4,340 research outputs found

    Secure exchange of information by synchronization of neural networks

    Full text link
    A connection between the theory of neural networks and cryptography is presented. A new phenomenon, namely synchronization of neural networks is leading to a new method of exchange of secret messages. Numerical simulations show that two artificial networks being trained by Hebbian learning rule on their mutual outputs develop an antiparallel state of their synaptic weights. The synchronized weights are used to construct an ephemeral key exchange protocol for a secure transmission of secret data. It is shown that an opponent who knows the protocol and all details of any transmission of the data has no chance to decrypt the secret message, since tracking the weights is a hard problem compared to synchronization. The complexity of the generation of the secure channel is linear with the size of the network.Comment: 11 pages, 5 figure

    Learning and predicting time series by neural networks

    Full text link
    Artificial neural networks which are trained on a time series are supposed to achieve two abilities: firstly to predict the series many time steps ahead and secondly to learn the rule which has produced the series. It is shown that prediction and learning are not necessarily related to each other. Chaotic sequences can be learned but not predicted while quasiperiodic sequences can be well predicted but not learned.Comment: 5 page

    Secure and linear cryptosystems using error-correcting codes

    Full text link
    A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by Bob, whereas a private-noise added by Alice to a given fraction of the ciphertext of each encrypted plaintext serves to increase the secure channel and is the cornerstone for digital signatures and authentication. Various scenarios are discussed including the possible actions of the opponent Oscar as an eavesdropper or as a disruptor

    Statistical mechanical aspects of joint source-channel coding

    Full text link
    An MN-Gallager Code over Galois fields, qq, based on the Dynamical Block Posterior probabilities (DBP) for messages with a given set of autocorrelations is presented with the following main results: (a) for a binary symmetric channel the threshold, fcf_c, is extrapolated for infinite messages using the scaling relation for the median convergence time, tmed1/(fcf)t_{med} \propto 1/(f_c-f); (b) a degradation in the threshold is observed as the correlations are enhanced; (c) for a given set of autocorrelations the performance is enhanced as qq is increased; (d) the efficiency of the DBP joint source-channel coding is slightly better than the standard gzip compression method; (e) for a given entropy, the performance of the DBP algorithm is a function of the decay of the correlation function over large distances.Comment: 6 page

    Generation of unpredictable time series by a Neural Network

    Full text link
    A perceptron that learns the opposite of its own output is used to generate a time series. We analyse properties of the weight vector and the generated sequence, like the cycle length and the probability distribution of generated sequences. A remarkable suppression of the autocorrelation function is explained, and connections to the Bernasconi model are discussed. If a continuous transfer function is used, the system displays chaotic and intermittent behaviour, with the product of the learning rate and amplification as a control parameter.Comment: 11 pages, 14 figures; slightly expanded and clarified, mistakes corrected; accepted for publication in PR

    Investigation of the Ultrastructural Changes and Hydroxyproline Levels in Mice Lungs Induced by Bleomycin Treatment

    Get PDF
    The present study was planned to investigate the ultrastructural changes and hydroxyproline level in the lungs of the mice induced by bleomycin treatment, Following 4 weeks of bleomyein treatment, the lungs were examined histologically (using light and electron microscopes) and the hydroxyproline level was measured at 4th, 6th, 8th, and 10th weeks of the experiment. Biochemical and structural changes that normally occur in lung fibrosis were also observed in our study, For example; lung hydroxyproline level increased progressively (p<0.05) and structural changes advanced to interstitial fibrosis from 4th to 10th weeks of the experiment Alveolar septum thickening, type II pneumoeytes increase and mononuclear cell  infiltration (lymphocyte, monocyte and macrophage) were seen. In addition, membrane-bound rod-shaped amorphous structures in the cytoplasm of alveolar macrophages were increased significantly (p<0.05).It is concluded that. bieomycin treatment may produce fibrosis due to increase in interstitial connective tissue, hydroxyprolinc level and the number of alveolar macrophages However, more studies are needed to demonstrate whether there isa relationship between the increased membranebound rod shaped amorphous structures and the occurrence of fibrosis

    Shannon Meets Carnot: Generalized Second Thermodynamic Law

    Full text link
    The classical thermodynamic laws fail to capture the behavior of systems with energy Hamiltonian which is an explicit function of the temperature. Such Hamiltonian arises, for example, in modeling information processing systems, like communication channels, as thermal systems. Here we generalize the second thermodynamic law to encompass systems with temperature-dependent energy levels, dQ=TdS+dTdQ=TdS+dT, where denotes averaging over the Boltzmann distribution and reveal a new definition to the basic notion of temperature. This generalization enables to express, for instance, the mutual information of the Gaussian channel as a consequence of the fundamental laws of nature - the laws of thermodynamics

    Entangled light pulses from single cold atoms

    Get PDF
    The coherent interaction between a laser-driven single trapped atom and an optical high-finesse resonator allows to produce entangled multi-photon light pulses on demand. The mechanism is based on the mechanical effect of light. The degree of entanglement can be controlled through the parameters of the laser excitation. Experimental realization of the scheme is within reach of current technology. A variation of the technique allows for controlled generation of entangled subsequent pulses, with the atomic motion serving as intermediate memory of the quantum state.Comment: 4 pages, 3 figures, revised version (new scheme for generation of subsequent pairs of entangled pulses included). Accepted for publication in Phys. Rev. Let

    Fluorescent ligand for human progesterone receptor imaging in live cells.

    Get PDF
    We employed molecular modeling to design and then synthesize fluorescent ligands for the human progesterone receptor. Boron dipyrromethene (BODIPY) or tetramethylrhodamine were conjugated to the progesterone receptor antagonist RU486 (Mifepristone) through an extended hydrophilic linker. The fluorescent ligands demonstrated comparable bioactivity to the parent antagonist in live cells and triggered nuclear translocation of the receptor in a specific manner. The BODIPY labeled ligand was applied to investigate the dependency of progesterone receptor nuclear translocation on partner proteins and to show that functional heat shock protein 90 but not immunophilin FKBP52 activity is essential. A tissue distribution study indicated that the fluorescent ligand preferentially accumulates in tissues that express high levels of the receptor in vivo. The design and properties of the BODIPY-labeled RU486 make it a potential candidate for in vivo imaging of PR by positron emission tomography through incorporation of (18)F into the BODIPY core

    Finite size effects and error-free communication in Gaussian channels

    Get PDF
    The efficacy of a specially constructed Gallager-type error-correcting code to communication in a Gaussian channel is being examined. The construction is based on the introduction of complex matrices, used in both encoding and decoding, which comprise sub-matrices of cascading connection values. The finite size effects are estimated for comparing the results to the bounds set by Shannon. The critical noise level achieved for certain code-rates and infinitely large systems nearly saturates the bounds set by Shannon even when the connectivity used is low
    corecore