927 resultados para cryptographic pairing computation, elliptic curve cryptography
Resumo:
In Boolean games, agents try to reach a goal formulated as a Boolean formula. These games are attractive because of their compact representations. However, few methods are available to compute the solutions and they are either limited or do not take privacy or communication concerns into account. In this paper we propose the use of an algorithm related to reinforcement learning to address this problem. Our method is decentralized in the sense that agents try to achieve their goals without knowledge of the other agents’ goals. We prove that this is a sound method to compute a Pareto optimal pure Nash equilibrium for an interesting class of Boolean games. Experimental results are used to investigate the performance of the algorithm.
Resumo:
Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users. This paper reviews the current techniques for wireless key generation. The principles, performance metrics and key generation procedure are comprehensively surveyed. Methods for optimizing the performance of key generation are also discussed. Key generation applications in various environments are then introduced along with the challenges of applying the approach in each scenario. The paper concludes with some suggestions for future studies.
Resumo:
The goal of this contribution is to discuss local computation in credal networks — graphical models that can represent imprecise and indeterminate probability values. We analyze the inference problem in credal networks, discuss how inference algorithms can benefit from local computation, and suggest that local computation can be particularly important in approximate inference algorithms.
Resumo:
Key generation from wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys. It is the first paper to experimentally study the channel reciprocity principle of key generation, through investigating and quantifying channel measurements' cross-correlation relationship affected by noise and non-simultaneous measurements. Channel measurements, both received signal strength and channel state information, are collected from a real experimental platform using the wireless open access research platform (WARP) in a multipath office room. We found that in a slow fading channel (e.g., with a coherence time of about 50~ms), the channel cross-correlation is impacted greatly by noise but little by non-simultaneous measurements with a small sampling time difference (e.g., 0.06 ms). The resolution of the sampling time difference can be satisfied by wireless systems such as IEEE 802.11 to maintain an acceptable cross-correlation coefficient without affecting the bandwidth and communication efficiency.
Resumo:
This paper describes a novel RISC microprocessor that can be utilised to rapidly develop a reprogrammable and high performance embedded security-processing system in SoC designs. Generic and innovative algorithm-specific instructions have been developed for a wide range of private-key and hash algorithms. To the authors' knowledge, this is the first generic cryptographic microprocessor to be reported in the literature.
Resumo:
Esta dissertação estuda em detalhe três problemas elípticos: (I) uma classe de equações que envolve o operador Laplaciano, um termo singular e nãolinearidade com o exponente crítico de Sobolev, (II) uma classe de equações com singularidade dupla, o expoente crítico de Hardy-Sobolev e um termo côncavo e (III) uma classe de equações em forma divergente, que envolve um termo singular, um operador do tipo Leray-Lions, e uma função definida nos espaços de Lorentz. As não-linearidades consideradas nos problemas (I) e (II), apresentam dificuldades adicionais, tais como uma singularidade forte no ponto zero (de modo que um "blow-up" pode ocorrer) e a falta de compacidade, devido à presença do exponente crítico de Sobolev (problema (I)) e Hardy-Sobolev (problema (II)). Pela singularidade existente no problema (III), a definição padrão de solução fraca pode não fazer sentido, por isso, é introduzida uma noção especial de solução fraca em subconjuntos abertos do domínio. Métodos variacionais e técnicas da Teoria de Pontos Críticos são usados para provar a existência de soluções nos dois primeiros problemas. No problema (I), são usadas uma combinação adequada de técnicas de Nehari, o princípio variacional de Ekeland, métodos de minimax, um argumento de translação e estimativas integrais do nível de energia. Neste caso, demonstramos a existência de (pelo menos) quatro soluções não triviais onde pelo menos uma delas muda de sinal. No problema (II), usando o método de concentração de compacidade e o teorema de passagem de montanha, demostramos a existência de pelo menos duas soluções positivas e pelo menos um par de soluções com mudança de sinal. A abordagem do problema (III) combina um resultado de surjectividade para operadores monótonos, coercivos e radialmente contínuos com propriedades especiais do operador de tipo Leray- Lions. Demonstramos assim a existência de pelo menos, uma solução no espaço de Lorentz e obtemos uma estimativa para esta solução.
Resumo:
Thesis (Master's)--University of Washington, 2015
Resumo:
Thesis (Master's)--University of Washington, 2016-03
Resumo:
This paper proposes a method for the design of gear tooth profiles using parabolic curve as its line of action. A mathematical model, including the equation of the line of action, the equation of the tooth profile, and the equation of the conjugate tooth profile, is developed based on the meshing theory. The equation of undercutting condition is derived from the model. The influences of the two design parameters, that present the size (or shape) of the parabolic curve relative to the gear size, on the shape of tooth profiles and on the contact ratio are also studied through the design of an example drive. The strength, including the contact and the bending stresses, of the gear drive designed by using the proposed method is analyzed by an FEA simulation. A comparison of the above characteristics of the gear drive designed with the involute gear drive is also carried out in this work. The results confirm that the proposed design method is more flexible to control the shape of the tooth profile by changing the parameters of the parabola.
Resumo:
This paper presents an ultra compact waveguide bandpass filter that exhibits a pseudo-elliptic response. The transmission zero created in the upper stopband to form a rapid roll off is produced through a bypass coupling with higher order modes. A 3rd order filter is designed at the centre frequency of 9.4 GHz with a 5.3% fractional bandwidth. The proposed structure's size is 38% smaller than one of a 3rd order E-plane extracted pole filter with comparable response. Additionally, this configuration allows larger span of different bandwidths. The filter has been fabricated and tested using E-plane waveguide technology, which has benefits of being inexpensive and having mass producible capabilities. Measurements of such a fabricated filter validate the simulated results.
Resumo:
This paper presents a brief history of the western music: from its genesis to serialism and the Darmstadt school. Also some mathematical aspects of music are then presented and confronted with music as a form of art. The question is, are these two distinct aspects compatible? Can computers be of real help in automatic composition? The more appealing algorithmic approach is evolutionary computation as it offers creativity potential. Therefore, the Evolutionary Algorithms are then introduced and some results of GAs and GPs application to music generation are analysed.
Resumo:
Smart grids with an intensive penetration of distributed energy resources will play an important role in future power system scenarios. The intermittent nature of renewable energy sources brings new challenges, requiring an efficient management of those sources. Additional storage resources can be beneficially used to address this problem; the massive use of electric vehicles, particularly of vehicle-to-grid (usually referred as gridable vehicles or V2G), becomes a very relevant issue. This paper addresses the impact of Electric Vehicles (EVs) in system operation costs and in power demand curve for a distribution network with large penetration of Distributed Generation (DG) units. An efficient management methodology for EVs charging and discharging is proposed, considering a multi-objective optimization problem. The main goals of the proposed methodology are: to minimize the system operation costs and to minimize the difference between the minimum and maximum system demand (leveling the power demand curve). The proposed methodology perform the day-ahead scheduling of distributed energy resources in a distribution network with high penetration of DG and a large number of electric vehicles. It is used a 32-bus distribution network in the case study section considering different scenarios of EVs penetration to analyze their impact in the network and in the other energy resources management.
Resumo:
Recently simple limiting functions establishing upper and lower bounds on the Mittag-Leffler function were found. This paper follows those expressions to design an efficient algorithm for the approximate calculation of expressions usual in fractional-order control systems. The numerical experiments demonstrate the superior efficiency of the proposed method.
Resumo:
In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.
Resumo:
Recently simple limiting functions establishing upper and lower bounds on the Mittag-Leffler function were found. This paper follows those expressions to design an efficient algorithm for the approximate calculation of expressions usual in fractional-order control systems. The numerical experiments demonstrate the superior efficiency of the proposed method.