1,612 research outputs found

    Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel

    Full text link
    Utilizing the hyperspace of noise-based logic, we show two string verification methods with low communication complexity. One of them is based on continuum noise-based logic. The other one utilizes noise-based logic with random telegraph signals where a mathematical analysis of the error probability is also given. The last operation can also be interpreted as computing universal hash functions with noise-based logic and using them for string comparison. To find out with 10^-25 error probability that two strings with arbitrary length are different (this value is similar to the error probability of an idealistic gate in today's computer) Alice and Bob need to compare only 83 bits of the noise-based hyperspace.Comment: Accepted for publication in European Journal of Physics B (November 10, 2010

    Energy Requirement of Control: Comments on Szilard's Engine and Maxwell's Demon

    Get PDF
    In mathematical physical analyses of Szilard's engine and Maxwell's demon, a general assumption (explicit or implicit) is that one can neglect the energy needed for relocating the piston in Szilard's engine and for driving the trap door in Maxwell's demon. If this basic assumption is wrong, then the conclusions of a vast literature on the implications of the Second Law of Thermodynamics and of Landauer's erasure theorem are incorrect too. Our analyses of the fundamental information physical aspects of various type of control within Szilard's engine and Maxwell's demon indicate that the entropy production due to the necessary generation of information yield much greater energy dissipation than the energy Szilard's engine is able to produce even if all sources of dissipation in the rest of these demons (due to measurement, decision, memory, etc) are neglected.Comment: New, simpler and more fundamental approach utilizing the physical meaning of control-information and the related entropy production. Criticism of recent experiments adde

    Information theoretic security by the laws of classical physics

    Full text link
    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.Comment: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos correcte

    Why We Read Wikipedia

    Get PDF
    Wikipedia is one of the most popular sites on the Web, with millions of users relying on it to satisfy a broad range of information needs every day. Although it is crucial to understand what exactly these needs are in order to be able to meet them, little is currently known about why users visit Wikipedia. The goal of this paper is to fill this gap by combining a survey of Wikipedia readers with a log-based analysis of user activity. Based on an initial series of user surveys, we build a taxonomy of Wikipedia use cases along several dimensions, capturing users' motivations to visit Wikipedia, the depth of knowledge they are seeking, and their knowledge of the topic of interest prior to visiting Wikipedia. Then, we quantify the prevalence of these use cases via a large-scale user survey conducted on live Wikipedia with almost 30,000 responses. Our analyses highlight the variety of factors driving users to Wikipedia, such as current events, media coverage of a topic, personal curiosity, work or school assignments, or boredom. Finally, we match survey responses to the respondents' digital traces in Wikipedia's server logs, enabling the discovery of behavioral patterns associated with specific use cases. For instance, we observe long and fast-paced page sequences across topics for users who are bored or exploring randomly, whereas those using Wikipedia for work or school spend more time on individual articles focused on topics such as science. Our findings advance our understanding of reader motivations and behavior on Wikipedia and can have implications for developers aiming to improve Wikipedia's user experience, editors striving to cater to their readers' needs, third-party services (such as search engines) providing access to Wikipedia content, and researchers aiming to build tools such as recommendation engines.Comment: Published in WWW'17; v2 fixes caption of Table

    Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme

    Get PDF
    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.Laszlo B. Kish, Derek Abbott, Claes G. Granqvis

    Characteristics and Motivational Factors of Effective Extension Advisory Leaders: Implications for Building Strong Extension Advisory Councils

    Get PDF
    The purpose of this study was to determine the characteristics and motivational factors of effective Extension advisory leaders. This Delphi study was conducted with a selected group of County Extension Directors and a group of Extension State Advisory Leaders. The study identified 10 characteristics that distinguish an effective Extension advisory leader. Some of these characteristics are explicit and easy to observe, while others are implicit and difficult to directly observe. Therefore, it is practical to use directly observable characteristics of effective advisory leaders when selecting volunteers. Once potential volunteers are spotted in the community, implicit characteristics of effective advisory leaders should be used to further screen them before they are selected. The study also identified the eight most important factors motivating individuals to volunteer as effective advisory leaders. Understanding these motivational factors is helpful for creating an environment for attracting and retaining effective volunteers. Understanding their motivation for volunteer work and creating an environment for them to meet the motivating factors for volunteering will lead to volunteer satisfaction and retention. The findings of this study can be used to build strong Extension advisory councils

    The Effect of Neutral Atoms on Capillary Discharge Z-pinch

    Get PDF
    We study the effect of neutral atoms on the dynamics of a capillary discharge Z-pinch, in a regime for which a large soft-x-ray amplification has been demonstrated. We extended the commonly used one-fluid magneto-hydrodynamics (MHD) model by separating out the neutral atoms as a second fluid. Numerical calculations using this extended model yield new predictions for the dynamics of the pinch collapse, and better agreement with known measured data.Comment: 4 pages, 4 postscript figures, to be published in Phys. Rev. Let

    High Resolution Cherenkov Detectors for Use in a Cosmic Ray Isotope Spectrometer

    Get PDF
    We describe the development of new high-resolution Cerenkov detectors for use in an instrument designed to measure the isotopic composition of cosmic ray nuclei from Be to Ni (Z = 4 to 28). The latest version of this balloon-borne instrument contains two new large-area, (-0.5 m^2) Cerenkov detectors, one composed of Teflon and a second of Pilot- 425. Through the use of improved light-collection techniques, and a novel radiator design, the photoelectron yield of these counters has been upgraded significantly over that of earlier counters. In particular, the greatly improved Cerenkov light yield achieved with Teflon makes it an attractive alternative to available liquid counters of similar index of refraction. Laboratory tests of these and other Cerenkov radiators are described, along with estimates of the mass resolution that can be achieved
    • …
    corecore