Search results for "Cryptography"

showing 10 items of 657 documents

Mainz Rolling Brains

2000

Our agent team is the result of a development which had to take place under tight time limitations. The total development time available was slightly less than three months where over most of the time the team developers could invest no more than a few hours per week. The code was developed from scratch to improve over the design and quality of last year’s code. Thus one of the challenges was to keep a smooth development line and to avoid dead ends in the development, as well as to maintain a development environment in which a larger number of developers could work productively.

TeamworkComputer sciencemedia_common.quotation_subjectSystems architectureCode (cryptography)Quality (business)Operations managementSimulationmedia_common
researchProduct

Modelling the Interaction between Air Pollutant Emissions and Their Key Sources in Poland

2021

The main purpose of this study is to investigate the relationships between key sources of air pollutant emissions (sources of energy production, factories which are particularly harmful to the environment, the fleets of cars, environmental protection expenditure) and the main environmental air pollution (SO2, NOx, CO and PM) in Poland. Models based on MLP neural networks were used as predictive models. Global sensitivity analysis was used to demonstrate the significant impact of individual network input variables on the output variable. To verify the effectiveness of the models created, the actual data were compared with the data obtained through modelling. Projected courses of changes in t…

TechnologyControl and OptimizationPollutant emissionsair pollutionAir pollutionEnergy Engineering and Power TechnologyMLPmedicine.disease_causefuel combustionmodellingEconometricsmedicineProduction (economics)Sensitivity (control systems)Electrical and Electronic EngineeringEngineering (miscellaneous)PollutanttransportationArtificial neural networkRenewable Energy Sustainability and the EnvironmentTemissionsneural networkshard coalVariable (computer science)Key (cryptography)Environmental scienceenergy industryEnergy (miscellaneous)Energies
researchProduct

Shedding Light on Graphene Quantum Dots: Key Synthetic Strategies, Characterization Tools, and Cutting-Edge Applications

2021

During the last 20 years, the scientific community has shown growing interest towards carbonaceous nanomaterials due to their appealing mechanical, thermal, and optical features, depending on the specific nanoforms. Among these, graphene quantum dots (GQDs) recently emerged as one of the most promising nanomaterials due to their outstanding electrical properties, chemical stability, and intense and tunable photoluminescence, as it is witnessed by a booming number of reported applications, ranging from the biological field to the photovoltaic market. To date, a plethora of synthetic protocols have been investigated to modulate the portfolio of features that GQDs possess and to facilitate the…

TechnologysynthesisComputer scienceNanotechnologyReview02 engineering and technology010402 general chemistry01 natural sciencesNanomaterialslaw.inventionlawhybrid materialsGeneral Materials Sciencedye-sensitized solar cellsMicroscopyQC120-168.85graphene quantum dotsGrapheneTunable photoluminescenceenergy storageTQH201-278.5021001 nanoscience & nanotechnologyEngineering (General). Civil engineering (General)0104 chemical sciencesCharacterization (materials science)TK1-9971Descriptive and experimental mechanicsQuantum dotKey (cryptography)Enhanced Data Rates for GSM EvolutionElectrical engineering. Electronics. Nuclear engineeringTA1-20400210 nano-technologyMaterials
researchProduct

In vivo evaluation of three-dimensional of volumetric changes using a CAD/CAM chair-side system : technical procedure

2017

An intraoral digital scanner in combination with specialized three-dimensional surface analysis software monitors volumetric changes to soft tissues or dental restorations. This technology can evaluate the success of a specific technique or medium- or long-term clinical outcomes in both clinical and research situations. This article describes how this technology was used to provide immediate chair-side data analysis without the help of specialized laboratory support. Key words:Intraoral scanner, CAD-CAM, best fit-method, surface tessellation language.

Tessellation (computer graphics)Intraoral scannerScannerProsthetic DentistryComputer sciencebusiness.industryCADCase Report030206 dentistry:CIENCIAS MÉDICAS [UNESCO]030207 dermatology & venereal diseases03 medical and health sciences0302 clinical medicineUNESCO::CIENCIAS MÉDICASKey (cryptography)Analysis softwareComputer visionArtificial intelligencebusinessGeneral DentistryComputingMethodologies_COMPUTERGRAPHICS
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

Parallel Calculation of CCSDT and Mk-MRCCSDT Energies.

2010

A scheme for the parallel calculation of energies at the coupled-cluster singles, doubles, and triples (CCSDT) level of theory, several approximate iterative CCSDT schemes (CCSDT-1a, CCSDT-1b, CCSDT-2, CCSDT-3, and CC3), and for the state-specific multireference coupled-cluster ansatz suggested by Mukherjee with a full treatment of triple excitations (Mk-MRCCSDT) is presented. The proposed scheme is based on the adaptation of a highly efficient serial coupled-cluster code leading to a communication-minimized implementation by parallelizing the time-determining steps. The parallel algorithm is tailored for affordable cluster architectures connected by standard communication networks such as …

Theoretical computer scienceBasis (linear algebra)Computer scienceComputationGigabit EthernetCode (cryptography)Parallel algorithmBenchmark (computing)Basis functionPhysical and Theoretical ChemistryComputer Science ApplicationsComputational scienceAnsatzJournal of chemical theory and computation
researchProduct

Canonical Retina-to-Cortex Vision Model Ready for Automatic Differentiation

2020

Canonical vision models of the retina-to-V1 cortex pathway consist of cascades of several Linear+Nonlinear layers. In this setting, parameter tuning is the key to obtain a sensible behavior when putting all these multiple layers to work together. Conventional tuning of these neural models very much depends on the explicit computation of the derivatives of the response with regard to the parameters. And, in general, this is not an easy task. Automatic differentiation is a tool developed by the deep learning community to solve similar problems without the need of explicit computation of the analytic derivatives. Therefore, implementations of canonical visual neuroscience models that are ready…

Theoretical computer scienceComputer scienceAutomatic differentiationbusiness.industryComputationDeep learningPython (programming language)Task (project management)Nonlinear systemDistortionKey (cryptography)Artificial intelligencebusinesscomputercomputer.programming_language
researchProduct

Evaluation of changes in space control due to passing behavior in elite soccer using Voronoi-cells

2015

A soccer player’s ability to make an “effective” pass in a play situation is considered one of the key skills characterizing successful performance in elite soccer.

Theoretical computer scienceComputer scienceComputerApplications_GENERALControl (management)EliteComputingMilieux_PERSONALCOMPUTINGKey (cryptography)Space (commercial competition)Voronoi diagramComputingMethodologies_ARTIFICIALINTELLIGENCEhuman activitiesSimulation
researchProduct

On the role of non-effective code in linear genetic programming

2019

In linear variants of Genetic Programming (GP) like linear genetic programming (LGP), structural introns can emerge, which are nodes that are not connected to the final output and do not contribute to the output of a program. There are claims that such non-effective code is beneficial for search, as it can store relevant and important evolved information that can be reactivated in later search phases. Furthermore, introns can increase diversity, which leads to higher GP performance. This paper studies the role of non-effective code by comparing the performance of LGP variants that deal differently with non-effective code for standard symbolic regression problems. As we find no decrease in p…

Theoretical computer scienceComputer scienceIntronContrast (statistics)Genetic programming0102 computer and information sciences02 engineering and technology01 natural sciences010201 computation theory & mathematicsLinear genetic programming0202 electrical engineering electronic engineering information engineeringCode (cryptography)020201 artificial intelligence & image processingSymbolic regressionProceedings of the Genetic and Evolutionary Computation Conference
researchProduct

Quantum Computers and Quantum Automata

2000

Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.

Theoretical computer scienceFinite-state machinebusiness.industryComputationTheoryofComputation_GENERALCryptographyQuantum circuitDeterministic finite automatonRegular languageComputerSystemsOrganization_MISCELLANEOUSQuantum finite automatabusinessMathematicsQuantum computer
researchProduct