Search results for "Cryptography"

showing 10 items of 657 documents

Introduction to the Pontryagin Maximum Principle for Quantum Optimal Control

2021

Optimal Control Theory is a powerful mathematical tool, which has known a rapid development since the 1950s, mainly for engineering applications. More recently, it has become a widely used method to improve process performance in quantum technologies by means of highly efficient control of quantum dynamics. This tutorial aims at providing an introduction to key concepts of optimal control theory which is accessible to physicists and engineers working in quantum control or in related fields. The different mathematical results are introduced intuitively, before being rigorously stated. This tutorial describes modern aspects of optimal control theory, with a particular focus on the Pontryagin …

Mathematical optimizationQuantum PhysicsComputer scienceProcess (engineering)Quantum dynamicsGeneral EngineeringFOS: Physical sciencesOptimal control01 natural sciences010305 fluids & plasmasQuantum technologyDevelopment (topology)[PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]0103 physical sciencesKey (cryptography)General Earth and Planetary Sciences[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]Quantum Physics (quant-ph)010306 general physicsControl (linguistics)QuantumGeneral Environmental Science
researchProduct

A two-slope achievement scalarizing function for interactive multiobjective optimization

2012

The use of achievement (scalarizing) functions in interactive multiobjective optimization methods is very popular, as indicated by the large number of algorithmic and applied scientific papers that use this approach. Key parameters in this approach are the reference point, which expresses desirable objective function values for the decision maker, and weights. The role of the weights can range from purely normalizing to fully preferential parameters that indicate the relative importance given by the decision maker to the achievement of each reference value. Technically, the influence of the weights in the solution generated by the achievement scalarizing function is different, depending on …

Mathematical optimizationRange (mathematics)General Computer ScienceComputer scienceModeling and Simulationta111Key (cryptography)Point (geometry)WeightFunction (mathematics)Management Science and Operations ResearchMulti-objective optimizationAlgorithmComputers & Operations Research
researchProduct

Apparel sizing using trimmed PAM and OWA operators

2012

This paper is concerned with apparel sizing system design. One of the most important issues in the apparel development process is to define a sizing system that provides a good fit to the majority of the population. A sizing system classifies a specific population into homogeneous subgroups based on some key body dimensions. Standard sizing systems range linearly from very small to very large. However, anthropometric measures do not grow linearly with size, so they can not accommodate all body types. It is important to determine each class in the sizing system based on a real prototype that is as representative as possible of each class. In this paper we propose a methodology to develop an …

Mathematical optimizationeducation.field_of_studyAnthropometric dataTrimmed k-medoidsComputer scienceProcess (engineering)PopulationGeneral EngineeringClass (biology)SizingComputer Science ApplicationsRange (mathematics)Artificial IntelligenceKey (cryptography)Sizing systemsSystems designOWA operatorsCluster analysiseducationSimulation
researchProduct

Analysis of metal spinning processes by the ADINA code

1989

Abstract The ADINA code, version 84, has been employed for the analysis of sheet spinning processes. The main process parameters have been evaluated in different working conditions; namely for various geometries and constitutive laws of the material.

Metal spinningEngineeringbiologybusiness.industryMechanical EngineeringProcess (computing)Mechanical engineeringStructural engineeringbiology.organism_classificationComputer Science ApplicationsModeling and SimulationCode (cryptography)General Materials SciencebusinessAdinaSpinningCivil and Structural EngineeringComputers & Structures
researchProduct

A voice-activated key for the Apple Macintosh computer

1989

An interface circuit to connect a microphone to an Apple Macintosh computer is described. The Apple Macintosh mouse port is used as the input port, and the microphone activation simulates a mouse press.

MicrophoneComputer scienceInterface (computing)Experimental and Cognitive PsychologyPort (circuit theory)Voice command deviceComputerSystemsOrganization_MISCELLANEOUSComputer graphics (images)Key (cryptography)Psychology (miscellaneous)Apple macintoshGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)ComputingMilieux_MISCELLANEOUSGeneral PsychologyBehavior Research Methods, Instruments, & Computers
researchProduct

Healthy Lifestyle, Well-being, Physical Activity, Sport, and Scholastic/academic Performance: Interactions and Connections

2019

The physical activity and sport are key elements for a healthy lifestyle. However, a little-investigated element is the presence of a possible relationship between school or academic performance and the participation in physical activity and sport in groups of preadolescents and adolescents. In order to clarify the complex relationship between mind and body in preadolescence and adolescence, the present discussion investigates the causal and direct relationship between sport activity and performance; and describes how this relationship can be mediated by the sense of self-esteem and self-efficacy; and investigates the relationship between group sports practice and school or academic perform…

Mind–body relationship physical activity physical and psychological well-being school/academic performance sport students.05 social sciencesPhysical activityMind–body relationship physical and psychological well-beingSettore M-PSI/08 - PSICOLOGIA CLINICAphysical and psychological well-beingMind–body relationship030227 psychiatryDevelopmental psychology03 medical and health sciencesPhilosophy0302 clinical medicineSettore M-PSI/07 - Psicologia Dinamica0502 economics and businessWell-beingKey (cryptography)Psychologyhuman activities050203 business & managementWorld Futures
researchProduct

An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs

2010

Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.

Mobile radiobusiness.industryForward secrecyComputer scienceNode (networking)Mobile computingCryptographyMobile telephonybusinessResilience (network)Chinese remainder theoremComputer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles

2017

International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…

Model checkingComputer scienceDistributed computingAutomotive industryContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)computer.programming_languageMQTTbusiness.industryVolume (computing)020206 networking & telecommunications020207 software engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationPromela[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessMessage queuecomputerComputer network
researchProduct

Multiscale simulations of protein landscapes: Using coarse-grained models as reference potentials to full explicit models

2010

Evaluating the free-energy landscape of proteins and the corresponding functional aspects presents a major challenge for computer simulation approaches. This challenge is due to the complexity of the landscape and the enormous computer time needed for converging simulations. The use of simplified coarse-grained (CG) folding models offers an effective way of sampling the landscape but such a treatment, however, may not give the correct description of the effect of the actual protein residues. A general way around this problem that has been put forward in our early work (Fan et al., Theor Chem Acc 1999;103:77-80) uses the CG model as a reference potential for free-energy calculations of diffe…

Models MolecularProtein FoldingWork (thermodynamics)Protein ConformationChemistryMolecular Sequence DataStatic ElectricityProteinsSampling (statistics)Hydrogen BondingFolding (DSP implementation)Ph changesBiochemistryArticleStructure function correlationStructural BiologyKey (cryptography)Computer SimulationProtein foldingAmino Acid SequenceMolecular BiologyAlgorithmMathematicsSimulationEnergy (signal processing)Proteins: Structure, Function, and Bioinformatics
researchProduct