Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Bean pod areas most susceptible to cracking
Ku?…?oniar P.,Sosnowski S.
International Agrophysics , 2003,
Abstract: The paper contains the results of research to determine those areas of the bean pod which are most susceptible to cracking. Measurements were taken on pods of five bean cultivars grown for dry seeds, at five levels of moisture content. The 'abdominal' seam near the pod end and in the middle section and the dorsal seam near the stalk and near the pod end were the bean-pod areas most resistant to cracking for all cultivars tested. In the case of the Aura, Bor, Igo … omska and Prosna cultivars, the abdominal seam near the stalk side cracked most often, whereas the pods of the Nida cultivar cracked most often in the middle of their dorsal seam. The moisture content had a significant effect on the location of the cra- cking in the bean pod. In all cultivars tested, the increased moisture content caused a drop in the frequency of the complete splitting of the abdominal seam and the splitting of the abdominal seam in the middle of the pod and the increased frequency of the cracking of the abdominal seam near the stalk end for the Aura, Nida and Prosna cultivars, as well as that of the dorsal seam near the pod end in the Aura, Bor and Igo … omska cultivars.
Quantum secure direct communication based on supervised teleportation  [PDF]
Yue Li,Yu Liu
Physics , 2007, DOI: 10.1117/12.755810
Abstract: We present a quantum secure direct communication(QSDC) scheme as an extension for a proposed supervised secure entanglement sharing protocol. Starting with a quick review on the supervised entanglement sharing protocol -- the "Wuhan" protocol [Y. Li and Y. Liu, arXiv:0709.1449v2], we primarily focus on its further extend using for a QSDC task, in which the communication attendant Alice encodes the secret message directly onto a sequence of 2-level particles which then can be faithfully teleported to Bob using the shared maximal entanglement states obtained by the previous "Wuhan" protocol. We also evaluate the security of the QSDC scheme, where an individual self-attack performed by Alice and Bob -- the out of control attack(OCA) is introduced and the robustness of our scheme on the OCA is documented.
Secure direct bidirectional communication protocol using the Einstein-Podolsky-Rosen pair block  [PDF]
Z. J. Zhang,Z. X. Man
Physics , 2004,
Abstract: In light of Deng-Long-Liu's two-step secret direct communication protocol using the Einstein-Podolsky-Rosen pair block [Phys. Rev. A {\bf 68}, 042317 (2003)], by introducing additional local operations for encoding, we propose a brand-new secure direct communication protocol, in which two legitimate users can simultaneously transmit their different secret messages to each other in a set of quantum communication device.
Secure Identification in The Isolated Qubits Model  [PDF]
Filippos Vogiatzian
Computer Science , 2015,
Abstract: Oblivious transfer is a powerful cryptographic primitive that is complete for secure multi-party computation. In oblivious transfer protocols a user sends one or more messages to a receiver, while the sender remains oblivious as to which messages have been received. Protocols for oblivious transfer cannot exist in a classical or fully-quantum world, but can be implemented by restricting the users' power. The isolated qubits model is a cryptographic model in which users are restricted to single-qubit operations and are not allowed to use entangling operations. Furthermore, all parties are allowed to store qubits for a long time before measuring them. In this model, a secure single-bit one-out-of-two randomised oblivious transfer protocol was recently presented by Liu. Motivated by this result, we construct a protocol for secure string one-out-of-two randomised oblivious transfer by simplifying and generalising the existing proof. We then study for the first time interactive protocols for more complex two-party functionalities in this model based on the security of our construction. In order to guarantee the composability of our construction, users are restricted to measurement at the end of each sub-protocol. It is then possible to construct secure one-out-of-two and one-out-of-k oblivious transfer protocols in the isolated qubits model. Moreover, we study secure password-based identification, where a user identifies himself to another user by evaluating the equality function on their inputs, or passwords. We use the oblivious transfer constructions mentioned above as sub-protocols to construct a secure identification protocol. Finally, we prove that constructing a secure identification protocol non-interactively is impossible, even using oblivious transfer.
Secure Architectures for Mobile Applications  [PDF]
Cristian TOMA
Informatica Economica Journal , 2007,
Abstract: The paper presents security issues and architectures for mobile applications and GSM infrastructure. The article also introduces the idea of a new secure architecture for an inter-sector electronic wallet used in payments - STP4EW (Secure Transmission Protocol for Electronic Wallet)
Deterministic secure communication protocol without using entanglement  [PDF]
Qing-yu Cai
Physics , 2003, DOI: 10.1088/0256-307X/21/4/003
Abstract: We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.
On causal properties of symmetric Lorentzian spaces  [PDF]
Ya. V. Bazaikin
Mathematics , 2010,
Abstract: Causal properties of Lorentzian symmetric spaces are investigated in the paper. The global hyperbolicity of the Cahen--Wallach Lorentzian symmetric spaces is proved.
Retraction of articles by T. Liu et al.  [cached]
T. Liu,Y.-X. Wang,Z.-W. Wang,Z.-P. Xie
Acta Crystallographica Section E , 2010, DOI: 10.1107/s1600536809049976
Abstract: A series of 29 papers by Liu et al. are retracted.
Secure Comparison Without Explicit XOR  [PDF]
Rajendra S. Katti,Cristinel Ababei
Computer Science , 2012,
Abstract: We propose an efficient protocol for secure comparison of integers when both integers are shared between two parties. Such protocols are useful for implementing secure auctions. The proposed protocol's computational complexity is roughly half the complexity of the best known efficient protocol. The efficiency of the proposed protocol stems from the removal of the XOR computation which is a time consuming operation.
On the Liu and almost unbiased Liu estimators in the presence of multicollinearity with heteroscedastic or correlated errors
Mustafa I. Alheety,B. M. Golam Kibria
Surveys in Mathematics and its Applications , 2009,
Abstract: This paper introduces a new biased estimator, namely, almost unbiased Liu estimator (AULE) of β for the multiple linear regression model with heteroscedastics and/or correlated errors and suffers from the problem of multicollinearity. The properties of the proposed estimator is discussed and the performance over the generalized least squares (GLS) estimator, ordinary ridge regression (ORR) estimator (Trenkler, 1984), and Liu estimator (LE) (Ka iranlnar, 2003) in terms of matrix mean square error criterion are investigated. The optimal values of d for Liu and almost unbiased Liu estimators have been obtained. Finally, a simulation study has been conducted which indicated that under certain conditions on d, the proposed estimator performed well compared to GLS, ORR and LE estimators.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.