980 resultados para Quantum Cryptography


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Molecular orbital calculations were carried out on a set of 28 non-imidazole H(3) antihistamine compounds using the Hartree-Fock method in order to investigate the possible relationships between electronic structural properties and binding affinity for H3 receptors (pK(i)). It was observed that the frontier effective-for-reaction molecular orbital (FERMO) energies were better correlated with pK(i) values than highest occupied molecular orbital (HOMO) and lowest unoccupied molecular orbital (LUMO) energy values. Exploratory data analysis through hierarchical cluster (HCA) and principal component analysis (PCA) showed a separation of the compounds in two sets, one grouping the molecules with high pK(i) values, the other gathering low pK(i) value compounds. This separation was obtained with the use of the following descriptors: FERMO energies (epsilon(FERMO)), charges derived from the electrostatic potential on the nitrogen atom (N(1)), electronic density indexes for FERMO on the N(1) atom (Sigma((FERMO))c(i)(2)). and electrophilicity (omega`). These electronic descriptors were used to construct a quantitative structure-activity relationship (QSAR) model through the partial least-squares (PLS) method with three principal components. This model generated Q(2) = 0.88 and R(2) = 0.927 values obtained from a training set and external validation of 23 and 5 molecules, respectively. After the analysis of the PLS regression equation and the values for the selected electronic descriptors, it is suggested that high values of FERMO energies and of Sigma((FERMO))c(i)(2), together with low values of electrophilicity and pronounced negative charges on N(1) appear as desirable properties for the conception of new molecules which might have high binding affinity. 2010 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The chemical mechanism of the (1)PN formation was successfully studied by using the CCSD(T)/6-311++G(3df,3pd) level of theory. The (1)NH(3) + (3)PH and (4)P + NH(3) reaction paths are not energetically favorable to form the (1)PN molecule. However, the (3)NH + (3)PH, (4)N + (3)PH(3), (4)N + (3)PH, (4)P + (3)NH, and (4)P + (2)NH(2) reaction paths to form the (1)PN molecule are only energetically favorable by taking place through specific transition states to form the (1)PN molecule. The NH(3) + (3)PH, (4)N + (1)PH(3), NH(3) + (4)P, and (4)N + (2)PH(2) reactions are spin-forbidden and the probability of hopping for these reactions was estimated to be 0 by the Landau-Zener theory. This is the first detailed study on the chemical mechanism for the (1)PN formation. (C) 2009 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have obtained numerically exact results for the spin-related geometric quantum phases that arise in p-type semiconductor ring structures. The interplay between gate-controllable (Rashba) spin splitting and quantum-confinement-induced mixing between hole-spin states causes a much higher sensitivity of magnetoconductance oscillations to external parameters than previously expected. Our results imply a much-enhanced functionality of hole-ring spin-interference devices and shed new light on recent experimental findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electromagnetically induced transparency (EIT) is an important tool for controlling light propagation and nonlinear wave mixing in atomic gases with potential applications ranging from quantum computing to table top tests of general relativity. Here we consider EIT in an atomic Bose-Einstein condensate (BEC) trapped in a double-well potential. A weak probe laser propagates through one of the wells and interacts with atoms in a three-level Lambda configuration. The well through which the probe propagates is dressed by a strong control laser with Rabi frequency Omega(mu), as in standard EIT systems. Tunneling between the wells at the frequency g provides a coherent coupling between identical electronic states in the two wells, which leads to the formation of interwell dressed states. The macroscopic interwell coherence of the BEC wave function results in the formation of two ultranarrow absorption resonances for the probe field that are inside of the ordinary EIT transparency window. We show that these new resonances can be interpreted in terms of the interwell dressed states and the formation of a type of dark state involving the control laser and the interwell tunneling. To either side of these ultranarrow resonances there is normal dispersion with very large slope controlled by g. We discuss prospects for observing these ultranarrow resonances and the corresponding regions of high dispersion experimentally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We generalize the standard linear-response (Kubo) theory to obtain the conductivity of a system that is subject to a quantum measurement of the current. Our approach can be used to specifically elucidate how back-action inherent to quantum measurements affects electronic transport. To illustrate the utility of our general formalism, we calculate the frequency-dependent conductivity of graphene and discuss the effect of measurement-induced decoherence on its value in the dc limit. We are able to resolve an ambiguity related to the parametric dependence of the minimal conductivity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Este trabalho tem por objetivo avaliar em que medida a taxa de câmbio real é um condicionante importante para a evolução do quantum exportado brasileiro. Para tanto, é testada a existência de alguma relação entre variações na taxa de câmbio real e variações no quantum exportado, a saber, relação de causalidade no sentido de Granger em qualquer direção e correlação simultânea dos choques que afetam tais séries, conforme o método sugerido por Gourieroux e Jasiak (2001). Não foi possível obter evidência forte de relação entre a taxa de câmbio real e o quantum exportado em termos agregados para o período analisado (1977 a 2009). Entretanto, para várias desagregações e destinos foi possível detectar a existência de pelo menos uma destas relações entre a taxa de câmbio real e quantum exportado. Em particular, para o caso dos bens básicos, não há evidência de relação robusta entre as variáveis pesquisadas. O mesmo vale para bens intermediários. Já para os bens finais – bens de capital, de consumo de bens duráveis e não duráveis – a evidência de relação entre a taxa de câmbio e o quantum é mais forte. Como conclusão, o trabalho sugere que a taxa de câmbio, embora não tenha efeitos significativos em termos agregados, pode gerar importantes efeitos sobre a composição das exportações.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Who was the cowboy in Washington? What is the land of sushi? Most people would have answers to these questions readily available,yet, modern search engines, arguably the epitome of technology in finding answers to most questions, are completely unable to do so. It seems that people capture few information items to rapidly converge to a seemingly 'obvious' solution. We will study approaches for this problem, with two additional hard demands that constrain the space of possible theories: the sought model must be both psychologically and neuroscienti cally plausible. Building on top of the mathematical model of memory called Sparse Distributed Memory, we will see how some well-known methods in cryptography can point toward a promising, comprehensive, solution that preserves four crucial properties of human psychology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)