Search results for "Cryptography"
showing 10 items of 657 documents
Mainz Rolling Brains
2000
Our agent team is the result of a development which had to take place under tight time limitations. The total development time available was slightly less than three months where over most of the time the team developers could invest no more than a few hours per week. The code was developed from scratch to improve over the design and quality of last year’s code. Thus one of the challenges was to keep a smooth development line and to avoid dead ends in the development, as well as to maintain a development environment in which a larger number of developers could work productively.
Modelling the Interaction between Air Pollutant Emissions and Their Key Sources in Poland
2021
The main purpose of this study is to investigate the relationships between key sources of air pollutant emissions (sources of energy production, factories which are particularly harmful to the environment, the fleets of cars, environmental protection expenditure) and the main environmental air pollution (SO2, NOx, CO and PM) in Poland. Models based on MLP neural networks were used as predictive models. Global sensitivity analysis was used to demonstrate the significant impact of individual network input variables on the output variable. To verify the effectiveness of the models created, the actual data were compared with the data obtained through modelling. Projected courses of changes in t…
Shedding Light on Graphene Quantum Dots: Key Synthetic Strategies, Characterization Tools, and Cutting-Edge Applications
2021
During the last 20 years, the scientific community has shown growing interest towards carbonaceous nanomaterials due to their appealing mechanical, thermal, and optical features, depending on the specific nanoforms. Among these, graphene quantum dots (GQDs) recently emerged as one of the most promising nanomaterials due to their outstanding electrical properties, chemical stability, and intense and tunable photoluminescence, as it is witnessed by a booming number of reported applications, ranging from the biological field to the photovoltaic market. To date, a plethora of synthetic protocols have been investigated to modulate the portfolio of features that GQDs possess and to facilitate the…
In vivo evaluation of three-dimensional of volumetric changes using a CAD/CAM chair-side system : technical procedure
2017
An intraoral digital scanner in combination with specialized three-dimensional surface analysis software monitors volumetric changes to soft tissues or dental restorations. This technology can evaluate the success of a specific technique or medium- or long-term clinical outcomes in both clinical and research situations. This article describes how this technology was used to provide immediate chair-side data analysis without the help of specialized laboratory support. Key words:Intraoral scanner, CAD-CAM, best fit-method, surface tessellation language.
On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks
2015
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …
Parallel Calculation of CCSDT and Mk-MRCCSDT Energies.
2010
A scheme for the parallel calculation of energies at the coupled-cluster singles, doubles, and triples (CCSDT) level of theory, several approximate iterative CCSDT schemes (CCSDT-1a, CCSDT-1b, CCSDT-2, CCSDT-3, and CC3), and for the state-specific multireference coupled-cluster ansatz suggested by Mukherjee with a full treatment of triple excitations (Mk-MRCCSDT) is presented. The proposed scheme is based on the adaptation of a highly efficient serial coupled-cluster code leading to a communication-minimized implementation by parallelizing the time-determining steps. The parallel algorithm is tailored for affordable cluster architectures connected by standard communication networks such as …
Canonical Retina-to-Cortex Vision Model Ready for Automatic Differentiation
2020
Canonical vision models of the retina-to-V1 cortex pathway consist of cascades of several Linear+Nonlinear layers. In this setting, parameter tuning is the key to obtain a sensible behavior when putting all these multiple layers to work together. Conventional tuning of these neural models very much depends on the explicit computation of the derivatives of the response with regard to the parameters. And, in general, this is not an easy task. Automatic differentiation is a tool developed by the deep learning community to solve similar problems without the need of explicit computation of the analytic derivatives. Therefore, implementations of canonical visual neuroscience models that are ready…
Evaluation of changes in space control due to passing behavior in elite soccer using Voronoi-cells
2015
A soccer player’s ability to make an “effective” pass in a play situation is considered one of the key skills characterizing successful performance in elite soccer.
On the role of non-effective code in linear genetic programming
2019
In linear variants of Genetic Programming (GP) like linear genetic programming (LGP), structural introns can emerge, which are nodes that are not connected to the final output and do not contribute to the output of a program. There are claims that such non-effective code is beneficial for search, as it can store relevant and important evolved information that can be reactivated in later search phases. Furthermore, introns can increase diversity, which leads to higher GP performance. This paper studies the role of non-effective code by comparing the performance of LGP variants that deal differently with non-effective code for standard symbolic regression problems. As we find no decrease in p…
Quantum Computers and Quantum Automata
2000
Quantum computation is a most challenging project involving research both by physicists and computer scientists. The principles of quantum computation differ from the principles of classical computation very much. When quantum computers become available, the public-key cryptography will change radically. It is no exaggeration to assert that building a quantum computer means building a universal code-breaking machine. Quantum finite automata are expected to appear much sooner. They do not generalize deterministic finite automata. Their capabilities are incomparable.