630 results on '"ARX"'
Search Results
2. Evaluation of adaptive capacity of slope regulation and storage measures on the Loess Plateau under drought stress
- Author
-
Yan, Siying, Weng, Baisha, Yan, Denghua, Fu, Qiang, and Wang, Hao
- Published
- 2024
- Full Text
- View/download PDF
3. Time of the week AutoRegressive eXogenous (TOW-ARX) model to predict thermal consumption in a large commercial mall
- Author
-
Lopez-Villamor, Iñigo, Eguiarte, Olaia, Arregi, Beñat, Garay-Martinez, Roberto, and Garrido-Marijuan, Antonio
- Published
- 2024
- Full Text
- View/download PDF
4. A Method for Identification of Markovian Jump ARX Processes
- Author
-
Hojjatinia, Sarah, Lagoa, Constantino M., and Dabbene, Fabrizio
- Published
- 2017
- Full Text
- View/download PDF
5. Identification of the shared gene signatures in retinoblastoma and osteosarcoma by machine learning.
- Author
-
Ye, Rongjie, Yuan, Quan, You, Wenkang, Huang, Yukai, Lin, Zhangdian, Tang, Haifeng, and Zeng, Rongdong
- Subjects
- *
DISEASE risk factors , *GENE expression profiling , *GENE expression , *GENE regulatory networks , *OVERALL survival , *MACHINE learning - Abstract
Osteosarcoma (OS) is the most prevalent secondary sarcoma associated with retinoblastoma (RB). However, the molecular mechanisms driving the interactions between these two diseases remain incompletely understood. This study aims to explore the transcriptomic commonalities and molecular pathways shared by RB and OS, and to identify biomarkers that predict OS prognosis effectively. RNA sequences and patient information for OS and RB were obtained from the University of California Santa Cruz (UCSC) Xena and Gene Expression Omnibus databases. When RB and OS were first identified, a common gene expression profile was discovered. Weighted Gene Co-expression Network Analysis (WGCNA) revealed co-expression networks associated with OS after immunotyping patients. To evaluate the genes shared by RB and OS, univariate and multivariate Cox regression analysis were then carried out. Three machine learning methods were used to pick key genes, and risk models were created and verified. Next, medications that target independent prognostic genes were found using the Cellminer database. The comparison of differential gene expression between OS and RB revealed 1216 genes, primarily linked to the activation and proliferation of immune cells. WGCNA identified 12 modules related to OS immunotyping, with the grey module showing a strong correlation with the immune-inflamed phenotype. This module intersected with differential genes from RB, producing 65 RB-associated OS Immune-inflamed Genes (ROIGs). Analysis identified 6 hub genes for model construction through univariate Cox regression and three machine learning techniques. A risk model based on these hub genes was established, demonstrating significant prognostic value for OS. Genes shared between OS and RB contribute to the progression of both cancers through multiple pathways. The ROIGs risk score model independently predicts the overall survival of OS patients. Additionally, this study highlights genes with potential as therapeutic targets or biomarkers for clinical use. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Multi-Frequency Aeroelastic ROM for Transonic Compressors.
- Author
-
Casoni, Marco, Magrini, Andrea, and Benini, Ernesto
- Subjects
FREQUENCIES of oscillating systems ,AIRPLANE motors ,AEROELASTICITY ,COMPRESSORS ,OSCILLATIONS - Abstract
The accurate prediction of the aeroelastic behavior of turbomachinery for aircraft propulsion poses a difficult yet fundamental challenge, since modern aircraft engines tend to adopt increasingly slender blades to achieve a higher aerodynamic efficiency, incurring an increased aeroelastic interaction as a drawback. In the present work, we present a reduced order model for flutter prediction in axial compressors. The model exploits the aerodynamic influence coefficients technique with the adoption of a broadband frequency signal to compute the aerodynamic damping for multiple reduced frequencies using a single training simulation. The normalized aerodynamic work is computed for a single oscillation mode at three different vibration frequencies, comparing the outputs of aerodynamic input/output models trained with a chirp signal to those from single-frequency harmonic simulations. The results demonstrate the ability of the adopted model to accurately and efficiently reproduce the aerodynamic damping at multiple frequencies and arbitrary nodal diameters with a single simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.
- Author
-
Zhang, Xing, Shao, Chenyang, Li, Tianning, Yuan, Ye, and Wang, Changda
- Subjects
- *
INTERNET of things , *SMART homes , *DATA transmission systems , *HOUSEHOLD appliances , *BLOCK ciphers , *ALGORITHMS - Abstract
With the popularization of Internet of Things applications, trillions of new devices with different application requirements, such as smart wearables and smart home appliances, will be connected to the network. Hence, it is crucial to ensure the data transmission security of these low-power and multifunctional sensor nodes. In this paper, a novel lightweight block cipher, GFSPX, is proposed for resource-constrained microdevices. The proposed algorithm combines a generalized Feistel structure with the substitution permutation networks structure to design the round function, which effectively addresses the inherent problem of slow diffusion in the traditional Feistel structure. Furthermore, the introduction of Addition or AND, Rotation, XOR operations in the round function to process part of the plaintext reduces the demand for hardware resource of the algorithm. The avalanche test results indicate that the GFSPX algorithm has strong diffusion and can satisfy the avalanche effect in just six rounds. The security analysis results verify the security of the GFSPX algorithm against differential and linear cryptanalysis attacks, algebraic attacks, structural attacks and key scheduling attacks. Finally, the performance analysis results indicate that the hardware implementation cost of GFSPX algorithm is relatively low, requiring only 1715 GE based on 0.13 micron logic process. In addition, the software implementation of this algorithm works well at an encryption rate of 12.31 Mb/s. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. The Aggravation of Neuropsychiatric Symptoms in the Offspring of a Korean Family with Intellectual Disability and Developmental Delay Caused by a Novel ARX p.Lys385Ter Variant.
- Author
-
Han, Ji Yoon, Kim, Tae Yun, Gwack, Jin, and Park, Joonhong
- Subjects
- *
AGENESIS of corpus callosum , *DEVELOPMENTAL disabilities , *GENETIC variation , *DEVELOPMENTAL delay , *INFANTILE spasms - Abstract
The ARX mutations encompass a nearly continuous spectrum of neurodevelopmental disorders (NDDs), ranging from lissencephaly to Proud syndrome, as well as infantile spasms without brain malformations, and including both syndromic and non-syndromic intellectual disabilities (IDs). We describe worsening neuropsychiatric symptoms in the offspring of a Korean family with ID/developmental delay (DD) caused by a novel ARX p.Lys385Ter variant. Sequential genetic testing was performed to investigate the ID, DD, agenesis of the corpus callosum (ACC), and developmental epileptic encephalopathy (DEE) observed in the proband. A comprehensive trio clinical exome sequencing approach using a Celemics G-Mendeliome Clinical Exome Sequencing Panel was employed. Given the clinical manifestations observed in the proband, gene panel sequencing identified a heterozygous ARX variant, c.1153A>T/p.Lys385Ter (Reference transcript ID: NM_139058.3), as the most likely cause of ID, DD, ACC, and DEE in the proband. Sanger sequencing confirmed the segregation of the ARX variant, c.1153A>T/p.Lys385Ter, with the phenotype and established the maternally inherited dominant status of the heterozygous variant in the patient, as well as in her grandmother, mother, and aunt. Our case report adds to the understanding of the female phenotype in ARX-related disorders caused by loss-of-function variants in the ARX gene. Genetic counseling for ARX families should proceed with caution, as female carriers can exhibit a wide range of phenotypes, from normal cognitive development to ID/DD, ACC, and DEE. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. On additive differential probabilities of the composition of bitwise exclusive-or and a bit rotation
- Author
-
Kolomeec, Nikolay, Sutormin, Ivan, Bykov, Denis, Panferov, Matvey, and Bonich, Tatyana
- Published
- 2025
- Full Text
- View/download PDF
10. New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128.
- Author
-
Xu, Zhichao, Xu, Hong, Tan, Lin, and Qi, Wenfeng
- Abstract
Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Leveraging Deep Reinforcement Learning for Reducing Longitudinal Train Forces in Railway Systems
- Author
-
Bulavin, Yuri P., Ignatieva, Olesya V., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Kovalev, Sergey, editor, Kotenko, Igor, editor, Sukhanov, Andrey, editor, Li, Yin, editor, and Li, Yao, editor
- Published
- 2024
- Full Text
- View/download PDF
12. Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
- Author
-
Biryukov, Alex, Teh, Je Sen, Udovenko, Aleksei, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Smith, Benjamin, editor, and Wu, Huapeng, editor
- Published
- 2024
- Full Text
- View/download PDF
13. Comparative Analysis of Data-Driven Models for DC Motors with Varying Payloads
- Author
-
Wee, Helen Shin Huey, Ahmad, Nur Syazreen, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Ahmad, Nur Syazreen, editor, Mohamad-Saleh, Junita, editor, and Teh, Jiashen, editor
- Published
- 2024
- Full Text
- View/download PDF
14. Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128
- Author
-
Xu, Zhichao, Xu, Hong, Tan, Lin, Qi, Wenfeng, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Ge, Chunpeng, editor
- Published
- 2024
- Full Text
- View/download PDF
15. Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
- Author
-
Debasmita Chakraborty, Hosein Hadipour, Phuong Hoa Nguyen, and Maria Eichlseder
- Subjects
Cryptanalysis ,Impossible differentials ,Key recovery ,CP ,ARX ,AndRX ,Computer engineering. Computer hardware ,TK7885-7895 - Abstract
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it. Previous works only focused on automated distinguisher discovery, leaving key recovery as a manual post-processing task, which may lead to a suboptimal final complexity. At EUROCRYPT 2023, Hadipour et al. introduced a unified constraint programming (CP) approach based on satisfiability for finding optimal complete ID attacks in strongly aligned ciphers. While this approach was extended to weakly-aligned designs like PRESENT at ToSC 2024, its application to ARX and AndRX ciphers remained as future work. Moreover, this method only exploited ID distinguishers with direct contradictions at the junction of two deterministic transitions. In contrast, some ID distinguishers, particularly for ARX and AndRX designs, may not be detectable by checking only the existence of direct contradictions. This paper fills these gaps by extending Hadipour et al.’s method to handle indirect contradictions and adapting it for ARX and AndRX designs. We also present a similar method for identifying zero-correlation (ZC) distinguishers. Moreover, we extend our new model for finding ID distinguishers to a unified optimization problem that includes both the distinguisher and the key recovery for AndRX designs. Our method improves ID attacks and introduces new distinguishers for several ciphers, such as SIMON, SPECK, Simeck, ChaCha, Chaskey, LEA, and SipHash. For example, we achieve a one-round improvement in ID attacks against SIMON-64-96, SIMON-64-128, SIMON-128-128, SIMON-128-256 and a two-round improvement against SIMON-128- 192. These results significantly contribute to our understanding of the effectiveness of automated tools in the cryptanalysis of different design paradigms.
- Published
- 2024
- Full Text
- View/download PDF
16. Type 1 early infantile epileptic encephalopathy: A case report and literature review.
- Author
-
Zaker, Erfan, Nouri, Negar, Movahedinia, Mojtaba, Dadbinpour, Ali, and Vahidi Mehrjardi, Mohammad Yahya
- Subjects
- *
BRAIN diseases , *PEOPLE with epilepsy , *GENETIC techniques , *GENETIC testing , *HOMEOBOX genes , *AGENESIS of corpus callosum - Abstract
Background: Variants in the Aristaless‐related homeobox (ARX) gene lead to a variety of phenotypes, with intellectual disability being a steady feature. Other features can include severe epilepsy, spasticity, movement disorders, hydranencephaly, and ambiguous genitalia in males. X‐linked Ohtahara syndrome or Type 1 early infantile epileptic encephalopathy (EIEE1) is a severe early‐onset epileptic encephalopathy with arrested psychomotor development caused by hemizygous mutations in the ARX gene, which encodes a transcription factor in fundamental brain developmental processes. Methods: We presented a case report of a 2‐year‐old boy who exhibited symptoms such as microcephaly, seizures, and severe multifocal epileptic abnormalities, and genetic techniques such as autozygosity mapping, Sanger sequencing, and whole‐exome sequencing. Results: We confirmed that the patient had the NM_139058.3:c.84C>A; p.(Cys28Ter) mutation in the ARX gene. Conclusion: The patient with EIEE1 had physical symptoms and hypsarrhythmia on electroencephalogram. Genetic testing identified a causative mutation in the ARX gene, emphasizing the role of genetic testing in EIEE diagnosis. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. ARX 型密码算法的设计与分析.
- Author
-
孙思维, 胡磊, 刘田雨, 牛钟锋, 汪达超, and 张英杰
- Abstract
Copyright of Journal of Cryptologic Research (2097-4116) is the property of Editorial Board of Journal of Cryptologic Research and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
18. Coordinated Gene Expression and Chromatin Regulation during Hydra Head Regeneration.
- Author
-
Murad, Rabi, Macias-Muñoz, Aide, Wong, Ashley, Ma, Xinyi, and Mortazavi, Ali
- Subjects
ARX ,brachury ,FoxM1 ,JUN/FOS ,Wnt ,Animals ,Body Patterning ,Chromatin ,Gene Expression ,Hydra ,Wnt Signaling Pathway - Abstract
The cnidarian model organism Hydra has long been studied for its remarkable ability to regenerate its head, which is controlled by a head organizer located near the hypostome. The canonical Wnt pathway plays a central role in head organizer function during regeneration and during bud formation, which is the asexual mode of reproduction in Hydra. However, it is unclear how shared the developmental programs of head organizer genesis are in budding and regeneration. Time-series analysis of gene expression changes during head regeneration and budding revealed a set of 298 differentially expressed genes during the 48-h head regeneration and 72-h budding time courses. In order to understand the regulatory elements controlling Hydra head regeneration, we first identified 27,137 open-chromatin elements that are open in one or more sections of the organism body or regenerating tissue. We used histone modification ChIP-seq to identify 9,998 candidate proximal promoter and 3,018 candidate enhancer-like regions respectively. We show that a subset of these regulatory elements is dynamically remodeled during head regeneration and identify a set of transcription factor motifs that are enriched in the enhancer regions activated during head regeneration. Our results show that Hydra displays complex gene regulatory structures of developmentally dynamic enhancers, which suggests that the evolution of complex developmental enhancers predates the split of cnidarians and bilaterians.
- Published
- 2021
19. Meet-in-the-Filter and Dynamic Counting with Applications to Speck
- Author
-
Biryukov, Alex, Cardoso dos Santos, Luan, Teh, Je Sen, Udovenko, Aleksei, Velichkov, Vesselin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Tibouchi, Mehdi, editor, and Wang, XiaoFeng, editor
- Published
- 2023
- Full Text
- View/download PDF
20. Comparison of adaptive pitch control strategies for a wind turbine benchmark model
- Author
-
Sahu, Shrabani and Behera, Sasmita
- Published
- 2023
- Full Text
- View/download PDF
21. Fixed-size LS-SVM LPV System Identification for Large Datasets.
- Author
-
Cavanini, Luca, Felicetti, Riccardo, Ferracuti, Francesco, and Monteriù, Andrea
- Abstract
In this paper, we propose an efficient method for handling large datasets in linear parameter-varying (LPV) model identification. The method is based on least-squares support vector machine (LS-SVM) identification in the primal space. To make the identification computationally feasible, even for very large datasets, we propose estimating a finite-dimensional feature map. To achieve this, we propose a two-step method to reduce the computational effort. First, we define the training set as a fixed-size subsample of the entire dataset, considering collision entropy for subset selection. The second step involves approximating the feature map through the eigenvalue decomposition of the kernel matrices. This paper considers both autoregressive with exogenous input (ARX) and state-space (SS) model forms. By comparing the problem formulation in the primal and dual spaces in terms of accuracy and computational complexity, the main advantage of the proposed technique is the reduction in space and time complexity during the training stage, making it preferable for handling very large datasets. To validate our proposed primal approach, we apply it to estimate LPV models using provided inputs, outputs, and scheduling signals for two nonlinear benchmarks: the parallel Wiener-Hammerstein system and the Silverbox system. The performances of our proposed approach are compared with the dual LS-SVM approach and the kernel principal component regression. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. A subspace based method for modelling building's thermal dynamic in district heating system and parameter extrapolation verification.
- Author
-
Zhang, Junfeng, Liu, Lanbin, and Liu, Yameng
- Abstract
The district heating system (DHS) consumes a lot of energy in winter, and its control accuracy needs to be improved urgently. To apply advanced process control (APC) in DHS, the thermal dynamic model of the existing buildings is essential. This paper uses the subspace method which is a data-driven approach for modelling the thermal dynamics of the building. The model's performance is analyzed using the collected data, and the differences compared to the classical methods are also analyzed. The method reduces the RMSE by about 20% compared with the ARX model for the same complexity. Subsequently, the analysis of the training residuals indicates that the estimate of periodic intra-building disturbance can be obtained by minimizing the training residuals. By introducing the estimated disturbance function, the RMSE on the test set is further reduced by 26%. At the end of the article, a simple parameter extrapolation experiment is conducted, and the result shows that the parameters can be extrapolated to other buildings without large errors. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Predicting recurrence in pancreatic neuroendocrine tumours: role of ARX and alternative lengthening of telomeres (ALT).
- Author
-
Neyaz, Azfar, Crotty, Rory, Rickelt, Steffen, Pankaj, Amaya, Stojanova, Marija, Michelakos, Theodoros P, Sekigami, Yurie, Kontos, Filippos, Parrack, Paige H, Patil, Deepa T, Heaphy, Christopher M, Ferrone, Cristina R, and Deshpande, Vikram
- Subjects
- *
NEUROENDOCRINE tumors , *TELOMERES , *PANCREATIC beta cells , *ISLANDS of Langerhans , *PROGRESSION-free survival - Abstract
Background: While many pancreatic neuroendocrine tumours (PanNET) show indolent behaviour, predicting the biological behaviour of small nonfunctional PanNETs remains a challenge. Nonfunctional PanNETs with an epigenome and transcriptome that resemble islet alpha cells (ARX‐positive) are more aggressive than neoplasms that resemble islet beta cells (PDX1‐positive). In this study, we explore the ability of immunohistochemistry for ARX and PDX1 and telomere‐specific fluorescence in situ hybridisation (FISH) for alternative lengthening of telomeres (ALT) to predict recurrence. Methods: Two hundred fifty‐six patients with PanNETs were identified, and immunohistochemistry for ARX and PDX1 was performed. Positive staining was defined as strong nuclear staining in >5% of tumour cells. FISH for ALT was performed in a subset of cases. Results: ARX reactivity correlated with worse disease‐free survival (DFS) (P = 0.011), while there was no correlation between PDX1 reactivity and DFS (P = 0.52). ALT‐positive tumours (n = 63, 31.8%) showed a significantly lower DFS (P < 0.0001) than ALT‐negative tumours (n = 135, 68.2%). ARX reactivity correlated with ALT positivity (P < 0.0001). Among nonfunctional tumours, recurrence was noted in 18.5% (30/162) of ARX‐positive tumours and 7.5% (5/67) of ARX‐negative tumours. Among WHO grade 1 and 2 PanNETs with ≤2 cm tumour size, 14% (6/43) of ARX‐positive tumours recurred compared to 0 of 33 ARX‐negative tumours and 33.3% (3/9) ALT‐positive tumours showed recurrence versus 4.4% (2/45) ALT‐negative tumours. Conclusion: Immunohistochemistry for ARX and ALT FISH status may aid in distinguishing biologically indolent cases from aggressive small low‐grade PanNETs, and help to identify patients who may preferentially benefit from surgical intervention. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. Analysis of rotation and shift based diffusion functions.
- Author
-
Kumar, Arvind, Mishra, P. R., and Ojjela, Odelu
- Subjects
- *
ROTATIONAL motion , *MATHEMATICAL models - Abstract
'Rotation and shift' based diffusion functions are used in modern ciphers especially in ARX (Addition, Rotation, and XOR) based designs. They are preferred over other alternatives as they are efficient and lightweight. Usually, such diffusion functions map an n-bit block to another n-bit block. One of the requirements for an n-bit to n-bit diffusion function is that, it should be invertible. In this paper, we present mathematical models for different classes of 'rotation and shift' based diffusion functions and explore their invertibility. We derive sufficient conditions under which diffusion functions of these classes are invertible. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. FPGA implementation novel lightweight MBRISI cipher.
- Author
-
Poojary, Asmita, Kiran Kumar, V. G., and Nagesh, H. R.
- Abstract
The advancement Internet of things has led to an increasing exchange of information. Privacy and security has become a major concern. In this emerging ubiquitous computing world, Lightweight cryptographic algorithms are tailor made to secure the information in low resource devices for the Internet of Things (IoT) applications. In this paper an area efficient, high performance lightweight cipher, MBRISI cipher is proposed. The cipher is a combination of BRIGHT family of ciphers comprises of Addition-Modulo, Rotation and EX-OR (ARX) operations and the modification of SIMON cipher and also a novel lightweight key generation algorithm is used. The proposed cipher is better than the state of art existing lightweight ciphers and can be extended to support different block sizes and key sizes for the low resource environments like the IoT. The proposed MBRISI cipher encrypts a 32-bit plaintext employing a 64-bit key is implemented and then analyzed. The cipher is implemented in MATLAB tool (for software implementation) and is analyzed for correlation coefficient, entropy and histogram, avalanche criterion and Key-sensitivity. The Verilog code is written and simulated using Xilinx-Vivado tool and synthesized using FPGA's Artix-7 and Basys-3. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Cortical interneuron development is affected in 4H leukodystrophy.
- Author
-
Dooves, Stephanie, Kok, Liza M L, Holmes, Dwayne B, Breeuwsma, Nicole, Breur, Marjolein, Bugiani, Marianna, Wolf, Nicole I, and Heine, Vivi M
- Subjects
- *
LEUKODYSTROPHY , *NEURAL circuitry , *KALLMANN syndrome , *GABA antagonists , *GENE expression , *PLURIPOTENT stem cells , *BRAIN abnormalities - Abstract
4H leukodystrophy is a rare genetic disorder classically characterized by hypomyelination, hypodontia and hypogonadotropic hypogonadism. With the discovery that 4H is caused by mutations that affect RNA polymerase III, mainly involved in the transcription of small non-coding RNAs, patients with atypical presentations with mainly a neuronal phenotype were also identified. Pathomechanisms of 4H brain abnormalities are still unknown and research is hampered by a lack of preclinical models. We aimed to identify cells and pathways that are affected by 4H mutations using induced pluripotent stem cell models. RNA sequencing analysis on induced pluripotent stem cell-derived cerebellar cells revealed several differentially expressed genes between 4H patients and control samples, including reduced ARX expression. As ARX is involved in early brain and interneuron development, we studied and confirmed interneuron changes in primary tissue of 4H patients. Subsequently, we studied interneuron changes in more depth and analysed induced pluripotent stem cell-derived cortical neuron cultures for changes in neuronal morphology, synaptic balance, network activity and myelination. We showed a decreased percentage of GABAergic synapses in 4H, which correlated to increased neuronal network activity. Treatment of cultures with GABA antagonists led to a significant increase in neuronal network activity in control cells but not in 4H cells, also pointing to lack of inhibitory activity in 4H. Myelination and oligodendrocyte maturation in cultures with 4H neurons was normal, and treatment with sonic hedgehog agonist SAG did not improve 4H related neuronal phenotypes. Quantitative PCR analysis revealed increased expression of parvalbumin interneuron marker ERBB4 , suggesting that the development rather than generation of interneurons may be affected in 4H. Together, these results indicate that interneurons are involved, possibly parvalbumin interneurons, in disease mechanisms of 4H leukodystrophy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró.
- Author
-
Coutinho, Murilo, Passos, Iago, Vásquez, Juan C. Grados, Sarkar, Santanu, de Mendonça, Fábio L. L., de Sousa Jr., Rafael T., and Borges, Fábio
- Abstract
In this paper, we present 4 major contributions to ARX ciphers and in particular, to the Salsa/ChaCha family of stream ciphers: We propose an improved differential-linear distinguisher against ChaCha. To do so, we propose a new way to approach the derivation of linear approximations by viewing the algorithm in terms of simpler subrounds. Using this idea, we show that it is possible to derive almost all linear approximations from previous works from just 3 simple rules. Furthermore, we show that with one extra rule, it is possible to improve the linear approximations proposed by Coutinho and Souza at Eurocrypt 2021 (Coutinho and Neto, in: Canteaut, Standaert (eds) Advances in cryptology—EUROCRYPT 2021—40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021, proceedings, Part I. Lecture notes in computer science, vol 12696, Springer, 2021). We propose a technique called Bidirectional Linear Expansions (BLE) to improve attacks against Salsa. While previous works only considered linear expansions moving forward into the rounds, BLE explores the expansion of a single bit in both forward and backward directions. Applying BLE, we propose the first differential-linear distinguishers reaching 7 and 8 rounds of Salsa and we improve Probabilistic Neutral Bit (PNB) key-recovery attacks against 8 rounds of Salsa. At Eurocrypt 2022 (Dey et al in Revamped differential-linear cryptanalysis on reduced round chacha, Springer, 2022), Dey et al. proposed a technique to combine two input–output positions in a PNB attack. In this paper, we generalize this technique for an arbitrary number of input–output positions. Combining this approach with BLE, we are able to improve key recovery attacks against 7 rounds of Salsa. Using all the knowledge acquired studying the cryptanalysis of these ciphers, we propose some modifications in order to provide better diffusion per round and higher resistance to cryptanalysis, leading to a new stream cipher named Forró. We show that Forró has higher security margin; this allows us to reduce the total number of rounds while maintaining the security level, thus creating a faster cipher in many platforms, especially in constrained devices. Finally, we developed CryptDances, a new tool for the cryptanalysis of Salsa, ChaCha, and Forró designed to be used in high performance environments with several GPUs. With CryptDances it is possible to compute differential correlations, to derive new linear approximations for ChaCha automatically, to automate the computation of the complexity of PNB attacks, among other features. We make CryptDances available for the community at . [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró
- Author
-
Coutinho, Murilo, Passos, Iago, Grados Vásquez, Juan C., de Mendonça, Fábio L. L., de Sousa, Rafael Timteo, Jr., Borges, Fábio, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Agrawal, Shweta, editor, and Lin, Dongdai, editor
- Published
- 2022
- Full Text
- View/download PDF
29. Monte Carlo Tree Search for Automatic Differential Characteristics Search: Application to SPECK
- Author
-
Bellini, Emanuele, Gerault, David, Protopapa, Matteo, Rossi, Matteo, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Isobe, Takanori, editor, and Sarkar, Santanu, editor
- Published
- 2022
- Full Text
- View/download PDF
30. Improved Differential Attack on Round-Reduced LEA
- Author
-
Zhang, Yuhan, Wu, Wenling, Zhang, Lei, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Nguyen, Khoa, editor, Yang, Guomin, editor, Guo, Fuchun, editor, and Susilo, Willy, editor
- Published
- 2022
- Full Text
- View/download PDF
31. Implicit White-Box Implementations: White-Boxing ARX Ciphers
- Author
-
Ranea, Adrián, Vandersmissen, Joachim, Preneel, Bart, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Dodis, Yevgeniy, editor, and Shrimpton, Thomas, editor
- Published
- 2022
- Full Text
- View/download PDF
32. Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks
- Author
-
Niu, Zhongfeng, Sun, Siwei, Liu, Yunwen, Li, Chao, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Dodis, Yevgeniy, editor, and Shrimpton, Thomas, editor
- Published
- 2022
- Full Text
- View/download PDF
33. Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64
- Author
-
Wang, Feifan, Wang, Gaoli, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Ateniese, Giuseppe, editor, and Venturi, Daniele, editor
- Published
- 2022
- Full Text
- View/download PDF
34. Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha
- Author
-
Dey, Sabyasachi, Garai, Hirendra Kumar, Sarkar, Santanu, Sharma, Nitin Kumar, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Dunkelman, Orr, editor, and Dziembowski, Stefan, editor
- Published
- 2022
- Full Text
- View/download PDF
35. Automated Truncation of Differential Trails and Trail Clustering in ARX
- Author
-
Biryukov, Alex, dos Santos, Luan Cardoso, Feher, Daniel, Velichkov, Vesselin, Vitto, Giuseppe, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, AlTawy, Riham, editor, and Hülsing, Andreas, editor
- Published
- 2022
- Full Text
- View/download PDF
36. An Improved Method for Removing the Artifacts of Electrooculography
- Author
-
Zhao, Huimin, Chen, Chao, Belkacem, Abdelkader Nasreddine, Zhang, Jiaxin, Lu, Lin, Li, Penghai, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Liu, Qi, editor, Liu, Xiaodong, editor, Chen, Bo, editor, Zhang, Yiming, editor, and Peng, Jiansheng, editor
- Published
- 2022
- Full Text
- View/download PDF
37. Variants of Chaotic Grey Wolf Heuristic for Robust Identification of Control Autoregressive Model.
- Author
-
Mehmood, Khizer, Chaudhary, Naveed Ishtiaq, Khan, Zeshan Aslam, Cheema, Khalid Mehmood, and Raja, Muhammad Asif Zahoor
- Subjects
- *
CHAOS theory , *AUTOREGRESSIVE models , *ROBUST control , *DECISION making , *PARAMETER estimation - Abstract
In this article, a chaotic computing paradigm is investigated for the parameter estimation of the autoregressive exogenous (ARX) model by exploiting the optimization knacks of an improved chaotic grey wolf optimizer (ICGWO). The identification problem is formulated by defining a mean square error-based fitness function between true and estimated responses of the ARX system. The decision parameters of the ARX model are calculated by ICGWO for various populations, generations, and noise levels. The comparative performance analyses with standard counterparts indicate the worth of the ICGWO for ARX model identification, while the statistical analyses endorse the efficacy of the proposed chaotic scheme in terms of accuracy, robustness, and reliability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
38. Self-tuning proportional-derivative pitch control for internal fault-tolerance in wind turbine benchmark.
- Author
-
Sahu, S. and Behera, S.
- Subjects
WIND turbines ,MONTE Carlo method ,INTERNAL auditing ,SELF-tuning controllers ,LEAST squares ,FAULT-tolerant computing - Abstract
The wind turbine (WT) dynamics are affected by wind variations and system parameter changes as well. To deal with the pitch control problem a Self-Tuning Controller (STC) with Proportional-Derivative (PD) structure has been proposed for the benchmark model (BM). This BM also models some sensors, actuators and system faults. The STC design herein is pivoted on a second-order auto-regressive exogenous (ARX) model. At first, three identification methods for the ARX model are presented: Recursive Least Square method (RLS), RLS with exponential forgetting (RLS-EF) and RLS with adaptive directional forgetting (RLS-ADF). In comparison, the performance of RLS-ADF is better than the rest two. The STC PD controller supersedes contemporary adaptive control approaches to fix up the generated power to its rating for above-rated wind. Secondly, on analysis, the proposed STC PD controller is fault-tolerant for nine types of faults. In the third stage, in extensive Monte Carlo Simulation (MCS), the sensitivity test to system parameter variation is carried out including the sensor faults. The result in the presence of a fault, as well as parameter variation, shows minimal deviation from normal conditions indicating the suitability of the STC PD controller to keep the system intact except in case of multiple faults. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. Aggressive versus indolent insulinomas: new clinicopathological insights.
- Author
-
Hackeng, Wenzel M., Brosens, Lodewijk A. A., and Dreijerink, Koen M. A.
- Subjects
- *
INSULINOMA , *NEUROENDOCRINE tumors , *PANCREATIC tumors , *CLINICAL pathology , *TUMOR grading , *TELOMERES , *PANCREATIC beta cells - Abstract
Insulinomas are rare functional pancreatic neuroendocrine tumors. While most insulinomas are indolent and cured after surgery, 10--15% of cases show aggressive or malignant tumor behavior and metastasize locally or to distant organs. Patients with metastatic insulinoma survive significantly shorter. Recognizing aggressive insulinomas can help to predict prognosis, guide therapy and determine follow-up intensity after surgery. This review offers a summary of the literature on the significant clinical, pathological, genetic and epigenetic differences between indolent and aggressive insulinomas. Aggressive insulinomas are characterized by rapid onset of symptoms, larger size, expression of ARX and alpha-1-antitrypsin and decreased or absent immunohistochemical expression of insulin, PDX1 and GLP-1R. Moreover, aggressive insulinomas often harbor ATRX or DAXX mutations, the alternative lengthening of telomeres phenotype and chromosomal instability. Tumor grade and MEN1 and YY1 mutations are less useful for predicting behavior. Aggressive insulinomas have similarities to normal alpha-cells and non-functional pancreatic neuroendocrine tumors, while indolent insulinomas remain closely related to normal beta-cells. In conclusion, indolent and aggressive insulinoma are different entities, and distinguishing these will have future clinical value in determining prognosis and treatment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers
- Author
-
Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, and Chao Li
- Subjects
ARX ,rotational‐XOR cryptanalysis ,round constants ,Simeck ,Simon ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Rotational‐XOR (RX) cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in Addition‐Rotation‐XOR‐C ciphers, that is, ciphers that can be described only by using modular addition, cyclic rotation, XOR and the injection of constants. In this study, we extend RX‐cryptanalysis to AND‐RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such ciphers include the block cipher families Simon and Simeck. We analyse the propagation of RX‐differences through AND‐RX rounds and develop a closed form formula for their expected probability. Inspired by the MILP verification model proposed by Sadeghi et al., we develop a SAT/SMT model for searching compatible RX‐characteristics in Simon‐like ciphers, that is, that there is at least one right pair of messages/keys to satisfy the RK‐characteristics. To the best of our knowledge, this is the first model that takes the RX‐difference transitions and value transitions simultaneously into account in Simon‐like ciphers. Meanwhile, we investigate how the choice of the round constants affects the resistance of Simon‐like ciphers against RX‐cryptanalysis. Finally, we show how to use an RX‐distinguisher for a key recovery attack. Evaluating our model we find compatible RX‐characteristics of up to 20, 27 and 34 rounds with respective probabilities of 2−26, 2−44 and 2−56 for versions of Simeck with block sizes of 32, 48 and 64 bits, respectively, for large classes of weak keys in the related‐key model. In most cases, these are the longest published distinguishers for the respective variants of Simeck. In the case of Simon, we present compatible RX‐characteristics for round‐reduced versions of all 10 instances. We observe that for equal block and key sizes, the RX‐distinguishers cover fewer rounds in Simon than in Simeck. Concluding the paper, we present a key recovery attack on Simeck 64 reduced to 28 rounds using a 23‐round RX‐characteristic.
- Published
- 2022
- Full Text
- View/download PDF
41. Effect of redox partner binding on CYP101D1 conformational dynamics
- Author
-
Batabyal, Dipanwita and Poulos, Thomas L
- Subjects
Inorganic Chemistry ,Chemical Sciences ,Calorimetry ,Camphor 5-Monooxygenase ,Ferredoxins ,Molecular Dynamics Simulation ,Oxidation-Reduction ,Protein Binding ,Protein Conformation ,Cyp101D1 ,P450cam ,Arx ,Pdx ,Isothermal titration calorimetry ,Theoretical and Computational Chemistry ,Other Chemical Sciences ,Inorganic & Nuclear Chemistry ,Inorganic chemistry - Abstract
We have compared the thermodynamics of substrate and redox partner binding of P450cam to its close homologue, CYP101D1, using isothermal titration calorimetry (ITC). CYP101D1 binds camphor about 10-fold more weakly than P450cam which is consistent with the inability of camphor to cause a complete low- to high-spin shift in CYP101D1. Even so molecular dynamics simulations show that camphor is very stable in the CYP101D1 active site similar to P450cam. ITC data on the binding of the CYP101D1 ferredoxin redox partner (abbreviated Arx) shows that the substrate-bound closed state of CYP101D1 binds Arx more tightly than the substrate-free open form. This is just the opposite to P450cam where Pdx (ferredoxin redox partner of P450cam) favors binding to the P450cam open state. In addition, CYP101D1-Arx binding has a large negative ΔS while the P450cam-Pdx has a much smaller ΔS indicating that interactions at the docking interface are different. The most obvious difference is that PDXD38 which forms an important ion pair with P450camR112 at the center of the interface is ArxL39 in Arx. This suggests that Arx may adopt a different orientation than Pdx in order to optimize nonpolar interactions with ArxL39.
- Published
- 2018
42. Modeling and Position Control of Fiber Braided Bending Actuator Using Embedded System.
- Author
-
Nasir, Mohd Nizar Muhammad, Nordin, Ili Najaa Aimi Mohd, Faudzi, Ahmad Athif Mohd, Muftah, Mohamed Naji, Yusoff, Mohd Akmal Mhd, and Mohamaddan, Shahrol
- Subjects
ACTUATORS ,SYSTEM identification ,GENETIC algorithms ,FIBERS ,MATHEMATICAL models ,DIESEL electric power-plants - Abstract
The System identification (SI) black box method is used in this study to obtain the mathematical model of a fiber braided bending actuator (FBBA) using MATLAB Simulink. Data from the system input and output are used by the black box method. Thus, the voltage supplied to the electro-pneumatic regulators and the position (angle) of the FBBA system are used to collect input–output data in this study. In the system, PRBS generators are used to generate an input signal for the electro-pneumatic valve. The auto-regressive with exogenous input (ARX) model is chosen. As the controller for the FBBA position system, PID with the Genetic Algorithm (GA) tuning method and auto-tuned tuning method is proposed. The reference angle, simulation, and actual test are compared. The mathematical model gained from the SI method is verified through the simulation and test result of the position control. It was found that the model obtained through SI able represent the actual plant. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes.
- Author
-
Zhang, Xing, Tang, Shaoyu, Li, Tianning, Li, Xiaowei, and Wang, Changda
- Subjects
BLOCK ciphers ,INTERNET of things ,LINEAR statistical models ,ALGORITHMS - Abstract
The study of lightweight block ciphers has been a "hot topic". As one of the main structures of block ciphers, the Feistel structure has attracted much attention. However, the traditional Feistel structure cipher changes only half of the plaintext in an iterative round, resulting in slow diffusion. Therefore, more encryption rounds are required to ensure security. To address this issue, a new algorithm, GFRX, is proposed, which combines a generalized Feistel structure and ARX (Addition or AND, Rotation, XOR). The GFRX algorithm uses an ARX structure with different non-linear components to deal with all the branches of a generalized Feistel structure so that it can achieve a better diffusion effect in fewer rounds. The results of a security analysis of the GFRX algorithm show that the effective differential attacks do not exceed 19 rounds and that the effective linear attacks do not exceed 13 rounds. Therefore, the GFRX algorithm has an adequate security level for differential and linear analysis. Avalanche test results obtained for the GFRX algorithm show that the GFRX algorithm has strong diffusion and only takes six rounds to meet the avalanche effect. In addition, the GFRX algorithm can achieve different serialization levels depending on different hardware resource requirements and can achieve full serialization, which ensures operational flexibility in resource-constrained environments. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Control of Precalciner Temperature in the Cement Industry: A Novel Method of Hammerstein Model Predictive Control with ISSA.
- Author
-
Sun, Chao, Liu, Pengfei, Guo, Haoran, Di, Yinlu, Xu, Qingquan, and Hao, Xiaochen
- Subjects
TEMPERATURE control ,DEEP learning ,PREDICTION models ,PREDICTIVE control systems ,CEMENT industries ,CEMENT plants ,CEMENT - Abstract
As the most critical equipment in the pre-calcination process of dry cement production, the temperature of the precalciner is an essential factor affecting the quality of cement. However, the cement calcination system is time-delayed, nonlinear, and multi-disturbance, which makes it difficult to predict and control the precalciner temperature. In this study, a deep learning-based Hammerstein model is proposed, and a model predictive control system is built to predict and control the precalciner temperature. In the prediction model, the CNN-GRU network architecture is used to extract the operating states of the precalciner, and an attention mechanism is employed to find and emphasize the important historical information in the extracted states. Then, an ARX model is built to predict the temperature of the precalciner using the extracted operating state information. The complex nonlinear model solution in the control system is formed into a linear control problem and an inverse solution problem. The generalized predictive control (GPC) is used for linear control, and the improved sparrow search algorithm (ISSA) is used for the problem of an inverse solution. Tested with data from a cement plant in Hebei, China, the prediction accuracy of the model proposed in this paper is 99%, and the established control algorithm has less overshoot compared to PID and better stability in anti-disturbance tests. It is demonstrated that the prediction model developed in this study has better accuracy and the control strategy based on this model has good robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Rotational Differential-Linear Cryptanalysis Revisited.
- Author
-
Liu, Yunwen, Niu, Zhongfeng, Sun, Siwei, Li, Chao, and Hu, Lei
- Abstract
The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with the dependencies in the switch between the differential and linear parts (EUROCRYPT 2019), and to the improvements in the context of cryptanalysis of ARX primitives (CRYPTO 2020, EUROCRYPT 2021), we have seen significant development of the differential-linear attack during the last four years. In this work, we further extend this framework by replacing the differential part of the attack by rotational-XOR differentials. Along the way, we establish the theoretical link between the rotational-XOR differential and linear approximations and derive the closed formula for the bias of rotational differential-linear distinguishers, completely generalizing the results on ordinary differential-linear distinguishers due to Blondeau, Leander, and Nyberg (JoC 2017) to the case of rotational differential-linear cryptanalysis. We then revisit the rotational cryptanalysis from the perspective of differential-linear cryptanalysis and generalize Morawiecki et al.’s technique for analyzing Keccak, which leads to a practical method for estimating the bias of a (rotational) differential-linear distinguisher in the special case where the output linear mask is a unit vector. Finally, we apply the rotational differential-linear technique to the cryptographic permutations involved in FRIET, Xoodoo, Alzette, and SipHash. This gives significant improvements over existing cryptanalytic results, or offers explanations for previous experimental distinguishers without a theoretical foundation. To confirm the validity of our analysis, all distinguishers with practical complexities are verified experimentally. Moreover, we discuss the possibility of applying the rotational differential-linear technique to S-box-based designs or keyed primitives, and propose some open problems for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Forecasting Electricity Prices: Autoregressive Hybrid Nearest Neighbors (ARHNN) Method
- Author
-
Nitka, Weronika, Serafin, Tomasz, Sotiros, Dimitrios, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Paszynski, Maciej, editor, Kranzlmüller, Dieter, editor, Krzhizhanovskaya, Valeria V., editor, Dongarra, Jack J., editor, and Sloot, Peter M.A., editor
- Published
- 2021
- Full Text
- View/download PDF
47. Rotational Cryptanalysis from a Differential-Linear Perspective : Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette
- Author
-
Liu, Yunwen, Sun, Siwei, Li, Chao, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Canteaut, Anne, editor, and Standaert, François-Xavier, editor
- Published
- 2021
- Full Text
- View/download PDF
48. Cryptanalysis of Reduced Round ChaCha – New Attack & Deeper Analysis
- Author
-
Sabyasachi Dey, Hirendra Kumar Garai, and Subhamoy Maitra
- Subjects
Stream cipher ,ARX ,ChaCha ,Probabilistic Neutral Bits (PNBs) ,Differential attack ,Computer engineering. Computer hardware ,TK7885-7895 - Abstract
In this paper we present several analyses on ChaCha, a software stream cipher. First, we consider a divide-and-conquer approach on the secret key bits by partitioning them. The partitions are based on multiple input-output differentials to obtain a significantly improved attack on 6-round ChaCha256 with a complexity of 299.48. It is 240 times faster than the currently best known attack. This is the first time an attack on a round reduced ChaCha with a complexity smaller than 2k/2, where the secret key is of k bits, has been successful. Further, all the attack complexities related to ChaCha are theoretically estimated in general and there are several questions in this regard as pointed out by Dey, Garai, Sarkar and Sharma in Eurocrypt 2022. In this regard, we propose a toy version of ChaCha, with a 32-bit secret key, on which the attacks can be implemented completely to verify whether the theoretical estimates are justified. This idea is implemented for our proposed attack on 6 rounds. Finally, we show that it is possible to estimate the success probabilities of these kinds of PNB-based differential attacks more accurately. Our methodology explains how different cryptanalytic results can be evaluated with better accuracy rather than claiming that the success probability is significantly better than 50%.
- Published
- 2023
- Full Text
- View/download PDF
49. SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers
- Author
-
Dachao Wang, Baocang Wang, and Siwei Sun
- Subjects
ARX ,Boomerang ,Automatic Search ,SAT ,Computer engineering. Computer hardware ,TK7885-7895 - Abstract
In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang characteristics for ARX ciphers. We provide dynamic programming algorithms to efficiently compute this table and its variants. These algorithms are the most efficient up to now. For the boomerang connectivity table, the execution time is 42(n − 1) simple operations while the previous algorithm costs 82(n − 1) simple operations, which generates a smaller model in the searching phase. After rewriting these algorithms with boolean expressions, we construct the corresponding Boolean Satisfiability Problem models. Two automatic search frameworks are also proposed based on these models. This is the first time bringing the SAT-aided automatic search techniques into finding boomerang attacks on ARX ciphers. Finally, under these frameworks, we find out the first verifiable 10-round boomerang trail for SPECK32/64 with probability 2−29.15 and a 12-round trail for SPECK48/72 with probability 2−44.15. These are the best distinguishers for them so far. We also perceive that the previous boomerang attacks on LEA are constructed with an incorrect computation of the boomerang connection probability. The result is then fixed by our frameworks.
- Published
- 2023
- Full Text
- View/download PDF
50. Kendali MRAC PID pada Kecepatan Motor DC dengan Analisa Robustness
- Author
-
Imroatul Hudati and Jans Hendri
- Subjects
dc motor ,mrac ,pid ,speed of dc motor ,arx ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Pada penelitian ini dilakukan pengendalian kecepatan motor DC menggunakan Proportional Integral Derivative Model Reference Adaptive Control (PID MRAC). Pemodelan sistem motor DC sudah banyak diberikan pada penelitian sebelumnya dengan melakukan penurunan terhadap torsi dan tegangan motor. Pada penelitian ini dilakukan pengambilan data motor DC untuk mendapatkan nilai input dan output sehingga didapatkan model matematika sistem dengan menggunakan metode Autoregressive with External Input (ARX). Model matematika yang didapatkan berupa model diskrit yang selanjutnya dibuat menjadi bentuk kontinu. Model matematika tersebut akan diberikan kendali PID MRAC untuk memperbaiki sinyal error antara input dan output. Sinyal input pada kendali PID merupakan kesalahan antara input dan output sistem yang akan dibandingkan dengan output yang telah ditala dengan menggunakan parameter adaptive. Terdapat dua macam parameter adaptive untuk kesalahan positif dan negativ. Sinyal keluaran dari parameter adaptif akan memaksa keluaran sistem untuk mengikuti model referensi yang diberikan. Dari hasil percobaan yang dilakukan, menunjukkan bahwa keluaran sistem dapat mengikuti model referensi yang diberikan dengan Mean Sequare Error (MSE) sebesar 0.005 dan memiliki ketahanan yang baik dengan nilai GM adalah ~ dan PM adalah positif yang dilihat dari diagram Bode.
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.