Appropriate schemata as a novel concept to characterize building blocks are introduced, and then, the traits of appropriate schemata are presented. The effects of building blocks by search operators are analyzed. Henc...Appropriate schemata as a novel concept to characterize building blocks are introduced, and then, the traits of appropriate schemata are presented. The effects of building blocks by search operators are analyzed. Hence, the experiments on RR-8X8 are employed to verify that appropriate schemata construct the building blocks. The validity of appropriate schemata and building blocks from the views of theory and practice is presented.展开更多
In mining the left-over coal above the gob,stope wall rock of mining area have hard limestone.through field observation,the face-contacted block structure was found in rocks between coal seams to mine the left-over co...In mining the left-over coal above the gob,stope wall rock of mining area have hard limestone.through field observation,the face-contacted block structure was found in rocks between coal seams to mine the left-over coal above the gob.In order to probe into the movement law of rock strata and strata control measures,it is very important to identify the mobile block in face-contacted block structure of rocks between coal seams.This paper relies on the thought of block theory to establish appropriate parameter matrix and figure out its discrimination matrix in view of the fact that the block in face-contacted block structure has high intensity and stiffness,the展开更多
Objective: Overexpression of the membraneepidermal growth factor receptor (EGFR) in humantumor cells predicts for poor prognosis. Hence, weexperimentally investigated the effects of humanEGFR to the malignant phenotyp...Objective: Overexpression of the membraneepidermal growth factor receptor (EGFR) in humantumor cells predicts for poor prognosis. Hence, weexperimentally investigated the effects of humanEGFR to the malignant phenotype in humen breastcancer cell line MDA-MB-231 and humannasopharyngeal carcinoma cell line CNE-2. Methods:展开更多
In conventional technical trajectory correction schemes,continuous attitude adjusting mechanisms, such as canards, are inferior in terms of response time and efficiency of executing instructions. Discontinuous attitud...In conventional technical trajectory correction schemes,continuous attitude adjusting mechanisms, such as canards, are inferior in terms of response time and efficiency of executing instructions. Discontinuous attitude adjusting mechanisms, such as the lateral pulse jet, have complex impact on the airflow layer of the projectile surface caused by the thrust vector jet flow. An improved two-dimensional trajectory correction mechanism is designed based on the principle of firing mass blocks by a tailor-made propellant. The mechanical properties of the thrust force(namely the correction force) is analyzed. The trajectory correction model is established to analyze the effects of correction starting moment and correction phase angle of a thrust force on the projectile's trajectory. According to the trajectory correction scheme, an improved genetic algorithm is employed to this work. The scheme is tested in the simulation. The results show that the correction scheme is effective to reduce target dispersion and increase the precision of the impact point.展开更多
This paper explores the recovery of block sparse signals in frame-based settings using the l_(2)/l_(q)-synthesis technique(0<q≤1).We propose a new null space property,referred to as block D-NSP_(q),which is based ...This paper explores the recovery of block sparse signals in frame-based settings using the l_(2)/l_(q)-synthesis technique(0<q≤1).We propose a new null space property,referred to as block D-NSP_(q),which is based on the dictionary D.We establish that matrices adhering to the block D-NSP_(q)condition are both necessary and sufficient for the exact recovery of block sparse signals via l_(2)/l_(q)-synthesis.Additionally,this condition is essential for the stable recovery of signals that are block-compressible with respect to D.This D-NSP_(q)property is identified as the first complete condition for successful signal recovery using l_(2)/l_(q)-synthesis.Furthermore,we assess the theoretical efficacy of the l2/lq-synthesis method under conditions of measurement noise.展开更多
Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ...Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively.展开更多
The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for thre...The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3.展开更多
文摘Appropriate schemata as a novel concept to characterize building blocks are introduced, and then, the traits of appropriate schemata are presented. The effects of building blocks by search operators are analyzed. Hence, the experiments on RR-8X8 are employed to verify that appropriate schemata construct the building blocks. The validity of appropriate schemata and building blocks from the views of theory and practice is presented.
文摘In mining the left-over coal above the gob,stope wall rock of mining area have hard limestone.through field observation,the face-contacted block structure was found in rocks between coal seams to mine the left-over coal above the gob.In order to probe into the movement law of rock strata and strata control measures,it is very important to identify the mobile block in face-contacted block structure of rocks between coal seams.This paper relies on the thought of block theory to establish appropriate parameter matrix and figure out its discrimination matrix in view of the fact that the block in face-contacted block structure has high intensity and stiffness,the
文摘Objective: Overexpression of the membraneepidermal growth factor receptor (EGFR) in humantumor cells predicts for poor prognosis. Hence, weexperimentally investigated the effects of humanEGFR to the malignant phenotype in humen breastcancer cell line MDA-MB-231 and humannasopharyngeal carcinoma cell line CNE-2. Methods:
基金supported by the National Natural Science Foundation of China(11372142)
文摘In conventional technical trajectory correction schemes,continuous attitude adjusting mechanisms, such as canards, are inferior in terms of response time and efficiency of executing instructions. Discontinuous attitude adjusting mechanisms, such as the lateral pulse jet, have complex impact on the airflow layer of the projectile surface caused by the thrust vector jet flow. An improved two-dimensional trajectory correction mechanism is designed based on the principle of firing mass blocks by a tailor-made propellant. The mechanical properties of the thrust force(namely the correction force) is analyzed. The trajectory correction model is established to analyze the effects of correction starting moment and correction phase angle of a thrust force on the projectile's trajectory. According to the trajectory correction scheme, an improved genetic algorithm is employed to this work. The scheme is tested in the simulation. The results show that the correction scheme is effective to reduce target dispersion and increase the precision of the impact point.
基金Supported by The Featured Innovation Projects of the General University of Guangdong Province(2023KTSCX096)The Special Projects in Key Areas of Guangdong Province(ZDZX1088)Research Team Project of Guangdong University of Education(2024KYCXTD018)。
文摘This paper explores the recovery of block sparse signals in frame-based settings using the l_(2)/l_(q)-synthesis technique(0<q≤1).We propose a new null space property,referred to as block D-NSP_(q),which is based on the dictionary D.We establish that matrices adhering to the block D-NSP_(q)condition are both necessary and sufficient for the exact recovery of block sparse signals via l_(2)/l_(q)-synthesis.Additionally,this condition is essential for the stable recovery of signals that are block-compressible with respect to D.This D-NSP_(q)property is identified as the first complete condition for successful signal recovery using l_(2)/l_(q)-synthesis.Furthermore,we assess the theoretical efficacy of the l2/lq-synthesis method under conditions of measurement noise.
基金National Natural Science Foundation of China(62272147,12471492,62072161,12401687)Shandong Provincial Natural Science Foundation(ZR2024QA205)+1 种基金Science and Technology on Communication Security Laboratory Foundation(6142103012207)Innovation Group Project of the Natural Science Foundation of Hubei Province of China(2023AFA021)。
文摘Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively.
基金State Key Lab of Processors,Institute of Computing Technology,Chinese Academy of Sciences(CLQ202516)the Fundamental Research Funds for the Central Universities of China(3282025047,3282024051,3282024009)。
文摘The advent of Grover’s algorithm presents a significant threat to classical block cipher security,spurring research into post-quantum secure cipher design.This study engineers quantum circuit implementations for three versions of the Ballet family block ciphers.The Ballet‑p/k includes a modular-addition operation uncommon in lightweight block ciphers.Quantum ripple-carry adder is implemented for both“32+32”and“64+64”scale to support this operation.Subsequently,qubits,quantum gates count,and quantum circuit depth of three versions of Ballet algorithm are systematically evaluated under quantum computing model,and key recovery attack circuits are constructed based on Grover’s algorithm against each version.The comprehensive analysis shows:Ballet-128/128 fails to NIST Level 1 security,while when the resource accounting is restricted to the Clifford gates and T gates set for the Ballet-128/256 and Ballet-256/256 quantum circuits,the design attains Level 3.