294 research outputs found

    Anomalous Electron Transport in Field-Effect Transistors with Titanium Ditelluride Semimetal Thin-Film Channels

    Full text link
    We report on "graphene-like" mechanical exfoliation of thin films of titanium ditelluride and investigation of their electronic properties. The exfoliated crystalline TiTe2 films were used as the channel layers in the back-gated field-effect transistors fabricated with Ti/Al/Au metal contacts on SiO2/Si substrates. The room-temperature current-voltage characteristics revealed strongly non-linear behavior with signatures of the source-drain threshold voltage similar to those observed in the charge-density-wave devices. The drain-current showed an unusual non-monotonic dependence on the gate bias characterized by the presence of multiple peaks. The obtained results can be potentially used for implementation of the non-Boolean logic gates.Comment: 11 pages, 4 figure

    Hybrid fuzzy and sliding-mode control for motorised tether spin-up when coupled with axial vibration

    Get PDF
    A hybrid fuzzy sliding mode controller is applied to the control of motorised tether spin-up coupled with an axial oscillation phenomenon. A six degree of freedom dynamic model of a motorised momentum exchange tether is used as a basis for interplanetary payload exchange. The tether comprises a symmetrical double payload configuration, with an outrigger counter inertia and massive central facility. It is shown that including axial elasticity permits an enhanced level of performance prediction accuracy and a useful departure from the usual rigid body representations, particularly for accurate payload positioning at strategic points. A special simulation program has been devised in MATLAB and MATHEMATICA for a given initial condition data case

    Two-Step Model of Fusion for Synthesis of Superheavy Elements

    Get PDF
    A new model is proposed for fusion mechanisms of massive nuclear systems where so-called fusion hindrance exists. The model describes two-body collision processes in an approaching phase and shape evolutions of an amalgamated system into the compound nucleus formation. It is applied to 48^{48}Ca-induced reactions and is found to reproduce the experimental fusion cross sections extremely well, without any free parameter. Combined with the statistical decay theory, residue cross sections for the superheavy elements can be readily calculated. Examples are given.Comment: 4 pages, 4 figure

    Fusion hindrance and roles of shell effects in superheavy mass region

    Get PDF
    We present the first attempt of systematically investigating the effects of shell correction energy for a dynamical process, which includes fusion, fusion-fission and quasi-fission processes. In the superheavy mass region, for the fusion process, shell correction energy plays a very important role and enhances the fusion probability when the colliding partner has a strong shell structure. By analyzing the trajectory in three-dimensional coordinate space with the Langevin equation, we reveal the mechanism of the enhancement of the fusion probability caused by `cold fusion valleys'. The temperature dependence of shell correction energy is considered.Comment: 31 pages, 23 figures, Accepted for publication in Nuclear Physics

    KCRS: A Blockchain-Based Key Compromise Resilient Signature System

    Get PDF
    Digital signatures are widely used to assure authenticity and integrity of messages (including blockchain transactions). This assurance is based on assumption that the private signing key is kept secret, which may be exposed or compromised without being detected in the real world. Many schemes have been proposed to mitigate this problem, but most schemes are not compatible with widely used digital signature standards and do not help detect private key exposures. In this paper, we propose a Key Compromise Resilient Signature (KCRS) system, which leverages blockchain to detect key compromises and mitigate the consequences. Our solution keeps a log of valid certificates and digital signatures that have been issued on the blockchain, which can deter the abuse of compromised private keys. Since the blockchain is an open system, KCRS also provides a privacy protection mechanism to prevent the public from learning the relationship between signatures. We present a theoretical framework for the security of the system and a provably-secure construction. We also implement a prototype of KCRS and conduct experiments to demonstrate its practicability

    Temporally ordered collective creep and dynamic transition in the charge-density-wave conductor NbSe3

    Full text link
    We have observed an unusual form of creep at low temperatures in the charge-density-wave (CDW) conductor NbSe3_3. This creep develops when CDW motion becomes limited by thermally-activated phase advance past individual impurities, demonstrating the importance of local pinning and related short-length-scale dynamics. Unlike in vortex lattices, elastic collective dynamics on longer length scales results in temporally ordered motion and a finite threshold field. A first-order dynamic phase transition from creep to high-velocity sliding produces "switching" in the velocity-field characteristic.Comment: 4 pages, 4 eps figures; minor clarifications To be published in Phys. Rev. Let

    Lattice Blind Signatures with Forward Security

    Get PDF
    Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a current secret key does not compromise past secret keys. This means that forward-secure signatures must include a mechanism for secret-key evolution over time periods. This paper gives a construction of the first blind signature that is forward secure. The construction is based on the SIS assumption in the lattice setting. The core techniques applied are the binary tree data structure for the time periods and the trapdoor delegation for the key-evolution mechanism.Comment: ACISP 202

    On the Design of Forgiving Biometric Security Systems

    Get PDF
    This work aims to highlight the fundamental issue surrounding biometric security systems: it's all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identi cation and access to security systems and premises, access to nancial accounts and hence the ability to use the victim's nances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim's biometric parts by force e.g. severing the parts from the victim's body; this poses a risk and threat not just to the individual's uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one's assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used
    • 

    corecore