138 research outputs found

    Design of Dispersive Delay Structures (DDSs) Formed by Coupled C-Sections Using Predistortion with Space Mapping

    Full text link
    The concept of space mapping is applied, for the first time, to the design of microwave dispersive delay structures (DDSs). DDSs are components providing specified group delay versus frequency responses for real-time radio systems. The DDSs considered in this paper are formed by cascaded coupled C-sections. It is first shown that aggressive space mapping does not provide sufficient accuracy in the synthesis of DDSs. To address this issue, we propose a predistortion space mapping technique. Compared to aggressive space mapping, this technique provides enhanced accuracy, while compared to output space mapping, it provides greater implementation simplicity. Two full-wave and one experimental examples are provided to illustrate the proposed predistortion space mapping technique

    Explanation of the Model Checker Verification Results

    Get PDF
    Immer wenn neue Anforderungen an ein System gestellt werden, müssen die Korrektheit und Konsistenz der Systemspezifikation überprüft werden, was in der Praxis in der Regel manuell erfolgt. Eine mögliche Option, um die Nachteile dieser manuellen Analyse zu überwinden, ist das sogenannte Contract-Based Design. Dieser Entwurfsansatz kann den Verifikationsprozess zur Überprüfung, ob die Anforderungen auf oberster Ebene konsistent verfeinert wurden, automatisieren. Die Verifikation kann somit iterativ durchgeführt werden, um die Korrektheit und Konsistenz des Systems angesichts jeglicher Änderung der Spezifikationen sicherzustellen. Allerdings ist es aufgrund der mangelnden Benutzerfreundlichkeit und der Schwierigkeiten bei der Interpretation von Verifizierungsergebnissen immer noch eine Herausforderung, formale Ansätze in der Industrie einzusetzen. Stellt beispielsweise der Model Checker bei der Verifikation eine Inkonsistenz fest, generiert er ein Gegenbeispiel (Counterexample) und weist gleichzeitig darauf hin, dass die gegebenen Eingabespezifikationen inkonsistent sind. Hier besteht die gewaltige Herausforderung darin, das generierte Gegenbeispiel zu verstehen, das oft sehr lang, kryptisch und komplex ist. Darüber hinaus liegt es in der Verantwortung der Ingenieurin bzw. des Ingenieurs, die inkonsistente Spezifikation in einer potenziell großen Menge von Spezifikationen zu identifizieren. Diese Arbeit schlägt einen Ansatz zur Erklärung von Gegenbeispielen (Counterexample Explanation Approach) vor, der die Verwendung von formalen Methoden vereinfacht und fördert, indem benutzerfreundliche Erklärungen der Verifikationsergebnisse der Ingenieurin bzw. dem Ingenieur präsentiert werden. Der Ansatz zur Erklärung von Gegenbeispielen wird mittels zweier Methoden evaluiert: (1) Evaluation anhand verschiedener Anwendungsbeispiele und (2) eine Benutzerstudie in Form eines One-Group Pretest-Posttest Experiments.Whenever new requirements are introduced for a system, the correctness and consistency of the system specification must be verified, which is often done manually in industrial settings. One viable option to traverse disadvantages of this manual analysis is to employ the contract-based design, which can automate the verification process to determine whether the refinements of top-level requirements are consistent. Thus, verification can be performed iteratively to ensure the system’s correctness and consistency in the face of any change in specifications. Having said that, it is still challenging to deploy formal approaches in industries due to their lack of usability and their difficulties in interpreting verification results. For instance, if the model checker identifies inconsistency during the verification, it generates a counterexample while also indicating that the given input specifications are inconsistent. Here, the formidable challenge is to comprehend the generated counterexample, which is often lengthy, cryptic, and complex. Furthermore, it is the engineer’s responsibility to identify the inconsistent specification among a potentially huge set of specifications. This PhD thesis proposes a counterexample explanation approach for formal methods that simplifies and encourages their use by presenting user-friendly explanations of the verification results. The proposed counterexample explanation approach identifies and explains relevant information from the verification result in what seems like a natural language statement. The counterexample explanation approach extracts relevant information by identifying inconsistent specifications from among the set of specifications, as well as erroneous states and variables from the counterexample. The counterexample explanation approach is evaluated using two methods: (1) evaluation with different application examples, and (2) a user-study known as one-group pretest and posttest experiment

    Fully Secure Cipertext-Policy Hiding CP-ABE

    Get PDF
    Lecture Notes in Computer Science, 2011, Volume 6672/2011, 24-39</p

    Shrinking of Cluster Ellipticals: a Tidal Stripping explanation and Implications for the Intra-Cluster Light

    Full text link
    We look for evidence of tidal stripping in elliptical galaxies through the analysis of homogeneous CCD data corresponding to a sample of 228 elliptical galaxies belonging to 24 clusters of galaxies at 0.015<z<0.0800.015<z<0.080. We investigate departures from the standard magnitude-isophotal size relation, as a function of environmental (cluster-centric distance, local galaxy density) and structural (cluster velocity dispersion, Bautz-Morgan type) properties. We find that, for any particular galaxy luminosity, the ellipticals in the inner and denser regions of the clusters are about 5% smaller than those in the outer regions, which is in good agreement with the finding of Strom & Strom (1978) based on photographic photometry. The null hypothesis (ie., galaxy sizes are independent of the cluster-centric distance or density) is rejected at a significance level of better than 99.7%. Numericals models of Aguilar & White (1986) predict that tidal stripping can lead to changes in the whole structure of ellipticals producing shrinkage and brightening of the galaxy, qualitatively consistent with our measurements and also with the findings of Trujillo et al. (2002), that more centrally concentrated ellipticals populate denser regions. Our observational results can be interpreted as evidence for stripping of stars from ellipticals in the central/denser regions of clusters, contributing to the intra-cluster light observed in these structures.Comment: AJ Accepted, 15 pages, 9 figure

    Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

    Full text link
    Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a computationally powerful third party, called the server, whose only requirement is to carry out the computations correctly. Such a revocation mechanism was considered in the settings of identity-based encryption and attribute-based encryption by Qin et al. (ESORICS 2015) and Cui et al. (ESORICS 2016), respectively. In this work, we consider the server-aided revocation mechanism in the more elaborate setting of predicate encryption (PE). The latter, introduced by Katz, Sahai, and Waters (EUROCRYPT 2008), provides fine-grained and role-based access to encrypted data and can be viewed as a generalization of identity-based and attribute-based encryption. Our contribution is two-fold. First, we formalize the model of server-aided revocable predicate encryption (SR-PE), with rigorous definitions and security notions. Our model can be seen as a non-trivial adaptation of Cui et al.'s work into the PE context. Second, we put forward a lattice-based instantiation of SR-PE. The scheme employs the PE scheme of Agrawal, Freeman and Vaikuntanathan (ASIACRYPT 2011) and the complete subtree method of Naor, Naor, and Lotspiech (CRYPTO 2001) as the two main ingredients, which work smoothly together thanks to a few additional techniques. Our scheme is proven secure in the standard model (in a selective manner), based on the hardness of the Learning With Errors (LWE) problem.Comment: 24 page

    RSA-based certificateless public key encryption

    Get PDF
    Singapore Management Universit

    Inactivity of Parliamentarians in National Parliament of Bangladesh: Impacts on Parliamentary Democracy

    Get PDF
    There is a growing interest in the inactive role of parliamentarians in measuring the success of parliamentary democracy. In this research firstly, it explored the inactive role of the parliamentarians among the eighth, ninth and tenth parliament of Bangladesh national parliment, where it observed that the parliamentarians of both oppositions and the ruling party remained inactive in lawmaking to oversight functions. The main causes of this inactivity of the parliamentarians are apathy to discuss and debate in the parliament, seventy articles of the constitution, the dearth of knowledge of the parliamentary norms, and business politics nexus. The impacts of this inactivity of the parliamentarians are the declining of parliament, which is taking place by the executive and this inactivity serves as a barrier to the process of institutionalization of parliamentary democracy
    • …
    corecore