982 resultados para tyre-shape quantum ring (TSQR)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years face recognition systems have been applied in various useful applications, such as surveillance, access control, criminal investigations, law enforcement, and others. However face biometric systems can be highly vulnerable to spoofing attacks where an impostor tries to bypass the face recognition system using a photo or video sequence. In this paper a novel liveness detection method, based on the 3D structure of the face, is proposed. Processing the 3D curvature of the acquired data, the proposed approach allows a biometric system to distinguish a real face from a photo, increasing the overall performance of the system and reducing its vulnerability. In order to test the real capability of the methodology a 3D face database has been collected simulating spoofing attacks, therefore using photographs instead of real faces. The experimental results show the effectiveness of the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A one-time program is a hypothetical device by which a user may evaluate a circuit on exactly one input of his choice, before the device self-destructs. One-time programs cannot be achieved by software alone, as any software can be copied and re-run. However, it is known that every circuit can be compiled into a one-time program using a very basic hypothetical hardware device called a one-time memory. At first glance it may seem that quantum information, which cannot be copied, might also allow for one-time programs. But it is not hard to see that this intuition is false: one-time programs for classical or quantum circuits based solely on quantum information do not exist, even with computational assumptions. This observation raises the question, "what assumptions are required to achieve one-time programs for quantum circuits?" Our main result is that any quantum circuit can be compiled into a one-time program assuming only the same basic one-time memory devices used for classical circuits. Moreover, these quantum one-time programs achieve statistical universal composability (UC-security) against any malicious user. Our construction employs methods for computation on authenticated quantum data, and we present a new quantum authentication scheme called the trap scheme for this purpose. As a corollary, we establish UC-security of a recent protocol for delegated quantum computation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Credence goods markets suffer from inefficiencies caused by superior information of sellers about the surplus-maximizing quality. While standard theory predicts that equal mark-up prices solve the credence goods problem if customers can verify the quality received, experimental evidence indicates the opposite. We identify a lack of robustness of institutional design with respect to heterogeneity in distributional preferences as a possible cause and design new experiments that allow for parsimonious identification of sellers’ distributional types. Our results indicate that less than a fourth of the subjects behave according to standard theory’s assumption, the rest behaving either in line with non-standard selfish or in accordance with non-trivial other-regarding preferences. We discuss consequences of our findings for institutional design and agent selection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Active Appearance Models (AAMs) employ a paradigm of inverting a synthesis model of how an object can vary in terms of shape and appearance. As a result, the ability of AAMs to register an unseen object image is intrinsically linked to two factors. First, how well the synthesis model can reconstruct the object image. Second, the degrees of freedom in the model. Fewer degrees of freedom yield a higher likelihood of good fitting performance. In this paper we look at how these seemingly contrasting factors can complement one another for the problem of AAM fitting of an ensemble of images stemming from a constrained set (e.g. an ensemble of face images of the same person).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The electrochemical and electrocatalytic behaviour of silver nanoprisms, nanospheres and nanocubes of comparable size in an alkaline medium have been investigated to ascertain the shape dependent behaviour of silver nanoparticles, which are an extensively studied nanomaterial. The nanomaterials were synthesised using chemical methods and characterised with UV-visible spectroscopy, transmission electron microscopy and X-ray diffraction. The nanomaterials were immobilised on a substrate glassy carbon electrode and characterised by cyclic voltammetry for their surface oxide electrochemistry. The electrocatalytic oxidation of hydrazine and formaldehyde and the reduction of hydrogen peroxide were studied by performing cyclic voltammetric and chronoamperometric experiments for both the nanomaterials and a smooth polycrystalline macrosized silver electrode. In all cases the nanomaterials showed enhanced electrocatalytic activity over the macro-silver electrode. Significantly, the silver nanoprisms that are rich in hcp lamellar defects showed greater activity than nanospheres and nanocubes for all reactions studied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We show for the first time that by controlling the growth kinetics of Morganella psychrotolerans, a silver-resistant psychrophilic bacterium, the shape anisotropy of silver nanoparticles can be achieved. This is particularly important considering that there has been no report that demonstrates a control over shape of Ag nanoparticles by controlling the growth kinetics of bacteria during biological synthesis. Additionally, we have for the first time performed electrochemistry experiments on bacterial cells after exposing them to Ag(+) ions, which provide significant new insights about mechanistic aspects of Ag reduction by bacteria. The possibility to achieve nanoparticle shape control by using a "green" biosynthesis approach is expected to open up new exciting avenues for eco-friendly, large-scale, and economically viable shape-controlled synthesis of nanomaterials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Changes in pupil size and shape are relevant for peripheral imagery by affecting aberrations and how much light enters and/or exits the eye. The purpose of this study is to model the pattern of pupil shape across the complete horizontal visual field and to show how the pattern is influenced by refractive error. Methods: Right eyes of thirty participants were dilated with 1% cyclopentolate and images were captured using a modified COAS-HD aberrometer alignment camera along the horizontal visual field to ±90°. A two lens relay system enabled fixation at targets mounted on the wall 3m from the eye. Participants placed their heads on a rotatable chin rest and eye rotations were kept to less than 30°. Best-fit elliptical dimensions of pupils were determined. Ratios of minimum to maximum axis diameters were plotted against visual field angle. Results: Participants’ data were well fitted by cosine functions, with maxima at (–)1° to (–)9° in the temporal visual field and widths 9% to 15% greater than predicted by the cosine of the field angle . Mean functions were 0.99cos[( + 5.3)/1.121], R2 0.99 for the whole group and 0.99cos[( + 6.2)/1.126], R2 0.99 for the 13 emmetropes. The function peak became less temporal, and the width became smaller, with increase in myopia. Conclusion: Off-axis pupil shape changes are well described by a cosine function which is both decentered by a few degrees and flatter by about 12% than the cosine of the viewing angle, with minor influences of refraction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultraviolet photodissociation of gas-phase N-methylpyridinium ions is studied at room temperature using laser photodissociation mass spectrometry and structurally diagnostic ion-molecule reaction kinetics. The C5H5N-CH3+ (m/z 94), C5H5N-CD3+ (m/z 97), and C5D5N-CH3+(m/z 99) isotopologues are investigated, and it is shown that the N-methylpyridinium ion photodissociates by the loss of methane in the 36 000 - 43 000 cm(-1) (280 - 230 nm) region. The dissociation likely occurs on the ground state surface following internal conversion from the SI state. For each isotopologue, by monitoring the photofragmentation yield as a function of photon wavenumber, a broad vibronically featured band is recorded with origin (0-0) transitions assigned at 38 130, 38 140 and 38 320 cm(-1) for C5H5N-CH3+ C5H5N-CD3+ and C5D5N-CH3+, respectively. With the aid of quantum chemical calculations (CASSCF(6,6)/aug-cc-pVDZ), most of the observed vibronic detail is assigned to two in-plane ring deformation modes. Finally, using ion-molecule reactions, the methane coproduct at m/z 78 is confirmed as a 2-pyridinylium ion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we modeled a quantum dot at near proximity to a gap plasmon waveguide to study the quantum dot-plasmon interactions. Assuming that the waveguide is single mode, this paper is concerned about the dependence of spontaneous emission rate of the quantum dot on waveguide dimensions such as width and height. We compare coupling efficiency of a gap waveguide with symmetric configuration and asymmetric configuration illustrating that symmetric waveguide has a better coupling efficiency to the quantum dot. We also demonstrate that optimally placed quantum dot near a symmetric waveguide with 50 nm x 50 nm cross section can capture 80% of the spontaneous emission into a guided plasmon mode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A known limitation of the Probability Ranking Principle (PRP) is that it does not cater for dependence between documents. Recently, the Quantum Probability Ranking Principle (QPRP) has been proposed, which implicitly captures dependencies between documents through “quantum interference”. This paper explores whether this new ranking principle leads to improved performance for subtopic retrieval, where novelty and diversity is required. In a thorough empirical investigation, models based on the PRP, as well as other recently proposed ranking strategies for subtopic retrieval (i.e. Maximal Marginal Relevance (MMR) and Portfolio Theory(PT)), are compared against the QPRP. On the given task, it is shown that the QPRP outperforms these other ranking strategies. And unlike MMR and PT, one of the main advantages of the QPRP is that no parameter estimation/tuning is required; making the QPRP both simple and effective. This research demonstrates that the application of quantum theory to problems within information retrieval can lead to significant improvements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we introduce a formalization of Logical Imaging applied to IR in terms of Quantum Theory through the use of an analogy between states of a quantum system and terms in text documents. Our formalization relies upon the Schrodinger Picture, creating an analogy between the dynamics of a physical system and the kinematics of probabilities generated by Logical Imaging. By using Quantum Theory, it is possible to model more precisely contextual information in a seamless and principled fashion within the Logical Imaging process. While further work is needed to empirically validate this, the foundations for doing so are provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social tagging systems are shown to evidence a well known cognitive heuristic, the guppy effect, which arises from the combination of different concepts. We present some empirical evidence of this effect, drawn from a popular social tagging Web service. The guppy effect is then described using a quantum inspired formalism that has been already successfully applied to model conjunction fallacy and probability judgement errors. Key to the formalism is the concept of interference, which is able to capture and quantify the strength of the guppy effect.