1,359 research outputs found

    Dairy Herd Management

    Get PDF
    PDF pages: 3

    Hash-based signatures for the internet of things

    Get PDF
    While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely flexible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices

    Hyperpolarizability and operational magic wavelength in an optical lattice clock

    Get PDF
    Optical clocks benefit from tight atomic confinement enabling extended interrogation times as well as Doppler- and recoil-free operation. However, these benefits come at the cost of frequency shifts that, if not properly controlled, may degrade clock accuracy. Numerous theoretical studies have predicted optical lattice clock frequency shifts that scale nonlinearly with trap depth. To experimentally observe and constrain these shifts in an 171^{171}Yb optical lattice clock, we construct a lattice enhancement cavity that exaggerates the light shifts. We observe an atomic temperature that is proportional to the optical trap depth, fundamentally altering the scaling of trap-induced light shifts and simplifying their parametrization. We identify an "operational" magic wavelength where frequency shifts are insensitive to changes in trap depth. These measurements and scaling analysis constitute an essential systematic characterization for clock operation at the 101810^{-18} level and beyond.Comment: 5 + 2 pages, 3 figures, added supplementa

    Sub-recoil clock-transition laser cooling enabling shallow optical lattice clocks

    Full text link
    Laser cooling is a key ingredient for quantum control of atomic systems in a variety of settings. In divalent atoms, two-stage Doppler cooling is typically used to bring atoms to the uK regime. Here, we implement a pulsed radial cooling scheme using the ultranarrow 1S0-3P0 clock transition in ytterbium to realize sub-recoil temperatures, down to tens of nK. Together with sideband cooling along the one-dimensional lattice axis, we efficiently prepare atoms in shallow lattices at an energy of 6 lattice recoils. Under these conditions key limits on lattice clock accuracy and instability are reduced, opening the door to dramatic improvements. Furthermore, tunneling shifts in the shallow lattice do not compromise clock accuracy at the 10-19 level

    First GIS analysis of modern stone tools used by wild chimpanzees (Pan troglodytes verus) in Bossou, Guinea, West Africa

    Get PDF
    Stone tool use by wild chimpanzees of West Africa offers a unique opportunity to explore the evolutionary roots of technology during human evolution. However, detailed analyses of chimpanzee stone artifacts are still lacking, thus precluding a comparison with the earliest archaeological record. This paper presents the first systematic study of stone tools used by wild chimpanzees to crack open nuts in Bossou (Guinea-Conakry), and applies pioneering analytical techniques to such artifacts. Automatic morphometric GIS classification enabled to create maps of use wear over the stone tools (anvils, hammers, and hammers/anvils), which were blind tested with GIS spatial analysis of damage patterns identified visually. Our analysis shows that chimpanzee stone tool use wear can be systematized and specific damage patterns discerned, allowing to discriminate between active and passive pounders in lithic assemblages. In summary, our results demonstrate the heuristic potential of combined suites of GIS techniques for the analysis of battered artifacts, and have enabled creating a referential framework of analysis in which wild chimpanzee battered tools can for the first time be directly compared to the early archaeological record.Leverhulme Trust [IN-052]; MEXT [20002001, 24000001]; JSPS-U04-PWS; FCT-Portugal [SFRH/BD/36169/2007]; Wenner-Gren Foundation for Anthropological Researc
    corecore