Dear editor,Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two powerful methods in the block cipher field. Herein, we present an automatic tool to find impossible differentials(IDs...
详细信息
Dear editor,Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two powerful methods in the block cipher field. Herein, we present an automatic tool to find impossible differentials(IDs) and zero-correlation linear approximations(ZCLAs) for both ARX and S-box-based ciphers. Similar to the idea of using mixed-integer linear programming(MILP) models for differential cryptanalysis in [1], we first use linear inequalities to describe all the target cipher's components exactly.
The fire disaster caused by the leaking of LPG in the air is still a serious threat, especially in densely populated settlements where the walls of houses or roofs stick together. If there has been a fire, the firefig...
详细信息
Education in graduate school is expected to catch up rapid changes of social needs and to assure educational opportunities for various carrier goals of students. At KIT(Kanazawa Institute of technology), we started a ...
详细信息
ISBN:
(纸本)9786161201883
Education in graduate school is expected to catch up rapid changes of social needs and to assure educational opportunities for various carrier goals of students. At KIT(Kanazawa Institute of technology), we started a new program based on portfolio system of course management for strengthening our graduate course in 2004. In this program we built system for 'KIT Portfolio Intelligence' which makes possible systematic procedures to evaluate whole course activities step by step using competency modeling and PDCA circles. Closely collaborations among students, teachers and staffs are essential to obtain successful results. System for KIT Portfolio Intelligence, originally created by KIT, is an educational system which evaluates skills and knowledge obtained during courses as well as thesis accomplishment. Portfolio approaches are also introduced in the system, which work for clarifying skill development and achievement objectively. Several years practice of the system at our graduate program show effectiveness in developing professional skills in short term.
Effort estimation consist in predict how many hours of work and how many workers are needed to develop a project. This is important in the process of project management. As far as estimation and prediction are concern...
详细信息
The interaction between gene loci,namely epistasis,is a widespread biological genetic *** genome-wide association studies(GWAS),epistasis detection of complex diseases is a major *** many approaches using statistics,m...
详细信息
The interaction between gene loci,namely epistasis,is a widespread biological genetic *** genome-wide association studies(GWAS),epistasis detection of complex diseases is a major *** many approaches using statistics,machine learning,and information entropy were proposed for epistasis detection,the privacy preserving for single nucleotide polymorphism(SNP)data has been largely ***,this paper proposes a novel two-stage approach.A fusion strategy assists in combining and sorting the SNPs importance scores obtained by the relief and mutual information,thereby obtaining a candidate set of *** avoids missing some SNPs with strong ***,differentially private decision tree is applied to search for *** achieves the efficient epistasis detection of complex diseases on the basis of privacy preserving compared with heuristic *** recognition rate on simulation data set is more than 90%.Also,several susceptible loci including rs380390 and rs1329428 are found in the real data set for Age-related Macular Degeneration(AMD).This demonstrates that our method is promising in epistasis detection.
The networking-oblivious resource reservation model in today's public clouds cannot guarantee the performance of tenants' applications. Virtual networks that capture both computing and networking resource requiremen...
详细信息
The networking-oblivious resource reservation model in today's public clouds cannot guarantee the performance of tenants' applications. Virtual networks that capture both computing and networking resource requirements of tenants have been proposed as better interfaces between cloud providers and tenants. In this paper, we propose a novel virtual network model that could specify not only absolute and relative location requirements but also time-varying resource demands. Building on top of our model, we study how to efficiently and flexibly place multiple virtual networks in a cloud, and we propose two algorithms, MIPA and SAPA, which focus on optimizing resource utilization and providing flexible placement, respectively. The mixed integer programming based MIPA transforms the placement problem into the multi-commodity flow problem through augmenting the physical network with shadow nodes and links. The simulated annealing-based SAPA achieves resource utilization efficiency through opportunistically sharing physical resources among multiple resource demands. Besides, SAPA allows cloud providers to control the trade-offs between performance guarantee and resource utilization, and between allocation optimality and running time, and allows tenants to control the trade-off between application performance and placement cost. Extensive simulation results confirm the efficiency of MIPA in resource utilization and the flexibility of SAPA in controlling trade-offs.
Confidence intervals play a crucial role in statistical inference, as they provide a range of values within which a population parameter is likely to fall, thereby enabling researchers to quantify the uncertainty asso...
Confidence intervals play a crucial role in statistical inference, as they provide a range of values within which a population parameter is likely to fall, thereby enabling researchers to quantify the uncertainty associated with their estimates. This study proposes a new approach for estimating the confidence intervals on kinetic parameters of simple condensed phase reactions using a combined kinetic analysis and multiple linear regression. The conversion function may be represented in the form of truncated Šesták-Berggren (TSB), Šesták-Berggren (SB), or discrete cosine transform (DCT) models. The confidence intervals are calculated for pre-exponential factor, activation energy, and reaction exponents directly from multiple linear regression. However, for rate constant and conversion function, we need to estimate the variance of these parameters using the delta method. The proposed method was applied to the kinetic data from a simulated reaction as well as those of thermal decomposition of a commercial poly(methyl methacrylate). The results revealed that the DCT model provides highly accurate estimates with extremely narrow confidence intervals for kinetic parameters of the simulated reaction, whereas the TSB and SB models may exhibit systematic errors. The research also includes GNU Octave/MATLAB codes enabling readers to generate smooth reaction rate curves from noisy experimental data using the Fourier cosine series expansion and discrete cosine transform, approximate conversion functions with TSB, SB, and DCT models, and determine kinetic parameters and their confidence intervals for simple reactions through the new combined kinetic analysis methods.
Activity detection in videos embraces many recent sub-research directions, such as Action Recognition (what type of activity is being performed), Temporal Action Detection (that states the time of action occurred in a...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate *** most applications,a frame-work must ensure that the retrieved data reflects the transmitted *** driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be *** link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it *** other words,because of asset information must be secured from threats,information is a valu-able *** MANETs,some applications necessitate the use of a network method for detecting and blocking these *** a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in *** on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention *** bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be *** Secure Energy Routing(SER)protocol for MANETs is introduced in this *** protocol addresses the issue of network security by detecting and preventing attacks in the *** data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of *** Simulator–2 is used to simulate the network and experiments are compared with existing methods.
A layer‐stripping procedure for solving three‐dimensional Schrödinger equation inverse scattering problems is developed. This method operates by recursively reconstructing the potential from the jump in the sca...
A layer‐stripping procedure for solving three‐dimensional Schrödinger equation inverse scattering problems is developed. This method operates by recursively reconstructing the potential from the jump in the scattered field at the wave front, and then using the reconstructed potential to propagate the wave front and the scattered field further into the inhomogeneous region. It is thus a generalization of algorithms that have been developed for one‐dimensional inverse scattering problems. Although the procedure has not yet been numerically tested, the corresponding one‐dimensional algorithms have performed well on synthetic data. The procedure is applied to a two‐dimensional inverse seismic problem. Connections between simplifications of this method and Born approximation inverse scattering methods are also noted.
暂无评论