265 research outputs found
Acceleration of High-Quality, Well-Collimated Return Beam of Relativistic Electrons by Intense Laser Interacting with Under-Dense Plasma
Riding the Saddle Point : asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distribution with a cutoff. Using Bernstein's inequality and Bennett's inequality, we upper bound the false positive and false negative error probabilities. From these bounds we derive sufficient conditions for the scheme parameters. We solve these conditions in the limit of large coalition size and obtain asymptotic solutions for the cutoff, the sufficient code length and the corresponding accusation threshold. The code length converges to its asymptote approximately as , which is faster than the of Tardos' score function. Keywords: traitor tracin
Legality, Legitimacy, and Instrumental Possibility in Human and Computational Governance for the Public Sector
Riding the Saddle Point : asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distribution with a cutoff. Using Bernstein's inequality and Bennett's inequality, we upper bound the false positive and false negative error probabilities. From these bounds we derive sufficient conditions for the scheme parameters. We solve these conditions in the limit of large coalition size and obtain asymptotic solutions for the cutoff, the sufficient code length and the corresponding accusation threshold. The code length converges to its asymptote approximately as , which is faster than the of Tardos' score function. Keywords: traitor tracin
A meta-analysis of state-of-the-art electoral prediction from Twitter data
Electoral prediction from Twitter data is an appealing research topic. It
seems relatively straightforward and the prevailing view is overly optimistic.
This is problematic because while simple approaches are assumed to be good
enough, core problems are not addressed. Thus, this paper aims to (1) provide a
balanced and critical review of the state of the art; (2) cast light on the
presume predictive power of Twitter data; and (3) depict a roadmap to push
forward the field. Hence, a scheme to characterize Twitter prediction methods
is proposed. It covers every aspect from data collection to performance
evaluation, through data processing and vote inference. Using that scheme,
prior research is analyzed and organized to explain the main approaches taken
up to date but also their weaknesses. This is the first meta-analysis of the
whole body of research regarding electoral prediction from Twitter data. It
reveals that its presumed predictive power regarding electoral prediction has
been rather exaggerated: although social media may provide a glimpse on
electoral outcomes current research does not provide strong evidence to support
it can replace traditional polls. Finally, future lines of research along with
a set of requirements they must fulfill are provided.Comment: 19 pages, 3 table
Information-theoretic analysis of coating PUFs
Physical Uncloneable Functions (PUFs) can be used as a cost-effective means to store cryptographic key material in an uncloneable way. In coating PUFs, keys are generated from capacitance measurements of a coating containing many randomly distributed particles with different dielectric constants.
We introduce a physical model of coating PUFs by simplifying the capacitance sensors to a parallel plate geometry. We estimate the amount of information that can be extracted from the coating. We show that the inherent entropy is proportional to , where n is the number of particles that fit between the capacitor plates in a straight line. However, measurement noise may severely reduce the amount of information that can actually be extracted in practice. In the noisy regime the number of extractable bits is in fact a decreasing function of n. We derive an optimal value for n as a function of the noise amplitude, the PUF geometry and the dielectric constants
ALGSICS - Combining physics and cryptography to enhance security and privacy in RFID systems
In this paper, we introduce several new mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. Our aim is to provide solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap and thus, enhance the privacy friendliness of the technology "almost" for free. Our proposals, for example, make use of environmental information (presence of light temperature, humidity, etc.) to disable or enable the RFID tag. A second possibility that we explore is the use of delays in revealing a secret key used to later establish a secure communication channel. We also introduce the idea of a "sticky tag," which can be used to re-enable a disabled (or killed) tag whenever the user considers it to be safe. We discuss the security and describe usage scenarios for all solutions. Finally, we review previous works that use physical principles to provide security and privacy in RFID systems
Preservation of scalar spin chirality across a metallic spacer in synthetic antiferromagnets with chiral interlayer interactions
Chiral magnetic textures are key for the development of modern spintronic
devices. In multilayered thin films, these are typically stabilized via the
interfacial intralayer Dzyaloshinskii-Moriya interaction (DMI). Additionally,
it has been recently observed that DMI may also promote vector spin chirality
along the third dimension, coupling spins in different magnetic layers via
non-magnetic spacer layers, an effect referred to as interlayer DMI (IL-DMI).
This interaction holds promise for 3D nanomagnetism, from the creation of 3D
spin structures such as hopfions to new forms of magnetic functionality in the
vertical direction via remote control of chiral spin states. Here, we
investigate via magnetic X-ray scattering and imaging techniques the chiral
nature of orthogonal magnetic states that form in a synthetic antiferromagnet
with IL-DMI. We find that the vector spin chirality of the textures formed in
an in-plane layer is determined by the net out-of-plane spin configuration of a
neighboring layer, leading as a result to complex spin states across a metallic
interface where the overall scalar spin chirality is preserved. This work thus
uncovers a new flavor of chiral interlayer interactions, demonstrating new ways
to control magnetic chirality in three dimensions
Observation and formation mechanism of 360° domain wall rings in synthetic anti-ferromagnets with interlayer chiral interactions
The interlayer Dzyaloshinskii–Moriya interaction (IL-DMI) chirally couples spins in different ferromagnetic layers of multilayer heterostructures. So far, samples with IL-DMI have been investigated utilizing magnetometry and magnetotransport techniques, where the interaction manifests as a tunable chiral exchange bias field. Here, we investigate the nanoscale configuration of the magnetization vector in a synthetic anti-ferromagnet (SAF) with IL-DMI, after applying demagnetizing field sequences. We add different global magnetic field offsets to the demagnetizing sequence in order to investigate the states that form when the IL-DMI exchange bias field is fully or partially compensated. For magnetic imaging and vector reconstruction of the remanent magnetic states, we utilize x-ray magnetic circular dichroism photoemission electron microscopy, evidencing the formation of 360° domain wall rings of typically 0.5–3.0 μm in diameter. These spin textures are only observed when the exchange bias field due to the IL-DMI is not perfectly compensated by the magnetic field offset. From a combination of micromagnetic simulations, magnetic charge distribution, and topology arguments, we conclude that a non-zero remanent effective field with components both parallel and perpendicular to the anisotropy axis of the SAF is necessary to observe the rings. This work shows how the exchange bias field due to IL-DMI can lead to complex metastable spin states during reversal, important for the development of future spintronic devices
Management approaches and aquaculture of sturgeons in the Lower Danube region countries
Summary This paper presents the status and trends in management of sturgeon species and the development of sturgeon aquaculture in the Lower Danube countries: Romania, Bulgaria, Serbia, Ukraine and Moldova. Sturgeon fishery moratoria and aquaculture development represent first steps in the Lower Danube countries to combat extirpation. Supportive stocking was used as a compensation for the impact of sturgeon fishery and dam construction, but these efforts unfortunately lacked adequate cooperation and coordination between and among region countries. Unsolved problems remain, such as the presence of illegal sturgeon fishery, water pollution, habitat destruction and fragmentation. Construction of fish passes and habitat restoration project developments are two key issues that have yet to be tackled in the Lower Danube region
- …
