29 results on '"BOUDA, JAN"'
Search Results
2. General measurements with limited resources and their application to quantum unambiguous state discrimination
- Author
-
Reitzner, Daniel and Bouda, Jan
- Subjects
Quantum Physics - Abstract
In this report, we present a framework for implementing an arbitrary $n$-outcome generalized quantum measurement (POVM) on an $m$-qubit register as a sequence of two-outcome measurements requiring only single ancillary qubit. Our procedure offers a particular construction for the two-outcome partial measurements which can be composed into a full implementation of the measurement on any gate architecture. This implementation in general requires classical feedback; we present specific cases when this is not the case. We apply this framework on the unambiguous state discrimination and analyze possible strategies. In the simplest case, it gives the same construction as is known, if we opt for performing conclusiveness measurement first. However, it also offers possibility of performing measurement for one of the state outcomes first, leaving conclusiveness measurement for later. This shows flexibility of presented framework and opens possibilities for further optimization. We present discussion also on biased qubit case as well as general case of unambiguous quantum state discrimination in higher dimension., Comment: 27 pages, 8 figures
- Published
- 2020
- Full Text
- View/download PDF
3. Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science
- Author
-
Bouda, Jan, Holík, Lukáš, Kofroň, Jan, Strejček, Jan, and Rambousek, Adam
- Subjects
Computer Science - Logic in Computer Science ,Computer Science - Data Structures and Algorithms ,Computer Science - Software Engineering - Abstract
MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions traditionally cover all areas of computer science (such as parallel and distributed computing, computer networks, modern hardware and its design, non-traditional computing architectures, information systems and databases, multimedia and graphics, verification and testing, computer security, as well as all related areas of theoretical computer science).
- Published
- 2016
- Full Text
- View/download PDF
4. Device-independent randomness extraction for arbitrarily weak min-entropy source
- Author
-
Bouda, Jan, Pawlowski, Marcin, Pivoluska, Matej, and Plesch, Martin
- Subjects
Quantum Physics - Abstract
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent setting. To do this we use Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the random sequence $n$. Our protocol is robust, it can tolerate devices that malfunction with a probability dropping polynomially in $n$ at the cost of a minor increase of the number of devices used., Comment: 5 pages + 3 pages supplementary material
- Published
- 2014
- Full Text
- View/download PDF
5. Weak randomness completely trounces the security of QKD
- Author
-
Bouda, Jan, Pivoluska, Matej, Plesch, Martin, and Wilmott, Colin
- Subjects
Quantum Physics - Abstract
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
- Published
- 2012
- Full Text
- View/download PDF
6. Non-malleable encryption of quantum information
- Author
-
Ambainis, Andris, Bouda, Jan, and Winter, Andreas
- Subjects
Quantum Physics - Abstract
We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design. Furthermore, while in prime power dimension there is a unitary 2-design with =< d^5 elements, we show that there are always approximate 2-designs with O(epsilon^{-2} d^4 log d) elements., Comment: 8 pages. Title changed in v2, a couple of mistakes corrected, the results are essentially unchanged; accepted for publication at J Math Phys
- Published
- 2008
- Full Text
- View/download PDF
7. Optimality of private quantum channels
- Author
-
Bouda, Jan and Ziman, Mario
- Subjects
Quantum Physics - Abstract
We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel $\cal E$ and von Neumann entropy of the ciphertext state $\varrho^{(0)}$. Based on these bounds we have shown that decomposition of private quantum channels into orthogonal unitaries (if exists) is optimizing the entropy. For non-ancillary single qubit PQC we have derived the optimal entropy for arbitrary set of plaintexts. In particular, we have shown that except when the (closure of the) set of plaintexts contains all states, one bit key is sufficient. We characterized and analyzed all the possible single qubit private quantum channels for arbitrary set of plaintexts. For the set of plaintexts consisting of all qubit states we have characterized all possible approximate private quantum channels and we have derived the relation between the security parameter and the corresponding minimal entropy., Comment: no comment
- Published
- 2007
- Full Text
- View/download PDF
8. Using quantum key distribution for cryptographic purposes: a survey
- Author
-
Alléaume, Romain, Branciard, Cyril, Bouda, Jan, Debuisschert, Thierry, Dianati, Mehrdad, Gisin, Nicolas, Godfrey, Mark, Grangier, Philippe, Langer, Thomas, Lutkenhaus, Norbert, Monyk, Christian, Painchault, Philippe, Peev, Momtchil, Poppe, Andreas, Pornin, Thomas, Rarity, John, Renner, Renato, Ribordy, Gregoire, Riguidel, Michel, Salvail, Louis, Shields, Andrew, Weinfurter, Harald, and Zeilinger, Anton
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security ,Computer Science - Information Theory - Abstract
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research., Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81
- Published
- 2007
9. Anonymous Transmission of Quantum Information
- Author
-
Bouda, Jan and Sprojcar, Josef
- Subjects
Quantum Physics - Abstract
We propose a protocol for anonymous distribution of quantum information which can be used in two modifications. In the first modification the receiver of the message is publicly known, but the sender remains unknown (even to receiver). In the second modification the sender is known, but the receiver is unknown (even to sender). Our protocol achieves this goal with unconditional security using classical anonymous message transfer proposed by Chaum as a subprotocol.
- Published
- 2005
10. Limits and restrictions of private quantum channel
- Author
-
Bouda, Jan and Ziman, Mario
- Subjects
Quantum Physics - Abstract
We study private quantum channels on a single qubit, which encrypt given set of plaintext states $P$. Specifically, we determine all achievable states $\rho^{(0)}$ (average output of encryption) and for each particular set $P$ we determine the entropy of the key necessary and sufficient to encrypt this set. It turns out that single bit of key is sufficient when the set $P$ is two dimensional. However, the necessary and sufficient entropy of the key in case of three dimensional $P$ varies continuously between 1 and 2 bits depending on the state $\rho^{(0)}$. Finally, we derive private quantum channels achieving these bounds. We show that the impossibility of universal NOT operation on qubit can be derived from the fact that one bit of key is not sufficient to encrypt qubit., Comment: 23 pages, submitted to QI&C
- Published
- 2005
11. Entanglement swapping between multi-qudit systems
- Author
-
Bouda, Jan and Buzek, Vladimir
- Subjects
Quantum Physics - Abstract
We generalize the entanglement swapping scheme originally proposed for two pairs of qubits to an arbitrary number $q$ of systems composed from an arbitrary number $m_j$ of qudits. Each of the system is supposed to be prepared in a maximally entangled state of $m_j$ qudits, while different systems are not correlated at all. We show that when a set $\sum_{j=1}^q a_j$ particles (from each of the $q$ systems $a_j$ particles are measured) are subjected to a generalized Bell-type measurement, the resulting set of $\sum_{j=1}^q (m_j-a_j)$ particles will collapse into a maximally entangled state., Comment: 7 revtex pages, 4 figures
- Published
- 2001
- Full Text
- View/download PDF
12. Purification and correlated measurements of bipartite mixed states
- Author
-
Bouda, Jan and Buzek, Vladimir
- Subjects
Quantum Physics - Abstract
We prove that all purifications of a non-factorable state (i.e., the state which cannot be expressed in a form $\rho_{AB}=\rho_A\otimes\rho_B$) are entangled. We also show that for any bipartite state there exists a pair of measurements which are correlated on this state if and only if the state is non-factorable., Comment: 4 revtex pages, to appear in Phys. Rev. A
- Published
- 2001
- Full Text
- View/download PDF
13. Improving the Hadamard extractor
- Author
-
Bouda, Jan, Pivoluska, Matej, and Plesch, Martin
- Published
- 2012
- Full Text
- View/download PDF
14. General Measurements with Limited Resources and Their Application to Quantum Unambiguous State Discrimination
- Author
-
Bouda, Jan and Reitzner, Daniel
- Subjects
Quantum Physics ,FOS: Physical sciences ,Quantum Physics (quant-ph) - Abstract
In this report we present a framework for implementing arbitrary $n$-outcome quantum measurement as a sequence of two-outcome measurements requiring only single ancillary qubit. Our procedure is the same as one presented in [Phys. Rev. A 77, 052104 (2008)] but in addition offers particular construction for a two-outcome partial measurements. We exemplify this framework on the unambiguous state discrimination. In the simplest case it gives the same construction as is known, if we opt for performing conclusiveness measurement first. However, it also offers possibility of performing measurement for one of the state outcomes, which shows flexibility of presented framework., Comment: 9 pages, 7 figures
- Published
- 2020
- Full Text
- View/download PDF
15. Using quantum key distribution for cryptographic purposes: A survey
- Author
-
Alléaume, Romain, Branciard, Cyril, Bouda, Jan, Debuisschert, Thierry, Dianati, Mehrdad, Gisin, Nicolas, Godfrey, Mark, Grangier, Philippe, Langer, Thomas, Lutkenhaus, Norbert, Monyk, Christian, Painchault, Philippe, Peev, Momtchil, Poppe, Andreas, Pornin, Thomas, Rarity, John, Renner, Renato, Ribordy, Gregoire, Riguidel, Michel, Salvail, Louis, Shields, Andrew, Weinfurter, Harald, Zeilinger, Anton, Lütkenhaus, N., Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), SeQureNet, Thales Research and Technology [Palaiseau], THALES, University of Surrey (UNIS), University of Bristol [Bristol], Laboratoire Charles Fabry / Optique Quantique, Laboratoire Charles Fabry (LCF), Université Paris-Sud - Paris 11 (UP11)-Centre National de la Recherche Scientifique (CNRS)-Institut d'Optique Graduate School (IOGS)-Université Paris-Sud - Paris 11 (UP11)-Centre National de la Recherche Scientifique (CNRS)-Institut d'Optique Graduate School (IOGS), Institute for Quantum Computing [Waterloo] (IQC), University of Waterloo [Waterloo], Thales Communications [Colombes], Cryptolog International (Cryptolog), Cryptolog International, Eidgenössische Technische Hochschule - Swiss Federal Institute of Technology [Zürich] (ETH Zürich), ID Quantique (IDQ), University of Montreal, Toshiba Research Europe Ltd, Ludwig-Maximilians-Universität München (LMU), and University of Vienna [Vienna]
- Subjects
FOS: Computer and information sciences ,Key establishment ,Computer Science - Cryptography and Security ,General Computer Science ,Computer science ,Computer Science - Information Theory ,FOS: Physical sciences ,Key distribution ,Context (language use) ,Cryptography ,Quantum key distribution ,Computer security ,computer.software_genre ,Theoretical Computer Science ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics] ,Quantum Physics ,Cryptographic primitive ,business.industry ,Information Theory (cs.IT) ,[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT] ,Quantum cryptography ,Security service ,Symmetric-key algorithm ,Quantum Physics (quant-ph) ,business ,Cryptography and Security (cs.CR) ,computer - Abstract
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research., Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81
- Published
- 2014
16. Device-independent Randomness Extraction for Arbitrarily Weak Min-entropy Source
- Author
-
Jan Bouda and Marcin Pawlowski and Matej Pivoluska and Martin Plesch, Bouda, Jan, Pawlowski, Marcin, Pivoluska, Matej, Plesch, Martin, Jan Bouda and Marcin Pawlowski and Matej Pivoluska and Martin Plesch, Bouda, Jan, Pawlowski, Marcin, Pivoluska, Matej, and Plesch, Martin
- Abstract
In this paper we design a protocol to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy block source in a device independent setting. The protocol employs Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the block n, containing entropy of at least two bits. Our protocol is robust, it can tolerate devices that malfunction with a probability dropping polynomially in n at the cost of constant increase of the number of devices used.
- Published
- 2014
- Full Text
- View/download PDF
17. Quantum key distribution and cryptography: a survey
- Author
-
Renner, Renato, Grangier, Philippe, Debuisschert, Thierry, Ribordy, Gregoire, Gisin, Nicolas, Painchault, Philippe, Pornin, Thomas, Slavail, Louis, Riguidel, Michel, Shilds, Andrew, Peev, Momtchil, Dianati, Mehrdad, Leverrier, Anthony, Poppe, Andreas, Bouda, Jan, Branciard, Cyril, Godfrey, Mark, Rarity, John, Weinfurter, Harald, Zeilinger, Anton, Monyk, Christian, Renner, Renato, Grangier, Philippe, Debuisschert, Thierry, Ribordy, Gregoire, Gisin, Nicolas, Painchault, Philippe, Pornin, Thomas, Slavail, Louis, Riguidel, Michel, Shilds, Andrew, Peev, Momtchil, Dianati, Mehrdad, Leverrier, Anthony, Poppe, Andreas, Bouda, Jan, Branciard, Cyril, Godfrey, Mark, Rarity, John, Weinfurter, Harald, Zeilinger, Anton, and Monyk, Christian
- Abstract
I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ? I will in particular cover the following topics - practical performances of QKD - QKD network deployment - SECOQC project - Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements - Quantum information and Side-channels - QKD security assurance - Thoughts about "real" Post-Quantum Cryptography
- Published
- 2010
- Full Text
- View/download PDF
18. Quantum key distribution and cryptography: a survey
- Author
-
Romain Alléaume and Norbert Lütkenhaus and Renato Renner and Philippe Grangier and Thierry Debuisschert and Gregoire Ribordy and Nicolas Gisin and Philippe Painchault and Thomas Pornin and Louis Slavail and Michel Riguidel and Andrew Shilds and Thomas Länger and Momtchil Peev and Mehrdad Dianati and Anthony Leverrier and Andreas Poppe and Jan Bouda and Cyril Branciard and Mark Godfrey and John Rarity and Harald Weinfurter and Anton Zeilinger and Christian Monyk, Alléaume, Romain, Lütkenhaus, Norbert, Renner, Renato, Grangier, Philippe, Debuisschert, Thierry, Ribordy, Gregoire, Gisin, Nicolas, Painchault, Philippe, Pornin, Thomas, Slavail, Louis, Riguidel, Michel, Shilds, Andrew, Länger, Thomas, Peev, Momtchil, Dianati, Mehrdad, Leverrier, Anthony, Poppe, Andreas, Bouda, Jan, Branciard, Cyril, Godfrey, Mark, Rarity, John, Weinfurter, Harald, Zeilinger, Anton, Monyk, Christian, Romain Alléaume and Norbert Lütkenhaus and Renato Renner and Philippe Grangier and Thierry Debuisschert and Gregoire Ribordy and Nicolas Gisin and Philippe Painchault and Thomas Pornin and Louis Slavail and Michel Riguidel and Andrew Shilds and Thomas Länger and Momtchil Peev and Mehrdad Dianati and Anthony Leverrier and Andreas Poppe and Jan Bouda and Cyril Branciard and Mark Godfrey and John Rarity and Harald Weinfurter and Anton Zeilinger and Christian Monyk, Alléaume, Romain, Lütkenhaus, Norbert, Renner, Renato, Grangier, Philippe, Debuisschert, Thierry, Ribordy, Gregoire, Gisin, Nicolas, Painchault, Philippe, Pornin, Thomas, Slavail, Louis, Riguidel, Michel, Shilds, Andrew, Länger, Thomas, Peev, Momtchil, Dianati, Mehrdad, Leverrier, Anthony, Poppe, Andreas, Bouda, Jan, Branciard, Cyril, Godfrey, Mark, Rarity, John, Weinfurter, Harald, Zeilinger, Anton, and Monyk, Christian
- Abstract
I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ? I will in particular cover the following topics - practical performances of QKD - QKD network deployment - SECOQC project - Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements - Quantum information and Side-channels - QKD security assurance - Thoughts about "real" Post-Quantum Cryptography
- Published
- 2010
- Full Text
- View/download PDF
19. SPECIAL CAI SECTION DEVOTED TO MEMICS '11: PREFACE.
- Author
-
Kotásek, Zdenĕk, Sekanina, Lukáš, Vojnar, Tomáš, Bouda, Jan, and Černá, Ivana
- Subjects
COMPUTER science ,ENGINEERING - Abstract
An introduction to the journal is presented in which the editor discusses reports within the issue on topics that are selected from the 7th International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science.
- Published
- 2012
20. Efecto de la administración de sales de calcio y precursores de glucosa sobre calcio sérico y cuerpos cetónicos en vacas lecheras posparto.
- Author
-
Salgado Hernández, Eligio Gabriel, Bouda, Jan, García, Jorge Ávila, and Navarro Hernández, Jaime Alonso
- Abstract
La hipocalcemia subclínica y la cetosis subclínica se presentan en la mayoría de las vacas lecheras en los primeros días posparto, esto último aumenta el riesgo de otras enfermedades y disminuye la producción láctea. El objetivo de este trabajo fue evaluar el efecto de la administración de sales de calcio y precursores de glucosa sobre la concentración sérica de calcio y de cuerpos cetónicos en leche de vacas lecheras multíparas posparto. Se utilizaron 16 vacas de la raza Holstein de dos a cuatro partos, con condición corporal entre 3.25 a 3.75 puntos, las cuales se distribuyeron aleatoriamente en tres grupos. De 1 a 2 h después del parto, las vacas del Grupo 1 (n = 5) recibieron 700 g de propionato de calcio disuelto en 10 L de agua mediante una sonda esofágica y una bomba manual. A las vacas del Grupo 2 (n = 6) se les administró, vía intravenosa, 500 mL de una solución de borogluconato de calcio a 23% y 500 mL de propilenglicol vía oral. Las vacas del Grupo 3 (testigo n = 5) no recibieron tratamiento. Se obtuvieron muestras de sangre de 1 a 2 h después del parto (antes del tratamiento) y luego se tomaron otras dos muestras a las 12 y 24 h, en las que se determinó la concentración sérica de calcio. A los tres, siete y 10 días posparto se determinó la concentración de β-hidroxibutirato en leche. Los resultados fueron analizados por medio de análisis de varianza multivariado para un diseño de mediciones repetidas. No se encontraron diferencias significativas en la concentración sérica de calcio entre los tratamientos (F2,13 =1.0488, P = 0.3782). En la producción de leche, a los 10 y 60 días posparto, se encontró diferencia significativa entre los tratamientos (F2,13 = 4.1338, P = 0.0408). Se encontró diferencia significativa entre la proporción de casos de cetosis entre los grupos 1 y 2 (Ji cuadrada = 5.238; P = 0.0455). La administración oral de 700 g de propionato de calcio 1 a 2 h posparto no aumenta la concentración sérica de calcio, reduce la frecuencia de cetosis subclínica y puede aumentar la producción de leche. [ABSTRACT FROM AUTHOR]
- Published
- 2009
21. Effect of postpartum administration of calcium salts and glucose precursors on serum calcium and ketone bodies in dairy cows.
- Author
-
Salgado Hernández, Eligio Gabriel, Bouda, Jan, García, Jorge Ávila, and Navarro Hernández, Jaime Alonso
- Subjects
- *
HYPOCALCEMIA , *ACETONEMIA , *COW diseases , *MILK yield , *CALCIUM salts , *GLUCOSE - Abstract
Subclinical hypocalcemia and ketosis are common diseases in mostly dairy cows in the first days postpartum, increasing the risk for other diseases and decreasing milk production. The objective of this study was to evaluate the effect of postpartum administration of calcium salts and glucose precursors on the concentration of serum calcium and ketone bodies in milk of multiparous dairy cows. Sixteen Holstein cows with two to four calvings and body condition from 3.25 to 3.75 points were utilized and randomized into three groups. Cows of the Group 1 (n = 5) received 700 g of calcium propionate diluted in 10 L of water by a esophageal pump system between 1 and 2 h after calving. Cows of the Group 2 (n = 6) were treated intravenously with 500 mL of calcium borogluconate solution (23%) and 500 mL of propylene glycol as an oral drench. The control Group (n = 5) did not receive any treatment. Blood samples were collected 1 to 2 h after calving (before treatment) and two more samples 12 and 24 h after calving for determination of calcium in serum. Levels of β-hydroxybutyrate were assessed in milk at days 3, 7 and 10 postpartum. The results were analyzed using the multivariate analysis of variance for repeated measures. There were no significant differences in serum concentration of calcium between treatments (F2,13 = 1.0488, P = 0.3782). A significant difference in milk production was found among treatments (F2,13 = 4.1338, P = 0.0408) at days 10 and 60 postpartum. The significant difference in the proportion of cases of subclinical ketosis was registered between groups 1 and 2 ( chi square = 5.238; P = 0.0455). Oral administration of 700 g of calcium propionate 1 to 2 h postpartum, does not increase serum calcium concentration, reduces frequency of subclinical ketosis and can increase milk production. [ABSTRACT FROM AUTHOR]
- Published
- 2009
22. Alterations of serum and urine analytes in diabetic dogs: 30 cases report.
- Author
-
Herrera, Samuel Genaro Jardón, Vargas, Rosa Luz Mondragón, Ortuño, Luis Enrique García, and Bouda, Jan
- Subjects
DIAGNOSIS of diabetes ,DOG diseases ,SERUM ,URINALYSIS - Abstract
The objective of this study was to describe alterations in blood clinical biochemistry and urinalysis which enable to establish the diagnosis of diabetes mellitus in dogs. Thirty cases of diabetic dogs were analyzed. The inclusion criteria were the following: hyperglycemia above 14 mmol/L, glucosuria, urine density above 1.014 and polyuria-polydipsia. Dogs of different breeds, from 7 months to 14 years of age and both genders (73.3% females and 26.7% males) were studied. The most frequent biochemical alterations in blood serum were: hyperglycemia (100%), increased urea (46%) and creatinine (13%), increase of enzyme activities ALT (50%), AST (46%), alkaline phosphatase (56%), amylase (20%), creatine kinase (66%); hypercholesterolemia (66%), hyperglobulinemia (33%), hyperphosphoremia (33%), hyperkaliemia (43%), hyponatremia (16%), hypochloremia (46%), hypobicarbonatemia (50%), increased anion gap (53%), increased strong ion difference (30%), increased serum osmolality (23%) and hypertriglyceridemia (50%). The urine density was between 1.015 and 1.064, mean value of urine glucose 49 mmol/L. Urine ketone bodies were detected in 10% of all cases. Described alterations in clinical biochemistry are important for the diagnosis, clinical care, and prognosis of dogs with diabetes mellitus. [ABSTRACT FROM AUTHOR]
- Published
- 2008
23. Alteraciones de analitos séricos y de orina en perros diabéticos: Informe de 30 casos.
- Author
-
Herrera, Samuel Genaro Jardón, Vargas, Rosa Luz Mondragón, Ortuño, Luis Enrique García, and Bouda, Jan
- Abstract
Copyright of Veterinaria México is the property of Facultad de Medicina Veterinaria y Zootecnia UNAM and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2008
24. Alterations in hemogram and selected biochemical analytes in diabetic dogs: retrospective study in 40 dogs.
- Author
-
Jardón Herrera, Samuel Genaro, Vargas, Rosa Luz Mondragón, and Bouda, Jan
- Subjects
DIABETES ,DOG diseases ,BLOOD cell count ,URINALYSIS ,HYPERGLYCEMIA ,GLYCOSURIA ,ANEMIA ,LEUCOCYTOSIS - Abstract
The objective of this study was to describe changes in hemogram and selected biochemical analytes in blood and urine of 40 dogs with diabetes mellitus. The inclusion criteria were the following: hyperglycemia above 14 mmol/L, glucosuria and urine specific gravity above 1.015. Dogs of different breeds, from 4 to 14 years of age and both genders (30 females and 10 males) were studied. The analyzed diagnostic procedures were: packed cell volume, hemoglobin, red blood cell count, white blood cell count and differential cell count, Wintrobe index: mean corpuscular volume and mean corpuscular hemoglobin concentration, plasma proteins, globulins, serum glucose, alkaline phosphatase (AP), glucosuria and specific gravity. Anemia was present in 47.5% of the cases, nonregenerative normocytic-normochromic anemia in 37.5%, nonregenerative normocytic-hyperchromic anemia in 5.0% and nonregenerative microcytic-normochromic anemia in 5.0%. Leukocytosis was present in 15.0% cases, leukopenia in 10.0%, neutrophilia in 47.5%, left shift in 30.0%, lymphocytosis in 5.0%, lymphopenia in 27.5%, monocytosis in 5.0%, eosinopenia in 42.50% and eosinophilia in 10.0%. Only 10.0% of all dogs did not presented hemogram abnormalities. Alterations such as anemia, secondary inflammation and stress, are frequent in this pathology; for which they should be considered for clinical care, prognosis and to evaluate diabetic dog's evolution. [ABSTRACT FROM AUTHOR]
- Published
- 2007
25. Alteraciones en el hemograma y analitos bioquímicos selectos en perros diabéticos: estudio retrospectivo en 40 perros.
- Author
-
Jardón Herrera, Samuel Genaro, Vargas, Rosa Luz Mondragón, and Bouda, Jan
- Abstract
Copyright of Veterinaria México is the property of Facultad de Medicina Veterinaria y Zootecnia UNAM and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2007
26. Clinical-pathological diagnosis of ethylene glycol poisoning: A case report.
- Author
-
García-Ortuño, Luis Enrique, Bouda, Jan, Jardón Herrera, Genaro, and Morales Salinas, Elizabeth
- Subjects
- *
PATHOLOGY , *ETHYLENE , *POISONING , *THERAPEUTICS , *ETHYLENE glycol - Abstract
The objective of this study was to present the most important clinical-pathological findings of ethylene glycol poisoning for early diagnosis and adequate treatment. A clinical case of a female dog which consumed a toxic amount of ethylene glycol and presented tachycardia, tachypnea, seizures and vomiting, is described blood samples were taken for determination of acid-base equilibrium, hemogram and serum chemistry. The laboratory changes were: partially compensated metabolic acidosis, increased anion gap, relative erythrocytosis, leukogram response to stress, renal hyperazotemia and monohydrate calcium oxalate crystals in urine sediment. Calcium oxalate crystals in renal tubules and brain observed by histopathology confirmed ethylene glycol poisoning. The adequate use of laboratory tests and the early diagnosis, as well as the early treatment, determine the prognosis of the animal. [ABSTRACT FROM AUTHOR]
- Published
- 2006
27. Diagnóstico clínico-patológico en intoxicación con etilenglicol: Informe de un caso.
- Author
-
García-Ortuño, Luis Enrique, Bouda, Jan, Jardón Herrera, Genaro, and Morales Salinas, Elizabeth
- Abstract
El objetivo del presente estudio fue dar a conocer los hallazgos clínico-patológicos más importantes de la intoxicación con etilenglicol, con el fin de diagnosticarla con prontitud y tomar decisiones terapéuticas adecuadas. Se tomó como referencia el caso clínico de una perra, la cual consumió una cantidad tóxica de etilenglicol y presentó taquicardia, taquipnea, convulsiones y vómito. Se tomaron muestras de sangre para evaluar equilibrio ácido-base, hemograma y bioquímica sanguínea. Los cambios fueron: acidosis metabólica parcialmente compensada, elevación importante de ácidos orgánicos, eritrocitosis relativa, leucograma de estrés, hiperazotemia renal y cristales de oxalato de calcio monohidratado en sedimento urinario. Mediante histopatología se observaron cristales de oxalato de calcio en túbulos renales y encéfalo, y se confirmó el diagnóstico de intoxicación con etilenglicol. El diagnóstico oportuno con el uso adecuado de las pruebas de laboratorio, así como la terapia inmediata, determina el pronóstico en el animal. [ABSTRACT FROM AUTHOR]
- Published
- 2006
28. Information Security in a Quantum World
- Author
-
Renato Renner, Kotásek, Zdeněk, Bouda, Jan, Černá, Ivana, Sekanina, Lukáš, Vojnar, Tomáš, and Antoš, David
- Subjects
Security analysis ,Theoretical computer science ,020206 networking & telecommunications ,02 engineering and technology ,Information security ,Computer security ,computer.software_genre ,01 natural sciences ,Information-theoretic security ,Quantum cryptography ,0103 physical sciences ,ComputingMilieux_COMPUTERSANDEDUCATION ,0202 electrical engineering, electronic engineering, information engineering ,Hybrid cryptosystem ,Cryptosystem ,Quantum information ,010306 general physics ,computer ,Quantum computer ,Mathematics - Abstract
Lecture Notes in Computer Science, 7119, ISSN:0302-9743, ISSN:1611-3349, Mathematical and Engineering Methods in Computer Science. 7th International Doctoral Workshop, MEMICS 2011, Lednice, Czech Republic, October 14–16, 2011, Revised Selected Papers, ISBN:978-3-642-25928-9, ISBN:978-3-642-25929-6
- Published
- 2012
29. Metabolitos sanguíneos en el periparto relacionados con enfermedades en el posparto, producción de leche y reactividad ovárica en vacas lecheras
- Author
-
Kawabata Gómez, Carlos Kiyoyi and Bouda, Jan
- Subjects
Efecto ,Metabolitos sanguíneos ,Cría de animales ,Posparto ,Manejo de animales ,Reproducción ,Enfermedades ,Animales domésticos ,Vacas lecheras ,Ciencias Biológicas, Químicas y de la Salud ,Análisis ,Veterinaria ,Producción de leche ,Periparto - Published
- 2009
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.