215,490 research outputs found

    Reexamining the "finite-size" effects in isobaric yield ratios using a statistical abrasion-ablation model

    Full text link
    The "finite-size" effects in the isobaric yield ratio (IYR), which are shown in the standard grand-canonical and canonical statistical ensembles (SGC/CSE) method, is claimed to prevent obtaining the actual values of physical parameters. The conclusion of SGC/CSE maybe questionable for neutron-rich nucleus induced reaction. To investigate whether the IYR has "finite-size" effects, the IYR for the mirror nuclei [IYR(m)] are reexamined using a modified statistical abrasion-ablation (SAA) model. It is found when the projectile is not so neutron-rich, the IYR(m) depends on the isospin of projectile, but the size dependence can not be excluded. In reactions induced by the very neutron-rich projectiles, contrary results to those of the SGC/CSE models are obtained, i.e., the dependence of the IYR(m) on the size and the isospin of the projectile is weakened and disappears both in the SAA and the experimental results.Comment: 5 pages and 4 figure

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Analysis of security protocols using finite-state machines

    Get PDF
    This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay

    Biometric identity-based cryptography for e-Government environment

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Digital numerically controlled oscillator

    Get PDF
    The frequency and phase of an output signal from an oscillator circuit are controlled with accuracy by a digital input word. Positive and negative alterations in output frequency are both provided for by translating all values of input words so that they are positive. The oscillator reference frequency is corrected only in one direction, by adding phase to the output frequency of the oscillator. The input control word is translated to a single algebraic sign and the digital 1 is added thereto. The translated input control word is then accumulated. A reference clock signal having a frequency at an integer multiple of the desired frequency of the output signal is generated. The accumulated control word is then compared with a threshold level. The output signal is adjusted in a single direction by dividing the frequency of the reference clock signal by a first integer or by an integer different from the first integer

    Personal area networks with line-of-sight MIMO operation

    Get PDF
    • …
    corecore