1,311 research outputs found
When is a Function Securely Computable?
A subset of a set of terminals that observe correlated signals seek to
compute a given function of the signals using public communication. It is
required that the value of the function be kept secret from an eavesdropper
with access to the communication. We show that the function is securely
computable if and only if its entropy is less than the "aided secret key"
capacity of an associated secrecy generation model, for which a single-letter
characterization is provided
Social Media Alcohol Marketing and Its Impact on Young People’s Alcohol Use: A Comparison between India and Australia
A cross-national comparison of 1) marketing strategies used by leading Indian and Australian alcohol brands on their official social media (SM) pages and 2) the association between exposure to SM alcohol marketing and alcohol use among young Indians and Australians, was conducted. Results suggest that alcohol companies tailor strategies to specific national contexts to engage users with these strategies. Significant associations were identified between alcohol-related content posted on SM and young people’s alcohol use
Reduction and Swelling Behaviour of Fired Iron Ore Pellets
The present project work on “Reduction and Swelling Behaviour of Fired Iron Ore Pellets” was undertaken with a view to promote the effective utilization of iron ore and coal fines in sponge iron making. Presently, India has become the world leader in sponge iron production and the production of steel by DR-EAF route is increasing day by day. In the present project work, the effect of addition of concentrated sugarcane juice binder on the physical properties of fired iron ore pellets was investigated. The crushing strength and drop number were found to be maximum at 2% binder addition, followed by a decrease with further increase in binder concentration. A reverse trend was observed in the case of porosity, i.e. porosity of fired pellets increased with rise in binder concentration from 2% to 6%. The pellets fired at 13000C were processed for reduction and swelling studies in different types of coal. The degree of reduction of fired iron ore pellets increased with increase of reduction temperature and time up to the range studied. The extent of swelling in fired iron ore pellets during their production increased with increase of reduction time, most probably due to the structural changes and fibrous growth of iron particles. SEM images of few reduced iron ore pellets were also taken
Anti-Phishing Techniques in Cryptography
Phishing is a process in which Phishers try to leak out the credentials of users by hosting a fake web page on user's browser. To save users from phishing attacks, many researchers have dug deep and presented their insights. Nowadays, in the era of 21st century, banks are using the OTP and visual cryptography for the authentication of both sides i.e. user and the bank. In this paper, we are proposing a methodology in which a user will need to give his finger prints as an authentication
Handling constraints in Robust multi-objective optimization
Robust multi-objective optimization has emerged as an active research. A recent study proposed two different definitions of robust solutions in the context of multi-objective optimization. In this paper, we extend the concepts for finding robust solutions in the presence of active constraints. The meaning of robust solutions for constrained problems is demonstrated by suggesting three test problems and simulating an evolutionary multi-objective optimization method using the two definitions of robustness. The inclusion of constraint handling strategies makes the multi-objective robust optimization procedure more pragmatic and the procedure is now ready to be applied to real-world problems
Quantum Sensor Network Algorithms for Transmitter Localization
A quantum sensor (QS) is able to measure various physical phenomena with
extreme sensitivity. QSs have been used in several applications such as atomic
interferometers, but few applications of a quantum sensor network (QSN) have
been proposed or developed. We look at a natural application of QSN --
localization of an event (in particular, of a wireless signal transmitter). In
this paper, we develop effective quantum-based techniques for the localization
of a transmitter using a QSN. Our approaches pose the localization problem as a
well-studied quantum state discrimination (QSD) problem and address the
challenges in its application to the localization problem. In particular, a
quantum state discrimination solution can suffer from a high probability of
error, especially when the number of states (i.e., the number of potential
transmitter locations in our case) can be high. We address this challenge by
developing a two-level localization approach, which localizes the transmitter
at a coarser granularity in the first level, and then, in a finer granularity
in the second level. We address the additional challenge of the impracticality
of general measurements by developing new schemes that replace the QSD's
measurement operator with a trained parameterized hybrid quantum-classical
circuit. Our evaluation results using a custom-built simulator show that our
best scheme is able to achieve meter-level (1-5m) localization accuracy; in the
case of discrete locations, it achieves near-perfect (99-100\%) classification
accuracy.Comment: 11 pages, 10 figure
- …