Science topic

Alice - Science topic

Explore the latest questions and answers in Alice, and find Alice experts.
Questions related to Alice
  • asked a question related to Alice
Question
5 answers
This is a question of cause and action when one side is changed and you will measure the next correlation values. The question is described and illustrated in the attached pdf.
Relevant answer
Answer
I've now found the answer by myself:
  • asked a question related to Alice
Question
3 answers
Background: Alice and Bob collect N wireless channel measurements, quantize secret bits out of them, correct for errors and perform privacy amplification to reduce the eavesdropper information to arrive at the final key.
Question: Is there a wireless key agreement technique/protocol like described above, which is provably secure for a finite N?
Relevant answer
Yes.
  • asked a question related to Alice
Question
5 answers
Hello,
Is someone know if it's possible from a crystallized protein modelisation to know the distance between X and Y amino acid? Which softwares/ websites to consider?
Thanks a lot in advance.
Alice
Relevant answer
Answer
Thank you very much for your answers! I will try the different approaches and will get back to you.
  • asked a question related to Alice
Question
4 answers
In addition: Can decoding be performed by a device with light-computational power?
I understand that the answer might be a bit too long. In that case, I would appreciate some references with examples if possible. Thank you in advance.
Relevant answer
Answer
Yes..Because "Alice then sends the bin number as the helper data to Bob through the public channel........"
  • asked a question related to Alice
Question
7 answers
The wireless channel between Alice and Bob can be exploited as a source of common randomness in order to distil a key. Ideally, all bits are independent from each other and drawn from a Bernoulli (0.5). This implies a truly random key-sequence and the entropy is maximised.
However, this is not always the case. I am interested in measuring the randomness of the key-sequence by using an entropy estimator whose input is a single, long but FINITE sequence.
Is there any default entropy estimator that is used in the literature in the field of physical key generation? If yes, what is the complexity of this algorithm?
Relevant answer
  • asked a question related to Alice
Question
2 answers
Image compression methods generally can be divided into two categories, quality loss and quality lossless. However, the first method is not suitable for this situation due to the reason that label information of steel plate ought to be clear, accurate and intact. The lossless compression methods utilize number of different algorithms including Huffman coding, Run-length encoding, dictionary-based compression, arithmetic coding, plus.
Papers:
Yong-dong Wang, Dong-wei Xu , Yun Lu, Jun-Yan Shen, Gui-jun Zhang, “Compression algorithm of road traffic data in time series based on temporal correlation,” IET Intelligent Transport Systems, vol. 12, no. 3, pp. 177-185, 2018.
M.Rajasekhar Reddy,K.Akshaya, R. Alice Infanta Seles, RA.Dhivya, K.S.Ravichandran, “Image Compression using ShannonFano-Elias Coding and Run Length Encoding,” 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) , 2018.
Marcelino Rodriguez-Cancio, Jules White, Bneoit Baudry, “Images of Code: Lossy Compression for Native Instructions,” 2018 ACM/IEEE 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018.
Wei Wang; Wei Zhang, “Huffman Coding-Based Adaptive Spatial Modulation,” IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5090-5101, 2017.
Komal Sharma, Kunal Gupta, “Lossless Data Compression Techniques and Their Performance”, 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017.
Relevant answer
Answer
Beside compression ratio, compression efficiency, bit per pixel and bit per voxel (for volumetric compression) are the other lossless compression metrics that can be used for RLE and other lossless compression algorithms.
  • asked a question related to Alice
Question
16 answers
The time has come," the Walrus said, "To talk of many things: Of shoes--and ships--and sealing-wax-- Of cabbages--and kings-- And why the sea is boiling hot-- And whether pigs have wings."
The Walrus and The Carpenter ----- Lewis Carroll
(from Through the Looking-Glass and What Alice Found There, 1872)
This question has remained unsettled and has unsettled migraine research for as long as the migraine-epilepsy link has survived. The entire edifice of the migraine research enterprise rests on this pigs-can-fly assumption.
Let us address this question to our collective intellect. Besides those who have a vested interest in the perpetuation of this befuddlement to eternity - relishing the nihilistic confusion that envelopes primary headache comprehension - there are dedicated researchers / scientists who should shed the role of fence-sitters.
Relevant answer
Answer
Thanks for your prompt reply. Please notice that neuronal hyperexcitability (as in your question) and cortical spreading depression (as in your answer) constitute two different phenomena and therefore these terms cannot be used interchangeably. For consistency purposes I think it would be better to continue this thread the way it was originally proposed (cortical excitability).
Best
  • asked a question related to Alice
Question
1 answer
The Cyber Security vulnerabilities are in every layer of the Open Systems Interconnected (OSI) Model from the application layer down to the physical layer. A common approach to encrypt the messages between Bob and Alice is for Bob to authenticate Alice via cryptographic techniques. The shared secret is established between Bob and Alice. Alice generate a digital signature via an enciphering algorithm. Bob follows by deciphering a digital signature to verify it matches an expected result to authenticate the message is from Alice.
Relevant answer
Answer
  • asked a question related to Alice
Question
5 answers
Methods is important when teaching programming languages. Alongside the development of computers, one of the aims was to teach all children
computer programming  (Resnick et al., 2009). However, the difficulties experienced by students while writing programs on a program-compiler and the use of uninteresting activities in computer programming teaching (Resnick et al., 2009) caused students to consider computer programming a difficult task (Aşkar & Davenport, 2009; Caspersen & Kolling 2009). The idea that computer programming was difficult for students and teachers (Armoni, 2011; Gökçearslan & Alper, 2015) has tried to be removed via practical programs like
Scratch, Alice and AppInventor that were developed for visual programming.
Programming is a difficult process to learn, it is important to choose educational methods.
  • asked a question related to Alice
Question
2 answers
Endocrinologist, Dr. Maureen Alice Clement 
Relevant answer
Answer
Thank you so much Dr. Bowen 
I would like to start an initiative program for re-education of type 1,2,3, diabetes in the
Okanagan area BC, Canada . Thank you for your input and interest on the project.
Yes, I will need a grant to start working on the project. I shall also reviewed the NHI
site you have mentioned in your answer above .
      Much appreciated , 
          All the best , 
            Wilma Lucia