Experimental study on quantum data stream cipher using homodyne detection

Author(s):  
Yuan Lu ◽  
Zhao Jia ◽  
Wenchao Dai ◽  
Guihua Zeng
2012 ◽  
Vol 61 (8) ◽  
pp. 080301
Author(s):  
Lu Yuan ◽  
Huang Peng ◽  
Zhu Jun ◽  
Dai Wen-Chao ◽  
Zeng Gui-Hua

2009 ◽  
Vol 14 (2) ◽  
pp. 208-216 ◽  
Author(s):  
Nicolas Rasamimanana ◽  
Florian Kaiser ◽  
Frederic Bevilacqua

We present an experimental study on articulation in bowed strings that provides important elements for a discussion about sound synthesis control. The study focuses on bow acceleration profiles and transient noises, measured for different players for the bowing techniquesdetachéandmartelé. We found that maximum of these profiles are not synchronous, and temporal shifts are dependent on the bowing techniques. These results allow us to bring out important mechanisms in sound and gesture articulation. In particular, the results reveal a potential shortcoming of mapping strategies using simple frame-by-frame data-stream procedures. We propose instead to consider input control data as time functions, and consider gesture co-articulation processes.


Author(s):  
Grace Lamudur Arta Sihombing

Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.


Author(s):  
Norio Baba ◽  
Norihiko Ichise ◽  
Syunya Watanabe

The tilted beam illumination method is used to improve the resolution comparing with the axial illumination mode. Using this advantage, a restoration method of several tilted beam images covering the full azimuthal range was proposed by Saxton, and experimentally examined. To make this technique more reliable it seems that some practical problems still remain. In this report the restoration was attempted and the problems were considered. In our study, four problems were pointed out for the experiment of the restoration. (1) Accurate beam tilt adjustment to fit the incident beam to the coma-free axis for the symmetrical beam tilting over the full azimuthal range. (2) Accurate measurements of the optical parameters which are necessary to design the restoration filter. Even if the spherical aberration coefficient Cs is known with accuracy and the axial astigmatism is sufficiently compensated, at least the defocus value must be measured. (3) Accurate alignment of the tilt-azimuth series images.


1962 ◽  
Vol 5 (4) ◽  
pp. 387-394 ◽  
Author(s):  
Bruce Quarrington ◽  
Jerome Conway ◽  
Nathan Siegel
Keyword(s):  

1974 ◽  
Vol 126 (2) ◽  
pp. 243-248
Author(s):  
A WAKABAYASHI ◽  
T KUBO ◽  
K CHARNEY ◽  
Y NAKAMURA ◽  
J CONNOLLY

1963 ◽  
Vol 45 (3) ◽  
pp. 374-383 ◽  
Author(s):  
Donald C. McIlrath ◽  
George A. Hallenbeck ◽  
Hubert A. Allen ◽  
Charles V. Mann ◽  
Edward J. Baldes ◽  
...  
Keyword(s):  

1958 ◽  
Vol 34 (1) ◽  
pp. 11-20 ◽  
Author(s):  
Henry D. Janowitz ◽  
Vernon A. Weinstein ◽  
Rhoda G. Shaer ◽  
James F. Cereghini ◽  
Franklin Hollander

Sign in / Sign up

Export Citation Format

Share Document