1,465 research outputs found

    Effective Community Search for Large Attributed Graphs

    Get PDF
    postprin

    Bifurcation Boundary Conditions for Switching DC-DC Converters Under Constant On-Time Control

    Full text link
    Sampled-data analysis and harmonic balance analysis are applied to analyze switching DC-DC converters under constant on-time control. Design-oriented boundary conditions for the period-doubling bifurcation and the saddle-node bifurcation are derived. The required ramp slope to avoid the bifurcations and the assigned pole locations associated with the ramp are also derived. The derived boundary conditions are more general and accurate than those recently obtained. Those recently obtained boundary conditions become special cases under the general modeling approach presented in this paper. Different analyses give different perspectives on the system dynamics and complement each other. Under the sampled-data analysis, the boundary conditions are expressed in terms of signal slopes and the ramp slope. Under the harmonic balance analysis, the boundary conditions are expressed in terms of signal harmonics. The derived boundary conditions are useful for a designer to design a converter to avoid the occurrence of the period-doubling bifurcation and the saddle-node bifurcation.Comment: Submitted to International Journal of Circuit Theory and Applications on August 10, 2011; Manuscript ID: CTA-11-016

    Efficient key integrity verification for quantum cryptography using combinatorial group testing

    Get PDF
    Quantum Information and Computation VIII 77020F (April 23, 2010)In quantum cryptography, the key can be directly distributed to the communicating parties through the communication channel. The security is guaranteed by the quantum properties of the channel. However, the transmitted key may contain errors due to the noise of the channel. Key integrity verification is an indispensable step in quantum cryptography and becomes an important problem in higher speed systems. Computing only one hash value for the key string does not provide an effective solution as it may lead to dropping all the bits once the hash values on both sides do not agree. In this paper, we introduce a new idea of using the technique of combinatorial group testing, which seems to be an unrelated topic, to design a scheme to identify the error bits to avoid dropping all the bits. Our scheme can precisely locate the error bits if the number of error bits is within the maximum set by the scheme while the overhead is insignificant based on our experiments (additional bits: 0.1% of the key; time for computing the hash values: 16ms; verification time: 22 ms). Also, even if the number of error bits is higher than the maximum set by the scheme, only some correct bits may be misclassified as error bits but not the vice versa. The results show that we can still keep the majority of the correct bits (e.g. the bits discarded due to misclassification is only 5% of the whole string even if the number of error bits is 10 times of the maximum). © 2010 SPIE.published_or_final_versionThe 2010 SPIE Conference on Defense, Security, and Sensing, Orlando, FL., 5 April 2010. In Proceedings of SPIE - The International Society for Optical Engineering, v. 7702, p. 77020F-1 - 77020F-

    Effective Community Search over Large Spatial Graphs

    Get PDF
    published_or_final_versio

    C-Explorer: Browsing Communities in Large Graphs

    Get PDF
    preprin

    A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography

    Get PDF
    Microcontroller can be easily adopted in various applications with a variety of peripherals due to its merits of small size, simple architecture and etc. However, the limited computing power restricts its application in cryptography. In this paper, we try to integrate microcontroller with different peripheral devices to support more powerful cryptography computation in a simple and efficient way. Based on the most popular open source microcontroller development platform, Arduino, we design and develop a cryptographic hardware device for a real-life application which provides data protection functions for authority and integrity with RSA cryptography supported. With the peripherals Java card, our Arduino-cored solution is able to efficiently generate digital signature of photos taken by smart phone using the asymmetric cryptographic algorithm, RSA, which has a poor performance if it is directly implemented on microcontroller. The experimental results show that the device can finish a RSA 1024-bit encryption in 82.2 microseconds, which is reasonable in real application scenario and illustrates the feasibility of implementing more complicated cryptographic system using microcontroller.published_or_final_versio

    Progenitor-like cells derived from mouse kidney protect against renal fibrosis in a remnant kidney model via decreased endothelial mesenchymal transition

    Get PDF
    Showing A quantification of GFP-positive cells in the lung after intravenous injection of MKPCs in five-sixths nephrectomized mice (y axis shows the number of cells, while the x axis (FL1-H) shows the fluorescence intensity; M1 is the area of GFP-positive cells) and B immunohistochemistry of the lung after intravenous injection of MKPCs into a mouse that underwent five-sixths nephrectomy. Few GFP positive cells were found in the lung at the first day but there were no GFP-positive cells at week 14. (TIFF 2253 kb

    Maintaining hard disk integrity with digital legal professional privilege (LPP) data

    Get PDF
    published_or_final_versio

    Local antiferromagnetic exchange and collaborative Fermi surface as key ingredients of high temperature superconductors

    Get PDF
    Cuprates, ferropnictides and ferrochalcogenides are three classes of unconventional high-temperature superconductors, who share similar phase diagrams in which superconductivity develops after a magnetic order is suppressed, suggesting a strong interplay between superconductivity and magnetism, although the exact picture of this interplay remains elusive. Here we show that there is a direct bridge connecting antiferromagnetic exchange interactions determined in the parent compounds of these materials to the superconducting gap functions observed in the corresponding superconducting materials. High superconducting transition temperature is achieved when the Fermi surface topology matches the form factor of the pairing symmetry favored by local magnetic exchange interactions. Our result offers a principle guide to search for new high temperature superconductors.Comment: 12 pages, 5 figures, 1 table, 1 supplementary materia
    • …
    corecore