scholarly journals A transfer method from bounded existential Diophantine equations to Tarski algebra formulas

2018 ◽  
Vol 708 ◽  
pp. 91-95
Author(s):  
B. Litow

Trust is critical in remote sensor systems to exchange the information from source to goal. The Dynamic Source Protocol computes the substitute way, if any hub neglects to exchange the information. The Dynamic Source Protocol does not have any worked in usefulness to figure a substitute way if the way has a vindictive hub. With the cost of an interloper recognition framework we can identify the vindictive hub and modify the information/parcel exchange way. Notwithstanding, gatecrasher location framework is extremely costly for remote sensor systems and there is no certification in identifying a malevolent hub. In the ebb and flow look into a trust-based approach is prescribed to limit the overheads of gatecrasher location framework and it likewise recognizes the anomalous conduct hubs. The proposed demonstrate utilizes the rehashed recreations to distinguish flawed hubs through the agreeable exertion in the sensor organize and additionally judges the trust of progressive hubs. Reenactments were exhibited for standardized result of parcel dropping, normal rebate result, and trust connection.


2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


1982 ◽  
Vol 47 (7) ◽  
pp. 1884-1892
Author(s):  
A. N. Abdel Rahman ◽  
S. Abdel Rahman

Tetra- and hexapeptides containing Pro-Gly or Gly-Pro or Aib-Pro in their sequences were synthesized using the liquid-phase method. The high solubility of the poly(ethylene glycol) bound peptides in water and in organic solvents enables the application of the singlet-singlet energy transfer method for conformational investigation of these peptides. The conformational study in solid state by IR and in solution by CD were carried out in parallel to the energy transfer method. The qualitative results generated by IR and CD were found to be in good agreement with the quantitative end-to-end distances given by the energy transfer method.


2021 ◽  
Vol 783 (1) ◽  
pp. 012091
Author(s):  
Xiang-Lei Wang ◽  
Shi-Yi Xu ◽  
Jing-Xuan Xu ◽  
Fei Zeng

2021 ◽  
pp. 1-13
Author(s):  
William Chuirazzi ◽  
Aaron Craft ◽  
Burkhard Schillinger ◽  
Nicholas Boulton ◽  
Glen Papaioannou ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document