3,093 research outputs found

    Emendation of Undesirable Attack on Multiparty Data Sharing With Anonymous Id Assignment Using AIDA Algorithm

    Get PDF
    Security is a state of being free from danger or threat. When someone finds the vulnerabilities and loopholes in a system without permission means the system lacks its security. Wherever a secure data sharing occurs between multiparty there would be the possibility for undesirable attacks. In a variety of application domains such as patient medical records, military applications, social networking, electronic voting, business and personal applications there is a great significance of anonymity. Using this system we can store our data as groups and also encrypt it with encryption key. Only the privileged person can see the data. The secure computation function widely used is secure sum that allows parties to compute the sum of their individual inputs without mentioning the inputs to one another. This function helps to characterize the complexities of the secure multiparty computation. Another algorithm for sharing simple integer data on top of secure sum is built. The sharing algorithm will be used at each iteration of this algorithm for anonymous ID assignment (AIDA). By this algorithm and certain security measures it is possible to have a system which is free from undesirable attacks. Keywords:Vulnerability, anonymity, encryption key, secure multiparty computation, AIDA

    Controlled long-range interactions between Rydberg atoms and ions

    Get PDF
    We theoretically investigate trapped ions interacting with atoms that are coupled to Rydberg states. The strong polarizabilities of the Rydberg levels increases the interaction strength between atoms and ions by many orders of magnitude, as compared to the case of ground state atoms, and may be mediated over micrometers. We calculate that such interactions can be used to generate entanglement between an atom and the motion or internal state of an ion. Furthermore, the ion could be used as a bus for mediating spin-spin interactions between atomic spins in analogy to much employed techniques in ion trap quantum simulation. The proposed scheme comes with attractive features as it maps the benefits of the trapped ion quantum system onto the atomic one without obviously impeding its intrinsic scalability. No ground state cooling of the ion or atom is required and the setup allows for full dynamical control. Moreover, the scheme is to a large extent immune to the micromotion of the ion. Our findings are of interest for developing hybrid quantum information platforms and for implementing quantum simulations of solid state physics.Comment: 20 pages including appendices, 6 figure

    Feynman integral relations from parametric annihilators

    Full text link
    We study shift relations between Feynman integrals via the Mellin transform through parametric annihilation operators. These contain the momentum space IBP relations, which are well-known in the physics literature. Applying a result of Loeser and Sabbah, we conclude that the number of master integrals is computed by the Euler characteristic of the Lee-Pomeransky polynomial. We illustrate techniques to compute this Euler characteristic in various examples and compare it with numbers of master integrals obtained in previous works.Comment: v2: new section 3.1 added, several misprints corrected and additional remark

    Linear And Nonlinear Arabesques: A Study Of Closed Chains Of Negative 2-Element Circuits

    Full text link
    In this paper we consider a family of dynamical systems that we call "arabesques", defined as closed chains of 2-element negative circuits. An nn-dimensional arabesque system has nn 2-element circuits, but in addition, it displays by construction, two nn-element circuits which are both positive vs one positive and one negative, depending on the parity (even or odd) of the dimension nn. In view of the absence of diagonal terms in their Jacobian matrices, all these dynamical systems are conservative and consequently, they can not possess any attractor. First, we analyze a linear variant of them which we call "arabesque 0" or for short "A0". For increasing dimensions, the trajectories are increasingly complex open tori. Next, we inserted a single cubic nonlinearity that does not affect the signs of its circuits (that we call "arabesque 1" or for short "A1"). These systems have three steady states, whatever the dimension is, in agreement with the order of the nonlinearity. All three are unstable, as there can not be any attractor in their state-space. The 3D variant (that we call for short "A1\_3D") has been analyzed in some detail and found to display a complex mixed set of quasi-periodic and chaotic trajectories. Inserting nn cubic nonlinearities (one per equation) in the same way as above, we generate systems "A2\_nnD". A2\_3D behaves essentially as A1\_3D, in agreement with the fact that the signs of the circuits remain identical. A2\_4D, as well as other arabesque systems with even dimension, has two positive nn-circuits and nine steady states. Finally, we investigate and compare the complex dynamics of this family of systems in terms of their symmetries.Comment: 22 pages, 12 figures, accepted for publication at Int. J. Bif. Chao

    THE EFFECT OF PLACE ATTACHMENT AND LEISURE IDENTITY ON STEWARDSHIP PARTICIPATION IN THE RATTLESNAKE NATIONAL RECREATION AREA AND WILDERNESS

    Get PDF
    As outdoor recreation participation increases in the U.S., and many communities in the American West are experiencing rising amenity migration, park and protected area managers face significant challenges to balance both providing for visitors’ desired experiences and protecting the natural resources on which these experiences depend. Confronted with declining management capacity, agencies are increasingly looking to engage both newer and established recreationists in stewardship behaviors to help maintain these areas and improve human-environment relationships. One barrier to community involvement in stewardship efforts is the need to better understand the connection between recreationists’ antecedent conditions and their motivations to steward. Past research has examined the place attachment of visitors, or the relationships they have with a particular natural area, as well as the concept of leisure identity salience, which explains how participation in leisure activities functions as a self-affirmation process. However, little is known about how leisure identity salience relates to stewardship. This study addresses this research gap by examining these concepts in a wildland recreation setting within a growing, amenity migrant-attractant community in the western U.S., to answer the following research question: To what degree do the place attachment and leisure identity salience of visitors relate to local environmental stewardship behavioral intentions among visitors? Data were collected from an on-site visitor survey in the Rattlesnake National Recreation Area and Wilderness in Missoula, MT (USA), and structural equation modeling was used to test the hypothesized relationship between variables. Results found that one dimension of place attachment, identification with place, was predictive of willingness to engage in place-specific proactive stewardship behaviors. One’s leisure identity was found to predict willingness to engage in Leave-No-Trace behaviors. In addition, a suggestive predictive relationship was revealed between recreationists’ leisure identity and place-specific proactive stewardship behaviors. It is clear that the meaning visitors generate from 1) a recreation place and 2) the leisure activities they participate in while in this place have a powerful influence on behavior. Managers should target identity when designing messaging strategies to encourage stewardship behaviors and employ creative partnerships with recreation organizations to better engage the local community in collaborative land management

    Private v Public Enforcement of European Competition Law? : Relationship between effective enforcement of the law and individual justice

    Get PDF
    In western market economies, it is generally accepted that competition is the key point of achieving social and economic welfare. Therefore, it is necessary to protect competition and there are, basically, two main approaches to deterring such socially harmful behaviour: an administrative public enforcement by public agencies and fine proceedings or a private enforcement through litigations by private parties and especially damage claims. But, the work will show that private enforcement of European competition law is underdeveloped, but still necessary as access to individual justice with reference to the theoretical analysis by Aristotle and other moral philosophers. Because of the underdevelopment, the work argues in favour of a necessity to implement a general right of pre-action disclosure and access to files in the possession of the competition authorities to improve the effectiveness of private enforcement of European competition law. On the other hand, the given rights of the European Commission make its fine proceedings an effective information gathering system and thus an effective way of detecting and proving an infringement of European competition law, especially Art 101 TFEU. But, the Commission has to rely on members of cartels to apply for leniency and therefore to disclose a hidden infringement, i.e. cartel. Furthermore, an efficient leniency programme has to offer effective protection to its whistle-blowers. However, this protection policy is in conflict with an effective private enforcement because the private plaintiffs have to provide evidence of an infringement. Recently, the European Commission gets the ball rolling again by introducing its Directive 2014/104/EU that focuses on the effectiveness of private enforcement of European competition law and especially of civil damage claims. Therefore, it is highly topical to highlight the theoretical and practical relationship between public and private enforcement and the main tasks and problems by implementing the European rules into national law

    AWF Retirement Eligibility

    Get PDF
    Naval Postgraduate School Acquisition Research Progra

    Spectroscopy of the ^2S_{1/2} \rightarrow\,^2P_{3/2} transition in Yb II: Isotope shifts, hyperfine splitting and branching ratios

    Get PDF
    We report on spectroscopic results on the ^2S_{1/2} \rightarrow\,^2P_{3/2} transition in single trapped Yb+^+ ions. We measure the isotope shifts for all stable Yb+^+ isotopes except 173^{173}Yb+^+, as well as the hyperfine splitting of the 2P3/2^2P_{3/2} state in 171^{171}Yb+^+. Our results are in agreement with previous measurements but are a factor of 5-9 more precise. For the hyperfine constant A(2P3/2)=875.4(10)A\left(^2P_{3/2}\right) = 875.4(10) MHz our results also agree with previous measurements but deviate significantly from theoretical predictions. We present experimental results on the branching ratios for the decay of the 2P3/2^2P_{3/2} state. We find branching fractions for the decay to the 2D3/2^2D_{3/2} state and 2D5/2^2D_{5/2} state of 0.17(1)% and 1.08(5)%, respectively, in rough agreement with theoretical predictions. Furthermore, we measured the isotope shifts of the ^2F_{7/2} \rightarrow\,^1D\left[5/2\right]_{5/2} transition and determine the hyperfine structure constant for the 1D[5/2]5/2^1D\left[5/2\right]_{5/2} state in 171^{171}Yb+^+ to be A(1D[5/2]5/2)=−107(6)A\left(^1D\left[5/2\right]_{5/2}\right) = -107(6) MHz.Comment: 6 pages, 4 figure

    Why Do U.S. Firms Hold So Much More Cash Than They Used To?

    Get PDF
    The average cash to assets ratio for U.S. industrial firms increases by 129% from 1980 to 2004. Because of this increase in the average cash ratio, American firms at the end of the sample period can pay back their debt obligations with their cash holdings, so that the average firm has no leverage when leverage is measured by net debt. This change in cash ratios and net debt is the result of a secular trend rather than the outcome of the recent buildup in cash holdings of some large firms. It is concentrated among firms that do not pay dividends. The average cash ratio increases over the sample period because the cash flow of American firms has become riskier, these firms hold fewer inventories and accounts receivable, and the typical firm spends more on R&D. The precautionary motive for cash holdings appears to explain the increase in the average cash ratio.

    Multi-touch interactions for model-based sonification

    Get PDF
    Presented at the 15th International Conference on Auditory Display (ICAD2009), Copenhagen, Denmark, May 18-22, 2009This paper presents novel interaction modes for Model-Based Soni- fication (MBS) via a multi-touch interface. We first lay out details about the constructed multi-touch surface. This is followed by a description of the Data Sonogram Sonification Model and how it is implemented using the system. Modifications from the original sonification model such as the limited space scans are described and discussed with sonification examples. Videos showing exam- ples of interaction are provided for various data sets. Beyond Data Sonograms, the presented system provides a basis for the imple- mentation of known and novel sonification models. We discuss the available interaction modes with multi-touch surfaces and how these interactions can be profitably used to control spatial and non- spatial sonification models
    • …
    corecore