176 research outputs found
Modern Methods of heating for family houses
Tato bakalářská práce pojednává o moderních způsobech regulace ve vytápění se zaměřením především na vytápění teplovodní, které má v dnešní době stále nejrozšířenější zastoupení. Cílem této práce je popsat jednotlivé metody regulace, ukázat na nich specifické vlastnosti, jejich uplatnění v praxi, výhody a nevýhody. Práce obsahuje cenové srovnání jednotlivých regulačních prvků. Tato práce může rovněž vodítkem pro řadového uživatele při seznámení se s možnostmi regulace a výběru optimální varianty vzhledem ke komfortu bydlení a nákladům na pořízení a instalaci. Součástí práce je také zpracován konkrétní návrh, který se zabývá výběrem regulačních prvků pro otopnou soustavu. V tomto příkladě jsou řešena jak stránka efektivnosti, tak stránka nákladů.This thesis is dealing with the modern methods of control in heating, focusing especially on hot water heating, which is still the most widely represented method today. The aim of this work is to describe the various methods of control, show specific characteristics and then a practical application in the profession, advantages disadvantages. The work includes a price comparison of the different regulatory elements. This work may also give a guidance to the ordinary user, to familiarize himself with the regulatory options and selecting the optimal alternatives due to the comfort of living and the cost of purchase and installation. The work also contains a specific concept, which deals with the selection of control devices for heating system. In this example efficiency and costs are being solved.
On existence of proper solutions of quasilinear second order differential equations
In the paper, the nonlinear differential equation is studied. Sufficient conditions for the nonexistence of singular solutions of the first and second kind are given. Hence, sufficient conditions for all nontrivial solutions to be proper are derived. Sufficient conditions for the nonexistence of weakly oscillatory solutions are given
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
We study the notion of indistinguishability obfuscation for null quantum circuits (quantum null-iO). We present a construction assuming:
- The quantum hardness of learning with errors (LWE).
- Post-quantum indistinguishability obfuscation for classical circuits.
- A notion of "dual-mode" classical verification of quantum computation (CVQC). We give evidence that our notion of dual-mode CVQC exists by proposing a scheme that is secure assuming LWE in the quantum random oracle model (QROM).
Then we show how quantum null-iO enables a series of new cryptographic primitives that, prior to our work, were unknown to exist even making heuristic assumptions. Among others, we obtain the first witness encryption scheme for QMA, the first publicly verifiable non-interactive zero-knowledge (NIZK) scheme for QMA, and the first attribute-based encryption (ABE) scheme for BQP
Recommended from our members
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
In this work, we suggest ADPs as a new framework for building general-purpose obfuscation and witness encryption. We provide evidence to suggest that constructions following our ADP-based framework may one day yield secure, practically feasible obfuscation.
As a proof-of-concept, we give a candidate ADP-based construction of indistinguishability obfuscation (iO) for all circuits along with a simple witness encryption candidate. We provide cryptanalysis demonstrating that our schemes resist several potential attacks, and leave further cryptanalysis to future work. Lastly, we explore practically feasible applications of our witness encryption candidate, such as public-key encryption with near-optimal key generation
Publicly-Verifiable Deletion via Target-Collapsing Functions
We build quantum cryptosystems that support publicly-verifiable deletion from
standard cryptographic assumptions. We introduce target-collapsing as a
weakening of collapsing for hash functions, analogous to how second preimage
resistance weakens collision resistance; that is, target-collapsing requires
indistinguishability between superpositions and mixtures of preimages of an
honestly sampled image.
We show that target-collapsing hashes enable publicly-verifiable deletion
(PVD), proving conjectures from [Poremba, ITCS'23] and demonstrating that the
Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes
support PVD under the LWE assumption. We further build on this framework to
obtain a variety of primitives supporting publicly-verifiable deletion from
weak cryptographic assumptions, including:
- Commitments with PVD assuming the existence of injective one-way functions,
or more generally, almost-regular one-way functions. Along the way, we
demonstrate that (variants of) target-collapsing hashes can be built from
almost-regular one-way functions.
- Public-key encryption with PVD assuming trapdoored variants of injective
(or almost-regular) one-way functions. We also demonstrate that the encryption
scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt'23] based on pseudorandom
group actions has PVD.
- with PVD for attribute-based encryption, quantum
fully-homomorphic encryption, witness encryption, time-revocable
encryption, assuming and trapdoored variants of injective (or
almost-regular) one-way functions.Comment: 52 page
Numerical Modeling of Magnetic Field Deformation as Related to Susceptibility Measured with an MR System
The possibility is studied of numerical modeling of magnetic field deformations in the environment of measured diamagnetic and paramagnetic samples for the purposes of studying magnetic resonance (MR) image deformations owing to the susceptibility of heterogeneous materials (objects). The verification was realized using a simple sample configuration (circular plate), and the numerically modeled cross-sections were compared with the experimentally obtained values of the magnetic field measured by the MR gradient echo technology. The results show that it is possible – via a technical calculation – to determine a magnetic field deformation in the environment of complex-shaped or non-homogeneous structures in the MR experiments
case of Czech Republic
Thesis(Master) --KDI School:Master of Public Policy,2012masterpublishedMichal Bartusek
- …