958 resultados para Binary Asteroids


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., ρ ¯= 1 n ⋅ 2 −n ∑ n c=1 ∑ α∈Vn ρ c,α , satisfies ρ ¯⩾ 1 2 , and the equality holds ⇔ ρc,α satisfies ρc,α = 1/2 for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Precise control of composition and internal structure is essential for a variety of novel technological applications which require highly tailored binary quantum dots (QDs) with predictable optoelectronic and mechanical properties. The delicate balancing act between incoming flux and substrate temperature required for the growth of compositionally graded (Si1-xC x; x varies throughout the internal structure), core-multishell (discrete shells of Si and C or combinations thereof) and selected composition (x set) QDs on low-temperature plasma/ion-flux-exposed Si(100) surfaces is investigated via a hybrid numerical simulation. Incident Si and C ions lead to localized substrate heating and a reduction in surface diffusion activation energy. It is shown that by incorporating ions in the influx, a steady-state composition is reached more quickly (for selected composition QDs) and the composition gradient of a Si1-xCx QD may be fine tuned; additionally (with other deposition conditions remaining the same), larger QDs are obtained on average. It is suggested that ionizing a portion of the influx is another way to control the average size of the QDs, and ultimately, their internal structure. Advantages that can be gained by utilizing plasma/ion-related controls to facilitate the growth of highly tailored, compositionally controlled quantum dots are discussed as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2n ∑c=1...n ∑α∈V n ρc,α , denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρc,α satisfies ρc,α= ½ for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Optimisation of Organic Rankine Cycles (ORCs) for binary cycle applications could play a major role in determining the competitiveness of low to moderate renewable sources. An important aspect of the optimisation is to maximise the turbine output power for a given resource. This requires careful attention to the turbine design notably through numerical simulations. Challenges in the numerical modelling of radial-inflow turbines using high-density working fluids still need to be addressed in order to improve the turbine design and better optimise ORCs. This paper presents preliminary 3D numerical simulations of a radial-inflow turbine working with high-density fluids in realistic geothermal ORCs. Following extensive investigation of the operating conditions and thermodynamic cycle analysis, the refrigerant R143a is chosen as the high-density working fluid. The 1D design of the candidate radial-inflow turbine is presented in details. Furthermore, commercially-available software Ansys-CFX is used to perform the 3D CFD simulations for a number of operating conditions including off-design conditions. The real-gas properties are obtained using the Peng-Robinson equations of state. The preliminary design created using dedicated radial-inflow turbine software Concepts-Rital is discussed and the 3D CFD results are presented and compared against the meanline analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The usual postmodern suspicions about diligently deciphering authorial intent or stridently seeking fixed meaning/s and/or binary distinctions in an artistic work aside, this self-indulgent essay pushes the boundaries regarding normative academic research, for it focusses on my own (minimally celebrated) published creative writing’s status as a literary innovation. Dedicated to illuminating some of the less common denominators at play in Australian horror, my paper recalls the creative writing process involved when I set upon the (arrogant?) goal of creating a new genre of creative writing: that of the ‘Aboriginal Fantastic’. I compare my work to the literary output of a small but significant group (2.5% of the population), of which I am a member: Aboriginal Australians. I narrow my focus even further by examining that creative writing known as Aboriginal horror. And I reduce the sample size of my study to an exceptionally small number by restricting my view to one type of Aboriginal horror literature only: the Aboriginal vampire novel, a genre to which I have contributed professionally with the 2011 paperback and 2012 e-book publication of That Blackfella Bloodsucka Dance! However, as this paper hopefully demonstrates, and despite what may be interpreted by some cynical commentators as the faux sincerity of my taxonomic fervour, Aboriginal horror is a genre noteworthy for its instability and worthy of further academic interrogation. (first paragraph)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction This research is the first to investigate the experiences of teacher-librarians as evidence-based practice. An empirically derived model is presented in this paper. Method This qualitative study utilised the expanded critical incident approach, and investigated the real-life experiences of fifteen Australian teacher-librarians, through semi-structured interviews and inductive data analysis. Data collection utilised semi-structured interviews, on-site observations, journaling and the rubric for contextual information. These approaches allowed each of the interviewees to tell their own story and provided richness to the data. Analysis The analysis involved two types of data categorisation: binary and thematic. Binary classification was used to identify factual details. Thematic analysis involved categorising the emerging themes. Results An empirically derived model for evidence-based practice was devised and associated critical findings identified. The results demonstrate that evidence-based practice for teacher-librarians is a holistic practice. It is not a linear, step-by-step process. Conclusions This study is significant for teacher-librarians and library and information professionals as it provides new understanding of evidence-based practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Optimisation of organic Rankine cycles(ORCs for binary cycle applications could play a major role in determining the competitiveness of low to moderate renewable sources. An important aspect of the optimisation is to maximise the turbine output power for a given resource. This requires careful attention to the turbine design notably through numerical simulations. Challenges in the numerical modelling of radial-inflow turbines using high-density working fluids still need to be addressed in order to improve the turbine design and better optimise ORCs. Thispaper presents preliminary 3D numerical simulations of a high-density radial-inflow ORC turbine in sensible geothermal conditions. Following extensive investigation of the operating conditions and thermodynamic cycle analysis, therefrigerant R143a is chosen as the high-density working fluid. The 1D design of the candidate radial-inflow turbine is presented in details. Furthermore, commercially-available software Ansys-CFX is used to perform preliminary steady-state 3D CFD simulations of the candidate R143a radial-inflow turbine for a number of operating conditions including off-design conditions. The real-gas properties are obtained using the Peng–Robinson equations of state.The thermodynamic ORC cycle is presented. The preliminary design created using dedicated radial-inflow turbine software Concepts-Rital is discussed and the 3D CFD results are presented and compared against the meanline analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Environmental monitoring has become increasingly important due to the significant impact of human activities and climate change on biodiversity. Environmental sound sources such as rain and insect vocalizations are a rich and underexploited source of information in environmental audio recordings. This paper is concerned with the classification of rain within acoustic sensor re-cordings. We present the novel application of a set of features for classifying environmental acoustics: acoustic entropy, the acoustic complexity index, spectral cover, and background noise. In order to improve the performance of the rain classification system we automatically classify segments of environmental recordings into the classes of heavy rain or non-rain. A decision tree classifier is experientially compared with other classifiers. The experimental results show that our system is effective in classifying segments of environmental audio recordings with an accuracy of 93% for the binary classification of heavy rain/non-rain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Determination of sequence similarity is a central issue in computational biology, a problem addressed primarily through BLAST, an alignment based heuristic which has underpinned much of the analysis and annotation of the genomic era. Despite their success, alignment-based approaches scale poorly with increasing data set size, and are not robust under structural sequence rearrangements. Successive waves of innovation in sequencing technologies – so-called Next Generation Sequencing (NGS) approaches – have led to an explosion in data availability, challenging existing methods and motivating novel approaches to sequence representation and similarity scoring, including adaptation of existing methods from other domains such as information retrieval. In this work, we investigate locality-sensitive hashing of sequences through binary document signatures, applying the method to a bacterial protein classification task. Here, the goal is to predict the gene family to which a given query protein belongs. Experiments carried out on a pair of small but biologically realistic datasets (the full protein repertoires of families of Chlamydia and Staphylococcus aureus genomes respectively) show that a measure of similarity obtained by locality sensitive hashing gives highly accurate results while offering a number of avenues which will lead to substantial performance improvements over BLAST..

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Diatomite, a porous non-metal mineral, was used as support to prepare TiO2/diatomite composites by a modified sol–gel method. The as-prepared composites were calcined at temperatures ranging from 450 to 950 _C. The characterization tests included X-ray powder diffraction (XRD), scanning electron microscopy (SEM) with an energy-dispersive X-ray spectrometer (EDS), high-resolution transmission electron microscopy (HRTEM), X-ray photoelectron spectroscopy (XPS), and nitrogen adsorption/desorption measurements. The XRD analysis indicated that the binary mixtures of anatase and rutile exist in the composites. The morphology analysis confirmed the TiO2 particles were uniformly immobilized on the surface of diatom with a strong interfacial anchoring strength, which leads to few drain of photocatalytic components during practical applications. In further XPS studies of hybrid catalyst, we found the evidence of the presence of Ti–O–Si bond and increased percentage of surface hydroxyl. In addition, the adsorption capacity and photocatalytic activity of synthesized TiO2/diatomite composites were evaluated by studying the degradation kinetics of aqueous Rhodamine B under UV-light irradiation. The photocatalytic degradation was found to follow pseudo-first order kinetics according to the Langmuir–Hinshelwood model. The preferable removal efficiency was observed in composites by 750 _C calcination, which is attributed to a relatively appropriate anatase/rutile mixing ratio of 90/10.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Description of a patient's injuries is recorded in narrative text form by hospital emergency departments. For statistical reporting, this text data needs to be mapped to pre-defined codes. Existing research in this field uses the Naïve Bayes probabilistic method to build classifiers for mapping. In this paper, we focus on providing guidance on the selection of a classification method. We build a number of classifiers belonging to different classification families such as decision tree, probabilistic, neural networks, and instance-based, ensemble-based and kernel-based linear classifiers. An extensive pre-processing is carried out to ensure the quality of data and, in hence, the quality classification outcome. The records with a null entry in injury description are removed. The misspelling correction process is carried out by finding and replacing the misspelt word with a soundlike word. Meaningful phrases have been identified and kept, instead of removing the part of phrase as a stop word. The abbreviations appearing in many forms of entry are manually identified and only one form of abbreviations is used. Clustering is utilised to discriminate between non-frequent and frequent terms. This process reduced the number of text features dramatically from about 28,000 to 5000. The medical narrative text injury dataset, under consideration, is composed of many short documents. The data can be characterized as high-dimensional and sparse, i.e., few features are irrelevant but features are correlated with one another. Therefore, Matrix factorization techniques such as Singular Value Decomposition (SVD) and Non Negative Matrix Factorization (NNMF) have been used to map the processed feature space to a lower-dimensional feature space. Classifiers with these reduced feature space have been built. In experiments, a set of tests are conducted to reflect which classification method is best for the medical text classification. The Non Negative Matrix Factorization with Support Vector Machine method can achieve 93% precision which is higher than all the tested traditional classifiers. We also found that TF/IDF weighting which works well for long text classification is inferior to binary weighting in short document classification. Another finding is that the Top-n terms should be removed in consultation with medical experts, as it affects the classification performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accounts of the governance of prostitution have typically argued that prostitutes are, in one way or another, stigmatised social outcasts. There is a persistent claim that power has operated to dislocate or banish the prostitute from the community in order to silence, isolate, hide, restrict, or punish. I argue that another position may be tenable; that is, power has operated to locate prostitution within the social. Power does not operate to 'desocialise' prostitution, but has in recent times operated increasingly to normalise it. Power does not demarcate prostitutes from the social according to some binary mechanics of difference, but works instead according to a principle of differentiation which seeks to connect, include, circulate and enable specific prostitute populations within the social. In this paper I examine how prostitution has been singled out for public attention as a sociopolitical problem and governed accordingly. The concept of governmentality is used to think through such issues, providing, as it does, a non-totalising and non-reductionist account of rule. It is argued that a combination of self-regulatory and punitive practices developed during modernity to manage socially problematic prostitute populations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modelling of food processing is complex because it involves sophisticated material and transport phenomena. Most of the agricultural products such fruits and vegetables are hygroscopic porous media containing free water, bound water, gas and solid matrix. Considering all phase in modelling is still not developed. In this article, a comprehensive porous media model for drying has been developed considering bound water, free water separately, as well as water vapour and air. Free water transport was considered as diffusion, pressure driven and evaporation. Bound water assumed to be converted to free water due to concentration difference and also can diffuse. Binary diffusion between water vapour and air was considered. Since, the model is fundamental physics based it can be applied to any drying applications and other food processing where heat and mass transfer takes place in porous media with significant evaporation and other phase change.