890 research outputs found

    Public channel cryptography by synchronization of neural networks and chaotic maps

    Full text link
    Two different kinds of synchronization have been applied to cryptography: Synchronization of chaotic maps by one common external signal and synchronization of neural networks by mutual learning. By combining these two mechanisms, where the external signal to the chaotic maps is synchronized by the nets, we construct a hybrid network which allows a secure generation of secret encryption keys over a public channel. The security with respect to attacks, recently proposed by Shamir et al, is increased by chaotic synchronization.Comment: 4 page

    Infrared Metasurfaces Created with Off-Normal Incidence Microsphere Photolithography

    Get PDF
    Fabricating metasurfaces over large areas at low costs remains a critical challenge to their practical implementation. This paper reports on the use of microsphere photolithography (MPL) to create infrared metasurfaces by changing the angle-of-incidence of the illumination to steer the photonic jet. The displacement of the photonic jet is shown to scale with the diameter of the microsphere while the exposure dose scales with the square of the microsphere diameter. This process is robust in the presence of local defects in the microsphere lattice. The paper demonstrates patterning split ring resonators and tripole based metasurfaces using MPL, which are fabricated and characterized with FTIR. The combination of bottom-up and top-down approaches in off-normal incidence microsphere photolithography technique provides cost-effective, flexible, and high-throughput fabrication of infrared metasurfaces

    Near Field Transducer for Heat Assisted Magnetic Recording

    Get PDF
    An antenna for heat assisted magnetic recording is disclosed. The antenna includes an optically opaque material and an optically transparent material positioned on the optically opaque material, the optically transparent material includes a half bowtie shape which includes a first half-wing substantially shaped in form of a right angle trapezoid, having a height substantially equal to the overall height of the half bowtie, a second half-wing Substantially shaped in form of a mirror image of the first half-wing and formed proximate and coupled to the first half-wing by a Substantially rectangular aperture having an aperture width and an aperture height. The aperture height is as Small as 1 nm

    Frequency-Selective Metasurface Integrated Uncooled Microbolometers

    Get PDF
    A metasurface integrated microbolometer having a sensing layer (e.g., SixGeyO1-x-y). The presence of the metasurface provides selectivity with respect to wavelength, polarization and angle-of-incidence. The presence of the metasurface into the microbolometer affects conversion of electromagnetic to thermal energy, thermal response, electrical integration of the microbolometer, and the tradeoff between resistivity and temperature coefficient of resistance, thereby allowing the ability to obtain a sensing with high temperature coefficient of resistance with lower resistivity values than that of films without the metasurface. The presence of the metasurface removes the need for a Fabry-Perot cavity

    Mutual learning in a tree parity machine and its application to cryptography

    Full text link
    Mutual learning of a pair of tree parity machines with continuous and discrete weight vectors is studied analytically. The analysis is based on a mapping procedure that maps the mutual learning in tree parity machines onto mutual learning in noisy perceptrons. The stationary solution of the mutual learning in the case of continuous tree parity machines depends on the learning rate where a phase transition from partial to full synchronization is observed. In the discrete case the learning process is based on a finite increment and a full synchronized state is achieved in a finite number of steps. The synchronization of discrete parity machines is introduced in order to construct an ephemeral key-exchange protocol. The dynamic learning of a third tree parity machine (an attacker) that tries to imitate one of the two machines while the two still update their weight vectors is also analyzed. In particular, the synchronization times of the naive attacker and the flipping attacker recently introduced in [1] are analyzed. All analytical results are found to be in good agreement with simulation results

    Cryptography based on neural networks - analytical results

    Full text link
    Mutual learning process between two parity feed-forward networks with discrete and continuous weights is studied analytically, and we find that the number of steps required to achieve full synchronization between the two networks in the case of discrete weights is finite. The synchronization process is shown to be non-self-averaging and the analytical solution is based on random auxiliary variables. The learning time of an attacker that is trying to imitate one of the networks is examined analytically and is found to be much longer than the synchronization time. Analytical results are found to be in agreement with simulations

    In-situ Lock-in Thermographic Measurement Of Powder Layer Thermal Diffusivity And Thickness In Laser Powder Bed Fusion

    Get PDF
    The thermal transport properties of the powder layer play a crucial role in the process of laser powder bed fusion (LPBF). This paper introduces an in-situ measurement method utilizing active lock-in infrared thermography (LIT) to determine the thermal diffusivity and thickness of the powder layer. The proposed method exhibits great potential for accurate powder property and thickness measurements and real-time process monitoring. In this lock-in thermographic technique, the LPBF laser beam is directed through an optical diffuser and modulated into a square thermal wave. This thermal wave serves as an active heat source to heat the surface of the powder bed. The surface temperature response is captured using a long-wave infrared (LWIR) camera. A one-dimensional thermal model is employed to provide insights into heat transfer in the frequency domain. The frequency-dependent phase response of temperature is influenced by the effective thermal diffusivity and thickness of the powder layer. This model is validated experimentally first and then utilized to measure the thermal diffusivity of different powder layers created using various particle sizes and wiper spreading speeds. Larger particle size and slower wiper spreading speed are shown to produce higher thermal diffusivity. Finally, the paper shows how this technique can be used to measure the powder layer thickness over printed geometries. This capability enables the detection of deviations in the fused part surface or errors in the wiper through analysis of resulting variations in the powder. These findings highlight the potential of the lock-in thermographic technique for rapid in-situ inspection of the new powder layer in laser powder bed fusion (LPBF) processes

    Public Channel Cryptography: Chaos Synchronization and Hilbert's Tenth Problem

    Full text link
    The synchronization process of two mutually delayed coupled deterministic chaotic maps is demonstrated both analytically and numerically. The synchronization is preserved when the mutually transmitted signal is concealed by two commutative private filters that are placed on each end of the communication channel. We demonstrate that when the transmitted signal is a convolution of the truncated time delayed output signals or some powers of the delayed output signals synchronization is still maintained. The task of a passive attacker is mapped onto Hilbert's tenth problem, solving a set of nonlinear Diophantine equations, which was proven to be in the class of NP-Complete problems. This bridge between two different disciplines, synchronization in nonlinear dynamical processes and the realm of the NPC problems, opens a horizon for a new type of secure public-channel protocols

    A simple model of epitaxial growth

    Full text link
    A discrete solid-on-solid model of epitaxial growth is introduced which, in a simple manner, takes into account the effect of an Ehrlich-Schwoebel barrier at step edges as well as the local relaxation of incoming particles. Furthermore a fast step edge diffusion is included in 2+1 dimensions. The model exhibits the formation of pyramid-like structures with a well-defined constant inclination angle. Two regimes can be distinguished clearly: in an initial phase (I) a definite slope is selected while the number of pyramids remains unchanged. Then a coarsening process (II) is observed which decreases the number of islands according to a power law in time. Simulations support self-affine scaling of the growing surface in both regimes. The roughness exponent is alpha =1 in all cases. For growth in 1+1 dimensions we obtain dynamic exponents z = 2 (I) and z = 3 (II). Simulations for d=2+1 seem to be consistent with z= 2 (I) and z= 2.3 (II) respectively.Comment: 8 pages Latex2e, 4 Postscript figures included, uses packages a4wide,epsfig,psfig,amsfonts,latexsy

    Log-Poisson Statistics and Extended Self-Similarity in Driven Dissipative Systems

    Full text link
    The Bak-Chen-Tang forest fire model was proposed as a toy model of turbulent systems, where energy (in the form of trees) is injected uniformly and globally, but is dissipated (burns) locally. We review our previous results on the model and present our new results on the statistics of the higher-order moments for the spatial distribution of fires. We show numerically that the spatial distribution of dissipation can be described by Log-Poisson statistics which leads to extended self-similarity (ESS). Similar behavior is also found in models based on directed percolation; this suggests that the concept of Log-Poisson statistics of (appropriately normalized) variables can be used to describe scaling not only in turbulence but also in a wide range of driven dissipative systems.Comment: 10 pages, 5 figure
    corecore