12,455 research outputs found

    Cryptanalyzing a discrete-time chaos synchronization secure communication system

    Full text link
    This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.Comment: 11 pages, 3 figures, latex forma

    Breaking projective chaos synchronization secure communication using filtering and generalized synchronization

    Get PDF
    This paper describes the security weaknesses of a recently proposed secure communication method based on chaotic masking using projective synchronization of two chaotic systems. We show that the system is insecure and how to break it in two different ways, by high-pass filtering and by generalized synchronization.Comment: 14 pages, 6 figures, latex forma

    Nonparametric Bayesian Mixed-effect Model: a Sparse Gaussian Process Approach

    Full text link
    Multi-task learning models using Gaussian processes (GP) have been developed and successfully applied in various applications. The main difficulty with this approach is the computational cost of inference using the union of examples from all tasks. Therefore sparse solutions, that avoid using the entire data directly and instead use a set of informative "representatives" are desirable. The paper investigates this problem for the grouped mixed-effect GP model where each individual response is given by a fixed-effect, taken from one of a set of unknown groups, plus a random individual effect function that captures variations among individuals. Such models have been widely used in previous work but no sparse solutions have been developed. The paper presents the first sparse solution for such problems, showing how the sparse approximation can be obtained by maximizing a variational lower bound on the marginal likelihood, generalizing ideas from single-task Gaussian processes to handle the mixed-effect model as well as grouping. Experiments using artificial and real data validate the approach showing that it can recover the performance of inference with the full sample, that it outperforms baseline methods, and that it outperforms state of the art sparse solutions for other multi-task GP formulations.Comment: Preliminary version appeared in ECML201

    Breaking a secure communication scheme based on the phase synchronization of chaotic systems

    Get PDF
    A security analysis of a recently proposed secure communication scheme based on the phase synchronization of chaotic systems is presented. It is shown that the system parameters directly determine the ciphertext waveform, hence it can be readily broken by parameter estimation of the ciphertext signal.Comment: 4 pages, 6 figure

    Breaking parameter modulated chaotic secure communication system

    Full text link
    This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.Comment: 8 pages, 3 figures, latex forma

    Polynomial algebras and exact solutions of general quantum non-linear optical models I: Two-mode boson systems

    Full text link
    We introduce higher order polynomial deformations of A1A_1 Lie algebra. We construct their unitary representations and the corresponding single-variable differential operator realizations. We then use the results to obtain exact (Bethe ansatz) solutions to a class of 2-mode boson systems, including the Boson-Einstein Condensate models as special cases. Up to an overall factor, the eigenfunctions of the 2-mode boson systems are given by polynomials whose roots are solutions of the associated Bethe ansatz equations. The corresponding eigenvalues are expressed in terms of these roots. We also establish the spectral equivalence between the BEC models and certain quasi-exactly solvable Sch\"ordinger potentials.Comment: 20 pages, final version to appear in J. Phys. A: Math. Theor

    Rudiments of Holography

    Full text link
    An elementary introduction to Maldacena's AdS/CFT correspondence is given, with some emphasis in the Fefferman-Graham construction. This is based on lectures given by one of us (E.A.) at the Universidad Autonoma de Madrid.Comment: 60 pages, additional misprints corrected, references adde

    Polar optical phonons in core-shell semiconductor nanowires

    Get PDF
    We obtain the the long-wavelength polar optical vibrational modes of semiconductor core-shell nanowires by means of a phenomenological continuum model. A basis for the space of solutions is derived, and by applying the appropriate boundary conditions, the transcendental equations for the coupled and uncoupled modes are attained. Our results are applied to the study of the GaAs-GaP core-shell nanowire, for which we calculate numerically the polar optical modes, analyzing the role of strain in the vibrational properties of this nanosystem
    corecore