1,434 research outputs found

    Celulární automat a CML systémy

    Get PDF
    The main aim of this thesis is the study of cellular automata and discrete dynamical systems on a lattice. Both tools, cellular automata as well as dynamical systems on a lattice are introduced and elementary properties described. The relation between cellular automata and dynamical system on lattice is derived. The main goal of the thesis is also the use of the cellular automata as that mathematical tool of evolution visualization of discrete dynamical systems. The theory of cellular automata is applied to the discrete dynamical systems on a lattice Laplacian type and implemented in Java language.Hlavním cílem práce je studium vztahu celulárních automatů a diskrétních dynamických systémů na mřížce. Oba nástroje, jak celulární automat tak dynamický systém na mřížce, jsou zavedeny a jejich základní vlastnosti popsány. Vztah mezi celulárními automaty a dynamickými systémy na mřížce je podrobně popsán. Hlavním cílem práce je dále použití nástroje celulárního automatu jako matematického vizualizačního prostředku evoluce diskrétních dynamických systémů. Teorie celulárních automatů je použita na dynamické systémy na mřížce Lamplaceova typu a implementována v prostředí Java.470 - Katedra aplikované matematikyvelmi dobř

    Digital certificates and threshold cryptography

    Get PDF
    This dissertation discusses the use of secret sharing cryptographic protocols for distributing and sharing of secret documents, in our case PDF documents. We discuss the advantages and uses of such a system in the context of collaborative environments. Description of the cryptographic protocol involved and the necessary Public Key Infrastructure (PKI) shall be presented. We also provide an implementation of this framework as a “proof of concept” and fundament the use of a certificate extension as the basis for threshold cryptography. Details of the shared secret distribution protocol and shared secret recovery protocol shall be given as well as the associated technical implementation details. The actual secret sharing algorithm implemented at this stage is based on an existing well known secret sharing scheme that uses polynomial interpolation over a finite field. Finally we conclude with a practical assessment of our prototype

    An Entangled Dream Series: Fragmentation, Wholeness and the Collective Unconscious

    Get PDF
    Based on an experiential dream series this consciousness study shapes a theory that the fragmentary nature of dreams seeks wholeness deriving from the Collective Unconscious. As dreams evolve from a microscopic-personal worldview to a macroscopic-transpersonal dimension, concern for survival of self is augmented with concern for survival of the species. Entangled dream imagery provides cues to quantum functions actualized through the tutelage of departed scientific luminaries. The intentionality, specificity, and information input experienced in the communications imply that the collective unconscious and quantum cognition are an integrated structure revealing an underlying methodology

    A Good Performance OTP Encryption Image based on DCT-DWT Steganography

    Get PDF
    The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1

    Towards a cyber physical system for personalised and automatic OSA treatment

    Get PDF
    Obstructive sleep apnea (OSA) is a breathing disorder that takes place in the course of the sleep and is produced by a complete or a partial obstruction of the upper airway that manifests itself as frequent breathing stops and starts during the sleep. The real-time evaluation of whether or not a patient is undergoing OSA episode is a very important task in medicine in many scenarios, as for example for making instantaneous pressure adjustments that should take place when Automatic Positive Airway Pressure (APAP) devices are used during the treatment of OSA. In this paper the design of a possible Cyber Physical System (CPS) suited to real-time monitoring of OSA is described, and its software architecture and possible hardware sensing components are detailed. It should be emphasized here that this paper does not deal with a full CPS, rather with a software part of it under a set of assumptions on the environment. The paper also reports some preliminary experiments about the cognitive and learning capabilities of the designed CPS involving its use on a publicly available sleep apnea database

    The DECIDE Project: Designing and Implementing a Prototype Service for Supporting Early Diagnosis of Alzheimer's Disease

    Get PDF
    This paper will present the design and implementation challenges of the innovative DECIDE service, to support research and early diagnosis of Alzheimer’s and other neurodegenerative diseases. DECIDE service, which is based on a Grid eInfrastructure, offers a set of tools providing quantitative measurements, to help researchers and clinicians make more informed diagnosis. As the service specifically targets the clinical community, it differs significantly from other initiatives since it needs to comply with the requirements imposed by the clinical routine in terms of accuracy, robustness, ease of use, data handling policies, adherence to clinical praxis. Moreover, sustainability aspects will also be discussed, since DECIDE aims to propose such service as a reference at European level, possibly extending it to other pathologies. We will then summarize the main results obtained to date, and the possible future developments

    Computing vs. Genetics

    Get PDF
    This chapter first presents the interrelations between computing and genetics, which both are based on information and, particularly, self-reproducing artificial systems. It goes on to examine genetic code from a computational viewpoint. This raises a number of important questions about genetic code. These questions are stated in the form of an as yet unpublished working hypothesis. This hypothesis suggests that many genetic alterations are caused by the last base of certain codons. If this conclusive hypothesis were to be confirmed through experiementation if would be a significant advance for treating many genetic diseases
    corecore