Andrew Allison

Learn More
The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, we demonstrate that it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission(More)
Electroencephalograph (EEG) analysis enables the dynamic behavior of the brain to be examined. If the behavior is nonlinear then nonlinear tools can be used to glean information on brain behavior, and aid in the diagnosis of sleep abnormalities such as obstructive sleep apnea syndrome (OSAS). In this paper the sleep EEGs of a set of normal children and(More)
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law– Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity(More)
In this paper, we develop two automated authorship attribution schemes, one based on Multiple Discriminant Analysis (MDA) and the other based on a Support Vector Machine (SVM). The classification features we exploit are based on word frequencies in the text. We adopt an approach of preprocessing each text by stripping it of all characters except a-z and(More)
We develop an analytically solvable three-state discrete-time minimal Brownian ratchet (MBR), where the transition probabilities between states are asymmetric. By solving the master equations, we obtain the steady-state probabilities. Generally, the steady-state solution does not display detailed balance, giving rise to an induced directional motion in the(More)
This paper explores the use of genetic algorithms for the design of networks, where the demands on the network fluctuate in time. For varying network constraints, we find the best network using the standard genetic algorithm operators such as inversion, mutation and crossover. We also examine how the choice of genetic algorithm operators affects the quality(More)
Several authors [1–4] have implied that the original inspiration for Parrondo's games was a physical system called a " flashing Brownian ratchet [5, 6] " The relationship seems to be intuitively clear but, surprisingly, has not yet been established with rigor. The dynamics of a flashing Brownian ratchet can be described using a partial differential equation(More)
Evolutionary computation algorithms are increasingly being used to solve optimization problems as they have many advantages over traditional optimization algorithms. In this paper we use evolutionary computation to study the trade-off between pleiotropy and redundancy in a client-server based network. Pleiotropy is a term used to describe components that(More)
This paper examines two methods for finding whether long-range correlations exist in DNA: a fractal measure and a mutual information technique. We evaluate the performance and implications of these methods in detail. In particular we explore their use comparing DNA sequences from a variety of sources. Using software for performing in silico mutations, we(More)