929 resultados para Classical Tradition
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
The participatory turn, fuelled by discourses and rhetoric regarding social media, and in the aftermath of the dot.com crash of the early 2000s, enrols to some extent an idea of being able to deploy networks to achieve institutional aims. The arts and cultural sector in the UK, in the face of funding cuts, has been keen to engage with such ideas in order to demonstrate value for money; by improving the efficiency of their operations, improving their respective audience experience and ultimately increasing audience size and engagement. Drawing on a case study compiled via a collaborative research project with a UK-based symphony orchestra (UKSO) we interrogate the potentials of social media engagement for audience development work through participatory media and networked publics. We argue that the literature related to mobile phones and applications (‘apps’) has focused primarily on marketing for engagement where institutional contexts are concerned. In contrast, our analysis elucidates the broader potentials and limitations of social-media-enabled apps for audience development and engagement beyond a marketing paradigm. In the case of UKSO, it appears that the technologically deterministic discourses often associated with institutional enrolment of participatory media and networked publics may not necessarily apply due to classical music culture. More generally, this work raises the contradictory nature of networked publics and argues for increased critical engagement with the concept.
Resumo:
Classical ballet requires dancers to exercise significant muscle control and strength both while stationary and when moving. Following the Royal Academy of Dance (RAD) syllabus, 8 male and 27 female dancers (aged 20.2 + 1.9 yr) in a fulltime university undergraduate dance training program were asked to stand in first position for 10 seconds and then perform 10 repeats of a demi-plié exercise to a counted rhythm. Accelerometer records from the wrist, sacrum, knee and ankle were compared with the numerical scores from a professional dance instructor. The sacrum mounted sensor detected lateral tilts of the torso in dances with lower scores (Spearman’s rank correlation coefficient r = -0.64, p < 0.005). The RMS acceleration amplitude of wrist mounted sensor was linearly correlated to the movement scores (Spearman’s rank correlation coefficient r = 0.63, p < 0.005). The application of sacrum and wrist mounted sensors for biofeedback during dance training is a realistic, low cost option.
Resumo:
This paper considers the key findings of a year-long collaborative research project focusing on the audience of the London Symphony Orchestra and their introduction of a new mobile telephone (‘app’) ticketing system. A mixed-method approach was employed, utilizing focus groups and questionnaires with over 80 participants, to research a sample group of university students. This research develops our understanding of classical music audiences, and highlights the continued individualistic, middle-class, and exclusionary culture of classical music attendance and patterns of behaviours. The research also suggests that a mobile phone app does prove a useful mechanism for selling discounted tickets, but shows little indication of being a useful means of expanding this audience beyond its traditional demographic.
Resumo:
The question of the authority of law has occupied and vexed the literature and philosophy of law for centuries. Law is something that characteristically implies obedience, but the precise nature of law’s authority remains contentious. The return to the writings of the Apostle Paul in contemporary philosophy, theology and jurisprudence begs attention in relation to the authority of law, and so this article will consider his analysis and critique of law with a focus on his Epistle to the Romans. It argues that Paul’s conception of the authority of law is explained on the basis that the law is from God, it externally sanctions obedience by virtue of the civil authorities, and it convicts internally in conscience. This triad is justified by the law of love (‘‘love your neighbor as yourself’’), and will be explained in relation to the natural law tradition as well as converse ideas in positivism. Hence, considering the reasoning of Paul in relation to traditional jurisprudential themes and the law of love provides a useful alternative analysis and basis for further investigation regarding the authority of law and the need for its obedience.
Resumo:
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.
Resumo:
Introduction: The receptor for advanced glycation end products (RAGE) is a member of the immunoglobulin superfamily of cell surface receptor molecules. High concentrations of three of its putative proinflammatory ligands, S100A8/A9 complex (calprotectin), S100A8, and S100A12, are found in rheumatoid arthritis (RA) serum and synovial fluid. In contrast, soluble RAGE (sRAGE) may prevent proinflammatory effects by acting as a decoy. This study evaluated the serum levels of S100A9, S100A8, S100A12 and sRAGE in RA patients, to determine their relationship to inflammation and joint and vascular damage. Methods: Serum sRAGE, S100A9, S100A8 and S100A12 levels from 138 patients with established RA and 44 healthy controls were measured by ELISA and compared by unpaired t test. In RA patients, associations with disease activity and severity variables were analyzed by simple and multiple linear regressions. Results: Serum S100A9, S100A8 and S100A12 levels were correlated in RA patients. S100A9 levels were associated with body mass index (BMI), and with serum levels of S100A8 and S100A12. S100A8 levels were associated with serum levels of S100A9, presence of anti-citrullinated peptide antibodies (ACPA), and rheumatoid factor (RF). S100A12 levels were associated with presence of ACPA, history of diabetes, and serum S100A9 levels. sRAGE levels were negatively associated with serum levels of C-reactive protein (CRP) and high-density lipoprotein (HDL), history of vasculitis, and the presence of the RAGE 82Ser polymorphism. Conclusions: sRAGE and S100 proteins were associated not just with RA inflammation and autoantibody production, but also with classical vascular risk factors for end-organ damage. Consistent with its role as a RAGE decoy molecule, sRAGE had the opposite effects to S100 proteins in that S100 proteins were associated with autoantibodies and vascular risk, whereas sRAGE was associated with protection against joint and vascular damage. These data suggest that RAGE activity influences co-development of joint and vascular disease in rheumatoid arthritis patients.
Resumo:
This paper presents a novel algebraic formulation of the central problem of screw theory, namely the determination of the principal screws of a given system. Using the algebra of dual numbers, it shows that the principal screws can be determined via the solution of a generalised eigenproblem of two real, symmetric matrices. This approach allows the study of the principal screws of the general two-, three-systems associated with a manipulator of arbitrary geometry in terms of closed-form expressions of its architecture and configuration parameters. We also present novel methods for the determination of the principal screws for four-, five-systems which do not require the explicit computation of the reciprocal systems. Principal screws of the systems of different orders are identified from one uniform criterion, namely that the pitches of the principal screws are the extreme values of the pitch.The classical results of screw theory, namely the equations for the cylindroid and the pitch-hyperboloid associated with the two-and three-systems, respectively have been derived within the proposed framework. Algebraic conditions have been derived for some of the special screw systems. The formulation is also illustrated with several examples including two spatial manipulators of serial and parallel architecture, respectively.
Resumo:
Based on a Hamiltonian description we present a rigorous derivation of the transient state work fluctuation theorem and the Jarzynski equality for a classical harmonic oscillator linearly coupled to a harmonic heat bath, which is dragged by an external agent. Coupling with the bath makes the dynamics dissipative. Since we do not assume anything about the spectral nature of the harmonic bath the derivation is not restricted only to the Ohmic bath, rather it is more general, for a non-Ohmic bath. We also derive expressions of the average work done and the variance of the work done in terms of the two-time correlation function of the fluctuations of the position of the harmonic oscillator. In the case of an Ohmic bath, we use these relations to evaluate the average work done and the variance of the work done analytically and verify the transient state work fluctuation theorem quantitatively. Actually these relations have far-reaching consequences. They can be used to numerically evaluate the average work done and the variance of the work done in the case of a non-Ohmic bath when analytical evaluation is not possible.
Resumo:
We consider models for the rheology of dense, slowly deforming granular materials based of classical and Cosserat plasticity, and their viscoplastic extensions that account for small but finite particle inertia. We determine the scale for the viscosity by expanding the stress in a dimensionless parameter that is a measure of the particle inertia. We write the constitutive relations for classical and Cosserat plasticity in stress-explicit form. The viscoplastic extensions are made by adding a rate-dependent viscous stress to the plasticity stress. We apply the models to plane Couette flow, and show that the classical plasticity and viscoplasticity models have features that depart from experimental observations; the prediction of the Cosserat viscoplasticity model is qualitatively similar to that of Cosserat plasticity, but the viscosities modulate the thickness of the shear layer.
Resumo:
1H NMR spin-lattice relaxation time (T1) studies have been carried out in the temperature range 100 K to 4 K, at two Larmor frequencies 11.4 and 23.3 MHz, in the mixed system of betaine phosphate and glycine phosphite (BPxGPI(1-x)), to study the effects of disorder on the proton group dynamics. Analysis of T1 data indicates the presence of a number of inequivalent methyl groups and a gradual transition from classical reorientations to quantum tunneling rotations. At lower temperatures, microstructural disorder in the local environments of the methyl groups, result in a distribution in the activation energy (Ea) and the torsional energy gap (E01). For certain values of x, the magnetisation recovery shows biexponential behaviour at lower temperatures.
Resumo:
It is generally known that the orbital diamagnetism of a classical system of charged particles in thermal equilibrium is identically zero —the Bohr-van Leeuwen theorem. Physically, this null result derives from the exact cancellation of the orbital diamagnetic moment associated with the complete cyclotron orbits of the charged particles by the paramagnetic moment subtended by the incomplete orbits skipping the boundary in the opposite sense. Motivated by this crucial but subtle role of the boundary, we have simulated here the case of a finite but unbounded system, namely that of a charged particle moving on the surface of a sphere in the presence of an externally applied uniform magnetic field. Following a real space-time approach based on the classical Langevin equation, we have computed the orbital magnetic moment that now indeed turns out to be non-zero and has the diamagnetic sign. To the best of our knowledge, this is the first report of the possibility of finite classical diamagnetism in principle, and it is due to the avoided cancellation.
Quantum Metaphysics : The Role of Human Beings within the Paradigms of Classical and Quantum Physics
Resumo:
By the end of the 18th century the daughters of the nobility in the northern parts of Europe received a quite different kind of education from their brothers. Although the cultural aims of the upbringing of girls were similar to that of boys, the practice of the raising of girls was less influenced by tradition. The education of boys was one of classical humanistic and military training, but the girls were more freely educated. The unity and exclusiveness of the culture of nobility were of great importance to the continued influence of this elite. The importance of education became even greater, partly because of the unstable political situation, and partly because of the changes the Enlightenment had caused in the perception of the human essence. The delicate and ambitious hônnete homme was expected to constantly strive to a greater perfection as a Christian. On the other hand, the great weight given to aesthetics - etiquette and taste - made individual variation of the contents of education possible. Education consisted mainly in aesthetic studies; girls studied music, dancing, fine arts, epistolary skills and also the art of polite conversation. On the other hand, there was a demand for enlightenment, and one often finds personal political and social ambitions, which made competition in all skills necessary for the daughters as well. Literary sources for the education of girls are Madame LePrince de Beaumont, Madame d'Epinay, Madame de Genlis and Charles Rollin. Other, perhaps even more important sources are the letters between parents and children and papers originating from studies. Diaries and memoirs also tell us about the practice of education in day to day life. The approach of this study is semiotic. It can be stated that the code of the culture was well hidden from the outsider. This was achieved, for instance, by the adaptation of the foreign French language and culture. The core of the culture consisted of texts which only thorough examples stated the norms which were expressed as good taste. Another important feature of the culture was its tendency towards theatricalisation. The way of life was dictated by taste, and moral values were included in the aesthetic norms through the constant striving for modesty. Pleasant manners were also correct in an ethical perspective. Morality could thus also be taught through etiquette.