42,756 research outputs found

    An Overview of Economic Approaches to Information Security Management

    Get PDF
    The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions

    An information retrieval approach to ontology mapping

    Get PDF
    In this paper, we present a heuristic mapping method and a prototype mapping system that support the process of semi-automatic ontology mapping for the purpose of improving semantic interoperability in heterogeneous systems. The approach is based on the idea of semantic enrichment, i.e., using instance information of the ontology to enrich the original ontology and calculate similarities between concepts in two ontologies. The functional settings for the mapping system are discussed and the evaluation of the prototype implementation of the approach is reported. \ud \u

    Network support for integrated design

    Get PDF
    A framework of network support for utilization of integrated design over the Internet has been developed. The techniques presented also applicable for Intranet/Extranet. The integrated design system was initially developed for local application in a single site. With the network support, geographically dispersed designers can collaborate a design task through out the total design process, quickly respond to clients’ requests and enhance the design argilty. In this paper, after a brief introduction of the integrated design system, the network support framework is presented, followed by description of two key techniques involved: Java Saverlet approach for remotely executing a large program and online CAD collaboration

    A conditional quantum phase gate between two 3-state atoms

    Get PDF
    We propose a scheme for conditional quantum logic between two 3-state atoms that share a quantum data-bus such as a single mode optical field in cavity QED systems, or a collective vibrational state of trapped ions. Making use of quantum interference, our scheme achieves successful conditional phase evolution without any real transitions of atomic internal states or populating the quantum data-bus. In addition, it only requires common addressing of the two atoms by external laser fields.Comment: 8 fig

    A new calibration method for time delay standard and its application

    Get PDF
    A method which is used to measure time delay accurately by using a Type 900-LB slotted line is described. The accuracy for calibrating time delay of a precision coaxial air line Type 900-L is about + or - (0.4 to 0.6)ps, and for coaxial cables with VSWR less than 1.5 and time delay t less than 50ns is about + or - (3 to 5)ps. Theoretical analysis and mathematical derivation of microwave networks in cascade are given. Methods to eliminate the errors which are caused by the discontinuities and the error analysis of the measuring system are presented. Skin effect analysis of the transient characteristic of coaxial transmission line are discussed in detail. Methods to eliminate the errors which result from using the calibrated time delay standard to calibrate time interval measurement instruments are presented. The estimation of errors and formulae for correction of those errors are described

    New quaternary sequences of even length with optimal auto-correlation

    Full text link
    Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length NN can be obtained from two binary sequences of the same length, which are called component sequences. In this paper, using interleaving method, we present several classes of component sequences from twin-prime sequences pairs or GMW sequences pairs given by Tang and Ding in 2010; two, three or four binary sequences defined by cyclotomic classes of order 44. Hence we can obtain new classes of quaternary sequences, which are different from known ones, since known component sequences are constructed from a pair of binary sequences with optimal auto-correlation or Sidel'nikov sequences.Comment: This paper was submitted to Science China: Information Sciences at Oct 16, 2016, and accpted for publication at Apr 27, 201

    Macroscopic Quantum Tunneling Effect of Z2 Topological Order

    Full text link
    In this paper, macroscopic quantum tunneling (MQT) effect of Z2 topological order in the Wen-Plaquette model is studied. This kind of MQT is characterized by quantum tunneling processes of different virtual quasi-particles moving around a torus. By a high-order degenerate perturbation approach, the effective pseudo-spin models of the degenerate ground states are obtained. From these models, we get the energy splitting of the ground states, of which the results are consistent with those from exact diagonalization methodComment: 25 pages, 14 figures, 4 table

    Chiral anomaly of Weyl magnons in stacked honeycomb ferromagnets

    Full text link
    Chiral anomaly of Weyl magnons (WMs), featured by nontrivial band crossings at paired Weyl nodes (WNs) of opposite chirality, is investigated. It is shown that WMs can be realized in stacked honeycomb ferromagnets. Using the Aharonov-Casher effect that is about the interaction between magnetic moments and electric fields, the magnon motion in honeycomb layers can be quantized into magnonic Landau levels (MLLs). The zeroth MLL is chiral so that unidirectional WMs propagate in the perpendicular (to the layer) direction for a given WN under a magnetic field gradient from one WN to the other and change their chiralities, resulting in the magnonic chiral anomaly (MCA). A net magnon current carrying spin and heat through the zeroth MLL depends linearly on the magnetic field gradient and the electric field gradient in the ballistic transport.Comment: 8 pages, 8 figure

    Fermi gas in harmonic oscillator potentials

    Full text link
    Assuming the validity of grand canonical statistics, we study the properties of a spin-polarized Fermi gas in harmonic traps. Universal forms of Fermi temperature TFT_F, internal energy UU and the specific heat per particle of the trapped Fermi gas are calculated as a {\it function} of particle number, and the results compared with those of infinite number particles.Comment: 8 pages, 1 figure, LATE
    corecore