42,756 research outputs found
An Overview of Economic Approaches to Information Security Management
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions
An information retrieval approach to ontology mapping
In this paper, we present a heuristic mapping method and a prototype mapping system that support the process of semi-automatic ontology mapping for the purpose of improving semantic interoperability in heterogeneous systems. The approach is based on the idea of semantic enrichment, i.e., using instance information of the ontology to enrich the original ontology and calculate similarities between concepts in two ontologies. The functional settings for the mapping system are discussed and the evaluation of the prototype implementation of the approach is reported. \ud
\u
Network support for integrated design
A framework of network support for utilization of integrated design over the Internet has been developed. The techniques presented also applicable for Intranet/Extranet. The integrated design system was initially developed for local application in a single site. With the network support, geographically dispersed designers can collaborate a design task through out the total design process, quickly respond to clients’ requests and enhance the design argilty. In this paper, after a brief introduction of the integrated design system, the network support framework is presented, followed by description of two key techniques involved: Java Saverlet approach for remotely executing a large program and online CAD collaboration
A conditional quantum phase gate between two 3-state atoms
We propose a scheme for conditional quantum logic between two 3-state atoms
that share a quantum data-bus such as a single mode optical field in cavity QED
systems, or a collective vibrational state of trapped ions. Making use of
quantum interference, our scheme achieves successful conditional phase
evolution without any real transitions of atomic internal states or populating
the quantum data-bus. In addition, it only requires common addressing of the
two atoms by external laser fields.Comment: 8 fig
A new calibration method for time delay standard and its application
A method which is used to measure time delay accurately by using a Type 900-LB slotted line is described. The accuracy for calibrating time delay of a precision coaxial air line Type 900-L is about + or - (0.4 to 0.6)ps, and for coaxial cables with VSWR less than 1.5 and time delay t less than 50ns is about + or - (3 to 5)ps. Theoretical analysis and mathematical derivation of microwave networks in cascade are given. Methods to eliminate the errors which are caused by the discontinuities and the error analysis of the measuring system are presented. Skin effect analysis of the transient characteristic of coaxial transmission line are discussed in detail. Methods to eliminate the errors which result from using the calibrated time delay standard to calibrate time interval measurement instruments are presented. The estimation of errors and formulae for correction of those errors are described
New quaternary sequences of even length with optimal auto-correlation
Sequences with low auto-correlation property have been applied in
code-division multiple access communication systems, radar and cryptography.
Using the inverse Gray mapping, a quaternary sequence of even length can be
obtained from two binary sequences of the same length, which are called
component sequences. In this paper, using interleaving method, we present
several classes of component sequences from twin-prime sequences pairs or GMW
sequences pairs given by Tang and Ding in 2010; two, three or four binary
sequences defined by cyclotomic classes of order . Hence we can obtain new
classes of quaternary sequences, which are different from known ones, since
known component sequences are constructed from a pair of binary sequences with
optimal auto-correlation or Sidel'nikov sequences.Comment: This paper was submitted to Science China: Information Sciences at
Oct 16, 2016, and accpted for publication at Apr 27, 201
Macroscopic Quantum Tunneling Effect of Z2 Topological Order
In this paper, macroscopic quantum tunneling (MQT) effect of Z2 topological
order in the Wen-Plaquette model is studied. This kind of MQT is characterized
by quantum tunneling processes of different virtual quasi-particles moving
around a torus. By a high-order degenerate perturbation approach, the effective
pseudo-spin models of the degenerate ground states are obtained. From these
models, we get the energy splitting of the ground states, of which the results
are consistent with those from exact diagonalization methodComment: 25 pages, 14 figures, 4 table
Chiral anomaly of Weyl magnons in stacked honeycomb ferromagnets
Chiral anomaly of Weyl magnons (WMs), featured by nontrivial band crossings
at paired Weyl nodes (WNs) of opposite chirality, is investigated. It is shown
that WMs can be realized in stacked honeycomb ferromagnets. Using the
Aharonov-Casher effect that is about the interaction between magnetic moments
and electric fields, the magnon motion in honeycomb layers can be quantized
into magnonic Landau levels (MLLs). The zeroth MLL is chiral so that
unidirectional WMs propagate in the perpendicular (to the layer) direction for
a given WN under a magnetic field gradient from one WN to the other and change
their chiralities, resulting in the magnonic chiral anomaly (MCA). A net magnon
current carrying spin and heat through the zeroth MLL depends linearly on the
magnetic field gradient and the electric field gradient in the ballistic
transport.Comment: 8 pages, 8 figure
Fermi gas in harmonic oscillator potentials
Assuming the validity of grand canonical statistics, we study the properties
of a spin-polarized Fermi gas in harmonic traps. Universal forms of Fermi
temperature , internal energy and the specific heat per particle of
the trapped Fermi gas are calculated as a {\it function} of particle number,
and the results compared with those of infinite number particles.Comment: 8 pages, 1 figure, LATE
- …
