2,270 research outputs found

    The Genuine Cosmic Rosetta

    Get PDF
    Reexamination of general relativistic experimental results shows the universe is governed by Einstein's static-spacetime general relativity instead of Friedmann-Lemaitre expanding-spacetime general relativity. The absence of expansion redshifts in a static-spacetime universe suggests a reevaluation of the present cosmology is needed.Comment: 9 pages LaTeX, no figure

    Search for and analysis of radioactive halos in lunar material

    Get PDF
    The lunar halo search was conducted because halos in terrestrial minerals serve as pointers to localized radioactivity, and make possible analytical studies on the problems of isotopic dating and mode of crystallization of the host mineral. Ancillary studies were conducted on terrestrial halos and on certain samples of special origin such as tektites and meteorites

    A New Redshift Interpretation

    Get PDF
    A nonhomogeneous universe with vacuum energy, but without spacetime expansion, is utilized together with gravitational and Doppler redshifts as the basis for proposing a new interpretation of the Hubble relation and the 2.7K Cosmic Blackbody Radiation.Comment: 9 pages LaTeX, no figure

    Super- and Hyperdeformed Isomeric States and Long-Lived Superheavy Elements

    Full text link
    The recent discoveries of the long-lived high spin super- and hyperdeformed isomeric states and their unusual radioactive decay properties are described. Based on their existence a consistent interpretation is given to the production of the long-lived superheavy element with Z = 112, via secondary reactions in CERN W targets, and to the low energy and very enhanced alpha-particle groups seen in various actinide fractions separated from the same W target. In addition, consistent interpretations are suggested for previously unexplained phenomena seen in nature. These are the Po halos, the low-energy enhanced 4.5 MeV alpha-particle group proposed to be due to an isotope of a superheavy element with Z = 108, and the giant halos.Comment: 4 pages. Contribution to the 2nd Int. Conf. on the Chemistry and Physics of the Transactinide Elements (TAN 03) Napa California, November 200

    Secret-Sharing for NP

    Get PDF
    A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing schemes. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (STOC 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement "x in L" for a language L in NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not in L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP

    Existence of long-lived isotopes of a superheavy element in natural Au

    Get PDF
    Evidence for the existence of long-lived isotopes with atomic mass numbers 261 and 265 and abundance of (1-10)x1010^{-10} relative to Au has been found in a study of natural Au using an inductively coupled plasma - sector field mass spectrometer. The measured masses fit the predictions made for the masses of 261^{261}Rg and 265^{265}Rg (Z=111) and for some isotopes of nearby elements. The possibility that these isotopes belong to the recently discovered class of long-lived high spin super- and hyperdeformed isomeric states is discussed.Comment: 4 pages, 3 figures, 2 table

    Homomorphic encryption and some black box attacks

    Full text link
    This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes, and that homomorphic encryption is an area of research where cryptography and black box algebra may benefit from exchange of ideas

    A fast single server private information retrieval protocol with low communication cost

    Get PDF
    Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be practical, a single server PIR protocol has to be both communicationally and computationally efficient. In this paper, we present a single server PIR protocol that has low communication cost and is much faster than existing protocols. A major building block of the PIR protocol in this paper is a tree-based compression scheme, which we call folding/unfolding. This compression scheme enables us to lower the communication complexity to O(loglogn). The other major building block is the BGV fully homomorphic encryption scheme. We show how we design the protocol to exploit the internal parallelism of the BGV scheme. This significantly reduces the server side computational overhead and makes our protocol much faster than the existing protocols. Our protocol can be further accelerated by utilising hardware parallelism. We have built a prototype of the protocol. We report on the performance of our protocol based on the prototype and compare it with the current most efficient protocols

    The benefits of using short interval satellite images to derive winds for tropical cyclones

    Get PDF
    During the 1975, 1976, and 1977, NOAA's National Environmental Satellite Service and NASA's Goddard Space Flight Center conducted a cooperative program to determine the optimum resolution and frequency of satellite images for deriving winds to study and forecast tropical cyclones. Rapid scan images were obtained at 7.5 minute interval from SMS-2 for hurricane Eloise and cyclone Caroline, and at 3 minute intervals from GOES-1 for tropical storms Belle, Holly, and Anita. Cloud motions were derived from these images using the Atmospheric and Oceanographic Information Processing System. Winds that were derived from the movement of upper and lower tropospheric level clouds using rapid scan data were compared with the 15 and 30 minute interval data. Greater than 10 (5) times as many clouds could be tracked to obtain winds using 3 and 7.5 minute rapid scan images as when using 15 or 30 minute interval images. A few bright areas within the central dense overcast which appeared to be moving with the winds at low levels were tracked
    corecore