74,380 research outputs found

    On a new fast public key cryptosystem

    Full text link
    This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : F(x)=(a×x)Mod(2p)Div(2q)F(x) =(a\times x)Mod(2^p)Div(2^q) .\\* Mod is modulo operation , Div is integer division operation , a , p and q are integers where (p>q)( p > q ) .\\* In this paper we also evaluate the hardness of this problem by reducing it to SAT

    Optical isolator in silicon photonics using sputtered deposited YIG

    Get PDF

    Cognitive Semantics: An Extension of the Cartesian Legacy

    Get PDF
    The basic intention of this article is to show how the cognitive semantics inherits its ancestry from the Cartesian foundation. The emergence of the cognitive semantics is envisaged here as an integral part of the knowledge evolution, in terms of shifts, which ultimately determines the future direction of our epistemological quest. Basically two questions have been emphasized here: (a) how (and what amount of) common sense metaphysics can be incorporated within the existing system of knowledge; and (b) is there any substratum where the mind-body dualism can be boiled down

    Buying Sex: A Survey of Men in Chicago

    Get PDF
    On April 23, 2004 staff of the CCH and 42 volunteers conducted one-on-one interviews with 159 men in nine popular Chicago bars, on the streets of high volume 'bar-areas' in scattered neighborhoods throughout the city, and at Chicago's Union Station. The Prostitution Alternatives Round Table (PART), a project of the CCH decided to make contact with some men who may pay for sexual services in Chicago to determine their characteristics, the frequency with which they paid for sex acts, their interactions with law enforcement, their knowledge of the plight of women and girls involved, and their attitudes about the sex trade industry. Why interview customers? Strategies to combat both legal and illegal aspects of the sex trade seldom focus on the demand that fuels this industry. Research in Chicago indicates that many women and girls in the sex trade experience homelessness and are victims of violence, abuse and exploitation, and that some male customers are violent and exploitative. Yet, there is little research on the customers of women in the sex trade industry. Only two researchers, Martin Monto and John Lowman, have done research with men in North America who buy sex. The reasons are obvious: It is difficult to determine and construct a representative sample of sex trade customers due to the clandestine nature of the industry. It is also likely that many male customers will be reluctant to admit that they pay for sex for a variety of reasons, including the fact that it is against the law

    Theory of Scanning Tunneling Microscopy

    Full text link
    This lecture has been given at the 45th Spring School: Computing Solids: Models, Ab-initio Methods and Supercomputing organized at the Forschungszentrum J\"ulich. The goal of this manuscript is to review the basics behind the theory accompanying Scanning Tunneling Microscopy.Comment: 38 pages, 45th IFF Spring School: Computing Solids: Models, Ab-initio Methods and Supercomputing organized at the research center of Juelic

    A Priori Error Estimates for Mixed Finite Element θ\theta-Schemes for the Wave Equation

    Get PDF
    A family of implicit-in-time mixed finite element schemes is presented for the numerical approximation of the acoustic wave equation. The mixed space discretization is based on the displacement form of the wave equation and the time-stepping method employs a three-level one-parameter scheme. A rigorous stability analysis is presented based on energy estimation and sharp stability results are obtained. A convergence analysis is carried out and optimal a priori L(L2)L^\infty(L^2) error estimates for both displacement and pressure are derived
    corecore