<p>Entanglement is an important resource for various applications of quantum computation. Another important endeavor is to establish the role of entanglement in practical implementation where system of interest is affected by various kinds of noisy channels. Here, a single classical bit is used to send information under the influence of a noisy quantum channel. The entanglement content of quantum states is computed under noisy channels such as amplitude damping, phase damping, squeesed generalised amplitude damping, Pauli channels and various collective noise models on the protocols of quantum key distribution.</p><p> </p>
The development of rural infrastructure is an important component in improving the standard of living in developing countries. In India, the government has taken up numerous measures to contribute toward the development of rural infrastructure, thereby initiating the Bharat Nirman Yojana (BNY). In this research study, the Malmquist model of input‐oriented DEA has been conducted to determine the efficiency of six schemes of the BNY for the time period of 2013–2015. The input variables selected were; designated investment and total amount released by the central government against the output variable of number of villages covered or achieved. The analysis of the data observed that only the telecommunication scheme has constant efficiency of 1.000 for all the years. On the other hand, the least efficiency from the Constant Return to Scale model was found for Accelerated Irrigation Benefit Programme (AIBP) (0.014 for 2013; 0.026 for 2014 and 0.007 for 2015). Again, the Variable Return to Scale model indicated technical efficiency for the electrification scheme and telecommunication for all the years. Further, in terms of technical efficiency, all the schemes had decreasing change where Pradhan Mantri Gram Sadak Yojana (PMGSY) showed the highest change with 99.98% and the telecommunication scheme reflected the least change. Furthermore, the productivity index was found to be highest for Telecommunications (1.443) followed by AIBP (1.312), and the lowest productivity index was found for Rajiv Gandhi Gramin Vidyutikaran Yojana (RGGVY) (0.353). Thus, it was interpreted that among all the schemes, telecommunications scheme was the most efficient.
With a more Internet-savvy and sophisticated user base, there are more demands for interactive applications and services. However, it is a challenge for existing radio access networks (e.g. 3G and 4G) to cope with the increasingly demanding requirements such as higher data rates and wider coverage area. One potential solution is the inter-collaborative deployment of multiple radio devices in a 5G setting designed to meet exacting user demands, and facilitate the high data rate requirements in the underlying networks. These heterogeneous 5G networks can readily resolve the data rate and coverage challenges. Networks established using the hybridization of existing networks have diverse military and civilian applications. However, there are inherent limitations in such networks such as irregular breakdown, node failures, and halts during speed transmissions. In recent years, there have been attempts to integrate heterogeneous 5G networks with existing ad hoc networks to provide a robust solution for delay-tolerant transmissions in the form of packet switched networks. However, continuous connectivity is still required in these networks, in order to efficiently regulate the flow to allow the formation of a robust network. Therefore, in this paper, we present a novel network formation consisting of nodes from different network maneuvered by Unmanned Aircraft (UA). The proposed model utilizes the features of a biological aspect of genomes and forms a delay tolerant network with existing network models. This allows us to provide continuous and robust connectivity. We then demonstrate that the proposed network model has an efficient data delivery, lower overheads and lesser delays with high convergence rate in comparison to existing approaches, based on evaluations in both real-time testbed and simulation environment.
This paper examines principle-based corporate governance (CG) and the economic performance of the Fijian economy. A comprehensive study for three public cooperations, namely the National Bank of Fiji (NBF), Fiji Sugar Cooperation (FSC), and Fiji National Provident Fund (FNPF), is undertaken. The economic assessment of the Fijian economy exists from the period 2017 to 2021, and immense discussion related to the GDP growth rate and export markets has been conducted. The research paper adopts a case study method, and reference has been made to company reports and existing literature to conclude on the compliance of CG virtues. The findings reveal that FNPF, NBF, and FSC experienced corporate collapse due to deficiencies, deception, and improper CG practice. The failure of NBF was a major blow on the Fijian economy, while large losses from FSC imposed risk on the stakeholders of the sugar industry. FNPF had also managed to overcome the write-off of 2010 with the help of good CG, but the wrong decisions by the relevant authorities had created fear among the retirement savers. The selected cooperations reveal important lessons for other Fijian companies. Although the research does not determine the CG index or compare the practice of CG between public and private firms, the achieved results point out the need to make companies follow the principles of CG and train personnel to instil ethical behaviours, transparency, and accountability
The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of embedded Internet of Things (IoT) devices makes it tedious to identify vulnerability and difficult to control the service-interruptions and manage the operations losses. Rule-based mechanisms have been considered as a solution in the past. However, rule-based solutions operate on the goodwill of the generated rules and perform assumption-based detection. Such a solution often is far from the actual realization of the IoT runtime performance and can be fooled by zero-day attacks. Thus, this paper takes this issue as motivation and proposes better lightweight behavior rule specification-based misbehavior detection for the IoT-embedded cyber-physical systems (BRIoT). The key concept of our approach is to model a system with which misbehavior of an IoT device manifested as a result of attacks exploiting the vulnerability exposed may be detected through automatic model checking and formal verification, regardless of whether the attack is known or unknown. Automatic model checking and formal verification are achieved through a 2-layer Fuzzy-based hierarchical context-aware aspect-oriented Petri net (HCAPN) model, while effective misbehavior detection to avoid false alarms is achieved through a Barycentric-coordinated-based center of mass calculation method. The proposed approach is verified by an unmanned aerial vehicle (UAV) embedded in a UAV system. The feasibility of the proposed model is demonstrated with high reliability, low operational cost, low false-positives, low false-negatives, and high true positives in comparison with existing rule-based solutions. ; Institute for Information & Communications Technology Promotion (IITP) - Korean Government (MSIT) [2017-0-00664]; U.S. AFOSRUnited States Department of DefenseAir Force Office of Scientific Research (AFOSR) [FA2386-17-1-4076] ; This work was supported in part by the Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korean Government (MSIT) (Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems) under Grant 2017-0-00664, and in part by the U.S. AFOSR under Grant FA2386-17-1-4076.