657 research outputs found

    Optimal symmetric Tardos traitor tracing schemes

    Get PDF
    For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Skoric et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to 4 times shorter than Blayer and Tassa's, and up to 2 times shorter than the codes from Skoric et al. Asymptotically, we achieve the theoretical optimal codelength for Tardos' distribution function and the symmetric score function. For large coalitions, our codelengths are asymptotically about 4.93% of Tardos' original codelengths, which also improves upon results from Nuida et al.Comment: 16 pages, 1 figur

    Padua and Pisa are exponentially far apart

    Get PDF
    We answer the question posed by Ian Stewart which Padovan numbers are at the same time Fibonacci numbers. We give a result on the difference between Padovan and Fibonacci numbers, and on the growth of Padovan numbers with negative indices

    Electromagnetic form factors of the (rho) meson in light cone QCD sum rules

    Get PDF
    We investigate the electromagnetic form factors of the (rho) meson in light cone QCD sum rules. We find that the ratio of the magnetic and charge form factors is larger than two at all values of Q^2, (Q^2 >= 0.5 GeV^2). The values of the individual form factors at fixed values of Q^2 predicted by the light cone QCD sum rules are quite different compared to the results of other approaches. These results can be checked in future, when more precise data on (rho) meson form factors is available.Comment: 12 pages, 6 figures, LaTeX formatte

    Regulation of Mammalian Physiology by Interconnected Circadian and Feeding Rhythms.

    Get PDF
    Circadian clocks are endogenous timekeeping systems that adapt in an anticipatory fashion the physiology and behavior of most living organisms. In mammals, the master pacemaker resides in the suprachiasmatic nucleus and entrains peripheral clocks using a wide range of signals that differentially schedule physiology and gene expression in a tissue-specific manner. The peripheral clocks, such as those found in the liver, are particularly sensitive to rhythmic external cues like feeding behavior, which modulate the phase and amplitude of rhythmic gene expression. Consequently, the liver clock temporally tunes the expression of many genes involved in metabolism and physiology. However, the circadian modulation of cellular functions also relies on multiple layers of posttranscriptional and posttranslational regulation. Strikingly, these additional regulatory events may happen independently of any transcriptional oscillations, showing that complex regulatory networks ultimately drive circadian output functions. These rhythmic events also integrate feeding-related cues and adapt various metabolic processes to food availability schedules. The importance of such temporal regulation of metabolism is illustrated by metabolic dysfunctions and diseases resulting from circadian clock disruption or inappropriate feeding patterns. Therefore, the study of circadian clocks and rhythmic feeding behavior should be of interest to further advance our understanding of the prevention and therapy of metabolic diseases

    Chosen-Prefix Collisions for MD5 and Applications

    Get PDF
    We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of \emph{chosen-prefix collisions}. We have shown how, at an approximate expected cost of 2392^{39} calls to the MD5 compression function, for any two chosen message prefixes PP and PP', suffixes SS and SS' can be constructed such that the concatenated values PSP\|S and PSP'\|S' collide under MD5. The practical attack potential of this construction of chosen-prefix collisions is of greater concern than the MD5-collisions that were published before. This is illustrated by a pair of MD5-based X.509 certificates one of which was signed by a commercial Certification Authority (CA) as a legitimate website certificate, while the other one is a certificate for a rogue CA that is entirely under our control (cf.\ \url{http://www.win.tue.nl/hashclash/rogue-ca/}). Other examples, such as MD5-colliding executables, are presented as well. More details can be found on \url{http://www.win.tue.nl/hashclash/ChosenPrefixCollisions/}

    Air pollution trapping in the Dresden Basin from gray-zone scale urban modeling

    Get PDF
    The microscale variability of urban air pollution is essentially driven by the interaction between meteorology and urban topography, which remains challenging to represent spatially accurately and computationally efficiently in urban dispersion models. Natural topography can additionally exert a considerable amplifying effect on urban background pollution, depending on atmospheric stability. This requires an equally important representation in models, as even subtle terrain-height variations can enforce characteristic local flow regimes. In this model study, the effects of urban and natural topography on the local winds and air pollution dispersion in the Dresden Basin in the Eastern German Elbe valley are investigated. A new, efficient urban microscale model is used within a multiscale air quality modeling framework. The simulations that consider real meteorological and emission conditions focus on two periods in late winter and early summer, respectively, as well as on black carbon (BC), a key air pollutant mainly emitted from motorized traffic. As a complement to the commonly used mass concentrations, the particle age content (age concentration) is simulated. This concept, which was originally developed to study hydrological reservoir flows in a Eulerian framework, is adapted here for the first time for atmospheric boundary-layer modeling. The approach is used to identify stagnant or recirculating orographic air flows and resulting air pollution trapping. An empirical orthogonal function (EOF) analysis is applied to the simulation results to attribute the air pollution modes to specific weather patterns and quantify their significance. Air quality monitoring data for the region are used for model evaluation. The model results show a strong sensitivity to atmospheric conditions, but generally confirm increased BC levels in Dresden due to the valley location. The horizontal variability of mass concentrations is dominated by the patterns of traffic emissions, which overlay potential orography-driven pollutant accumulations. Therefore, an assessment of the orographic impact on air pollution is usually inconclusive. However, using the age-concentration metric, which filters out direct emission effects, previously undetected spatial patterns are discovered that are largely modulated by the surface orography. The comparison with a dispersion simulation assuming spatially homogeneous emissions also proves the robustness of the orographic flow information contained in the age-concentration distribution and shows it to be a suitable metric for assessing orographic air pollution trapping. The simulation analysis indicates several air quality hotspots on the southwestern slopes of the Dresden Basin and in the southern side valley, the Döhlen Basin, depending on the prevailing wind direction.</p

    Moral Foundations of Dietary Behavior and its Linkage to Sustainability and Feminism

    Full text link
    Received 23 February 2022. Accepted 13 September 2022. Published online 10 October 2022.In the current article, we explore and compare the moral-foundationsprofile of vegetarians, vegans, and meat eaters and investigate how it is related to real-world behavior. Results of two surveys demonstrate a link between eating behavior, moral foundations, environmental behavior, and feminist ideals. We demonstrate that vegans place greater value on individualizing foundations (i.e., Harm and Fairness) and meat eaters on binding foundations (i.e., Authority and Loyalty), while vegetarians fall in between these poles. In addition, we observed that in other behavioral domains requiring moral assessment (e.g., sustainable behavior, fair trade shopping), people act in accordance with the moral foundations matching their dietary choice as well. We propose that the psychological basis of diet choice is embedded in the broader framework of moral foundations theory and that eating behavior is not a psychologically encapsulated domain but intertwined with other domains of moral behavior

    Anharmonic effects in the A15 compounds induced by sublattice distortions

    Full text link
    We demonstrate that elastic anomalies and lattice instabilities in the the A15 compounds are describable in terms of first-principles LDA electronic structure calculations. We show that at T=0 V_3Si, V_3Ge, and Nb_3Sn are intrinsically unstable against shears with elastic moduli C_11-C_12 and C_44, and that the zone center phonons, Gamma_2 and Gamma_12, are either unstable or extremely soft. We demonstrate that sublattice relaxation (internal strain) effects are key to understanding the behavior of the A15 materials.Comment: 5 pages, RevTex, 3 postscript figures, Submitted to Phys. Rev. Lett. Apr. 23, 1997 July 7, 1997: minor corrections, final accepted versio

    Stripes, Non-Fermi-Liquid Behavior, and High-Tc Superconductivity

    Full text link
    The electronic structure of the high-Tc cuprates is studied in terms of "large-U" and "small-U" orbitals. A striped structure and three types of quasiparticles are obtained, polaron-like "stripons" carrying charge, "svivons" carrying spin, and "quasielectrons" carrying both. The anomalous properties are explained, and specifically the behavior of the resistivity, Hall constant, and thermoelectric power. High-temperature superconductivity results from transitions between pair states of quasielectrons and stripons.Comment: 4 page

    Chosen-prefix collisions for MD5 and applications

    Get PDF
    We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 239 calls to the MD5 compression function, for any two chosen message prefixes P and P', suffixes S and S' can be constructed such that the concatenated values P||S and P'||S' collide under MD5. The practical attack potential of this construction of chosen-prefix collisions is of greater concern than the MD5-collisions that were published before. This is illustrated by a pair of MD5-based X.509 certificates one of which was signed by a commercial Certification Authority (CA) as a legitimate website certificate, while the other one is a certificate for a rogue CA that is entirely under our control (cf. http://www.win.tue.nl/hashclash/rogue-ca/). Other examples, such as MD5-colliding executables, are presented as well. More details can be found on http://www.win.tue.nl/hashclash/ChosenPrefixCollisions/
    corecore