1,095 research outputs found

    Structural concepts for hydrogen-fueled hypersonic airplanes

    Get PDF
    Structural concepts for hydrogen-fueled hypersonic aircraf

    Proceedings of the COST SUSVAR/ECO-PB Workshop on organic plant breeding strategies and the use of molecular markers

    Get PDF
    In many countries,national projects are in progress to investigate the sustainable low-input approach.In the present COST network,these projects are coordinated by means of exchange of materials,establishing common methods for assessment and statistical analyses and by combining national experimental results.The common framework is cereal production in low-input sustainable systems with emphasis on crop diversity.The network is organised into six Working Groups,five focusing on specific research areas and one focusing on the practical application of the research results for variety testing:1)plant genetics and plant breeding,2)biostatistics,3)plant nutrition and soil microbiology,4)weed biology and plant competition,5)plant pathology and plant disease resistance biology and 6)variety testing and certification.It is essential that scientists from many disciplines work together to investigate the complex interactions between the crop and its environment,in order to be able to exploit the natural regulatory mechanisms of different agricultural systems for stabilising and increasing yield and quality.The results of this cooperation will contribute to commercial plant breeding as well as official variety testing,when participants from these areas disperse the knowledge achieved through the EU COST Action

    Anthropogenic impact on ecosystems and land degradation in the Eastern Mongolian Steppe

    Get PDF

    Using Random Digit Representation for Elliptic Curve Scalar Multiplication

    Get PDF
    Elliptic Curve Cryptography (ECC) was introduced independently by Miller and Koblitz in 1986. Compared to the integer factorization based Rivest-Shamir-Adleman (RSA) cryptosystem, ECC provides shorter key length with the same security level. Therefore, it has advantages in terms of storage requirements, communication bandwidth and computation time. The core and the most time-consuming operation of ECC is scalar multiplication, where the scalar is an integer of several hundred bits long. Many algorithms and methodologies have been proposed to speed up the scalar multiplication operation. For example, non-adjacent form (NAF), window-based NAF (wNAF), double bases form, multi-base non-adjacent form and so on. The random digit representation (RDR) scheme can represent any scalar using a set that contains random odd digits including the digit 1. The RDR scheme is efficient in terms of the average number of non-zeros and it also provides resistance to power analysis attacks. In this thesis, we propose a variant of the RDR scheme. The proposed variant, referred to as implementation-friendly recoding algorithm (IFRA), is advantageous over RDR in hardware implementation for two reasons. First, IFRA uses simple operations such as scan, match, and shift. Second, it requires no long adder to update the scalar. In this thesis we also investigate the average density of non-zero digits of IFRA. It is shown that the average density of the variant is close to the average density of RDR. Moreover, a hardware implementation of the variant scheme is presented using pre-computed values stored in one dual-port memory. A performance comparison for different recoding schemes is presented by demonstrating the run-time efficiency of IFRA compared to other recoding schemes. Finally, the IFRA is applied to scalar multiplication on ECC and we compare its computation time against those based on NAF, wNAF, and RDR

    Geologic applications of thermal-inertia mapping from satellite

    Get PDF
    In the Powder River Basin, Wyo., narrow geologic units having thermal inertias which contrast with their surroundings can be discriminated in optimal images. A few subtle thermal inertia anomalies coincide with areas of helium leakage believed to be associated with deep oil and gas concentrations. The most important results involved delineation of tectonic framework elements some of which were not previously recognized. Thermal and thermal inertia images also permit mapping of geomorphic textural domains. A thermal lineament appears to reveal a basement discontinuity which involves the Homestake Mine in the Black Hill, a zone of Tertiary igneous activity and facies control in oil producing horizons. Applications of these data to the Cabeza Prieta, Ariz., area illustrate their potential for igneous rock type discrimination. Extension to Yellowstone National Park resulted in the detection of additional structural information but surface hydrothermal features could not be distinguished with any confidence. A thermal inertia mapping algorithm, a fast and accurate image registration technique, and an efficient topographic slope and elevation correction method were developed

    Exploitation of Unintentional Information Leakage from Integrated Circuits

    Get PDF
    Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique integrated circuit (IC) based on fabrication process-induced variations in a manner analogous to biometric human identification. The effectiveness of the technique is demonstrated through an extensive empirical study, with results presented indicating correct device identification success rates of greater than 99:5%, and average verification equal error rates (EERs) of less than 0:05% for 40 near-identical devices. The proposed approach is suitable for security applications involving commodity commercial ICs, with substantial cost and scalability advantages over existing approaches. A systematic leakage mapping methodology is also proposed to comprehensively assess the information leakage of arbitrary block cipher implementations, and to quantitatively bound an arbitrary implementation\u27s resistance to the general class of differential side channel analysis techniques. The framework is demonstrated using the well-known Hamming Weight and Hamming Distance leakage models, and approach\u27s effectiveness is demonstrated through the empirical assessment of two typical unprotected implementations of the Advanced Encryption Standard. The assessment results are empirically validated against correlation-based differential power and electromagnetic analysis attacks

    The 1990 Johnson Space Center bibliography of scientific and technical papers

    Get PDF
    Abstracts are presented of scientific and technical papers written and/or presented by L. B. Johnson Space Center (JSC) authors, including civil servants, contractors, and grantees, during the calendar year of 1990. Citations include conference and symposium presentations, papers published in proceedings or other collective works, seminars, and workshop results, NASA formal report series (including contractually required final reports), and articles published in professional journals
    • …
    corecore