176 research outputs found

    Modern Methods of heating for family houses

    Get PDF
    Tato bakalářská práce pojednává o moderních způsobech regulace ve vytápění se zaměřením především na vytápění teplovodní, které má v dnešní době stále nejrozšířenější zastoupení. Cílem této práce je popsat jednotlivé metody regulace, ukázat na nich specifické vlastnosti, jejich uplatnění v praxi, výhody a nevýhody. Práce obsahuje cenové srovnání jednotlivých regulačních prvků. Tato práce může rovněž vodítkem pro řadového uživatele při seznámení se s možnostmi regulace a výběru optimální varianty vzhledem ke komfortu bydlení a nákladům na pořízení a instalaci. Součástí práce je také zpracován konkrétní návrh, který se zabývá výběrem regulačních prvků pro otopnou soustavu. V tomto příkladě jsou řešena jak stránka efektivnosti, tak stránka nákladů.This thesis is dealing with the modern methods of control in heating, focusing especially on hot water heating, which is still the most widely represented method today. The aim of this work is to describe the various methods of control, show specific characteristics and then a practical application in the profession, advantages disadvantages. The work includes a price comparison of the different regulatory elements. This work may also give a guidance to the ordinary user, to familiarize himself with the regulatory options and selecting the optimal alternatives due to the comfort of living and the cost of purchase and installation. The work also contains a specific concept, which deals with the selection of control devices for heating system. In this example efficiency and costs are being solved.

    On existence of proper solutions of quasilinear second order differential equations

    Get PDF
    In the paper, the nonlinear differential equation (a(t)yp1y)+b(t)g(y)+r(t)f(y)=e(t)(a(t)|y^{\prime}|^{p-1}y^{\prime})^{\prime}+b(t)g(y^{\prime})+r(t)f(y)=e(t) is studied. Sufficient conditions for the nonexistence of singular solutions of the first and second kind are given. Hence, sufficient conditions for all nontrivial solutions to be proper are derived. Sufficient conditions for the nonexistence of weakly oscillatory solutions are given

    Indistinguishability Obfuscation of Null Quantum Circuits and Applications

    Get PDF
    We study the notion of indistinguishability obfuscation for null quantum circuits (quantum null-iO). We present a construction assuming: - The quantum hardness of learning with errors (LWE). - Post-quantum indistinguishability obfuscation for classical circuits. - A notion of "dual-mode" classical verification of quantum computation (CVQC). We give evidence that our notion of dual-mode CVQC exists by proposing a scheme that is secure assuming LWE in the quantum random oracle model (QROM). Then we show how quantum null-iO enables a series of new cryptographic primitives that, prior to our work, were unknown to exist even making heuristic assumptions. Among others, we obtain the first witness encryption scheme for QMA, the first publicly verifiable non-interactive zero-knowledge (NIZK) scheme for QMA, and the first attribute-based encryption (ABE) scheme for BQP

    Publicly-Verifiable Deletion via Target-Collapsing Functions

    Full text link
    We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled image. We show that target-collapsing hashes enable publicly-verifiable deletion (PVD), proving conjectures from [Poremba, ITCS'23] and demonstrating that the Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes support PVD under the LWE assumption. We further build on this framework to obtain a variety of primitives supporting publicly-verifiable deletion from weak cryptographic assumptions, including: - Commitments with PVD assuming the existence of injective one-way functions, or more generally, almost-regular one-way functions. Along the way, we demonstrate that (variants of) target-collapsing hashes can be built from almost-regular one-way functions. - Public-key encryption with PVD assuming trapdoored variants of injective (or almost-regular) one-way functions. We also demonstrate that the encryption scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt'23] based on pseudorandom group actions has PVD. - XX with PVD for X{X \in \{attribute-based encryption, quantum fully-homomorphic encryption, witness encryption, time-revocable encryption}\}, assuming XX and trapdoored variants of injective (or almost-regular) one-way functions.Comment: 52 page

    Numerical Modeling of Magnetic Field Deformation as Related to Susceptibility Measured with an MR System

    Get PDF
    The possibility is studied of numerical modeling of magnetic field deformations in the environment of measured diamagnetic and paramagnetic samples for the purposes of studying magnetic resonance (MR) image deformations owing to the susceptibility of heterogeneous materials (objects). The verification was realized using a simple sample configuration (circular plate), and the numerically modeled cross-sections were compared with the experimentally obtained values of the magnetic field measured by the MR gradient echo technology. The results show that it is possible – via a technical calculation – to determine a magnetic field deformation in the environment of complex-shaped or non-homogeneous structures in the MR experiments

    case of Czech Republic

    Get PDF
    Thesis(Master) --KDI School:Master of Public Policy,2012masterpublishedMichal Bartusek
    corecore