Search results for "key"

showing 10 items of 1962 documents

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

Canonical Retina-to-Cortex Vision Model Ready for Automatic Differentiation

2020

Canonical vision models of the retina-to-V1 cortex pathway consist of cascades of several Linear+Nonlinear layers. In this setting, parameter tuning is the key to obtain a sensible behavior when putting all these multiple layers to work together. Conventional tuning of these neural models very much depends on the explicit computation of the derivatives of the response with regard to the parameters. And, in general, this is not an easy task. Automatic differentiation is a tool developed by the deep learning community to solve similar problems without the need of explicit computation of the analytic derivatives. Therefore, implementations of canonical visual neuroscience models that are ready…

Theoretical computer scienceComputer scienceAutomatic differentiationbusiness.industryComputationDeep learningPython (programming language)Task (project management)Nonlinear systemDistortionKey (cryptography)Artificial intelligencebusinesscomputercomputer.programming_language
researchProduct

Evaluation of changes in space control due to passing behavior in elite soccer using Voronoi-cells

2015

A soccer player’s ability to make an “effective” pass in a play situation is considered one of the key skills characterizing successful performance in elite soccer.

Theoretical computer scienceComputer scienceComputerApplications_GENERALControl (management)EliteComputingMilieux_PERSONALCOMPUTINGKey (cryptography)Space (commercial competition)Voronoi diagramComputingMethodologies_ARTIFICIALINTELLIGENCEhuman activitiesSimulation
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

An ultrathin suspended hydrophobic porous membrane for high-efficiency water desalination

2017

Abstract An ultrathin highly fluorinated porous membrane was designed for a large production of desalted water at very low energy consumption. Imprinting water droplets were used through a low thermally conductive tetra-fluoroethylene (TFE)/2,2,4-trifluoro-5-tri-fluorometoxy-1,3-dioxol (TIT) (HYFLON AD 60) solution and the generated porous nanofilm was suspended onto a polyethersulfone (PES) honeycomb texture. The very tiny fluorinated thickness together with a large number of small-shaped pores provided the membrane for enhanced anti-wetting surface properties, extremely reduced resistance to water vapor transfer and outstanding thermal efficiency. Fine materials structure-transport relati…

Thermal efficiencyMaterials scienceMembrane distillation; Nanostructured membrane; PES honeycomb texture; Porous HYFLON AD nanofilm; Thermal efficiency; Water desalinationMembrane distillation02 engineering and technologySuper-hydrophobic interface010402 general chemistryMembrane distillation01 natural sciencesSettore CHIM/04 - Chimica IndustrialeWater desalinationhoneycombPorous membranePES honeycomb textureGeneral Materials SciencePorosityWater desalinationElectrical conductorKeywordChromatographyNanostructured membranePorous HYFLON AD nanofilmNanofilm021001 nanoscience & nanotechnology0104 chemical sciencesMembraneChemical engineeringnanostructured membranesHYFLON AD0210 nano-technologyWater vaporThermal efficiency
researchProduct

Epistemic and didactic values of the demonstrative process in different cultures: a case study in Geometry with Chinese and Italian students

2011

This paper presents same key findings of the research project conducted by G.R.I.M. of Palermo on the approaches to justification and proof in Geometry by investigating how Chinese and Italian teachers and students taught particular geometrical topics refereed to different epistemic and didactic values related to own culture. It was found that Chinese teachers and students emphasized justification of the proof by a stressed visual verification based on some metarules linked with the structure of their own written language and defined as historical Chinese modus operandi in the Jiuzhang Suanshu. The Italians paid close attention to mathematical proof by a hypoxemic deductive system defined on the Euclide’ Elements. The geometrical problem discussed on the paper was defined and presented as “one problem multiple solution problems” and “one problem multiple changes”. Important aspect of the case study discussed in the paper focus on the mediation of knowledge between Chinese and Italian students involved in multicultural class. According to us these kind of activities can establish possibilities for the students to confront their self with different cultural social and educational prospective of knowledge discovering the power of mathematics as tool of negotiation in multicultural class?Settore MAT/04 - Matematiche Complementari
researchProduct

Electric vehicles and psychology

2021

The popularity of electric vehicles is evidenced by the broad range of manufacturers presenting new models of plug-in hybrid and battery vehicles. However, the success of the revolution or, rather, the rebirth of electric vehicles, is hanging by a thread, as it lacks the involvement of a large number of users, and many psychological mechanisms hinder it. What are users’ true feelings about this new world of vehicles? Are people ready for the fifth level of automation, i.e., fully automatic driving and the absence of the driving position? The purpose of this paper is to present and discuss the psychological aspects that influence the adoption of electric vehicles. Topics such as the chicken …

Thread (network protocol)Electric vehiclesPublic perception020209 energymedia_common.quotation_subjectGeography Planning and DevelopmentTJ807-830Battery02 engineering and technologyManagement Monitoring Policy and LawTD194-195Renewable energy sourcesChicken and egg paradox0502 economics and business0202 electrical engineering electronic engineering information engineeringGE1-350Range anxietymedia_common050210 logistics & transportationRange anxietyEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentbusiness.industry05 social sciencesPopularityAutomationKey motivators and barriersIronyEnvironmental sciencesFully automaticPosition (finance)Psychological aspectsTelecommunicationsbusiness
researchProduct

The photovoltaic growth in the European Union requires stronger RES support

2016

Since the adoption of the EU Directive, 2001/77/EC, the production of electricity from renewable energy sources has progressed. Apart from the indicative target proposed by the Directive, actually no other tools of policy monitoring exist. To fill this gap, we propose a dynamic method able to capture this multidimensional phenomenon, providing an assessment tool to measure the technical efficiency performances of EU countries in the photovoltaic sector (1996–2010). Results show how technical efficiencies of countries are, from one hand, due to problems belonging to the economic and political contexts in which they operate, on the other hand driven by specific political support schemes adopt…

Three-way principal component analysiEconomics and EconometricsKeywords: EU energy policyWindow Data Envelopment AnalysiPublic economicsScope (project management)business.industry020209 energyPhotovoltaic system02 engineering and technologyEnvironmental economicsDirectiveRenewable energyTechnical efficiencyOrder (exchange)0202 electrical engineering electronic engineering information engineeringEconomicsProduction (economics)media_common.cataloged_instanceElectricityDirective 77/2001/ECEuropean unionbusinessSTATISmedia_commonJournal of Policy Modeling
researchProduct

Origins of the outperformance of venture backed initial public offerings : a French study

2010

In this thesis, we analyze the contractual relationship between private equity investors and entrepreneurs/managers of small and medium sized firms. More specifically, we focus on the real contribution of these financial intermediaries to the Initial Public Offering (IPO) performance of financed firms. While considering venture capitalists’ involvement in the governance of financed firms as the main explaining factor, we use the Corporate Governance theory as the relevant theoretical framework. Thus, we firstly point out the agency theory perspective and secondly the resource and knowledge based view perspective to examine the determinants of venture capitalists’ involvement and the impact …

Théorie de la gouvernanceApproche cognitivePerformanceIntroduction en bourseApproche disciplinaire[SHS.GESTION]Humanities and Social Sciences/Business administrationNo english keywordsGouvernance des entreprises[SHS.GESTION] Humanities and Social Sciences/Business administration[ SHS.GESTION ] Humanities and Social Sciences/Business administrationCapital-investisseurs
researchProduct

Survey sampling for functionnal data : building asymptotic confidence bands and considering auxiliary information

2011

When collections of functional data are too large to be exhaustively observed, survey sampling techniques provide an effective way to estimate global quantities such as the population mean function, without being obligated to store all the data. In this thesis, we propose a Horvitz–Thompson estimator of the mean trajectory, and with additional assumptions on the sampling design, we state a functional Central Limit Theorem and deduce asymptotic confidence bands. For a fixed sample size, we show that stratified sampling can greatly improve the estimation compared to simple random sampling. In addition, we extend Neyman’s rule of optimal allocation to the functional context. Taking into accoun…

Théorème Central Limite Fonctionnel[MATH.MATH-GM]Mathematics [math]/General Mathematics [math.GM]Données fonctionnelles[ MATH.MATH-GM ] Mathematics [math]/General Mathematics [math.GM]Bandes de confiance asymptotiques[MATH.MATH-GM] Mathematics [math]/General Mathematics [math.GM]No english keywordsÉchantillonnageSupremum de processus GaussiensEstimateur d’Horvitz-ThompsonBootstrapEstimateurs par modèle assisté
researchProduct