23 resultados para 2D barcode based authentication scheme


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eight phenolic acids and two abscisic acid isomers in Australian honeys from five botanical species (Melaleuca, Guioa, Lophostemon, Banksia and Helianthus) have been analyzed in relation to their botanical origins. Total phenolic acids present in these honeys range from 2.13 mg/100 g sunflower (Helianthus annuus) honey to 12.11 mg/100 g tea tree (Melaleuca quinquenervia) honey, with amounts of individual acids being various. Tea tree honey shows a phenolic profile of gallic, ellagic, chlorogenic and coumaric acids, which is similar to the phenolic profile of an Australian Eucalyptus honey (bloodwood or Eucalyptus intermedia honey). The main difference between tea tree and bloodwood honeys is the contribution of chlorogenic acid to their total phenolic profiles. In Australian crow ash (Guioa semiglauca) honey, a characteristic phenolic profile mainly consisting of gallic acid and abscisic acid could be used as the floral marker. In brush box (Lophostemon conferta) honey, the phenolic profile, comprising mainly gallic acid and ellagic acid, could be used to differentiate this honey not only from the other Australian non-Eucalyptus honeys but also from a Eucalyptus honey (yellow box or Eucalyptus melliodora honey). However, this Eucalyptus honey could not be differentiated from brush box honey based only on their flavonoid profiles. Similarly, the phenolic profile of heath (Banksia ericifolia) honey, comprising mainly gallic acid, an unknown phenolic acid (Phl) and coumaric acid, could also be used to differentiate this honey from tea tree and bloodwood honeys, which have similar flavonoid profiles. Coumaric acid is a principal phenolic acid in Australian sunflower honey and it could thus be used together with gallic acid for the authentication. These results show that the HPLC analysis of phenolic acids and abscisic acids in Australian floral honeys Could assist the differentiation and authentication of the honeys. © 2005 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The stable similarity reduction of a nonsymmetric square matrix to tridiagonal form has been a long-standing problem in numerical linear algebra. The biorthogonal Lanczos process is in principle a candidate method for this task, but in practice it is confined to sparse matrices and is restarted periodically because roundoff errors affect its three-term recurrence scheme and degrade the biorthogonality after a few steps. This adds to its vulnerability to serious breakdowns or near-breakdowns, the handling of which involves recovery strategies such as the look-ahead technique, which needs a careful implementation to produce a block-tridiagonal form with unpredictable block sizes. Other candidate methods, geared generally towards full matrices, rely on elementary similarity transformations that are prone to numerical instabilities. Such concomitant difficulties have hampered finding a satisfactory solution to the problem for either sparse or full matrices. This study focuses primarily on full matrices. After outlining earlier tridiagonalization algorithms from within a general framework, we present a new elimination technique combining orthogonal similarity transformations that are stable. We also discuss heuristics to circumvent breakdowns. Applications of this study include eigenvalue calculation and the approximation of matrix functions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We investigate the use of nanocrystal quantum dots as a quantum bus element for preparing various quantum resources for use in photonic quantum technologies. Using the Stark-tuning property of nanocrystal quantum dots as well as the biexciton transition, we demonstrate a photonic controlled-NOT (CNOT) interaction between two logical photonic qubits comprising two cavity field modes each. We find the CNOT interaction to be a robust generator of photonic Bell states, even with relatively large biexciton losses. These results are discussed in light of the current state of the art of both microcavity fabrication and recent advances in nanocrystal quantum dot technology. Overall, we find that such a scheme should be feasible in the near future with appropriate refinements to both nanocrystal fabrication technology and microcavity design. Such a gate could serve as an active element in photonic-based quantum technologies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we present an algorithm as the combination of a low level morphological operation and model based Global Circular Shortest Path scheme to explore the segmentation of the Right Ventricle. Traditional morphological operations were employed to obtain the region of interest, and adjust it to generate a mask. The image cropped by the mask is then partitioned into a few overlapping regions. Global Circular Shortest Path algorithm is then applied to extract the contour from each partition. The final step is to re-assemble the partitions to create the whole contour. The technique is deemed quite reliable and robust, as this is illustrated by a very good agreement between the extracted contour and the expert manual drawing output.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current ultra-wideband communication systems use short narrow timed pulse sequences to transmit information. Some disadvantages of UWB communication systems are its interference of other conventional wireless systems and its reliance on time hopping schemes for multiple access. This paper presents a novel UWB data modulation scheme based on pulse shaping. This modulation scheme adds more flexibility for data modulation in UWB communication systems. The modulation scheme encodes data in both the timing and frequency spectrum of the transmitted pulse. This has the potential to improve data throughput rates and to lower interference between UWB and narrowband systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we present a new scheme for off-line recognition of multi-font numerals using the Takagi-Sugeno (TS) model. In this scheme, the binary image of a character is partitioned into a fixed number of sub-images called boxes. The features consist of normalized vector distances (gamma) from each box. Each feature extracted from different fonts gives rise to a fuzzy set. However, when we have a small number of fonts as in the case of multi-font numerals, the choice of a proper fuzzification function is crucial. Hence, we have devised a new fuzzification function involving parameters, which take account of the variations in the fuzzy sets. The new fuzzification function is employed in the TS model for the recognition of multi-font numerals.