubMed Central

    Keane, Christopher; Marx, John; Ricci, Edmund

    2001-01-01

    Almost three quarters of the nation's local health departments (LHDs) have privatized some services. About half of LHD directors who privatized services reported cost savings and half reported that privatization had facilitated their performance of the core public health functions. Expanded access to services was the most commonly reported positive outcome. Of those privatizing, over two-fifths of LHDs reported a resulting increase in time devoted to management. Yet, one-third of directors reported difficulty monitoring and controlling services that have been contracted out. Communicable disease services was cited most often as a service that should not be privatized. There is a pervasive concern that by contracting out services, health departments can lose the capacity to respond to disease outbreaks and other crises. PMID:11286093

  13. 77 FR 28797 - Redundancy of Communications Systems: Backup Power Private Land Mobile Radio Services: Selection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... Systems: Backup Power Private Land Mobile Radio Services: Selection and Assignment of Frequencies, and... certain rule provisions that are without current legal effect and obsolete. These nonsubstantive revisions... current legal effect and is deleted as obsolete. 2. This Order also deletes a rule providing that UHF...

  14. Effects of ICT Integration in Management of Private Secondary Schools in Nairobi County, Kenya: Policy Options and Practices

    ERIC Educational Resources Information Center

    Oyier, Charles Richard; Odundo, Paul Amollo; Lilian, Ganira Khavugwi; Wangui, Kahiga Ruth

    2015-01-01

    The convergence between telecommunication, broadcasting multimedia and related technologies commonly known as Information and Communication Technologies (ICT), promises a fundamental change in educational management. ICT could be the missing tool in improving efficiency of private secondary schools to cope with rapidly changing world to…

  15. 76 FR 25344 - Information Collection(s) Being Reviewed by the Federal Communications Commission

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... Second Report and Order the Commission decided to designate one or more database administrators from the private sector to create and operate TV bands databases. The TV band database administrators will act on behalf of the FCC, but will offer a privately owned and operated service. Each database administrator...

  16. Marketing Strategies for a Low Endowment Private University in the 1990's.

    ERIC Educational Resources Information Center

    Wallingford, Harlan P.; Berger, Karen

    1993-01-01

    It is suggested that low-endowment private universities must apply better marketing techniques in strategic planning to ensure survival. Recommendations are made for using market research effectively, identifying new markets, and directing media communication accurately. The student's role as consumer is seen as the starting point for product and…

  17. Name-Based Address Mapping for Virtual Private Networks

    NASA Astrophysics Data System (ADS)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  18. Communication Education and Instructional Communication: Genesis and Evolution as Fields of Inquiry

    ERIC Educational Resources Information Center

    Morreale, Sherwyn; Backlund, Philip; Sparks, Leyla

    2014-01-01

    Communication education is concerned with the communicative aspects of teaching and learning in various situations and contexts. Although the historical roots of this area of inquiry date back to the classical study of rhetoric by the Greeks and Romans, this report focuses on the field's emergence as an important area of modern scholarly…

  19. Local quantum transformations requiring infinite rounds of classical communication.

    PubMed

    Chitambar, Eric

    2011-11-04

    In this Letter, we investigate the number of measurement and communication rounds needed to implement certain tasks by local quantum operations and classical communication (LOCC), a relatively unexplored topic. To demonstrate the possible strong dependence on the round number, we consider the problem of converting three-qubit entanglement into two-qubit form, specifically in the random distillation setting of [Phys. Rev. Lett. 98, 260501 (2007)]. We find that the number of LOCC rounds needed for a transformation can depend on the amount of entanglement distilled. In fact, for a wide range of transformations, the required number of rounds is infinite (unbounded). This represents the first concrete example of a task needing an infinite number of rounds to implement.

  20. A novel quantum solution to secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  1. Reaching Agreement in Quantum Hybrid Networks.

    PubMed

    Shi, Guodong; Li, Bo; Miao, Zibo; Dower, Peter M; James, Matthew R

    2017-07-20

    We consider a basic quantum hybrid network model consisting of a number of nodes each holding a qubit, for which the aim is to drive the network to a consensus in the sense that all qubits reach a common state. Projective measurements are applied serving as control means, and the measurement results are exchanged among the nodes via classical communication channels. In this way the quantum-opeartion/classical-communication nature of hybrid quantum networks is captured, although coherent states and joint operations are not taken into consideration in order to facilitate a clear and explicit analysis. We show how to carry out centralized optimal path planning for this network with all-to-all classical communications, in which case the problem becomes a stochastic optimal control problem with a continuous action space. To overcome the computation and communication obstacles facing the centralized solutions, we also develop a distributed Pairwise Qubit Projection (PQP) algorithm, where pairs of nodes meet at a given time and respectively perform measurements at their geometric average. We show that the qubit states are driven to a consensus almost surely along the proposed PQP algorithm, and that the expected qubit density operators converge to the average of the network's initial values.

  2. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  3. 47 CFR 1.9005 - Included services.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... following services, which include Wireless Radio Services in which commercial or private licensees hold...) The broadband Personal Communications Service (part 24 of this chapter); (h) The Broadband Radio...) The Wireless Communications Service in the 698-746 MHz band (part 27 of this chapter); (k) The...

  4. 47 CFR 90.15 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... emergency repair of public communications facilities. Entities not meeting these eligibility criteria may... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.15 Scope. The Public Safety Radio Pool covers the licensing of the...

  5. 47 CFR 90.15 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... emergency repair of public communications facilities. Entities not meeting these eligibility criteria may... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.15 Scope. The Public Safety Radio Pool covers the licensing of the...

  6. 47 CFR 90.15 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... emergency repair of public communications facilities. Entities not meeting these eligibility criteria may... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.15 Scope. The Public Safety Radio Pool covers the licensing of the...

  7. 47 CFR 90.15 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... emergency repair of public communications facilities. Entities not meeting these eligibility criteria may... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.15 Scope. The Public Safety Radio Pool covers the licensing of the...

  8. 47 CFR 90.15 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... emergency repair of public communications facilities. Entities not meeting these eligibility criteria may... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Public Safety Radio Pool § 90.15 Scope. The Public Safety Radio Pool covers the licensing of the...

  9. BOOK REVIEW: HANDBOOK OF URBAN HEALTH: POPULATIONS, METHODS AND PRACTICE

    EPA Science Inventory

    In Clifford D. Simak's 1952 science fiction classic, City, the metropolis is dead by the end of the 20th century. Cheap atomic power and ubiquitous private helicopters have made concentrated human existence a quaint memory. Simak could not have been more wrong, of course. About h...

  10. Flavor Crystals as Brain Food: Unplug TV Commercials in School.

    ERIC Educational Resources Information Center

    Fox, Roy F.

    1997-01-01

    Classic propaganda techniques (repetition, testimonials, transfers of one quality to another, and painstaking imagery) work best in "closed" environments--exactly the situation advertisers have in Channel-One classrooms. Private, vulnerable, and sacred, the human psyche is not a commodity to be sold. Yet, such commerce will continue…

  11. Proceedings of the Annual Meeting of the Association for Education in Journalism and Mass Communication (79th, Anaheim, CA, August 10-13, 1996). International Communications Division.

    ERIC Educational Resources Information Center

    Association for Education in Journalism and Mass Communication.

    The international communications section of the Proceedings contains the following 14 papers: "Spinning Stories: Latin America and the World Wide Web" (Eliza Tanner); "Private-Enterprise Broadcasting and Accelerating Dependency: Case Studies from Nigeria and Uganda" (Folu Folarin Ogundimu); "The Transitional Media System…

  12. Communications and Alumni Relations: What Is the Correlation between an Institution's Communications Vehicles and Alumni Annual Giving?

    ERIC Educational Resources Information Center

    Levine, Wendy

    2008-01-01

    This paper examines the relationship between colleges' communications pieces and their undergraduate alumni giving. In order to test the question, 250 surveys were mailed to annual giving and development directors at private US colleges that were members of the Council of Advancement and Support of Education. Fifty-eight surveys were returned. The…

  13. A private ultraviolet channel in visual communication.

    PubMed Central

    Cummings, Molly E; Rosenthal, Gil G; Ryan, Michael J

    2003-01-01

    Although private communication is considered an important diversifying force in evolution, there is little direct behavioural evidence to support this notion. Here, we show that ultraviolet (UV) signalling in northern swordtails (Xiphophorus) affords a channel for communication that is not accessible to their major predator, Astyanax mexicanus, the Mexican tetra. Laboratory and field behavioural experiments with swordtails (X. nigrensis) and predators (A. mexicanus) demonstrate that male UV ornamentation significantly increases their attractiveness to females but not to this predator, which is less sensitive to UV. UV reflectance among swordtail species correlates positively with tetra densities across habitats, and visual contrast estimates suggest that UV signals are highly conspicuous to swordtails in their natural environment. Cross-species comparisons also support the hypothesis that natural selection drives the use of UV communication. We compared two species, one with high (X. nigrensis) and one with low (X. malinche) Mexican tetra densities. Xiphophorus nigrensis males reflect significantly more UV than X. malinche, exhibit significant UV sexual dimorphism, and UV is a salient component of the sexual communication system. In X. malinche, however, males reflect minimally in the UV, there is no UV sexual dimorphism, and UV does not play a part in its communication system. PMID:12803903

  14. A private ultraviolet channel in visual communication.

    PubMed

    Cummings, Molly E; Rosenthal, Gil G; Ryan, Michael J

    2003-05-07

    Although private communication is considered an important diversifying force in evolution, there is little direct behavioural evidence to support this notion. Here, we show that ultraviolet (UV) signalling in northern swordtails (Xiphophorus) affords a channel for communication that is not accessible to their major predator, Astyanax mexicanus, the Mexican tetra. Laboratory and field behavioural experiments with swordtails (X. nigrensis) and predators (A. mexicanus) demonstrate that male UV ornamentation significantly increases their attractiveness to females but not to this predator, which is less sensitive to UV. UV reflectance among swordtail species correlates positively with tetra densities across habitats, and visual contrast estimates suggest that UV signals are highly conspicuous to swordtails in their natural environment. Cross-species comparisons also support the hypothesis that natural selection drives the use of UV communication. We compared two species, one with high (X. nigrensis) and one with low (X. malinche) Mexican tetra densities. Xiphophorus nigrensis males reflect significantly more UV than X. malinche, exhibit significant UV sexual dimorphism, and UV is a salient component of the sexual communication system. In X. malinche, however, males reflect minimally in the UV, there is no UV sexual dimorphism, and UV does not play a part in its communication system.

  15. Professional Communication as Phatic: From Classical "Eunoia" to Personal Artificial Intelligence

    ERIC Educational Resources Information Center

    Porter, James E.

    2017-01-01

    "Phatic" refers to the rhetorical function of creating effective communication channels, keeping them open, and establishing ongoing and fruitful relationships, all of which are vital in the age of digital rhetoric, social media, and global intercultural exchange. In this realm, the professional communicator functions less as an…

  16. Communication Arts in the Ancient World.

    ERIC Educational Resources Information Center

    Havelock, Eric A., Ed.; Hershbell, Jackson P., Ed.

    Intended for both classicists and nonclassicists, this volume explores the beginnings of literacy in ancient Greece and Rome and examines the effects of written communication on these cultures. The nine articles, written by classical scholars and educators in the field of communication, discuss the following: the superiority of the alphabet over…

  17. 47 CFR 27.1335 - Prohibition on discontinuance of public safety operations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Prohibition on discontinuance of public safety operations. 27.1335 Section 27.1335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  18. 47 CFR 27.1335 - Prohibition on discontinuance of public safety operations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 2 2012-10-01 2012-10-01 false Prohibition on discontinuance of public safety operations. 27.1335 Section 27.1335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  19. 47 CFR 27.1335 - Prohibition on discontinuance of public safety operations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 2 2011-10-01 2011-10-01 false Prohibition on discontinuance of public safety operations. 27.1335 Section 27.1335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES 700 MHz Public/Private Partnership § 27...

  20. All-optical OFDM network coding scheme for all-optical virtual private communication in PON

    NASA Astrophysics Data System (ADS)

    Li, Lijun; Gu, Rentao; Ji, Yuefeng; Bai, Lin; Huang, Zhitong

    2014-03-01

    A novel optical orthogonal frequency division multiplexing (OFDM) network coding scheme is proposed over passive optical network (PON) system. The proposed scheme for all-optical virtual private network (VPN) does not only improve transmission efficiency, but also realize full-duplex communication mode in a single fiber. Compared with the traditional all-optical VPN architectures, the all-optical OFDM network coding scheme can support higher speed, more flexible bandwidth allocation, and higher spectrum efficiency. In order to reduce the difficulty of alignment for encoding operation between inter-communication traffic, the width of OFDM subcarrier pulse is stretched in our proposed scheme. The feasibility of all-optical OFDM network coding scheme for VPN is verified, and the relevant simulation results show that the full-duplex inter-communication traffic stream can be transmitted successfully. Furthermore, the tolerance of misalignment existing in inter-ONUs traffic is investigated and analyzed for all-optical encoding operation, and the difficulty of pulse alignment is proved to be lower.

  1. Operational and Strategic Leadership: What are the Distinctions

    DTIC Science & Technology

    2016-06-01

    in communicating might also demonstrate important skills . This study will analyze the leaders’ processes for information collection and decision...organization runs as smoothly as possible.”88 Administrative skills enable a leader to pursue the strategy he deems appropriate. Communication ... Communication is another skill classical writers often identify. Communication includes both written and verbal direction. Roskill elucidates this skill in

  2. Blended Learning (BL) as Pedagogical Alternative to Teach Business Communication Course: Case Study of UUM Executive Diploma Program

    ERIC Educational Resources Information Center

    Dzakiria, Hisham; Don @ A. Wahab, Mohd Sobri; Abdul Rahman, Hamzah Dato'

    2012-01-01

    Globally, blended learning (BL) technologies have been increasingly applied in a variety of fields, both public and private sectors. In recent years, universities, public and private businesses and organizations are among those employing blended learning methods and technologies in training and re-training of professionals in the workforce. In…

  3. Communicating with nonindustrial private forest-land owners: Getting programs on target

    Treesearch

    Thomas W. Birch; Nancy A. Pywell; Nancy A. Pywell

    1986-01-01

    Nonindustrial private forest-land owners can be motivated 1, by programs directed to their needs and objectives. Seven target audiences in Pennsylvania were defined and outlets for information programs identified for each target I audience. The primary objectives of each group and the benefits they expect from owning forest land were considered in the preparation of...

  4. The One Laptop School: Equipping Rural Elementary Schools in South India through Public Private Partnerships

    ERIC Educational Resources Information Center

    Byker, Erik Jon

    2015-01-01

    This article reports on a Public Private Partnership (PPP) program in South India that provided information and communication technology (ICT) to rural elementary schools. The article examined the current status of rural, government-run elementary schools in India by reviewing reports like the Annual Status of Education Report (ASER) in India.…

  5. The Maine Vernal Pool Mapping and Assessment Program: Engaging Municipal Officials and Private Landowners in Community-Based Citizen Science

    NASA Astrophysics Data System (ADS)

    Jansujwicz, Jessica S.; Calhoun, Aram J. K.; Lilieholm, Robert J.

    2013-12-01

    The Vernal Pool Mapping and Assessment Program (VPMAP) was initiated in 2007 to create a vernal pool database as a planning tool to foster local compliance with new state vernal pool regulations. In the northeastern United States, vernal pools are seasonal wetlands that provide critical breeding habitat for a number of amphibians and invertebrates and provide important resting and foraging habitat for some rare and endangered state-listed species. Using participant observation, interviews, and focus groups, we examined the engagement of municipal officials and private landowners in VPMAP. Important outcomes of municipal and landowner engagement included mobilization of town support for proactive planning, improved awareness and understanding of vernal pools, and increased interactions between program coordinators, municipal officials, and private landowners. Challenges to municipal and landowner engagement included an inconsistency in expectations between coordinators and municipal officials and a lack of time and sufficient information for follow-up with landowners participating in VPMAP. Our study highlights the importance of developing relationships among coordinators, municipal officials, and private landowners in facilitating positive outcomes for all stakeholders and for effective resource management. We suggest an expanded citizen science model that focuses on improving two-way communication among project coordinators, municipal officials, and local citizens and places communication with private landowners on par with volunteer citizen scientist recruitment and field training. Lessons learned from this research can inform the design and implementation of citizen science projects on private land.

  6. Noiseless method for checking the Peres separability criterion by local operations and classical communication

    NASA Astrophysics Data System (ADS)

    Bai, Yan-Kui; Li, Shu-Shen; Zheng, Hou-Zhi

    2005-11-01

    We present a method for checking the Peres separability criterion in an arbitrary bipartite quantum state ρAB within local operations and classical communication scenario. The method does not require noise operation which is needed in making the partial transposition map physically implementable. The main task for the two observers, Alice and Bob, is to measure some specific functions of the partial transposed matrix. With these functions, they can determine the eigenvalues of ρABTB , among which the minimum serves as an entanglement witness.

  7. Communicating physics and the design of textbooks

    NASA Astrophysics Data System (ADS)

    Barojas, J.; Trigueros, M.

    1991-05-01

    The cognitive domains of a communication scheme for learning physics are related to a framework based on epistemology, and the planning of an introductory calculus textbook in classical mechanics is shown as an example of application.

  8. Distributions of underdense meteor trail amplitudes and its application to meteor scatter communication system design

    NASA Astrophysics Data System (ADS)

    Weitzen, J. A.; Bourque, S.; Ostergaard, J. C.; Bench, P. M.; Baily, A. D.

    1991-04-01

    Analysis of data from recent experiments leads to the observation that distributions of underdense meteor trail peak signal amplitudes differ from classic predictions. In this paper the distribution of trail amplitudes in decibels relative 1 W (dBw) is considered, and it is shown that Lindberg's theorem can be used to apply central limit arguments to this problem. It is illustrated that a Gaussian model for the distribution of the logarithm of the peak received signal level of underdense trails provides a better fit to data than classic approaches. Distributions of underdense meteor trail amplitudes at five frequencies are compared to a Gaussian distribution and the classic model. Implications of the Gaussian assumption on the design of communication systems are discussed.

  9. Facilitators and barriers to participation of private sector health facilities in government-led schemes for maternity services in India: a qualitative study.

    PubMed

    Yadav, Vikas; Kumar, Somesh; Balasubramaniam, Sudharsanam; Srivastava, Ashish; Pallipamula, Suranjeen; Memon, Parvez; Singh, Dinesh; Bhargava, Saurabh; Sunil, Greeshma Ann; Sood, Bulbul

    2017-06-22

    Despite provision of accreditation of private sector health providers in government-led schemes for maternity services in India, their participation has been low. This has led to an underutilisation of their presence, resources and expertise for providing quality maternal and newborn health services. This study explores the perception of various stakeholders on expectations, benefits, barriers and facilitators to private sector participation in government-led schemes-specifically Janani Suraksha Yojana (JSY)-for maternity service delivery. Narrative-based qualitative study. Face-to-face in-depth interviews were conducted with study participants. The interviews were transcribed, translated and analysed using a reflexive and inductive approach to allow codes, categories and themes to emerge from within the data. Private obstetricians, government health officials and FOGSI (Federation of Obstetrics and Gynaecological Societies of India) members, Jharkhand and Uttar Pradesh, India. Eighteen purposefully selected private obstetricians from 9 cities across states of Uttar Pradesh and Jharkhand, 11 government health officials and 2 FOGSI members. The major factors serving as barriers to participation of private practitioners in JSY-which emerged on thematic analysis-were low reimbursement amounts, delayed reimbursements, process of interaction with the government and administrative issues, previous experiences and trust deficit, lack of clarity on the accreditation process and patient-level barriers. On the other hand, factors which were facilitators to participation of private practitioners were ease of process, better communication, branding, motivation of increasing clientele as well as satisfaction of doing social service. Factors such as financial processes and administrative delays, mistrust between the stakeholders, ambiguity in processes, lack of transparency and lack of ease in the process of empanelment of private sector are hindering effective public-private partnerships under JSY. Simplifying and strengthening the processes, communication strategies and branding can help revitalise it. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  10. Facilitators and barriers to participation of private sector health facilities in government-led schemes for maternity services in India: a qualitative study

    PubMed Central

    Yadav, Vikas; Kumar, Somesh; Balasubramaniam, Sudharsanam; Pallipamula, Suranjeen; Memon, Parvez; Singh, Dinesh; Bhargava, Saurabh; Sunil, Greeshma Ann; Sood, Bulbul

    2017-01-01

    Objective Despite provision of accreditation of private sector health providers in government-led schemes for maternity services in India, their participation has been low. This has led to an underutilisation of their presence, resources and expertise for providing quality maternal and newborn health services. This study explores the perception of various stakeholders on expectations, benefits, barriers and facilitators to private sector participation in government-led schemes—specifically Janani Suraksha Yojana (JSY)—for maternity service delivery. Design Narrative-based qualitative study. Face-to-face in-depth interviews were conducted with study participants. The interviews were transcribed, translated and analysed using a reflexive and inductive approach to allow codes, categories and themes to emerge from within the data. Setting Private obstetricians, government health officials and FOGSI (Federation of Obstetrics and Gynaecological Societies of India) members, Jharkhand and Uttar Pradesh, India. Participants Eighteen purposefully selected private obstetricians from 9 cities across states of Uttar Pradesh and Jharkhand, 11 government health officials and 2 FOGSI members. Results The major factors serving as barriers to participation of private practitioners in JSY—which emerged on thematic analysis—were low reimbursement amounts, delayed reimbursements, process of interaction with the government and administrative issues, previous experiences and trust deficit, lack of clarity on the accreditation process and patient-level barriers. On the other hand, factors which were facilitators to participation of private practitioners were ease of process, better communication, branding, motivation of increasing clientele as well as satisfaction of doing social service. Conclusion Factors such as financial processes and administrative delays, mistrust between the stakeholders, ambiguity in processes, lack of transparency and lack of ease in the process of empanelment of private sector are hindering effective public–private partnerships under JSY. Simplifying and strengthening the processes, communication strategies and branding can help revitalise it. PMID:28645984

  11. District decision-making for health in low-income settings: a qualitative study in Uttar Pradesh, India, on engaging the private health sector in sharing health-related data

    PubMed Central

    Gautham, Meenakshi; Spicer, Neil; Subharwal, Manish; Gupta, Sanjay; Srivastava, Aradhana; Bhattacharyya, Sanghita; Avan, Bilal Iqbal; Schellenberg, Joanna

    2016-01-01

    Health information systems are an important planning and monitoring tool for public health services, but may lack information from the private health sector. In this fourth article in a series on district decision-making for health, we assessed the extent of maternal, newborn and child health (MNCH)-related data sharing between the private and public sectors in two districts of Uttar Pradesh, India; analysed barriers to data sharing; and identified key inputs required for data sharing. Between March 2013 and August 2014, we conducted 74 key informant interviews at national, state and district levels. Respondents were stakeholders from national, state and district health departments, professional associations, non-governmental programmes and private commercial health facilities with 3–200 beds. Qualitative data were analysed using a framework based on a priori and emerging themes. Private facilities registered for ultrasounds and abortions submitted standardized records on these services, which is compulsory under Indian laws. Data sharing for other services was weak, but most facilities maintained basic records related to institutional deliveries and newborns. Public health facilities in blocks collected these data from a few private facilities using different methods. The major barriers to data sharing included the public sector’s non-standardized data collection and utilization systems for MNCH and lack of communication and follow up with private facilities. Private facilities feared information disclosure and the additional burden of reporting, but were willing to share data if asked officially, provided the process was simple and they were assured of confidentiality. Unregistered facilities, managed by providers without a biomedical qualification, also conducted institutional deliveries, but were outside any reporting loops. Our findings suggest that even without legislation, the public sector could set up an effective MNCH data sharing strategy with private registered facilities by developing a standardized and simple system with consistent communication and follow up. PMID:27591205

  12. Charging for Spectrum Use.

    ERIC Educational Resources Information Center

    Geller, Henry; Lampert, Donna

    This paper, the third in a series exploring future options for public policy in the communications and information arenas, argues that the communications spectrum--e.g., public mobile service, private radio, and domestic satellites--is a valuable but limited resource that should benefit all Americans. After a background discussion, it is…

  13. GTA Self-Disclosure: Motivations for Sharing Private Information with Students

    ERIC Educational Resources Information Center

    Webb, Nathan G.

    2017-01-01

    Graduate teaching assistants (GTAs) are a pervasive presence in undergraduate education. Although GTAs are expected to successfully communicate course content to undergraduate students, they often are inexperienced and receive little training in pedagogy. Therefore, GTAs must learn effective communication behaviors in the classroom. This study…

  14. Extended Communication Efforts Involved with College Long-Distance Relationships

    ERIC Educational Resources Information Center

    Firmin, Michael W.; Firmin, Ruth L.; Merical, Kaile Lorenzen

    2013-01-01

    The present phenomenological, qualitative research study involved in-depth interviews of all 16 female, sophomore students involved in respective distance relationships at a private, selective, comprehensive, Midwest university. Among other results found in the study, the present article focuses on communication dynamics involved with the…

  15. Prelinguistic Pitch Patterns Expressing "Communication" and "Apprehension"

    ERIC Educational Resources Information Center

    Papaeliou, Christina F.; Trevarthen, Colwyn

    2006-01-01

    This study examined whether pitch patterns of prelinguistic vocalizations could discriminate between social vocalizations, uttered apparently with the intention to communicate, and "private" speech, related to solitary activities as an expression of "thinking". Four healthy ten month old English-speaking infants (2 boys and 2 girls) were…

  16. The Relationship between Fundraising Practice and Job Satisfaction at Historically Black Colleges and Universities

    ERIC Educational Resources Information Center

    Tindall, Natalie T. J.; Waters, Richard D.

    2010-01-01

    Fundraising, as studied from a communications/public relations perspective, is an understudied function. This research examines fundraising at public and private historically Black colleges and universities (HBCUs), specifically exploring how these fundraisers incorporate various fundraising strategies into their communication outreach programs…

  17. Asymptotic state discrimination and a strict hierarchy in distinguishability norms

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chitambar, Eric; Hsieh, Min-Hsiu

    2014-11-15

    In this paper, we consider the problem of discriminating quantum states by local operations and classical communication (LOCC) when an arbitrarily small amount of error is permitted. This paradigm is known as asymptotic state discrimination, and we derive necessary conditions for when two multipartite states of any size can be discriminated perfectly by asymptotic LOCC. We use this new criterion to prove a gap in the LOCC and separable distinguishability norms. We then turn to the operational advantage of using two-way classical communication over one-way communication in LOCC processing. With a simple two-qubit product state ensemble, we demonstrate a strictmore » majorization of the two-way LOCC norm over the one-way norm.« less

  18. Minimized state complexity of quantum-encoded cryptic processes

    NASA Astrophysics Data System (ADS)

    Riechers, Paul M.; Mahoney, John R.; Aghamohammadi, Cina; Crutchfield, James P.

    2016-05-01

    The predictive information required for proper trajectory sampling of a stochastic process can be more efficiently transmitted via a quantum channel than a classical one. This recent discovery allows quantum information processing to drastically reduce the memory necessary to simulate complex classical stochastic processes. It also points to a new perspective on the intrinsic complexity that nature must employ in generating the processes we observe. The quantum advantage increases with codeword length: the length of process sequences used in constructing the quantum communication scheme. In analogy with the classical complexity measure, statistical complexity, we use this reduced communication cost as an entropic measure of state complexity in the quantum representation. Previously difficult to compute, the quantum advantage is expressed here in closed form using spectral decomposition. This allows for efficient numerical computation of the quantum-reduced state complexity at all encoding lengths, including infinite. Additionally, it makes clear how finite-codeword reduction in state complexity is controlled by the classical process's cryptic order, and it allows asymptotic analysis of infinite-cryptic-order processes.

  19. Proceedings of the Annual Meeting of the Association for Education in Journalism and Mass Communication (84th, Washington, DC, August 5-8, 2001). International Communication Division.

    ERIC Educational Resources Information Center

    Association for Education in Journalism and Mass Communication.

    The International Communication section of the proceedings contains the following 15 selected papers: "'News Aid', the New Aid: A Case Study of Cambodia" (J. L. Clarke); "Development of Public and Private Broadcasting in Post-Communist Estonia: 1991-1996" (Max V. Grubb); "Revealing and Repenting South Korea's Vietnam…

  20. Establishing Goals and Maintaining Coherence in Multiparty Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Groen, Martin; Noyes, Jan

    2013-01-01

    Communicating via text-only computer-mediated communication (CMC) channels is associated with a number of issues that would impair users in achieving dialogue coherence and goals. It has been suggested that humans have devised novel adaptive strategies to deal with those issues. However, it could be that humans rely on "classic"…

  1. Experimental plug and play quantum coin flipping.

    PubMed

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-24

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  2. Engineering Accountability for Results into Public Education.

    ERIC Educational Resources Information Center

    Lessinger, Leon

    "Accountability" is a classical term in management theory, but new in education. It is the product of the process of performance contracting, in which a public authority grants money to a local educational agency to contract with private enterprise to achieve specific goals within a specific period for specific costs. This process can be…

  3. Erosion of the At-Will Rule and Freedom of Communication in Private Sector Organizations.

    ERIC Educational Resources Information Center

    Sanders, Wayne

    The "at-will" rule in American law is defined as the right of a private sector employer to dismiss an employee without a contract for virtually any reason. The rule has thrived since the nineteenth century and is still a major factor in the employer-employee relationship. However, recent court decisions have fashioned common law…

  4. Capacity on wireless quantum cellular communication system

    NASA Astrophysics Data System (ADS)

    Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-03-01

    Quantum technology is making excellent prospects in future communication networks. Entanglement generation and purification are two major components in quantum networks. Combining these two techniques with classical cellular mobile communication, we proposed a novel wireless quantum cellular(WQC) communication system which is possible to realize commercial mobile quantum communication. In this paper, the architecture and network topology of WQC communication system are discussed, the mathematical model of WQC system is extracted and the serving capacity, indicating the ability to serve customers, is defined and calculated under certain circumstances.

  5. 47 CFR 1.1151 - Authority to prescribe and collect regulatory fees.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... regulatory activities in the private radio, mass media, common carrier, and cable television services. [59 FR... fees. 1.1151 Section 1.1151 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND... section 9 of the Communications Act, 47 U.S.C. 159, which directs the Commission to prescribe and collect...

  6. President's Task Force on Communications Policy. Final Report.

    ERIC Educational Resources Information Center

    Rostow, Eugene V.

    The final report of the President's Task Force on Communications Policy recommends strengthened federal powers to form public policy in telecommunications. Such planned policy would enable the private sector to reach its full capacities in the field by improving regulation when it is necessary and removing unnecessary regulation. Monopoly of…

  7. Communication and Information Barriers to Health Assistance for Deaf Patients

    ERIC Educational Resources Information Center

    Pereira, Patricia Cristina Andrade; Fortes, Paulo Antonio de Carvalho

    2010-01-01

    In Brazil, recent regulations require changes in private and public health systems to make special services available to deaf patients. In the present article, the researchers analyze the perceptions of 25 sign language-using patients regarding this assistance. The researchers found communication difficulties between these patients and health…

  8. 77 FR 75880 - Control of Communicable Diseases: Interstate; Scope and Definitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... definitions related to the control of communicable diseases and add more current medical terminology where... definitions for interstate quarantine regulations to reflect modern terminology and plain language used by..., under section 70.1, to reflect modern terminology and plain language commonly used by private sector...

  9. Three-dimensional time reversal communications in elastic media

    DOE PAGES

    Anderson, Brian E.; Ulrich, Timothy J.; Le Bas, Pierre-Yves; ...

    2016-02-23

    Our letter presents a series of vibrational communication experiments, using time reversal, conducted on a set of cast iron pipes. Time reversal has been used to provide robust, private, and clean communications in many underwater acoustic applications. Also, the use of time reversal to communicate along sections of pipes and through a wall is demonstrated here in order to overcome the complications of dispersion and multiple scattering. These demonstrations utilize a single source transducer and a single sensor, a triaxial accelerometer, enabling multiple channels of simultaneous communication streams to a single location.

  10. Experimental extraction of an entangled photon pair from two identically decohered pairs.

    PubMed

    Yamamoto, Takashi; Koashi, Masato; Ozdemir, Sahin Kaya; Imoto, Nobuyuki

    2003-01-23

    Entanglement is considered to be one of the most important resources in quantum information processing schemes, including teleportation, dense coding and entanglement-based quantum key distribution. Because entanglement cannot be generated by classical communication between distant parties, distribution of entangled particles between them is necessary. During the distribution process, entanglement between the particles is degraded by the decoherence and dissipation processes that result from unavoidable coupling with the environment. Entanglement distillation and concentration schemes are therefore needed to extract pairs with a higher degree of entanglement from these less-entangled pairs; this is accomplished using local operations and classical communication. Here we report an experimental demonstration of extraction of a polarization-entangled photon pair from two decohered photon pairs. Two polarization-entangled photon pairs are generated by spontaneous parametric down-conversion and then distributed through a channel that induces identical phase fluctuations to both pairs; this ensures that no entanglement is available as long as each pair is manipulated individually. Then, through collective local operations and classical communication we extract from the two decohered pairs a photon pair that is observed to be polarization-entangled.

  11. Quantum subsystems: Exploring the complementarity of quantum privacy and error correction

    NASA Astrophysics Data System (ADS)

    Jochym-O'Connor, Tomas; Kribs, David W.; Laflamme, Raymond; Plosker, Sarah

    2014-09-01

    This paper addresses and expands on the contents of the recent Letter [Phys. Rev. Lett. 111, 030502 (2013), 10.1103/PhysRevLett.111.030502] discussing private quantum subsystems. Here we prove several previously presented results, including a condition for a given random unitary channel to not have a private subspace (although this does not mean that private communication cannot occur, as was previously demonstrated via private subsystems) and algebraic conditions that characterize when a general quantum subsystem or subspace code is private for a quantum channel. These conditions can be regarded as the private analog of the Knill-Laflamme conditions for quantum error correction, and we explore how the conditions simplify in some special cases. The bridge between quantum cryptography and quantum error correction provided by complementary quantum channels motivates the study of a new, more general definition of quantum error-correcting code, and we initiate this study here. We also consider the concept of complementarity for the general notion of a private quantum subsystem.

  12. The Globalstar mobile satellite system for worldwide personal communications

    NASA Astrophysics Data System (ADS)

    Wiedeman, Robert A.; Viterbi, Andrew J.

    Loral Aerospace Corporation along with Qualcomm Inc. have developed a satellite system which offers global mobile voice and data services to and from handheld and mobile user terminals with omni-directional antennas. By combining the use of low-earth orbit (LEO) satellites with existing terrestrial communications systems and innovative, highly efficient spread spectrum techniques, the Globalstar system provides users with low-cost, reliable communications throughout the world. The Globalstar space segment consists of a constellation of 48 LEO satellites in circular orbits with 750 NM (1389 km) altitude. Each satellite communicates with the mobile users via the satellite-user links and with gateway stations. The gateway stations handle the interface between the Globalstar network and the OSTN/PLMN systems. Globalstar transceivers are similar to currently proposed digital cellular telephones in size and have a serial number that will allow the end user to make and receive calls from or to that device anywhere in the world. The Globalstar system is designed to operate as a complement to existing local, long-distance, public, private and specialized telecommunications networks. Service is primarily designed to serve the rural and thin route communications needs of consumers, government users, and private networks.

  13. The Globalstar mobile satellite system for worldwide personal communications

    NASA Technical Reports Server (NTRS)

    Wiedeman, Robert A.; Viterbi, Andrew J.

    1993-01-01

    Loral Aerospace Corporation along with Qualcomm Inc. have developed a satellite system which offers global mobile voice and data services to and from handheld and mobile user terminals with omni-directional antennas. By combining the use of low-earth orbit (LEO) satellites with existing terrestrial communications systems and innovative, highly efficient spread spectrum techniques, the Globalstar system provides users with low-cost, reliable communications throughout the world. The Globalstar space segment consists of a constellation of 48 LEO satellites in circular orbits with 750 NM (1389 km) altitude. Each satellite communicates with the mobile users via the satellite-user links and with gateway stations. The gateway stations handle the interface between the Globalstar network and the OSTN/PLMN systems. Globalstar transceivers are similar to currently proposed digital cellular telephones in size and have a serial number that will allow the end user to make and receive calls from or to that device anywhere in the world. The Globalstar system is designed to operate as a complement to existing local, long-distance, public, private and specialized telecommunications networks. Service is primarily designed to serve the rural and thin route communications needs of consumers, government users, and private networks.

  14. Aviation Weather Information Communications Study (AWIN). Phase 1 and 2

    NASA Technical Reports Server (NTRS)

    Ball, J. W.; Herron, R. G.; Nozawa, E. T.; Thomas, E. A.; Witchey, R. D.

    2000-01-01

    This two part study examines the communication requirements to provide weather information in the cockpit as well as public and private communication systems available to address the requirements. Ongoing research projects combined with user needs for weather related information are used to identify and describe potential weather products that address decision support in three time frames: Far-Term Strategic, Near-Term Strategic and Tactical. Data requirements of these future products are identified and quantified. Communications systems and technologies available in the public as well as private sector are analyzed to identify potential solutions. Recommendations for further research identify cost, performance, and safety benefits to justify the investment. The study concludes that not all weather information has the same level of urgency to safety-of-flight and some information is more critical to one category of flight than another. Specific weather products need to be matched with communication systems with appropriate levels of reliability to support the criticality of the information. Available bandwidth for highly critical information should be preserved and dedicated to safety. Meanwhile, systems designed for in-flight-entertainment and other passenger/crew services could be used to support less critical information that is used only for planning and economic decision support.

  15. A Cross Sectional Study of the Impact of the Internet on Formal Scholarly Communication.

    ERIC Educational Resources Information Center

    Lu, Shaojun

    1998-01-01

    Investigates the impact of the Internet on formal scholarly communication via examining the adoption of electronic vehicles in several classic natural and social science fields. Concludes that the Internet has affected almost all activities in formal scholarly communication with a wider impact in the natural sciences in general than in the social…

  16. Quantum secret sharing via local operations and classical communication.

    PubMed

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  17. Surrogate Decision Makers and Proxy Ownership: Challenges of Privacy Management in Health Care Decision Making

    PubMed Central

    Bute, Jennifer J.; Petronio, Sandra; Torke, Alexia M.

    2016-01-01

    This study explored the communicative experiences of surrogates who served as decision makers for patients who were unable to convey health information and choices about treatment options. Drawing on assumptions from communication privacy management theory (Petronio, 2002), 35 surrogates were interviewed to explore how they navigated the role of guardian of patients’ private health information while the patient was hospitalized. This research determined that surrogates are not only guardians and thereby co-owners of the patients’ private health information, they actually served in a “proxy ownership” role. Surrogates described obstacles to both obtaining and sharing private health information about the patient, suggesting that their rights as legitimate co-owners of the patients’ information were not fully acknowledged by the medical teams. Surrogates also described challenges in performing the proxy ownership role when they were not fully aware of the patient's wishes. Theoretical and practical implications of these challenges are discussed. PMID:25175060

  18. Field testing of a remote controlled robotic tele-echo system in an ambulance using broadband mobile communication technology.

    PubMed

    Takeuchi, Ryohei; Harada, Hiroshi; Masuda, Kohji; Ota, Gen-ichiro; Yokoi, Masaki; Teramura, Nobuyasu; Saito, Tomoyuki

    2008-06-01

    We report the testing of a mobile Robotic Tele-echo system that was placed in an ambulance and successfully transmitted clear real time echo imaging of a patient's abdomen to the destination hospital from where this device was being remotely operated. Two-way communication between the paramedics in this vehicle and a doctor standing by at the hospital was undertaken. The robot was equipped with an ultrasound probe which was remotely controlled by the clinician at the hospital and ultrasound images of the patient were transmitted wirelessly. The quality of the ultrasound images that were transmitted over the public mobile telephone networks and those transmitted over the Multimedia Wireless Access Network (a private networks) were compared. The transmission rate over the public networks and the private networks was approximately 256 Kbps, 3 Mbps respectively. Our results indicate that ultrasound images of far higher definition could be obtained through the private networks.

  19. Secure data sharing in public cloud

    NASA Astrophysics Data System (ADS)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  20. Africa's health: could the private sector accelerate the progress towards health MDGs?

    PubMed Central

    2011-01-01

    Background Out of 1.484 billion disability-adjusted life years lost globally in 2008, 369.1 million (25%) were lost in the WHO African Region. Despite the heavy disease burden, the majority of countries in the Region are not on track to achieve Millennium Development Goals (MDG) 4 (reducing child mortality), 5 (improving maternal health), and 6 (combating HIV/AIDS, malaria and other diseases). This article provides an overview of the state of public health, summarizes 2010-2015 WHO priorities, and explores the role that private sector could play to accelerate efforts towards health MDGs in the African Region. Discussion Of the 752 total resolutions adopted by the WHO Regional Committee for Africa (RC) between years 1951 and 2010, 45 mention the role of the private sector. We argue that despite the rather limited role implied in RC resolutions, the private sector has a pivotal role in supporting the achievement of health MDGs, and articulating efforts with 2010-2015 priorities for WHO in the African Region: provision of normative and policy guidance as well as strengthening partnerships and harmonization; supporting the strengthening of health systems based on the Primary Health Care approach; putting the health of mothers and children first; accelerating actions on HIV/AIDS, malaria and tuberculosis; intensifying the prevention and control of communicable and noncommunicable diseases; and accelerating response to the determinants of health. Conclusion The very high maternal and children mortality, very high burden of communicable and non-communicable diseases, health systems challenges, and inter-sectoral issues related to key determinants of health are too heavy for the public sector to address alone. Therefore, there is clear need for the private sector, given its breadth, scope and size, to play a more significant role in supporting governments, communities and partners to develop and implement national health policies and strategic plans; strengthen health systems capacities; and implement roadmaps for accelerating the attainment of health MDGs relating to maternal and child health, reducing disease burden, and promoting social determinants of health. In order for governments to further explore the potential benefits of the private sector towards improved performance of health systems, there is need for accurate evidence on the private sector capacity in areas of prevention, promotion, treatment and rehabilitation; dialogue and negotiation; clear definition of roles and responsibilities; and regulatory frameworks. PMID:22118626

  1. Africa's health: could the private sector accelerate the progress towards health MDGs?

    PubMed

    Sambo, Luis G; Kirigia, Joses M

    2011-11-25

    Out of 1.484 billion disability-adjusted life years lost globally in 2008, 369.1 million (25%) were lost in the WHO African Region. Despite the heavy disease burden, the majority of countries in the Region are not on track to achieve Millennium Development Goals (MDG) 4 (reducing child mortality), 5 (improving maternal health), and 6 (combating HIV/AIDS, malaria and other diseases). This article provides an overview of the state of public health, summarizes 2010-2015 WHO priorities, and explores the role that private sector could play to accelerate efforts towards health MDGs in the African Region. Of the 752 total resolutions adopted by the WHO Regional Committee for Africa (RC) between years 1951 and 2010, 45 mention the role of the private sector. We argue that despite the rather limited role implied in RC resolutions, the private sector has a pivotal role in supporting the achievement of health MDGs, and articulating efforts with 2010-2015 priorities for WHO in the African Region: provision of normative and policy guidance as well as strengthening partnerships and harmonization; supporting the strengthening of health systems based on the Primary Health Care approach; putting the health of mothers and children first; accelerating actions on HIV/AIDS, malaria and tuberculosis; intensifying the prevention and control of communicable and noncommunicable diseases; and accelerating response to the determinants of health. The very high maternal and children mortality, very high burden of communicable and non-communicable diseases, health systems challenges, and inter-sectoral issues related to key determinants of health are too heavy for the public sector to address alone. Therefore, there is clear need for the private sector, given its breadth, scope and size, to play a more significant role in supporting governments, communities and partners to develop and implement national health policies and strategic plans; strengthen health systems capacities; and implement roadmaps for accelerating the attainment of health MDGs relating to maternal and child health, reducing disease burden, and promoting social determinants of health.In order for governments to further explore the potential benefits of the private sector towards improved performance of health systems, there is need for accurate evidence on the private sector capacity in areas of prevention, promotion, treatment and rehabilitation; dialogue and negotiation; clear definition of roles and responsibilities; and regulatory frameworks.

  2. Youthful Lust and Violation of Mobile Phone Rule in a Private Christian Mission University, South West Nigeria

    ERIC Educational Resources Information Center

    Ojo, Omonijo Dare; Ugochukwu, Nnedum Obiajulu Anthony; Obinna, Ezeokana Jude

    2011-01-01

    This study aims at discovering the difference in the perceived lack of privacy in communication and violation of mobile phone rule among students in a Private Christian Mission University, South-West Nigeria. It equally tries to discover if there is a difference in the perceived students' desire to express love to the opposite sex and violation of…

  3. Onion Routing for Anonymous and Private Internet Connections

    DTIC Science & Technology

    1999-01-28

    Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reedy Paul Syversony January 28, 1999 1 Introduction...Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device...Commerce Workshop , August 1998. [3] D. Chaum . \\Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM , v. 24

  4. Patterns of mortality in public and private hospitals of Addis Ababa, Ethiopia

    PubMed Central

    2012-01-01

    Background Ethiopia is encountering a growing burden of non-communicable diseases along with infectious diseases, perinatal and nutritional problems that have long been considered major problems of public health importance. This retrospective analysis was carried out to examine the mortality patterns from communicable diseases and non communicable diseases in public and private hospitals of Addis Ababa. Methods Approximately 47,153 deaths were captured over eight years (2002–2010) in forty three public and private hospitals of Addis Ababa, Ethiopia. Data collectors (43 hospital clerks) and coordinators (3 nurses) had been extensively trained on how to review hospital death records. Information obtained included: dates of admission and death, age, sex, address, and principal cause of death. Only the diseases responsible for deaths are taken as the cause of death. Cause of death was coded using International Classification of Diseases (ICD-10) and data were double entered. Diseases were classified into: Group I (communicable diseases, maternal conditions and nutritional deficiencies); Group II (non-communicable causes); and Group III (injuries). Percentages, proportional mortality ratios, 95% confidence intervals (CI) and Adjusted odd ratios (OR) were calculated. Results Overall, 59% of the deaths were attributed to Group I diseases, and 31% to Group II diseases and 12% to injuries. Nearly 56% of the males and 68% of the females deaths were due to five leading causes (conditions arising during perinatal period, HIV/AIDS, tuberculosis, cardiovascular diseases and respiratory infections). Significantly larger proportions of females died from Group I (67%) and Group II diseases (32%) compared with males (where the respective proportions were 52% and 30%). Significantly higher proportion of males (17%) than females (6%) were dying from Group III diseases. Deaths due to Group I diseases decreased while those due to Group II diseases increased with age. Overall Group I diseases and HIV/AIDS, tuberculosis and still birth mortality in particular have showed decreasing trend while Group II and III increasing over time. Double burden in mortality was highly observed in the age groups of 15–64 years. Those aged >45 years were dying more likely with non-communicable diseases compared with children. Children aged below 15 years were 16 times more likely to die from communicable, perinatal and nutritional conditions compared with elders. Mortality variation with age has been identified between public and private hospitals. Conclusions The results of the present study shows that, in addition to the common Group I causes of death, emerging group II diseases are contributing to high proportions of mortality in the public and private hospitals of Addis Ababa, Ethiopia. Thus, priority should be given to the prevention and management of conditions arising during perinatal period such as low birth weight and still birth, HIV/AIDS; tuberculosis, respiratory infections, cardiovascular diseases, malignant neoplasm, chronic respiratory diseases and road traffic accident. The planning of health resources and activities should take into account the double burden in mortality due to Group I and Group II diseases. This calls for strengthening approaches towards the control and prevention of non-communicable diseases such as cardiovascular and malignant neoplasm. PMID:23167315

  5. "Unsafe Spaces": Reflections on a Specimen of Educational Jargon.

    ERIC Educational Resources Information Center

    Boostrom, Robert

    According to this paper, the biggest hazard of a private language (or professional jargon) may not be that it obscures efforts to communicate with those outside the business, but rather that it successfully communicates ideas never intended. The paper explores one bit of "educationese"--"safe space" or "safe place"--and reflects on what language…

  6. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  7. Reviving the Turtle: Exploring the Use of Logo with Students with Mild Disabilities

    ERIC Educational Resources Information Center

    Ratcliff, Corbet C.; Anderson, Susan E.

    2011-01-01

    In this case study, a group of nine 4th grade children were introduced to the Logo programming language during three 90-minute sessions over a four-week period. They attended a private university-based laboratory school serving students with various learning disabilities. This project demonstrated that a classic version of Logo captured the…

  8. Crossing Boundaries: Sharing Concepts of Music Teaching from Classroom to Studio

    ERIC Educational Resources Information Center

    McPhail, Graham J.

    2010-01-01

    This study demonstrates how action research can provide a means for teachers to undertake research for themselves to inform and enhance their work. The focus of the research was the self-critique of pedagogical practice in one-to-one classical instrumental music teaching within the context of the author's private studio. A series of lessons were…

  9. The Figures of Speech, "Ethos," and Aristotle: Notes toward a Rhetoric of Business Communication.

    ERIC Educational Resources Information Center

    Kallendorf, Craig; Kallendorf, Carol

    1985-01-01

    Demonstrates that business writers rely far more heavily than expected on classical figures of speech. Uses Aristotle's "Rhetoric" to show that figures of speech offer a powerful tool for the persuasive function of modern business communication. (PD)

  10. Hypersonic Cruise and Re-Entry Radio Frequency Blackout Mitigation: Alleviating the Communications Blackout Problem

    NASA Technical Reports Server (NTRS)

    Manning, Robert M.

    2017-01-01

    The work presented here will be a review of a NASA effort to provide a method to transmit and receive RF communications and telemetry through a re-entry plasma thus alleviating the classical RF blackout phenomenon.

  11. Quantum Private Query Based on Bell State and Single Photons

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Chang, Yan; Zhang, Shi-Bin; Yang, Fan; Zhang, Yan

    2018-03-01

    Quantum private query (QPQ) can protect both user's and database holder's privacy. In this paper, we propose a novel quantum private query protocol based on Bell state and single photons. As far as we know, no one has ever proposed the QPQ based on Bell state. By using the decoherence-free (DF) states, our protocol can resist the collective noise. Besides that, our protocol is a one-way quantum protocol, which can resist the Trojan horse attack and reduce the communication complexity. Our protocol can not only guarantee the participants' privacy but also stand against an external eavesdropper.

  12. USAF/SCEEE Summer Faculty Research Program (1979). Volume 1

    DTIC Science & Technology

    1979-12-01

    Optimum equipment arrangement for transmit and receive channels (d) Communication circuit performance between ships in a task force 5-11 p.: I ( e ...management and of an efficient communications system, and e ) the format to be used for future programs. The author was selected to assist with the...Problems in Fusion Research, Knoxville, Tennessee, October, 1977, pp. 741-745. 4. C. E . Oberly, Private Communication . 5. G. J. Gabriel, "Theory of

  13. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 69: Writing for the Aerospace Industry. Chapter 3; The Practice of Technical and Scientific Communication: Writing in Professional Contexts

    NASA Technical Reports Server (NTRS)

    Barclay, Rebecca O.; Pinelli, Thomas E.

    1997-01-01

    The large and complex aerospace industry, which employed approximately 850,000 people in 1994 (Aerospace Facts, 1994-95, p. 11), plays a vital role in the nation's economy. Although only a small percentage of those employed in aerospace are technical communicators, they perform a wide variety of communication duties in government and the private sector.

  14. The Bread and Butter of Classical Organizational Approaches: The Time-and-Motion Study

    ERIC Educational Resources Information Center

    Peterson, Dan W.

    2007-01-01

    The thought of learning about the principles of classical management and the machine metaphor of organizing can get many organizational communication students yawning just by seeing the subject in a syllabus. Abundant movie and television examples associated with the machine-like nature of workplace productivity are often used to demonstrate…

  15. Integrating quantum key distribution with classical communications in backbone fiber network.

    PubMed

    Mao, Yingqiu; Wang, Bi-Xiao; Zhao, Chunxu; Wang, Guangquan; Wang, Ruichun; Wang, Honghai; Zhou, Fei; Nie, Jimin; Chen, Qing; Zhao, Yong; Zhang, Qiang; Zhang, Jun; Chen, Teng-Yun; Pan, Jian-Wei

    2018-03-05

    Quantum key distribution (QKD) provides information-theoretic security based on the laws of quantum mechanics. The desire to reduce costs and increase robustness in real-world applications has motivated the study of coexistence between QKD and intense classical data traffic in a single fiber. Previous works on coexistence in metropolitan areas have used wavelength-division multiplexing, however, coexistence in backbone fiber networks remains a great experimental challenge, as Tbps data of up to 20 dBm optical power is transferred, and much more noise is generated for QKD. Here we present for the first time, to the best of our knowledge, the integration of QKD with a commercial backbone network of 3.6 Tbps classical data at 21 dBm launch power over 66 km fiber. With 20 GHz pass-band filtering and large effective core area fibers, real-time secure key rates can reach 4.5 kbps and 5.1 kbps for co-propagation and counter-propagation at the maximum launch power, respectively. This demonstrates feasibility and represents an important step towards building a quantum network that coexists with the current backbone fiber infrastructure of classical communications.

  16. Noise Analysis of Simultaneous Quantum Key Distribution and Classical Communication Scheme Using a True Local Oscillator

    DOE PAGES

    Qi, Bing; Lim, Charles Ci Wen

    2018-05-07

    Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol where random numbers for quantum key distribution and bits for classical communication are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Such a scheme could be appealing in practice since a single coherent communication system can be used for multiple purposes. However, previous studies show that the SQCC protocol can tolerate only very small phase noise. This makes it incompatible with the coherent communication scheme using a true local oscillator (LO), which presents a relatively high phase noise due to the fact thatmore » the signal and the LO are generated from two independent lasers. We improve the phase noise tolerance of the SQCC scheme using a true LO by adopting a refined noise model where phase noises originating from different sources are treated differently: on the one hand, phase noise associated with the coherent receiver may be regarded as trusted noise since the detector can be calibrated locally and the photon statistics of the detected signals can be determined from the measurement results; on the other hand, phase noise due to the instability of fiber interferometers may be regarded as untrusted noise since its randomness (from the adversary’s point of view) is hard to justify. Simulation results show the tolerable phase noise in this refined noise model is significantly higher than that in the previous study, where all of the phase noises are assumed to be untrusted. In conclusion, we conduct an experiment to show that the required phase stability can be achieved in a coherent communication system using a true LO.« less

  17. Noise Analysis of Simultaneous Quantum Key Distribution and Classical Communication Scheme Using a True Local Oscillator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Bing; Lim, Charles Ci Wen

    Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol where random numbers for quantum key distribution and bits for classical communication are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Such a scheme could be appealing in practice since a single coherent communication system can be used for multiple purposes. However, previous studies show that the SQCC protocol can tolerate only very small phase noise. This makes it incompatible with the coherent communication scheme using a true local oscillator (LO), which presents a relatively high phase noise due to the fact thatmore » the signal and the LO are generated from two independent lasers. We improve the phase noise tolerance of the SQCC scheme using a true LO by adopting a refined noise model where phase noises originating from different sources are treated differently: on the one hand, phase noise associated with the coherent receiver may be regarded as trusted noise since the detector can be calibrated locally and the photon statistics of the detected signals can be determined from the measurement results; on the other hand, phase noise due to the instability of fiber interferometers may be regarded as untrusted noise since its randomness (from the adversary’s point of view) is hard to justify. Simulation results show the tolerable phase noise in this refined noise model is significantly higher than that in the previous study, where all of the phase noises are assumed to be untrusted. In conclusion, we conduct an experiment to show that the required phase stability can be achieved in a coherent communication system using a true LO.« less

  18. Noise Analysis of Simultaneous Quantum Key Distribution and Classical Communication Scheme Using a True Local Oscillator

    NASA Astrophysics Data System (ADS)

    Qi, Bing; Lim, Charles Ci Wen

    2018-05-01

    Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol where random numbers for quantum key distribution and bits for classical communication are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Such a scheme could be appealing in practice since a single coherent communication system can be used for multiple purposes. However, previous studies show that the SQCC protocol can tolerate only very small phase noise. This makes it incompatible with the coherent communication scheme using a true local oscillator (LO), which presents a relatively high phase noise due to the fact that the signal and the LO are generated from two independent lasers. We improve the phase noise tolerance of the SQCC scheme using a true LO by adopting a refined noise model where phase noises originating from different sources are treated differently: on the one hand, phase noise associated with the coherent receiver may be regarded as trusted noise since the detector can be calibrated locally and the photon statistics of the detected signals can be determined from the measurement results; on the other hand, phase noise due to the instability of fiber interferometers may be regarded as untrusted noise since its randomness (from the adversary's point of view) is hard to justify. Simulation results show the tolerable phase noise in this refined noise model is significantly higher than that in the previous study, where all of the phase noises are assumed to be untrusted. We conduct an experiment to show that the required phase stability can be achieved in a coherent communication system using a true LO.

  19. Generalized probabilistic theories and conic extensions of polytopes

    NASA Astrophysics Data System (ADS)

    Fiorini, Samuel; Massar, Serge; Patra, Manas K.; Tiwary, Hans Raj

    2015-01-01

    Generalized probabilistic theories (GPT) provide a general framework that includes classical and quantum theories. It is described by a cone C and its dual C*. We show that whether some one-way communication complexity problems can be solved within a GPT is equivalent to the recently introduced cone factorization of the corresponding communication matrix M. We also prove an analogue of Holevo's theorem: when the cone C is contained in {{{R}}n}, the classical capacity of the channel realized by sending GPT states and measuring them is bounded by log n. Polytopes and optimising functions over polytopes arise in many areas of discrete mathematics. A conic extension of a polytope is the intersection of a cone C with an affine subspace whose projection onto the original space yields the desired polytope. Extensions of polytopes can sometimes be much simpler geometric objects than the polytope itself. The existence of a conic extension of a polytope is equivalent to that of a cone factorization of the slack matrix of the polytope, on the same cone. We show that all 0/1 polytopes whose vertices can be recognized by a polynomial size circuit, which includes as a special case the travelling salesman polytope and many other polytopes from combinatorial optimization, have small conic extension complexity when the cone is the completely positive cone. Using recent exponential lower bounds on the linear extension complexity of polytopes, this provides an exponential gap between the communication complexity of GPT based on the completely positive cone and classical communication complexity, and a conjectured exponential gap with quantum communication complexity. Our work thus relates the communication complexity of generalizations of quantum theory to questions of mainstream interest in the area of combinatorial optimization.

  20. District decision-making for health in low-income settings: a qualitative study in Uttar Pradesh, India, on engaging the private health sector in sharing health-related data.

    PubMed

    Gautham, Meenakshi; Spicer, Neil; Subharwal, Manish; Gupta, Sanjay; Srivastava, Aradhana; Bhattacharyya, Sanghita; Avan, Bilal Iqbal; Schellenberg, Joanna

    2016-09-01

    Health information systems are an important planning and monitoring tool for public health services, but may lack information from the private health sector. In this fourth article in a series on district decision-making for health, we assessed the extent of maternal, newborn and child health (MNCH)-related data sharing between the private and public sectors in two districts of Uttar Pradesh, India; analysed barriers to data sharing; and identified key inputs required for data sharing. Between March 2013 and August 2014, we conducted 74 key informant interviews at national, state and district levels. Respondents were stakeholders from national, state and district health departments, professional associations, non-governmental programmes and private commercial health facilities with 3-200 beds. Qualitative data were analysed using a framework based on a priori and emerging themes. Private facilities registered for ultrasounds and abortions submitted standardized records on these services, which is compulsory under Indian laws. Data sharing for other services was weak, but most facilities maintained basic records related to institutional deliveries and newborns. Public health facilities in blocks collected these data from a few private facilities using different methods. The major barriers to data sharing included the public sector's non-standardized data collection and utilization systems for MNCH and lack of communication and follow up with private facilities. Private facilities feared information disclosure and the additional burden of reporting, but were willing to share data if asked officially, provided the process was simple and they were assured of confidentiality. Unregistered facilities, managed by providers without a biomedical qualification, also conducted institutional deliveries, but were outside any reporting loops. Our findings suggest that even without legislation, the public sector could set up an effective MNCH data sharing strategy with private registered facilities by developing a standardized and simple system with consistent communication and follow up. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.

  1. Language Magazine: The Journal of Communication & Education, 2002.

    ERIC Educational Resources Information Center

    Ward, Ben, Ed.

    2002-01-01

    These 12 issues of the journal include articles on such topics as the following: classical languages; early literacy; ancient languages; study abroad; teacher training; dialects; computer uses in education; classroom techniques; illustrated dictionaries for English-as-a-Second-Language (ESL) students; communication through poetry; bilingual…

  2. Enhanced Communication with the Assistance of Indefinite Causal Order

    NASA Astrophysics Data System (ADS)

    Ebler, Daniel; Salek, Sina; Chiribella, Giulio

    2018-03-01

    In quantum Shannon theory, the way information is encoded and decoded takes advantage of the laws of quantum mechanics, while the way communication channels are interlinked is assumed to be classical. In this Letter, we relax the assumption that quantum channels are combined classically, showing that a quantum communication network where quantum channels are combined in a superposition of different orders can achieve tasks that are impossible in conventional quantum Shannon theory. In particular, we show that two identical copies of a completely depolarizing channel become able to transmit information when they are combined in a quantum superposition of two alternative orders. This finding runs counter to the intuition that if two communication channels are identical, using them in different orders should not make any difference. The failure of such intuition stems from the fact that a single noisy channel can be a random mixture of elementary, noncommuting processes, whose order (or lack thereof) can affect the ability to transmit information.

  3. Enhanced Communication with the Assistance of Indefinite Causal Order.

    PubMed

    Ebler, Daniel; Salek, Sina; Chiribella, Giulio

    2018-03-23

    In quantum Shannon theory, the way information is encoded and decoded takes advantage of the laws of quantum mechanics, while the way communication channels are interlinked is assumed to be classical. In this Letter, we relax the assumption that quantum channels are combined classically, showing that a quantum communication network where quantum channels are combined in a superposition of different orders can achieve tasks that are impossible in conventional quantum Shannon theory. In particular, we show that two identical copies of a completely depolarizing channel become able to transmit information when they are combined in a quantum superposition of two alternative orders. This finding runs counter to the intuition that if two communication channels are identical, using them in different orders should not make any difference. The failure of such intuition stems from the fact that a single noisy channel can be a random mixture of elementary, noncommuting processes, whose order (or lack thereof) can affect the ability to transmit information.

  4. Process Analysis of Basic Allowance for Housing (BAH) Within the Military Personnel, Marine Corps (MPMC) Appropriation

    DTIC Science & Technology

    2005-03-01

    contractors and adequate homes are privatized, we purchase the long-term efficient operation , management , maintenance, and recapitalization of the...property. When inadequate homes are privatized, we purchase the initial renovation or replacement of those homes, along with the long-term operation ... management , maintenance, and recapitalization." (Barszewski, personal communication, March 7, 2005) It is important to note that since family housing and

  5. Professional development for graduate students in the atmospheric sciences

    NASA Astrophysics Data System (ADS)

    Haacker, R.; Sloan, V.

    2015-12-01

    The field of atmospheric sciences is rapidly changing, and with it, the employment outlook for recent graduate students. Weather and climate applications for society and the private industry are in demand and have increased significantly over the last few years, creating new employment opportunities for atmospheric scientists. It is therefore more important than ever that our graduates are well prepared for the newly emerging careers. The Bureau's Occupational Outlook predicts that opportunities for atmospheric scientists will increase more rapidly in the private industry than in other sectors (Bureau of Labor Statistics, 2014). Employers in the private sector indicate that, while job applicants often bring the required scientific training, there is a gap between the technical and professional skills needed in those positions and those possessed by graduates. Job candidates were found to be most lacking in written and oral communication skills, adaptability, and project management (Chronicle for Higher Education, 2012). The geoscience community needs to come together to better prepare our graduate students. While some of this work can be done within academic institutions, partnerships with mentoring programs and the private industry are essential. In this paper we will present one approach taken by the Significant Opportunities in Atmospheric Research and Science (SOARS) program to improve its students' skills in project management, collaborating, communication, problem solving, and essential leadership skills.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hayashi, A.; Hashimoto, T.; Horibe, M.

    In quantum teleportation, neither Alice nor Bob acquires any classical knowledge on teleported states. The teleportation protocol is said to be oblivious to both parties. In remote state preparation (RSP), it is assumed that Alice is given complete classical knowledge on the state that is to be prepared by Bob. Recently, Leung and Shor [e-print quant-ph/0201008] showed that the same amount of classical information as that in teleportation needs to be transmitted in any exact and deterministic RSP protocol that is oblivious to Bob. Assuming that the dimension of subsystems in the prior-entangled state is the same as the dimensionmore » of the input space, we study similar RSP protocols, but not necessarily oblivious to Bob. We show that in this case Bob's quantum operation can be safely assumed to be a unitary transformation. We then derive an equation that is a necessary and sufficient condition for such a protocol to exist. By studying this equation, we show that one-qubit RSP requires two classical bits of communication, which is the same amount as in teleportation, even if the protocol is not assumed oblivious to Bob. For higher dimensions, it is still an open question whether the amount of classical communication can be reduced by abandoning oblivious conditions.« less

  7. Enhancing the effectiveness of biological control programs of invasive species through a more comprehensive pest management approach.

    PubMed

    DiTomaso, Joseph M; Van Steenwyk, Robert A; Nowierski, Robert M; Vollmer, Jennifer L; Lane, Eric; Chilton, Earl; Burch, Patrick L; Cowan, Phil E; Zimmerman, Kenneth; Dionigi, Christopher P

    2017-01-01

    Invasive species are one of the greatest economic and ecological threats to agriculture and natural areas in the US and the world. Among the available management tools, biological control provides one of the most economical and long-term effective strategies for managing widespread and damaging invasive species populations of nearly all taxa. However, integrating biological control programs in a more complete integrated pest management approach that utilizes increased information and communication, post-release monitoring, adaptive management practices, long-term stewardship strategies, and new and innovative ecological and genetic technologies can greatly improve the effectiveness of biological control. In addition, expanding partnerships among relevant national, regional, and local agencies, as well as academic scientists and land managers, offers far greater opportunities for long-term success in the suppression of established invasive species. In this paper we direct our recommendations to federal agencies that oversee, fund, conduct research, and develop classical biological control programs for invasive species. By incorporating these recommendations into adaptive management strategies, private and public land managers will have far greater opportunities for long-term success in suppression of established invasive species. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  8. Probabilistic Teleportation of an Arbitrary Three-Level Two-Particle State and Classical Communication Cost

    NASA Astrophysics Data System (ADS)

    Dai, Hong-Yi; Kuang, Le-Man; Li, Cheng-Zu

    2005-07-01

    We propose a scheme to probabilistically teleport an unknown arbitrary three-level two-particle state by using two partial entangled two-particle states of three-level as the quantum channel. The classical communication cost required in the ideal probabilistic teleportation process is also calculated. This scheme can be directly generalized to teleport an unknown and arbitrary three-level K-particle state by using K partial entangled two-particle states of three-level as the quantum channel. The project supported by National Fundamental Research Program of China under Grant No. 2001CB309310, National Natural Science Foundation of China under Grant Nos. 10404039 and 10325523

  9. Quantum secret sharing via local operations and classical communication

    PubMed Central

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-01-01

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or “ramp”), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect. PMID:26586412

  10. The broadcast classical-quantum capacity region of a two-phase bidirectional relaying channel

    NASA Astrophysics Data System (ADS)

    Boche, Holger; Cai, Minglai; Deppe, Christian

    2015-10-01

    We studied a three-node quantum network that enables bidirectional communication between two nodes with a half-duplex relay node for transmitting classical messages. A decode-and-forward protocol is used to perform the communication in two phases. In the first phase, the messages of two nodes are transmitted to the relay node. The capacity of the first phase is well known by previous works. In the second phase, the relay node broadcasts a re-encoded composition to the two nodes. We determine the capacity region of the broadcast phase. To the best of our knowledge, this is the first paper analyzing quantum bidirectional relay networks.

  11. Classification of Four-Qubit States by Means of a Stochastic Local Operation and the Classical Communication Invariant

    NASA Astrophysics Data System (ADS)

    Zha, Xin-Wei; Ma, Gang-Long

    2011-02-01

    It is a recent observation that entanglement classification for qubits is closely related to stochastic local operations and classical communication (SLOCC) invariants. Verstraete et al.[Phys. Rev. A 65 (2002) 052112] showed that for pure states of four qubits there are nine different degenerate SLOCC entanglement classes. Li et al.[Phys. Rev. A 76 (2007) 052311] showed that there are at feast 28 distinct true SLOCC entanglement classes for four qubits by means of the SLOCC invariant and semi-invariant. We give 16 different entanglement classes for four qubits by means of basic SLOCC invariants.

  12. Principals' Personal Variables and Information and Communication Technology Utilization in Federal Capital Territory Senior Secondary Schools, Abuja, Nigeria

    ERIC Educational Resources Information Center

    Ogunshola, Roseline Folashade; Adeniyi, Abiodun

    2017-01-01

    The study investigated principals' personal variables and information and communication technology utilization in Federal Capital Territory (FCT) senior secondary schools, Abuja, Nigeria. The study adopted the correlational research design. The study used a sample of 94 senior secondary schools (including public and private) in FCT. Stratified…

  13. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    ERIC Educational Resources Information Center

    AlAfnan, Mohammad Awad

    2015-01-01

    This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales's (1990) move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one…

  14. Assertive Communication and Teamwork: Results of an Intervention Program to the Supervisors of a Company

    ERIC Educational Resources Information Center

    Montes de Oca, Jesús H.

    2014-01-01

    The study aimed to determine the effect of the implementation of the program "Manage your Talent" on assertive communication and teamwork competences. A quasi-experimental research design was used with pretest - intervention - post-test with control group. The sample included 28 supervisors from a private company, 13 in the experimental…

  15. Willingness to Communicate in English among Iranian EFL Students

    ERIC Educational Resources Information Center

    Aliakbari, Mohammad; Kamangar, Mohsen; Khany, Reza

    2016-01-01

    Much has been written on the determinants that can expedite or hinder learners' willingness to communicate in second and foreign language contexts. Though the literature is abundant with studies on many of these variables, little if any can be found to have targeted EFL students of private institutes in Iran. An effort was made in this study to…

  16. Subject Specialization and Science Teachers' Perception of Information and Communication Technology for Instruction in Kwara State

    ERIC Educational Resources Information Center

    Fakomogbon, Michael Ayodele; Adebayo, Rachael Funmi; Adegbija, Mosiforeba Victoria; Shittu, Ahmed Tajudeen; Oyelekan, Oloyede Solomon

    2014-01-01

    This study examined Kwara State secondary school science teachers' perception of [information and communications technology] ICT for instruction based on their area of specialization. Participants were 630 science teachers of Biology, Chemistry, Physics and Mathematics from both public and private senior secondary schools in 12 Local Government…

  17. 47 CFR 90.625 - Other criteria to be applied in assigning channels for use in conventional systems of communication.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... certifies on its application that a channel will be loaded to 70 mobile stations, that channel will be made... COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES... Policies Governing the Processing of Applications and the Selection and Assignment of Frequencies for Use...

  18. A Study on the Prediction of the Teaching Profession Attitudes by Communication Skills and Professional Motivation

    ERIC Educational Resources Information Center

    Çimen, Latife Kabakli

    2016-01-01

    This study aims to investigate the prediction of the attitudes regarding teaching profession by the communication skills and professional motivation of pedagogical formation students. 261 pre-service teachers receiving pedagogical formation training Istanbul at a private university in the 2014-2015 academic year were included in the research as…

  19. 26 CFR 49.4253-10 - Exemption for certain private communications services.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... conducted with no purpose of gain or profit. A line or channel is considered to be furnished between... functions performed by a communications company exchange. Where an amount is paid which includes a charge for such a line or channel and also a charge for the service provided by means of switching functions...

  20. 26 CFR 49.4253-10 - Exemption for certain private communications services.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... conducted with no purpose of gain or profit. A line or channel is considered to be furnished between... functions performed by a communications company exchange. Where an amount is paid which includes a charge for such a line or channel and also a charge for the service provided by means of switching functions...

  1. 26 CFR 49.4253-10 - Exemption for certain private communications services.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... conducted with no purpose of gain or profit. A line or channel is considered to be furnished between... functions performed by a communications company exchange. Where an amount is paid which includes a charge for such a line or channel and also a charge for the service provided by means of switching functions...

  2. 26 CFR 49.4253-10 - Exemption for certain private communications services.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... conducted with no purpose of gain or profit. A line or channel is considered to be furnished between... functions performed by a communications company exchange. Where an amount is paid which includes a charge for such a line or channel and also a charge for the service provided by means of switching functions...

  3. Scriptural Engagement, Communication with God, and Moral Behavior among Children

    ERIC Educational Resources Information Center

    Ovwigho, Pamela Caudill; Cole, Arnold

    2010-01-01

    How often an individual reads or listens to scripture is one dimension of private spirituality rarely discussed in the literature. In this study, we use data from a random sample survey of 1009 American children (ages eight to 12) to explore children's engagement with the Christian Bible, their views of communicating with God, and their moral…

  4. Building a successful trauma practice in a community setting.

    PubMed

    Althausen, Peter L

    2011-12-01

    The development of a busy community-based trauma practice is a multifaceted endeavor that requires good clinical judgment, business acumen, interpersonal skills, and negotiation tactics. Private practice is a world in which perfect outcomes are expected and efficiency is paramount. Successful operative outcomes are dependent on solid clinical training, good preoperative planning, and communication with mentors when necessary. Private practitioners must display confidence, polite behavior, and promptness. Maintaining availability for consultation from emergency room physicians, private practice physicians, and local orthopaedic surgeons is a powerful marketing tool. Orthopaedic trauma surgery has been shown to be a profitable field for hospitals and private practitioners. However, physician success depends on a sound understanding of hospital finance, marketing skills, and knowledge of billing and coding. As the financial pressures of medical care increase, hospital negotiation will be paramount, and private practitioners must combine clinical and business skills to provide good patient care while maintaining independence and financial security.

  5. Exponential Communication Complexity Advantage from Quantum Superposition of the Direction of Communication

    NASA Astrophysics Data System (ADS)

    Guérin, Philippe Allard; Feix, Adrien; Araújo, Mateus; Brukner, Časlav

    2016-09-01

    In communication complexity, a number of distant parties have the task of calculating a distributed function of their inputs, while minimizing the amount of communication between them. It is known that with quantum resources, such as entanglement and quantum channels, one can obtain significant reductions in the communication complexity of some tasks. In this work, we study the role of the quantum superposition of the direction of communication as a resource for communication complexity. We present a tripartite communication task for which such a superposition allows for an exponential saving in communication, compared to one-way quantum (or classical) communication; the advantage also holds when we allow for protocols with bounded error probability.

  6. Marketing communications in nonbusiness situations or why it's so hard to sell brotherhood like soap.

    PubMed

    Rothschild, M L

    1979-01-01

    Marketing tools, techniques, and theories developed in the private sector can be applied in the public and nonprofit sectors; however, their limitations must be recognized. Nonbusiness communications campaigns should consider the involvedness (high or low) of the situation and the relevant segments, available positive and negative reinforcers, nonmonetary costs, the level of latent demand, and the wide range of communications alternatives. 5 hypotheses can be proposed regarding communications effectiveness outside of the private sector: 1) the lower the perceived personal value to the individual, relative to the cost, the more difficult the behavior change task and the lower the likelihood of success of marketing communications; 2) the lower the latent or pre-existing demand for the object, the more difficult the behavior change task and the lower the likelihood of marketing communications success; 3) the greater the involvement level of the object, situation, or issue, the more difficult the behavior change task and the lower the likelihood of marketing success; 4) the greater the past involvement level of the individual, the more difficult the behavior change task and the lower the likelihood of success; and 5) the greater the level of participation needed within the society, the more difficult the behavior change and the lower the likelihood of sucess of marketing communications. Many nonbusiness issues exist in either very high or very low involvement environments, calling for an enlarged set of communications strategies. More attention should be given to communications alternatives such as movies, television programs, and in-home and in-school educational communications, especially since it appears that public service spots are not very effective. Finally, more research is needed to generate and test the effectiveness of various marketing strategies aimed at overcoming inherent characteristics that suggest a low likelihood of success.

  7. The privatization of environmental health services: a national survey of practices and perspectives in local health departments.

    PubMed

    Keane, Christopher; Marx, John; Ricci, Edmund

    2002-01-01

    This article presents nationally representative data on environmental health (EH) services privatized by local public health departments, enforcement and assurance mechanisms for privatized services, and administrators' views about EH services that should not be privatized. A national sample of 380 local public health departments, stratified by jurisdiction size, was drawn from a universe of 2,488 departments. Telephone interviews were conducted with 347 administrators of departments. Results were weighted to be nationally representative. Approximately one-quarter of departments had privatized at least one EH service, almost always to for-profit organizations. The two most common reasons given for privatizing EH services were cost savings or increased efficiency and lack of capacity or expertise to carry out the service. The most rigorous, although infrequent, technique of enforcement and assurance of EH standards when services were privatized was double-testing of samples. Departments more commonly relied on state licensing and certification of contractors. When asked what services should not be privatized, 27% of respondents cited EH services. Many respondents argued against privatizing environmental services that have inherent regulatory functions. They expressed concern that privatization would fragment the public health infrastructure by impairing communication, diminishing control over performance, or weakening health departments' capacity to respond to environmental and other health crises. These findings raise serious concerns about the privatization of EH.

  8. Patient communication in radiology: current status of breaking bad news among radiologists and radiology trainees in Pakistan.

    PubMed

    Ali Khawaja, Ranish Deedar; Akhtar, Waseem; Khawaja, Ali; Irfan, Hira; Naeem, Mohammad; Memon, Mukhtiar

    2013-10-01

    Breaking bad news can be an intimidating task for any physician. The aim of this study was to record the practices of breaking bad news to the patients by Pakistani radiologists and trainees. The radiologists and trainees attending the 26th National Radiological Conference in October 2010 in Karachi, Pakistan, were surveyed. The response rate was 76%. The respondents included residents (51%), private practicing radiologists (28%), academic radiologists (13%), and other trainees (8%). Most of the academic radiologists communicated with their patients. The daily frequency of breaking bad news by residents was noted, which was highest in the public teaching hospitals (71%). For severe abnormalities such as malignancy, 50% residents, 55% of the academic radiologists and 74% of the private practicing radiologists were very uncomfortable in disclosure of results. Differences in frequency of communication with patients were noticed with both different training levels, and different settings of practice in a developing country.

  9. Quantum generalisation of feedforward neural networks

    NASA Astrophysics Data System (ADS)

    Wan, Kwok Ho; Dahlsten, Oscar; Kristjánsson, Hlér; Gardner, Robert; Kim, M. S.

    2017-09-01

    We propose a quantum generalisation of a classical neural network. The classical neurons are firstly rendered reversible by adding ancillary bits. Then they are generalised to being quantum reversible, i.e., unitary (the classical networks we generalise are called feedforward, and have step-function activation functions). The quantum network can be trained efficiently using gradient descent on a cost function to perform quantum generalisations of classical tasks. We demonstrate numerically that it can: (i) compress quantum states onto a minimal number of qubits, creating a quantum autoencoder, and (ii) discover quantum communication protocols such as teleportation. Our general recipe is theoretical and implementation-independent. The quantum neuron module can naturally be implemented photonically.

  10. Cost and affordability of non-communicable disease screening, diagnosis and treatment in Kenya: Patient payments in the private and public sectors

    PubMed Central

    Gakunga, Robai; Kibachio, Joseph; Gathecha, Gladwell; Edwards, Patrick; Ogola, Elijah; Yonga, Gerald; Busakhala, Naftali; Munyoro, Esther; Chakaya, Jeremiah; Ngugi, Nancy; Mwangi, Nyawira; Von Rege, Daniel; Wangari, Lili-Marie; Wata, David; Makori, Robert; Mwangi, Julius; Mwanda, Walter

    2018-01-01

    Introduction The prevalence of non-communicable diseases (NCDs) is rising in low- and middle-income countries, including Kenya, disproportionately to the rest of the world. Our objective was to quantify patient payments to obtain NCD screening, diagnosis, and treatment services in the public and private sector in Kenya and evaluate patients’ ability to pay for the services. Methods and findings We collected payment data on cardiovascular diseases, diabetes, breast and cervical cancer, and respiratory diseases from Kenyatta National Hospital, the main tertiary public hospital, and the Kibera South Health Center—a public outpatient facility, and private sector practitioners and hospitals. We developed detailed treatment frameworks for each NCD and used an itemization cost approach to estimate payments. Patient affordability metrics were derived from Kenyan government surveys and national datasets. Results compare public and private costs in U.S. dollars. NCD screening costs ranged from $4 to $36, while diagnostic procedures, particularly for breast and cervical cancer, were substantially more expensive. Annual hypertension medication costs ranged from $26 to $234 and $418 to $987 in public and private facilities, respectively. Stroke admissions ($1,874 versus $16,711) and dialysis for chronic kidney disease ($5,338 versus $11,024) were among the most expensive treatments. Cervical and breast cancer treatment cost for stage III (curative approach) was about $1,500 in public facilities and more than $7,500 in the private facilities. A large proportion of Kenyans aged 15 to 49 years do not have health insurance, which makes NCD services unaffordable for most people given the overall high cost of services relative to income (average household expenditure per adult is $413 per annum). Conclusions There is substantial variation in patient costs between the public and private sectors. Most NCD diagnosis and treatment costs, even in the public sector, represent a substantial economic burden that can result in catastrophic expenditures. PMID:29304049

  11. The Quasi Government: Hybrid Organizations with Both Government and Private Sector Legal Characteristics

    DTIC Science & Technology

    2005-05-18

    Legal Services Corporation , for example, would be a quago, while the Red Cross would be a quango. Whatever the value of the quago/quango designations...especially in the comparative international literature on corporate organizations, it shall not be used here. This report follows the lineal spectrum...evidenced in the establishment of the Communications Satellite Corporation (ComSat) in 1962. Congress, in this instance, created a private, for

  12. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  13. Classic Conversational Norms in Modern Computer-Mediated Collaboration

    ERIC Educational Resources Information Center

    Oeberst, Aileen; Moskaliuk, Johannes

    2016-01-01

    This paper examines whether conversational norms that have been observed for face-to-face communication also hold in the context of a specific type of computer-mediated communication: collaboration (such as in Wikipedia). Specifically, we tested adherence to Grice's (1975) maxim of relation--the implicit demand to contribute information that is…

  14. A Communication Configuration of AIDS.

    ERIC Educational Resources Information Center

    Hughey, Jim D.

    A study focused on the way that image, knowledge, behavioral intent, and communicative responsiveness are configured for Acquired Immunodeficiency Syndrome (AIDS). The classic model of the adoption process expects that knowledge about a subject will lead to a favorable evaluation of it, which in turn will lead to a decision to act. But the…

  15. AI-Based Chatterbots and Spoken English Teaching: A Critical Analysis

    ERIC Educational Resources Information Center

    Sha, Guoquan

    2009-01-01

    The aim of various approaches implemented, whether the classical "three Ps" (presentation, practice, and production) or communicative language teaching (CLT), is to achieve communicative competence. Although a lot of software developed for teaching spoken English is dressed up to raise interaction, its methodology is largely rooted in tradition.…

  16. Innovative Training of Oral Communication: Berlin Kompass

    ERIC Educational Resources Information Center

    Pihkala-Posti, Laura

    2014-01-01

    In a classical instructed language classroom setting, the practicing of communication situations is too often limited to producing isolated phrases and sentences without actually testing their relevance for the intended action. An example is describing and finding a route. In this paper, results of the early pilots with a collaborative virtual…

  17. Analyzing International Letters in a Business Communication Class.

    ERIC Educational Resources Information Center

    Devet, Bonnie

    1998-01-01

    Shows how students can use persuasive principles of communication (format and writer's purpose) and of classical rhetoric (organization, ethos, pathos, logos, and style) to improve their ability to analyze business letters. Shows how applying these principles to the analysis of business letters from other countries helps students write better and…

  18. Health care of female outpatients in south-central India: comparing public and private sector provision.

    PubMed

    Bhatia, Jagdish; Cleland, John

    2004-11-01

    The object of this study was to compare components of quality of care provided to female outpatients by practitioners working in the private and public sectors in Karnataka State, India. Consultations conducted by 18 private practitioners and 25 public-sector practitioners were observed for 5 days using a structured protocol. Private practitioners were selected from members of the Indian Medical Association in a predominantly rural sub-district of Kolar District. Government doctors were selected from a random sample of hospitals and health centres in three sub-districts of Mysore District. A total of 451 private-sector and 650 public-sector consultations were observed; in each sector about half involved a female practitioner. The mean length of consultation was 2.81 minutes in the public sector and 6.68 minutes in the private sector. Compared with public-sector practitioners, private practitioners were significantly more likely to undertake a physical examination and to explain their diagnosis and prognosis to the patient. Privacy was much better in the private sector. One-third of public-sector patients received an injection compared with two-thirds of private patients. The mean cost of drugs dispensed or prescribed were Rupees 37 and 74 in public and private sectors, respectively. Both in terms of thoroughness of diagnosis and doctor-patient communication, the quality of care appears to be much higher in the private than in the public sector. However, over-prescription of drugs by private practitioners may be occurring.

  19. The Process of Self-Cultivation and the Mandala Model of the Self.

    PubMed

    Wu, Meiyao

    2017-01-01

    In his Mandala model of the self, Taiwanese scholar Kwang-Kuo Hwang sees each human being as a combination or intersection of private individual and social person, and also of knowledge and action. To further elaborate the model-with a particular emphasis on teaching/learning, the development of the ideal self and spiritual transcendence-this article will explore the psychological process of self-cultivation in the light of traditional Confucian thinking, which means keeping a balance between inner/outer and self/other. The Neo-Confucian thinker Zhongsha Mou's theories of "the awareness of unexpected developments" and his meditation/cognitive thinking opposition will also be discussed. The analyzed sources will include the traditional Confucian classics (the Four Books and Liji, or Classic of Rites ) and especially the " Lessons for Learning ( Xue-Ji )" in the Classic of Rites ( Liji ), along with the relevant textual research. Based upon a cultural-semantic analysis of these classics as well as of Hwang's central ideas, the author attempts to further conceptualize the process of cultivating the ideal self in Confucian education.

  20. Cosmic Experiments: Remaking Materialism and Daoist Ethic "Outside of the Establishment".

    PubMed

    Zhan, Mei

    2016-01-01

    In this article, I discuss recent experiments in 'classical' (gudian) Chinese medicine. As the marketization and privatization of health care deepens and enters uncharted territories in China, a cohort of young practitioners and entrepreneurs have begun their quest for the 'primordial spirit' of traditional Chinese medicine by setting up their own businesses where they engage in clinical, pedagogical, and entrepreneurial practices outside of state-run institutions. I argue that these explorations in classical Chinese medicine, which focus on classical texts and Daoist analytics, do not aim to restore spirituality to the scientized and secularized theory of traditional Chinese medicine. Nor are they symptomatic of withdrawals from the modern world. Rather, these 'cosmic experiments' need to be understood in relation to dialectical and historical materialisms as modes of knowledge production and political alliance. In challenging the status of materialist theory and the process of theorization in traditional Chinese medicine and postsocialist life more broadly speaking, advocates of classical Chinese medicine imagine nondialectical materialisms as immanent ways of thinking, doing, and being in the world.

  1. The Process of Self-Cultivation and the Mandala Model of the Self

    PubMed Central

    Wu, Meiyao

    2017-01-01

    In his Mandala model of the self, Taiwanese scholar Kwang-Kuo Hwang sees each human being as a combination or intersection of private individual and social person, and also of knowledge and action. To further elaborate the model—with a particular emphasis on teaching/learning, the development of the ideal self and spiritual transcendence—this article will explore the psychological process of self-cultivation in the light of traditional Confucian thinking, which means keeping a balance between inner/outer and self/other. The Neo-Confucian thinker Zhongsha Mou's theories of “the awareness of unexpected developments” and his meditation/cognitive thinking opposition will also be discussed. The analyzed sources will include the traditional Confucian classics (the Four Books and Liji, or Classic of Rites) and especially the “Lessons for Learning (Xue-Ji)” in the Classic of Rites (Liji), along with the relevant textual research. Based upon a cultural-semantic analysis of these classics as well as of Hwang's central ideas, the author attempts to further conceptualize the process of cultivating the ideal self in Confucian education1. PMID:28174544

  2. Higher-dimensional communication complexity problems: Classical protocols versus quantum ones based on Bell's theorem or prepare-transmit-measure schemes

    NASA Astrophysics Data System (ADS)

    Tavakoli, Armin; Żukowski, Marek

    2017-04-01

    Communication complexity problems (CCPs) are tasks in which separated parties attempt to compute a function whose inputs are distributed among the parties. Their communication is limited so that not all inputs can be sent. We show that broad classes of Bell inequalities can be mapped to CCPs and that a quantum violation of a Bell inequality is a necessary and sufficient condition for an enhancement of the related CCP beyond its classical limitation. However, one can implement CCPs by transmitting a quantum system, encoding no more information than is allowed in the CCP, and extracting information by performing measurements. We show that for a large class of Bell inequalities, the improvement of the CCP associated with a quantum violation of a Bell inequality can be no greater than the improvement obtained from quantum prepare-transmit-measure strategies.

  3. 75 FR 43423 - 1998 Biennial Regulatory Review-Private Land Mobile Radio Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... image communication service for the personal or business activities of the general public. In response... Clauses 6. Pursuant to sections 4(i), 4(j), and 303(r) of the Communications Act of 1934, as amended, 47 U.S.C. 154(i), 154(j), 303(r), notice is hereby given of the proposed amendments to parts 1, 27, and...

  4. Male and female adolescents' perceived interpersonal communication skills according to history of sexual coercion.

    PubMed

    Anderson, V; Reis, J; Stephens, Y

    1997-01-01

    This report summarizes the experience of 61 female adolescents recruited through a private adolescent family planning clinic, and 183 9th through 12th-grade adolescents recruited from a private suburban high school regarding their experiences with dating relationships, sexual communication skills, and psychological status. The samples were predominantly white and middle to upper income. Perceptions of interpersonal communication skills were analyzed according to gender, clinic versus school, and history of sexual coercion. The adolescents were generally confident that they could assert their own preferences and stand up to other regarding sexual issues with the exception of the small group of high school males reporting having had experienced sexual coercion. This group (N = 20) expressed difficulty in talking to their partners about safer sex, getting their partner(s) to listen to them, or turning down alcohol or drugs prior to having sex. These boys were also more likely to report missing classes or having other kinds of trouble with school, to be concerned about use of alcohol and drugs, and about feeling unpopular. None of the female groups had this profile of communication and emotional problems. Implications for preventive education programming on interpersonal skills and sexuality are considered.

  5. Downlink Acquisition and Tracking Procedures for the ASCAMP Satellite Communications Terminal

    DTIC Science & Technology

    1993-09-14

    ACQUISITION AND TRACKING PROCEDURES FOR THE ASCAMP SATELLITE COMMUNICATIONS TERMINAL R.J. FIGUCIA Group 66 DM QUAIrTY INPECTED S Accesion For NTIS CRAMI...accuracy of 50 ns for clock drifts up to 100 ns/s. 1 ne spatial tracking procedure sustains a 0.250 accuraci for a typical geosynchronous orbit and is...Fishman, Private communication (15 June 1990). 2. G. Gorski-Popiel, " Architecture of ASCAMP digital hardware," 1991 IEEE MiW. Commun. Conf. Rec., 1110-1116

  6. Polar codes for achieving the classical capacity of a quantum channel

    NASA Astrophysics Data System (ADS)

    Guha, Saikat; Wilde, Mark

    2012-02-01

    We construct the first near-explicit, linear, polar codes that achieve the capacity for classical communication over quantum channels. The codes exploit the channel polarization phenomenon observed by Arikan for classical channels. Channel polarization is an effect in which one can synthesize a set of channels, by ``channel combining'' and ``channel splitting,'' in which a fraction of the synthesized channels is perfect for data transmission while the other fraction is completely useless for data transmission, with the good fraction equal to the capacity of the channel. Our main technical contributions are threefold. First, we demonstrate that the channel polarization effect occurs for channels with classical inputs and quantum outputs. We then construct linear polar codes based on this effect, and the encoding complexity is O(N log N), where N is the blocklength of the code. We also demonstrate that a quantum successive cancellation decoder works well, i.e., the word error rate decays exponentially with the blocklength of the code. For a quantum channel with binary pure-state outputs, such as a binary-phase-shift-keyed coherent-state optical communication alphabet, the symmetric Holevo information rate is in fact the ultimate channel capacity, which is achieved by our polar code.

  7. System architecture for an advanced Canadian communications satellite demonstration mission

    NASA Astrophysics Data System (ADS)

    Takats, P.; Irani, S.

    1992-03-01

    An advanced communications satellite system that provides single hop interconnectivity and interworking for both a personal communications network and an advanced private business network in the Ka and Ku bands respectively, is presented. An overall network perspective is discussed that studies the interface of such an advanced satellite communication system to the terrestrial network in the context of the Open Systems Interconnection model. It is shown that this proposed satellite system can dynamically establish links and efficiently allocate the satellite resource amongst the user terminal population for a mix of data and voice traffic.

  8. Distilling Gaussian states with Gaussian operations is impossible.

    PubMed

    Eisert, J; Scheel, S; Plenio, M B

    2002-09-23

    We show that no distillation protocol for Gaussian quantum states exists that relies on (i) arbitrary local unitary operations that preserve the Gaussian character of the state and (ii) homodyne detection together with classical communication and postprocessing by means of local Gaussian unitary operations on two symmetric identically prepared copies. This is in contrast to the finite-dimensional case, where entanglement can be distilled in an iterative protocol using two copies at a time. The ramifications for the distribution of Gaussian states over large distances will be outlined. We also comment on the generality of the approach and sketch the most general form of a Gaussian local operation with classical communication in a bipartite setting.

  9. Errata report on Herbert Goldstein's Classical Mechanics: Second edition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Unseren, M.A.; Hoffman, F.M.

    This report describes errors in Herbert Goldstein's textbook Classical Mechanics, Second Edition (Copyright 1980, ISBN 0-201-02918-9). Some of the errors in current printings of the text were corrected in the second printing; however, after communicating with Addison Wesley, the publisher for Classical Mechanics, it was discovered that the corrected galley proofs had been lost by the printer and that no one had complained of any errors in the eleven years since the second printing. The errata sheet corrects errors from all printings of the second edition.

  10. Public and Private School Distinction, Regional Development Differences, and Other Factors Influencing the Success of Primary School Students in Turkey

    ERIC Educational Resources Information Center

    Sulku, Seher Nur; Abdioglu, Zehra

    2015-01-01

    This study investigates the factors influencing the success of students in primary schools in Turkey. TIMSS 2011 data for Turkey, measuring the success of eighth-grade students in the field of mathematics, were used in an econometric analysis, performed using classical linear regression models. Two hundred thirty-nine schools participated in the…

  11. The Development of the Command and Control Centre for Trial Kondari

    DTIC Science & Technology

    2010-07-01

    the C2 centre inside a blue bubble whose modems have privately assigned IP addresses which are authenticated by Telstra’s radius server. No other sim...cards can communicate on this private network unless authorised by the radius server. The Next IP network is a network bubble within the larger Next...for all machines on the network.  EPLRS Network Manager (ENM) radio – authenticates and manages all the EPLRS radios. The basic plan’s final

  12. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    NASA Astrophysics Data System (ADS)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the inability to provide the authentication between the end users during the quantum and classical channels. The proposed QKD protocol was designed to utilize some advantages of quantum physics as well as solid functions that are used in the classical cryptography. The authentication is a requirement during different communication channels, where both legitimate parties must confirm their identities before starting to submit data (plain-text). Moreover, the protocol uses most needed scenarios to finish the communication without leaking important data. These scenarios have been approved in existing QKD protocols either by classical or quantum systems. The matrix techniques also are used as a part of the preparation of the authentication key, where the end users communicate by an EPR (related to Einstein, Podolsky, and Rosen theory in 1935 ) channel. The EPR channel will be supported by an entanglement of particles. If the EPR communication succeeded, transferring the converted plain-text is required. Finally, both end users will have an authenticated secret key, and the submission will be done without any interruption.

  13. A novel quantum scheme for secure two-party distance computation

    NASA Astrophysics Data System (ADS)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  14. A Robust and Efficient Quantum Private Comparison of Equality Based on the Entangled Swapping of GHZ-like State and χ + State

    NASA Astrophysics Data System (ADS)

    Xu, Ling; Zhao, Zhiwen

    2017-08-01

    A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.

  15. Gaussian private quantum channel with squeezed coherent states

    PubMed Central

    Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong

    2015-01-01

    While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime. PMID:26364893

  16. Gaussian private quantum channel with squeezed coherent states.

    PubMed

    Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong

    2015-09-14

    While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime.

  17. Genetic and Environmental Influences on Media Use and Communication Behaviors

    ERIC Educational Resources Information Center

    Kirzinger, Ashley E.; Weber, Christopher; Johnson, Martin

    2012-01-01

    A great deal of scholarly work has explored the motivations behind media consumption and other various communication traits. However, little research has investigated the sources of these motivations and virtually no research considers their potential genetic underpinnings. Drawing on the field of behavior genetics, we use a classical twin design…

  18. Measuring Integration of Information and Communication Technology in Education: An Item Response Modeling Approach

    ERIC Educational Resources Information Center

    Peeraer, Jef; Van Petegem, Peter

    2012-01-01

    This research describes the development and validation of an instrument to measure integration of Information and Communication Technology (ICT) in education. After literature research on definitions of integration of ICT in education, a comparison is made between the classical test theory and the item response modeling approach for the…

  19. Implementation of generalized quantum measurements: Superadditive quantum coding, accessible information extraction, and classical capacity limit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Takeoka, Masahiro; Fujiwara, Mikio; Mizuno, Jun

    2004-05-01

    Quantum-information theory predicts that when the transmission resource is doubled in quantum channels, the amount of information transmitted can be increased more than twice by quantum-channel coding technique, whereas the increase is at most twice in classical information theory. This remarkable feature, the superadditive quantum-coding gain, can be implemented by appropriate choices of code words and corresponding quantum decoding which requires a collective quantum measurement. Recently, an experimental demonstration was reported [M. Fujiwara et al., Phys. Rev. Lett. 90, 167906 (2003)]. The purpose of this paper is to describe our experiment in detail. Particularly, a design strategy of quantum-collective decodingmore » in physical quantum circuits is emphasized. We also address the practical implication of the gain on communication performance by introducing the quantum-classical hybrid coding scheme. We show how the superadditive quantum-coding gain, even in a small code length, can boost the communication performance of conventional coding techniques.« less

  20. The reaction of private physicians to price deregulation in France.

    PubMed

    Carrere, M O

    1991-01-01

    French private physicians are paid on a fee-for-service basis and nearly all of them are under contract to the Social Security, which refunds part of the medical fee to the whole population. Previously the prices of medical services were fixed, but since 1980, a new option has been possible: a doctor can choose to fix the price of his services freely, provided he pays a higher social insurance contribution. But the amount refunded by Social Security does not vary, so that the consumer has to bear the extra charge. Our purpose here is to identify the factors that influence the physician's option. In Section 2, we define a model of the private physician's economic behaviour, of the classic income-leisure type. In Section 3, empirical tests are performed on a sample of observations in 95 'départements', gathering information about private GPs on the one hand, and the whole population on the other. According to our results, GPs' decisions depend on characteristics of both supply of and demand for GPs' services. One of our conclusions is that GPs seem to make up for low activity levels with higher prices, on condition the income of their practice allows it.

  1. Ways and Means to Utilize Private Practitioners for Tuberculosis Care in India.

    PubMed

    Samal, Janmejaya

    2017-02-01

    The growing interest of utilizing the private practitioners in improving the outreach of public health services including Tuberculosis (TB) control programme stemmed out of people's preference for private health facilities in situations where public health facilities fail to meet the expectations. In different parts of India, many models of Public Private Partnership have been tried and tested and proved successful in providing quality TB care in the concerned community. In this paper, several ways and means have been proposed to effectively utilize private practitioners for TB care in India. These strategies are discussed under different headings: (1) identification of potential private practitioners: (2) orientation of private practitioners: (3) networking of private practitioners with patients and Directly Observed Treatment Short course (DOTS) provider: (4) follow-up and sensitization of patients by private practitioners: (5) let the word of mouth work: and (6) evaluation of the involvement of private practitioners in TB care. However the following points must be addressed before utilizing the private practitioners for TB care: time constraints in notifying the disease, adherence to DOTS regime/alternative to DOTS regime, referral of patients to public health facilities for diagnosis and treatment, follow-up and sensitization of the patients and behaviour change communication and awareness in the community by the private practitioners. Few of these are mandatory for the private practitioners; most are practicable. With the effective utilization of private practitioners many problems can be sorted out that are currently plaguing the system such as irrational and excessive use of certain drugs, over reliance on chest X-ray for diagnosis, under use of sputum microscopy, lack of knowledge regarding standard treatment protocols and varied prescription practices.

  2. Comparison of patient perceived primary care quality in public clinics, public hospitals and private clinics in rural China.

    PubMed

    Wang, Wenhua; Maitland, Elizabeth; Nicholas, Stephen; Loban, Ekaterina; Haggerty, Jeannie

    2017-10-03

    In rural China, patients have free choice of health facilities for outpatient services. Comparison studies exploring the attributes of different health facilities can help identify optimal primary care service models. Using a representative sample of Chinese provinces, this study aimed to compare patients' rating of three primary care service models used by rural residents (public clinics, public hospitals and private clinics) on a range of health care attributes related to responsiveness. This was a secondary analysis using the household survey data from World Health Organization (WHO) Study on global AGEing and adult health (SAGE). Using a multistage cluster sampling strategy, eight provinces were selected and finally 3435 overall respondents reporting they had visited public clinics, public hospitals or private clinics during the last year, were included in our analysis. Five items were used to measure patient perceived quality in five domains including prompt attention, communication and autonomy, dignity and confidentiality. ANOVA and Turkey's post hoc tests were used to conduct comparative analysis of five domains. Separate multivariate linear regression models were estimated to examine the association of primary care service models with each domain after controlling for patient characteristics. The distribution of last health facilities visited was: 29.5% public clinics; 31.2% public hospitals and; 39.3% private clinics. Public clinics perform best in all five domains: prompt attention (4.15), dignity (4.17), communication (4.07), autonomy (4.05) and confidentiality (4.02). Public hospitals perform better than private clinics in dignity (4.03 vs 3.94), communication (3.97 vs 3.82), autonomy (3.92 vs 3.74) and confidentiality (3.94 vs 3.73), but equivalently in prompt attention (3.92 vs 3.93). Rural residents who are older, wealthier, and with higher self-rated health status have significantly higher patient perceived quality of care in all domains. Rural public clinics, which share many characteristics with the optimal primary care delivery model, should be strongly strengthened to respond to patients' needs. Better doctor-patient interaction training would improve respect, confidentiality, autonomy and, most importantly, health care quality for rural patients.

  3. A national survey on availability, price and affordability of selected essential medicines for non communicable diseases in Sri Lanka.

    PubMed

    Dabare, Panthihage Ruvini L; Wanigatunge, Chandanie A; Beneragama, Bvs Hemantha

    2014-08-08

    Access to medicines is a universal right. Low availability and low affordability of medicines are issues that deny this right to a significant proportion of the world population. The objective of this study was to determine the availability, price and affordability of essential medicines prescribed to treat non communicable diseases in Sri Lanka. Methodology was based on the 2nd edition of the World Health Organization Health Action International Manual. A country survey was conducted and facilities representing both public and private pharmacies were selected. A total of 109 facilities was surveyed. At each facility data on the availability and prices of 50 essential medicines for non communicable diseases were collected. Percentage availability, median price of originator brand and lowest priced generic, median price ratio to the International Reference Price were calculated for surveyed medicines. Affordability was determined using the daily incomes of the lowest--paid unskilled government worker. Semi government community pharmacies had the highest (>80%) availability while outdoor pharmacies of public health care facilities, private pharmacies and outdoor pharmacies of private hospital showed a fairly high availability (50 - 80%) of surveyed medicines.Unit price of 76% of selected individual medicines was less than ten Sri Lankan rupees. Out of these 28% of medicines cost less than one Sri Lanka rupee. For 21 of the surveyed medicines the median price ratio to the international reference price was less than one. The prices of originator brands for 14 surveyed medicines were more than five times that of the lowest price generics.Less than a single day's wages was adequate to purchase a month's supply of the lowest priced generic of more than 67% of surveyed medicines. The availability of selected essential medicines was fairly high in both public and private sectors in Sri Lanka. Most medicines are affordable to the lowest income earners in the community. There were many generic brands and generics available for most of the medicines in private and semi government community pharmacies increasing both availability and affordability.

  4. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... evolution of NS/EP functions by or through the NPSBN. The Secure Government Communications Scoping Subcommittee is charged with examining how commercial-off-the-shelf technologies and private sector best...

  5. Getting Things Done in the L1 and L2: Bilingual Immigrant Women's Use of Communication Strategies in Entrepreneurial Contexts

    ERIC Educational Resources Information Center

    Collier, Shartriya

    2010-01-01

    The article examines the communication strategies of four bilingual, immigrant women entrepreneurs within the context of their businesses. The analysis revealed that L1 and L2 use is crucial to the business success of the participants. L1 conversations consisted of largely private speech and directives. The women positioned themselves as…

  6. NRL SSD Research Achievements: 19902000. Volume 4

    DTIC Science & Technology

    2015-10-30

    optically determined QPO frequencies from Haswell et al. (2000) and J Patterson & D. Skillman 2000, private communication ). The dotted lines line pertain to...Figure 90s.3III.8 - Daytime tomography using ultraviolet and radio frequency measurements. The retrieved electron density using LORAAS daytime 911 Å...very important because of the effects of the ionosphere on global long- distance radio communications and over-the-horizon radar. Additional mission

  7. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  8. Anxiety about speaking a foreign language as a mediator of the relation between motivation and willingness to communicate.

    PubMed

    Wu, Chia-Pei; Lin, Huey-Ju

    2014-12-01

    The purpose of this study was to examine whether anxiety about speaking a foreign language mediated the relation between motivation and a willingness to communicate among 107 Taiwanese students sampled from two public universities and one private university. A regression analysis indicated that motivation was negatively related to university students' anxiety about speaking a foreign language and positively related to willingness to communicate. Furthermore, anxiety about speaking a foreign language was negatively related to university students' willingness to communicate, and also partially mediated the relationship between motivation and willingness to communicate. The findings suggest that high motivation and low anxiety about speaking a foreign language are needed for Taiwanese students to demonstrate a stronger willingness to communicate.

  9. [Communication between nursing students and patients with Aids].

    PubMed

    de Lima, Ivana Cristina Vieira; Galvão, Marli Teresinha Gimeniz; Costa, Enia; Freitas, Julyana Gomes; Freitag, Lorita Marlena

    2011-04-01

    This study was performed with the purpose to analyze the communication between nursing students and patients with AIDS during peripheral venous puncture. Video recordings were made of six pairs (student-patient) while performing the venous puncture procedure in May 2009 at a day-hospital in Fortaleza-Ceará. As a group, four judges evaluated the interactions established between the pairs. The analyses were categorized in: Valuing technique over communication; Mask: a barriers to communication; Private space invasion; Interference of the environment in the communication. It was concluded that different factors increase the difficulty establishing an effective communication, especially the need for students to be trained about the importance of establishing communication during care, so as to promote humanized and individual care, in which sensitivity and empathy overlap fear and insecurity.

  10. The application of "integrated marketing communications" to social marketing and health communication: organizational challenges and implications.

    PubMed

    Nowak, G; Cole, G; Kirby, S; Freimuth, V; Caywood, C

    1998-01-01

    Influencing consumer behavior is a difficult and often resource-intensive undertaking, with success usually requiring identifying, describing, and understanding target audiences; solid product and/or service positioning relative to competitors; and significant media and communication resources. Integrated marketing communication (IMC) is a new way of organizing and managing persuasive communication tools and functions which involves realigning communications to consider the flow of information from an organization from the viewpoint of end consumers. Although the application of IMC to social marketing remains relatively unexplored, the IMC literature and recent efforts by the US Centers for Disease Prevention and Control suggest that integrated communication approaches have much to offer social marketing and health communication efforts. IMC, IMC and social marketing, and implications of IMC for public and private sector social marketing programs are discussed.

  11. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... from groups or individuals for pamphlets, photos, biographies, historical matter, etc., must be... details.) If a lengthy search, beyond the convenient manpower resources of the command, would be required...

  12. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... from groups or individuals for pamphlets, photos, biographies, historical matter, etc., must be... details.) If a lengthy search, beyond the convenient manpower resources of the command, would be required...

  13. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... from groups or individuals for pamphlets, photos, biographies, historical matter, etc., must be... details.) If a lengthy search, beyond the convenient manpower resources of the command, would be required...

  14. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... from groups or individuals for pamphlets, photos, biographies, historical matter, etc., must be... details.) If a lengthy search, beyond the convenient manpower resources of the command, would be required...

  15. Facility uses Six Sigma to improve quality.

    PubMed

    2006-09-01

    Initiative demonstrates a 23% improvement in first bed assignment to a private isolation room. Keys to improvement found in enhanced communication and staff training. Staff develop reporting mechanism to sustain and institutionalize project results.

  16. “The Work Must Go On”

    PubMed Central

    ter Hoeven, Claartje L.; Miller, Vernon D.; Peper, Bram; den Dulk, Laura

    2016-01-01

    The Netherlands is characterized by extensive national work–life regulations relative to the United States. Yet, Dutch employees do not always take advantage of existing work–life policies. Individual and focus group interviews with employees and managers in three (public and private) Dutch organizations identified how employee and managerial communication contributed to acquired rules concerning work–life policies and the interpretation of allocative and authoritative resources for policy enactment. Analyses revealed differences in employees’ and managers’ resistance to policy, the binds and dilemmas experienced, and the coordination of agreements and actions to complete workloads. There are also differences between public and private contexts in the enactment of national and organizational policies, revealing how national (e.g., gender) and organizational (e.g., concertive control) mechanisms play out in employee and managerial communication that determine the use of work–life policies. PMID:29708121

  17. "Be Nice": Wikipedia norms for supportive communication

    NASA Astrophysics Data System (ADS)

    Reagle, Joseph M.

    2010-04-01

    Wikipedia is acknowledged to have been home to "some bitter disputes." Indeed, conflict at Wikipedia is said to be "as addictive as cocaine." Yet, such observations are not cynical commentary but motivation for a collection of social norms. These norms speak to the intentional stance and communicative behaviors Wikipedians should adopt when interacting with one another. In the following pages, I provide a survey of these norms on the English Wikipedia and argue that they can be characterized as supportive based on Jack Gibb's classic communication article "Defensive Communication."

  18. Pilot-aided feedforward data recovery in optical coherent communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Bing

    2017-09-19

    A method and a system for pilot-aided feedforward data recovery are provided. The method and system include a receiver including a strong local oscillator operating in a free running mode independent of a signal light source. The phase relation between the signal light source and the local oscillator source is determined based on quadrature measurements on pilot pulses from the signal light source. Using the above phase relation, information encoded in an incoming signal can be recovered, optionally for use in communication with classical coherent communication protocols and quantum communication protocols.

  19. Jejunal perforation after abdominal liposuction, bilateral breast augmentation and facial fat grafting

    PubMed Central

    Coronado-Malagón, Martin; Tauffer-Carrion, Luis Tomas

    2012-01-01

    A 54-year-old woman presented to the emergency department 24 h after undergoing abdominal liposuction, bilateral breast augmentation and facial fat grafting at a private plastic surgery clinic. She presented with the classic evolution of a bowel perforation secondary to abdominal liposuction. A computed tomography (CT) scan found free air in her abdominal cavity. Based on the CT scan and the persistent pain experienced by the patient, an abdominal laparatomy was urgently performed. A jejunum perforation was found and was treated with a resection of the affected segment followed by intestinal anastomosis. The patient had a successful recovery and was discharged seven days later. The present article also reviews the classical presentation of a bowel perforation following abdominal liposuction. PMID:23997589

  20. Jejunal perforation after abdominal liposuction, bilateral breast augmentation and facial fat grafting.

    PubMed

    Coronado-Malagón, Martin; Tauffer-Carrion, Luis Tomas

    2012-01-01

    A 54-year-old woman presented to the emergency department 24 h after undergoing abdominal liposuction, bilateral breast augmentation and facial fat grafting at a private plastic surgery clinic. She presented with the classic evolution of a bowel perforation secondary to abdominal liposuction. A computed tomography (CT) scan found free air in her abdominal cavity. Based on the CT scan and the persistent pain experienced by the patient, an abdominal laparatomy was urgently performed. A jejunum perforation was found and was treated with a resection of the affected segment followed by intestinal anastomosis. The patient had a successful recovery and was discharged seven days later. The present article also reviews the classical presentation of a bowel perforation following abdominal liposuction.

  1. Full employment maintenance in the private sector

    NASA Technical Reports Server (NTRS)

    Young, G. A.

    1976-01-01

    Operationally, full employment can be accomplished by applying modern computer capabilities, game and decision concepts, and communication feedback possibilities, rather than accepted economic tools, to the problem of assuring invariant full employment. The government must provide positive direction to individual firms concerning the net number of employees that each firm must hire or refrain from hiring to assure national full employment. To preserve free enterprise and the decision making power of the individual manager, this direction must be based on each private firm's own numerical employment projections.

  2. Quantum secret sharing using orthogonal multiqudit entangled states

    NASA Astrophysics Data System (ADS)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  3. Faithful Transfer Arbitrary Pure States with Mixed Resources

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Li, Lin; Ma, Song-Ya; Chen, Xiu-Bo; Yang, Yi-Xian

    2013-09-01

    In this paper, we show that some special mixed quantum resource experience the same property of pure entanglement such as Bell state for quantum teleportation. It is shown that one mixed state and three bits of classical communication cost can be used to teleport one unknown qubit compared with two bits via pure resources. The schemes are easily implement with model physical techniques. Moreover, these resources are also optimal and typical for faithfully remotely prepare an arbitrary qubit, two-qubit and three-qubit states with mixed quantum resources. Our schemes are completed as same as those with pure quantum entanglement resources except only 1 bit additional classical communication cost required. The success probability is independent of the form of the mixed resources.

  4. Efficient and faithful remote preparation of arbitrary three- and four-particle -class entangled states

    NASA Astrophysics Data System (ADS)

    Wang, Dong; Hu, You-Di; Wang, Zhe-Qiang; Ye, Liu

    2015-06-01

    We develop two efficient measurement-based schemes for remotely preparing arbitrary three- and four-particle W-class entangled states by utilizing genuine tripartite Greenberg-Horn-Zeilinger-type states as quantum channels, respectively. Through appropriate local operations and classical communication, the desired states can be faithfully retrieved at the receiver's place with certain probability. Compared with the previously existing schemes, the success probability in current schemes is greatly increased. Moreover, the required classical communication cost is calculated as well. Further, several attractive discussions on the properties of the presented schemes, including the success probability and reducibility, are made. Remarkably, the proposed schemes can be faithfully achieved with unity total success probability when the employed channels are reduced into maximally entangled ones.

  5. Choosing Between Public and Private Providers of Depot Maintenance: A Proposed New Approach

    DTIC Science & Technology

    1997-09-01

    Appendix A Mathematical Form of the Model Appendix B Assumed Distributions for Evaluation Factors vm Contents Appendix C Trial Evaluation Workbook ...Figure 4-2. Revised Factor Scale Anchors 4-5 Figure 4-3. Workbook Display Establishing Relevance of Factor 4-5 Figure 4-4. Comparing Results of...Introduction process. To fill voids we conducted additional research in the areas of classical microeconomics , transaction cost economics, public

  6. Study on Gender-Related Speech Communication in Classical Chinese Poetry

    ERIC Educational Resources Information Center

    Tian, Xinhe; Qin, Dandan

    2016-01-01

    Gender, formed in men and women's growth which is constrained by social context, is tightly tied to the distinction which is presented in the process of men and women's language use. Hence, it's a new breakthrough for studies on gender and difference by analyzing gender-related speech communication on the background of ancient Chinese culture.

  7. Communication in Development: Modifications in the Classical Diffusion Model for Family Planning.

    ERIC Educational Resources Information Center

    Rogers, Everett M.

    The role of mass media and interpersonal communication in development in Latin America, Africa, and Asia is reviewed. Then, research and development program experience is synthesized to show (1) that the mass media at present play a major role in creating a "climate for modernization" among villagers, but are less important in diffusing…

  8. A satellite system for land-mobile communications in Europe

    NASA Technical Reports Server (NTRS)

    Bartholome, P.; Rogard, R.

    1988-01-01

    There exists a great unsatisified demand for land mobile communications in Europe, particularly in sectors of business activity such as the road transport industry. This demand could best be satisfied by means of satellite-based private networks providing voice and data communications in a hub configuration. The potential market is estimated to encompass several hundred thousand road vehicles and the transmission capacity required would be several thousand channels. ESA is currently demonstrating the potential of satellite communications for this type of application, using a system called PRODAT. System studies are being performed with the aim of defining the architecture of a regional satellite system for Europe.

  9. The Solvay Council, 1911: ``A kind of private congress''

    NASA Astrophysics Data System (ADS)

    Staley, Richard

    2011-04-01

    The photograph of its participants gathered around the conference table at the first Solvay Congress in physics has long presented an iconic image of physics in the early twentieth century, and the event has commonly been celebrated for its distinctive role in the propagation of quantum theory, as well as for the rich heritage in subsequent conferences that it initiated. Yet it is not often appreciated just how unusual this first congress or ``council'' was. Convened and funded by the Belgian industrialist Ernst Solvay, it was conceived and planned by the Berlin physical chemist Walther Nernst, with a zealous attention to detail that extended to entreating participants to keep its proceedings confidential until it had actually occurred. Kept private to facilitate later public notice, I will argue that this conference also helped fashion a distinctive (and selective) view of the past. This paper combines an examination of the planning and conduct of the congress with a study of the earliest uses of general concepts of ``classical'' theory from the late nineteenth century, in order to argue that the Solvay congress was important not just to the wider propagation of quantum theory, but to the formation of the conceptual framework within which we now cast this era and its physics: the contrast between classical and modern theory.

  10. Concerns of mothers seeking care in private pediatric offices: opportunities for expanding services.

    PubMed

    Hickson, G B; Altemeier, W A; O'Connor, S

    1983-11-01

    A surplus of general pediatricians has been predicted for 1990. This surplus could provide both opportunity and need for practitioners to identify areas of maternal concern that might guide expansion of marketable physician services. For this purpose, maternal concerns were assessed by interviewing 207 mothers seeking care in private pediatric offices. Only 30% of mothers were most worried about their child's physical health. The remaining 70% were most concerned about problems falling into six categories of parenting, behavior, and development (psychosocial concerns): personality/social development, discipline, mental development, mother-child interaction time, adjustment to divorce and other life changes, and adolescent transition. Although the majority of these concerns conceivably could be handled in private offices, only 28% of these mothers had discussed their greater psychosocial concern with their pediatrician. A search for explanations of this failure to communicate indicated mothers often were not aware that their pediatrician could help, or they questioned his ability or interest in assisting them. Characteristics that correlated significantly with communication were higher family socioeconomic levels, and greater physician self-perceived ability and interest in these psychosocial problems. Parenting, behavior, and development concerns represent an opportunity for expanding services if some of these obstacles can be overcome.

  11. Generalized mutual information and Tsirelson's bound

    NASA Astrophysics Data System (ADS)

    Wakakuwa, Eyuri; Murao, Mio

    2014-12-01

    We introduce a generalization of the quantum mutual information between a classical system and a quantum system into the mutual information between a classical system and a system described by general probabilistic theories. We apply this generalized mutual information (GMI) to a derivation of Tsirelson's bound from information causality, and prove that Tsirelson's bound can be derived from the chain rule of the GMI. By using the GMI, we formulate the "no-supersignalling condition" (NSS), that the assistance of correlations does not enhance the capability of classical communication. We prove that NSS is never violated in any no-signalling theory.

  12. Generalized mutual information and Tsirelson's bound

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wakakuwa, Eyuri; Murao, Mio

    2014-12-04

    We introduce a generalization of the quantum mutual information between a classical system and a quantum system into the mutual information between a classical system and a system described by general probabilistic theories. We apply this generalized mutual information (GMI) to a derivation of Tsirelson's bound from information causality, and prove that Tsirelson's bound can be derived from the chain rule of the GMI. By using the GMI, we formulate the 'no-supersignalling condition' (NSS), that the assistance of correlations does not enhance the capability of classical communication. We prove that NSS is never violated in any no-signalling theory.

  13. 26 CFR 1.46-3 - Qualified investment.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... equipment, private communication equipment (other than land mobile radio equipment for which the operator... reduced by an amount equal to the lesser of— (a) The amount of money, or the fair market value of other...

  14. 26 CFR 1.46-3 - Qualified investment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... equipment, private communication equipment (other than land mobile radio equipment for which the operator... reduced by an amount equal to the lesser of— (a) The amount of money, or the fair market value of other...

  15. 26 CFR 1.46-3 - Qualified investment.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... equipment, private communication equipment (other than land mobile radio equipment for which the operator... reduced by an amount equal to the lesser of— (a) The amount of money, or the fair market value of other...

  16. 26 CFR 1.46-3 - Qualified investment.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... equipment, private communication equipment (other than land mobile radio equipment for which the operator... reduced by an amount equal to the lesser of— (a) The amount of money, or the fair market value of other...

  17. NARSTO PROGRAM SUPPORT

    EPA Science Inventory

    The NARSTO program is a multi-national, public/private partnership of over 70 organizations sponsoring and participating in ozone and particulate air quality research in North America. Coordinate communication and planning with the NARSTO membership for air quality research, sci...

  18. 47 CFR 80.365 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and general conditions of use for the following types of radiotelephony: —Distress, urgency, safety, call and reply. —Working. —Public. —Private. ... FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME...

  19. Atlanta congestion reduction demonstration. National evaluation : safety data test plan.

    DOT National Transportation Integrated Search

    1996-12-01

    This paper describes the various advance technologies already in use in the intermodal freight transportation industry and addresses the opportunity for improved communication between the public and private sector regarding technology applications to...

  20. A Comparison of the Combat Performance of Good and Poor Infantry Squad Leaders

    DTIC Science & Technology

    1954-09-01

    56 Knowlede and skills . . . . ... 56 Communication . . . . . . . . . ........... . 59 Awareness...situation. Personnel management principles frequently indicate that when criticism is leveled 3t subordinates, this criticism should be given privately in

  1. 76 FR 81932 - Information Collection Being Reviewed by the Federal Communications Commission

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ...: OMB Control Number: 3060-0718. Title: Part 101 Rule Sections Governing the Terrestrial Microwave Fixed... common carrier and/or private fixed microwave services. In addition, the information is used to determine...

  2. The Study of the Use of Picture Descriptions in Enhancing Communication Skills among the 8th- Grade Students--Learners of English as a Foreign Language

    ERIC Educational Resources Information Center

    Lavalle, Pamela I.; Briesmaster, Mark

    2017-01-01

    Teachers of English as a foreign language (EFL) encourage students to take a more active role in the oral activities in the classroom through different strategies. This study examines the use of picture descriptions as a strategy to develop and enhance communication skills among the eighth-grade students attending a private English school in…

  3. Real-Time Speaker Detection for User-Device Binding

    DTIC Science & Technology

    2010-12-01

    31 xi THIS PAGE INTENTIONALLY LEFT BLANK xii CHAPTER 1: Introduction The roll-out of commercial wireless networks continues to rise worldwide...in a secured facility. It could also be connected to the call server via a Virtual Private Network (VPN) or public lines if security is not a top...communications network [25]. Yet, James Arden Barnett, Jr., Chief of the Public Safety and Homeland Security Bureau, argues that emergency communications

  4. Communications and Computers in the 21st Century. Hearing before the Technology Policy Task Force of the Committee on Science, Space, and Technology. House of Representatives, One Hundredth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Committee on Science, Space and Technology.

    Based upon the premise that manufacturing, communications, and computers are the key to productivity, this hearing before the Technology Policy Task Force was held to examine how the federal government interacts with universities, engineering research centers, professional associations, and private businesses in these areas. This document contains…

  5. Evaluating the benefits of government funded R & D aimed at the private sector

    NASA Technical Reports Server (NTRS)

    Greenberg, J. S.

    1977-01-01

    Federal funding of technological research and development is discussed with regard to the procedures for an economic analysis with the goals of (1) determining when the public sector should invest in a research and development program, (2) evaluating the likelihood of private sector participation in terms of public sector participation, and (3) considering the major factors in the formulation of a research and development program in terms of defining initiatives. Public sector investments are evaluated, noting procedures for determining whether benefits exceed costs. The role of the public sector research and development planning is described, considering the procedure for private sector implementation decisions and a methodology for evaluating the possibility of private sector commercialization. The economic value of the public sector research and development program is presented with attention given to a specific case of NASA-sponsored research and development aimed toward the commercialization of new public communications services.

  6. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  7. Involving private healthcare practitioners in an urban NCD sentinel surveillance system: lessons learned from Pune, India.

    PubMed

    Kroll, Mareike; Phalkey, Revati; Dutta, Sayani; Shukla, Sharvari; Butsch, Carsten; Bharucha, Erach; Kraas, Frauke

    2016-01-01

    Despite the rising impact of non-communicable diseases (NCDs) on public health in India, lack of quality data and routine surveillance hampers the planning process for NCD prevention and control. Current surveillance programs focus largely on communicable diseases and do not adequately include the private healthcare sector as a major source of care in cities. The objective of the study was to conceptualize, implement, and evaluate a prototype for an urban NCD sentinel surveillance system among private healthcare practitioners providing primary care in Pune, India. We mapped all private healthcare providers in three selected areas of the city, conducted a knowledge, attitude, and practice survey with regard to surveillance among 258 consenting practitioners, and assessed their willingness to participate in a routine NCD surveillance system. In total, 127 practitioners agreed and were included in a 6-month surveillance study. Data on first-time diagnoses of 10 selected NCDs alongside basic demographic and socioeconomic patient information were collected onsite on a monthly basis using a paper-based register. Descriptive and regression analyses were performed. In total, 1,532 incident cases were recorded that mainly included hypertension ( n =622, 41%) and diabetes ( n =460, 30%). Dropout rate was 10% ( n =13). The monthly reporting consistency was quite constant, with the majority ( n =63, 50%) submitting 1-10 cases in 6 months. Average number of submitted cases was highest among allopathic practitioners (17.4). A majority of the participants ( n =104, 91%) agreed that the surveillance design could be scaled up to cover the entire city. The study indicates that private primary healthcare providers (allopathic and alternate medicine practitioners) play an important role in the diagnosis and treatment of NCDs and can be involved in NCD surveillance, if certain barriers are addressed. Main barriers observed were lack of regulation of the private sector, cross-practices among different systems of medicine, limited clinic infrastructure, and knowledge gaps about disease surveillance. We suggest a voluntary augmented sentinel NCD surveillance system including public and private healthcare facilities at all levels of care.

  8. Communication: Symmetrical quasi-classical analysis of linear optical spectroscopy

    NASA Astrophysics Data System (ADS)

    Provazza, Justin; Coker, David F.

    2018-05-01

    The symmetrical quasi-classical approach for propagation of a many degree of freedom density matrix is explored in the context of computing linear spectra. Calculations on a simple two state model for which exact results are available suggest that the approach gives a qualitative description of peak positions, relative amplitudes, and line broadening. Short time details in the computed dipole autocorrelation function result in exaggerated tails in the spectrum.

  9. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Filip, Radim; Marek, Petr; Fiurasek, Jaromir

    We analyze a reversibility of optimal Gaussian 1{yields}2 quantum cloning of a coherent state using only local operations on the clones and classical communication between them and propose a feasible experimental test of this feature. Performing Bell-type homodyne measurement on one clone and anticlone, an arbitrary unknown input state (not only a coherent state) can be restored in the other clone by applying appropriate local unitary displacement operation. We generalize this concept to a partial reversal of the cloning using only local operations and classical communication (LOCC) and we show that this procedure converts the symmetric cloner to an asymmetricmore » cloner. Further, we discuss a distributed LOCC reversal in optimal 1{yields}M Gaussian cloning of coherent states which transforms it to optimal 1{yields}M{sup '} cloning for M{sup '}

  11. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    NASA Astrophysics Data System (ADS)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  12. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  13. Reducing Communication in Algebraic Multigrid Using Additive Variants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vassilevski, Panayot S.; Yang, Ulrike Meier

    Algebraic multigrid (AMG) has proven to be an effective scalable solver on many high performance computers. However, its increasing communication complexity on coarser levels has shown to seriously impact its performance on computers with high communication cost. Moreover, additive AMG variants provide not only increased parallelism as well as decreased numbers of messages per cycle but also generally exhibit slower convergence. Here we present various new additive variants with convergence rates that are significantly improved compared to the classical additive algebraic multigrid method and investigate their potential for decreased communication, and improved communication-computation overlap, features that are essential for goodmore » performance on future exascale architectures.« less

  14. Reducing Communication in Algebraic Multigrid Using Additive Variants

    DOE PAGES

    Vassilevski, Panayot S.; Yang, Ulrike Meier

    2014-02-12

    Algebraic multigrid (AMG) has proven to be an effective scalable solver on many high performance computers. However, its increasing communication complexity on coarser levels has shown to seriously impact its performance on computers with high communication cost. Moreover, additive AMG variants provide not only increased parallelism as well as decreased numbers of messages per cycle but also generally exhibit slower convergence. Here we present various new additive variants with convergence rates that are significantly improved compared to the classical additive algebraic multigrid method and investigate their potential for decreased communication, and improved communication-computation overlap, features that are essential for goodmore » performance on future exascale architectures.« less

  15. Fault-tolerant Remote Quantum Entanglement Establishment for Secure Quantum Communications

    NASA Astrophysics Data System (ADS)

    Tsai, Chia-Wei; Lin, Jason

    2016-07-01

    This work presents a strategy for constructing long-distance quantum communications among a number of remote users through collective-noise channel. With the assistance of semi-honest quantum certificate authorities (QCAs), the remote users can share a secret key through fault-tolerant entanglement swapping. The proposed protocol is feasible for large-scale distributed quantum networks with numerous users. Each pair of communicating parties only needs to establish the quantum channels and the classical authenticated channels with his/her local QCA. Thus, it enables any user to communicate freely without point-to-point pre-establishing any communication channels, which is efficient and feasible for practical environments.

  16. [Health management in private health insurance].

    PubMed

    Ziegenhagen, D J; Schilling, M K

    2000-09-01

    German private health insurance faces new challenges. The classical tools of cost containment are no longer sufficient to keep up with ever increasing expenses for health care, and international competitors with managed care experience from their home markets are on the point of entering business in Germany. Although the American example of managed care is not fully compatible with customer demands and state regulations, some elements of this approach will gradually be introduced. First agreements were signed with networks or individual preferred providers in outpatient care and rehabilitation medicine. Insurance companies become more and more interested in supporting evidence based guidelines and programmes for disease and case management. The pros and cons of various other health management tools are discussed against the specific background of the quite unique German health care system.

  17. Heralded entanglement between solid-state qubits separated by three metres.

    PubMed

    Bernien, H; Hensen, B; Pfaff, W; Koolstra, G; Blok, M S; Robledo, L; Taminiau, T H; Markham, M; Twitchen, D J; Childress, L; Hanson, R

    2013-05-02

    Quantum entanglement between spatially separated objects is one of the most intriguing phenomena in physics. The outcomes of independent measurements on entangled objects show correlations that cannot be explained by classical physics. As well as being of fundamental interest, entanglement is a unique resource for quantum information processing and communication. Entangled quantum bits (qubits) can be used to share private information or implement quantum logical gates. Such capabilities are particularly useful when the entangled qubits are spatially separated, providing the opportunity to create highly connected quantum networks or extend quantum cryptography to long distances. Here we report entanglement of two electron spin qubits in diamond with a spatial separation of three metres. We establish this entanglement using a robust protocol based on creation of spin-photon entanglement at each location and a subsequent joint measurement of the photons. Detection of the photons heralds the projection of the spin qubits onto an entangled state. We verify the resulting non-local quantum correlations by performing single-shot readout on the qubits in different bases. The long-distance entanglement reported here can be combined with recently achieved initialization, readout and entanglement operations on local long-lived nuclear spin registers, paving the way for deterministic long-distance teleportation, quantum repeaters and extended quantum networks.

  18. Comparison of job satisfaction among eight health care professions in private (non-government) settings.

    PubMed

    Chen, Ai-Hong; Jaafar, Saidah Nafisah; Noor, Abdul Rahim Md

    2012-04-01

    A comparison of the job satisfaction of health care professionals has not been well studied in Malaysia. This study aimed to compare the job satisfaction level among 8 groups of health care professionals in private settings, using the Job Satisfaction Survey (JSS). A total of 81 health care professionals, including nurses, physiotherapists, occupational therapists, medical laboratory technologists, dieticians, medical imaging practitioners, environmental health officers, and optometrists in private (non-government) settings in the Klang Valley, were interviewed using the Job Satisfaction Survey scale invented by Dr Paul E Spector. Their job satisfaction scores were calculated and determined. In the demographic data, the majority of the subjects were 20-30 years old (81.5%), were female (72.8%), had a basic degree (98.8%), were single (64.2%), and had 1-5 years of working experience (83.9%). A Kruskal-Wallis analysis showed significant differences (P < 0.05) in promotion, supervision, operating conditions, co-workers, nature of the work, and communication, but there were no significant differences (P > 0.05) in pay, fringe benefits, and contingent rewards in JSS score among the 8 health care professions. The Friedman Test showed a significant difference of overall JSS scores (χ(2) = 526.418, P < 0.001) among the 8 health care professions. The overall job satisfaction levels are different among health care professionals in private settings, especially regarding promotion, supervision, operating conditions, co-workers, the nature of the work, and communication.

  19. Comparison of Job Satisfaction among Eight Health Care Professions in Private (Non-Government) Settings

    PubMed Central

    Ai-Hong, Chen; Saidah Nafisah, Jaafar; Abdul Rahim, Md Noor

    2012-01-01

    Background: A comparison of the job satisfaction of health care professionals has not been well studied in Malaysia. This study aimed to compare the job satisfaction level among 8 groups of health care professionals in private settings, using the Job Satisfaction Survey (JSS). Methods: A total of 81 health care professionals, including nurses, physiotherapists, occupational therapists, medical laboratory technologists, dieticians, medical imaging practitioners, environmental health officers, and optometrists in private (non-government) settings in the Klang Valley, were interviewed using the Job Satisfaction Survey scale invented by Dr Paul E Spector. Their job satisfaction scores were calculated and determined. Results: In the demographic data, the majority of the subjects were 20–30 years old (81.5%), were female (72.8%), had a basic degree (98.8%), were single (64.2%), and had 1–5 years of working experience (83.9%). A Kruskal–Wallis analysis showed significant differences (P < 0.05) in promotion, supervision, operating conditions, co-workers, nature of the work, and communication, but there were no significant differences (P > 0.05) in pay, fringe benefits, and contingent rewards in JSS score among the 8 health care professions. The Friedman Test showed a significant difference of overall JSS scores (χ2 = 526.418, P < 0.001) among the 8 health care professions. Conclusion: The overall job satisfaction levels are different among health care professionals in private settings, especially regarding promotion, supervision, operating conditions, co-workers, the nature of the work, and communication. PMID:22973134

  20. Communication scheme based on evolutionary spatial 2×2 games

    NASA Astrophysics Data System (ADS)

    Ziaukas, Pranas; Ragulskis, Tautvydas; Ragulskis, Minvydas

    2014-06-01

    A visual communication scheme based on evolutionary spatial 2×2 games is proposed in this paper. Self-organizing patterns induced by complex interactions between competing individuals are exploited for hiding and transmitting secret visual information. Properties of the proposed communication scheme are discussed in details. It is shown that the hiding capacity of the system (the minimum size of the detectable primitives and the minimum distance between two primitives) is sufficient for the effective transmission of digital dichotomous images. Also, it is demonstrated that the proposed communication scheme is resilient to time backwards, plain image attacks and is highly sensitive to perturbations of private and public keys. Several computational experiments are used to demonstrate the effectiveness of the proposed communication scheme.

  1. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  2. Illness and the Internet: From Private to Public Experience.

    PubMed

    Conrad, Peter; Bandini, Julia; Vasquez, Alexandria

    2016-01-01

    Illness is a ubiquitous experience in all societies. Until the past two decades, illness remained largely a private experience. With the development of the Internet, especially what has been termed Web 2.0, with interactive websites, illness has become increasingly a public experience. Vehicles like bulletin boards, chat rooms, listservs, electronic support groups, and more recently social media facilitate thousands of online communities where individuals with illness share information, interaction, experience, and advocacy. With the advent of social media, communication has increased and brought new challenges for online interaction. It is likely that the transformation of illness from a largely private to an increasingly public experience is a revolutionary change that is here to stay, with numerous social consequences. © The Author(s) 2015.

  3. Text Messaging and Social Network Site Use to Facilitate Alcohol Involvement: A Comparison of U.S. and Korean College Students.

    PubMed

    Jensen, Michaeline; Hussong, Andrea M; Baik, Jeesook

    2018-05-01

    Alcohol-related content on public social networking sites (SNS) has been linked to collegiate alcohol use, but we know little about whether and how private forms of computer-mediated communication (CMC), like text messaging, are related to collegiate drinking, nor how alcohol-related CMC content and drinking are associated in non-Western cultures. We examined the ways in which private text messaging and SNS are used to facilitate alcohol involvement among U.S. (n = 575) and Korean (n = 462) college students (total N = 1037), two technologically wired cultures with prevalent collegiate alcohol misuse. Results show that college students prefer private text messaging over SNS to find parties and facilitate alcohol involvement, and this preference tends to be stronger in Korea than the United States. Private text messaging is more consistently and strongly associated with alcohol use frequency and heavy episodic drinking than SNS posts in both countries, with particularly robust associations between private text messaging and drinking in the United States. Findings underscore the role of CMCs in facilitating alcohol involvement and highlight the potential for analysis of private message content to further understand computer-mediated social processes in college student drinking.

  4. Examination of cyberbullying experiences among Turkish students from different school types.

    PubMed

    Topçu, Cigdem; Erdur-Baker, Ozgür; Capa-Aydin, Yeşim

    2008-12-01

    The purpose of this study was to examine the nature of cyberbullying experiences among public and private school students in Turkey. One hundred eighty-three participants between the ages of 14 and 15 were recruited for the study. Participants were asked to respond to questionnaires measuring demographic information, usage frequency of Internet-mediated communication tools (IMCT), and cyberbullying experience (as a victim and as a bully). Participants who reported cyberbullying victimization were also asked how they felt and whether they sought help after such experiences. Results indicated that public school students were more likely than private school students to report being cyberbullies and cybervictims despite that private school students were more likely than public school students to report more frequent usage of IMCT. The findings of the logistic regression analyses indicated that usage frequency of IMCT was a significant predictor of cyberbullying/victimization for public school students but not for private school students. While victims from private school revealed that they did not mind the cyberbullying experience because they thought it was a joke, victims from public school reported that they felt angry when they experienced cyberbullying. Both public and private schools indicated that friends were their first choice for help.

  5. 76 FR 78327 - Meeting of Advisory Committee on International Communications and Information Policy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... security and law enforcement access issues related to cloud computing, as well as recent private sector.... Visitor's full name. 3. Date of birth. 4. Citizenship. 5. Acceptable forms of identification for entry...

  6. Types of Brain Tumors

    MedlinePlus

    ... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...

  7. Recurrence of Brain Tumors

    MedlinePlus

    ... already registered, you will receive periodic updates and communications from American Brain Tumor Association. Keep me logged in. What's this? Remembers your login information for your convenience. Use only on trusted, private computers. Privacy Policy Spam Control Text: Please leave this ...

  8. 48 CFR 1335.001 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1335.001 Definitions. Human subject means a living individual... includes communication or interpersonal contact between investigator and subject. “Private information...) in order for obtaining the information to constitute research involving human subjects. Research...

  9. Global Outreach: Formal and Non-Formal Education.

    ERIC Educational Resources Information Center

    Smith, Mary Oakes; Bradsher, Monica

    "Global outreach" refers to the international delivery of education, health, public information, commercial, and other services using appropriate communications technology. International organizations are partnering in various ways with developing-country governments, private companies, local communities, and non-governmental…

  10. Quantum Communication Using Coherent Rejection Sampling

    NASA Astrophysics Data System (ADS)

    Anshu, Anurag; Devabathini, Vamsi Krishna; Jain, Rahul

    2017-09-01

    Compression of a message up to the information it carries is key to many tasks involved in classical and quantum information theory. Schumacher [B. Schumacher, Phys. Rev. A 51, 2738 (1995), 10.1103/PhysRevA.51.2738] provided one of the first quantum compression schemes and several more general schemes have been developed ever since [M. Horodecki, J. Oppenheim, and A. Winter, Commun. Math. Phys. 269, 107 (2007); , 10.1007/s00220-006-0118-xI. Devetak and J. Yard, Phys. Rev. Lett. 100, 230501 (2008); , 10.1103/PhysRevLett.100.230501A. Abeyesinghe, I. Devetak, P. Hayden, and A. Winter, Proc. R. Soc. A 465, 2537 (2009), 10.1098/rspa.2009.0202]. However, the one-shot characterization of these quantum tasks is still under development, and often lacks a direct connection with analogous classical tasks. Here we show a new technique for the compression of quantum messages with the aid of entanglement. We devise a new tool that we call the convex split lemma, which is a coherent quantum analogue of the widely used rejection sampling procedure in classical communication protocols. As a consequence, we exhibit new explicit protocols with tight communication cost for quantum state merging, quantum state splitting, and quantum state redistribution (up to a certain optimization in the latter case). We also present a port-based teleportation scheme which uses a fewer number of ports in the presence of information about input.

  11. Diacetin, a reliable cue and private communication channel in a specialized pollination system

    PubMed Central

    Schäffler, Irmgard; Steiner, Kim E.; Haid, Mark; van Berkel, Sander S.; Gerlach, Günter; Johnson, Steven D.; Wessjohann, Ludger; Dötterl, Stefan

    2015-01-01

    The interaction between floral oil secreting plants and oil-collecting bees is one of the most specialized of all pollination mutualisms. Yet, the specific stimuli used by the bees to locate their host flowers have remained elusive. This study identifies diacetin, a volatile acetylated glycerol, as a floral signal compound shared by unrelated oil plants from around the globe. Electrophysiological measurements of antennae and behavioural assays identified diacetin as the key volatile used by oil-collecting bees to locate their host flowers. Furthermore, electrophysiological measurements indicate that only oil-collecting bees are capable of detecting diacetin. The structural and obvious biosynthetic similarity between diacetin and associated floral oils make it a reliable cue for oil-collecting bees. It is easily perceived by oil bees, but can’t be detected by other potential pollinators. Therefore, diacetin represents the first demonstrated private communication channel in a pollination system. PMID:26245141

  12. Quantifying the nonlocality of Greenberger-Horne-Zeilinger quantum correlations by a bounded communication simulation protocol.

    PubMed

    Branciard, Cyril; Gisin, Nicolas

    2011-07-08

    The simulation of quantum correlations with finite nonlocal resources, such as classical communication, gives a natural way to quantify their nonlocality. While multipartite nonlocal correlations appear to be useful resources, very little is known on how to simulate multipartite quantum correlations. We present a protocol that reproduces tripartite Greenberger-Horne-Zeilinger correlations with bounded communication: 3 bits in total turn out to be sufficient to simulate all equatorial Von Neumann measurements on the tripartite Greenberger-Horne-Zeilinger state.

  13. Highlights from the previous volumes

    NASA Astrophysics Data System (ADS)

    -C., Liu K.; al., Kumar N. et; al., Anishchenko V. et; al., Jaeckel J. et; et al.

    2009-10-01

    The physics of pizza tossing and the next generation of micromotors Is diamagnetism possible classically? Phase dynamics of two coupled oscillators under external periodic force Optical communications through dense matter

  14. [New forms of scientific communication of medical societies: thoughts on scientific collections and museums for urology].

    PubMed

    Moll, F H; Rathert, P; Skopec, M; Engel, R M; Fangerau, H

    2011-02-01

    Collections from medical societies which are not connected with a university or another public institution cannot be legitimized on the basis of the argument of conserving historical heritage. Even the museum itself with its many tasks and classical site of scientific communication comes into public view and becomes a topic of scientific interest.

  15. Contemporary Information and Communication Technologies and Education. International Commission on Education for the Twenty-First Century.

    ERIC Educational Resources Information Center

    Hancock, A.

    This paper looks at the role of modern information and communication technologies, and their impact on education, from two distinct perspectives. The first is the classic perspective of how they can be used directly in support of educational goals and strategies. However, the exponential growth of the media and information technologies, especially…

  16. Information flow and quantum cryptography using statistical fluctuations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Home, D.; Whitaker, M.A.B.

    2003-02-01

    A procedure is formulated, using the quantum teleportation arrangement, that communicates knowledge of an apparatus setting between the wings of the experiment, using statistical fluctuations in a sequence of measurement results. It requires an entangled state, and transmission of classical information totally unrelated to the apparatus setting actually communicated. Our procedure has conceptual interest, and has applications to quantum cryptography.

  17. Proceedings of the 1990 Annual Meeting of the Association for Education in Journalism and Mass Communication (73rd, Minneapolis, Minnesota, August 1-4, 1990). Part X: Journalism History Studies.

    ERIC Educational Resources Information Center

    Association for Education in Journalism and Mass Communication.

    The journalism section of the proceedings includes the following 18 papers: "A Newspaper Legacy: E. W. Scripps' Thoughts on Journalism in His Final Years" (Ted Pease); "The Great War of Words between the United States and Mexico: Public and Private Communications of the U.S. Government during World War I" (Robert Pennington);…

  18. Phase diagram of quantum critical system via local convertibility of ground state

    PubMed Central

    Liu, Si-Yuan; Quan, Quan; Chen, Jin-Jun; Zhang, Yu-Ran; Yang, Wen-Li; Fan, Heng

    2016-01-01

    We investigate the relationship between two kinds of ground-state local convertibility and quantum phase transitions in XY model. The local operations and classical communications (LOCC) convertibility is examined by the majorization relations and the entanglement-assisted local operations and classical communications (ELOCC) via Rényi entropy interception. In the phase diagram of XY model, LOCC convertibility and ELOCC convertibility of ground-states are presented and compared. It is shown that different phases in the phase diagram of XY model can have different LOCC or ELOCC convertibility, which can be used to detect the quantum phase transition. This study will enlighten extensive studies of quantum phase transitions from the perspective of local convertibility, e.g., finite-temperature phase transitions and other quantum many-body models. PMID:27381284

  19. Quantum memory receiver for superadditive communication using binary coherent states

    NASA Astrophysics Data System (ADS)

    Klimek, Aleksandra; Jachura, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2016-11-01

    We propose a simple architecture based on multimode quantum memories for collective readout of classical information keyed using a pair coherent states, exemplified by the well-known binary phase shift keying format. Such a configuration enables demonstration of the superadditivity effect in classical communication over quantum channels, where the transmission rate becomes enhanced through joint detection applied to multiple channel uses. The proposed scheme relies on the recently introduced idea to prepare Hadamard sequences of input symbols that are mapped by a linear optical transformation onto the pulse position modulation format [Guha, S. Phys. Rev. Lett. 2011, 106, 240502]. We analyze two versions of readout based on direct detection and an optional Dolinar receiver which implements the minimum-error measurement for individual detection of a binary coherent state alphabet.

  20. Quantum memory receiver for superadditive communication using binary coherent states.

    PubMed

    Klimek, Aleksandra; Jachura, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2016-11-12

    We propose a simple architecture based on multimode quantum memories for collective readout of classical information keyed using a pair coherent states, exemplified by the well-known binary phase shift keying format. Such a configuration enables demonstration of the superadditivity effect in classical communication over quantum channels, where the transmission rate becomes enhanced through joint detection applied to multiple channel uses. The proposed scheme relies on the recently introduced idea to prepare Hadamard sequences of input symbols that are mapped by a linear optical transformation onto the pulse position modulation format [Guha, S. Phys. Rev. Lett. 2011 , 106 , 240502]. We analyze two versions of readout based on direct detection and an optional Dolinar receiver which implements the minimum-error measurement for individual detection of a binary coherent state alphabet.

  1. What Classical Musicians Can Learn from Working with Actors: Conceptual and Pedagogic Foundations and Outcomes of Bringing Musicians to Integrate in a Drama Training Environment

    ERIC Educational Resources Information Center

    Rea, Ken

    2015-01-01

    Effective teaching in a music conservatoire needs a continual quest to find new and better ways of delivering excellence. The challenge is to keep the work innovative. In this article I argue that, for a classical musician the communication of personality is a vital component of excellence in performance and I give reasons why an authentic,…

  2. Threshold quantum secret sharing based on single qubit

    NASA Astrophysics Data System (ADS)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  3. LANDSAT technology transfer to the private and public sectors through community colleges and other locally available institutions

    NASA Technical Reports Server (NTRS)

    Rogers, R. H. (Principal Investigator)

    1980-01-01

    The results achieved during the first eight months of a program to transfer LANDSAT technology to practicing professionals in the private and public sectors (grass roots) through community colleges and other locally available institutions are reported. The approach offers hands-on interactive analysis training and demonstrations through the use of color desktop computer terminals communicating with a host computer by telephone lines. The features of the terminals and associated training materials are reviewed together with plans for their use in training and demonstration projects.

  4. Ubiquitous virtual private network: a solution for WSN seamless integration.

    PubMed

    Villa, David; Moya, Francisco; Villanueva, Félix Jesús; Aceña, Óscar; López, Juan Carlos

    2014-01-06

    Sensor networks are becoming an essential part of ubiquitous systems and applications. However, there are no well-defined protocols or mechanisms to access the sensor network from the enterprise information system. We consider this issue as a heterogeneous network interconnection problem, and as a result, the same concepts may be applied. Specifically, we propose the use of object-oriented middlewares to provide a virtual private network in which all involved elements (sensor nodes or computer applications) will be able to communicate as if all of them were in a single and uniform network.

  5. 47 CFR 90.548 - Interoperability Technical Standards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Section 90.548 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Regulations Governing the Licensing and Use of Frequencies in...—Digital Radio Technical Standards, approved April 15, 1998, Telecommunications Industry Association, ANSI...

  6. 47 CFR 90.548 - Interoperability Technical Standards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Section 90.548 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Regulations Governing the Licensing and Use of Frequencies in...—Digital Radio Technical Standards, approved April 15, 1998, Telecommunications Industry Association, ANSI...

  7. Informocracy.

    ERIC Educational Resources Information Center

    Hauptman, Robert

    2001-01-01

    Considers problems that have arisen with the vast quantities of information available as a result of the popularity of computers. Topics include inequity; capitalism, commodification, and privatization; hacking, privacy, and fraud; censorship; monitoring and surveillance; cyberethics; and integrity in an age of electronic communication. (LRW)

  8. 47 CFR 1.9001 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Spectrum Leasing Scope and... rules pertaining to spectrum leasing arrangements between licensees in the services identified in this subpart and spectrum lessees. This subpart also implements policies for private commons arrangements...

  9. 47 CFR 1.9001 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Spectrum Leasing Scope and... rules pertaining to spectrum leasing arrangements between licensees in the services identified in this subpart and spectrum lessees. This subpart also implements policies for private commons arrangements...

  10. Trust Building in Virtual Communities

    NASA Astrophysics Data System (ADS)

    Mezgár, István

    By using different types of communication networks various groups of people can come together according to their private or business interest forming a Virtual Community. In these communities cooperation and collaboration plays an important role. As trust is the base of all human interactions this fact is even more valid in case of virtual communities. According to different experiments the level of trust in virtual communities is highly influenced by the way/mode of communication and by the duration of contact. The paper discusses the ways of trust building focusing on communication technologies and security aspects in virtual communities.

  11. Faithful quantum broadcast beyond the no-go theorem

    NASA Astrophysics Data System (ADS)

    Luo, Ming-Xing; Deng, Yun; Chen, Xiu-Bo; Yang, Yi-Xian; Li, Hong-Heng

    2013-05-01

    The main superiority of the quantum remote preparation over quantum teleportation lies the classical resource saving. This situation may be changed from the following constructions. Our purpose in this paper is to find some special differences between these two quantum tasks besides the classical resource costs. Some novel schemes show that the first one is useful to simultaneously broadcast arbitrary quantum states, while the second one cannot because of the quantum no-cloning theorem. Moreover, these broadcast schemes may be adapted to satisfying the different receivers' requirements or distributing the classical information, which are important in various quantum applications such as the quantum secret distribution or the quantum network communication.

  12. Bounds on quantum communication via Newtonian gravity

    NASA Astrophysics Data System (ADS)

    Kafri, D.; Milburn, G. J.; Taylor, J. M.

    2015-01-01

    Newtonian gravity yields specific observable consequences, the most striking of which is the emergence of a 1/{{r}2} force. In so far as communication can arise via such interactions between distant particles, we can ask what would be expected for a theory of gravity that only allows classical communication. Many heuristic suggestions for gravity-induced decoherence have this restriction implicitly or explicitly in their construction. Here we show that communication via a 1/{{r}2} force has a minimum noise induced in the system when the communication cannot convey quantum information, in a continuous time analogue to Bell's inequalities. Our derived noise bounds provide tight constraints from current experimental results on any theory of gravity that does not allow quantum communication.

  13. Giant step for communication satellite technology

    NASA Technical Reports Server (NTRS)

    Lovell, R. R.

    1984-01-01

    NASA's communications program, which is concerned with advanced communications technology, reflects the need for operational communications satellite capacity beyond the capabilities of current technology and the unwillingness of private industry in the U.S. to undertake making the required long-range, high-risk technology advances. It is pointed out that current satellites will not satisfy the forecasted demand for additional capacity in the 1990s and beyond. Current technology exists primarily up to 18 GHz. Designing a communications satellite at each of the three major uplink/downlink frequency bands (C, Ku, and Ka, 6/4 GHz, 14/11 GHz, and 30/20 GHz, respectively) presents different program management and technical problems. Increasing frequency or power can be done only by intensive sustained research. This is the rationale for NASA to pursue the Advanced Communications Technology Satellite (ACTS) program.

  14. Giant step for communication satellite technology

    NASA Astrophysics Data System (ADS)

    Lovell, R. R.

    1984-03-01

    NASA's communications program, which is concerned with advanced communications technology, reflects the need for operational communications satellite capacity beyond the capabilities of current technology and the unwillingness of private industry in the U.S. to undertake making the required long-range, high-risk technology advances. It is pointed out that current satellites will not satisfy the forecasted demand for additional capacity in the 1990s and beyond. Current technology exists primarily up to 18 GHz. Designing a communications satellite at each of the three major uplink/downlink frequency bands (C, Ku, and Ka, 6/4 GHz, 14/11 GHz, and 30/20 GHz, respectively) presents different program management and technical problems. Increasing frequency or power can be done only by intensive sustained research. This is the rationale for NASA to pursue the Advanced Communications Technology Satellite (ACTS) program.

  15. Comparison of emotion recognition from facial expression and music.

    PubMed

    Gaspar, Tina; Labor, Marina; Jurić, Iva; Dumancić, Dijana; Ilakovac, Vesna; Heffer, Marija

    2011-01-01

    The recognition of basic emotions in everyday communication involves interpretation of different visual and auditory clues. The ability to recognize emotions is not clearly determined as their presentation is usually very short (micro expressions), whereas the recognition itself does not have to be a conscious process. We assumed that the recognition from facial expressions is selected over the recognition of emotions communicated through music. In order to compare the success rate in recognizing emotions presented as facial expressions or in classical music works we conducted a survey which included 90 elementary school and 87 high school students from Osijek (Croatia). The participants had to match 8 photographs of different emotions expressed on the face and 8 pieces of classical music works with 8 offered emotions. The recognition of emotions expressed through classical music pieces was significantly less successful than the recognition of emotional facial expressions. The high school students were significantly better at recognizing facial emotions than the elementary school students, whereas girls were better than boys. The success rate in recognizing emotions from music pieces was associated with higher grades in mathematics. Basic emotions are far better recognized if presented on human faces than in music, possibly because the understanding of facial emotions is one of the oldest communication skills in human society. Female advantage in emotion recognition was selected due to the necessity of their communication with the newborns during early development. The proficiency in recognizing emotional content of music and mathematical skills probably share some general cognitive skills like attention, memory and motivation. Music pieces were differently processed in brain than facial expressions and consequently, probably differently evaluated as relevant emotional clues.

  16. Comparison of health literacy in privately insured and public hospital orthopaedic patients.

    PubMed

    Cosic, Filip; Porter, Tabitha; Norsworthy, Cameron; Price, Rohan; Bedi, Harvinder

    2018-05-14

    Objective The aim of the present study was to quantify and compare patient health literacy between privately insured and public orthopaedic patients. Methods As part of the present cross-sectional study, elective postoperative orthopaedic patients across two sites were recruited and asked to complete a questionnaire at the first postoperative out-patient review. Patients were divided into three groups: (1) a public group (Public); (2) a private group (Private-pre); and (3) a private group that completed the questionnaire immediately after the out-patient review (Private-post). The questionnaire consisted of six questions regarding surgical management, expected recovery time and postoperative instructions. Patients were further asked to grade their satisfaction regarding information received throughout their management. Results In all, 150 patients completed the questionnaire, 50 in each of the three groups. Patients in the Public, Private-pre and Private-post groups answered a mean 2.74, 3.24 and 4.70 of 6 questions correctly respectively. The Private-pre group was 1.46-fold more likely to demonstrate correct health literacy than the Public group, whereas the Private-post group was 2.44-fold more likely to demonstrate improved health literacy than the Private-pre group. Patient satisfaction with information received was not associated with health literacy. Conclusion Limited health literacy in orthopaedic patients continues to be an area of concern. Both private and public orthopaedic patients demonstrated poor health literacy, but private patients demonstrated significant improvement after the out-patient review. What is known about the topic? Limited health literacy is a growing public health issue worldwide, with previous literature demonstrating a prevalence of low health literacy of 26% and marginal health literacy of 20% among all patient populations. Of concern, limited health literacy has been shown to result in a range of adverse health outcomes, including increased mortality and chronic disease morbidity. It has also been associated with an increased rate of hospitalisation and use of healthcare resources. Previous work in the orthopaedic trauma setting has found poor levels of health literacy and poor understanding of diagnosis, management and prognosis in the Australian public health system. Promisingly, it has been shown that simple, targeted interventions can improve patient health literacy. What does this paper add? This study further highlights that health literacy exhibited by orthopaedic patients is poor, particularly among patients in the public healthcare system. The present study is the first to have demonstrated that health literacy is poor among patients in both the public and private healthcare systems, despite these patients having distinctly different demographics. Promisingly, the present study shows that, unlike public orthopaedic out-patient review, private orthopaedic out-patient review appears to be effective in increasing patient health literacy regarding their orthopaedic condition and its management. What are the implications for practitioners? Health literacy is essential for patients to effectively communicate with doctors and achieve good health outcomes. Healthcare professionals need to be aware that a large proportion of patients have poor health literacy and difficulty understanding health-related information, particularly pertaining to that surrounding diagnosis, management and prognosis. This study highlights the need for healthcare professionals to ensure that they communicate with patients at an appropriate level to ensure patient understanding during the pre-, peri- and postoperative stages of management. Further, healthcare professionals should be aware that there is potential to improve patient health literacy at routine out-patient review, provided that this opportunity is used as an educational resource.

  17. Vectors into the Future of Mass and Interpersonal Communication Research: Big Data, Social Media, and Computational Social Science.

    PubMed

    Cappella, Joseph N

    2017-10-01

    Simultaneous developments in big data, social media, and computational social science have set the stage for how we think about and understand interpersonal and mass communication. This article explores some of the ways that these developments generate 4 hypothetical "vectors" - directions - into the next generation of communication research. These vectors include developments in network analysis, modeling interpersonal and social influence, recommendation systems, and the blurring of distinctions between interpersonal and mass audiences through narrowcasting and broadcasting. The methods and research in these arenas are occurring in areas outside the typical boundaries of the communication discipline but engage classic, substantive questions in mass and interpersonal communication.

  18. Study of optimum methods of optical communication

    NASA Technical Reports Server (NTRS)

    Harger, R. O.

    1972-01-01

    Optimum methods of optical communication accounting for the effects of the turbulent atmosphere and quantum mechanics, both by the semi-classical method and the full-fledged quantum theoretical model are described. A concerted effort to apply the techniques of communication theory to the novel problems of optical communication by a careful study of realistic models and their statistical descriptions, the finding of appropriate optimum structures and the calculation of their performance and, insofar as possible, comparing them to conventional and other suboptimal systems are discussed. In this unified way the bounds on performance and the structure of optimum communication systems for transmission of information, imaging, tracking, and estimation can be determined for optical channels.

  19. Implementation of Patient-Centered Education for Chronic-Disease Management in Uganda: An Effectiveness Study.

    PubMed

    Siddharthan, Trishul; Rabin, Tracy; Canavan, Maureen E; Nassali, Faith; Kirchhoff, Phillip; Kalyesubula, Robert; Coca, Steven; Rastegar, Asghar; Knauf, Felix

    2016-01-01

    The majority of non-communicable disease related deaths occur in low- and middle-income countries. Patient-centered care is an essential component of chronic disease management in high income settings. To examine feasibility of implementation of a validated patient-centered education tool among patients with heart failure in Uganda. Mixed-methods, prospective cohort. A private and public cardiology clinic in Mulago National Referral and Teaching Hospital, Kampala, Uganda. Adults with a primary diagnosis of heart failure. PocketDoktor Educational Booklets with patient-centered health education. The primary outcomes were the change in Patient Activation Measure (PAM-13), as well as the acceptability of the PocketDoktor intervention, and feasibility of implementing patient-centered education in outpatient clinical settings. Secondary outcomes included the change in satisfaction with overall clinical care and doctor-patient communication. A total of 105 participants were enrolled at two different clinics: the Mulago Outpatient Department (public) and the Uganda Heart Institute (private). 93 participants completed follow up at 3 months and were included in analysis. The primary analysis showed improved patient activation measure scores regarding disease-specific knowledge, treatment options and prevention of exacerbations among both groups (mean change 0.94 [SD = 1.01], 1.02 [SD = 1.15], and 0.92 [SD = 0.89] among private paying patients and 1.98 [SD = 0.98], 1.93 [SD = 1.02], and 1.45 [SD = 1.02] among public paying patients, p<0.001 for all values) after exposure to the intervention; this effect was significantly larger among indigent patients. Participants reported that materials were easy to read, that they had improved knowledge of disease, and stated improved communication with physicians. Patient-centered medical education can improve confidence in self-management as well as satisfaction with doctor-patient communication and overall care in Uganda. Our results show that printed booklets are locally appropriate, highly acceptable and feasible to implement in an LMIC outpatient setting across socioeconomic groups.

  20. From Modernization and Diffusion to Dependency and Beyond: Theory and Practice in Communication for Social Change in the 1980s.

    ERIC Educational Resources Information Center

    McAnany, Emile G.

    Through a review of development literature, this paper examines the changes that have occurred in thinking about the role of communication in developing nations. The first section of the paper surveys the theories of the past, including those of the neo-classical and Marxist scholars. The section also looks at the emergence of the dependency…

  1. [Datanet 1 and the convergence of the computer and telecommunications].

    PubMed

    de Wit, Onno

    2008-01-01

    This article describes the efforts of the Dutch national company for telecommunication, PTT, in introducing and developing a public network for data communication in the Netherlands in the last decades of the twentieth century. As early as the 1960s, private companies started to connect their local computers. As a result, small private computer networks started to emerge. As the state company offering general access to public services in telephony, the PTT strove to develop a public data network, accessible to every user and telephone subscriber. This ambition was realized with Datanet 1, the public data network which was officially opened in 1982. In the years that followed, Datanet became the dominant network for data transmission, despite competing efforts by private companies and computer manufacturers. The large-scale application of Datanet in public municipal administration serves as a case study for the development of data communication in practice, that shows that there was a gradual migration from X-25 to TCP/IP protocols. The article concludes by stating that the introduction and development of data transmission transformed the role of the PTT in Dutch society, brought new working practices, new services and new responsibilities, and resulted in a whole new phase in the history of the computer.

  2. Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms With Directed Gossip Communication

    NASA Astrophysics Data System (ADS)

    Jakovetic, Dusan; Xavier, João; Moura, José M. F.

    2011-08-01

    We study distributed optimization in networked systems, where nodes cooperate to find the optimal quantity of common interest, x=x^\\star. The objective function of the corresponding optimization problem is the sum of private (known only by a node,) convex, nodes' objectives and each node imposes a private convex constraint on the allowed values of x. We solve this problem for generic connected network topologies with asymmetric random link failures with a novel distributed, decentralized algorithm. We refer to this algorithm as AL-G (augmented Lagrangian gossiping,) and to its variants as AL-MG (augmented Lagrangian multi neighbor gossiping) and AL-BG (augmented Lagrangian broadcast gossiping.) The AL-G algorithm is based on the augmented Lagrangian dual function. Dual variables are updated by the standard method of multipliers, at a slow time scale. To update the primal variables, we propose a novel, Gauss-Seidel type, randomized algorithm, at a fast time scale. AL-G uses unidirectional gossip communication, only between immediate neighbors in the network and is resilient to random link failures. For networks with reliable communication (i.e., no failures,) the simplified, AL-BG (augmented Lagrangian broadcast gossiping) algorithm reduces communication, computation and data storage cost. We prove convergence for all proposed algorithms and demonstrate by simulations the effectiveness on two applications: l_1-regularized logistic regression for classification and cooperative spectrum sensing for cognitive radio networks.

  3. St Elsewhere's or St Everywhere's: improving patient throughput in the private hospital sector.

    PubMed

    Laffey, Jennifer A; Wasson, Moran

    2007-01-01

    Communication errors have been found to be most common root cause of medical errors by the US-based Agency for Healthcare Research and Quality [1]. Although elective admissions to hospital involves a high volume of important healthcare communications where incorrect, missing or illegible information could result in a serious medical error, there is little published research on the impact of improving pre-admission communication flow between admitting doctors and hospitals. The Sydney Adventist Hospital (the San) is a 341-bed private hospital in Sydney's northern suburbs that provides a comprehensive range of health services. A process improvement program began in early 2005 to streamline preadmission communications. The objectives of this ongoing program are broadly to improve patient safety and to increase operating efficiency. The first major initiative within this program was to implement a standardised method for inpatient booking/referral with over three hundred admitting doctors. Eighteen months on, the hospital has been able to demonstrate a significant shift in the timeliness of patient bookings from specialists' rooms, more comprehensive provision of clinical indicators that can facilitate resource planning in operating theatres and on the wards, and reduction in the ratio of bookings made in areas other than the hospital bookings department. The program continues with focus on improving accuracy of data entry, rationalising patient forms, making more effective use of information received and automation of pre-admission information flows.

  4. An integrated Ka/Ku-band payload for personal, mobile and private business communications

    NASA Technical Reports Server (NTRS)

    Hayes, Edward J.; Keelty, J. Malcolm

    1991-01-01

    The Canadian Department of Communications has been studying options for a government-sponsored demonstration payload to be launched before the end of the century. A summary of the proposed system concepts and network architectures for providing an advanced private business network service at Ku-band and personal and mobile communications at Ka-band is presented. The system aspects addressed include coverage patterns, traffic capacity, and grade of service, multiple access options as well as special problems, such as Doppler in mobile applications. Earth terminal types and the advanced payload concept proposed in a feasibility study for the demonstration mission are described. This concept is a combined Ka-band/Ku-band payload which incorporates a number of advanced satellite technologies including a group demodulator to convert single-channel-per-carrier frequency division multiple access uplink signals to a time division multiplex downlink, on-board signal regeneration, and baseband switching to support packet switched data operation. The on-board processing capability of the payload provides a hubless VSAT architecture which permits single-hop full mesh interconnectivity. The Ka-band and Ku-band portions of the payload are fully integrated through an on-board switch, thereby providing the capability for fully integrated services, such as using the Ku-band VSAT terminals as gateway stations for the Ka-band personal and mobile communications services.

  5. Self-harm as a means to manage the public and private selves: A qualitative study of help seeking by adults

    PubMed Central

    Ogden, Jane; Bennett, Alice

    2015-01-01

    Adults (n = 25) completed online free text boxes about their self-harming behaviour. Thematic analysis identified three dominant themes: ‘managing the private self’, ‘managing the public self’ and ‘moving on’. Transcending these themes was the notion of thresholds of change. Self-harm enables people to manage both their private and public selves. When thresholds of change are surpassed, the public self communicates a need for help. Self-harm exists within a precarious balance of well-being and can be a form of self-care. Help seeking is instigated when this balance is disrupted and continued if it offers a better form of self-management than the individual’s own self-harming behaviour. PMID:28070372

  6. 47 CFR 90.553 - Encryption.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Regulations Governing the Licensing and Use of Frequencies in the 763-775 and 793... Interoperability calling channels. Radios employing encryption must have a readily accessible switch or other...

  7. 47 CFR 90.553 - Encryption.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Regulations Governing the Licensing and Use of Frequencies in the 758-775 and 788... Interoperability calling channels. Radios employing encryption must have a readily accessible switch or other...

  8. 47 CFR 90.553 - Encryption.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Regulations Governing the Licensing and Use of Frequencies in the 763-775 and 793... Interoperability calling channels. Radios employing encryption must have a readily accessible switch or other...

  9. Governing & Foundation Boards: Fostering Successful Relationships.

    ERIC Educational Resources Information Center

    Legon, Richard D.

    1996-01-01

    Public colleges and universities increasingly raise private funds through institutional foundations. A healthy relationship between governing and foundation boards requires open communication, regular interaction, and shared information. The fulcrum of this relationship is the college's president, who has specific responsibilities toward each…

  10. Choosing the route to traveler information systems deployment : decision factors for creating public/private business plans

    DOT National Transportation Integrated Search

    2012-08-01

    The United States Department of Transportation (U.S. DOT) has initiated a multimodal connected vehicle research initiative (hereafter referred to as the Initiative) that aims to enable safe, interoperable, networked, wireless communications amo...

  11. 47 CFR 1.9080 - Private commons.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Spectrum Leasing General Policies... arrangement, distinct from a spectrum leasing arrangement but permitted in the same services for which spectrum leasing arrangements are allowed, in which a licensee or spectrum lessee makes certain spectrum...

  12. Price Advice: Counseling Alumni About the Cost of an Education.

    ERIC Educational Resources Information Center

    Wynn, G. Richard; Morrell, Louis R.

    1999-01-01

    In excerpts from alumni magazines, the treasurers of Haverford College (Pennsylvania) and Wake Forest University (North Carolina) communicate issues involved in setting tuition and offer unique approaches to explaining the value that students receive at these private institutions. (MSE)

  13. 47 CFR 90.365 - Partitioned licenses and disaggregated spectrum.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Partitioned licenses and disaggregated spectrum. 90.365 Section 90.365 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Intelligent Transportation Systems Radio Service...

  14. 47 CFR 32.2311 - Station apparatus.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS..., Operator systems, or Account 2341, Large Private Branch Exchanges, as appropriate. (e) Station apparatus... from this account and included in Account 1220, Inventories. (h) Embedded CPE is that equipment or...

  15. 47 CFR 32.2311 - Station apparatus.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS..., Operator systems, or Account 2341, Large Private Branch Exchanges, as appropriate. (e) Station apparatus... from this account and included in Account 1220, Inventories. (h) Embedded CPE is that equipment or...

  16. 47 CFR 32.2311 - Station apparatus.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM SYSTEM OF ACCOUNTS..., Operator systems, or Account 2341, Large Private Branch Exchanges, as appropriate. (e) Station apparatus... from this account and included in Account 1220, Inventories. (h) Embedded CPE is that equipment or...

  17. 47 CFR 20.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... hardware and/or software in the caller's portable or mobile phone. Private Mobile Radio Service. A mobile... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES COMMERCIAL MOBILE RADIO SERVICES § 20.3 Definitions. Appropriate local emergency authority. An emergency answering point that has...

  18. 47 CFR 90.175 - Frequency coordinator requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... a frequency and/or transmitter site location. (18) Applications for base, mobile, or control... Section 90.175 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Policies Governing the Assignment of Frequencies § 90.175...

  19. 47 CFR 90.175 - Frequency coordinator requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... a frequency and/or transmitter site location. (18) Applications for base, mobile, or control... Section 90.175 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Policies Governing the Assignment of Frequencies § 90.175...

  20. 47 CFR 101.601 - Eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Eligibility. 101.601 Section 101.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Private Operational Fixed Point-to-Point Microwave Service § 101.601 Eligibility. Any person, or...

  1. 47 CFR 101.601 - Eligibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Eligibility. 101.601 Section 101.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Private Operational Fixed Point-to-Point Microwave Service § 101.601 Eligibility. Any person, or...

  2. 47 CFR 101.601 - Eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Eligibility. 101.601 Section 101.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Private Operational Fixed Point-to-Point Microwave Service § 101.601 Eligibility. Any person, or...

  3. 47 CFR 101.601 - Eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Eligibility. 101.601 Section 101.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Private Operational Fixed Point-to-Point Microwave Service § 101.601 Eligibility. Any person, or...

  4. 47 CFR 101.601 - Eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Eligibility. 101.601 Section 101.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES FIXED MICROWAVE SERVICES Private Operational Fixed Point-to-Point Microwave Service § 101.601 Eligibility. Any person, or...

  5. Symmetrically private information retrieval based on blind quantum computing

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling

    2015-05-01

    Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.

  6. Public-Private Partnerships for Providing Behavioral Health Care to Veterans and Their Families: What Do We Know, What Do We Need to Learn, and What Do We Need to Do?

    PubMed

    Pedersen, Eric R; Eberhart, Nicole K; Williams, Kayla M; Tanielian, Terri; Batka, Caroline; Scharf, Deborah M

    2015-11-30

    American veterans and their family members struggle with behavioral health problems, yet few engage in treatment to address these problems. Barriers to care include trouble accessing treatment and limited communication between civilian and military health care systems, which treat veterans and their family members separately. Even though the Department of Veterans Affairs (VA) is making efforts to address barriers to care, more work is needed to effectively serve veterans and their families. Public-private partnerships have been discussed as a potential solution and could include collaborations between a public agency, such as the VA, and a private organization, such as a veteran service organization, private industry, or private hospital. Despite the call for such partnerships, not much is known about what a public-private partnership would entail for addressing behavioral health concerns for veterans and their families. The health care literature is sparse in this area, and published examples and recommendations are limited. Thus, the authors wrote this article to inform the creation of public-private partnerships to better serve veterans and their families. The article outlines nine key components for public-private partnerships addressing veteran behavioral health care. These components are supported by qualitative interview data from five successful public-private partnerships that serve veterans and their families. This study will assist policymakers in the VA and other federal agencies in developing and fostering public-private partnerships to address the behavioral health care needs of veterans and their families. The article also discusses next steps for research and policymaking efforts with regard to these partnerships.

  7. Public-private partnerships in practice: collaborating to improve health finance policy in Ghana and Kenya.

    PubMed

    Suchman, Lauren; Hart, Elizabeth; Montagu, Dominic

    2018-06-13

    Social health insurance (SHI), one mechanism for achieving universal health coverage, has become increasingly important in low- and middle-income countries (LMICs) as they work to achieve this goal. Although small private providers supply a significant proportion of healthcare in LMICs, integrating these providers into SHI systems is often challenging. Public-private partnerships in health are one way to address these challenges, but we know little about how these collaborations work, how effectively, and why. Drawing on semi-structured interviews conducted with National Health Insurance (NHI) officials in Kenya and Ghana, as well as with staff from several international NGOs (INGOs) representing social franchise networks that are partnering to increase private provider accreditation into the NHIs, this article examines one example of public-private collaboration in practice. We found that interviewees initially had incomplete knowledge about the potential for cross-sector synergy, but both sides were motivated to work together around shared goals and the potential for mutual benefit. The public-private relationship then evolved over time through regular face-to-face interactions, reciprocal feedback, and iterative workplan development. This process led to a collegial relationship that also has given small private providers more voice in the health system. In order to sustain this relationship, we recommend that both public and private sector representatives develop formalized protocols for working together, as well as less formal open channels for communication. Models for aggregating small private providers and delivering them to government programmes as a package have potential to facilitate public-private partnerships as well, but there is little evidence on how these models work in LMICs thus far.

  8. Communicating the benefits of micronutrient fortification.

    PubMed

    Griffiths, Marcia

    2003-12-01

    Food fortification offers an affordable, convenient, and effective mechanism to improve the nutrition status of large segments of a population. However, the success of fortification has been less than public-health professionals and private-sector companies alike have hoped for, though often for different reasons. As new opportunities are available, success will be dictated by the ability of public health professionals to learn from private food companies' marketing efforts and, in turn, for the food companies to learn from the public health sector about how to reach groups who need fortified products the most. Simply having fortified products on the market does not promise that consumers will use the products or that businesses will continue to promote them. Carefully crafted and strategically implemented behavior-change communication can inform and motivate consumers to purchase and use the products appropriately, and, in turn, can motivate food companies, program managers, and policy makers to participate in the marketing of these products. Public health and development professionals can learn from the success of private-sector companies in creating demand for products. Good consumer research and testing can guide effective development and marketing of fortified products, as they do for all products and services. Private-sector companies that know how to market products need assistance to focus on the poorest segments of a population to pursue cost-effective strategies to get the product to those in need, in addition to those with purchasing power for the new product. Audience-specific marketing strategies can ensure that the same fortified product reaches every person who would benefit from it.

  9. Perceptions of care of patients undergoing coronary artery bypass surgery in Veterans Health Administration and private sector hospitals.

    PubMed

    Feria, Mary I; Sarrazin, Mary Vaughan; Rosenthal, Gary E

    2003-01-01

    Few studies have examined differences in patient perceptions of care between health care systems. This study compared the perceptions of male patients undergoing coronary artery bypass graft surgery in 43 Veterans Health Administration (VA) hospitals (N = 808) and 102 US private sector hospitals (N = 2271) from 1995 to 1998. Patient perceptions were measured by a validated survey that was mailed to patients after discharge. For 8 of the 9 dimensions assessed by the survey, VA patients were more likely (P < .001) than private sector patients to note a problem with care (eg, Coordination, 48% versus 40%; Patient Education and Communication, 50% versus 40%; Respect for Patient Preferences, 49% versus 41%). In comparisons limited to major teaching hospitals, VA patients were more likely to note a problem for 5 dimensions. The findings indicate that patient perceptions of care may be lower in VA than in private sector hospitals. Future studies should examine whether the VA's recent focus on improving patient satisfaction has narrowed these differences.

  10. Barossa Night: cohesion in the British Army officer corps.

    PubMed

    Bury, Patrick

    2017-06-01

    Contrasting the classical explanation of military group cohesion as sustained by interpersonal bonds, recent scholars have highlighted the importance of ritualized communication, training and drills in explaining effective military performance in professional armies. While this has offered a welcome addition to the cohesion literature and a novel micro-sociological method of examining cohesion, its primary evidential base has been combat groups. Indeed, despite their prominent role in directing operations over the past decade, the British Army's officer corps has received relatively little attention from sociologists during this period. No attempt has been made to explain cohesion in the officer corps. Using a similar method to recent cohesion scholars, this paper seeks to address this imbalance by undertaking a micro-sociology of one ritual in particular: 'Barossa Night' in the Royal Irish Regiment. Firstly, it draws on the work of Durkheim to examine how cohesion amongst the officer corps is created and sustained through a dense array of practises during formal social rituals. It provides evidence that the use of rituals highlights that social solidarity is central to understanding officer cohesion. Secondly, following Hockey's work on how private soldiers negotiate order, the paper shows how this solidarity in the officer corps is based on a degree of negotiated order and the need to release organizational tensions inherent in a strictly hierarchical rank structure. It highlights how the awarding of gallantry medals can threaten this negotiated order and fuel deviancy. In examining this behaviour, the paper shows that even amongst an officer class traditionally viewed as the elite upholders of organizational discipline, the negotiation of rank and hierarchy can be fluid. How deviant behaviour is later accepted and normalized by senior officers indicates that negotiated order is as important to understanding cohesion in the British Army's officer corps as it is amongst private soldiers. © London School of Economics and Political Science 2016.

  11. Differences in public and private sector adoption of telemedicine: Indian case study for sectoral adoption.

    PubMed

    Sood, Sanjay P; Negash, Solomon; Mbarika, Victor W A; Kifle, Mengistu; Prakash, Nupur

    2007-01-01

    Telemedicine is the use of communication networks to exchange medical information for providing healthcare services and medical education from one site to another. The application of telemedicine is more promising in economically developing countries with agrarian societies. The American Telemedicine Association (ATA) identifies three healthcare services: clinical medical services, health and medical education, and consumer health information. However, it is not clear how these services can be adopted by different sectors: public and private. This paper looks at four Indian case studies, two each in public and private sectors to understand two research questions: Are there differences in telemedicine adoption between public and private hospitals. If there are differences: What are the differences in telemedicine adoption between public and private sectors? Authors have used the extant literature in telemedicine and healthcare to frame theoretical background, describe the research setting, present the case studies, and provide discussion and conclusions about their findings. Authors believe that as India continues to develop its telemedicine infrastructures, especially with continued government support through subsidies to private telemedicine initiatives, its upward trend in healthcare will continue. This is expected to put India on the path to increase its life expectancy rates, especially for it rural community which constitute over 70% of its populace.

  12. A Critical Survey of Resources for Teaching Rhetorical Invention: A Review-Essay.

    ERIC Educational Resources Information Center

    Harrington, David V.; And Others

    1979-01-01

    A review of available textbooks and other resources dealing with neo-classical invention, prewriting, tagmemic invention and linguistic theory, the dramatistic method, and invention in speech communication. (DD)

  13. Faithful teleportation with partially entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gour, Gilad

    2004-10-01

    We write explicitly a general protocol for faithful teleportation of a d-state particle (qudit) via a partially entangled pair of (pure) n-state particles. The classical communication cost (CCC) of the protocol is log{sub 2}(nd) bits, and it is implemented by a projective measurement performed by Alice, and a unitary operator performed by Bob (after receiving from Alice the measurement result). We prove the optimality of our protocol by a comparison with the concentrate and teleport strategy. We also show that if d>n/2, or if there is no residual entanglement left after the faithful teleportation, the CCC of any protocol ismore » at least log{sub 2}(nd) bits. Furthermore, we find a lower bound on the CCC in the process transforming one bipartite state to another by means of local operation and classical communication.« less

  14. Quantum Communication Using Coherent Rejection Sampling.

    PubMed

    Anshu, Anurag; Devabathini, Vamsi Krishna; Jain, Rahul

    2017-09-22

    Compression of a message up to the information it carries is key to many tasks involved in classical and quantum information theory. Schumacher [B. Schumacher, Phys. Rev. A 51, 2738 (1995)PLRAAN1050-294710.1103/PhysRevA.51.2738] provided one of the first quantum compression schemes and several more general schemes have been developed ever since [M. Horodecki, J. Oppenheim, and A. Winter, Commun. Math. Phys. 269, 107 (2007); CMPHAY0010-361610.1007/s00220-006-0118-xI. Devetak and J. Yard, Phys. Rev. Lett. 100, 230501 (2008); PRLTAO0031-900710.1103/PhysRevLett.100.230501A. Abeyesinghe, I. Devetak, P. Hayden, and A. Winter, Proc. R. Soc. A 465, 2537 (2009)PRLAAZ1364-502110.1098/rspa.2009.0202]. However, the one-shot characterization of these quantum tasks is still under development, and often lacks a direct connection with analogous classical tasks. Here we show a new technique for the compression of quantum messages with the aid of entanglement. We devise a new tool that we call the convex split lemma, which is a coherent quantum analogue of the widely used rejection sampling procedure in classical communication protocols. As a consequence, we exhibit new explicit protocols with tight communication cost for quantum state merging, quantum state splitting, and quantum state redistribution (up to a certain optimization in the latter case). We also present a port-based teleportation scheme which uses a fewer number of ports in the presence of information about input.

  15. Finite-block-length analysis in classical and quantum information theory.

    PubMed

    Hayashi, Masahito

    2017-01-01

    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects.

  16. Finite-block-length analysis in classical and quantum information theory

    PubMed Central

    HAYASHI, Masahito

    2017-01-01

    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects. PMID:28302962

  17. Communication: Note on detailed balance in symmetrical quasi-classical models for electronically non-adiabatic dynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, William H., E-mail: millerwh@berkeley.edu; Cotton, Stephen J., E-mail: StephenJCotton47@gmail.com

    2015-04-07

    It is noted that the recently developed symmetrical quasi-classical (SQC) treatment of the Meyer-Miller (MM) model for the simulation of electronically non-adiabatic dynamics provides a good description of detailed balance, even though the dynamics which results from the classical MM Hamiltonian is “Ehrenfest dynamics” (i.e., the force on the nuclei is an instantaneous coherent average over all electronic states). This is seen to be a consequence of the SQC windowing methodology for “processing” the results of the trajectory calculation. For a particularly simple model discussed here, this is shown to be true regardless of the choice of windowing function employedmore » in the SQC model, and for a more realistic full classical molecular dynamics simulation, it is seen to be maintained correctly for very long time.« less

  18. OpenFlow arbitrated programmable network channels for managing quantum metadata

    DOE PAGES

    Dasari, Venkat R.; Humble, Travis S.

    2016-10-10

    Quantum networks must classically exchange complex metadata between devices in order to carry out information for protocols such as teleportation, super-dense coding, and quantum key distribution. Demonstrating the integration of these new communication methods with existing network protocols, channels, and data forwarding mechanisms remains an open challenge. Software-defined networking (SDN) offers robust and flexible strategies for managing diverse network devices and uses. We adapt the principles of SDN to the deployment of quantum networks, which are composed from unique devices that operate according to the laws of quantum mechanics. We show how quantum metadata can be managed within a software-definedmore » network using the OpenFlow protocol, and we describe how OpenFlow management of classical optical channels is compatible with emerging quantum communication protocols. We next give an example specification of the metadata needed to manage and control quantum physical layer (QPHY) behavior and we extend the OpenFlow interface to accommodate this quantum metadata. Here, we conclude by discussing near-term experimental efforts that can realize SDN’s principles for quantum communication.« less

  19. OpenFlow arbitrated programmable network channels for managing quantum metadata

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasari, Venkat R.; Humble, Travis S.

    Quantum networks must classically exchange complex metadata between devices in order to carry out information for protocols such as teleportation, super-dense coding, and quantum key distribution. Demonstrating the integration of these new communication methods with existing network protocols, channels, and data forwarding mechanisms remains an open challenge. Software-defined networking (SDN) offers robust and flexible strategies for managing diverse network devices and uses. We adapt the principles of SDN to the deployment of quantum networks, which are composed from unique devices that operate according to the laws of quantum mechanics. We show how quantum metadata can be managed within a software-definedmore » network using the OpenFlow protocol, and we describe how OpenFlow management of classical optical channels is compatible with emerging quantum communication protocols. We next give an example specification of the metadata needed to manage and control quantum physical layer (QPHY) behavior and we extend the OpenFlow interface to accommodate this quantum metadata. Here, we conclude by discussing near-term experimental efforts that can realize SDN’s principles for quantum communication.« less

  20. 75 FR 26171 - Cyber Security Certification Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ...-sector auditors who will examine those provider's adherence to stringent cyber security practices that... the auditors who will conduct security assessments of communications service providers; (3) establish... whether the auditors should also be private-sector entities. If so, in order to prevent conflicts of...

Top