350 research outputs found

    Communication and Powering Scheme for Wireless and Battery-Less Measurement

    Get PDF
    The paper presents solution for wireless and battery-less measurement in the enclosed areas. The principle is based on passive RFID, nevertheless this paper is focused on high power-demanding applications such as MEMS accelerometers, gas sensors, piezoresistive strain gauges, etc. Standard FRID communication scheme (sensing the input current change on the primary side) cannot be used in this case, because the communication channel is overloaded by the high power load. Paper presents possible solution which is based on the dual frequency scheme – one frequency for powering and other for the communication. This is ensuring capability for measurement up to several centimeters on the frequency bands 125 kHz and 375 kHz. It can be suitable for continual measurement in isolated systems such as the rotating objects, concrete walls, enclosed plastic barrels, high temperature chambers etc

    How Corruption is Tolerated in the Greek Public Sector: Toward a Second-Order Theory of Normalization

    Full text link
    Secrecy and “social cocooning” are critical mechanisms allowing the normalization of corruption within organizations. Less studied are processes of normalization that occur when corruption is an “open secret.” Drawing on an empirical study of Greek public-sector organizations, we suggest that a second-order normalization process ensues among non-corrupt onlookers both inside and beyond the organization. What is normalized at this level is not corruption, but its tolerance, which we disaggregate into agent-focused tolerance and structure-focused tolerance. Emphasizing the importance of non-corrupt bystanders, we claim that second-order normalization helps corruption persist in situations where its presence is openly acknowledged. This adds an important new dimension to normalization theory and we unpack its implications for both future research and practice in this area. </jats:p

    The Assessment of Quality and Modeling Educational Services In Payame Noor University

    Get PDF
    Abstract: One Of The Most Critical Steps Of  The Educational Planning Is The Evaluation Of Educational Goals.Identifying This Aim Requaires A Tool By Which To Measure The Quality Of  Programs.The Aim of This Study was  Assessment The Quality And Modeling Educational Services In Distance Education In Iran. The Method Of Research  Was Descriptive.In This Research, The Required Data Were Collected From A Sample Of 119 Consist Of  Male And Female Ph.D Student And Faculty Member Who Selected By Stratified  Sampling Method.The Formal Validity Of The Questionnaire Was Confirmed By The Specialists In The Field And The Reliability Was Calculated By K –Alfa At Laest (0.78).Data were Analized By Descriptive And Inferential (Factor Analysis) statistical Indexes. The Results Indicated That The Quality  Of Educational Services  Indexs In Curriculum Stractures,Student Services Are Average And The Faculty Member Support Is low And Weakness.In Addition,The Results Indicated That The 3 Factor Model With (RMSEA=0/085) And (CFI=0/97) Has Suitable Fitness

    Coexisting depressive symptoms do not limit the benefits of chronic neuromodulation: A study of over 200 patients

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/142918/1/nau23356_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/142918/2/nau23356.pd

    Lower Bounds on the Degree of Block Ciphers

    Get PDF
    Only the method to estimate the upper bound of the algebraic degree on block ciphers is known so far, but it is not useful for the designer to guarantee the security. In this paper we provide meaningful lower bounds on the algebraic degree of modern block ciphers

    Vitamin A Deficiency after Gastric Bypass Surgery: An Underreported Postoperative Complication

    Get PDF
    Introduction. Few data are available on vitamin A deficiency in the gastric bypass population. Methods. We performed a retrospective chart review of gastric bypass patients (n = 69, 74% female). The relationship between serum vitamin A concentration and markers of protein metabolism at 6-weeks and 1-year post-operative were assessed. Results. The average weight loss at 6-weeks and 1-year following surgery was 20.1 ± 9.1 kg and 44.1 ± 17.1 kg, respectively. At 6 weeks and 1 year after surgery, 35% and 18% of patients were vitamin A deficient, (<325 mcg/L). Similarly, 34% and 19% had low pre-albumin levels (<18 mg/dL), at these time intervals. Vitamin A directly correlated with pre-albumin levels at 6 weeks (r = 0.67, P < 0.001) and 1-year (r = 0.67,  P < 0.0001). There was no correlation between the roux limb length measurement and pre-albumin or vitamin A serum concentrations at these post-operative follow-ups. Vitamin A levels and markers of liver function testing were also unrelated. Conclusion. Vitamin A deficiency is common after bariatric surgery and is associated with a low serum concentration of pre-albumin. This fat-soluble vitamin should be measured in patients who have undergone gastric bypass surgery and deficiency should be suspected in those with evidence of protein-calorie malnutrition

    Unaligned Rebound Attack: Application on Keccak

    Get PDF
    We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We use these differential paths in a rebound attack setting and adapt this powerful freedom degrees utilization in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted version of Keccak. The complexity of the 8 round distinguisher is 2491.472^{491.47}. Our results have been implemented and verified experimentally on a small version of Keccak. This is currently the best known differential attack against the internal permutations of Keccak

    Generation of Quantum Correlations in Bipartite Gaussian Open Quantum Systems

    Get PDF
    We describe the generation of quantum correlations (entanglement, discord and steering) in a system composed of two coupled non-resonant bosonic modes immersed in a common thermal reservoir, in the framework of the theory of open systems. We show that for separable initial squeezed thermal states entanglement generation may take place, for definite values of squeezing parameter, average photon numbers, temperature of the thermal bath, dissipation constant and strength of interaction between the two bosonic modes. We also show that for initial uni-modal squeezed states Gaussian discord can be generated for all non-zero values of the strength of interaction between the modes. Likewise, for an initial separable state, a generation of Gaussian steering may take place temporarily, for definite values of the parameters characterizing the initial state and the thermal environment, and the strength of coupling between the two modes

    New Results on the SymSum Distinguisher on Round-Reduced SHA3

    Get PDF
    In ToSC 2017 Saha et al. demonstrated an interesting property of SHA3 based on higher-order vectorial derivatives which led to self-symmetry based distinguishers referred to as SymSum and bettered the complexity w.r.t the well-studied ZeroSum distinguisher by a factor of 4. This work attempts to take a fresh look at this distinguisher in the light of the linearization technique developed by Guo et al. in Asiacrypt 2016. It is observed that the efficiency of SymSum against ZeroSum drops from 4 to 2 for any number of rounds linearized. This is supported by theoretical proofs. SymSum augmented with linearization can penetrate up to two more rounds as against the classical version. In addition to that, one more round is extended by inversion technique on the final hash values. The combined approach leads to distinguishers up to 9 rounds of SHA3 variants with a complexity of only 264 which is better than the equivalent ZeroSum distinguisher by the factor of 2. To the best of our knowledge this is the best distinguisher available on this many rounds of SHA3
    • 

    corecore