196 resultados para Quantum Channel


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis studied cadmium sulfide and cadmium selenide quantum dots and their performance as light absorbers in quantum dot-sensitised solar cells. This research has made contributions to the understanding of size dependent photodegradation, passivation and particle growth mechanism of cadmium sulfide quantum dots using SILAR method and the role of ZnSe shell coatings on solar cell performance improvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents a novel idea for an adaptive prioritized cross-layer design (APCLD) control algorithm to achieve comprehensive channel congestion control for vehicular safety communication based on DSRC technology. An appropriate evaluation metric and two control parameters have been established. Simulation studies have evaluated the DSRC network performance in different traffic scenario and under different channel conditions. The APCLD algorithm is derived from the results of the simulation analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is not uncommon to hear a person of interest described by their height, build, and clothing (i.e. type and colour). These semantic descriptions are commonly used by people to describe others, as they are quick to relate and easy to understand. However such queries are not easily utilised within intelligent surveillance systems as they are difficult to transform into a representation that can be searched for automatically in large camera networks. In this paper we propose a novel approach that transforms such a semantic query into an avatar that is searchable within a video stream, and demonstrate state-of-the-art performance for locating a subject in video based on a description.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This study aims to gain a clearer understanding of digital channel design. The emergence of new technologies has revolutionised the way companies interact and engage with customers. The driver for this research was the suggestion that practitioners feel they do not possess the skills to understand and exploit new digital channel opportunities. To gain a clearer understanding of digital channel design, this paper addresses the research question: What digital channels do companies from a wide range of industries and sectors use? Design/methodology/approach A content analysis of 100 international companies was conducted with multiple data sources to form a typology of digital “touchpoints”. The appropriateness of a digital channel typology for this study was for developing rigorous and useful concepts for clarifying and refining the meaning of digital channels. Findings This study identifies what digital channels companies globally currently employ and explores the related needs across industries. A total of 34 digital touchpoints and 4 typologies of digital channels were identified across 16 industries. This research helps to identify the relationship between digital channels and enabling the connections with industry. Research limitations/implications The findings contribute to the growing research area of digital channels. The typology of digital channels is a useful starting point for developing a systematic, theory-based study for enabling the development of broader, comprehensive theories of digital channels. Practical implications Typologies and touchpoints are outlined in relation to industry, company objectives and customer needs to allow businesses to seize opportunities and optimise performance through individual touchpoints. A digital channel model as a key outcome of this research guides practitioners on what touchpoint to implement through an interrelated understanding of industry, company and customer needs. Originality/value This is the first paper to explore a range of industries in relation to their use of digital channels using a unique content analysis. Contributions include clarifying and refining digital channel meaning; identifying and refining the hierarchical relations among digital channels(typologies); and establishing typology and industry relationship model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What type of probability theory best describes the way humans make judgments under uncertainty and decisions under conflict? Although rational models of cognition have become prominent and have achieved much success, they adhere to the laws of classical probability theory despite the fact that human reasoning does not always conform to these laws. For this reason we have seen the recent emergence of models based on an alternative probabilistic framework drawn from quantum theory. These quantum models show promise in addressing cognitive phenomena that have proven recalcitrant to modeling by means of classical probability theory. This review compares and contrasts probabilistic models based on Bayesian or classical versus quantum principles, and highlights the advantages and disadvantages of each approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent research on hollow flange beams has led to the development of an innovative rectangular hollow flange channel beam (RHFCB) for use in floor systems. The new RHFCB is a mono-symmetric structural section made by intermittently rivet fastening two torsionally rigid closed rectangular hollow flanges to a web plate element, which allows section optimisation by selecting appropriate combinations of web and flange widths and thicknesses. However, the current design rules for cold-formed steel sections are not directly applicable to rivet fastened RHFCBs. To date, no investigation has been conducted on their web crippling behaviour and strengths. Hence an experimental study was conducted to investigate the web crippling behaviour and capacities of rivet fastened RHFCBs under End Two Flange (ETF) and Interior Two Flange (ITF) load cases. It showed that RHFCBs failed by web crippling, flange crushing and their combinations. Comparison of ultimate web crippling capacities with the predictions from the design equations in AS/NZS 4600 and AISI S100 showed that the current design equations are unconservative for rivet fastened RHFCB sections under ETF and ITF load cases. Hence new equations were proposed to determine the web crippling capacities of rivet fastened RHFCBs. These equations can also be used to predict the capacities of RHFCBs subject to combined web crippling and flange crushing conservatively. However, new capacity equations were proposed in the case of flange crushing failures that occurred in thinner flanges with smaller bearing lengths. This paper presents the details of this web crippling experimental study of RHFCB sections and the results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the details of experimental studies on the effect of real support conditions on the shear strength of hollow flange channel beams, known as LiteSteel beams (LSB). The LSB has a unique shape of a channel beam with two rectangular hollow flanges, made using a unique manufacturing process. In many applications in the building industry LSBs are used with only one web side plate (WSP) at their supports. The WSPs are also often not full height plates. Past research studies showed that these real support connections did not provide the required simply supported conditions. Many studies have been carried out to evaluate the behaviour and design of LSBs with simply supported conditions subject to pure bending and predominant shear actions. To date, however, no investigation has been conducted into the effect of real support conditions on the shear strength of LSBs. Hence a detailed experimental study based on 25 shear tests was undertaken to investigate the shear behaviour and strength of LSBs with real support conditions. Simply supported test specimens of LSBs with aspect ratios of 1.0 and 1.5 were loaded at mid-span until failure. It was found that the effect of using one WSP on the shear behaviour of LSB is significant and there is about 25% shear capacity reduction due to the lateral movement of the bottom flange at the supports. Shear capacity of LSB was also found to decrease when full height WSPs were not used. Suitably improved support connections were developed to improve the shear capacity of LSBs based on test results. Details of the recommended support connections and shear capacity results are given in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Light emitting field effect transistors (LEFETs) are emerging as a multi-functional class of optoelectronic devices. LEFETs can simultaneously execute light emission and the standard logic functions of a transistor in a single architecture. However, current LEFET architectures deliver either high brightness or high efficiency but not both concurrently, thus limiting their use in technological applications. Here we show an LEFET device strategy that simultaneously improves brightness and efficiency. The key step change in LEFET performance arises from the bottom gate top-contact device architecture in which the source/drain electrodes are semitransparent and the active channel contains a bi-layer comprising of a high mobility charge-transporting polymer, and a yellow-green emissive polymer. A record external quantum efficiency (EQE) of 2.1% at 1000cd/m2 is demonstrated for polymer based bilayer LEFETs.