8,555 research outputs found

    Privacy-preserving architecture for forensic image recognition

    Get PDF
    Forensic image recognition is an important tool in many areas of law enforcement where an agency wants to prosecute possessors of illegal images. The recognition of illegal images that might have undergone human imperceptible changes (e.g., a JPEG-recompression) is commonly done by computing a perceptual image hash function of a given image and then matching this hash with perceptual hash values in a database of previously collected illegal images. To prevent privacy violation, agencies should only learn about images that have been reliably detected as illegal and nothing else. In this work, we argue that the prevalent presence of separate departments in such agencies can be used to enforce the need-to-know principle by separating duties among them. This enables us to construct the first practically efficient architecture to perform forensic image recognition in a privacy-preserving manner. By deriving unique cryptographic keys directly from the images, we can encrypt all sensitive data and ensure that only illegal images can be recovered by the law enforcement agency while all other information remains protected

    Simulation of MeV/atom cluster correlations in matter

    Get PDF
    We present an efficient algorithm able to predict the trajectories of individual cluster constituents as they penetrate relatively thick amorphous targets. Our algorithm properly treats both the intracluster Coulomb repulsion and the collisions between cluster constituents and target atoms. We have compared our simulation predictions to experimental measurements of the distribution of lateral exit velocities, and demonstrated that the in-target Coulomb explosion of 2MeV/atom carbon clusters in carbon foils must be shielded with a screening length of less than 2.5 Å. We also present a simple phenomenological model for the suppression of the exit-side charge of ions in clusters which depends on the enhanced ionization potential that an electron near an ion feels due to the ion’s charged comoving neighbors. By using our simulation algorithm we have predicted the exit correlations of the cluster constituents and verified that the charge suppression model fits the observed charge suppression of ions in clusters to within the experimental uncertainties

    CFT Duals for Extreme Black Holes

    Get PDF
    It is argued that the general four-dimensional extremal Kerr-Newman-AdS-dS black hole is holographically dual to a (chiral half of a) two-dimensional CFT, generalizing an argument given recently for the special case of extremal Kerr. Specifically, the asymptotic symmetries of the near-horizon region of the general extremal black hole are shown to be generated by a Virasoro algebra. Semiclassical formulae are derived for the central charge and temperature of the dual CFT as functions of the cosmological constant, Newton's constant and the black hole charges and spin. We then show, assuming the Cardy formula, that the microscopic entropy of the dual CFT precisely reproduces the macroscopic Bekenstein-Hawking area law. This CFT description becomes singular in the extreme Reissner-Nordstrom limit where the black hole has no spin. At this point a second dual CFT description is proposed in which the global part of the U(1) gauge symmetry is promoted to a Virasoro algebra. This second description is also found to reproduce the area law. Various further generalizations including higher dimensions are discussed.Comment: 18 pages; v2 minor change

    Simple extractors via constructions of cryptographic pseudo-random generators

    Full text link
    Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in O(log2n)O(\log^2 n) time. These extractors work for weak sources with min entropy λn\lambda n, for arbitrary constant λ>0\lambda > 0, have seed length O(log2n)O(\log^2 n), and their output length is nλ/3\approx n^{\lambda/3}.Comment: 21 pages, an extended abstract will appear in Proc. ICALP 2005; small corrections, some comments and references adde

    New Capacitive-Array Sensors for Post-Process Cure Verification and NDE of Polymers and Composites

    Get PDF
    A new capacitive array sensor has been developed for process verification and NDE of polymers and composites. Unlike existing dielectrometer technology, the new sensor incorporates several innovations to maximize sensitivity to material properties while minimizing the effects of temperature, humidity and electromagnetic interference. Conventional dielectric measurement systems require sensors to be embedded within a material and discarded after a single use. Furthermore, conventional sensors are so sensitive to environmental variables that cure monitoring is based solely on changes in the material ionic conductivity; no absolute measure of cure state is possible. The configuration of these new sensors greatly reduces sensitivity to environmental variables and permits external, rather than embedded, measurement making both post-process cure verification and NDE possible. Since the sensor is not discarded, the cost per measurement is greatly reduced

    Frequency Domain Reflectometry NDE for Aging Cables in Nuclear Power Plants

    Get PDF
    Degradation of the cable jacket, electrical insulation, and other cable components of installed cables within nuclear power plants (NPPs) is known to occur as a function of age, temperature, radiation, and other environmental factors. System tests verify cable function under normal loads; however, demonstration of some cable’s ability to perform under exceptional loads associated with design-basis events is essential to assuring plant integrity. The cable’s ability to perform safely over the initial 40-year planned and licensed life has generally been demonstrated and there have been very few age-related cable failures.With greater than 1000 km of power, control, instrumentation, and other cables typically found in an NPP, replacing all the cables would be a severe cost burden. Justification for life extension to 60 and 80 years requires a cable aging management program to justify cable performance under normal operation as well as accident conditions. A variety of tests are available to assess various aspects of electrical and mechanical cable performance, but none of these tests are suitable for all cable configurations nor does any single test confirm all features of interest. One particularly powerful test that is beginning to be used more and more by utilities is frequency domain reflectometry (FDR). FDR is a nondestructive electrical inspection technique used to detect and localize faults in power and communication system conductors along the length of a cable from a single connection point. For the measurement, two conductors in the cable system are treated as a transmission line, which propagates a low-voltage swept-frequency waveform to interrogate the cable length. Note that because the applied signal is low-voltage (\u3c5 volts), the test is completely nondestructive and poses no special safety concerns to operators. An inverse Fourier transform is used to convert the resulting frequency-domain data into a time-domain format, which can determine the physical location of signal reflections if the signal propagation velocity is known. FDR detects discontinuities in the electrical impedance that arise due to cable splices or similar changes along the path of the conductor pair. In addition, FDR has the potential to provide sensitivity to insulation degradation by detecting small changes in capacitance between the cable conductors being examined. Example changes that impact the insulation capacitance include exposure to heat, radiation, water damage, corrosion, or mechanical fatigue. The technique is also sensitive to cable bends, the particular lay of the cable in tray, proximity to other cable, and other factors that bear consideration when interpreting these tests. This paper examines various influences on the FDR approach and compares results of three different instruments capable of producing the FDR to assess accelerated aging cable damage among several NPP representative cables

    A note on Kerr/CFT and free fields

    Full text link
    The near-horizon geometry of the extremal four-dimensional Kerr black hole and certain generalizations thereof has an SL(2,R) x U(1) isometry group. Excitations around this geometry can be controlled by imposing appropriate boundary conditions. For certain boundary conditions, the U(1) isometry is enhanced to a Virasoro algebra. Here, we propose a free-field construction of this Virasoro algebra.Comment: 10 pages, v2: comments and references adde

    Microscopic entropy of the charged BTZ black hole

    Full text link
    The charged BTZ black hole is characterized by a power-law curvature singularity generated by the electric charge of the hole. The curvature singularity produces ln r terms in the asymptotic expansion of the gravitational field and divergent contributions to the boundary terms. We show that these boundary deformations can be generated by the action of the conformal group in two dimensions and that an appropriate renormalization procedure allows for the definition of finite boundary charges. In the semiclassical regime the central charge of the dual CFT turns out to be that calculated by Brown and Henneaux, whereas the charge associated with time translation is given by the renormalized black hole mass. We then show that the Cardy formula reproduces exactly the Bekenstein-Hawking entropy of the charged BTZ black hole.Comment: 9 pages, no figure

    Branching of the Falkner-Skan solutions for λ < 0

    Get PDF
    The Falkner-Skan equation f'" + ff" + λ(1 - f'^2) = 0, f(0) = f'(0) = 0, is discussed for λ < 0. Two types of problems, one with f'(∞) = 1 and another with f'(∞) = -1, are considered. For λ = 0- a close relation between these two types is found. For λ < -1 both types of problem allow multiple solutions which may be distinguished by an integer N denoting the number of zeros of f' - 1. The numerical results indicate that the solution branches with f'(∞) = 1 and those with f'(∞) = -1 tend towards a common limit curve as N increases indefinitely. Finally a periodic solution, existing for λ < -1, is presented.

    Numerical Study of Excited States in the Shastry-Sutherland Model

    Full text link
    We investigate excited states of the Shastry-Sutherland model using a kind of variational method. Starting from various trial states which include one or two triplet dimers, we numerically pursue the best evaluation of the energy for each set of quantum numbers. We present the energy difference as a function of either the coupling ratio or the momentum and compare them with the perturbative calculations. Our data suggest that the helical order phase exists between the singlet dimer phase and the magnetically ordered phase. In comparison with the experimental data we can estimate the intra-dimer coupling J and the inter-dimer coupling J' for SrCu2(BO3)2 : J'/J =0.65 and J = 87K.Comment: 15pages, 5figures to be published in JPS
    corecore