1,066 research outputs found

    When is a Function Securely Computable?

    Full text link
    A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided secret key" capacity of an associated secrecy generation model, for which a single-letter characterization is provided

    Social Media Alcohol Marketing and Its Impact on Young People’s Alcohol Use: A Comparison between India and Australia

    Get PDF
    A cross-national comparison of 1) marketing strategies used by leading Indian and Australian alcohol brands on their official social media (SM) pages and 2) the association between exposure to SM alcohol marketing and alcohol use among young Indians and Australians, was conducted. Results suggest that alcohol companies tailor strategies to specific national contexts to engage users with these strategies. Significant associations were identified between alcohol-related content posted on SM and young people’s alcohol use

    Reduction and Swelling Behaviour of Fired Iron Ore Pellets

    Get PDF
    The present project work on “Reduction and Swelling Behaviour of Fired Iron Ore Pellets” was undertaken with a view to promote the effective utilization of iron ore and coal fines in sponge iron making. Presently, India has become the world leader in sponge iron production and the production of steel by DR-EAF route is increasing day by day. In the present project work, the effect of addition of concentrated sugarcane juice binder on the physical properties of fired iron ore pellets was investigated. The crushing strength and drop number were found to be maximum at 2% binder addition, followed by a decrease with further increase in binder concentration. A reverse trend was observed in the case of porosity, i.e. porosity of fired pellets increased with rise in binder concentration from 2% to 6%. The pellets fired at 13000C were processed for reduction and swelling studies in different types of coal. The degree of reduction of fired iron ore pellets increased with increase of reduction temperature and time up to the range studied. The extent of swelling in fired iron ore pellets during their production increased with increase of reduction time, most probably due to the structural changes and fibrous growth of iron particles. SEM images of few reduced iron ore pellets were also taken

    Anti-Phishing Techniques in Cryptography

    Get PDF
    Phishing is a process in which Phishers try to leak out the credentials of users by hosting a fake web page on user's browser. To save users from phishing attacks, many researchers have dug deep and presented their insights. Nowadays, in the era of 21st century,  banks are using the OTP and visual cryptography for the authentication of both sides i.e. user and the bank. In this paper, we are proposing a methodology in which a user will need to give his finger prints as an authentication

    Handling constraints in Robust multi-objective optimization

    Get PDF
    Robust multi-objective optimization has emerged as an active research. A recent study proposed two different definitions of robust solutions in the context of multi-objective optimization. In this paper, we extend the concepts for finding robust solutions in the presence of active constraints. The meaning of robust solutions for constrained problems is demonstrated by suggesting three test problems and simulating an evolutionary multi-objective optimization method using the two definitions of robustness. The inclusion of constraint handling strategies makes the multi-objective robust optimization procedure more pragmatic and the procedure is now ready to be applied to real-world problems

    Quantum Sensor Network Algorithms for Transmitter Localization

    Full text link
    A quantum sensor (QS) is able to measure various physical phenomena with extreme sensitivity. QSs have been used in several applications such as atomic interferometers, but few applications of a quantum sensor network (QSN) have been proposed or developed. We look at a natural application of QSN -- localization of an event (in particular, of a wireless signal transmitter). In this paper, we develop effective quantum-based techniques for the localization of a transmitter using a QSN. Our approaches pose the localization problem as a well-studied quantum state discrimination (QSD) problem and address the challenges in its application to the localization problem. In particular, a quantum state discrimination solution can suffer from a high probability of error, especially when the number of states (i.e., the number of potential transmitter locations in our case) can be high. We address this challenge by developing a two-level localization approach, which localizes the transmitter at a coarser granularity in the first level, and then, in a finer granularity in the second level. We address the additional challenge of the impracticality of general measurements by developing new schemes that replace the QSD's measurement operator with a trained parameterized hybrid quantum-classical circuit. Our evaluation results using a custom-built simulator show that our best scheme is able to achieve meter-level (1-5m) localization accuracy; in the case of discrete locations, it achieves near-perfect (99-100\%) classification accuracy.Comment: 11 pages, 10 figure
    corecore