Enhanced secure key exchange systems based on the Johnson-noise scheme [PDF]
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security.
Kish, Laszlo B.
core +3 more sources
Van Lambalgen's Theorem for uniformly relative Schnorr and computable randomness
We correct Miyabe's proof of van Lambalgen's Theorem for truth-table Schnorr randomness (which we will call uniformly relative Schnorr randomness). An immediate corollary is one direction of van Lambalgen's theorem for Schnorr randomness.
Miyabe, Kenshi, Rute, Jason
core +1 more source
On interpreting truth tables and relevant truth table logic.
This paper is a critique of \textit{N. Tennant} [``Truth table logic'', Notre Dame J. Formal Logic 30, 459-484 (1989; Zbl 0698.03036)]. It demonstrates that no logic may be ``read off'' from standard truth tables without further assumptions, and that numerous different logics, including First Degree Entailment, may be read off, depending on what these ...
openaire +2 more sources
An Algorithmic Argument for Nonadaptive Query Complexity Lower Bounds on Advised Quantum Computation
This paper employs a powerful argument, called an algorithmic argument, to prove lower bounds of the quantum query complexity of a multiple-block ordered search problem in which, given a block number i, we are to find a location of a target keyword in an
A. Ambainis +9 more
core +3 more sources
On the Complexity of Computing Two Nonlinearity Measures [PDF]
We study the computational complexity of two Boolean nonlinearity measures: the nonlinearity and the multiplicative complexity. We show that if one-way functions exist, no algorithm can compute the multiplicative complexity in time $2^{O(n)}$ given the ...
A.A. Razborov +10 more
core +1 more source
Automatic design of digital synthetic gene circuits.
De novo computational design of synthetic gene circuits that achieve well-defined target functions is a hard task. Existing, brute-force approaches run optimization algorithms on the structure and on the kinetic parameter values of the network.
Mario A Marchisio, Jörg Stelling
doaj +1 more source
BigEAR: Inferring the Ambient and Emotional Correlates from Smartphone-based Acoustic Big Data [PDF]
This paper presents a novel BigEAR big data framework that employs psychological audio processing chain (PAPC) to process smartphone-based acoustic big data collected when the user performs social conversations in naturalistic scenarios.
Dubey, Harishchandra +2 more
core +3 more sources
Same Essence, Different Forms: The Qur'anic-Mystical View of Allameh Ṭabaṭabaʾi about the Unity of Religions and the Principles of Inter-Religious Dialogue [PDF]
Seyyed Mohammad Hossein Ṭabaṭabaʾi (1281-1360 A.H./ 1904-1981 A.D.) is a contemporary Shiite commentator and mystic whose mystical approach could be clearly seen in his inclusive interpretation of the plurality of religions.
Mohammad Javdan
doaj +1 more source
Qualitative comparative analysis (QCA) is a relatively new method that examines causal complexity. Its use in mental health research is nascent. In low-income and fragile settings, with weak mental health service provision, identifying pathways of ...
Kanykey Jailobaeva +4 more
doaj +1 more source
Quantum parallelism of the controlled-NOT operation: an experimental criterion for the evaluation of device performance [PDF]
It is shown that a quantum controlled-NOT gate simultaneously performs the logical functions of three distinct conditional local operations. Each of these local operations can be verified by measuring a corresponding truth table of four local inputs and ...
Holger F. Hofmann +3 more
core +2 more sources

