This paper discusses the concept of past-future entanglement, which allows two qubits to become entangled without directly interacting by interacting with a shared quantum field at different times. The paper proposes using past-future entanglement as a novel approach for quantum cryptography. If an eavesdropper interacts with the quantum field during the time interval where no qubits are interacting, it would disturb the entanglement and be detectable. Additionally, without access to the entangled qubit, an eavesdropper could not derive the encrypted key even if they obtain classical bits from the field. Past-future entanglement could enable secure key distribution and quantum teleportation through time via the quantum field.
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
Quantum Key Distribution Meetup Slides (Updated)Kirby Linvill
Slides from a talk on Quantum Key Distribution presented to the Silicon Valley Cyber Security Meetup group. This talk covered a basic intuitive description of the BB84 protocol as well as brief notes on current QKD techniques and vulnerabilities that leave them hackable if not crackable. These slides prioritize conveying intuitive understanding over exact implementation details so some details of the BB84 protocol are different (e.g. using qubit bases rather than polarization bases) or glossed over.
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...IOSR Journals
In this paper, a numerical method for Nth - order fuzzy initial value problems (FIVP) based on
Seikkala derivative of fuzzy process is studied. The fourth order Runge-Kutta method based on Centroidal Mean
(RKCeM4) is used to find the numerical solution and the convergence and stability of the method is proved. This
method is illustrated by solving second and third order FIVPs. The results show that the proposed method suits
well to find the numerical solution of Nth – order FIVPs.
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...IOSR Journals
The uptake of methylene blue by sulphonated biomass of Cicer arientinum is conducted in batch mode. The effect of parameters like contact time, sorbent dose, pH and temperature has been studied. The value Kp is found to be 0.1928 and 0.8727 for initial and final concentrations respectively. The kinetics of biosorption results indicate that sorption process follows pseudo–second order model with determination coefficients greater than 0.988 for sorbent under all experimental conditions. Thermodynamic parameter via KD, and ΔG are calculated indicates, rise in KD, negative ΔG values determine the spontaneity of the process and significantly shows that sorption process is time, temperature and concentration dependant. The adsorption obeys the Langmuir isotherm, Hall separation factor values less than unity and low value of activation energy indicate that sorption is an activated and favorable physical process. The phenomenon of sorption includes liquid-film, mass transfer mechanism is well described by Weber and Morris intraparticle diffusion model. Thus sulphonated biomass of Cicer arientinum(S-III) is a low cost and easily available good sorbent for the removal of MB+ from wastewater.
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesIOSR Journals
Abstract: Nanosized Iron oxide is prepared by using precipitation method from iron nitrate and liquid ammonia. Thermal analysis shows that synthesized iron oxide shows some weight loss and oxide undergoing decomposition, dehydration or any physical change from TGA curve we observe that Iron oxide shows stable weight loss above 4000C. In DTA curve also, there is exothermic and endothermic peak. Which shows phase transition, solid state reaction or any chemical reaction occurred during heating treatment. Morphology is observed by scanning electron microscopy (SEM) shows particles are nanosized. Further morphology observation by Transmission Electron Microscopy (TEM) revels that Iron Oxide has the corundum (Al2O3) structure. Magnetic measurements shows that iron oxide has five unpaired electron and strongly paramagnetic character.
Ingoldian Fungi in Kigga Falls, Chikmagalur District, KarnatakaIOSR Journals
Fungi are the ubiquitous organism.The exist in diverse forms in a range of habitats, arboreal,
freshwater, marine, subterranean and terrestrial. In fresh water we concentrated only Ingoldian fungi. The
selected study sites of foam samples and decaying debris were collected in the same study area and kept for
screening and incubation respectively. The conidia developing on decayingdebris were screened using
microscope. The collected foam samples were revealed Ingoldian fungi. In this contribution of occurrence and
abundance of Ingoldian fungi were enumerated. A total of 24 species were isolated twelve genera were
identified.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Prevalence and morphological details of Nyctotherus periplanetae in the host ...IOSR Journals
Nyctotherus periplanetae is very common intestine dwelling ciliate in invertebrates. During the period of two years total number of 1842 intestinal samples of Periplaneta americana were checked. The percentage of prevalence of ciliates was found quite high and it was 57.77% during the year 2007 and 60.75% in 2008.
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...IOSR Journals
Abstract: Aims: The main objective of this work was to observe the analgesic activity of Vitex negundo (leaves) on mice. Study Design: Present study was designed to isolate pure compounds as well as to observe pharmacological activities of the isolated pure compounds with crude extracts of the plant Vitex negundo (leaves). The study protocol consisted of the following steps:
Cold extraction at room temperature of the whole plant with distilled methanol.
Filtration of the crude petroleum ether and methanolic extracts by using the Markin cotton cloth and subsequently through the filter paper and solvent evaporation.
Screening of analgesic activity of crude extracts on Swiss Albino mice.
Place and Duration of Study: The study of analgesic activity of Vitex negundo (leaves) on mice was take place in the laboratory of Department of Pharmacy, Southeast University, Bangladesh, between January 2011 and July 2011. Methodology: The analgesic activity was investigated for its peripheral pharmacological actions using acetic acid-induced writhing test in mice. Results: The methanolic and petroleum ether extracts, at the dose of 200 mg/kg body weight, displayed 82.60% & 74.66% pain inhibition which was significant (p<0.001) compared to control. These results indicate that the extracts possess strong analgesic activity. Conclusion: The present study tends to suggest the analgesic activities of the crude methanolic and petroleum ether extract of the leaves of Vitex negundo and justify its use in folkloric remedies
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...IOSR Journals
The current paper reports discovery of superluminal velocities of X-rays, and Bharat Radiation in 12.87 to 31 nm range from solar spectra. The discovery challenges the 100 year old Albert Einstein’s assertion that nothing can go faster than velocity of light c in vacuum while formulating E = mc2 in his special theory of relativity reported in 1905 [1]. Several solar spectra recorded at various wavelengths by Woods et al in 2011 demonstrated GOES X-rays arriving earlier than 13.5 nm emission, which in turn arriving earlier than 33.5 nm emission [2]. Finally, the investigators faced difficulty in concluding that short wavelengths traveled fast because of lack of information whether all the three emissions originated from the same source and at the same time. Very recently the author has reported GOES X-rays (7.0 nm) cause 13.5 nm (Bharat Radiation), which in turn causes 33.5 nm Extreme ultraviolet (EUV) emission from same excited atoms present in solar flare by Padmanabha Rao Effect [3, 4]. Based on these findings, the author succeeded in explaining how the solar spectral findings provide direct evidences on superluminal velocities of GOES X-ray and 13.5 nm Bharat Radiation emissions, when 33.5 nm EUV emission is considered travelling at velocity of light c. Among X-ray wavelengths, the short wavelength 7.0 nm X-rays traveled faster than 9.4 nm X-rays, while X-rays go at superluminal velocities. Among Bharat radiation wavelengths, short wavelengths showed fast travel, while Bharat Radiation goes at superluminal velocities as compared to 33.5 EUV emission.
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...IOSR Journals
Doping is a widely used to improve the structural and optical properties of semiconductors. However deposition route is also very important to get nanostructure with different properties. ZnO nanostructures doped with Mn having 5% doping concentrations by weight percentage have been synthesized in the laboratory using Spin coating technique. Scanning Electron Microscope (SEM) image shows the around one millimeter and X-ray diffractometer studies shows that the average diameter of the particles is 25 nm. From the UV-Vis studies the annealing temperature increases the crystal size decreases and the bandgap values increases accordingly.
A Hypocoloring Model for Batch Scheduling ProblemIOSR Journals
In this paper we define Scheduling, Batch Scheduling, Coloring, Subcoloring, Hypocoloring, Chromatic number, Subchromatic number, and Hypochromatic number for a given graph. A batch Scheduling problem has been obtained by using the above discussed concepts.An exponential algorithm has been developed for triangle free graphs. The solution is obtained by introducing COCA - ‘Contract or Connect” Principle. The Subchromatic and Hypochromatic number for shell graphs has been illustrated. A Hypocoloring model for personnel assignment problem has been briefly discussed.
Effect of time-of-day specific obese training on body composition and physica...IOSR Journals
The best strategy for management of obese, outside pharmacological interventions, is physical exercise associated to diet. Recent research has discovered that the problem of obesity is largely due to a biological clock and that lipid oxidation is higher in the evening compared to the morning and at night compared to day. The purpose of this study is to investigate the effect of time-of-day specific obese training on body composition and physical capacity in obese following a low calorie diet. 20 sedentary pre-obese and obese with a mean BMI of 34.3 kg/m2 aged 20 to 47 years subjects participated in a concurrent strength and specific endurance training for obese. Subjects were divided into two training groups: a Morning training Group (MG: n = 10) and an Evening training Group (EG: n=10). The specific training associated to lower caloric diet has increased physical capacity (17,7% for EG and 15,6% for MG), decreased body weight (7,3% for EG and 6% for MG) fat percentage (19,5% for EG and 11,3% for MG) and waist circumference (10,2% for EG and 8,2% for MG) in both groups. Afternoon training was more effective than morning training on fat loss (24.9% for EG versus 15.9% for MG) and on lean mass variation (+2.9% for EG versus -0.5% for MG).
Quantum Key Distribution Meetup Slides (Updated)Kirby Linvill
Slides from a talk on Quantum Key Distribution presented to the Silicon Valley Cyber Security Meetup group. This talk covered a basic intuitive description of the BB84 protocol as well as brief notes on current QKD techniques and vulnerabilities that leave them hackable if not crackable. These slides prioritize conveying intuitive understanding over exact implementation details so some details of the BB84 protocol are different (e.g. using qubit bases rather than polarization bases) or glossed over.
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...IOSR Journals
In this paper, a numerical method for Nth - order fuzzy initial value problems (FIVP) based on
Seikkala derivative of fuzzy process is studied. The fourth order Runge-Kutta method based on Centroidal Mean
(RKCeM4) is used to find the numerical solution and the convergence and stability of the method is proved. This
method is illustrated by solving second and third order FIVPs. The results show that the proposed method suits
well to find the numerical solution of Nth – order FIVPs.
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...IOSR Journals
The uptake of methylene blue by sulphonated biomass of Cicer arientinum is conducted in batch mode. The effect of parameters like contact time, sorbent dose, pH and temperature has been studied. The value Kp is found to be 0.1928 and 0.8727 for initial and final concentrations respectively. The kinetics of biosorption results indicate that sorption process follows pseudo–second order model with determination coefficients greater than 0.988 for sorbent under all experimental conditions. Thermodynamic parameter via KD, and ΔG are calculated indicates, rise in KD, negative ΔG values determine the spontaneity of the process and significantly shows that sorption process is time, temperature and concentration dependant. The adsorption obeys the Langmuir isotherm, Hall separation factor values less than unity and low value of activation energy indicate that sorption is an activated and favorable physical process. The phenomenon of sorption includes liquid-film, mass transfer mechanism is well described by Weber and Morris intraparticle diffusion model. Thus sulphonated biomass of Cicer arientinum(S-III) is a low cost and easily available good sorbent for the removal of MB+ from wastewater.
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesIOSR Journals
Abstract: Nanosized Iron oxide is prepared by using precipitation method from iron nitrate and liquid ammonia. Thermal analysis shows that synthesized iron oxide shows some weight loss and oxide undergoing decomposition, dehydration or any physical change from TGA curve we observe that Iron oxide shows stable weight loss above 4000C. In DTA curve also, there is exothermic and endothermic peak. Which shows phase transition, solid state reaction or any chemical reaction occurred during heating treatment. Morphology is observed by scanning electron microscopy (SEM) shows particles are nanosized. Further morphology observation by Transmission Electron Microscopy (TEM) revels that Iron Oxide has the corundum (Al2O3) structure. Magnetic measurements shows that iron oxide has five unpaired electron and strongly paramagnetic character.
Ingoldian Fungi in Kigga Falls, Chikmagalur District, KarnatakaIOSR Journals
Fungi are the ubiquitous organism.The exist in diverse forms in a range of habitats, arboreal,
freshwater, marine, subterranean and terrestrial. In fresh water we concentrated only Ingoldian fungi. The
selected study sites of foam samples and decaying debris were collected in the same study area and kept for
screening and incubation respectively. The conidia developing on decayingdebris were screened using
microscope. The collected foam samples were revealed Ingoldian fungi. In this contribution of occurrence and
abundance of Ingoldian fungi were enumerated. A total of 24 species were isolated twelve genera were
identified.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Prevalence and morphological details of Nyctotherus periplanetae in the host ...IOSR Journals
Nyctotherus periplanetae is very common intestine dwelling ciliate in invertebrates. During the period of two years total number of 1842 intestinal samples of Periplaneta americana were checked. The percentage of prevalence of ciliates was found quite high and it was 57.77% during the year 2007 and 60.75% in 2008.
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...IOSR Journals
Abstract: Aims: The main objective of this work was to observe the analgesic activity of Vitex negundo (leaves) on mice. Study Design: Present study was designed to isolate pure compounds as well as to observe pharmacological activities of the isolated pure compounds with crude extracts of the plant Vitex negundo (leaves). The study protocol consisted of the following steps:
Cold extraction at room temperature of the whole plant with distilled methanol.
Filtration of the crude petroleum ether and methanolic extracts by using the Markin cotton cloth and subsequently through the filter paper and solvent evaporation.
Screening of analgesic activity of crude extracts on Swiss Albino mice.
Place and Duration of Study: The study of analgesic activity of Vitex negundo (leaves) on mice was take place in the laboratory of Department of Pharmacy, Southeast University, Bangladesh, between January 2011 and July 2011. Methodology: The analgesic activity was investigated for its peripheral pharmacological actions using acetic acid-induced writhing test in mice. Results: The methanolic and petroleum ether extracts, at the dose of 200 mg/kg body weight, displayed 82.60% & 74.66% pain inhibition which was significant (p<0.001) compared to control. These results indicate that the extracts possess strong analgesic activity. Conclusion: The present study tends to suggest the analgesic activities of the crude methanolic and petroleum ether extract of the leaves of Vitex negundo and justify its use in folkloric remedies
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...IOSR Journals
The current paper reports discovery of superluminal velocities of X-rays, and Bharat Radiation in 12.87 to 31 nm range from solar spectra. The discovery challenges the 100 year old Albert Einstein’s assertion that nothing can go faster than velocity of light c in vacuum while formulating E = mc2 in his special theory of relativity reported in 1905 [1]. Several solar spectra recorded at various wavelengths by Woods et al in 2011 demonstrated GOES X-rays arriving earlier than 13.5 nm emission, which in turn arriving earlier than 33.5 nm emission [2]. Finally, the investigators faced difficulty in concluding that short wavelengths traveled fast because of lack of information whether all the three emissions originated from the same source and at the same time. Very recently the author has reported GOES X-rays (7.0 nm) cause 13.5 nm (Bharat Radiation), which in turn causes 33.5 nm Extreme ultraviolet (EUV) emission from same excited atoms present in solar flare by Padmanabha Rao Effect [3, 4]. Based on these findings, the author succeeded in explaining how the solar spectral findings provide direct evidences on superluminal velocities of GOES X-ray and 13.5 nm Bharat Radiation emissions, when 33.5 nm EUV emission is considered travelling at velocity of light c. Among X-ray wavelengths, the short wavelength 7.0 nm X-rays traveled faster than 9.4 nm X-rays, while X-rays go at superluminal velocities. Among Bharat radiation wavelengths, short wavelengths showed fast travel, while Bharat Radiation goes at superluminal velocities as compared to 33.5 EUV emission.
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...IOSR Journals
Doping is a widely used to improve the structural and optical properties of semiconductors. However deposition route is also very important to get nanostructure with different properties. ZnO nanostructures doped with Mn having 5% doping concentrations by weight percentage have been synthesized in the laboratory using Spin coating technique. Scanning Electron Microscope (SEM) image shows the around one millimeter and X-ray diffractometer studies shows that the average diameter of the particles is 25 nm. From the UV-Vis studies the annealing temperature increases the crystal size decreases and the bandgap values increases accordingly.
A Hypocoloring Model for Batch Scheduling ProblemIOSR Journals
In this paper we define Scheduling, Batch Scheduling, Coloring, Subcoloring, Hypocoloring, Chromatic number, Subchromatic number, and Hypochromatic number for a given graph. A batch Scheduling problem has been obtained by using the above discussed concepts.An exponential algorithm has been developed for triangle free graphs. The solution is obtained by introducing COCA - ‘Contract or Connect” Principle. The Subchromatic and Hypochromatic number for shell graphs has been illustrated. A Hypocoloring model for personnel assignment problem has been briefly discussed.
Effect of time-of-day specific obese training on body composition and physica...IOSR Journals
The best strategy for management of obese, outside pharmacological interventions, is physical exercise associated to diet. Recent research has discovered that the problem of obesity is largely due to a biological clock and that lipid oxidation is higher in the evening compared to the morning and at night compared to day. The purpose of this study is to investigate the effect of time-of-day specific obese training on body composition and physical capacity in obese following a low calorie diet. 20 sedentary pre-obese and obese with a mean BMI of 34.3 kg/m2 aged 20 to 47 years subjects participated in a concurrent strength and specific endurance training for obese. Subjects were divided into two training groups: a Morning training Group (MG: n = 10) and an Evening training Group (EG: n=10). The specific training associated to lower caloric diet has increased physical capacity (17,7% for EG and 15,6% for MG), decreased body weight (7,3% for EG and 6% for MG) fat percentage (19,5% for EG and 11,3% for MG) and waist circumference (10,2% for EG and 8,2% for MG) in both groups. Afternoon training was more effective than morning training on fat loss (24.9% for EG versus 15.9% for MG) and on lean mass variation (+2.9% for EG versus -0.5% for MG).
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric SpaceIOSR Journals
The purpose of this work is to extend and generalize some common fixed point theorems for Expansive type mappings in complete cone metric spaces. We are attempting to generalize the several well- known recent results. Mathematical subject classification; 54H25, 47H10
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...IOSR Journals
Physicochemical and bacteriological analyses of sachets water samples in Kano metropolis were
carried out using standard procedures to assess the quality of such water consumed in the area. Samples were
collected from four different water depots in different parts of Kano metropolis. The results showed variations in
the concentrations of the analyzed parameters in the water samples. The pH values ranged from 6.97±0.20 to
7.25±0.33; Electrical Conductivity ranged from 176 ±0.02 to 282±0.25μS/cm; Alkalinity ranged from 0.17±0.02
to 0.69±0.28 mg/l; Total solids were in the range of 100.30±0.25 to 157.34±0.30mg/l. Total Dissolved Solids
ranged from 67.80±0.30 to 84.70±0.23mg/l; Total Suspended Solids ranged from 15.60±0.36 to75.84±0.02mg/;
Total Hardness ranged from 85.00±0.03 to 103.00±0.20 mg/ and turbidity ranged from 0.60±0.21 to 2.23±0.32
NTU. Escherichia coli (E.coli) were not detected in all the samples. The levels of some of the anions analyzed
ranged from 0.03±0.00 mg/l NO2
- to 7.06 ±0.02 mg/l SO4
2-. Similarly, the levels of some of the heavy metals
analyzed ranged from 0.12±0.02mg/l Cu to 0.71±0.01mg/l Fe. Accordingly, the water samples were colourless
and odourless. In general, the concentrations of all the parameters analyzed in the samples were below or
within the World Health Organization (WHO) permissible limits, indicating that the sachets water were safe for
human consumption.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.IOSR Journals
The A multi band microstrip patch antenna has been designed for GPS,WiMAX and WLAN
applications. The proposed antenna is designed by using substrate of RT duroid having permittivity of about 2.2
and loss tangent of 1.The substrate is having thickness of 6mm at which a trapezoidal patch antenna with V slot
has been introduced in this paper. The designing results like S11 parameter return loss,VSWR and field pattern
is plotted successfully. The obtained result is having a two band resonance with S11 less then -10dB and VSWR
less than 2.
So a dual band trapezoidal microstrip patch antenna has been designed and all results are plotted.Simmulating
software used is IE3D.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
A Study To Locate The Difference Between Active And Passive Recovery After St...IOSR Journals
Abstract: Exercise recovery involves a number of Post-exercise Steps that are essential for any exercise
regime, regardless of fitness level, the type of physical activity or the exercise intensity. Exercise recovery does
not take long or require much effort, but it is often neglected. The exercise recovery is mainly of two types one is
Active Recovery and the other is passive Recovery. Active Recovery is the term used for cooling down (with slow
jogging, stretching etc. ) after a high intensive work out and Passive Recovery is Stopping dead, doing nothing
again until he head out on his next run a couple of days later. The results of a study suggest that an active
recovery of 3 minutes between High intensity, short duration exercise bouts significantly increase peak power
and average power compared to a passive recovery, irrespective of changes in blood lactate levels. Several
research studies have been conducted in this specific area in the international level but the effort is supposed to
be weaker with respect to Indian Sport Scientists. Feeling the importance of recovery in the sport field and
considering its application in a wider range or rather as an effort to make it much more acceptable to the sport
society the investigator under the guidance of her supervisor envisaged to conduct the study entitled “A study to
locate the difference between active and passive recovery after strenuous workout.” The subjects for the present
study were 20 male trained athletes from Howrah and Purba Medinipur districts of West Bengal who were
selected randomly from a coaching camp. In the present study, the investigator has considered the following
things such as their – Age, sex, Height of the subject, Resting Heart Rate, Post Exercise Heart Rate, After Active
Recovery Heart Rate, After Passive Recovery Heart Rate. The scholar made the athletes to run 600 mts. and
recorded their Heart Rate just after completion of the workout and also recorded their HR after one minute of
complete rest the same procedure was repeated but in between the athletes were directed to perform active
recovery i.e. slow jogging. From data analysis it appears that the Active recovery is superior in comparison to
the Passive recovery because the recovery range is greater. Thus the scholar arrived at the explicit conclusion
that active recovery is better than passive recovery between exercise bouts or after strenuous workout.
Key Words: Active recovery, Passive Recovery, Strenuous workout.
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock
cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the
eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend
attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger 1. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.
Introduction of quantum cryptography
basic definition of quantum
History of quantum cryptography
need of quantum cryptography
key distribution
eves dropping
error
noise
error correction
advantages
disadvantages
conclusion
Quantum teleportation is the process in which, the quantum state of a
particle is transferred to another without direct interaction. This is one of the most important consequence of quantum entanglement.
Here I have tried to explain the theory behind the teleportation and its experimental verification.
Communicating through emtanglement transfer Eran Sinbar
In our previous paper [1] we claim that based on conservation laws (e.g. spin, angular
momentum, gravity, time dilation etc.) in some cases, matter and antimatter pairs (e.g.
electron and positron pair) produced from photonic pure energy are entangled.
Furthermore, if there are two identical pair production procedures ,A & B ,and an
electron from entangled pair A annihilates with the positron of entangled pair B ,from
conservation laws consideration the left behind positron from pair A and the left
behind electron from pair B become entangled and we will refer to this event as
entanglement transfer (Fig. 1).This phenomena can be examined at the LHC and if
proven to be correct it is another proof that entanglement is truly a “spooky action at a
distance” (EPR paradox) .As we will explain in this paper, This phenomena of
entanglement transfer can be used for non-local communication applications.
Quantum entanglement is one of the most intriguing and counterintuitive pheno...NishaJaiswal34
Quantum entanglement is one of the most intriguing and counterintuitive phenomena in the realm of quantum mechanics. It describes a peculiar correlation that can exist between particles, where the properties of one particle instantly affect the properties of another, regardless of the distance separating them.
At the heart of quantum entanglement is the principle of superposition, which states that particles can exist in multiple states simultaneously until measured or observed. When two or more particles become entangled, their quantum states become intertwined in such a way that the state of one particle is directly linked to the state of the other(s).
One of the remarkable features of quantum entanglement is that the entangled particles can be separated by vast distances, yet changes to one particle's state will instantaneously influence the state of the other particle, seemingly defying the constraints of space and time. This phenomenon famously led Albert Einstein to refer to it as "spooky action at a distance," as it challenges our classical understanding of causality and locality.
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYijcisjournal
Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum
Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure. It based on the Quantum of physics since its name which make it more secure from all other cryptography and UN breakable. In this paper about quantum cryptography i.e working, limitation and advantages discussed
It has long been realized that the mathematical core of Bell's theorem is essentially a classical probabilistic proof that a certain distributed computing task is impossible: namely, the Monte Carlo simulation of certain iconic quantum correlations. I will present a new and simple proof of the theorem using Fourier methods (time series analysis) which should appeal to probabilists and statisticians. I call it Gull's theorem since it was sketched in a conference talk many years ago by astrophysicist Steve Gull, but never published. Indeed, there was a gap in the proof.
The connection with the topic of this session is the following: though a useful quantum computer is perhaps still a dream, many believe that a useful quantum internet is very close indeed. The first application will be: creating shared secret random cryptographic keys which, due to the laws of physics, cannot possibly be known to any other agent. So-called loophole-free Bell experiments have already been used for this purpose.
Like other proofs of Bell's theorem, the proof concerns a thought experiment, and the thought experiment could also in principle be carried out in the lab. This connects to the concept of functional Bell inequalities, whose application in the quantum research lab has not yet been explored. This is again a task for classical statisticians to explore.
R.D. Gill (2022) Gull's theorem revisited, Entropy 2022, 24(5), 679 (11pp.)
https://www.mdpi.com/1099-4300/24/5/679
https://arxiv.org/abs/2012.00719
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONIJNSA Journal
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP digest on top of IMS architecture. The standard deploys AKA-MD5 for the terminal authentication. The third Generation Partnership Project (3GPP) provided Generic Bootstrapping Architecture (GBA) to authenticate the subscriber before accessing multimedia services over HTTP. In this paper, we propose a new IMS Service Authentication scheme using Identity Based cryptography (IBC). This new scheme will lead to better performances when there are simultaneous authentication requests using Identity-based Batch Verification. We analyzed the security of our new protocol and we presented a performance evaluation of its cryptographic operations.
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESIJNSA Journal
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal. The security of this protocol relies on the fact, that the arbitrary quantum state cannot be cloned, known as the no-cloning theorem. This protocol can be implemented with current technologies.
Similar to Quantum Cryptography Using Past-Future Entanglement (20)
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Quantum Cryptography Using Past-Future Entanglement
1. IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43
www.iosrjournals.org
www.iosrjournals.org 41 | Page
Quantum Cryptography Using Past-Future Entanglement
1
Smriti Jha
1
(Computer Science, Pune University, India)
Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based.
However, observations of measurements are discussed over a classical channel. Communication using
entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The
purpose of this paper is to study the past protocols and present a security perspective on a novel quantum
protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of
Quantum Teleportation and applies the concept to modern cryptographic applications.
Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum
Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution
I. INTRODUCTION
Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels.
These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s
uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols
have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the
key between users, Alice and Bob. [1]
In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism
and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum
protocol along with future scope of the same.
II. HISTORY OF QUANTUM PROTOCOLS
2.1 BB84 Protocol
BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key
Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use.
BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another,
without making any use of entanglement. [2]
As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases.
The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis
signifying the bit 1. The second orthogonal base is the diagonal basis with 45o
as bit 0 and 135o
as bit 1.
Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First,
Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These
photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to
measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public
channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does
not match the one Alice used for that bit.
In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause
detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to
Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of
unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by
Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from
Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of
information.
2.2. Ekert’s protocol
Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the
concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used
to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the
entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently
choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3]
Different angular orientations can be used for measurements, results of which are then used to determine the
2. Quantum Cryptography Using Past-Future Entanglement
www.iosrjournals.org 42 | Page
Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication
between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected.
Entanglement is an effective way for QKD as it does not require a random number generator. Recent
experiments have achieved QKD using entangled photons proving their credibility. These attributes make
entanglement of great significance in modern quantum cryptography techniques.
2.3. Quantum Teleportation
Quantum Teleportation is a technique of transporting quantum state from one location to another
without disobeying the no cloning theorem.
Alice has a quantum state that she wants to send to Bob:
(1)
But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but
instead would result in the state |0> with probability |α|2
and in state |1> with probability |β|2
.
To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements
made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits,
though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the
quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to
reconstruct the desired quantum state.
III. RELATED WORK
In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin-
Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been
proposed in which two qubits become entangled with each other without ever physically interacting with each
other.
The qubit P interacts with the quantum field along an open transmission line for an interval Ton and
then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past-
future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same
time.
The physicists have successfully realized this experiment using current technology. The paper puts
forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P1
is
codified in the field during time Toff and recovered in F using classical information stored in the past. Special
care has been taken in the experiments to disallow any photon exchange which could contribute in correlations,
making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that
if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have
finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps.
The paper explores the example of Paula in possession of P, and another qubit P1
which she wants to
teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on
her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and
manipulate his qubit F, to transfer the state of P1
to F. The fidelity is a function of quantum correlations between
P and F. The information of P1
is coded in the field during Toff irrespective of the resultant state of qubit P after
its interaction and measurement. The information is then recovered during Ton in F.
IV. PROPOSED APPLICATION
The proposed method focuses on a security technique which is based on the Past-Future Entanglement
where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled
particles. The source of Entanglement here is the vacuum field, which is the transmission line itself.
This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the
quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time
interval is denoted by Toff.
Communication faces the possibility of an eavesdropper listening on the channel in order to decipher
the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most
secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long
key value.
The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P
interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any
interaction occurring with the vacuum field.
Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the
transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to
the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of
3. Quantum Cryptography Using Past-Future Entanglement
www.iosrjournals.org 43 | Page
the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the
qubits, which would be eventually required to crack the encrypted key.
In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the
entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an
intrusion.
The quantum channel has also proven to support Quantum Teleportation through time where the
classical bits stored in the field are used by qubit F to replicate the quantum state of P1
. Though classical bits can
be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to
derive the quantum state.
V. CONCLUSION
This paper has explored the security applications of the novel quantum protocol with respect to Past-
Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and
making it accessible. The paper is only focused on the security applications of the quantum channel, which can
be equally applied in various other quantum information processing tasks. Another field of research could be
implementation in device independent quantum cryptography.
REFERENCES
[1] Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056.
[2] Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on
Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179
[3] Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 -
663M
[4] Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using
Circuit QED”, Phys. Rev. Lett. 109, 033602