Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results sho...Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.展开更多
This paper constructs the probability model of Gunther generator at first, and the finite dimension union distribution of the output sequence is presented. The result shows that the output sequence is an independent a...This paper constructs the probability model of Gunther generator at first, and the finite dimension union distribution of the output sequence is presented. The result shows that the output sequence is an independent and uniformly distributed 0,1 random variable sequence. It gives the theoretical foundation about why Gunther generator can avoid the statistic weakness of the output sequence of stop-and-go generator, and analyzes the coincidence between output sequence and input sequences of Gunther generator. The conclusions of this paper would offer theoretical references for designers and analyzers of clock-controlled generators.展开更多
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera...The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security.展开更多
Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functi...Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed.展开更多
This paper proposes a power control method to improve a stability of a small-scale power grid with renewable energy sources. In an isolated small- scale power grid such as an island, diesel power plant is main power s...This paper proposes a power control method to improve a stability of a small-scale power grid with renewable energy sources. In an isolated small- scale power grid such as an island, diesel power plant is main power source which has an environmental burden and expensive running cost due to high priced fossil fuel. Thus, expanding installation of the renewable energy sources such as a wind power is strongly desirable. Such fluctuating energy sources, however, harm power quality of the small-scale power grid, and in addition, conventional power plant in the small-scale power grid cannot, in general, stabilize the grid system with such fluctuating power sources. In this study, Variable Speed Doubly-Fed Induction Generator (VS-DFIG) is proposed to be in-stalled at a diesel power plant instead of a conventional Fixed Speed Synchronous Generator (FS-SG), because quick control of a power balance in the small-scale power grid can be achieved by using the inertial energy of VS-DFIG. In addition, utilization of a Battery Energy Storage System (BESS) is also considered to assist cooperatively the VS-DFIG control. As a result of the simulation analysis by using the proposed method, it is verified that frequency fluctuations due to renewable energy source can be effectively reduced by quick power control of the VS-DFIG compared to the conventional FS-SG, and further control ability can be obtained by utilizing BESS. Moreover, the transient stability of a small-scale power grid during a grid fault can also be enhanced.展开更多
Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomial ...Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomial of L GSS sequences and the comparison of their degrees, an algorithm for selecting the linear com-bining vector G is presented, which is simple to understand, to implement and to prove. By using this method, much more than 2L?1 linear combining vectors G of the desired properties will be resulted. Thus in the practical application the linear combining vector G can be chosen with great arbitrariness. Additionally, this algorithm can be extended to any finite field easily.展开更多
Minimal polynomials and linear complexity of binary Ding generalized cyclotomic sequences of order 2 with the two-prime residue ring Zpq are obtained by Bai in 2005. In this paper, we obtain linear complexity and mini...Minimal polynomials and linear complexity of binary Ding generalized cyclotomic sequences of order 2 with the two-prime residue ring Zpq are obtained by Bai in 2005. In this paper, we obtain linear complexity and minimal polynomials of all Ding generalized cyclotomic sequences. Our result shows that linear complexity of these sequences takes on the values pq and pq-1 on our necessary and sufficient condition with probability 1/4 and the lower bound (pq - 1)/2 with probability 1/8. This shows that most of these sequences are good. We also obtained that linear complexity and minimal polynomials of these sequences are independent of their orders. This makes it no more difficult in choosing proper p and q.展开更多
At this current time,data stream classification plays a key role in big data analytics due to its enormous growth.Most of the existing classification methods used ensemble learning,which is trustworthy but these metho...At this current time,data stream classification plays a key role in big data analytics due to its enormous growth.Most of the existing classification methods used ensemble learning,which is trustworthy but these methods are not effective to face the issues of learning from imbalanced big data,it also supposes that all data are pre-classified.Another weakness of current methods is that it takes a long evaluation time when the target data stream contains a high number of features.The main objective of this research is to develop a new method for incremental learning based on the proposed ant lion fuzzy-generative adversarial network model.The proposed model is implemented in spark architecture.For each data stream,the class output is computed at slave nodes by training a generative adversarial network with the back propagation error based on fuzzy bound computation.This method overcomes the limitations of existing methods as it can classify data streams that are slightly or completely unlabeled data and providing high scalability and efficiency.The results show that the proposed model outperforms stateof-the-art performance in terms of accuracy(0.861)precision(0.9328)and minimal MSE(0.0416).展开更多
The practical significance of the established generalized differential formula-tion of the first law of thermodynamics (formulated for the rotational coor-dinate system) is evaluated (for the first time and for the me...The practical significance of the established generalized differential formula-tion of the first law of thermodynamics (formulated for the rotational coor-dinate system) is evaluated (for the first time and for the mesoscale oceanic eddies) by deriving the general (viscous-compressible-thermal) and partial (incompressible, viscous-thermal) local conditions of the tidal maintenance of the quasi-stationary energy and dissipative turbulent structure of the mesoscale eddy located inside of the individual fluid region of the ther-mally heterogeneous viscous (compressible and incompressible, respective-ly) heat-conducting stratified fluid over the two-dimensional bottom topog-raphy characterized by the horizontal coordinate x along a horizon-tal axis X. Based on the derived partial (incompressible) local condition (of the tidal maintenance of the quasi-stationary energy and viscous-thermal dis-sipative turbulent structure of the mesoscale eddy) and using the calculated vertical distributions of the mean viscous dissipation rate per unit mass and the mean thermal dissipation rate per unit mass in four regions near the observed mesoscale (periodically topographically trapped by nearly two-dimensional bottom topography h(x) eddy located near the northern region of the Yamato Rise in the Japan Sea, the combined analysis of the energy structure of the eddy and the viscous-thermal dissipative structure of turbulence is presented. The convincing evidence is presented of the tidal mechanism of maintenance of the eddy energy and viscous-thermal dissipa-tive structure of turbulence (produced by the breaking internal gravity waves generated by the eddy) in three regions near the Yamato Rise subjected to the observed mesoscale eddy near the northern region of the Yamato Rise of the Japan Sea.展开更多
We present candidate members of the Pal 5, GD-1, Cetus Polar and Orphan tidal stellar streams found in LAMOST DR3, SDSS DR9 and APOGEE catalogs. In LAMOST DR3, we find 20, 4 and 24 high confidence candidates of tidal ...We present candidate members of the Pal 5, GD-1, Cetus Polar and Orphan tidal stellar streams found in LAMOST DR3, SDSS DR9 and APOGEE catalogs. In LAMOST DR3, we find 20, 4 and 24 high confidence candidates of tidal streams GD-1, Cetus Polar and Orphan respectively. We also list 59, 118 and 10 high confidence candidates of tidal streams Cetus Polar, Orphan and Pal 5, respectively from the SDSS DR9 spectroscopic catalog. Furthermore, we find seven high confidence candidates of the Pal 5 tidal stream in the APOGEE data. Compared with SDSS, the new candidates from LAMOST DR3 are brighter, so that together, more of the color-magnitude diagram, including the giant branch, can be explored. Analysis of the SDSS data shows that there are three metallicity peaks associated with the Orphan stream which also exhibit some spatial separation. The LAMOST data confirm multiple metallicities in this stream. The metallicity, given by the higher resolution APOGEE instrument, of the Pal 5 tidal stream is [Fe/H] ,- -1.2, higher than that given earlier by SDSS spectra. Many previously unidentified stream members are tabulated here for the first time, along with existing members, allowing future researchers to further constrain the orbits of these objects as they move within the Galaxy's dark matter potential.展开更多
The wide acceptance and data deluge in medical imaging processing require faster and more efficient systems to be built.Due to the advances in heterogeneous architectures recently,there has been a resurgence in the fi...The wide acceptance and data deluge in medical imaging processing require faster and more efficient systems to be built.Due to the advances in heterogeneous architectures recently,there has been a resurgence in the first research aimed at FPGA-based as well as GPGPU-based accelerator design.This paper quantitatively analyzes the workload,computational intensity and memory performance of a single-particle 3D reconstruction application,called EMAN,and parallelizes it on CUDA GPGPU architectures and decouples the memory operations from the computing flow and orchestrates the thread-data mapping to reduce the overhead of off-chip memory operations.Then it exploits the trend towards FPGA-based accelerator design,which is achieved by offloading computingintensive kernels to dedicated hardware modules.Furthermore,a customized memory subsystem is also designed to facilitate the decoupling and optimization of computing dominated data access patterns.This paper evaluates the proposed accelerator design strategies by comparing it with a parallelized program on a 4-cores CPU.The CUDA version on a GTX480 shows a speedup of about 6 times.The performance of the stream architecture implemented on a Xilinx Virtex LX330 FPGA is justified by the reported speedup of 2.54 times.Meanwhile,measured in terms of power efficiency,the FPGA-based accelerator outperforms a 4-cores CPU and a GTX480 by 7.3 times and 3.4 times,respectively.展开更多
基金Supported by the Foundation of National Labora-tory for Modern Communications (51436030105DZ0105)
文摘Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.
基金Supported by the Open Subject for Computer Network and Information Security Key Laboratory of Ministry of Education of China(20040108)
文摘This paper constructs the probability model of Gunther generator at first, and the finite dimension union distribution of the output sequence is presented. The result shows that the output sequence is an independent and uniformly distributed 0,1 random variable sequence. It gives the theoretical foundation about why Gunther generator can avoid the statistic weakness of the output sequence of stop-and-go generator, and analyzes the coincidence between output sequence and input sequences of Gunther generator. The conclusions of this paper would offer theoretical references for designers and analyzers of clock-controlled generators.
基金the National Natural Science Foundation of China (60273084).
文摘The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security.
文摘Several kinds of stream ciphers—complementary sequences of period sequences,partial sum of period sequences,inverse order sequences and finitely generated sequences,arestudied by using techniques of generating functions.Their minimal polynomials,periods,as wellas generating functions are given.As to finitely generated sequences,the change of their linearcomplexity profiles as well as the relationship between the two generated sequences usder thecase in which the degree of connected polynomials are fixed,are discussed.
文摘This paper proposes a power control method to improve a stability of a small-scale power grid with renewable energy sources. In an isolated small- scale power grid such as an island, diesel power plant is main power source which has an environmental burden and expensive running cost due to high priced fossil fuel. Thus, expanding installation of the renewable energy sources such as a wind power is strongly desirable. Such fluctuating energy sources, however, harm power quality of the small-scale power grid, and in addition, conventional power plant in the small-scale power grid cannot, in general, stabilize the grid system with such fluctuating power sources. In this study, Variable Speed Doubly-Fed Induction Generator (VS-DFIG) is proposed to be in-stalled at a diesel power plant instead of a conventional Fixed Speed Synchronous Generator (FS-SG), because quick control of a power balance in the small-scale power grid can be achieved by using the inertial energy of VS-DFIG. In addition, utilization of a Battery Energy Storage System (BESS) is also considered to assist cooperatively the VS-DFIG control. As a result of the simulation analysis by using the proposed method, it is verified that frequency fluctuations due to renewable energy source can be effectively reduced by quick power control of the VS-DFIG compared to the conventional FS-SG, and further control ability can be obtained by utilizing BESS. Moreover, the transient stability of a small-scale power grid during a grid fault can also be enhanced.
基金Supported in part by the National Natural Science Foun-dation of China (No.60273084) and Doctoral Foundation (No.20020701013).
文摘Given an m-sequence, the main factor influencing the least period of the Generalized Self-Shrinking (GSS) sequence is the selection of the linear combining vector G. Based on the calculation of the minimal polynomial of L GSS sequences and the comparison of their degrees, an algorithm for selecting the linear com-bining vector G is presented, which is simple to understand, to implement and to prove. By using this method, much more than 2L?1 linear combining vectors G of the desired properties will be resulted. Thus in the practical application the linear combining vector G can be chosen with great arbitrariness. Additionally, this algorithm can be extended to any finite field easily.
基金Project supported by the National Natural Science Foundation of China(Grant No.60473028)the Natural Science Foundation of Fujian Province(Grant No.A0540011)the Science and Technology Fund of Educational Committee of Fujian Province(Grant No.JA04264)
文摘Minimal polynomials and linear complexity of binary Ding generalized cyclotomic sequences of order 2 with the two-prime residue ring Zpq are obtained by Bai in 2005. In this paper, we obtain linear complexity and minimal polynomials of all Ding generalized cyclotomic sequences. Our result shows that linear complexity of these sequences takes on the values pq and pq-1 on our necessary and sufficient condition with probability 1/4 and the lower bound (pq - 1)/2 with probability 1/8. This shows that most of these sequences are good. We also obtained that linear complexity and minimal polynomials of these sequences are independent of their orders. This makes it no more difficult in choosing proper p and q.
基金Taif University Researchers Supporting Project Number(TURSP-2020/126),Taif University,Taif,Saudi Arabia.
文摘At this current time,data stream classification plays a key role in big data analytics due to its enormous growth.Most of the existing classification methods used ensemble learning,which is trustworthy but these methods are not effective to face the issues of learning from imbalanced big data,it also supposes that all data are pre-classified.Another weakness of current methods is that it takes a long evaluation time when the target data stream contains a high number of features.The main objective of this research is to develop a new method for incremental learning based on the proposed ant lion fuzzy-generative adversarial network model.The proposed model is implemented in spark architecture.For each data stream,the class output is computed at slave nodes by training a generative adversarial network with the back propagation error based on fuzzy bound computation.This method overcomes the limitations of existing methods as it can classify data streams that are slightly or completely unlabeled data and providing high scalability and efficiency.The results show that the proposed model outperforms stateof-the-art performance in terms of accuracy(0.861)precision(0.9328)and minimal MSE(0.0416).
文摘The practical significance of the established generalized differential formula-tion of the first law of thermodynamics (formulated for the rotational coor-dinate system) is evaluated (for the first time and for the mesoscale oceanic eddies) by deriving the general (viscous-compressible-thermal) and partial (incompressible, viscous-thermal) local conditions of the tidal maintenance of the quasi-stationary energy and dissipative turbulent structure of the mesoscale eddy located inside of the individual fluid region of the ther-mally heterogeneous viscous (compressible and incompressible, respective-ly) heat-conducting stratified fluid over the two-dimensional bottom topog-raphy characterized by the horizontal coordinate x along a horizon-tal axis X. Based on the derived partial (incompressible) local condition (of the tidal maintenance of the quasi-stationary energy and viscous-thermal dis-sipative turbulent structure of the mesoscale eddy) and using the calculated vertical distributions of the mean viscous dissipation rate per unit mass and the mean thermal dissipation rate per unit mass in four regions near the observed mesoscale (periodically topographically trapped by nearly two-dimensional bottom topography h(x) eddy located near the northern region of the Yamato Rise in the Japan Sea, the combined analysis of the energy structure of the eddy and the viscous-thermal dissipative structure of turbulence is presented. The convincing evidence is presented of the tidal mechanism of maintenance of the eddy energy and viscous-thermal dissipa-tive structure of turbulence (produced by the breaking internal gravity waves generated by the eddy) in three regions near the Yamato Rise subjected to the observed mesoscale eddy near the northern region of the Yamato Rise of the Japan Sea.
基金supported by the National Natural Science Foundation of China(NSFC,Grant Nos.Y011161001,11403056,11673036 and 11333004)Support was provided by the US NSF LAMOST-PLUS grant.Y.Wu acknowledges the fund supplied by the Guangdong Provincial Engineering Technology Research Center for Data Science+1 种基金The Guo Shou Jing Telescope(the Large Sky Area Multi-Object Fiber Spectroscopic Telescope LAMOST) is a National Major Scientific Project built by the Chinese Academy of SciencesFunding for the project has been provided by the National Development and Reform Commission
文摘We present candidate members of the Pal 5, GD-1, Cetus Polar and Orphan tidal stellar streams found in LAMOST DR3, SDSS DR9 and APOGEE catalogs. In LAMOST DR3, we find 20, 4 and 24 high confidence candidates of tidal streams GD-1, Cetus Polar and Orphan respectively. We also list 59, 118 and 10 high confidence candidates of tidal streams Cetus Polar, Orphan and Pal 5, respectively from the SDSS DR9 spectroscopic catalog. Furthermore, we find seven high confidence candidates of the Pal 5 tidal stream in the APOGEE data. Compared with SDSS, the new candidates from LAMOST DR3 are brighter, so that together, more of the color-magnitude diagram, including the giant branch, can be explored. Analysis of the SDSS data shows that there are three metallicity peaks associated with the Orphan stream which also exhibit some spatial separation. The LAMOST data confirm multiple metallicities in this stream. The metallicity, given by the higher resolution APOGEE instrument, of the Pal 5 tidal stream is [Fe/H] ,- -1.2, higher than that given earlier by SDSS spectra. Many previously unidentified stream members are tabulated here for the first time, along with existing members, allowing future researchers to further constrain the orbits of these objects as they move within the Galaxy's dark matter potential.
基金Supported by the National Basic Research Program of China(No.2012CB316502)the National High Technology Research and DevelopmentProgram of China(No.2009AA01A129)the National Natural Science Foundation of China(No.60921002)
文摘The wide acceptance and data deluge in medical imaging processing require faster and more efficient systems to be built.Due to the advances in heterogeneous architectures recently,there has been a resurgence in the first research aimed at FPGA-based as well as GPGPU-based accelerator design.This paper quantitatively analyzes the workload,computational intensity and memory performance of a single-particle 3D reconstruction application,called EMAN,and parallelizes it on CUDA GPGPU architectures and decouples the memory operations from the computing flow and orchestrates the thread-data mapping to reduce the overhead of off-chip memory operations.Then it exploits the trend towards FPGA-based accelerator design,which is achieved by offloading computingintensive kernels to dedicated hardware modules.Furthermore,a customized memory subsystem is also designed to facilitate the decoupling and optimization of computing dominated data access patterns.This paper evaluates the proposed accelerator design strategies by comparing it with a parallelized program on a 4-cores CPU.The CUDA version on a GTX480 shows a speedup of about 6 times.The performance of the stream architecture implemented on a Xilinx Virtex LX330 FPGA is justified by the reported speedup of 2.54 times.Meanwhile,measured in terms of power efficiency,the FPGA-based accelerator outperforms a 4-cores CPU and a GTX480 by 7.3 times and 3.4 times,respectively.