8,796 research outputs found

    Handbook for estimating toxic fuel hazards

    Get PDF
    Computer program predicts, from readily available meteorological data, concentration and dosage fields downwind from ground-level and elevated sources of toxic fuel emissions. Mathematical model is applicable to hot plume rise from industrial stacks and should also be of interest to air pollution meteorologists

    Ubic: Bridging the gap between digital cryptography and the physical world

    Full text link
    Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework that allows users to bridge the gap between digital cryptography and the physical world. Ubic relies on head-mounted displays, like Google Glass, resource-friendly computer vision techniques as well as mathematically sound cryptographic primitives to provide users with better security and privacy guarantees. The framework covers key cryptographic primitives, such as secure identification, document verification using a novel secure physical document format, as well as content hiding. To make a contribution of practical value, we focused on making Ubic as simple, easily deployable, and user friendly as possible.Comment: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, German

    Parametric instabilities in magnetized multicomponent plasmas

    Full text link
    This paper investigates the excitation of various natural modes in a magnetized bi-ion or dusty plasma. The excitation is provided by parametrically pumping the magnetic field. Here two ion-like species are allowed to be fully mobile. This generalizes our previous work where the second heavy species was taken to be stationary. Their collection of charge from the background neutral plasma modifies the dispersion properties of the pump and excited waves. The introduction of an extra mobile species adds extra modes to both these types of waves. We firstly investigate the pump wave in detail, in the case where the background magnetic field is perpendicular to the direction of propagation of the pump wave. Then we derive the dispersion equation relating the pump to the excited wave for modes propagating parallel to the background magnetic field. It is found that there are a total of twelve resonant interactions allowed, whose various growth rates are calculated and discussed.Comment: Published in May 2004; this is a late submission to the archive. 14 pages, 8 figure

    Non-malleable encryption: simpler, shorter, stronger

    Get PDF
    In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit

    A Seismic Site-Amplification Map for Memphis, Shelby County, Tennessee From Geophysical, Geotechnical, and Geological Measurements

    Get PDF
    As a part of the U.S. Geological Survey’s (USGS) Memphis, Shelby County Seismic Hazard Mapping project, geophysical and geotechnical subsurface data are being collected into a subsurface database for Shelby County, Tennessee. Memphis is a major urban area near the New Madrid Seismic Zone in the central U.S. and has a building stock that is largely vulnerable to even moderate ground shaking from earthquakes. The subsurface geological, geotechnical, and geophysical information gathered will be used to construct a three-dimensional model of the geology and seismic velocity structure of the area down to Paleozoic bedrock (up to 1 km deep) for the purpose of determining site amplifications. The resulting characteristic seismic velocity profiles will include variability in S-wave velocity with depth and will be used to provide the uncertainty estimates in site amplification measurements. The mean site amplification map for Shelby County will serve as an amplification potential map for use in the seismic hazard assessment portion of the project

    Quantum protocols for anonymous voting and surveying

    Get PDF
    We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of entangled states to ensure that the votes are anonymous and to allow the votes to be tallied. The entanglement is distributed over separated sites; the physical inaccessibility of any one site is sufficient to guarantee the anonymity of the votes. The security of these protocols with respect to various kinds of attack is discussed. We also discuss classical schemes and show that our quantum voting protocol represents a N-fold reduction in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio

    The thermal and two-particle stress-energy must be ill-defined on the 2-d Misner space chronology horizon

    Get PDF
    We show that an analogue of the (four dimensional) image sum method can be used to reproduce the results, due to Krasnikov, that for the model of a real massless scalar field on the initial globally hyperbolic region IGH of two-dimensional Misner space there exist two-particle and thermal Hadamard states (built on the conformal vacuum) such that the (expectation value of the renormalised) stress-energy tensor in these states vanishes on IGH. However, we shall prove that the conclusions of a general theorem by Kay, Radzikowski and Wald still apply for these states. That is, in any of these states, for any point b on the Cauchy horizon and any neighbourhood N of b, there exists at least one pair of non-null related points (x,x'), with x and x' in the intersection of IGH with N, such that (a suitably differentiated form of) its two-point function is singular. (We prove this by showing that the two-point functions of these states share the same singularities as the conformal vacuum on which they are built.) In other words, the stress-energy tensor in any of these states is necessarily ill-defined on the Cauchy horizon.Comment: 6 pages, LaTeX, RevTeX, no figure

    Visualization of Bacterial Protein Complexes Labeled with Fluorescent Proteins and Nanobody Binders for STED Microscopy

    Get PDF
    In situ visualization of molecular assemblies near their macromolecular scale is a powerful tool to investigate fundamental cellular processes. Super-resolution light microscopies (SRM) overcome the diffraction limit and allow researchers to investigate molecular arrangements at the nanoscale. However, in bacterial cells, visualization of these assemblies can be challenging because of their small size and the presence of the cell wall. Thus, although conceptually promising, successful application of SRM techniques requires careful optimization in labeling biochemistry, fluorescent dye choice, bacterial biology and microscopy to gain biological insights. Here, we apply Stimulated Emission Depletion (STED) microscopy to visualize cell division proteins in bacterial cells, specifically E. coli and B. subtilis. We applied nanobodies that specifically recognize fluorescent proteins, such as GFP, mCherry2 and PAmCherry, fused to targets for STED imaging and evaluated the effect of various organic fluorescent dyes on the performance of STED in bacterial cells. We expect this research to guide scientists for in situ macromolecular visualization using STED in bacterial systems
    corecore