104,092 research outputs found

    A refined invariant subspace method and applications to evolution equations

    Full text link
    The invariant subspace method is refined to present more unity and more diversity of exact solutions to evolution equations. The key idea is to take subspaces of solutions to linear ordinary differential equations as invariant subspaces that evolution equations admit. A two-component nonlinear system of dissipative equations was analyzed to shed light on the resulting theory, and two concrete examples are given to find invariant subspaces associated with 2nd-order and 3rd-order linear ordinary differential equations and their corresponding exact solutions with generalized separated variables.Comment: 16 page

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Analysis of security protocols using finite-state machines

    Get PDF
    This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay

    Biometric identity-based cryptography for e-Government environment

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Use of elastic stability analysis to explain the stress-dependent nature of soil strength

    Get PDF
    The peak and critical state strengths of sands are linearly related to the stress level, just as the frictional resistance to sliding along an interface is related to the normal force. The analogy with frictional sliding has led to the use of a ‘friction angle’ to describe the relationship between strength and stress for soils. The term ‘friction angle’ implies that the underlying mechanism is frictional resistance at the particle contacts. However, experiments and discrete element simulations indicate that the material friction angle is not simply related to the friction angle at the particle contacts. Experiments and particle-scale simulations of model sands have also revealed the presence of strong force chains, aligned with the major principal stress. Buckling of these strong force chains has been proposed as an alternative to the frictional-sliding failure mechanism. Here, using an idealized abstraction of a strong force chain, the resistance is shown to be linearly proportional to the magnitude of the lateral forces supporting the force chain. Considering a triaxial stress state, and drawing an analogy between the lateral forces and the confining pressure in a triaxial test, a linear relationship between stress level and strength is seen to emerge from the failure-by-buckling hypothesis

    Finite dimensional integrable Hamiltonian systems associated with DSI equation by Bargmann constraints

    Full text link
    The Davey-Stewartson I equation is a typical integrable equation in 2+1 dimensions. Its Lax system being essentially in 1+1 dimensional form has been found through nonlinearization from 2+1 dimensions to 1+1 dimensions. In the present paper, this essentially 1+1 dimensional Lax system is further nonlinearized into 1+0 dimensional Hamiltonian systems by taking the Bargmann constraints. It is shown that the resulting 1+0 dimensional Hamiltonian systems are completely integrable in Liouville sense by finding a full set of integrals of motion and proving their functional independence.Comment: 10 pages, in LaTeX, to be published in J. Phys. Soc. Jpn. 70 (2001
    • …
    corecore