64,232 research outputs found

    LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel

    Full text link
    A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through the wiretap channel as well as the equivocation rate about the message at the wiretapper. A code search procedure is suggested to obtain irregular LDPC codes that achieve good secrecy performance in such context.Comment: submitted to IEEE GLOBECOM 2011 - Communication Theory Symposiu

    Nutrients in waters on the inner shelf between Cape Charles and Cape Hatteras

    Get PDF
    The distribution of nutrients in the shelf waters of the southern tip of the Middle Atlantic Bight was investigated. It is concluded that the outflow of freshwater from the Chesapeake Bay is a potential source of nutrients to the adjacent shelf waters. However, a quantitative estimation of its importance cannot yet be made because (1) there are other sources of nutrients to the study area and these sources cannot yet be quantified and (2) the concentrations of nutrients in the outflow from Chesapeake Bay exhibit significant short-term and long-term temporal variabilities

    Password Cracking and Countermeasures in Computer Security: A Survey

    Full text link
    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we find that the survey work on the password cracking research has not been done very much. This paper is mainly to give a brief review of the password cracking methods, import technologies of password cracking, and the countermeasures against password cracking that are usually designed at two stages including the password design stage (e.g. user education, dynamic password, use of tokens, computer generations) and after the design (e.g. reactive password checking, proactive password checking, password encryption, access control). The main objective of this work is offering the abecedarian IT security professionals and the common audiences with some knowledge about the computer security and password cracking, and promoting the development of this area.Comment: add copyright to the tables to the original authors, add acknowledgement to helpe

    Mechanisms of sensorineural cell damage, death and survival in the cochlea.

    Get PDF
    The majority of acquired hearing loss, including presbycusis, is caused by irreversible damage to the sensorineural tissues of the cochlea. This article reviews the intracellular mechanisms that contribute to sensorineural damage in the cochlea, as well as the survival signaling pathways that can provide endogenous protection and tissue rescue. These data have primarily been generated in hearing loss not directly related to age. However, there is evidence that similar mechanisms operate in presbycusis. Moreover, accumulation of damage from other causes can contribute to age-related hearing loss (ARHL). Potential therapeutic interventions to balance opposing but interconnected cell damage and survival pathways, such as antioxidants, anti-apoptotics, and pro-inflammatory cytokine inhibitors, are also discussed

    Coherent transport in Nb/delta-doped-GaAs hybrid microstructures

    Full text link
    Coherent transport in Nb/GaAs superconductor-semiconductor microstructures is presented. The structures fabrication procedure is based on delta-doped layers grown by molecular-beam-epitaxy near the GaAs surface, followed by an As cap layer to protect the active semiconductor layers during ex situ transfer. The superconductor is then sputter deposited in situ after thermal desorption of the protective layer. Two types of structures in particular will be discussed, i.e., a reference junction and the engineered one that contains an additional insulating AlGaAs barrier inserted during the growth in the semiconductor. This latter configuration may give rise to controlled interference effects and realizes the model introduced by de Gennes and Saint-James in 1963. While both structures show reflectionless tunneling-dominated transport, only the engineered junction shows additionally a low-temperature single marked resonance peaks superimposed to the characteristic Andreev-dominated subgap conductance. The analysis of coherent magnetotransport in both microstructures is successfully performed within the random matrix theory of Andreev transport and ballistic effects are included by directly solving the Bogoliubov-de Gennes equations. The impact of junction morphology on reflectionless tunneling and the application of the employed fabrication technique to the realization of complex semiconductor-superconductor systems are furthermore discussed.Comment: 9 pages, 8 figures, invited review paper, to be published in Mod. Phys. Lett.
    corecore