Search results for "Cryptography"
showing 10 items of 657 documents
Introduction to the Pontryagin Maximum Principle for Quantum Optimal Control
2021
Optimal Control Theory is a powerful mathematical tool, which has known a rapid development since the 1950s, mainly for engineering applications. More recently, it has become a widely used method to improve process performance in quantum technologies by means of highly efficient control of quantum dynamics. This tutorial aims at providing an introduction to key concepts of optimal control theory which is accessible to physicists and engineers working in quantum control or in related fields. The different mathematical results are introduced intuitively, before being rigorously stated. This tutorial describes modern aspects of optimal control theory, with a particular focus on the Pontryagin …
A two-slope achievement scalarizing function for interactive multiobjective optimization
2012
The use of achievement (scalarizing) functions in interactive multiobjective optimization methods is very popular, as indicated by the large number of algorithmic and applied scientific papers that use this approach. Key parameters in this approach are the reference point, which expresses desirable objective function values for the decision maker, and weights. The role of the weights can range from purely normalizing to fully preferential parameters that indicate the relative importance given by the decision maker to the achievement of each reference value. Technically, the influence of the weights in the solution generated by the achievement scalarizing function is different, depending on …
Apparel sizing using trimmed PAM and OWA operators
2012
This paper is concerned with apparel sizing system design. One of the most important issues in the apparel development process is to define a sizing system that provides a good fit to the majority of the population. A sizing system classifies a specific population into homogeneous subgroups based on some key body dimensions. Standard sizing systems range linearly from very small to very large. However, anthropometric measures do not grow linearly with size, so they can not accommodate all body types. It is important to determine each class in the sizing system based on a real prototype that is as representative as possible of each class. In this paper we propose a methodology to develop an …
Analysis of metal spinning processes by the ADINA code
1989
Abstract The ADINA code, version 84, has been employed for the analysis of sheet spinning processes. The main process parameters have been evaluated in different working conditions; namely for various geometries and constitutive laws of the material.
A voice-activated key for the Apple Macintosh computer
1989
An interface circuit to connect a microphone to an Apple Macintosh computer is described. The Apple Macintosh mouse port is used as the input port, and the microphone activation simulates a mouse press.
Healthy Lifestyle, Well-being, Physical Activity, Sport, and Scholastic/academic Performance: Interactions and Connections
2019
The physical activity and sport are key elements for a healthy lifestyle. However, a little-investigated element is the presence of a possible relationship between school or academic performance and the participation in physical activity and sport in groups of preadolescents and adolescents. In order to clarify the complex relationship between mind and body in preadolescence and adolescence, the present discussion investigates the causal and direct relationship between sport activity and performance; and describes how this relationship can be mediated by the sense of self-esteem and self-efficacy; and investigates the relationship between group sports practice and school or academic perform…
An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs
2010
Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
2016
Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…
Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles
2017
International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…
Multiscale simulations of protein landscapes: Using coarse-grained models as reference potentials to full explicit models
2010
Evaluating the free-energy landscape of proteins and the corresponding functional aspects presents a major challenge for computer simulation approaches. This challenge is due to the complexity of the landscape and the enormous computer time needed for converging simulations. The use of simplified coarse-grained (CG) folding models offers an effective way of sampling the landscape but such a treatment, however, may not give the correct description of the effect of the actual protein residues. A general way around this problem that has been put forward in our early work (Fan et al., Theor Chem Acc 1999;103:77-80) uses the CG model as a reference potential for free-energy calculations of diffe…