8,796 research outputs found
Handbook for estimating toxic fuel hazards
Computer program predicts, from readily available meteorological data, concentration and dosage fields downwind from ground-level and elevated sources of toxic fuel emissions. Mathematical model is applicable to hot plume rise from industrial stacks and should also be of interest to air pollution meteorologists
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the
digital domain and the physical world. Although the research community has
developed a large number of cryptographic primitives and has demonstrated their
usability in all-digital communication, many of them have not yet made their
way into the real world due to usability aspects. We aim to make another step
towards a tighter integration of digital cryptography into real world
interactions. We describe Ubic, a framework that allows users to bridge the gap
between digital cryptography and the physical world. Ubic relies on
head-mounted displays, like Google Glass, resource-friendly computer vision
techniques as well as mathematically sound cryptographic primitives to provide
users with better security and privacy guarantees. The framework covers key
cryptographic primitives, such as secure identification, document verification
using a novel secure physical document format, as well as content hiding. To
make a contribution of practical value, we focused on making Ubic as simple,
easily deployable, and user friendly as possible.Comment: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science,
pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, German
Parametric instabilities in magnetized multicomponent plasmas
This paper investigates the excitation of various natural modes in a
magnetized bi-ion or dusty plasma. The excitation is provided by parametrically
pumping the magnetic field. Here two ion-like species are allowed to be fully
mobile. This generalizes our previous work where the second heavy species was
taken to be stationary. Their collection of charge from the background neutral
plasma modifies the dispersion properties of the pump and excited waves. The
introduction of an extra mobile species adds extra modes to both these types of
waves. We firstly investigate the pump wave in detail, in the case where the
background magnetic field is perpendicular to the direction of propagation of
the pump wave. Then we derive the dispersion equation relating the pump to the
excited wave for modes propagating parallel to the background magnetic field.
It is found that there are a total of twelve resonant interactions allowed,
whose various growth rates are calculated and discussed.Comment: Published in May 2004; this is a late submission to the archive. 14
pages, 8 figure
Non-malleable encryption: simpler, shorter, stronger
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit
A Seismic Site-Amplification Map for Memphis, Shelby County, Tennessee From Geophysical, Geotechnical, and Geological Measurements
As a part of the U.S. Geological Survey’s (USGS) Memphis, Shelby County Seismic Hazard Mapping project, geophysical and geotechnical subsurface data are being collected into a subsurface database for Shelby County, Tennessee. Memphis is a major urban area near the New Madrid Seismic Zone in the central U.S. and has a building stock that is largely vulnerable to even moderate ground shaking from earthquakes. The subsurface geological, geotechnical, and geophysical information gathered will be used to construct a three-dimensional model of the geology and seismic velocity structure of the area down to Paleozoic bedrock (up to 1 km deep) for the purpose of determining site amplifications. The resulting characteristic seismic velocity profiles will include variability in S-wave velocity with depth and will be used to provide the uncertainty estimates in site amplification measurements. The mean site amplification map for Shelby County will serve as an amplification potential map for use in the seismic hazard assessment portion of the project
Correspondence: No substantial long-term bias in the Cenozoic benthic foraminifera oxygen-isotope record
Publisher PDFPeer reviewe
Quantum protocols for anonymous voting and surveying
We describe quantum protocols for voting and surveying. A key feature of our
schemes is the use of entangled states to ensure that the votes are anonymous
and to allow the votes to be tallied. The entanglement is distributed over
separated sites; the physical inaccessibility of any one site is sufficient to
guarantee the anonymity of the votes. The security of these protocols with
respect to various kinds of attack is discussed. We also discuss classical
schemes and show that our quantum voting protocol represents a N-fold reduction
in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio
The thermal and two-particle stress-energy must be ill-defined on the 2-d Misner space chronology horizon
We show that an analogue of the (four dimensional) image sum method can be
used to reproduce the results, due to Krasnikov, that for the model of a real
massless scalar field on the initial globally hyperbolic region IGH of
two-dimensional Misner space there exist two-particle and thermal Hadamard
states (built on the conformal vacuum) such that the (expectation value of the
renormalised) stress-energy tensor in these states vanishes on IGH. However, we
shall prove that the conclusions of a general theorem by Kay, Radzikowski and
Wald still apply for these states. That is, in any of these states, for any
point b on the Cauchy horizon and any neighbourhood N of b, there exists at
least one pair of non-null related points (x,x'), with x and x' in the
intersection of IGH with N, such that (a suitably differentiated form of) its
two-point function is singular. (We prove this by showing that the two-point
functions of these states share the same singularities as the conformal vacuum
on which they are built.) In other words, the stress-energy tensor in any of
these states is necessarily ill-defined on the Cauchy horizon.Comment: 6 pages, LaTeX, RevTeX, no figure
Visualization of Bacterial Protein Complexes Labeled with Fluorescent Proteins and Nanobody Binders for STED Microscopy
In situ visualization of molecular assemblies near their macromolecular scale is a powerful tool to investigate fundamental cellular processes. Super-resolution light microscopies (SRM) overcome the diffraction limit and allow researchers to investigate molecular arrangements at the nanoscale. However, in bacterial cells, visualization of these assemblies can be challenging because of their small size and the presence of the cell wall. Thus, although conceptually promising, successful application of SRM techniques requires careful optimization in labeling biochemistry, fluorescent dye choice, bacterial biology and microscopy to gain biological insights. Here, we apply Stimulated Emission Depletion (STED) microscopy to visualize cell division proteins in bacterial cells, specifically E. coli and B. subtilis. We applied nanobodies that specifically recognize fluorescent proteins, such as GFP, mCherry2 and PAmCherry, fused to targets for STED imaging and evaluated the effect of various organic fluorescent dyes on the performance of STED in bacterial cells. We expect this research to guide scientists for in situ macromolecular visualization using STED in bacterial systems
- …