946 resultados para asymmetric cryptography
Resumo:
This paper describes the use of bifunctional thiourea catalysts in the intramolecular reaction of a nitronate with conjugated ketones to generate the corresponding γ-nitroketones. In contrast to our previous studies in this area, we obtained the cis-functionalized systems as the major diastereoisomers in good yields and reasonable selectivities.
Resumo:
The issue of imperfect information plays a much more important role in financing “informationally opaque” small businesses than in financing large companies.1 This chapter examines the asymmetric information issue in entrepreneurial finance from two perspectives: the effects of relationship lending and the impacts of credit market concentration on entrepreneurial financial behavior. These two perspectives are strongly linked to each other via the asymmetric information issue in entrepreneurial finance. Existing literature has recognized the important role played by relationship lending in alleviating the problem of asymmetric information. However, mixed empirical results have been reported. For example, it has been found that the development of relationship lending can improve the availability of finance for small businesses borrowers (Petersen and Rajan, 1994) and reduce the costs of finance (Berger and Udell, 1995). Meanwhile, with monopoly power, banks may extract rents, in terms of charging higher-than-market interest rates, from small businesscustomers who have very concentrated banking relationships (Ongena and Smith, 2001). In addition, both favorable and unfavorable effects of credit market concentration on financing small businesses have been acknowledged. Small business borrowers may have to pay a higher-than-market price on loans (Degryse and Ongena, 2005) and are more likely to be financially constrained (Cetorelli, 2004) than in competitive markets. On the other hand, empirical studies have shown that market concentration create a strong motive for lenders to invest in private information from small business customers, and therefore a concentrated market is more efficient in terms of private information acquisition (Han et al., 2009b). The objective of this chapter is to investigate, by reviewing existing literature, the role played by relationship lending and the effects of market concentration on financing entrepreneurial businesses that are supposed to be informationally opaque. In the first section we review literature on the important role played by asymmetric information in entrepreneurial finance from two perspectives: asymmetric information and relationship lending, and the theoretical modeling of asymmetric information. Then we examine the relationship between capital market conditions and entrepreneurial finance and attempt to answer two questions: Why is the capital market condition important for entrepreneurial finance? and What are the effects of capital market conditions on entrepreneurial financial behavior in terms of discouraged borrowers, cash holding, and the availability and costs of finance?
Resumo:
A series of ruthenium(II) complexes [{RuCl(CO)(PMe3)3(–CHvCH–)}nX], 1a–1c (1a: n = 3, X = 3,3’’- dimethyl-2,2’:3’,2’’-terthiophene; 1b: n = 2, X = 2,2’-bithiophene; 1c: n = 2, X = 2,3-bis(3-methylthiophen- 2-yl)benzothiophene) and [{Cp*(dppe)2Ru(–CuC–)}3X], 1d (X = 3,3’’-dimethyl-2,2’:3’,2’’- terthiophene), were prepared and characterized by 1H, 13C and 31P NMR. Their redox, spectroscopic and bonding properties were studied with a range of spectro-electrochemical methods in combination with density functional theory calculations. The first two anodic steps observed for 1a and 1d are largely localized on the lateral frameworks of the molecular triangle, the direct conjugation between them being precluded due to the photostable open form of the dithienyl ethene moiety. The third anodic step is then mainly localized on the centerpiece of the triangular structure, affecting both bithiophene laterals. The experimental IR and UV-vis-NIR spectroelectrochemical data and, largely, also DFT calculations account for this explanation, being further supported by direct comparison with the anodic behavior of reference diruthenium complexes 1b and 1c.
Resumo:
We analyze by numerical simulations and mean-field approximations an asymmetric version of the stochastic sandpile model with height restriction in one dimension. Each site can have at most two particles. Single particles are inactive and do not move. Two particles occupying the same site are active and may hop to neighboring sites following an asymmetric rule. Jumps to the right or to the left occur with distinct probabilities. In the active state, there will be a net current of particles to the right or to the left. We have found that the critical behavior related to the transition from the active to the absorbing state is distinct from the symmetrical case, making the asymmetry a relevant field.
Resumo:
We consider the dynamics of cargo driven by a collection of interacting molecular motors in the context of ail asymmetric simple exclusion process (ASEP). The model is formulated to account for (i) excluded-volume interactions, (ii) the observed asymmetry of the stochastic movement of individual motors and (iii) interactions between motors and cargo. Items (i) and (ii) form the basis of ASEP models and have already been considered to study the behavior of motor density profile [A. Parmeggiani. T. Franosch, E. Frey, Phase Coexistence in driven one-dimensional transport, Phys. Rev. Lett. 90 (2003) 086601-1-086601-4]. Item (iii) is new. It is introduced here as an attempt to describe explicitly the dependence of cargo movement on the dynamics of motors in this context. The steady-state Solutions Of the model indicate that the system undergoes a phase transition of condensation type as the motor density varies. We study the consequences of this transition to the behavior of the average cargo velocity. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
Consider the following problem: Forgiven graphs G and F(1),..., F(k), find a coloring of the edges of G with k colors such that G does not contain F; in color i. Rodl and Rucinski studied this problem for the random graph G,,, in the symmetric case when k is fixed and F(1) = ... = F(k) = F. They proved that such a coloring exists asymptotically almost surely (a.a.s.) provided that p <= bn(-beta) for some constants b = b(F,k) and beta = beta(F). This result is essentially best possible because for p >= Bn(-beta), where B = B(F, k) is a large constant, such an edge-coloring does not exist. Kohayakawa and Kreuter conjectured a threshold function n(-beta(F1,..., Fk)) for arbitrary F(1), ..., F(k). In this article we address the case when F(1),..., F(k) are cliques of different sizes and propose an algorithm that a.a.s. finds a valid k-edge-coloring of G(n,p) with p <= bn(-beta) for some constant b = b(F(1),..., F(k)), where beta = beta(F(1),..., F(k)) as conjectured. With a few exceptions, this algorithm also works in the general symmetric case. We also show that there exists a constant B = B(F,,..., Fk) such that for p >= Bn(-beta) the random graph G(n,p) a.a.s. does not have a valid k-edge-coloring provided the so-called KLR-conjecture holds. (C) 2008 Wiley Periodicals, Inc. Random Struct. Alg., 34, 419-453, 2009
Resumo:
Increased diastereoisomeric excesses are obtained for the sulfanylation reactions of some 2-methylsulfinyl cyclanones under phase-transfer catalysis using the chiral catalyst QUIBEC instead of TEBA. The optically pure (SS,2S)-2-methylsulfinyl-2-methylsulfanylcyclohexanone thus prepared reacts with ethyl acetate lithium enolate affording, after hydrolysis, (R)-2-[(ethoxycarbonyl)methyl]-2-hydroxycyclohexanone in 60% ee. Density functional theory calculations (at the B3LYP/6-311++G(d,p) level) can successfully explain the origin of this result as the kinetically favored axial attack of the nucleophile to the carbonyl group of the most stable conformer of the cyclanone, in which the CH(3)SO and CH(3)S groups are at the equatorial and axial positions, respectively. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
Detection of weak forces with an accuracy beyond the standard quantum limit holds promise both for fundamental research and for technological applications. Schemes involving ultracold atoms for such measurements are now considered to be prime candidates for increased sensitivity. In this paper we use a combination of analytical and numerical techniques to investigate the possible subshot-noise estimation of applied force fields through detection of coherence dynamics of Bose-condensed atoms in asymmetric double-well traps. Following a semiclassical description of the system dynamics and fringe visibility, we present numerical simulations of the full quantum dynamics that demonstrate the dynamical production of phase squeezing beyond the standard quantum limit. Nonlinear interactions are found to limit the achievable amount to a finite value determined by the external weak force.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
Our main goal in this paper was to measure how e¢ cient is risk sharing between countries. In order to do so, we have used a international risk sharIn this paper we re-analyze the question of the U.S. public debt sustainability by using a quantile autoregression model. This modeling allows for testing whether the behavior of U.S. public debt is asymmetric or not. Our results provide evidence of a band of sustainability. Outside this band, the U.S. public debt is unsustainable. We also nd scal policy to be adequate in the sense that occasional episodes in which the public debt moves out of the band do not pose a threat to long run sustainability.
Resumo:
Asymmetric kernels are quite useful for the estimation of density functions with bounded support. Gamma kernels are designed to handle density functions whose supports are bounded from one end only, whereas beta kernels are particularly convenient for the estimation of density functions with compact support. These asymmetric kernels are nonnegative and free of boundary bias. Moreover, their shape varies according to the location of the data point, thus also changing the amount of smoothing. This paper applies the central limit theorem for degenerate U-statistics to compute the limiting distribution of a class of asymmetric kernel functionals.
Resumo:
In this paper we re-analyze the question of the U.S. public debt sustainability by using a quantile autoregression model. This modeling allows for testing whether the behavior of U.S. public debt is asymmetric or not. Our results provide evidence of a band of sustainability. Outside this band, the U.S. public debt is unsustainable. We also find fiscal policy to be adequate in the sense that occasional episodes in which the public debt moves out of the band do not pose a threat to long run sustainability.
Resumo:
Radner (1968) proved the existence of a competitive equilibrium for differential information economies with finitely many states. We extend this result to economies with infinitely many states of nature.