Here, the authors investigated the most efficient way to position magnets to hold the most pieces of paper on the surface of a refrigerator. They used a regression model along with an artificial neural network to identify the most efficient positions of four magnets to be at the vertices of a rectangle.
Read More...Browse Articles
A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...Converting SiO2 wafers to hydrophobic using chlorotrimethylsilane
Semiconductors are the center of the fourth industrial revolution as they are key components for all electronics. Exposed wafers made of silicon (Si), which can easily oxidize, convert to silicon dioxide (SiO2). The surface of SiO2 wafers consists of many Si-OH bonds, allowing them to easily bond with water, resulting in a “wet” or hydrophilic condition. We sought to determine a way to modify the surface of SiO2 wafers to become hydrophobic to ensure safe wet cleaning.
Read More...Pruning replay buffer for efficient training of deep reinforcement learning
Reinforcement learning (RL) is a form of machine learning that can be harnessed to develop artificial intelligence by exposing the intelligence to multiple generations of data. The study demonstrates how reply buffer reward mechanics can inform the creation of new pruning methods to improve RL efficiency.
Read More...Jet optimization using a hybrid multivariate regression model and statistical methods in dimuon collisions
Collisions of heavy ions, such as muons result in jets and noise. In high-energy particle physics, researchers use jets as crucial event-shaped observable objects to determine the properties of a collision. However, many ionic collisions result in large amounts of energy lost as noise, thus reducing the efficiency of collisions with heavy ions. The purpose of our study is to analyze the relationships between properties of muons in a dimuon collision to optimize conditions of dimuon collisions and minimize the noise lost. We used principles of Newtonian mechanics at the particle level, allowing us to further analyze different models. We used simple Python algorithms as well as linear regression models with tools such as sci-kit Learn, NumPy, and Pandas to help analyze our results. We hypothesized that since the invariant mass, the energy, and the resultant momentum vector are correlated with noise, if we constrain these inputs optimally, there will be scenarios in which the noise of the heavy-ion collision is minimized.
Read More...Solving the Schrödinger equation computationally using the Lanczos algorithm
The authors use the Lanczos algorithm to computationally solve the Schrodinger equation for 2D potentials with a Python program
Read More...Simulating natural selection via autonomous agents: Environmental factors create unstable equilibria
Natural selection shapes the evolution of all organisms, and one question of interest is whether natural selection will reach a "stopping point": a stable, ideal, value for any particular trait. Madhan and Kanagavel tackle this question by building a computer simulation of trait evolution in organisms.
Read More...Estimating the liquid jet breakdown height using dimensional analysis with experimental evidence
These authors mathematically deduce a model that explains the interesting (and unintuitive) physical phenomenon that occurs when water falls.
Read More...Stride Frequency, Body Fat Percentage, and the Amount of Knee Flexion Affect the Race Time of Male Cross Country Runners
Cross country is a popular sport in the U.S. Both athletes and coaches are interested in the factors that make runners successful. In this study, the authors explore the relationship between runners' physical attributes and their race performance.
Read More...The effects of regeneration on memory in planarians
The authors test the ability of planarians to remember conditioned stimuli following regeneration.
Read More...