901 research outputs found

    Monte Carlo simulation of Ising model on directed Barabasi-Albert network

    Get PDF
    The existence of spontaneous magnetization of Ising spins on directed Barabasi-Albert networks is investigated with seven neighbors, by using Monte Carlo simulations. In large systems we see the magnetization for different temperatures T to decay after a characteristic time tau, which is extrapolated to diverge at zero temperature.Comment: Error corrected, main conclusion unchanged; for Int. J. Mod. Phys. C 16, issue 4 (2005

    Fluid Cultures and Identifications: The Intercultural Communication Experiences of Saudi International Students in the UK

    Get PDF
    This thesis is an investigation into the intercultural communication experiences of Saudi international students in the UK. It focuses on the friendship experiences that Saudi international students form with home and international students in order to engage in intercultural interactions. It further investigates how Saudi international students experience interactions with individuals from the opposite gender with whom they have limited interactions with in Saudi Arabia. Furthermore, the study focuses on the incidents that may motivate or demotivate Saudi international students from engaging in intercultural communication. Finally, this thesis considers the changes that the participants had introduced to their worldviews, identifications and practices as a result of their overall intercultural experiences in the UK. The findings show that 1) the participants’ identifications of in-group and out-group members were inconsistent and the boundaries between both categories were difficult to identify. 2) In contrast to studies, which suggest that Saudi international students are homogeneous Muslims who come from a collectivistic culture, the findings show that the participants had different worldviews and identifications and cannot be categorized in a fixed category. 3) The findings also illustrate that despite the segregation between men and women in Saudi Arabia, Saudi international students do not necessarily find interaction with individuals from the opposite gender challenging, as some literature claims. 4) The experiences that demotivated the participants from engaging in intercultural communication are not necessarily negative ones, since universities religious organisations, such as the Islamic Society, which was perceived positively by the participants, may also contribute to demotivating their attendees from experiencing intercultural communication. 5) The overall intercultural experiences in the UK had influenced the participants’ worldviews, identifications and practices on various levels. Thus, some participants introduced significant changes to their worldviews and identifications, others accepted changes that do not contradict with their understandings of religion, while others resisted any changes. Overall, the study argues for moving beyond essentialist descriptions for Saudi international students that describe them as a homogeneous Muslim group, coming from a collectivistic culture in a country where men are dominant over women. The study gives valuable insights and practical implications for UK universities and Saudi Cultural Bureaux abroad where Saudi international students form a noticeable number amongst other international students

    Deterministic And Efficient Three-party Quantum Key Distribution

    Get PDF
    The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmit one classical bit. A trusted authority in a network where every user is only authenticated to the third party distributes a secret key using quantum entanglement parity bit, controlled gates, ancillary states, and transmit one classical bit. We also show it is possible to distribute entanglement in a typical telecom metropolitan optical network

    A Novel Approach for Code Clone Detection Using Hybrid Technique

    Full text link
    Code clones have been studied for long, and there is strong evidence that they are a major source of software faults. The copying of code has been studied within software engineering mostly in the area of clone analysis. Software clones are regions of source code which are highly similar; these regions of similarity are called clones, clone classes, or clone pairs In this paper a hybrid approach using metric based technique with the combination of text based technique for detection and reporting of clones is proposed. The Proposed work is divided into two stages selection of potential clones and comparing of potential clones using textual comparison. The proposed technique detects exact clones on the basis of metric match and then by text match

    Entanglement Distribution and Secret Key Sharing In Optical Networks

    Get PDF
    Communicating a quantum state remotely is possible by Remote State Preparation. Sender Alice create a pure state known to her and help the receiver Bob to securely prepare the state remotely instead of sending the physical quantum state. To successfully perform this protocol the sender and the receiver must share Einstein-Podolsky-Rosen (EPR) state and have access to an authenticated classical channel. The sender and the receiver must be sharing an entangled bit for each state the sender wishes to prepare at the receiver’s location. In this paper we introduce a protocol to create and distribute the required entangled pairs between the communicating parities. A trusted source of EPR states will provide the necessary entangled states required to the sender and the receiver. The distributed EPR state will be used between the communicating parties to create secret keys by using remote state preparation protocol. The proposed protocol will provide unconditional security and any attacking attempt will be discovered due to the disturbance in the states

    Quantum Mutual Authentication Scheme Based on Bell State Measurement

    Get PDF
    Authentication is one of the security services that ensure sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build a quantum channel between two unauthenticated to each other users, a trusted authority is needed to create a mutual authentication with each party before they communicate. Using Bell measurement and entanglement swapping, we present a protocol that mutually authenticates the identity of the sender and the receiver then, constructs a quantum channel based on Bell basis. The sender and the receiver use the quantum channel to communicate using entanglement-assisted quantum communication protocols. Additionally, the protocol renews the shared secret key between the trusted authority and each user after authentication process. The protocol provides the necessary authentication and key distribution to create a quantum channel between the sender and receiver

    Mapping of Publications Productivity on Journal of Documentation 1989-2018: A Study Based on Clarivate Analytics – Web of Science Database

    Get PDF
    The Present Study analyzed research productivity in Journal of Documentation (JDoc) for a period of 30 years between 1989 and 2018. Web of Science database a service from Clarivate Analytics has been used to download citation and source data. Bibexcel and Histcite application software have been used to present the datasets. Analysis part focuses on the parameters like citation impact at local and global level, influential authors and their total output, ranking of contributing institutions and countries. In addition to this scientographical mapping of data is presented through graphs using VOSviewer software mapping technique
    • …
    corecore