4,340 research outputs found
Secure exchange of information by synchronization of neural networks
A connection between the theory of neural networks and cryptography is
presented. A new phenomenon, namely synchronization of neural networks is
leading to a new method of exchange of secret messages. Numerical simulations
show that two artificial networks being trained by Hebbian learning rule on
their mutual outputs develop an antiparallel state of their synaptic weights.
The synchronized weights are used to construct an ephemeral key exchange
protocol for a secure transmission of secret data. It is shown that an opponent
who knows the protocol and all details of any transmission of the data has no
chance to decrypt the secret message, since tracking the weights is a hard
problem compared to synchronization. The complexity of the generation of the
secure channel is linear with the size of the network.Comment: 11 pages, 5 figure
Learning and predicting time series by neural networks
Artificial neural networks which are trained on a time series are supposed to
achieve two abilities: firstly to predict the series many time steps ahead and
secondly to learn the rule which has produced the series. It is shown that
prediction and learning are not necessarily related to each other. Chaotic
sequences can be learned but not predicted while quasiperiodic sequences can be
well predicted but not learned.Comment: 5 page
Secure and linear cryptosystems using error-correcting codes
A public-key cryptosystem, digital signature and authentication procedures
based on a Gallager-type parity-check error-correcting code are presented. The
complexity of the encryption and the decryption processes scale linearly with
the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted
by Bob, whereas a private-noise added by Alice to a given fraction of the
ciphertext of each encrypted plaintext serves to increase the secure channel
and is the cornerstone for digital signatures and authentication. Various
scenarios are discussed including the possible actions of the opponent Oscar as
an eavesdropper or as a disruptor
Statistical mechanical aspects of joint source-channel coding
An MN-Gallager Code over Galois fields, , based on the Dynamical Block
Posterior probabilities (DBP) for messages with a given set of autocorrelations
is presented with the following main results: (a) for a binary symmetric
channel the threshold, , is extrapolated for infinite messages using the
scaling relation for the median convergence time, ;
(b) a degradation in the threshold is observed as the correlations are
enhanced; (c) for a given set of autocorrelations the performance is enhanced
as is increased; (d) the efficiency of the DBP joint source-channel coding
is slightly better than the standard gzip compression method; (e) for a given
entropy, the performance of the DBP algorithm is a function of the decay of the
correlation function over large distances.Comment: 6 page
Generation of unpredictable time series by a Neural Network
A perceptron that learns the opposite of its own output is used to generate a
time series. We analyse properties of the weight vector and the generated
sequence, like the cycle length and the probability distribution of generated
sequences. A remarkable suppression of the autocorrelation function is
explained, and connections to the Bernasconi model are discussed. If a
continuous transfer function is used, the system displays chaotic and
intermittent behaviour, with the product of the learning rate and amplification
as a control parameter.Comment: 11 pages, 14 figures; slightly expanded and clarified, mistakes
corrected; accepted for publication in PR
Investigation of the Ultrastructural Changes and Hydroxyproline Levels in Mice Lungs Induced by Bleomycin Treatment
The present study was planned to investigate the ultrastructural changes and hydroxyproline level in the lungs of the mice induced by bleomycin treatment, Following 4 weeks of bleomyein treatment, the lungs were examined histologically (using light and electron microscopes) and the hydroxyproline level was measured at 4th, 6th, 8th, and 10th weeks of the experiment. Biochemical and structural changes that normally occur in lung fibrosis were also observed in our study, For example; lung hydroxyproline level increased progressively (p<0.05) and structural changes advanced to interstitial fibrosis from 4th to 10th weeks of the experiment Alveolar septum thickening, type II pneumoeytes increase and mononuclear cell infiltration (lymphocyte, monocyte and macrophage) were seen. In addition, membrane-bound rod-shaped amorphous structures in the cytoplasm of alveolar macrophages were increased significantly (p<0.05).It is concluded that. bieomycin treatment may produce fibrosis due to increase in interstitial connective tissue, hydroxyprolinc level and the number of alveolar macrophages However, more studies are needed to demonstrate whether there isa relationship between the increased membranebound rod shaped amorphous structures and the occurrence of fibrosis
Shannon Meets Carnot: Generalized Second Thermodynamic Law
The classical thermodynamic laws fail to capture the behavior of systems with
energy Hamiltonian which is an explicit function of the temperature. Such
Hamiltonian arises, for example, in modeling information processing systems,
like communication channels, as thermal systems. Here we generalize the second
thermodynamic law to encompass systems with temperature-dependent energy
levels, , where denotes averaging over
the Boltzmann distribution and reveal a new definition to the basic notion of
temperature. This generalization enables to express, for instance, the mutual
information of the Gaussian channel as a consequence of the fundamental laws of
nature - the laws of thermodynamics
Entangled light pulses from single cold atoms
The coherent interaction between a laser-driven single trapped atom and an
optical high-finesse resonator allows to produce entangled multi-photon light
pulses on demand. The mechanism is based on the mechanical effect of light. The
degree of entanglement can be controlled through the parameters of the laser
excitation. Experimental realization of the scheme is within reach of current
technology. A variation of the technique allows for controlled generation of
entangled subsequent pulses, with the atomic motion serving as intermediate
memory of the quantum state.Comment: 4 pages, 3 figures, revised version (new scheme for generation of
subsequent pairs of entangled pulses included). Accepted for publication in
Phys. Rev. Let
Fluorescent ligand for human progesterone receptor imaging in live cells.
We employed molecular modeling to design and then synthesize fluorescent ligands for the human progesterone receptor. Boron dipyrromethene (BODIPY) or tetramethylrhodamine were conjugated to the progesterone receptor antagonist RU486 (Mifepristone) through an extended hydrophilic linker. The fluorescent ligands demonstrated comparable bioactivity to the parent antagonist in live cells and triggered nuclear translocation of the receptor in a specific manner. The BODIPY labeled ligand was applied to investigate the dependency of progesterone receptor nuclear translocation on partner proteins and to show that functional heat shock protein 90 but not immunophilin FKBP52 activity is essential. A tissue distribution study indicated that the fluorescent ligand preferentially accumulates in tissues that express high levels of the receptor in vivo. The design and properties of the BODIPY-labeled RU486 make it a potential candidate for in vivo imaging of PR by positron emission tomography through incorporation of (18)F into the BODIPY core
Finite size effects and error-free communication in Gaussian channels
The efficacy of a specially constructed Gallager-type error-correcting code
to communication in a Gaussian channel is being examined. The construction is
based on the introduction of complex matrices, used in both encoding and
decoding, which comprise sub-matrices of cascading connection values. The
finite size effects are estimated for comparing the results to the bounds set
by Shannon. The critical noise level achieved for certain code-rates and
infinitely large systems nearly saturates the bounds set by Shannon even when
the connectivity used is low
- …