OBJECTIVE To explore the mechanism of action of Qihuang Zhuyu formula(QHZYF)in improving depression after myocardial infarction(MI),with a focus on revealing its regulatory effect on the inflammatory response of the h...OBJECTIVE To explore the mechanism of action of Qihuang Zhuyu formula(QHZYF)in improving depression after myocardial infarction(MI),with a focus on revealing its regulatory effect on the inflammatory response of the heart and brain.METHODS The active ingredients of QHZYF and the action targets for intervening in depression after MI were analyzed by using ultra-performance liquid chromatography-high-resolution mass spectrometry(UPLC-Q-TOF/MS)combined with network pharmacology and molecular docking.A rat model of depression after MI was established by ligation of the left anterior descending coronary artery combined with chronic restraint stress.Echocardiography was used to evaluate cardiac function,hematoxylin-eosin(HE)and Masson staining were used to evaluate myocardial injury,behavioral tests were used to detect melancholic behaviors,Nissl staining was used to evaluate hippocampal neuron injury.Western blot detection of tumor necrosis factor receptor 2(TNFR2),phosphatidylinositol-3-kinase(PI3K),phosphorylated seronine protein kinase(p-AKT),seronine protein kinase(AKT),tumor necrosis factor receptor 1(TNFR1),phosphorylated nuclear factorκB(p-NF-κB),and nuclear factorκB(NF-κB)in cardiac and hippocampal tissues was conducted.The levels of serum IL-6 and IL-10 were detected by enzyme-linked immunosorbent assay(ELISA),and the expression of TNFR1 and TNFR2 was detected by immunohistochemical technique(IHC).In vitro experiments,co-culture of rat cardiomyocyte line H9C2 cells and rat adrenal pheochromocytoma cell line with high differentiation PC12 cells was conducted,TNFR1 inhibitor(H398)and TNFR2 agonist(C-6His)were administered for intervention,and the expression of TNFR2,PI3K,p-AKT,AKT,TNFR1,NF-κB,p-NF-κB was detected by Western blot.Observe the apoptosis of cells by TUNEL staining,ELISA was used to detect the levels of IL-6 and IL-10 in the cell supernatant.RESULTS Network pharmacological analysis indicates that the TNF signaling pathway was a key target for the treatment of depression after MI with the QHZYF.In vivo experiments have confirmed that the intervention of QHZYF could significantly improve the cardiac function,myocardial tissue and hippocampal neuron structure damage of depressed rats after MI,and improve their depression-like behaviors.At the molecular level,the high-dose group of QHZYF significantly upregulated TNFR2,p-AKT/AKT,and IL-10 in cardiac and hippocampal tissues(P<0.01),and downregulated TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01).In vitro experiments showed that the drug-containing serum of QHZYF significantly upregulated the expression of TNFR2,p-AKT/AKT and IL-10 in H9C2 and PC12 cells(P<0.01),downregulated the expression of TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01),and significantly inhibited cell apoptosis(P<0.01).Furthermore,experiments on the combined application of H398 or C-6His further confirmed that its protective and anti-inflammatory effects were mediated by regulating the TNFR2/PI3K/AKT and TNFR1/NF-κB pathways.CONCLUSION QHZYF improves the homeostasis of heart and brain inflammation by regulating the TNF pathway,and ameliorates myocardial injury and depressive state in depressed rats after MI.展开更多
Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure ...Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenges in edge environments.However,the diversity of clients in edge cloud computing presents significant challenges for FL.Personalized federated learning(pFL)received considerable attention in recent years.One example of pFL involves exploiting the global and local information in the local model.Current pFL algorithms experience limitations such as slow convergence speed,catastrophic forgetting,and poor performance in complex tasks,which still have significant shortcomings compared to the centralized learning.To achieve high pFL performance,we propose FedCLCC:Federated Contrastive Learning and Conditional Computing.The core of FedCLCC is the use of contrastive learning and conditional computing.Contrastive learning determines the feature representation similarity to adjust the local model.Conditional computing separates the global and local information and feeds it to their corresponding heads for global and local handling.Our comprehensive experiments demonstrate that FedCLCC outperforms other state-of-the-art FL algorithms.展开更多
Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems...Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.展开更多
Praising or compliment is a communicative behavior shared by people of different languages. However, due to the influence of unique culture and different society, the language of compliment differs greatly. The author...Praising or compliment is a communicative behavior shared by people of different languages. However, due to the influence of unique culture and different society, the language of compliment differs greatly. The author of this essay is trying to analyze the formula of English compliment shared by all the English speaking nations, esp. in the United States.展开更多
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present...The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.展开更多
This paper presents a kind of artificial intelligent system-generalized computing system (GCS for short), and introduces its mathematical description, implement problem and learning problem.
OBJECTIVE Depression is one of the prevalent and prominent complex psychiatric diseases and the number of depressed patients has been on the rise globally during the recent decades.Xiaoyaosan,as a famous Chinese herba...OBJECTIVE Depression is one of the prevalent and prominent complex psychiatric diseases and the number of depressed patients has been on the rise globally during the recent decades.Xiaoyaosan,as a famous Chinese herbal formula,has been widely used in depression patients for a long time. However,the therapeutic mechanisms remain uncertain because of difficulty of depression pathophysiology and the lack of bioinformatic approach to understand the molecular connection. METHODS In this thesis,we applied a network pharmacology approach to explain the potential mechanisms between Xiaoyaosan and depression involved in oral bioavailability screening,drug-likeness assessment,caco-2 permeability,blood-brain barrier target recognition and network analysis. RESULTS 66 active compounds in Xiaoyaosan formula with favorable pharmacokinetic profiles are predicted as active compounds for anti-depression treatment. Network analyses show that these 66 compounds target 40depression-associated proteins including especially HTR2A,NR 3C1,MAOB,XDH and CNR2. These proteins are mainly involved in the neuroactive ligand-receptor interaction,serotonergic synapse,cAMP signaling pathways and calcium signaling pathways. CONCLUSION The integrated network pharmacology method is an effective approach to illustrate the anti-depression mechanisms of herbs,and this in silico approach can be applied in drug discovery.展开更多
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft...Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.展开更多
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o...Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time.展开更多
The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) ...The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) is proposed. With the benefit of the graphic card, the GRECO prediction method is faster and more accurate than other methods. The proposed method at the first time considers the special case that the targets cannot be completely covered by radar beams, which makes the prediction of radar tracking errors more self-contained in practical circumstances. On the other hand, the process of the scattering center extraction is omitted, resulting in possible angular glint prediction in real time. Comparisons between the simulation results and the theoretical ones validate its correctness and value to academic research and engineering applications.展开更多
Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/rem...Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications.展开更多
In this paper, the general calculation formulas of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 are obtained, and the recurrence relation of different power order radial matrix eleme...In this paper, the general calculation formulas of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 are obtained, and the recurrence relation of different power order radial matrix elements are also derived.展开更多
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
文摘OBJECTIVE To explore the mechanism of action of Qihuang Zhuyu formula(QHZYF)in improving depression after myocardial infarction(MI),with a focus on revealing its regulatory effect on the inflammatory response of the heart and brain.METHODS The active ingredients of QHZYF and the action targets for intervening in depression after MI were analyzed by using ultra-performance liquid chromatography-high-resolution mass spectrometry(UPLC-Q-TOF/MS)combined with network pharmacology and molecular docking.A rat model of depression after MI was established by ligation of the left anterior descending coronary artery combined with chronic restraint stress.Echocardiography was used to evaluate cardiac function,hematoxylin-eosin(HE)and Masson staining were used to evaluate myocardial injury,behavioral tests were used to detect melancholic behaviors,Nissl staining was used to evaluate hippocampal neuron injury.Western blot detection of tumor necrosis factor receptor 2(TNFR2),phosphatidylinositol-3-kinase(PI3K),phosphorylated seronine protein kinase(p-AKT),seronine protein kinase(AKT),tumor necrosis factor receptor 1(TNFR1),phosphorylated nuclear factorκB(p-NF-κB),and nuclear factorκB(NF-κB)in cardiac and hippocampal tissues was conducted.The levels of serum IL-6 and IL-10 were detected by enzyme-linked immunosorbent assay(ELISA),and the expression of TNFR1 and TNFR2 was detected by immunohistochemical technique(IHC).In vitro experiments,co-culture of rat cardiomyocyte line H9C2 cells and rat adrenal pheochromocytoma cell line with high differentiation PC12 cells was conducted,TNFR1 inhibitor(H398)and TNFR2 agonist(C-6His)were administered for intervention,and the expression of TNFR2,PI3K,p-AKT,AKT,TNFR1,NF-κB,p-NF-κB was detected by Western blot.Observe the apoptosis of cells by TUNEL staining,ELISA was used to detect the levels of IL-6 and IL-10 in the cell supernatant.RESULTS Network pharmacological analysis indicates that the TNF signaling pathway was a key target for the treatment of depression after MI with the QHZYF.In vivo experiments have confirmed that the intervention of QHZYF could significantly improve the cardiac function,myocardial tissue and hippocampal neuron structure damage of depressed rats after MI,and improve their depression-like behaviors.At the molecular level,the high-dose group of QHZYF significantly upregulated TNFR2,p-AKT/AKT,and IL-10 in cardiac and hippocampal tissues(P<0.01),and downregulated TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01).In vitro experiments showed that the drug-containing serum of QHZYF significantly upregulated the expression of TNFR2,p-AKT/AKT and IL-10 in H9C2 and PC12 cells(P<0.01),downregulated the expression of TNFR1,p-NF-κB/NF-κB and IL-6(P<0.01),and significantly inhibited cell apoptosis(P<0.01).Furthermore,experiments on the combined application of H398 or C-6His further confirmed that its protective and anti-inflammatory effects were mediated by regulating the TNFR2/PI3K/AKT and TNFR1/NF-κB pathways.CONCLUSION QHZYF improves the homeostasis of heart and brain inflammation by regulating the TNF pathway,and ameliorates myocardial injury and depressive state in depressed rats after MI.
基金supported by the Natural Science Foundation of Xinjiang Uygur Autonomous Region(Grant No.2022D01B 187)。
文摘Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenges in edge environments.However,the diversity of clients in edge cloud computing presents significant challenges for FL.Personalized federated learning(pFL)received considerable attention in recent years.One example of pFL involves exploiting the global and local information in the local model.Current pFL algorithms experience limitations such as slow convergence speed,catastrophic forgetting,and poor performance in complex tasks,which still have significant shortcomings compared to the centralized learning.To achieve high pFL performance,we propose FedCLCC:Federated Contrastive Learning and Conditional Computing.The core of FedCLCC is the use of contrastive learning and conditional computing.Contrastive learning determines the feature representation similarity to adjust the local model.Conditional computing separates the global and local information and feeds it to their corresponding heads for global and local handling.Our comprehensive experiments demonstrate that FedCLCC outperforms other state-of-the-art FL algorithms.
基金supported by the National Natural Science Foundation of China(61571149,62001139)the Initiation Fund for Postdoctoral Research in Heilongjiang Province(LBH-Q19098)the Natural Science Foundation of Heilongjiang Province(LH2020F0178).
文摘Fog computing has emerged as an important technology which can improve the performance of computation-intensive and latency-critical communication networks.Nevertheless,the fog computing Internet-of-Things(IoT)systems are susceptible to malicious eavesdropping attacks during the information transmission,and this issue has not been adequately addressed.In this paper,we propose a physical-layer secure fog computing IoT system model,which is able to improve the physical layer security of fog computing IoT networks against the malicious eavesdropping of multiple eavesdroppers.The secrecy rate of the proposed model is analyzed,and the quantum galaxy–based search algorithm(QGSA)is proposed to solve the hybrid task scheduling and resource management problem of the network.The computational complexity and convergence of the proposed algorithm are analyzed.Simulation results validate the efficiency of the proposed model and reveal the influence of various environmental parameters on fog computing IoT networks.Moreover,the simulation results demonstrate that the proposed hybrid task scheduling and resource management scheme can effectively enhance secrecy performance across different communication scenarios.
文摘Praising or compliment is a communicative behavior shared by people of different languages. However, due to the influence of unique culture and different society, the language of compliment differs greatly. The author of this essay is trying to analyze the formula of English compliment shared by all the English speaking nations, esp. in the United States.
基金This project was supported by the National Natural Science Foundation of China (60135020).
文摘The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.
文摘This paper presents a kind of artificial intelligent system-generalized computing system (GCS for short), and introduces its mathematical description, implement problem and learning problem.
文摘OBJECTIVE Depression is one of the prevalent and prominent complex psychiatric diseases and the number of depressed patients has been on the rise globally during the recent decades.Xiaoyaosan,as a famous Chinese herbal formula,has been widely used in depression patients for a long time. However,the therapeutic mechanisms remain uncertain because of difficulty of depression pathophysiology and the lack of bioinformatic approach to understand the molecular connection. METHODS In this thesis,we applied a network pharmacology approach to explain the potential mechanisms between Xiaoyaosan and depression involved in oral bioavailability screening,drug-likeness assessment,caco-2 permeability,blood-brain barrier target recognition and network analysis. RESULTS 66 active compounds in Xiaoyaosan formula with favorable pharmacokinetic profiles are predicted as active compounds for anti-depression treatment. Network analyses show that these 66 compounds target 40depression-associated proteins including especially HTR2A,NR 3C1,MAOB,XDH and CNR2. These proteins are mainly involved in the neuroactive ligand-receptor interaction,serotonergic synapse,cAMP signaling pathways and calcium signaling pathways. CONCLUSION The integrated network pharmacology method is an effective approach to illustrate the anti-depression mechanisms of herbs,and this in silico approach can be applied in drug discovery.
基金Projects(61202004,61272084)supported by the National Natural Science Foundation of ChinaProjects(2011M500095,2012T50514)supported by the China Postdoctoral Science Foundation+2 种基金Projects(BK2011754,BK2009426)supported by the Natural Science Foundation of Jiangsu Province,ChinaProject(12KJB520007)supported by the Natural Science Fund of Higher Education of Jiangsu Province,ChinaProject(yx002001)supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions,China
文摘Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally.
基金supported by the National Natural Science Foundation of China(6120235461272422)the Scientific and Technological Support Project(Industry)of Jiangsu Province(BE2011189)
文摘Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time.
基金supported by the National Natural Science Foundation of China (60871069)
文摘The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) is proposed. With the benefit of the graphic card, the GRECO prediction method is faster and more accurate than other methods. The proposed method at the first time considers the special case that the targets cannot be completely covered by radar beams, which makes the prediction of radar tracking errors more self-contained in practical circumstances. On the other hand, the process of the scattering center extraction is omitted, resulting in possible angular glint prediction in real time. Comparisons between the simulation results and the theoretical ones validate its correctness and value to academic research and engineering applications.
基金Project(41401434)supported by the National Natural Science Foundation of China
文摘Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications.
文摘In this paper, the general calculation formulas of radial matrix elements for relativistic n-dimensional hydrogen atom of spin S=0 are obtained, and the recurrence relation of different power order radial matrix elements are also derived.
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.