890 research outputs found
Public channel cryptography by synchronization of neural networks and chaotic maps
Two different kinds of synchronization have been applied to cryptography:
Synchronization of chaotic maps by one common external signal and
synchronization of neural networks by mutual learning. By combining these two
mechanisms, where the external signal to the chaotic maps is synchronized by
the nets, we construct a hybrid network which allows a secure generation of
secret encryption keys over a public channel. The security with respect to
attacks, recently proposed by Shamir et al, is increased by chaotic
synchronization.Comment: 4 page
Infrared Metasurfaces Created with Off-Normal Incidence Microsphere Photolithography
Fabricating metasurfaces over large areas at low costs remains a critical challenge to their practical implementation. This paper reports on the use of microsphere photolithography (MPL) to create infrared metasurfaces by changing the angle-of-incidence of the illumination to steer the photonic jet. The displacement of the photonic jet is shown to scale with the diameter of the microsphere while the exposure dose scales with the square of the microsphere diameter. This process is robust in the presence of local defects in the microsphere lattice. The paper demonstrates patterning split ring resonators and tripole based metasurfaces using MPL, which are fabricated and characterized with FTIR. The combination of bottom-up and top-down approaches in off-normal incidence microsphere photolithography technique provides cost-effective, flexible, and high-throughput fabrication of infrared metasurfaces
Near Field Transducer for Heat Assisted Magnetic Recording
An antenna for heat assisted magnetic recording is disclosed. The antenna includes an optically opaque material and an optically transparent material positioned on the optically opaque material, the optically transparent material includes a half bowtie shape which includes a first half-wing substantially shaped in form of a right angle trapezoid, having a height substantially equal to the overall height of the half bowtie, a second half-wing Substantially shaped in form of a mirror image of the first half-wing and formed proximate and coupled to the first half-wing by a Substantially rectangular aperture having an aperture width and an aperture height. The aperture height is as Small as 1 nm
Frequency-Selective Metasurface Integrated Uncooled Microbolometers
A metasurface integrated microbolometer having a sensing layer (e.g., SixGeyO1-x-y). The presence of the metasurface provides selectivity with respect to wavelength, polarization and angle-of-incidence. The presence of the metasurface into the microbolometer affects conversion of electromagnetic to thermal energy, thermal response, electrical integration of the microbolometer, and the tradeoff between resistivity and temperature coefficient of resistance, thereby allowing the ability to obtain a sensing with high temperature coefficient of resistance with lower resistivity values than that of films without the metasurface. The presence of the metasurface removes the need for a Fabry-Perot cavity
Mutual learning in a tree parity machine and its application to cryptography
Mutual learning of a pair of tree parity machines with continuous and
discrete weight vectors is studied analytically. The analysis is based on a
mapping procedure that maps the mutual learning in tree parity machines onto
mutual learning in noisy perceptrons. The stationary solution of the mutual
learning in the case of continuous tree parity machines depends on the learning
rate where a phase transition from partial to full synchronization is observed.
In the discrete case the learning process is based on a finite increment and a
full synchronized state is achieved in a finite number of steps. The
synchronization of discrete parity machines is introduced in order to construct
an ephemeral key-exchange protocol. The dynamic learning of a third tree parity
machine (an attacker) that tries to imitate one of the two machines while the
two still update their weight vectors is also analyzed. In particular, the
synchronization times of the naive attacker and the flipping attacker recently
introduced in [1] are analyzed. All analytical results are found to be in good
agreement with simulation results
Cryptography based on neural networks - analytical results
Mutual learning process between two parity feed-forward networks with
discrete and continuous weights is studied analytically, and we find that the
number of steps required to achieve full synchronization between the two
networks in the case of discrete weights is finite. The synchronization process
is shown to be non-self-averaging and the analytical solution is based on
random auxiliary variables. The learning time of an attacker that is trying to
imitate one of the networks is examined analytically and is found to be much
longer than the synchronization time. Analytical results are found to be in
agreement with simulations
In-situ Lock-in Thermographic Measurement Of Powder Layer Thermal Diffusivity And Thickness In Laser Powder Bed Fusion
The thermal transport properties of the powder layer play a crucial role in the process of laser powder bed fusion (LPBF). This paper introduces an in-situ measurement method utilizing active lock-in infrared thermography (LIT) to determine the thermal diffusivity and thickness of the powder layer. The proposed method exhibits great potential for accurate powder property and thickness measurements and real-time process monitoring. In this lock-in thermographic technique, the LPBF laser beam is directed through an optical diffuser and modulated into a square thermal wave. This thermal wave serves as an active heat source to heat the surface of the powder bed. The surface temperature response is captured using a long-wave infrared (LWIR) camera. A one-dimensional thermal model is employed to provide insights into heat transfer in the frequency domain. The frequency-dependent phase response of temperature is influenced by the effective thermal diffusivity and thickness of the powder layer. This model is validated experimentally first and then utilized to measure the thermal diffusivity of different powder layers created using various particle sizes and wiper spreading speeds. Larger particle size and slower wiper spreading speed are shown to produce higher thermal diffusivity. Finally, the paper shows how this technique can be used to measure the powder layer thickness over printed geometries. This capability enables the detection of deviations in the fused part surface or errors in the wiper through analysis of resulting variations in the powder. These findings highlight the potential of the lock-in thermographic technique for rapid in-situ inspection of the new powder layer in laser powder bed fusion (LPBF) processes
Public Channel Cryptography: Chaos Synchronization and Hilbert's Tenth Problem
The synchronization process of two mutually delayed coupled deterministic
chaotic maps is demonstrated both analytically and numerically. The
synchronization is preserved when the mutually transmitted signal is concealed
by two commutative private filters that are placed on each end of the
communication channel. We demonstrate that when the transmitted signal is a
convolution of the truncated time delayed output signals or some powers of the
delayed output signals synchronization is still maintained. The task of a
passive attacker is mapped onto Hilbert's tenth problem, solving a set of
nonlinear Diophantine equations, which was proven to be in the class of
NP-Complete problems. This bridge between two different disciplines,
synchronization in nonlinear dynamical processes and the realm of the NPC
problems, opens a horizon for a new type of secure public-channel protocols
A simple model of epitaxial growth
A discrete solid-on-solid model of epitaxial growth is introduced which, in a
simple manner, takes into account the effect of an Ehrlich-Schwoebel barrier at
step edges as well as the local relaxation of incoming particles. Furthermore a
fast step edge diffusion is included in 2+1 dimensions. The model exhibits the
formation of pyramid-like structures with a well-defined constant inclination
angle. Two regimes can be distinguished clearly: in an initial phase (I) a
definite slope is selected while the number of pyramids remains unchanged. Then
a coarsening process (II) is observed which decreases the number of islands
according to a power law in time. Simulations support self-affine scaling of
the growing surface in both regimes. The roughness exponent is alpha =1 in all
cases. For growth in 1+1 dimensions we obtain dynamic exponents z = 2 (I) and z
= 3 (II). Simulations for d=2+1 seem to be consistent with z= 2 (I) and z= 2.3
(II) respectively.Comment: 8 pages Latex2e, 4 Postscript figures included, uses packages
a4wide,epsfig,psfig,amsfonts,latexsy
Log-Poisson Statistics and Extended Self-Similarity in Driven Dissipative Systems
The Bak-Chen-Tang forest fire model was proposed as a toy model of turbulent
systems, where energy (in the form of trees) is injected uniformly and
globally, but is dissipated (burns) locally. We review our previous results on
the model and present our new results on the statistics of the higher-order
moments for the spatial distribution of fires. We show numerically that the
spatial distribution of dissipation can be described by Log-Poisson statistics
which leads to extended self-similarity (ESS). Similar behavior is also found
in models based on directed percolation; this suggests that the concept of
Log-Poisson statistics of (appropriately normalized) variables can be used to
describe scaling not only in turbulence but also in a wide range of driven
dissipative systems.Comment: 10 pages, 5 figure
- …